J. Vis. Commun. Image R. 20 (2009) 351–363
Contents lists available at ScienceDirect
J. Vis. Commun. Image R. journal homepage: www.elsevier.com/locate/jvci
A critical examination of the assumptions used in dynamic allocation J.A. García, Rosa Rodriguez-Sánchez, J. Fdez-Valdivia * Departamento de Ciencias de la Computación e I. A., CITIC-UGR (Research Center on Information and Communications Technology), Universidad de Granada, 18071 Granada, Spain
a r t i c l e
i n f o
Article history: Received 24 September 2008 Accepted 12 March 2009 Available online 24 March 2009 Keywords: Image transmission Multiple quantizers Dynamic allocation Assumptions Bit allocation Knowledge Coder evaluation Compound gain Congestion control
a b s t r a c t In dynamic allocation quantizers are capable of choosing between limited allocation of bits and bit allocation without restriction. The goal of this paper is to perform a comparative analysis of the assumptions used in a transmission system which still has quantizers using restrained bit allocation in the long time and in a transmission system for which all quantizers end up using heavy bit allocation. Then, based on the validity of the assumptions derived, we will be able to predict the performance of each system in a real problem. Ó 2009 Elsevier Inc. All rights reserved.
1. Introduction If we wish that a transmission system can operate in a more efficient fashion, one way is to allow a dynamic allocation of bits to the most needed quantizers. There, quantizers monitor the level of utility of bit allocation across bit rates and, at any point of the transmission, they might decide to switch the behavior between restrained bit allocation and heavy bit allocation. Restrained bit allocation implies limitation, as on quantizer’s freedom of bit allocation; while heavy allocation means bit allocation without restriction. Thus, at any given bit rate, quantizers evaluate the perceived payoff for restrained and heavy allocation and switch to the strategy with the highest benefit. To illustrate this process, Figs. 2 and 3 show plots of the number of quantizers, noted as n1, which choose the strategy of restrained allocation at each transmission time while using the REWIC coder, [1,2], on each test image of the dataset in Fig. 1. As can be seen from these plots, initially all quantizers (n = 16) make use of restrained allocation but in the long transmission time all quantizers end up using heavy bit allocation. We have developed a modified version of the REWIC coder, called as the REWIC with Congestion Control (RCC), which implements a congestion control algorithm described in Ref. [3] (see Appendix A). Figs. 2 and 3 also display plots of the number of quantizers, n1, which * Corresponding author. Fax: +34 58 24 3317. E-mail addresses:
[email protected] (J.A. García),
[email protected] (R. Rodri guez-Sánchez),
[email protected] (J. Fdez-Valdivia). 1047-3203/$ - see front matter Ó 2009 Elsevier Inc. All rights reserved. doi:10.1016/j.jvcir.2009.03.006
choose the strategy of restrained allocation at each transmission time while using the RCC coder on each test image of the dataset in Fig. 1. From these figures, it can be seen that RCC still has quantizers using restrained bit allocation in the long transmission time limit. The goal of this paper is to made a comparison of assumptions behind dynamic allocation in a transmission system like RCC (which still has quantizers using restrained bit allocation in the long time limit) and in a system like REWIC in which all quantizers end up using heavy bit allocation. And based on the validity of assumptions derived we will be able to predict the performance of each transmission system in real applications. Section 2 examines the assumptions behind a transmission system like the REWIC coder in which in the long transmission time all quantizers end up using heavy bit allocation to uncover that (i) the payoffs to each quantizer are independent of what the others are doing; and (ii) there is perfect knowledge in the transmission system. In most circumstances however, perfect knowledge about the state of the transmission is not available, which often results in a degradation of the performance of the transmission system. On the contrary, Section 2 shows that, the assumption of imperfect knowledge may be true for a transmission system like the RCC coder which still has quantizers using restrained bit allocation in the long time limit. In this case, assumptions derived are more realistic, and it probably results in a better performance. Section 3 shows an objective and subjective coder evaluation, in order to investigate the performance of the RCC coder as compared with that of the REWIC coder. The main conclusions of the paper are summarized in Section 4.
352
J.A. García et al. / J. Vis. Commun. Image R. 20 (2009) 351–363
Fig. 1. Image database used in the experiments.
2. Dynamic allocation model We assume that the image can be divided into a finite number n of regions, each of which is represented by a quantizer. Quantizers are capable of choosing between restrained bit allocation and heavy bit allocation. Thus, at any time, quantizers might decide to switch their behavior among restrained and heavy allocation according to the perceived payoff. Transmission times of relevant information are often quite different for various quantizers, so only a fraction of them will consider switching between restrained and heavy bit allocation during a given interval Mt of transmission time, if Mt is small enough. Hence probabilistic dynamics can be used to provide an analytic description of this process at which quantizers may decide to switch their behavior.
Let n1(t) be the number of quantizers following restrained bit allocation at time t; and n2(t) be the number of quantizers using the strategy of heavy bit allocation at this time. Here, we assume that n2(t) = n n1(t). Assuming that the perceived payoff does not change over Mt, the probability p that a quantizer changes from restrained bit allocation to heavy bit allocation in Mt is given by:
p ¼ ð1 qÞ r Mt
ð1Þ
where q is the probability that restrained bit allocation will be perceived by a quantizer to be better than heavy bit allocation; and r is the average rate at which quantizers reevaluate their preferences regarding bit allocation.
