Subjective evaluation of packet loss recovery techniques for voice over IP

Masahito Okamoto, Takashi Nose, Akinori Ito, Takeshi Nagano

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

We conducted a subjective evaluation experiment for VoIP speech under severe packet loss condition. The target codec was G.729, and four packet loss concealment methods were tested: parameter redundancy, SVM-based parameter redundancy, N-gram-based parameter estimation and interleaving. We first evaluated the effect of the interleaving block length on the subjective delay and speech quality. As a result, we found that the interleaving improved the subjective speech quality, but longer block length did not improve the quality. Next, we investigated the effect of PLC methods on the subjective latency and quality, and we found interleaving and simple PLC method gave the best result. N-gram-based PLC method made the quality worse.

Original languageEnglish
Title of host publicationICALIP 2014 - 2014 International Conference on Audio, Language and Image Processing, Proceedings
EditorsWanggen Wan, Fa-Long Luo, Xiaoqing Yu
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages711-714
Number of pages4
ISBN (Electronic)9781479939022
DOIs
Publication statusPublished - 2015 Jan 13
Event4th International Conference on Audio, Language and Image Processing, ICALIP 2014 - Shanghai, China
Duration: 2014 Jul 72014 Jul 9

Publication series

NameICALIP 2014 - 2014 International Conference on Audio, Language and Image Processing, Proceedings

Other

Other4th International Conference on Audio, Language and Image Processing, ICALIP 2014
CountryChina
CityShanghai
Period14/7/714/7/9

Keywords

  • Packet loss
  • Packet loss concealment
  • Subjective evaluation
  • VoIP

ASJC Scopus subject areas

  • Software
  • Computer Vision and Pattern Recognition
  • Computer Graphics and Computer-Aided Design

Fingerprint Dive into the research topics of 'Subjective evaluation of packet loss recovery techniques for voice over IP'. Together they form a unique fingerprint.

Cite this