Next Article in Journal
A Novel MEMS Gyro North Finder Design Based on the Rotation Modulation Technique
Previous Article in Journal
Performance Analysis of Global Navigation Satellite System Signal Acquisition Aided by Different Grade Inertial Navigation System under Highly Dynamic Conditions
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Genetic Algorithm for the Generation of Packetization Masks for Robust Image Communication

by
Katherine Zapata-Quiñones
1,
Cristian Duran-Faundez
2,*,
Gilberto Gutiérrez
3,
Vincent Lecuire
4,
Christopher Arredondo-Flores
5 and
Hugo Jara-Lipán
6
1
Magister en Ciencias de la Computación, Universidad del Bío-Bío, Chillán 3800708, Chile
2
Departamento de Ingeniería Eléctrica y Electrónica, Universidad del Bío-Bío, Concepción 4051381, Chile
3
Departamento de Ciencias de la Computación y Tecnologías de la Información, Universidad del Bío-Bío, Chillán 3800708, Chile
4
Centre de Recherche en Automatique de Nancy, Université de Lorraine, CNRS, Vandœuvre-lès-Nancy 54506, France
5
Magister en Informática, Universidad del Bío-Bío, Concepción 4051381, Chile
6
Corporación Educacional Colegio Concepción, Nuble 3800564, Chile
*
Author to whom correspondence should be addressed.
Sensors 2017, 17(5), 981; https://doi.org/10.3390/s17050981
Submission received: 31 January 2017 / Revised: 24 March 2017 / Accepted: 7 April 2017 / Published: 28 April 2017
(This article belongs to the Section Sensor Networks)

Abstract

:
Image interleaving has proven to be an effective solution to provide the robustness of image communication systems when resource limitations make reliable protocols unsuitable (e.g., in wireless camera sensor networks); however, the search for optimal interleaving patterns is scarcely tackled in the literature. In 2008, Rombaut et al. presented an interesting approach introducing a packetization mask generator based in Simulated Annealing (SA), including a cost function, which allows assessing the suitability of a packetization pattern, avoiding extensive simulations. In this work, we present a complementary study about the non-trivial problem of generating optimal packetization patterns. We propose a genetic algorithm, as an alternative to the cited work, adopting the mentioned cost function, then comparing it to the SA approach and a torus automorphism interleaver. In addition, we engage the validation of the cost function and provide results attempting to conclude about its implication in the quality of reconstructed images. Several scenarios based on visual sensor networks applications were tested in a computer application. Results in terms of the selected cost function and image quality metric PSNR show that our algorithm presents similar results to the other approaches. Finally, we discuss the obtained results and comment about open research challenges.

1. Introduction

It is known that, when sending multimedia data through communication networks, the inherent presence of packet loss can lead to discernible quality degradations at the receiver side [1]. Moreover, when the Packet Loss Rate (PLR) is significant, loss control becomes a relevant issue for reliable (or semi-reliable) communication protocols, being commonly addressed with active concealment techniques [2], such as those based in Forward Error Correction (FEC) or Automatic Repeat-reQuest (ARQ) [3,4]. Nevertheless, the use of such techniques is unsuitable in many applications for which energy, time and/or bandwidth (among others) are considered as very scarce resources. For those cases, even if unable to perform error correction, interleaving methods have proven to be effective on the reduction of the impact of network errors [5].
Interleaving methods take advantage of the usual spacial redundancy of multimedia data. Indeed, neighboring blocks of data are usually similar or highly correlated in multimedia, e.g., in digital images, we expect to find similar intensities in the pixels of a given region representing a single object or area (similar examples be found in sound). Interleaving methods can be used to enhance error robustness by simply spreading neighboring blocks of data in different and distant data packets, so that, if packets are lost, it may be still possible to find the neighboring blocks of those that were lost in other (well received) packets, so the missing information can be better estimated by using a passive error concealment method (e.g., works in [6,7]). This kind of technique has been proposed for being part of energy-aware wireless sensor systems, in real-time video transmission and radio broadcasting, among others [8,9,10,11,12,13].
This paper focuses on the particular case of two-dimensional still image interleaving, but modifications to the presented proposals can be performed in order to apply them to other kinds of multimedia data (such as sound or video). Let us denote P as the number of packets necessary to transmit an image f ( H × W ) . For the rest of this paper, we consider that the packetization scheme searches for sending an integer quantity of the entire data blocks in a packet, so that each of the P 1 first packets is as full as possible, and a data block is either entirely received or entirely lost. Figure 1 shows an example of image interleaving for the said error resilience principle.
Following the example, if Packet 2 is lost, we could find useful information to give an acceptable estimation of f ( 0 , 1 ) original values by using information in Packets 1 and 3 (in the case that these packets are correctly received), assuming that the values of blocks f ( 0 , 0 ) and f ( 0 , 2 ) are fairly similar to those in f ( 0 , 1 ) . Now, considering the huge amount of possible solutions, the determination of an optimal packetization scheme through exhaustive search becomes extremely unsuitable. This amount of possible solutions depends on various factors, including the amount and size of the blocks of pixels (codified or not) to be packetized and the size of the packets payload.
In the literature, it is possible to find different approaches for performing interleaving-based packetization, where most of them are based in deterministic mathematical or procedural functions that map an input coordinate ( x , y ) into another one ( x , y ) . One example is the work in [8], were a Torus Automorphism (TA) was applied as a part of a communication system for resource-constrained wireless camera sensor networks devices. Of course, in the matter of this paper, the effectiveness of the interleaving scheme is assessed by its capability to enhance robustness, hence by its capability to allow a perceptual enhancement of the decoded images at the receiver side. As the number of possible scenarios is impossible to handle by state-of-the-art computational equipment, the finding of a good interleaving function, and the search for its optimal parameters, is a non-trivial task. In the absence of a fitness function able to assess an interleaving scheme, simulations are required. In [11], we performed an experimental comparison of various block interleaving techniques found in the literature, showing results of exhaustive simulations with every possible parameter for each evaluated method, for a large amount of loss patterns over a single input image. Results in terms of Peak Signal-to-Noise Ratio (PSNR) show a slight advantage of TA in front of other interleaving schemes, for the considered scenarios. To the best of our knowledge, this work is the only work in the literature in trying to exhaustively evaluate image interleaving schemes as error-robust techniques; most of the published works provide experimental results with very few cases. Nevertheless, as the required amount of computing time is significant, this experience highlights the need for higher performance computing techniques and, moreover, new evaluation methods.
Avoiding exhaustive simulations for assessing said processing techniques calls for evaluation functions, whose design is not trivial because various considerations must be made. Moreover, the validation of such an evaluation functions is also non-trivial. In [14], the authors present what seems to be the only evaluation function for an interleaving scheme. Such an evaluation function is used as the cost function of a Simulated Annealing (SA) implementation able to find optimal packetization masks.
In this paper, we propose a Genetic Algorithm (GA) for the generation of pseudo-optimal packetization masks, as an alternative to the method proposed by Rombaut et al. in [14], for enhancing error resilience in image transmission schemes. In particular, the contributions of this work are twofold: Firstly, we design the GA capable of calculating packetization masks adopting Rombaut’s evaluation function, and we compare it with Rombaut’s SA and TA, which was reported as a good mathematical interleaving technique [11]. Secondly, we provide exhaustive simulation results for analyzing the relationship between the adopted cost function and the quality of reconstructed images after applying the calculated packetization masks as a part of a virtual communication system subject to packet loss.
The rest of this paper is organized as follows: In Section 2, we present the theoretical background and related works on image interleaving for enhancing error resilience in image communication systems. Section 3 describes the genetic algorithm we designed and implemented in order to generate packetization masks for image communication. Results in terms of the cost function proposed by Rombaut et al. and image quality metric PSNR are discussed in Section 4. Finally, Section 5 concludes and gives future directions of this work.