353
J.A. García et al. / J. Vis. Commun. Image R. 20 (2009) 351–363
Image #1
Image #2
16
16
n1(t) 14
n1(t) 14
12 10 8 6 4 2 0
12 10 8 6 4 2 0
REWIC RCC 0
transmission time
t
REWIC RCC 0
transmission time
Image #3
t
Image #4
16
16
n1(t) 14
n1(t) 14
12 10 8 6 4 2 0
12 10 8 6 4 2 0
REWIC RCC 0
transmission time
t
REWIC RCC 0
transmission time
Image #5
t
Image #6
16
16
n1(t) 14
n1(t) 14
12 10 8 6 4 2 0
12 10 8 6 4 2 0
REWIC RCC 0
transmission time
t
REWIC RCC 0
transmission time
Image #7
t
Image #8
16
16
n1(t) 14
n1(t) 14
12 10 8 6 4 2 0
12 10 8 6 4 2 0
REWIC RCC 0
transmission time
t
REWIC RCC 0
transmission time
Image #9
t
Image #10
16
16
n1(t) 14
n1(t) 14
12 10 8 6 4 2 0
12 10 8 6 4 2 0
REWIC RCC 0
transmission time
t
REWIC RCC 0
transmission time
t
Fig. 2. Plots of the number of quantizers n1 which choose the strategy of restrained allocation at each transmission time t while using, respectively, the REWIC coder and the RCC coder (images 1–10).
Following Ref. [4], we can derive the law governing the rate, dn1 =dt, where n1 denotes the average number of quantizers following a strategy of restrained bit allocation, as given by:
n1 ¼
n X i¼0
i PC ði; tÞ
ð2Þ
354
J.A. García et al. / J. Vis. Commun. Image R. 20 (2009) 351–363
Image #11
Image #12
16
16
n1(t) 14
n1(t) 14
12 10 8 6 4 2 0
12 10 8 6 4 2 0
REWIC RCC 0
transmission time
t
REWIC RCC 0
transmission time
Image #13
t
Image #14
16
16
n1(t) 14
n1(t) 14
12 10 8 6 4 2 0
12 10 8 6 4 2 0
REWIC RCC 0
transmission time
t
REWIC RCC 0
transmission time
Image #15
t
Image #16
16
16
n1(t) 14
n1(t) 14
12 10 8 6 4 2 0
12 10 8 6 4 2 0
REWIC RCC 0
transmission time
t
REWIC RCC 0
transmission time
Image #17
t
Image #18
16
16
n1(t) 14
n1(t) 14
12 10 8 6 4 2 0
12 10 8 6 4 2 0
REWIC RCC 0
transmission time
t
REWIC RCC 0
transmission time
Image #19
t
Image #20
16
16
n1(t) 14
n1(t) 14
12 10 8 6 4 2 0
12 10 8 6 4 2 0
REWIC RCC 0
transmission time
t
REWIC RCC 0
transmission time
t
Fig. 3. Plots of the number of quantizers n1 which choose the strategy of restrained allocation at each transmission time t while using, respectively, the REWIC coder and the RCC coder (images 11–20).
with PC(i, t) being the probability that i quantizers follow a strategy of restrained allocation at t. The law governing the rate at which quantizers choose a strategy is then given by:
n X dn1 1 dPC i ¼r r dt dt i¼0
where
ð3Þ
355
J.A. García et al. / J. Vis. Commun. Image R. 20 (2009) 351–363
dPC PC ði; t þ MtÞ P C ði; tÞ ¼ lim Mt!0 Mt dt
ð4Þ
Following Appendix B, we have that
PC ði; t þ MtÞ PC ði; tÞ ¼ PC ði; tÞ½ið1 qÞ ðn iÞq rMt þ PC ði þ 1; tÞði þ 1Þð1 qiþ1 Þ þ PC ði 1; tÞðn i þ 1Þqi1
ð5Þ
up to terms of order Mt. C ði;tÞ In the limit of Mt ? 0, we have that PC ði;tþMtÞP becomes 1r dPdtC rMt and the corrections of order Mt vanish; therefore, from Eqs. (4) and (5), it follows that n n X X 1 dP C i iP C ði; tÞ½ið1 qÞ ðn iÞq ¼ r dt i¼0 i¼0
þ þ ¼
n X i¼0 n X
ði 1ÞPC ði; tÞ½ið1 qÞ
n X
i¼0
i¼0
PC ði; tÞ½ið1 qÞ þ
¼n
n X i¼0
qP C ði; tÞ
n X
2.1.2. (Case 1.2) Imperfect knowledge In most circumstances however decisions on what information will be transmitted first should often be made with incomplete knowledge of which strategy is best. In this case, to be congruent with the reality the assumptions behind a transmission system should be modified as follows: (i) the payoffs to each quantizer may still be independent of what the others are doing, but (ii) there exists imperfect knowledge in the transmission system, and the perceived payoff will be an inaccurate version of the actual payoff. Following [4], imperfect knowledge is modeled by assuming that the perceived payoff is normally distributed around the actual payoff Bi. That is, the probability for the perceived payoff for strategy i to be x is given by:
1 f ðx; Bi ; r2 Þ ¼ pffiffiffiffiffiffiffi expfðx Bi Þ2 =2r2 g r 2p
ði þ 1ÞPC ði; tÞ½ðn iÞq
i¼0 n X
all quantizers end up using heavy bit allocation. It corresponds to the behavior of the REWIC coder in Figs. 2 and 3.
