{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T09:03:21Z","timestamp":1746435801728,"version":"3.37.3"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"14","license":[{"start":{"date-parts":[[2016,9,2]],"date-time":"2016-09-02T00:00:00Z","timestamp":1472774400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61372142","U1401252"],"award-info":[{"award-number":["61372142","U1401252"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1007\/s11042-016-3894-0","type":"journal-article","created":{"date-parts":[[2016,9,2]],"date-time":"2016-09-02T04:15:34Z","timestamp":1472789734000},"page":"16045-16061","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Video error concealment scheme based on tensor model"],"prefix":"10.1007","volume":"76","author":[{"given":"Zhiheng","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Ming","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Ruzheng","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Li","sequence":"additional","affiliation":[]},{"given":"Huiqiang","family":"Zhong","sequence":"additional","affiliation":[]},{"given":"Yiming","family":"Wen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,2]]},"reference":[{"key":"3894_CR1","unstructured":"Braman K (2010) Tensor Decompositions and Application in Image Processing, Tensor Computation and Applications Minisymposium in SIAM Annual Meeting, July 13"},{"issue":"4","key":"3894_CR2","doi-asserted-by":"crossref","first-page":"1956","DOI":"10.1137\/080738970","volume":"20","author":"J Cai","year":"2010","unstructured":"Cai J, Cand\u00e9s EJ, Shen Z (2010) A Singular Value Thresholding Algorithm for Matrix Completion. SIAM J Optim 20(4):1956\u20131982","journal-title":"SIAM J Optim"},{"issue":"6","key":"3894_CR3","doi-asserted-by":"crossref","first-page":"717","DOI":"10.1007\/s10208-009-9045-5","volume":"9","author":"EJ Cand\u00e9s","year":"2009","unstructured":"Cand\u00e9s EJ, Recht B (2009) Exact Matrix Completion via Convex Optimization. Found Comput Math 9(6):717\u2013772","journal-title":"Found Comput Math"},{"issue":"1","key":"3894_CR4","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/TMM.2007.911223","volume":"10","author":"Y Chen","year":"2008","unstructured":"Chen Y, Hu Y, Au OC, Li H, Chen C (2008) Video error concealment using spatio-temporal boundary matching and partial differential equation. IEEE Trans Multimedia 10(1):2\u201315","journal-title":"IEEE Trans Multimedia"},{"key":"3894_CR5","doi-asserted-by":"crossref","unstructured":"Haskell P, Messerschmitt D Resynchronization of Motion Compensated Video Affected by ATM Cell Loss. In: Proc Int Conf Acoust, Speech, Signal Process. (ICASSP92), SanFrancisco, CA, USA, 1992, Vol. 3, pp 545\u2013548","DOI":"10.1109\/ICASSP.1992.226155"},{"issue":"3","key":"3894_CR6","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1137\/07070111X","volume":"51","author":"TG Kolda","year":"2009","unstructured":"Kolda TG, Bader BW (2009) Tensor Decompositions and Applications. SIAM Rev 51(3):455\u2013500","journal-title":"SIAM Rev"},{"key":"3894_CR7","doi-asserted-by":"crossref","unstructured":"Lam WM, Reibman AR, Liu B (1993) Recovery of lost or erroneously received motion vectors. In: Proc IEEE Int Conf Acoustics, Speech, Signal Process., Vol. 3, pp. 417\u2013420","DOI":"10.1109\/ICASSP.1993.319836"},{"issue":"4","key":"3894_CR8","doi-asserted-by":"crossref","first-page":"1324","DOI":"10.1137\/S0895479898346995","volume":"21","author":"LD Lathauwer","year":"2000","unstructured":"Lathauwer LD (2000) On the best rank-1 and rank-(R 1, R 2, ... , R N ) approximation of higherorder tensors. SIAM J Matrix Anal Appl 21(4):1324\u20131342","journal-title":"SIAM J Matrix Anal Appl"},{"issue":"7","key":"3894_CR9","doi-asserted-by":"crossref","first-page":"560","DOI":"10.1109\/JDT.2014.2309988","volume":"10","author":"P Lee","year":"2014","unstructured":"Lee P, Kuo K, Chi C (2014) An Adaptive Error Concealment Method Based on Fuzzy Reasoning for Multi-View Video Coding. J Disp Technol 10(7):560\u2013567","journal-title":"J Disp Technol"},{"issue":"1","key":"3894_CR10","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1109\/TMM.2013.2281587","volume":"16","author":"W Lie","year":"2014","unstructured":"Lie W, Lee C, Yeh C, Gao Z (2014) Motion Vector Recovery for Video Error Concealment by Using Iterative Dynamic-programming Optimization. IEEE Trans Multimedia 16(1):216\u2013227","journal-title":"IEEE Trans Multimedia"},{"issue":"1","key":"3894_CR11","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1109\/TPAMI.2012.39","volume":"35","author":"J Liu","year":"2013","unstructured":"Liu J, Musialski P, Wonka P, Ye J (2013) Tensor Completion for Estimating Missing Values in Visual Data. IEEE Trans Pattern Anal Mach Intell 35(1):208\u2013220","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"3894_CR12","doi-asserted-by":"crossref","unstructured":"Nguyen DT, Dao MD, Tran TD (2011) Error concealment via 3-mode tensor approximation. In: Proc IEEE Int Conf on Image Processing, pp. 2081\u20132084, Brussels","DOI":"10.1109\/ICIP.2011.6115891"},{"issue":"2","key":"3894_CR13","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1109\/TIP.2007.914151","volume":"17","author":"D