2. Background on Image Interleaving for Error Robust Communication

Due to its simplicity and effectiveness, various works have adopted image interleaving for enhancing image communication robustness. In [15], the coordinate of the following blocks to be packetized is calculated by considering a separation of step blocks in a line-by-line lecture of the captured image. In [16], the authors propose the calculation of the new coordinate for a block to be packetized by applying a Backermap. A similar approach is adopted in [8,17], where a chaotic torus automorphism is applied to enhance the robustness of a real-world wireless camera sensor network.
Given selectable parameters, all of the mentioned approaches represent mathematical functions that map a given initial coordinate to a new one as an injection, i.e, for every input coordinate ( x , y ) , there is only one calculated output coordinate ( x , y ) , and for each input ( x , y ) , we can find the exact original coordinate ( x , y ) by applying the inverse method (of course, we need to find the original order at the decoder side). As said, calculated coordinate ( x , y ) is performed to select the next block to be packetized. Even if such techniques are efficient and effective for enhancing robustness in a communication system, the search for optimal packetization patterns is still poorly studied. Indeed, most approaches behave always the same way, but there are no evaluation methods that give us a clue about, given a certain scenario, which interleaving pattern is the most suited.
In [11], we performed exhaustive simulation (i.e., brute-force search, simulating every possible combination of parameter in a certain range) of interleaving methods in [8,16,18], representing hundreds of computing simulation hours. The results of this work throw slight favor to the TA approach based on [8], but the complexity of the evaluation process calls for evaluation functions that allow one to anticipate the suitability of a given approach avoiding such a computing effort. In that matter, an interesting approach is proposed in [14], where an optimization function is proposed in order to assess packetization masks (a particular representation of a packetization pattern) in terms of the robustness that they can provide to an image communication system. This evaluation function is included in an SA algorithm providing pseudo-optimal packetization masks. The evaluation function could also be useful to evaluate block-sampling techniques, such as the work in [19]. In this work, we adopt such a technique and propose a GA as an alternative of the implemented SA. The proposal is compared with a sequential communication and algorithms based on TA [8] and SA [14], which are briefly described in the reminder of this section.

2.1. Interleaving Method Based on Torus Automorphisms

Torus Automorphisms (TA) are strongly chaotic systems that can be adapted as a two-dimensional permutation transform [20]. A classical implementation is the one that uses Arnold’s cat map and has been adopted as interleaving function for image communication systems in various published works [8,17,21]. As said, a main quality of such a method is its chaotic results, ensuring pseudorandom interleaving (still being possible to get the original configuration), apart from not incurring excessive energetic waste due to the simplicity of its execution. Equation (1) illustrates the permutation function that calculates a new coordinate ( x , y ) as function of a previous one ( x , y ) , considering a N × N blocks squared matrix.
x y = 1 1 k k + 1 n x y mod N

2.2. Rombaut Interleaving

In [14], Rombaut et al. present a packetization method introducing a cost function for packetization mask assessing. A packetization mask is a packetization scheme representation consisting of a matrix of integer values f ( H × W ) , where each element f s , t stores the sequence number of the packet transporting the block in coordinates ( s , t ) from the original image (the data can be codified or not). Rombaut et al.’s proposal is the optimal packetization mask search based on Simulated Annealing (SA) (see Algorithm 1) along with a Metropolis algorithm (see Algorithm 2).
Algorithm 1 Rombaut et al.’s Simulated Annealing [14].
1:
Initialize T k with the initial temperature T 0 {this is a user selectable parameter}.
2:
Generate an initial packetization mask m a s k {randomly}.
3:
while the equilibrium is not reached do
4: 
[ m a s k , b e s t _ m a s k ] Metropolis( m a s k , b e s t _ m a s k , T k )
5: 
Decrease temperature T k . {This can be done by doing T k T 0 α k , where k increases at each iteration.}
6:
end while
7:
return b e s t _ m a s k
Algorithm 2 Rombaut et al.’s Metropolis algorithm [14].
Require: 
Input m a s k {The current packetization mask (from a previous iteration) which is used as basis for generating a new one.}, input b e s t _ m a s k {Current best packetization mask.}, input T k {Current temperature.}
 1:
Initialize m a s k .
 2:
while the equilibrium is not reached do
 3: 
Generate a new mask, n e w _ m a s k , using as basis previous mask m a s k .
 4: 
Calculate d e l t a _ p e n a l t y as d e l t a _ p e n a l t y p e n a l t y ( n e w _ m a s k ) p e n a l t y ( m a s k ) { p e n a l t y ( ) corresponds to to SA’s cost function which must be minimized, and is described in Section 3.3.}
 5: 
Calculate t h r e s h o l d as: t h r e s h o l d e d e l t a _ p e n a l t y T k
 6: 
if rand(1) < t h r e s h o l d {rand(1) calculates a random real number in range [ 0 , 1 ] .} then
 7:
   m a s k n e w _ m a s k
 8:
  if t h r e s h o l d > 1 then
 9:
    b e s t _ m a s k n e w _ m a s k
10:
  end if
11:
end if
12:
end while
13:
return [ m a s k , b e s t _ m a s k ]

3. Proposal

Genetic algorithms are well-known metaheuristics inspired by Darwin’s theory of evolution. They apply direct analogies of the principle of survival of better adapted individuals to certain environments over time [22]. A GA consists of making a population of individuals, P ( t ) , evolve by making it pass through random processes, as those observed in biological evolution (particularly, crossover and mutation), and a selection process according to a criterion, which allows deciding which individuals are the best adapted [23]. Briefly speaking, a GA randomly generates an initial population of individuals, assigning a fitness value to each one (a calculated value representing its “quality”with respect to the others); then, it applies stochastic operators, such as selection, crossover and mutation, over the population, aiming to generate a new population of individuals. These processes are successively repeated until a certain stopping criterion is accomplished. This stopping criterion can be the execution of a certain number of iterations (generations) or the finding of an individual with a fitness with some desired characteristics.
When developing genetic algorithms, the main components to design are: (1) the codification scheme; (2) the initial population; (3) the fitness function; (4) the selection process; (5) the crossover; (6) the mutation; (7) the replacement (the pass to the next generation); and (8) the stopping criterion. The following subsections describe the components of the proposed GA in order to find suitable solutions to the explained interleaving problem. The adopted codification scheme and the crossover and mutation operators correspond to components adopted in works where it is necessary to maintain all of the elements of a sequence (permutations) consistent [24,25].

3.1. Codification Scheme

As the codification scheme, we adopt a stream of different integer numbers to represent a given chromosome. The integer numbers symbolize the image’s blocks to be packetized in a line-by-line sequence, such as illustrated in Figure 2. In [25], this kind of codification scheme is considered as a natural representation in problems requiring symbolizing a sequence. In this paper, we represent an individual I as a vector of ( N × M ) different integer numbers, where N and M are the number of rows and columns of the matrix of blocks to packetize.
Note that each block contains a certain number of pixels. In image processing, many compression algorithms divide the image into blocks of pixels, and then, they apply some transform over each block. For example, the JPEG algorithm works over blocks of 8 × 8 pixels; the TiBsalgorithm works over blocks of 2 × 2 pixels [17], and so on. For simplicity (and this is the principle adopted in this paper), many interleaving-based schemes consider packetizing each block as a whole in one packet, so the entire block is either received or lost. With this, as explained before, the quality of a packetization scheme is based on its capacity to increase the probability of receiving neighboring blocks to a lost one considering that neighboring blocks can be used to estimate the intensities of a missing one.

