Anchor Points Coding for Depth Map Compression

Anchor Points Coding for Depth Map Compression

ANCHOR POINTS CODING FOR DEPTH MAP COMPRESSION Ionut Schiopu, Ioan Tabus Department of Signal Processing, Tampere University of Technology, P.O.Box 553, FIN-33101 Tampere, FINLAND ionut.schiopu@tut.fi, ioan.tabus@tut.fi ABSTRACT the anchor point selection. Section 3 presents deterministic schemes for chain-code symbols changing, and coding scheme for entities to The paper deals with encoding the contours of given regions in an be encoded. Section 4 presents experimental results for lossy and image. All contours are represented as a sequence of contour seg- lossless compression. Section 5 draws the conclusions. ments, each such segment being defined by an anchor (starting) point and a string of contour edges, equivalent to a string of chain-code symbols. We propose efficient ways for anchor points selection and 2. ANCHOR POINTS CODING (APC) contour segments generation by analyzing contour crossing points and imposing rules that help in minimizing the number of anchor A depth map is a matrix I of size nr × nc, with the integer Ix,y points and in obtaining chain-code contour sequences with skewed representing the depth for each pixel position (x,y). The proposed symbol distribution. When possible, part of the anchor points are ef- method finds all connected regions Ωk of pixels with equal depth, ficiently encoded relative to the currently available contour segments and encodes the contour and the depth value of each region. A region at the decoder. The remaining anchor points are represented as ones Ωk containing connected pixels in 4-connectivity can be formally in a sparse binary matrix. Context tree coding is used for all entities defined as: for ∀(x,y) ∈ Ωk and ∀(xi,yi) ∈ {(x + 1,y), (x − to be encoded. The results for depth map compression are similar 1,y), (x,y + 1), (x,y − 1)}, if Ix,y = Ixi,yi , then (xi,yi) ∈ Ωk. (in lossless case) or better (in lossy case) than the existing results. The contour map is the union of all contour edges that form the Index Terms— Lossless and lossy compression, contour com- regions contours. One contour edge separates two neighboring pix- pression, anchor points, depth map els belonging to two different regions. The contour map is stored in a graph having vertices placed in a (nr + 1) × (nc + 1) contour grid, where the graph edges represent the contour edges. A vertex is 1. INTRODUCTION denoted by P = (i,j), where (i,j) are contour grid coordinates. If Depth compression has an important role in the multi-view compres- in the image grid Ii,j 6= Ii,j+1, then in the contour grid a contour sion for the 3D Television (3DTV) and Free Viewpoint Television edge is introduced between the vertices (i,j +1) and (i +1,j +1). (FTV). In high quality view synthesis, the use of lossless compressed If Ii,j 6= Ii+1,j , then a contour edge is introduced between the ver- images is important for eliminating the artifacts in depth map image tices (i +1,j) and (i +1,j + 1). Two vertices are adjacent if there is a contour edge between them. A contour segment is ‘drawn’ as a based rendering technologies. T vector [P P ··· Pn ] of n adjacent vertices. In lossless compression several approaches were proposed: im- Γk = 1 2 Γk Γk The 3OT chain-code representation [14] codify each Γk by a age block splitting and Gray coding of bit planes for binary compres- T s s s − , sion schemes [1], H264/AVC standard modification for depth maps vector Sk = [ 1 2 ··· nΓk 2] where si is a 3OT sym- [2], palette images coder with good results for depth maps [3]. In bol that encodes: 0 for ‘go forward’, 1 for ‘change orientation’, [4], the contour encoder uses a different contour segments generator and 2 for ‘go back’. A symbol si encodes a current vertex Pi+2 than the proposed method. The best performance is shown by [5], relatively to the previous two vertices: Pi and Pi+1. Hence, P1 where the contours are encoded using 2D contexts. and P2 are needed in order to reconstruct Γk. The chain-code vec- In lossy compression there are numerous approaches: triangu- tors are concatenated for coding in a long vector of 3OT symbols T T T T lar image decomposition by binary tree [6], quad-tree decomposi- S = [S1 S2 ··· SnΓ ] . tion with a platelet based approach for region filling [7], two im- We call here anchor point the first vertex in each Γk. The coding age pyramid structures for arc breakpoints and sub-band samples of the anchor