with variance r2 and mean Bi. In a transmission system which has imperfect knowledge, r is larger than zero. From Eq. (10) we have that the probability that restrained allocation is perceived to be better that heavy allocation is given by
PC ði; tÞ½ðn iÞq
iPC ði; tÞ ¼ nq n1
ð6Þ
i¼0
q¼
Z
where q ¼ i¼0 q P C ði; tÞ. Thus, following Eqs. (3) and (6), we have that
ð7Þ
2.1. (Case 1) Payoffs to each quantizer are independent of what the others are doing At different bit rates quantizers evaluate the perceived payoff for restrained and heavy allocation and switch to the strategy with the highest benefit. Let Bi be the payoff function accrued by each quantizer using strategy i, with i = 1, 2. 2.1.1. (Case 1.1) Perfect knowledge We first consider the case in which the underlying assumptions are: (i) the payoffs Bi to each quantizer are independent of what the others are doing; and (ii) there is perfect knowledge in the transmission system, and thus the perceived payoff for each strategy (restrained or heavy bit allocation) will be an accurate version of the actual payoff. Specifically suppose that payoff B1 accrued by each quantizer using the strategy of restrained bit allocation is smaller than payoff B2 using a strategy of heavy bit allocation: B1 < B2. Then, since there is perfect knowledge we have that the probability that restrained allocation is perceived to be better that heavy allocation is zero. In this case, it follows that Eq. (7) becomes
ð8Þ
whose solution is
n1 ðtÞ ¼ n1 ð0Þert
dxf ðx; B1 ; r2 Þ
Z
x
dyf ðy; B2 ; r2 Þ
ð11Þ
1
which can be evaluated to be
Using the law given in Eq. (7), in the following we can made an examination of the basic assumptions behind dynamic allocation in a transmission system. It shall lead to a prediction of the performance of a transmission system in real applications.
dn1 ¼ rn1 dt
1
1
Pn
dn1 ¼ rðnq n1 Þ: dt
ð10Þ
ð9Þ
From Eq. (9), we have that, although initially all quantizers make use of restrained allocation, n1(0) = n, in the long transmission time
1 2
q ¼ 1 þ erf
B1 B2 pffiffiffi r 2
ð12Þ
with
2 erfðzÞ ¼ pffiffiffiffi
p
Z
z
2
et dt:
ð13Þ
0
Thus it follows that when error (r > 0) is small we have that q close to zero, given that B1 < B2 as above. For a transmission system which has extreme uncertainty about which strategy is most suitable, r becomes very large in Eq. (12). In this case q goes to 1/2 and will vary almost linearly with B1 B2 and the dynamical behavior of n1 ðtÞ generated by Eq. (7) can be evaluated as:
dn1 ¼ rðnq n1 Þ dt
ð14Þ
whose solution is
n1 ðtÞ ¼ nq ðnq n1 ð0ÞÞert
ð15Þ
From Eq. (15), it can be seen that, unlike the previous case of perfect knowledge, the transmission system still has quantizers using restrained bit allocation in the long transmission time limit, since n1 ðtÞ ¼ nq for long times. 2.2. (Case 2) Payoffs depend on how many quantizers are using that particular strategy Finally, we come to examine the last case in which the underlying assumptions are: (i) the payoffs Bi to each quantizer will depend on how many quantizers are using that particular strategy; and (ii) there is either perfect or imperfect knowledge in the transmission system. Then, we have that Bi will be a positive function of ni(t), and monotonically decreasing with the number of quantizers using strategy i as follows. Let R be the total capacity of bit resources available for the transmission problem at hand, and let di be the amount by which the utility of strategy i decreases as each additional quantizer
356
J.A. García et al. / J. Vis. Commun. Image R. 20 (2009) 351–363
chooses to use it for further transmission. The payoff function Bi accrued by each quantizer using strategy i is then defined by:
Bi ðtÞ ¼ R ni ðtÞ di
ð16Þ
with i = 1,2; and where 0 < d1 < d2, since d2 corresponds to the payoff decrement as one more quantizer chooses the strategy of heavy bit allocation, where as d1 corresponds to that of the strategy of restrained bit allocation. Using the law given in Eq. (7) we can now analyze the behavior of a transmission system at which quantizers choose between restrained and heavy allocation with either perfect or imperfect knowledge. Recall that decisions on what information will be transmitted first should often be made with incomplete knowledge of which strategy is best. From Eq. (12) we have that the probability that restrained allocation is perceived to be better that heavy allocation is given by
