Performance vs. complexity in scalable video coding for embedded surveillance applications

M.J.H. Loomans, C.J. Koeleman, P.H.N. With, de

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

5 Citations (Scopus)

Abstract

In this paper, we explore the complexity-performance trade-offs for camera surveillance applications. For this purpose, we propose a Scalable Video Codec (SVC), based on wavelet transformation in which we have adopted a t+2D architecture. Complexity is adjusted by adapting the configuration of the lifting-based motion-compensated temporal filtering (MCTF). We discuss various configurations and have found an SVC that has a scalable complexity and performance, enabling embedded applications. The paper discusses the trade-off of coder complexity, e.g. motion-compensation stages, compression efficiency and end-to-end delay of the video coding chain. Our SVC has a lower complexity than H.264 SVC, but the quality performance at full resolution is close to H.264 SVC (within 1 dB for surveillance type video at 4CIF, 60Hz) and at lower resolutions sufficient for our video surveillance application.
Original languageEnglish
Title of host publicationVisual communications and image processing 2008, 29-31 January 2008 San Jose, California, USA
EditorsW.A. Pearlman, J.W. Woods, Ligang Lu
Place of PublicationBellingham
PublisherSPIE
ISBN (Print)978-0-8194-6995-3
DOIs
Publication statusPublished - 2008
EventVisual Communications and Image Processing 2008 (VCIP 2008), January 29-31, 2008, San Jose, CA, USA - San Jose, CA, United States
Duration: 29 Jan 200831 Jan 2008

Publication series

NameProceedings of SPIE
Volume6822
ISSN (Print)0277-786X

Conference

ConferenceVisual Communications and Image Processing 2008 (VCIP 2008), January 29-31, 2008, San Jose, CA, USA
Abbreviated titleVCIP 2008
CountryUnited States
CitySan Jose, CA
Period29/01/0831/01/08

Fingerprint Dive into the research topics of 'Performance vs. complexity in scalable video coding for embedded surveillance applications'. Together they form a unique fingerprint.

Cite this