3.2. Initial Population

An initial population of T p candidate solutions is randomly generated from the search space, through random permutations of a vector of ( N × M ) integer values as illustrated in Figure 3.

3.3. Fitness Function

In order to evaluate candidate solutions, in this work, we adopt the cost function proposed by Rombaut et al. in [14], addressed as Rombaut’s Cost Function (RCF). This function evaluates the interpolation mask used for packetization, which is based on properties that, according to the authors, enhance the packetization robustness. RCF is a function to minimize; hence, the closest to zero possible value is the optimal solution.
According to Rombaut et al.’s notation, an image is defined as a signal f defined in the discrete domain D. According to that, a packetization interpolation mask is defined as a matrix f = { f 0 , 0 , f 0 , 1 , f N 1 , M 1 } where f s , t contains the number of sequences of the data packet in which the block at coordinate ( s , t ) is transported.
The evaluation function Q is thus given by the combination of three terms as described by Equation (2):
Q ( B ) = α Q 1 ( B ) + β Q 2 ( B ) + γ Q 3 ( B )
where:
  • B :    represents the solution,
  • Q i ( ) :  ( i { 1 , 2 , 3 } ) corresponds to the properties of a proper packetization, according to Rombaut et al., namely:
    • a large enough distance between packets, considered by factor Q 1 ,
    • maximal spreading over the packets of the set of elements necessary to reconstruct an element j, considered by factor Q 2 , and
    • maximal spreading of the elements necessary to reconstruct all of the elements of one packet over all of the other packets, considered by factor Q 3 . Finally,
  • α , β and γ :  allow considering the importance of each desired property and are calculated with the knowledge of a determined packet loss model.
Equations for calculating factors Q i , α , β and γ are given in the Appendix at the end of this paper.

3.4. Selection

After evaluation, the best adapted individuals are selected for the next generation, i.e., solutions with higher fitness values are selected with higher probability than others with lower fitness, so the survival of the best adapted individuals principle is imposed. In our work, we adopt the roulette wheel selection, which consists of assigning to each individual x of the current generation a section of size P ( x ) representing its probability to be chosen, so that P ( x ) = 1 ,   x [26].

3.5. Crossover

Crossover combines parts from two or more solutions, in order to create new (and possible better) solutions. Crossover is the operator that gives to genetic algorithms its strength; it allows that different solutions share genetic information; thus, it is expected that, over the generations, the combination of two or more good individuals generates better solutions.
In this work, we adopt Order Crossover (OX1) [27], which is applied to find solutions to the classical Traveling Salesman Problem (TSP) in [24,25], providing good results in comparison with other crossover operators.
OX1 includes an associated crossover probability, P c , which determines whether a pair of individuals cross or not. If two individuals, P 1 and P 2 , are selected to cross, Algorithm 3 describes the creation of resulting individuals H 1 and H 2 that we implemented for our interleaving problem.

3.6. Mutation

Unlike crossover, the mutation process operates in particular individuals separately. The mutation operator is used to generate new chromosomes (individuals) by (generally, in a random way) changing little portions of a given individual. In this work, we adopt the mutation operator known as Inversion Mutation (IVM), also referred to as inverted displacement mutation, as has been reported in various studies as having advantages for solving TSP [24,25]. IVM consists of taking a segment of the chromosome, inverting its values and re-introducing them in a new location.
The operator has an associated mutation probability P m , which determines whether an individual generated after crossover mutates or not. In our proposal, we adopt P m as a fixed input parameter of the algorithm.
In genetic algorithms, mutation’s role is to allow restoring the lost or unexplored genetic material or in the population, aiming to prevent the premature convergence to sub-optimal solutions. Indeed, such changes are necessary because, as the less adapted members of the population are discarded, some aspects of their genetic material could be definitively lost. Through random changes in chromosomes, the new individuals can explore a place of the space domain, which is not possible to reach with simple crossover.
Algorithm 3 Order Crossover (OX1) algorithm for the interleaving problem.
Require: 
Parent P 1 = { P 1 ( 0 ) , P 1 ( 1 ) , , P 1 ( N . M 1 ) } {The first individual to cross, with P 1 ( i ) { 1 , 2 , , N . M } and i j ,   P 1 ( i ) P 1 ( j ) .}
Require: 
Parent P 2 = { P 2 ( 0 ) , P 2 ( 1 ) , , P 2 ( N . M 1 ) } {The second individual to cross, with P 2 ( i ) { 1 , 2 , , N . M } and i j ,   P 2 ( i ) P 2 ( j ) .}
Require: 
Cutting points c 1 and c 2 , with c 1 < c 2 , and c 1 0 and c 2 ( N . M 1 ) .
 1:
Initialize the first resulting individual, H 1 , as a vector of N . M elements. {Let us start with generating H 1 .}
 2:
Copy elements from P 1 ( c 1 ) to P 1 ( c 2 ) into H 1 ( c 1 ) to H 1 ( c 2 ) .
 3:
i ( c 2 + 1 ) mod ( N . M )
 4:
j i
 5:
while i ( ( c 1 1 ) mod ( N . M ) ) do
 6:
if P 2 ( j ) is not in H 1 then
 7:
   H 1 ( i ) P 2 ( j )
 8:
   i ( i + 1 ) mod ( N . M )
 9:
end if
10:
j ( j + 1 ) mod ( N . M )
11:
end while
12:
Initialize the second resulting individual, H 2 , as a vector of N . M elements. {We continue by generating H 1 .}
13:
Copy elements from P 2 ( c 1 ) to P 2 ( c 2 ) into H 2 ( c 1 ) to H 2 ( c 2 ) .
14:
i ( c 2 + 1 ) mod ( N . M )
15:
j i
16:
while i ( ( c 1 1 ) mod ( N . M ) ) do
17:
if P 1 ( j ) is not in H 2 then
18:
   H 2 ( i ) P 1 ( j )
19:
   i ( i + 1 ) mod ( N . M )
20:
end if
21:
j ( j + 1 ) mod ( N . M )
22:
end while

3.7. Replacement (Passing to the Next Generation)

Some decisions must be made about making genetic material pass to the next generation. The new population can be entirely conformed of new individuals, resulting of the genetic operators crossover and mutation, or it can be a fraction of surviving individuals from the current population (PS: Percentage of Survival). This percentage is also known as gap generation [28]. In our proposal, we adopt a P S as a fixed input parameter of the algorithm.

3.8. Stopping Criterion

The stopping criterion consists of defining which condition(s) make a genetic algorithm stop iterating. Usually, it consists of reaching a certain number of iterations, which is called the maximum Number of Generations ( N G ), and/or finding an individual with a fitness value satisfying certain characteristics. In our proposal, as the stopping criterion, we adopt the following conditions: (1) defining a maximum number of generations, N G , as a fixed input parameter of the algorithm; and (2) finding an individual with a fitness value equal to zero, which is a desired (not always possible) optimum.

