The forward-backward recovery sub-codec (FB-RSC) method: A robust form of packet-loss concealment for use in broadband IP networks

T. Morinaga, Kazunori Mano, T. Kaneko

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

The FB-RSC method of speech coding provides improved speech quality under packet-loss conditions. Each packet has a maximum of three codes, a main code, a forward sub-code, and a backward sub-code. The main code represents the current frame. The forward and backward sub-codes represent the next and previous frames. The necessity of the sub-codecs is determined by a sub-codec selector, which considers the SNR of the original and synthesized signals in this determination. A relatively low-compression and high-quality form of coding is used in the main codec, while coding with greater compression is used in the sub-codecs. We examined the quality of the proposed method for random loss of individual packets and pairs of consecutive packets. The result shows that our method significantly improves the concealment of packet loss.

Original languageEnglish
Title of host publication2002 IEEE Speech Coding Workshop: A Paradigm Shift Toward New Coding Functions for the Broadband Age, SCW 2002 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages62-64
Number of pages3
ISBN (Print)0780375491, 9780780375499
DOIs
Publication statusPublished - 2002
Externally publishedYes
EventIEEE Speech Coding Workshop, SCW 2002 - Tsukuba City, Ibaraki, Japan
Duration: 2002 Oct 62002 Oct 9

Other

OtherIEEE Speech Coding Workshop, SCW 2002
Country/TerritoryJapan
CityTsukuba City, Ibaraki
Period02/10/602/10/9

ASJC Scopus subject areas

  • Linguistics and Language
  • Computer Vision and Pattern Recognition
  • Human-Computer Interaction
  • Software
  • Language and Linguistics

Fingerprint

Dive into the research topics of 'The forward-backward recovery sub-codec (FB-RSC) method: A robust form of packet-loss concealment for use in broadband IP networks'. Together they form a unique fingerprint.

Cite this