1 n d n d q ¼ 1 þ erf 2 2 pffiffiffi 1 1 : 2 r 2
ð17Þ
To evaluate the behavior of the dynamical equation, dn1 ¼ rðnq n1 Þ, governing the rate at which quantizers choose bedt tween restrained and heavy allocation in a transmission system, firstly we need to compute the average function P q ¼ ni¼0 q PC ði; tÞ, where q is given by Eq. (17). Since this evaluation is nontrivial, we will use the mean field approximation which consists in writing the average of a function as a function of the average, [5]. The main idea of the application of the mean field theory (MFT) in our problem is to focus on one quantizer and assume that the most important contribution to the interactions of such quantizer with its neighboring quantizers is determined by the mean field due to the neighboring quantizers. In this mean field approximation we have that
1 2
q ¼ 1 þ erf
n2 d2 n1 d1 pffiffiffi r 2
ð19Þ
since q close to one, whose solution is (with n1(0) being the number of quantizers that are initially using a strategy of restrained bit allocation)
ð20Þ
until it reaches the equilibrium point n1 ðtÞ ¼ nd2 =ðd1 þ d2 Þ, after which the solution is
n1 ðtÞ ¼ nd2 =ðd1 þ d2 Þ
ð21Þ
For n2 d2 < n1 d1 , or equivalently n1 > nd2 =ðd1 þ d2 Þ, Eq. (7) becomes (since q close to zero)
dn1 ¼ rn1 dt
ð22Þ
whose solution is
n1 ðtÞ ¼ n1 ð0Þert
2.2.2. (Case 2.2) Imperfect knowledge For a transmission system which has extreme uncertainty about which strategy is most suitable, r becomes very large in Eq. (18). In this case q goes to 1/2 and the dynamical behavior of n1 ðtÞ generated by Eq. (7) can be evaluated as:
dn1 ¼ rðn=2 n1 Þ dt
ð24Þ
whose solution is
n1 ðtÞ ¼ n=2 ðn=2 n1 ð0ÞÞert
ð25Þ
Thus in a system with extreme uncertainty about which strategy is most suitable (r very large) we have that the asymptotic number of quantizers (never achieved) which choose restrained bit allocation is n1 = n/2. For cases where the amount of uncertainty about which strategy is most suitable is intermediate between the two previous extreme values of error (r = 0 and r very large), the behavior of n1 ðtÞ exhibits exponential relaxation toward an asymptotic value (which is never achieved) between n1 = nd2/ (d1 + d2) and n1 = n/2. Again, the transmission system still has quantizers using restrained bit allocation in the long transmission time limit. 3. Experimental results
For n2 d2 > n1 d1 , or equivalently n1 < nd2 =ðd1 þ d2 Þ, Eq. (7) becomes
n1 ðtÞ ¼ n ðn n1 ð0ÞÞert
Thus, for a transmission system which has perfect knowledge (r = 0 in Eq. (18)), the behavior of n1 ðtÞ exhibits exponential relaxation n1 ð0Þert toward the fixed point n1 = nd2/(d1 + d2). Hence, the transmission system still has quantizers using restrained bit allocation in the long transmission time limit.
ð18Þ
2.2.1. (Case 2.1) Perfect knowledge For a transmission system which has perfect knowledge (r = 0), Eq. (18) resembles a step function: q close to one when n2 d2 > n1 d1 1 and close to zero when n2 d2 < n1 d1 . Thus dn ¼ rðnq n1 Þ becomes dt piecewise linear and the dynamical behavior of n1 ðtÞ generated by this equation can be evaluated as follows:
dn1 ¼ rðn n1 Þ dt
until it reaches n1 ðtÞ ¼ nd2 =ðd1 þ d2 Þ, after which it stays at this fixed value.
ð23Þ