3.9. The Genetic Algorithm

The explanations above underlie a probabilistic process that can be very complex, with multiple possible solutions. Because of the complexity of the problem, in this work, we adopt the most simple version of a GA described in Algorithm 4.
Algorithm 4 Adopted genetic algorithm (general description).
 1:
t 0
 2:
Initialize P ( 0 ) {as defined in Section 3.2.}
 3:
Evaluate P ( 0 ) {with RCF described in Section 3.3}
 4:
while stopping condition {as defined in Section 3.8} is not reached do
 5: 
t t + 1
 6: 
Select P ( t ) from P ( t 1 ) {with Selection strategy defined in Section 3.4}
 7: 
Apply Crossover and Mutation over P ( t ) to create new individuals P ( t ) {following the procedures described in Section 3.5 and Section 3.6}
 8: 
Evaluate P ( t ) {with RCF}
 9: 
Replace P ( t ) from P ( t ) and P ( t 1 ) {applying description in Section 3.7}
10:
end while

4. Experimental Results

4.1. Evaluation by RCF Optimization

In this section, we analyze the enhancement in robustness allowed by our proposal, according to the RCF. Comparisons with torus automorphism in [11] and Rombaut’s SA [14] are also given. Different strategies where implemented in the Java language (Java 8 Update 91) and executed in an HP Envy 4-1152la computer with an Intel Core i5-3317U 64-bit processor, 8 GB RAM, 128GB SSD and Windows 8.1 PRO as the operating system.
For evaluation purposes, we select a number of different scenarios that represent various possible situations reported in the application field of Wireless Visual Sensor Networks (WVSN) [29,30]. We must note that, even if we restrict the number of scenarios to some particular cases due to the problem’s complexity, the number of scenarios simulated in this paper exceeds most of the related works found in the literature. Eight application scenarios were selected, differing in mask sizes (f matrix) and the number of elements per packet P. For simplicity, we consider a fixed Packet Loss Rate (PLR) of 0.2, based on previous applications, which show that this represents a usual situation in real-world WVSN, such as the work in [8] (note that this simplifies P r o b ( N l o s t = i ) calculation in Equations (A6)–(A8) to one if i corresponds to the 20% of the required amount of packets and zero in any other case). In any case, we must argue that, from experimentation, we observe no significant changes in resulting RCF when varying (even greatly) PLR, for the selected evaluation scenarios.
Note that, as the optimization problem considers mask size and elements per packet as input parameters, not making any specifications about the blocks content, one combination of parameters (and the resulting output) can be applied to many application cases. For example, a mask size of 8 × 8 blocks with a number of elements (blocks) per packet P = 6 may, represent, in the same way, the following application cases:
  • The input image has a 8 × 8 pixel resolution, codified in 8 bpp and divided in blocks of 1 × 1 pixels (by pixels) to be packetized into packets of six bytes of payload (so, six elements per packet),
  • the input image has a 8 × 8 pixel resolution, codified in 4 bpp (so it is compressed) and divided in blocks of 1 × 1 pixels (by pixels) to be packetized into packets of three bytes of payload (so, six elements per packet),
  • The image is 64 × 64 pixels resolution, codified in 1 bpp, divided in blocks of 8 × 8 and packetized into packets of 48 bytes of payload (so, six elements per packet).
The considered scenarios for the evaluation of the packetization mask generation are summarized in Table 1. As usual, each case considers a squared number of blocks, defining masks of N × N elements.
As said, selected parameters are based on related works with application in WVSN. Parameters scenarios were selected considering:
  • Maximum block size according to the JPEG standard ( 8 × 8 )
  • Image sizes according to real-world WVSN resolutions 16 × 16 , 32 × 32 , 64 × 64 and 128 × 128 .
  • Payload packets according to various reported applications, particularly: 27 bytes (as Cyclops camera firmware [31]) and 100 bytes as works in [32,33] related to IEEE 802.15.4 XBee modules [34].
For evaluation purposes, the following parameters were selected for each considered method:
  • For the proposed Genetic Algorithm (GA):
    -
    Number of executions (number of times the algorithm was executed with the same parameters, but different random seeds): 20
    -
    N G = 500
    -
    T p = 150
    -
    P c = 0 . 8
    -
    P m = 0 . 03
    -
    P S = 0 . 2
  • For Rombaut Simulated Annealing (RA):
    -
    Number of executions: 20
    -
    Equilibrium criteria for SA: 500 iterations
    -
    Equilibrium criteria for the Metropolis algorithm: 150 iterations
    -
    T 0 = 1 , 500 , 000
    -
    SA acceptance probability α = 0 . 9 (according to [35,36])
  • For Torus Automorphisms (TA):
    -
    Best parameters k and n (Equation (1)) obtained by exhaustive search for each different scenario (according with methodology in [11]). Identified parameters are presented in Table 2.
Obtained results are in terms of the average Best-obtained RCF (BRCF) from all of the iterations, for the case of GA and RA, and of the Obtained RCF (ORCF) for the case of deterministic cases Without Interleaving (WI; i.e., sequential communication line-by-line) and TA with its best parameters. Each BRCF value is obtained by averaging the best result of each of the 20 executions for the corresponding iteration number (so it represents the average best results of the genetic algorithm at a certain number of iterations, for a given number of executions).
Results for each scenario are shown in Figure 4.
Obtained BRCF values for GA and RA at the considered 500 iterations, for each evaluation scenario, are shown in Table 3. ORCF for the TA and WI cases are also given. Finally, the table also shows the Average RCF (ARCF) for GA and RA, which represents the average of all of the results at the 500th iteration, for each evaluation scenario.
As a general rule, the results summarized in Table 3 (and each of the graphics in Figure 4) show better RCF results of interleaving-based methods in comparison with the non-interleaving case (WI). In terms of the best obtained RCF values, Scenarios 1, 2 and 7 show that the proposed GA presents equivalent or superior results to RA and TA, while only in Scenarios 1 and 2, the average RCF obtained by GA outperforms the other methods. In Scenarios 3, 4, 5 and 8, the best results were reported by RA. Finally, in Scenarios 6 and 7, the obtained results are slightly in favor of TA.
Regarding the performance of the proposed metaheuristic with respect to the deterministic method TA, most of the considered scenarios show the advantage of our GA, but this advantage seems to decrease as the complexity of the problem increases. Indeed, Scenarios 1 to 4 (also 8) present better performance of GA, but, when the amount of possible combinations increases (because of the mask size), TA seems to perform better. The same observation can be done for RA. In this sense, there is still an open question about the number of iterations necessary for botGA and SA, in order to reach solutions as best as possible, or a more suitable stopping criterion. What is clear (and is not said in other works) is that TA, even if effective, is far from ensuring optimal values as observed in Scenarios 3 and 8.
In the matter of the metaheuristic approaches’ comparison, even if the number of generated solutions and iterations was the same for both GA and RA, the RCF values reached for those methods differ. Indeed, only in Scenarios 1, 2 and 7, GA results overtake RA, while in Scenarios 3 to 6 and 8, RA shows the best RCF results. Regarding their behavior, GA does not present abrupt changes over the iterations, while RA presents a temporary big acceleration on the improvement of the calculated RCF around Iteration 150.
From these results, even if GA achieved good RCF values in various cases, better or equal to other methods, in most of the scenarios, the better results were achieved by RA or TA. Even though, it is difficult to evaluate this disadvantage because there are no recipes to assess a difference of one RCF point. Indeed, results are in terms of an absolute value coming from penalty functions, but it results in being hard to estimate which difference is significant. We expect to find a valuable answer by using the generated packetization masks for communicating images through unreliable channels, as commented in the following subsection. Anyway, the first results are encouraging, and future works could enhance these indicators by applying other kinds of operators or (event) computing approaches, such as parallel or distributed computing.
About the execution times, the eventual enhancing of the resulting patterns allowed by using metaheuristics contrasts with their required time of execution. Indeed, the calculation of TA (and other deterministic methods) is performed in a few milliseconds [11]. Actually, TA complexity is low enough to be implemented in very resource-constrained hardware [8]. Simulation times for RA and GA are summarized in Figure 5. Of course, execution times depend on the hardware adopted and the implementation itself. For the executions of the selected scenarios, our implementations of RA and GA spend almost the same time. For example, for a 32 × 32 mask (mask size = 1024), the obtained average execution times are around 250 and 268 minutes for GA and RA, respectively. This is much too complex for being applied in real time or resource-constrained devices, even if enhancements can be allowed by using other kinds of platforms (like parallel or distributed computing), but the real goal of applying metaheuristics for this kind of problem is to provide optimal parameters for off-line analysis and design. In particular, this kind of solution can be valuable for, e.g., providing comparison references to evaluate how “optimal”a packetization mask, obtained by deterministic/fast methods, is, the off-line design of the optimal packetization mask for sensor hardware or interleaver chip designs, etc.