points is our main focus. Our method offers solutions nΓ [8], a reduced image resolution and an up-sampling algorithm [9, to generate the set Γ = {Γk}k=1, which represents the entire con- 10]. Texture and color correlation is studied in [11], where a joint tour map, in such a way that we have a small number, nΓ, of contour depth/texture coding scheme is used, and in [12], where texture seg- segments (since the anchor points are very expensive to code), and a mentation is used for depth map segmentation. In [13], lossy ver- maximum number of symbols 0 and a minimum number of symbols sions of a depth map are created by either merging or splitting re- 2 in S for an efficient coding of 3OT chain-codes. gions, and are compressed lossless. A summary of the generating procedure for the set Γ and the Our method uses the approach of finding in an image all maxi- anchor points selection is as follows: mal regions containing 4-connectivity pixels, and encoding the con- (a) Search column-wise (see Section 2.2) for the next anchor tours and the depth value inside each region. The method is focusing point (i,j) (a vertex having unvisited adjacent vertices), and mark it on encoding the contour using an efficient way for generating con- in the matrix of anchor points Υ(i,j)=1 (see Section 2.3). tour segments, represented using their anchor points and chain-code (b) Generate the contour segment Γk starting from the anchor strings. Section 2 presents the rules for traversing the contour, and point, using the rules form Section 2.1, and ending in a vertex with 978-1-4799-5751-4/14/$31.00 ©2014 IEEE 5626 ICIP 2014 3 Directive T1. When a Pk vertex is reached, the next vertex is selected so that next encoded chain-code symbol is si 6=0. 3 Directive T2. When Pk = (i,j) is reached if (i − 1,j) and (i +1,j) are unvisited adjacent vertices, then visit (i +1,j) (if (i,j − 1) and (i,j + 1) are unvisited, then visit (i,j + 1)). 4 Directive T3. When a Pk vertex is reached, the next vertex is selected the one that generates a chain-code symbol 0. Directive T4. When a Pk vertex with already three visited ad- jacent vertices is reached, the remaining vertex, Pj , is adjacent if a chain-code symbol 0 moves from Pk to Pj . If so, the de- 4 coder knows that Pk = Pk and go visit Pj (without encoding 3 the 0 chain-code), else Pk = Pk and Γk ends. Directive C1. When Pk = (i,j) is reached, if the next adja- cent vertex to visit is Pk+1 =(i − 1,j) or Pk+1 =(i,j − 1), then Pk+1 is not an anchor point. Directive C2. When Pk+1 is reached and Pk−1 =(i,j), if the next adjacent vertex to visit is Pk+2 = (i − 1,j) or Pk+2 = (i,j − 1), then P is not an anchor point. k+1 Fig. 2. All possible ways of selecting the next adjacent vertex to visit 3 for a Pk vertex. An arrow shows the next vertex to visit as part of a current Γk, a red (black) dot is a visited (unvisited) vertex, and a red (black) line is a visited (unvisited) contour edge. Fig. 1. The set of APC directives to be used when reaching a vertex either in a Γk or as an anchor point. Directives T1-T4 are used for generating contour segments by traversing from a vertex to one of its selected unvisited adjacent vertex. Directives C1-C2 are used to check if a vertex is not a possible anchor point position. no unvisited adjacent vertices. While traversing Γk, check each ver- tex if it is a possible anchor point (see Section 2.2), and save the found presumptive anchor points at the end of the list Ψ of possible relative anchor points (see Section 2.3). Mark with 2 in the matrix Υ the remaining vertices in Γk (the anchor point is already marked). (c) While there are still unprocessed positions ℓ in Ψ, if Ψ(ℓ) is an anchor point, set the flag of being anchor point, Φ(ℓ)=1, else set Φ(ℓ)=0. Treat any such anchor point as in (b). Fig. 3. Cases where a chain-code symbol 2 encodes Pk+2. An arrow (d) Continue with (a) until no more anchor points are found. shows the next adjacent vertex to visit as part of a current Γk, a red (e) Encode S, Φ and Υ, in this order. (black) dot is a visited (unvisited) vertex, and a red (black) line is a visited (unvisited) contour edge. 2.1. Rules for traversing contour segments A contour segment Γk is ‘drawn’ by the vertices saved when travers- for anchor points (see Section 2.3). In Fig. 2, all possible ways of 3 ing the contour, in the contour segments generation.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    5 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us