In the following, we present an objective and subjective evaluation of the REWIC coder and the RCC coder in order to investigate their comparative performance. 3.1. Objective coder evaluation Tests here reported were performed on a dataset composed of twenty 512 512 grayscale test images shown in Fig. 1. For example, test image #1 is composed of four different subimages: noiselike texture, houses, text, and graphics. In this first experiment, we perform a thorough comparison of SPIHT [6], REWIC [1,2], and the RCC coder (Appendix A), by means of the CG-rate curves following Refs. [8,7]. Thus, the compound gain CG is applied to quantify the visual distinctness by means of the difference between the original image and the images reconstructed under various degrees of lossy compression. It allows us to analyze the behavior of SPIHT, REWIC, and RCC across bit rates; with the best coder in the CG sense achieving the lowest value of the compound gain CG at most bit rates. Figs. 4 and 5 show the CG-rate curves on the twenty test images given in Fig. 1. The compression ratio ranges from 20:1 to 120:1. From these plots we have that, at most bit rates, RCC decoded outputs achieve a better objective quality than both REWIC and SPIHT outputs for fifteen test images (75%): test image #1,#3, #4, #5, #6, #7, #10, #11, #13, #15, #16, #17, #18, #19, and #20. It means that the RCC coder (which still has quantizers using restrained bit allocation in the long transmission time limit) is the overall winner in this objective coder evaluation using CG-rate curves, as it was predicted by the comparison of assumptions behind dynamic allocation. Next we perform another experiment
357
J.A. García et al. / J. Vis. Commun. Image R. 20 (2009) 351–363
Image #1
Image #2
4
2⋅10 CG 2⋅104 2⋅104 2⋅104 1⋅104 4 1⋅10 1⋅104 8⋅103 6⋅103 4⋅103 20:1
5⋅10
4
CG 5⋅104 4⋅104 4⋅10
4
3⋅104 2⋅104 2⋅104
RCC SPIHT REWIC 40:1
60:1
80:1
100:1
RCC SPIHT REWIC
2⋅104 1⋅10
120:1
4
20:1
40:1
60:1
Compression Ratio
4⋅10
CG
3
4
3⋅104
4⋅103
2⋅10
4
4⋅10
3
2⋅10
4
4⋅10
3
4
3
2⋅10
3⋅10 2⋅10
3
2⋅10
3
20:1
RCC SPIHT REWIC 40:1
60:1
80:1
100:1
RCC SPIHT REWIC
1⋅104 5⋅10
120:1
3
20:1
40:1
60:1
Compression Ratio
CG
1⋅10
4
8⋅10
3
6⋅10
3
4⋅10
3
2⋅10
3
20:1
RCC SPIHT REWIC 40:1
60:1
80:1
100:1
120:1
1⋅10 CG 1⋅104 4 1⋅10 4 1⋅10 3 9⋅10 3 8⋅10 7⋅103 3 6⋅10 3 5⋅10 4⋅103 3 3⋅10 20:1
RCC SPIHT REWIC 40:1
60:1
Compression Ratio
2⋅10
CG
4⋅10
4
3⋅10
2⋅10
4
1⋅104 1⋅104
RCC SPIHT REWIC 40:1
60:1
80:1
100:1
120:1
1⋅10
4
8⋅10
3
6⋅10
3
4⋅10
3
20:1
RCC SPIHT REWIC 40:1
60:1
3⋅10
4
4
2⋅10
4
2⋅10
4
2⋅10
4
2⋅10
4
2⋅10
4
CG
RCC SPIHT REWIC
4
20:1
40:1
60:1
80:1
100:1
120:1
Image #10 4
2⋅104
80:1
Compression Ratio
4⋅10
1⋅10
120:1
CG 2⋅104
Image #9 4
100:1
Image #8
4
Compression Ratio
4⋅10
80:1
Compression Ratio
Image #7
4
2⋅10 CG 1⋅104 1⋅104 1⋅104 4 1⋅10 1⋅104 9⋅103 8⋅103 3 7⋅10 3 6⋅10 3 5⋅10 20:1
120:1
4
1⋅104 4
100:1
Image #6
4
1⋅10
80:1
Compression Ratio
Image #5 2⋅10
120:1
Image #4
3
CG 5⋅103 5⋅10
100:1
Compression Ratio
Image #3 6⋅10
80:1
100:1
RCC SPIHT REWIC
1⋅104 120:1
Compression Ratio
5⋅10
3
20:1
40:1
60:1
80:1
100:1
120:1
Compression Ratio
Fig. 4. CG-rate curves on the 1–10 test images given in Fig. 1. The compression ratio ranges from 20:1 to 120:1.
358
J.A. García et al. / J. Vis. Commun. Image R. 20 (2009) 351–363
Image #11 CG
1⋅10
4
1⋅10
4
1⋅10
4
Image #12 5⋅10
4
CG 4⋅104 4⋅10
4
3⋅10
4
1⋅10
4
2⋅10
4
2⋅10
4
9⋅10
3
RCC SPIHT REWIC
8⋅103 7⋅103 20:1
2⋅104
40:1
60:1
80:1
100:1
1⋅10
5⋅103 20:1
120:1
RCC SPIHT REWIC
4
40:1
60:1
Compression Ratio
Image #13 CG
4
1⋅104 1⋅10
4
8⋅10
3
6⋅103 RCC SPIHT REWIC 40:1
60:1
80:1
100:1
RCC SPIHT REWIC
4⋅103 2⋅10
120:1
3
20:1
40:1
60:1
4
2⋅104 2⋅104 RCC SPIHT REWIC
4
5⋅103 20:1
40:1
60:1
80:1
100:1
120:1
2⋅104 CG 2⋅104 2⋅104 4 2⋅10 4 2⋅10 1⋅104 1⋅104 1⋅104 8⋅103 6⋅103 20:1
40:1
60:1
4
5⋅10
4
4⋅104 4
2⋅10
4
2⋅104 20:1
RCC SPIHT REWIC 40:1
60:1
80:1
100:1
120:1
1⋅104 CG 1⋅104 1⋅104 9⋅103 8⋅103 7⋅103 6⋅103 5⋅103 4⋅103 3⋅103 2⋅103 20:1
40:1
60:1
Image #19 4
3⋅10
4
100:1
120:1
Image #20 3⋅104
CG 2⋅10
4
2⋅104
2⋅104
2⋅104
2⋅104
2⋅104
1⋅104
RCC SPIHT REWIC
1⋅104 5⋅103 20:1
80:1
Compression Ratio
4⋅104 4⋅10
120:1
RCC SPIHT REWIC
Compression Ratio
CG
100:1
Image #18
4⋅104
3⋅10
80:1
Compression Ratio
Image #17 6⋅104 5⋅10
120:1
RCC SPIHT REWIC
Compression Ratio
CG
100:1
Image #16
3⋅104
1⋅10
80:1
Compression Ratio
Image #15 4⋅104
2⋅10
120:1
Image #14 1⋅10
Compression Ratio
CG
100:1
Compression Ratio
4
1⋅10 CG 1⋅104 1⋅104 3 9⋅10 8⋅103 3 7⋅10 3 6⋅10 3 5⋅10 3 4⋅10 3⋅103 3 2⋅10 20:1
80:1
40:1
60:1
80:1
100:1
120:1
Compression Ratio
5⋅103 20:1
RCC SPIHT REWIC 40:1
60:1
80:1
100:1
120:1
Compression Ratio
Fig. 5. CG-rate curves on the 11–20 test images given in Fig. 1. The compression ratio ranges from 20:1 to 120:1.