4.2. Image Quality Assessment Results

Results reported in Section 4.1 allow one to observe the behavior of our GA compared with the considered related works RA and TA, in terms of their reached RCF values. From all of the executions, from each of the considered method, we select the best obtained patterns (masks) in order to evaluate the improvement in the quality of images transmitted through unreliable media using simulation framework Sim-LIT 2.0 [37]. Sim-LIT allows analyzing the effects of packet loss in communicated images, providing results in terms of the well-known quality assessment metric PSNR (Peak Signal-to-Noise Ratio). As said above, the considered scenarios are based on WVSN, so we select images in typically adopted resolutions and color depths. For testing purposes, we select:
  • eight different loss rates: 10%, 20%, 30%, 40%, 50%, 60%, 70%, and 80%,
  • 200 different, randomly generated, loss distributions, for each different PLR, and
  • eight different uncompressed (raw) 8 bpp grayscale images.
For testing, and in order to consider different kinds of images, we select classical testing images Baboon, Barbara, Cameraman, F-16, Goldhill, Lena, Peppers and Sailboat, which are depicted in Figure 6.
For estimating the intensities of missing pixels, we adopt the average value of an eight-connected pixel neighborhood, as the error concealment technique.
Finally, the considered parameters defining the simulation scenarios are summarized in Table 4.
Simulation results are presented separately by packetization mask and image. Without loss of generality and due to the enormous quantity of obtained data, we describe only results analysis Scenario A and examples of reconstructed images for Scenario B. We must argue that the rest of the scenarios and executed simulations behave in a similar way. With this, we attempt to provide results to validate the suitability of the selected metric.
Figure 7 presents the average PSNR of reconstructed images, as a function of the loss rate. Each graphed average result corresponds to the 200 resulting images at each different PLR. As seen, in terms of average PSNR, interleaving-based communication using GA, RA and TA indeed achieves better qualities of the reconstructed images than the sequential communication case (WI). However, the obtained quality results do not allow one to observe discernible differences among the selected interleaving schemes, resulting in average PSNR fairly similar for all GA, RA and TA, even if they obtain quite different RCF results. A similar observation can be made by looking at the results in Figure 8, where the highest and lowest resulting PSNR for all of the reconstructed images are presented.
Reconstructed images from Scenario B in Table 5 show the effect of data loss, when applying a packet loss rate of 50%, per each of the adopted images used in the simulations. These results correspond to the highest reached PSNR from the 200 loss distributions (at a 50% PLR) after applying the best GA packetization mask and WI communication. As seen, even if the resulting RCF for the WI and GA cases are distant, the obtained image qualities are similar, as when high PLR occurs, a good packetization in terms of RCF does not ensure good reconstruction of missing information. This is rather a combination of factors, including error concealment and the losses’ nature.
Table 6 shows the Baboon image reconstructed after applying different loss rates (10%, 30%, 50% and 70%), for the WI case and the interleaving-based schemes based on GA, RA and TA according to their best resulting packetization masks (from the 200 distributions), corresponding to Scenario B. As the previous case, even if the resulting RCF are different, PSNR results are fairly similar.
The previous comments are reinforced by Figure 9 and Figure 10, which contrast, for Scenarios A and B, respectively: (a) the best obtained RCF per algorithm; and (b) the best PSNR results. Both cases present results with an applied loss rate of 20%

5. Conclusions

The problem of finding a packetization pattern with genetic algorithms was tackled. This technique allows one to engage the huge amount of possible solutions to the problem, when robustness against packet loss is required. This problem has been treated very little in the literature, but it has enormous application in image communication systems where resource savings are required.
Patterns generated by the proposed GA were evaluated using as the fitness function the cost function defined by Rombaut et al. in [14], which evaluated a resulting packetization mask in accordance with three main properties. The proposed GA, along with the proposed SA by Rombaut et al. and a TA-based interleaver, was tested in different scenarios using parameters from WVSN works. Results in terms of obtained RCF (the selected fitness metric) present significant favor for interleaving methods against simple sequential non-interleaved packetization. Research results show that, however, no determinant conclusion can be made about what implemented interleaving method is best suited, as they present similar results, some in favor of GA and some in favor of the other. Moreover, there is no basis of comparison to determine how much points of RCF represent a significant difference when comparing two different masks. In terms of image quality assessment, research results allow one to show that, even if clear differences can be obtained by RCF, visual observation and PSNR results do not vary much in most of the considered cases. Most of these conclusions are due to the fact that, for the inability to access better computing equipment, we limited our study to cases where the size of the data blocks is high in comparison to the matrix sizes, so the amount of possible combinations is low. In any case, our results put in evidence the need for evaluation metrics that consider these facts, providing useful information about the suitability of packetization patterns as a technique for enhancing robustness in image communication. In this sense, it is expected to prove the statistical representativity of the results, which is no treated in the literature. To be more useful, a proper evaluation function should represent results in terms of image quality, but also, the comparison methodologies must be validated. Other image quality metrics will be considered in future works, such as the structural similarity index (SSIM). Furthermore, new techniques for finding optimal patterns are required; as future work, we expect to study other kinds of a approaches, such as Particle Swarm Optimization (PSO) and the Greedy Randomized Adaptive Search Procedure (GRASP). The proposed GA, even if it does not overcome the other interleaving functions, presents promising results at the level of other related works. Further works will consider the application of parallel computing and other genetic operators. As a final comment, most of these issues are still open, presenting challenging problems to the research community.

Acknowledgments

This works was supported by Conicyt-Chile under Fondecyt Grant No. 11121657 and the University of the Bío-Bío under grants DIUBB 161610 2/R and GI 160210/EF. Furthermore, the authors thank María Angélica Pinninghoff Junemann for her invaluable advice, which allowed improving the quality of the obtained results, and Eric Orellana-Romero for providing useful technical information at the first stages of this work.

Author Contributions

All authors contributed to the development of the paper. Katherine Zapata-Quiñones designed and developed the genetic algorithm operators and performed the simulation. Cristian Duran-Faundez and Vincent Lecuire contributed with the definition and modeling of the general problem, development of TA and Rombaut functions and experiment design. Gilberto Gutiérrez collaborated with ideas and experience on genetic algorithms and contributed to the modeling of the final solution and parameter specification. Christopher Arredondo is the main developer of the SimLIT 2.0 framework and contributed with the programming of experimental results and the obtainment of the image quality results. Hugo Jara Lipán contributed in metaheuristics software design and implementation, incorporating many details that enhanced the quality of the final solution. All authors collaborated with the results analysis and general discussions. All authors contributed to the writing of the manuscript and its revision.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
ARCFAverage RCF (from a set of values)
BRCFBest-obtained RCF (from a set of values)
GAGenetic Algorithm
IVMInversion Mutation
ORCFObtained RCF
PLRPacket Loss Rate
PSNRPeak Signal to Noise Ratio
RARombaut et al.’s Algorithm
RCFRombaut’s Cost Function
SASimulated Annealing
TATorus Automorphisms
TSPTraveling Salesman Problem
WIWithout Interleaving
WVSNWireless Vision Sensor Networks

