1989
DOI: 10.1109/49.32334
|View full text |Cite
|
Sign up to set email alerts
|

Missing packet recovery techniques for low-bit-rate coded speech

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
24
0

Year Published

1993
1993
2024
2024

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 57 publications
(24 citation statements)
references
References 7 publications
0
24
0
Order By: Relevance
“…Another PLC algorithm that requires special transmission format from the encoder and also a multipriority discarding scheme from the network has been proposed by Suzuki and Taka [6]. Their algorithm is based on sending the most significant bits of the PCM samples in high-priority packets and the least significant bits in low-priority packets.…”
Section: Introductionmentioning
confidence: 99%
“…Another PLC algorithm that requires special transmission format from the encoder and also a multipriority discarding scheme from the network has been proposed by Suzuki and Taka [6]. Their algorithm is based on sending the most significant bits of the PCM samples in high-priority packets and the least significant bits in low-priority packets.…”
Section: Introductionmentioning
confidence: 99%
“…Instead, receiver-based methods are preferred for audio IP-based transmissions. Typical receiver-based error concealment methods for audio/music applications include white noise generation or zeros padding [8], pattern matching using small segments of samples immediately before or after lost packets [9] - [10] or repeating the last successfully received packet [11]. Moreover, a number of previously published packet concealment techniques [12] - [13] employ time-based windowing functions for improving the audibility of the packet inserted, while other additionally use interleaving techniques for enhancing the concealment performance under the presence of burst packet losses [14].…”
Section: Error Concealment Overviewmentioning
confidence: 99%
“…Early PLC algorithms recover from packet at the receiver stage by inserting a silence, or noise, or previous packet [12]. Furthermore, a pitch waveform replication [13] and overlapadd interpolation [14] techniques have been developed as receiver-based PLC schemes.…”
Section: Introductionmentioning
confidence: 99%