J.A. García et al. / J. Vis. Commun. Image R. 20 (2009) 351–363
359
where rank orders by human observers predict visual fidelity using the compression methods under analysis. 3.2. Subjective coder evaluation This second experiment was designed to compare the subjective quality of decoded outputs using the three compression methods on seven test images: #2, #6, #12, #15, #16, #18, and #20. Figs. 6–12 show the respective decoded outputs which were used in this subjective evaluation. These figures illustrate the comparative performance of SPIHT, REWIC, and RCC. It can be seen that, in general, SPIHT reconstructions exhibit bad visual fidelity since
Fig. 7. Visual comparison in performance for image #6 at 0.08 bpp in order to illustrate the subjective quality of the SPIHT, REWIC, and RCC coders.
Fig. 6. Visual comparison in performance for image #2 at 0.08 bpp in order to illustrate the subjective quality of the SPIHT, REWIC, and RCC coders.
noise data was incorrectly prioritized before significant visual information from various areas. The RCC outputs are fair since essential details are clearly detected in the relevant sections of the picture. The visual quality of REWIC outputs is intermediate between that of SPIHT and that of RCC. Ten volunteers subjectively evaluated the reconstructed images using an ITU-R Recommendation 500-10 [9]. The ITU-R 500-10 recommends to classify the test pictures into five different quality groups: 5 = excellent, the distortions are imperceptible; 4 = good, the distortions are perceptible, but not annoying; 3 = fair, the distortions are slightly annoying; 2 = poor, the distortions are annoying; 1 = bad, the distortions are very annoying.
360
J.A. García et al. / J. Vis. Commun. Image R. 20 (2009) 351–363
Fig. 8. Visual comparison in performance for image #12 at 0.16 bpp in order to illustrate the subjective quality of the SPIHT, REWIC, and RCC coders.
The method of assessment was cyclic in that the assessor was first presented with the original picture, then with the same picture but decoded at a bit rate. For each original test image, the assessor was presented with a series of pictures decoded using SPIHT, RCC, and REWIC (at the same bit rate) in random order to be assessed. Following this she/he was asked to rank order the three decoded outputs, keeping the original in mind. Table 1 summarizes the subjective rankings for each test image: the first, second, and third position in the rank orders given by each observer. Table 2 gives the total number of first, second and third positions in the subjective rank orders. As can be seen from these tables, subjective rankings by human observers predict that RCC decoded outputs exhibit a better visual fidelity than SPIHT and
Fig. 9. Visual comparison in performance for image #15 at 0.157 bpp in order to illustrate the subjective quality of the SPIHT, REWIC, and RCC coders.
REWIC reconstructions: the number of first positions in the rank orders is of 47 for RCC, whereas the number of first positions is of 17 for REWIC, and 6 for SPIHT. 4. Conclusions 1 ¼ rðnq n1 Þ, governs the rate at The dynamical equation, dn dt which quantizers choose between restrained and heavy bit allocation in a transmission system with n quantizers; where r is the average rate at which quantizers reevaluate their preferences regarding bit allocation, and q is the probability that restrained bit allocation will be perceived by a quantizer to be better than
J.A. García et al. / J. Vis. Commun. Image R. 20 (2009) 351–363
361
Fig. 10. Subjective comparison of decoded outcomes at 0.089 bpp in Image #16 using SPIHT, REWIC, and RCC coders.
Fig. 11. Subjective comparison of decoded outcomes at 0.2 bpp in Image #18 using SPIHT, REWIC, and RCC coders.
heavy bit allocation. Using this law we have examined the assumptions behind a transmission system in which quantizers are capable of choosing between restrained bit allocation and heavy bit allocation. A basic assumption of a transmission system for which in the long transmission time all quantizers end up using heavy bit allocation is that there exists perfect knowledge and thus the perceived payoff for each strategy (either restrained or heavy bit allocation) is an accurate version of the actual payoff. On the contrary, the assumption of imperfect knowledge may be true for a transmission system which still has quantizers using restrained bit allocation in the long time limit.
In most real applications, perfect knowledge about the state of the transmission is not available, therefore decisions on what information will be transmitted first should often be made with incomplete knowledge of which strategy is best. Then, based on the validity of the assumptions derived, we can now predict the performance of the transmission system in a real problem: the assumption of imperfect knowledge for a system which still has quantizers using restrained allocation in the long limit is more realistic, which probably results in a better performance than in the case of a system for which all quantizers end up using heavy allocation, whose assumption of perfect knowledge will often be incorrect.