Persson","year":"2008","unstructured":"Persson D, Eriksson T, Hedelin P (2008) Packet Video Error Concealment with Gaussian Mixture Models. IEEE Trans Image Process 17(2):145\u2013154","journal-title":"IEEE Trans Image Process"},{"issue":"9","key":"3894_CR14","doi-asserted-by":"crossref","first-page":"1103","DOI":"10.1109\/TCSVT.2007.905532","volume":"17","author":"H Schwarz","year":"2007","unstructured":"Schwarz H, Marpe D (2007) T Wiegand, Overview of the Scalable Video Coding Extension of the H.264\/AVC Standard. IEEE Trans Circuits Syst Video Technol 17(9):1103\u20131124","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"4","key":"3894_CR15","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1109\/TBC.2002.806797","volume":"48","author":"JW Suh","year":"2002","unstructured":"Suh JW, Ho YS (2002) Error Concealment Techniques for Digital TV. IEEE Trans Broadcasting 48(4):299\u2013306","journal-title":"IEEE Trans Broadcasting"},{"issue":"12","key":"3894_CR16","doi-asserted-by":"crossref","first-page":"1648","DOI":"10.1109\/TCSVT.2012.2221191","volume":"22","author":"GJ Sullivan","year":"2012","unstructured":"Sullivan GJ, Ohm JR, Han WJ, Wiegand T (2012) Overview of the High Efficiency Video Coding (HEVC) Standard. IEEE Trans Circuits Syst Video Technol 22(12):1648\u20131667","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"3","key":"3894_CR17","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/30.156671","volume":"38","author":"H Sun","year":"1992","unstructured":"Sun H, Challapali K, Zdepski J (1992) Error concealment in digital simulcast AD-HDTV decoder. IEEE Trans Consumer Electron 38(3):108\u2013116","journal-title":"IEEE Trans Consumer Electron"},{"key":"3894_CR18","doi-asserted-by":"crossref","unstructured":"Tsekeridou S, Cheikh FA, Gabbouj M, Pitas I (1999) Motion Field Estimation by Vector Rational Interpolation for Error Concealment Purposes. In: Proc IEEE Int Conf Acoust, Speech, and Signal Processing, Vol. 6, pp. 3397\u20133400","DOI":"10.1109\/ICASSP.1999.757571"},{"issue":"7","key":"3894_CR19","doi-asserted-by":"crossref","first-page":"1056","DOI":"10.1109\/83.701166","volume":"7","author":"Z Wang","year":"1998","unstructured":"Wang Z, Yu Y, Zhang D (1998) Best Neighborhood Matching: An Information Loss Restoration Technique for Block-based Image Coding Systems. IEEE Trans Image Process 7(7):1056\u2013 1061","journal-title":"IEEE Trans Image Process"},{"issue":"4","key":"3894_CR20","doi-asserted-by":"crossref","first-page":"1416","DOI":"10.1109\/TCE.2003.1261249","volume":"49","author":"B Yan","year":"2003","unstructured":"Yan B, NG KW (2003) A Novel Selective Motion Vector Matching Algorithm for Error Concealment in MPEG-4 Video Transmission over Error-prone Channels. IEEE Trans. Consum. Electron. 49(4):1416\u20131423","journal-title":"IEEE Trans. Consum. Electron."},{"key":"3894_CR21","doi-asserted-by":"crossref","unstructured":"Yan B, H Gharavi A (2010) Hybrid Frame Concealment Algorithm for H.264\/AVC. IEEE Trans Image Process 19(1):98\u2013107","DOI":"10.1109\/TIP.2009.2032311"},{"key":"3894_CR22","volume-title":"Matrix Analysis and Applications","author":"X Zhang","year":"2013","unstructured":"Zhang X (2013) Matrix Analysis and Applications, 2nd edn. Tsinghua University press, Beijing","edition":"2"},{"issue":"4","key":"3894_CR23","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1109\/TBC.2003.819050","volume":"49","author":"J Zheng","year":"2003","unstructured":"Zheng J, Chau L (2003) A Motion Vector Recovery Algorithm for Digital Video using Lagrange Interpolation. IEEE Trans Broadcast 49(4):383\u2013389","journal-title":"IEEE Trans Broadcast"},{"issue":"3","key":"3894_CR24","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1109\/TMM.2005.843343","volume":"7","author":"J Zheng","year":"2005","unstructured":"Zheng J, Chau L (2005) Efficient Motion Vector Recovery Algorithm for H.264 based on a Polynomial Model. IEEE Trans Multimedia 7(3):507\u2013513","journal-title":"IEEE Trans Multimedia"},{"issue":"12","key":"3894_CR25","doi-asserted-by":"crossref","first-page":"4990","DOI":"10.1109\/TIP.2015.2478396","volume":"24","author":"G Zhou","year":"2015","unstructured":"Zhou G, Cichocki A, Zhao Q, Xie S (2015) Efficient Nonnegative Tucker Decompositions: Algorithms and Uniqueness. IEEE Trans Image Process 24(12):4990\u20135003","journal-title":"IEEE Trans Image Process"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-016-3894-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3894-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3894-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-016-3894-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T00:15:48Z","timestamp":1568333748000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-016-3894-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,2]]},"references-count":25,"journal-issue":{"issue":"14","published-print":{"date-parts":[[2017,7]]}},"alternative-id":["3894"],"URL":"https:\/\/doi.org\/10.1007\/s11042-016-3894-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2016,9,2]]}}}