Subjective and objective quality assessment of videos in error-prone network environments

Research output: Contribution to journalArticlepeer-review

11 Citations (Scopus)


Compression and transmission are two fundamental stages involved in wireless video communications, each of which may cause degradation of the quality of experience (QoE) of end users by producing compression artifacts and packet loss artifacts, respectively. They have their own unique perceptual influences. To provide insight for designing QoE-aware content delivery applications, this paper studies subjective and objective quality of videos containing both types of artifacts. First, subjective quality assessment is conducted, from which interaction between the two types of artifacts during quality perception is investigated. Second, using the subjective data, the performance of the state-of-the-art objective quality metrics is evaluated, with the aim of examining suitability of the existing metrics for their use in error-prone video communication applications. Finally, the developed data set is made publicly available for the community.

Original languageEnglish
Pages (from-to)6849-6870
Number of pages22
JournalMultimedia Tools and Applications
Issue number12
Publication statusPublished - 2016 Jun 1

Bibliographical note

Funding Information:
This work was supported in part by the Students’ Association of the Graduate School of Yonsei University funded by the Graduate School of Yonsei University, in part by the MSIP(Ministry of Science, ICT & Future Planning), Korea in the ICT R&D Program 2013 (KCA-2012-911-01-106) and in part by the IT Consilience Creative Program (NIPA-2014-H0201-14-1002) supervised by the NIPA (National IT Industry Promotion Agency).

Publisher Copyright:
© 2015, Springer Science+Business Media New York.

All Science Journal Classification (ASJC) codes

  • Software
  • Media Technology
  • Hardware and Architecture
  • Computer Networks and Communications


Dive into the research topics of 'Subjective and objective quality assessment of videos in error-prone network environments'. Together they form a unique fingerprint.

Cite this