362
J.A. García et al. / J. Vis. Commun. Image R. 20 (2009) 351–363 Table 1 Subjective rankings for each test image: the first, second, and third position in the rank orders given by each human observer. Decoded outputs
Coder
Rank order given by 10 observers #1
#2
#3
#4
#5
#6
#7
#8
#9
#10
Image #2 at 0.08 bpp
SPIHT RCC REWIC
3 1 2
3 2 1
3 2 1
3 1 2
3 1 2
3 2 1
3 1 2
3 1 2
3 1 2
3 2 1
Image #6 at 0.08 bpp
SPIHT RCC REWIC
3 1 2
3 2 1
3 1 2
3 1 2
3 2 1
3 2 1
3 1 2
3 1 2
3 2 1
3 1 2
Image #12 at 0.16 bpp
SPIHT RCC REWIC
1 2 3
3 1 2
3 1 2
3 2 1
1 2 3
3 1 2
1 2 3
3 2 1
1 2 3
3 1 2
Image #15 at 0.1568 bpp
SPIHT RCC REWIC
3 1 2
3 2 1
2 1 3
3 1 2
3 1 2
3 2 1
3 1 2
3 2 1
3 1 2
3 1 2
Image #16 at 0.0889 bpp
SPIHT RCC REWIC
3 1 2
3 1 2
3 1 2
3 2 1
3 1 2
3 1 2
3 2 1
3 1 2
1 2 3
2 1 3
Image #18 at 0.2 bpp
SPIHT RCC REWIC
3 1 2
3 1 2
3 2 1
3 1 2
1 2 3
3 1 2
3 1 2
3 2 1
3 1 2
3 1 2
Image #20 at 0.1333 bpp
SPIHT RCC REWIC
3 1 2
3 1 2
3 1 2
3 1 2
3 1 2
3 1 2
3 1 2
3 1 2
3 1 2
3 1 2
Table 2 Total number of first, second, and third positions in the subjective rank orders given by human observers. Coder
SPIHT RCC REWIC
Ranking given by human observers # First positions
# Second positions
# Third positions
6 47 17
2 23 45
62 0 8
Appendix A. Congestion control algorithm
Fig. 12. Subjective comparison of decoded outcomes at 0.133 bpp in Image #20 using SPIHT, REWIC, and RCC coders.
Experimental results have demonstrated the validity of this prediction of superior performance of the RCC coder which still has quantizers using restrained bit allocation in the long time, as compared with the REWIC coder in which all quantizers end up using heavy bit allocation.
Acknowledgments This research was sponsored by the Spanish Board for Science and Technology (CICYT) under Grant TEC2007-60450. We are deeply indebted to the referees for suggesting several good ways to improve the quality of the initial manuscript.
In dynamic allocation, quantizers monitor the level of utility of bit allocation across bit rates and, at any point of the transmission, they can decide to switch the behavior between restrained bit allocation and heavy bit allocation. The problem is that, without central control, all quantizers might switch from restrained to heavy allocation at higher bit rates, leading to a congestion of the transmission, if total demand for bit allocation exceeds the available capacity. Following Ref. [3], here we give a brief description of the congestion control algorithm which is based on the behavior of the 1 ¼ rðnq n1 Þ. In this algorithm we have to dynamical equation, dn dt distinguish the basic transmission model and the congestion avoidance. The basic transmission model assumed follows a rational embedded zerotree encoding, [1]. Thus, in a first stage, a wavelet transform is applied to the original data. The second stage of the coding scheme is composed of two key elements: (i) quantizer formation where coefficients of the wavelet transform are partitioned into a number of quantizers; and (ii) a prioritization protocol which is used to choose among competitor quantizers, at each truncation time in the progressive transmission, in order to deliver a subsequence of the completely embedded bit stream of the selected quantizer. In a third stage, adaptive arithmetic encoding exploits both inter-band and intra-band relationships that still remain after the wavelet transformation and zerotree encoding.