Appendix A. Calculation of Terms of RCF

According to [14], RCF terms are calculated as follows:
Q 1 ( B ) = 1 P i = 0 P 1 k = 0 # S i B 1 l = 0 l k # S i B 1 C ( d ( s i , k B , s i , l B ) )
Q 2 ( B ) = 1 P ( P 1 ) i = 0 P 1 j = 0 i j P 1 k = 0 # S i B 1 l = 0 # S j B 1 C ( d ( s i , k B , s j , l B ) ) · 1 l = 0 # S j B 1 1 ( d ( s i , k B , s j , l B ) d N ) 2
Q 3 ( B ) = 1 P ( P 1 ) i = 0 P 1 j = 0 i j P 1 n = 1 N C ( d n ) k = 0 # S i B 1 l = 0 # S j B 1 1 ( d ( s i , k B , s j , l B ) = d n ) N n , j
where:
# S i :
is the number of elements in packet S i .
s i , k B :
is the position of the k-th element in the packet i of the partition.
d ( s , t ) :
is the distance between s and t given by:
d ( s , t ) = ( x s x t ) mod M + ( y s y t ) mod N
C ( d ) :
is the cost associated with the distance d. This cost function C ( d ) is directly related to the error concealment technique (the technique that allows estimating the intensities of a lost block by using the correctly received ones). In this work, we adopt as the error concealment technique the average of the eight directly connected (and, of course, correctly received) blocks, so we define C ( d ) as:
C ( d ) = 1 if   d = 1 d = 2 0 otherwise
1 ( e x p r ) :
evaluates expression e x p r . If e x p r is true, it returns 1 (one); otherwise, it returns zero (zero).
d N :
according to the error concealment technique, is the distance by which the more distant element needed to reconstruct a missing block is from that block in the original image. In this case, it is considered N = 3 , d N = 2 .
N n , j :
is the amount of elements that a packet should have.
Factors α , β and γ are calculated as:
α = u = 0 P i P r o b ( N l o s t = i )
β = i = 0 P i ( i 1 ) P r o b ( N l o s t = i )
γ = i = 0 P i ( i 1 ) P r o b ( N l o s t = i )
where P r o b ( N l o s t = i ) is the probability of, according to the considered packet loss model, losing i packets.

References

  1. Costa, D.G.; Guedes, L.A.; Vasques, F.; Portugal, P. Chapter: Multimedia Transmission in Wireless Sensor Networks. In Emerging Research on Networked Multimedia Communication Systems; IGI Publishing: Hershey, PA, USA, 2016; p. 19. [Google Scholar]
  2. Asbun, E.; Delp, E.J. Real-time Error Concealment in Compressed Digital Video Streams. In Proceedings of the Picture Coding Symposium, Portland, OR, USA, 21–23 April 1999. [Google Scholar]
  3. Lecuire, V.; Duran-Faundez, C.; Krommenacker, N. Energy-Efficient Transmission of Wavelet-Based Images in Wireless Sensor Networks. EURASIP J. Image Video Process. 2007, 2007, 47345. [Google Scholar] [CrossRef]
  4. Lecuire, V.; Duran-Faundez, C.; Krommenacker, N. Energy-Efficient Image Transmission in Sensor Networks. Int. J. Sens. Netw. (IJSNet) 2008, 4, 37–47. [Google Scholar] [CrossRef]
  5. Choi, J.Y.; Shin, J. A novel content-aware interleaving for wireless video transmission. Comput. Commun. 2006, 29, 2634–2645, Wirelsess Senson Networks and Wired/Wireless Internet Communications. [Google Scholar] [CrossRef]
  6. DeBrunner, V.; DeBrunner, L.; Wang, L. Recovery of lost blocks by dynamic pixel interleaving. In Proceedings of the 1999 IEEE International Symposium on Circuits and Systems, ISCAS ’99, Orlando, FL, USA, 30 May–2 June 1999; Volume 4, pp. 131–134. [Google Scholar]
  7. Orellana-Romero, E.; SanMartin-Hernandez, J.; Duran-Faundez, C.; Lecuire, V.; Aguilera, C. Sim-LIT: A simulation framework for image quality assessment in wireless visual sensor networks under packet loss conditions. In Proceedings of the International Conference of the Chilean Computer Science Society, Curicó, Chile, 9–11 November 2011. [Google Scholar]
  8. Duran-Faundez, C.; Lecuire, V. Error resilient image communication with chaotic pixel interleaving for wireless camera sensors. In Proceedings of the Workshop on Real-World Wireless Sensor Networks, REALWSN ’08, Glasgow, Scotland, 1 April 2008; ACM: New York, NY, USA, 2008; pp. 21–25. [Google Scholar]
  9. Rombaut, J.; Pižurica, A.; Philips, W. Locally Adaptive Passive Error Concealment for Wavelet Coded Images. IEEE Signal Process. Soc. 2008, 15, 178–181. [Google Scholar] [CrossRef]
  10. Raman, A.; Babu, M. A low complexity error concealment scheme for MPEG-4 coded video sequences. In Proceedings of the IEEE Symposium on Multimedia Communications and Signal Processing, Bangalore, India, 22–24 November 2001. [Google Scholar]
  11. Orellana-Romero, E.; SanMartin-Hernandez, J.; Duran-Faundez, C.; Lecuire, V.; Zapata-Quinones, K. Evaluation of Block Interleaving Techniques for Robust Image Communication in Wireless Camera Sensor Networks. In Proceedings of the IEEE Conference on Wireless Sensors (ICWiSe), Subang Jaya, Malaysia, 26–28 October 2014. [Google Scholar]
  12. Pham, C.; Lecuire, V. Building low-cost wireless image sensor networks: From single camera to multi-camera system. In Proceedings of the 9th ACM International Conference on Distributed Smart Cameras International (ICDSC’2015), Seville, Spain, 8–11 September 2015. [Google Scholar]
  13. Pham, C. Low-cost, Low-power and Long-range Image Sensor for Visual Surveillance. In Proceedings of the 2nd Workshop on Experiences in the Design and Implementation of Smart Objects, SmartObjects ’16, New York, NY, USA, 3–7 October 2016; ACM: New York, NY, USA, 2016; pp. 35–40. [Google Scholar]
  14. Rombaut, J.; Pižurica, A.; Philips, W. Optimization of Packetization Masks for Image Coding Based on an Objective Cost Function for Desired Packet Spreading. IEEE Trans. Image Process. 2008, 17, 1849–1863. [Google Scholar] [CrossRef] [PubMed]
  15. Posnak, E.J.; Gallindo, S.P.; Stephens, A.P.; Vin, H.M. Techniques for Resilient Transmission of JPEG Video Streams. In Proceedings of the Multimedia Computing and Networking, San Jose, CA, USA, 14 March 1995; pp. 243–252. [Google Scholar]
  16. El-Bendarya, M.A.M.M.; El-Azmb, A.A.; El-Fishawyb, N.; Al-Hosareyb, F.S.M.; Eltokhya, M.A.R.; El-Samieb, F.E.A.; Kazemianc, H.B. An Efficient Chaotic Interleaver for Image Transmission over IEEE 802.15.4 Zigbee Network. J. Telecommun. Inf. Technol. 2011, 2, 67–73. [Google Scholar]
  17. Duran-Faundez, C.; Lecuire, V.; Lepage, F. Tiny block-size coding for energy-efficient image compression and communication in wireless camera sensor networks. Signal Process. Image Commun. 2011, 26, 466–481. [Google Scholar] [CrossRef]
  18. Turner, C.J.; Peterson, L.L. Image transfer: An end-to-end design. In Proceedings of the Conference Proceedings on Communications Architectures & Protocols, SIGCOMM ’92, Baltimore, MD, USA, 17–20 August 1992; ACM: New York, NY, USA, 1992; pp. 258–268. [Google Scholar]
  19. Pal, T.; Bandyopadhyay, S.; Dasbit, S. Energy-Saving Image Transmission over WMSN Using Block Size Reduction Technique. In Proceedings of the 2015 IEEE International Symposium on Nanoelectronic and Information Systems, Indore, India, 21–23 December 2015; pp. 41–46. [Google Scholar]
  20. Voyatzis, G.; Pitas, I. Digital image watermarking using mixing systems. Comput. Graph. 1998, 22, 405–416. [Google Scholar] [CrossRef]
  21. Chen, T.; Chen, J.; Chen, J. A simple and efficient watermarking technique based on JPEG2000 codec. In Proceedings of the Fifth International Symposium on Multimedia Software Engineering, Taichung, Taiwan, 10–12 December 2003; pp. 80–87. [Google Scholar]
  22. Coello, C.A.C. Introducción a los Algoritmos Genéticos Soluciones Avanzadas, Tecnologías de Información y Estrategias de Negocios. Available online: https://www.researchgate.net/profile/Marcos_Gestal/publication/237812449_Introduccion_a_los_Algoritmos_Geneticos/links/02e7e520a93bdade8f000000.pdf (accessed on 14 April 2017).
  23. Roman, H. Solución de Problemas de Optimización Mediante Algorimos Genéticos Aplicando Cómputo de Alto Rendimiento. Ph.D. Thesis, Instituto Poitécnico Nacional, Mexico City, Mexico, 2011. [Google Scholar]
  24. Kusum Deep, H.M. Combined Mutation Operators of Genetic Algorithm for the Travelling Salesman problem. Int. J. Comb. Optim. Probl. Inform. 2011, 2, 1–23. [Google Scholar]
  25. Larrañaga, P.; Kuijpers, C.M.H.; Murga, R.; Inza, I.; Dizdarevic, S. Genetic Algorithms for the Travelling Saleman Problem: A Review of Representations and Operators. Artif. Intell. Rev. 1999, 13, 129–170. [Google Scholar] [CrossRef]
  26. Carretero, F. Optimización Global con Algoritmos Genéticos. Ph.D. Thesis, Universidad Politècnica de Catalunia, Barcelona, Spain, 2010. [Google Scholar]
  27. Davis, L. Applying Adaptive Algorithms to Epistatic Domains. In Proceedings of the 9th International Joint Conference on Artificial Intelligence—Volume 1, IJCAI’85, Los Angeles, CA, USA, 18–23 August 1985; Morgan Kaufmann Publishers Inc.: San Francisco, CA, USA, 1985; pp. 162–164. [Google Scholar]
  28. Chambers, L. The Practical Handbook of Genetic Algorithms: Applications, Second Edition; Chapman and Hall/CRC: Boca Raton, FL, USA, 2000. [Google Scholar]
  29. Soro, S.; Heinzelman, W. A Survey of Visual Sensor Networks. Adv. Multimed. 2009, 2009, 640386. [Google Scholar] [CrossRef]
  30. Pham, C. Low cost Wireless Image Sensor Networks for visual surveillance and intrusion detection applications. In Proceedings of the IEEE 12th International Conference on Networking, Sensing and Control, Taipei, Taiwan, 9–11 April 2015; pp. 376–381. [Google Scholar]
  31. Center of Embedded Network Sensing. CENS-CVS Repository. Available online: http://www.sitesanalytics.com/site/cvs.cens.ucla.edu (accessed on 14 April 2017).
  32. Jiménez, V.P.G.; Armada, A.G. Field Measurements and Guidelines for the Application of Wireless Sensor Networks to the Environment and Security. Sensors 2009, 9, 10309–10325. [Google Scholar] [CrossRef]
  33. Pham, C. Communication performances of IEEE 802.15.4 wireless sensor motes for data-intensive applications: A comparison of WaspMote, Arduino MEGA, TelosB, MicaZ and iMote2 for image surveillance. J. Netw. Comput. Appl. 2014, 46, 48–59. [Google Scholar] [CrossRef]
  34. Digi. Available online: http://www.digi.com/products/xbee-rf-solutions (accessed on 7 January 2016).
  35. Cerny, V. Thermodynamical Approach to the Traveling Salesman Problem: An Efficient Simulation Algorithm. J. Optim. Theory Appl. 1985, 45, 41–51. [Google Scholar] [CrossRef]
  36. Kirkpatrick, S.; Gelatt, C.D.; Vecchi, M.P. Optimization by Simulated Annealing. Science 1983, 220, 671–680. [Google Scholar] [CrossRef] [PubMed]
  37. Arredondo Flores, C. Desarrollo e Implementación de un Software para el Estudio de Pérdida de Paquetes en la Transmisión de Imágenes Mediante Redes de Transmisión con Pérdidas; Proyecto de Titulo de Ingeniero Civil en Informática, Universidad del Bío-Bío, Departamento de Sistemas de Información: Concepción, Chile, 2015. [Google Scholar]
Figure 1. Basic packetization scheme using block interleaving.
Figure 1. Basic packetization scheme using block interleaving.
Sensors 17 00981 g001
Figure 2. Illustration of the adopted codification scheme to represent a chromosome.
Figure 2. Illustration of the adopted codification scheme to represent a chromosome.
Sensors 17 00981 g002
Figure 3. Example of initial population generation.
Figure 3. Example of initial population generation.
Sensors 17 00981 g003
Figure 4. Average results for GA, SA, TA and WI for each considered scenario. (a) Scenario 1; (b) Scenario 2; (c); Scenario 3; (d) Scenario 4; (e) Scenario 5; (f) Scenario 6; (g) Scenario 7; (h) Scenario 8.
Figure 4. Average results for GA, SA, TA and WI for each considered scenario. (a) Scenario 1; (b) Scenario 2; (c); Scenario 3; (d) Scenario 4; (e) Scenario 5; (f) Scenario 6; (g) Scenario 7; (h) Scenario 8.
Sensors 17 00981 g004
Figure 5. Comparison of the execution times between RA and GA. Pointed lines are fitted curves to the obtained samples.
Figure 5. Comparison of the execution times between RA and GA. Pointed lines are fitted curves to the obtained samples.
Sensors 17 00981 g005
Figure 6. Images adopted for image quality assessment: (a) Baboon, (b) Barbara, (c) Cameraman, (d) F-16, (e) Goldhill, (f) Lena, (g) Peppers and (h) Sailboat.
Figure 6. Images adopted for image quality assessment: (a) Baboon, (b) Barbara, (c) Cameraman, (d) F-16, (e) Goldhill, (f) Lena, (g) Peppers and (h) Sailboat.
Sensors 17 00981 g006
Figure 7. Average PSNR results for Scenario A, per testing image. (a) results for Baboon; (b) results for Barbara; (c) results for Cameraman; (d) results for F-16; (e) results for Goldhill; (f) results for Lena; (g) results for Peppers; (h) results for Sailboat.
Figure 7. Average PSNR results for Scenario A, per testing image. (a) results for Baboon; (b) results for Barbara; (c) results for Cameraman; (d) results for F-16; (e) results for Goldhill; (f) results for Lena; (g) results for Peppers; (h) results for Sailboat.
Sensors 17 00981 g007
Figure 8. Highest and lowest PSNR results for Scenario A, per testing image. (a) results for Baboon; (b) results for Barbara; (c) results for Cameraman; (d) results for F-16; (e) results for Goldhill; (f) results for Lena; (g) results for Peppers; (h) results for Sailboat.
Figure 8. Highest and lowest PSNR results for Scenario A, per testing image. (a) results for Baboon; (b) results for Barbara; (c) results for Cameraman; (d) results for F-16; (e) results for Goldhill; (f) results for Lena; (g) results for Peppers; (h) results for Sailboat.
Sensors 17 00981 g008
Figure 9. Results from Scenario A, at a 20% packet loss. The figure contrasts the (a) best RCF values reached with packetization masks generated by GA and the other applied methods; and (b) the PSNR values reached on the evaluation of image quality for the image Baboon.
Figure 9. Results from Scenario A, at a 20% packet loss. The figure contrasts the (a) best RCF values reached with packetization masks generated by GA and the other applied methods; and (b) the PSNR values reached on the evaluation of image quality for the image Baboon.
Sensors 17 00981 g009
Figure 10. Results from Scenario B, at a 20% packet loss. The figure contrasts (a) the best RCF values reached with packetization masks generated by GA and the other applied methods; and (b) the PSNR values reached on the evaluation of image quality for the image Baboon.
Figure 10. Results from Scenario B, at a 20% packet loss. The figure contrasts (a) the best RCF values reached with packetization masks generated by GA and the other applied methods; and (b) the PSNR values reached on the evaluation of image quality for the image Baboon.
Sensors 17 00981 g010
Table 1. Evaluation scenarios for evaluating packetization mask generation.
Table 1. Evaluation scenarios for evaluating packetization mask generation.
ScenarioMask Size ( N × N )Elements per Packet (P)
18 × 86
28 × 825
316 × 166
416 × 1625
516 × 1627
616 × 16100
732 × 326
832 × 3225
Table 2. Best parameters found for TA for each evaluation scenario.
Table 2. Best parameters found for TA for each evaluation scenario.
Scenariokn
141
231
317
442
5126
613
712
8129
Table 3. RCF results for the test scenario.
Table 3. RCF results for the test scenario.
ScenarioWI ORCFGA BRCFGA ARCFRA BRCFRA ARCFTA ORCF
129.27275.83646.31869.30919.33638.7455
2109.333320.000023.789431.333331.333324.6667
3383.2625227.4618229.1624217.495218.1787295.495
4217.309120.036421.610518.436418.532723.3455
5250.822222.777824.607020.177820.551123.7778
6557.3333141.3333150.0000112.6667117.7333114.0000
72778.25732550.30182550.31392557.09012557.09012550.3018
8898.7805244.3707249.9034206.7951209.8641522.9854
Table 4. Scenarios corresponding to the evaluation based on other parameters.
Table 4. Scenarios corresponding to the evaluation based on other parameters.
ScenarioImage Resolution (pixels)Block Size (bytes)Payload (bytes)Partitions (Elements)Number of Packets to TransmitMask Size
A 16 × 16 1 × 1 272710 16 × 16
B 64 × 64 2 × 2 1002541 32 × 32
Table 5. Obtained images with the highest reached PSNR after simulations with 50% PLR, Scenario B.
Table 5. Obtained images with the highest reached PSNR after simulations with 50% PLR, Scenario B.
OriginalWI Case (RCF = 898.7805)GA-Based Case (RCF = 244.3707)
ImageImage with LossesReconstructed ImageImage with LossesReconstructed Image
Sensors 17 00981 i001 Sensors 17 00981 i002 Sensors 17 00981 i003 Sensors 17 00981 i004 Sensors 17 00981 i005
Baboon PSNR: 21.6493 dB PSNR: 22.2398 dB
Sensors 17 00981 i006 Sensors 17 00981 i007 Sensors 17 00981 i008 Sensors 17 00981 i009 Sensors 17 00981 i010
Barbara PSNR: 20.7704 dB PSNR: 20.9886 dB
Sensors 17 00981 i011 Sensors 17 00981 i012 Sensors 17 00981 i013 Sensors 17 00981 i014 Sensors 17 00981 i015
Cameraman PSNR: 22.1295 dB PSNR: 21.8912 dB
Sensors 17 00981 i016 Sensors 17 00981 i017 Sensors 17 00981 i018 Sensors 17 00981 i019 Sensors 17 00981 i020
F-16 PSNR: 20.4662 dB PSNR: 20.5709 dB
Sensors 17 00981 i021 Sensors 17 00981 i022 Sensors 17 00981 i023 Sensors 17 00981 i024 Sensors 17 00981 i025
Goldhill PSNR: 22.4507 dB PSNR: 23.2100 dB
Sensors 17 00981 i026 Sensors 17 00981 i027 Sensors 17 00981 i028 Sensors 17 00981 i029 Sensors 17 00981 i030
Lena PSNR: 20.9367 dB PSNR: 20.5371 dB
Sensors 17 00981 i031 Sensors 17 00981 i032 Sensors 17 00981 i033 Sensors 17 00981 i034 Sensors 17 00981 i035
Peppers PSNR: 18.1289 dB PSNR: 18.9816 dB
Sensors 17 00981 i036 Sensors 17 00981 i037 Sensors 17 00981 i038 Sensors 17 00981 i039 Sensors 17 00981 i040
Sailboat PSNR: 18.7318 dB PSNR: 19.4676 dB
Table 6. Reconstructed images with best PSNR reached after simulations applying masks from the WI, GA, RA and TA cases, Scenario B.
Table 6. Reconstructed images with best PSNR reached after simulations applying masks from the WI, GA, RA and TA cases, Scenario B.
Loss RateReconstructed Images
WI CaseGA CaseRA CaseTA Case
(RCF = 898.7805)(RCF = 244.3707)(RCF = 206.7951)(RCF = 522.9854)
10% Sensors 17 00981 i041 Sensors 17 00981 i042 Sensors 17 00981 i043 Sensors 17 00981 i044
PSNR: 30.7916 dBPSNR: 31.1916 dBPSNR: 30.9109 dBPSNR: 31.0231 dB
30% Sensors 17 00981 i045 Sensors 17 00981 i046 Sensors 17 00981 i047 Sensors 17 00981 i048
PSNR: 25.2869 dBPSNR: 25.6539 dBPSNR: 25.4085 dBPSNR: 25.7146 dB
50% Sensors 17 00981 i049 Sensors 17 00981 i050 Sensors 17 00981 i051 Sensors 17 00981 i052
PSNR: 21.6493 dBPSNR: 22.2398 dBPSNR: 22.1582 dBPSNR: 22.5291 dB
70% Sensors 17 00981 i053 Sensors 17 00981 i054 Sensors 17 00981 i055 Sensors 17 00981 i056
PSNR: 19.2372 dBPSNR: 19.6966 dBPSNR: 19.6124 dBPSNR: 19.8461 dB