363
J.A. García et al. / J. Vis. Commun. Image R. 20 (2009) 351–363
We can now show the application of congestion control to this basic transmission model as follows: the maximum number of quantizers which can choose heavy bit allocation is n2 = n nd2/ (d1 + d2); with d1 being the restrained allocation limit, d2 being the heavy allocation limit, and n being the total number of quantizers. For each quantizer Qi we select the bit stream BSti , candidate to be transmitted at time t, by using a window size WS to segment data when the quantizer is coded bit-plane by bit-plane through successive-approximation quantization. Amongst all candidates BSti , we choose a bit stream BStm achieving the highest expected increase in utility per coding bit, at time t. Initially all quantizers are using the strategy of restrained allocation, and thus the number of quantizers using the strategy of heavy bit allocation at t = 0 is given by n2 = 0. The congestion avoidance is used when the number of bits of BStm , noted as #ðBStm Þ, is greater than the restrained allocation limit d1: #ðBStm Þ > d1 . In this case, if #ðBStm Þ 6 d2 and n2 < n nd2/ (d1 + d2), then BStm may still be sent to the decoder and the number of quantizers n2 which choose heavy allocation is increased by one. But if #ðBStm Þ > d2 or n2 P n nd2/(d1 + d2), then the window size WS to segment data is divided by 2 and we recalculate (using this new window size) the bit stream BSti candidate to be transmitted for each quantizer Qi. The software and documentation can be accessed in: http://decsai.ugr.es/cvg/rewic_revic/ Appendix B. Derivation of probabilities We have that the probability P1(x; n1) for x quantizers to change from restrained bit allocation to heavy bit allocation, given that there are initially n1 quantizers using the strategy of restrained allocation, is defined by:
P1 ðx; n1 Þ ¼
n1 x p ð1 pÞn1 x x
ð26Þ
with p, as given in Eq. (1), being the probability that a quantizer currently engaged in restrained bit allocation changes to heavy bit allocation. Similarly, we can define the probability P2(y; n2) for y quantizers to change from heavy to restrained allocation, given there are initially n2 quantizers that follow the strategy of heavy allocation, using the probability q that a quantizer changes from heavy to restrained allocation in Mt:
P2 ðy; n2 Þ ¼
n2 y
qy ð1 qÞn2 y
ð27Þ
where q = q r Mt. In order to derive PC(i, t + Mt), recall that for sufficiently small Mt interval, most quantizers will not be making a choice about to switch between strategies and thus there are only three possible values for the net change from heavy to restrained allocation (with a net change being the difference between the number that go from heavy to restrained allocation and those doing the opposite): 0, 1, and 1. Here a net change from heavy to restrained allocation of size 1 is given by y = 1 quantizers that change from heavy to re-
strained allocation. A net change from heavy to restrained allocation of size-1 is given by x = 1 quantizers that change from restrained to heavy allocation. It follows that
PC ði; t þ MtÞ ¼ PC ði; tÞ½1 P1 ðx ¼ 1; iÞ P 2 ðy ¼ 1; n iÞ þ P C ði þ 1; tÞP1 ðx ¼ 1; i þ 1Þ þ PC ði 1; tÞP2 ðy ¼ 1; n i þ 1Þ
ð28Þ
where 1 P1(x = 1; i) P2(y = 1; n i) is the probability that during Mt there is a net change of 0 from heavy to restrained allocation, given that there are initially i quantizers using a strategy of restrained bit allocation; with P1(x = 1; i + 1) being the probability that during Mt there is a net change of 1 from heavy to restrained allocation, given that there are initially i + 1 quantizers using a strategy of restrained bit allocation; and P2(y = 1;n i + 1) being the probability that during Mt there is a net change of 1 from heavy to restrained bit allocation, given that there are initially i 1 quantizers using a strategy of restrained allocation. From Eqs. (26) and (27), we have that Eq. (28) becomes, up to terms of order Mt:
PC ði; t þ MtÞ ¼ PC ði; tÞ½1 ið1 qÞrMt ðn iÞqrMt þ PC ði þ 1; tÞði þ 1Þð1 qiþ1 ÞrMt þ PC ði 1; tÞðn i þ 1Þqi1 rMt
ð29Þ
with qi+1 and qi1 being the probability q evaluated at i + 1 and i 1, respectively. From Eq. (29), it follows that:
PC ði; t þ MtÞ PC ði; tÞ ¼ P C ði; tÞ½ið1 qÞ ðn iÞq rMt þ P C ði þ 1; tÞði þ 1Þð1 qiþ1 Þ þ P C ði 1; tÞðn i þ 1Þqi1 up to terms of order Mt. References [1] J.A. Garcia, Rosa Rodriguez-Sanchez, J. Fdez-Valdivia, Xose R. Fdez-Vidal, Rational systems exhibit moderate risk aversion with respect to gambles on variable-resolution compression, Optical Engineering 41 (9) (2002) 2216–2237. [2] J.A. Garcia, Rosa Rodriguez-Sanchez, J. Fdez-Valdivia, An embedded coder providing better image quality at very low bit rates, Optical Engineering 43 (3) (2004) 615–627. [3] J.A. Garcia, Rosa Rodriguez-Sanchez, J. Fdez-Valdivia, Congestion Control in Dynamic Allocation. DECSAI Technical Report, University of Granada, Spain, 2008. [4] Bernardo A. Huberman, Tad Hogg, The behaviour of computational ecologies, in: B.A. Huberman (Ed.), The Ecology of Computation, Elsevier Science Publishers B.V., 1988, pp. 77–115. [5] G. Parisi, Statistical Field Theory, Westview Press, 1998. [6] A. Said, W.A. Pearlman, A new fast and efficient image codec based on set partitioning in hierarchical trees, IEEE Transactions on Circuit and System for Video Technology 6 (3) (1996) 243–250. [7] J.A. Garcia, R. Rodriguez-Sanchez, J. Fdez-Valdivia, Progressive Image Transmission: The Role of Rationality, Cooperation and Justice, SPIE Press, PM-140, Bellingham, Washington, USA, 2004, p. 230. [8] J.A. Garcia, J. Fdez-Valdivia, Xose R. Fdez-Vidal, Rosa Rodriguez-Sanchez, Information theoretic measure for visual target distinctness, IEEE Transactions on Pattern Analysis and Machine Intelligence 23 (4) (2001) 362–383. [9] ITU-R Recommendations, Broadcasting service (television): Recommendation 500-10, Supplement 3 to vol. 1997, BT Series, 2000 Edition.