Share and Cite

MDPI and ACS Style

Zapata-Quiñones, K.; Duran-Faundez, C.; Gutiérrez, G.; Lecuire, V.; Arredondo-Flores, C.; Jara-Lipán, H. A Genetic Algorithm for the Generation of Packetization Masks for Robust Image Communication. Sensors 2017, 17, 981. https://doi.org/10.3390/s17050981

AMA Style

Zapata-Quiñones K, Duran-Faundez C, Gutiérrez G, Lecuire V, Arredondo-Flores C, Jara-Lipán H. A Genetic Algorithm for the Generation of Packetization Masks for Robust Image Communication. Sensors. 2017; 17(5):981. https://doi.org/10.3390/s17050981

Chicago/Turabian Style

Zapata-Quiñones, Katherine, Cristian Duran-Faundez, Gilberto Gutiérrez, Vincent Lecuire, Christopher Arredondo-Flores, and Hugo Jara-Lipán. 2017. "A Genetic Algorithm for the Generation of Packetization Masks for Robust Image Communication" Sensors 17, no. 5: 981. https://doi.org/10.3390/s17050981

APA Style

Zapata-Quiñones, K., Duran-Faundez, C., Gutiérrez, G., Lecuire, V., Arredondo-Flores, C., & Jara-Lipán, H. (2017). A Genetic Algorithm for the Generation of Packetization Masks for Robust Image Communication. Sensors, 17(5), 981. https://doi.org/10.3390/s17050981

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop