{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T19:54:48Z","timestamp":1774295688839,"version":"3.50.1"},"reference-count":111,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2021,1,12]],"date-time":"2021-01-12T00:00:00Z","timestamp":1610409600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,12]],"date-time":"2021-01-12T00:00:00Z","timestamp":1610409600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11042-020-10333-6","type":"journal-article","created":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T03:31:44Z","timestamp":1610508704000},"page":"12685-12730","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["A review of temporal video error concealment techniques and their suitability for HEVC and VVC"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1139-3076","authenticated-orcid":false,"given":"Mohammad","family":"Kazemi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5482-8378","authenticated-orcid":false,"given":"Mohammad","family":"Ghanbari","sequence":"additional","affiliation":[]},{"given":"Shervin","family":"Shirmohammadi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,12]]},"reference":[{"issue":"8","key":"10333_CR1","doi-asserted-by":"publisher","first-page":"960","DOI":"10.1109\/TCSVT.2006.879988","volume":"16","author":"D Agrafiotis","year":"2006","unstructured":"Agrafiotis D, Bull R, Canagarajah CN (2006) Enhanced error concealment with mode selection. IEEE Transactions On Circuits and Systems for Video Technology 16(8):960\u2013973","journal-title":"IEEE Transactions On Circuits and Systems for Video Technology"},{"issue":"6","key":"10333_CR2","doi-asserted-by":"publisher","first-page":"1339","DOI":"10.1109\/TMM.2017.2662203","volume":"19","author":"MT Akbari","year":"2017","unstructured":"Akbari MT, Granado B (2017) Sparse recovery-based error concealment. IEEE Transactions on Multimedia 19(6):1339\u20131350","journal-title":"IEEE Transactions on Multimedia"},{"key":"10333_CR3","unstructured":"Arthofer F et al. (2016) The future of television. The Boston Consulting Group"},{"issue":"3","key":"10333_CR4","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1109\/6046.944476","volume":"3","author":"L Atzori","year":"2001","unstructured":"Atzori L, De Natale FGB, Perra C (2001) A spatio-temporal concealment technique using boundary matching algorithm and mesh-based warping (BMA-MBW). IEEE Trans Multimedia 3(3):326\u2013338","journal-title":"IEEE Trans Multimedia"},{"issue":"2","key":"10333_CR5","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1109\/TMM.2005.843347","volume":"7","author":"S Belfiore","year":"2005","unstructured":"Belfiore S, Grangetto M, Magli E, Olmo G (2005) Concealment of whole-frame losses for wireless low bit-rate video based on multiframe optical flow estimation. IEEE Transactions on Multimedia 7(2):316\u2013329","journal-title":"IEEE Transactions on Multimedia"},{"key":"10333_CR6","unstructured":"Bopardikar S, Hillestad OI And a. Perkis (2005) a temporal error concealment algorithm based on structural alignment for packet video. International Conference on Signal Processing & Communications (SPCOM)"},{"issue":"2","key":"10333_CR7","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MIC.2012.29","volume":"16","author":"C Bormann","year":"2012","unstructured":"Bormann C, Castellani A, Shelby Z (2012) CoAP: an application protocol for billions of tiny internet nodes. IEEE Internet Comput 16(2):62\u201367","journal-title":"IEEE Internet Comput"},{"key":"10333_CR8","unstructured":"Bross B, Chen J, Liu S, Wang YK (2020) Versatile video coding (Draft 10). Joint video experts team (JVET) of ITU-T SG 16 WP 3 and ISO\/IEC JTC 1\/SC 29\/WG 11"},{"issue":"13","key":"10333_CR9","first-page":"48","volume":"124","author":"R Brown","year":"1994","unstructured":"Brown R (1994) Dishing up full-power DBS. Broadcasting & Cable 124(13):48\u201350","journal-title":"Broadcasting & Cable"},{"key":"10333_CR10","doi-asserted-by":"crossref","unstructured":"Carreira J, Ekmekcioglu E, Kondoz A, Assuncao P, Faria S, De Silva V (2014) Selective motion vector redundancies for improved error resilience in HEVC. IEEE International Conference on Image Processing (ICIP):2457\u20132461","DOI":"10.1109\/ICIP.2014.7025497"},{"key":"10333_CR11","doi-asserted-by":"publisher","DOI":"10.1109\/PV.2013.6691446","volume-title":"Motion compensated error concealment for HEVC based on block-merging and residual energy","author":"YL Chang","year":"2013","unstructured":"Chang YL, Reznick YA, Chen Z, Cosman PC (2013) Motion compensated error concealment for HEVC based on block-merging and residual energy. International Packet Video Workshop (PV), San Jose"},{"issue":"3","key":"10333_CR12","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1109\/76.585936","volume":"7","author":"M-J Chen","year":"1997","unstructured":"Chen M-J, Chen L-G, Weng R-M (1997) Error concealment of lost motion vectors with overlapped motion compensation. IEEE Trans Circuits Syst Video Technol 7(3):560\u2013563","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"10333_CR13","volume-title":"An error concealment algorithm for entire frame loss in video transmission","author":"Y Chen","year":"2004","unstructured":"Chen Y, Yu K, Li J, Li S (2004) An error concealment algorithm for entire frame loss in video transmission. Picture Coding Symposium, San Francisco, USA"},{"issue":"11","key":"10333_CR14","doi-asserted-by":"publisher","first-page":"1385","DOI":"10.1109\/TCSVT.2005.857301","volume":"15","author":"M Chen","year":"2005","unstructured":"Chen M, Chen C, Chi M (2005) Temporal error concealment algorithm by recursive block-matching principle. IEEE Trans Circuits Syst Video Technol 15(11):1385\u20131393","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"3","key":"10333_CR15","doi-asserted-by":"publisher","first-page":"1422","DOI":"10.1109\/TCE.2008.4637636","volume":"54","author":"C Chen","year":"2008","unstructured":"Chen C, Liu Y, Yang Z, Bu J, Deng X (2008) Multi-frame error concealment for H.264\/AVC frames with complexity adaptation. IEEE Trans Consum Electron 54(3):1422\u20131429","journal-title":"IEEE Trans Consum Electron"},{"issue":"1","key":"10333_CR16","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TMM.2007.911223","volume":"10","author":"Y Chen","year":"2008","unstructured":"Chen Y, Hu Y, Au OC, Li H, Chen CW (2008) Video error concealment using Spatio-temporal boundary matching and partial differential equation. IEEE Transactions on Multimedia 10(1):2\u201315","journal-title":"IEEE Transactions on Multimedia"},{"issue":"4","key":"10333_CR17","doi-asserted-by":"publisher","first-page":"2694","DOI":"10.1109\/TCE.2010.5681158","volume":"56","author":"X Chen","year":"2010","unstructured":"Chen X, Chung YY, Bae C, He X, Yeh WC (2010) An efficient error concealment algorithm for H.264\/AVC using regression modeling-based prediction. IEEE Trans Consum Electron 56(4):2694\u20132701","journal-title":"IEEE Trans Consum Electron"},{"key":"10333_CR18","unstructured":"Jianle Chen, Yan Ye, Seung Hwan Kim (2020) Algorithm description for Versatile Video Coding and Test Model 8 (VTM 8). Joint Video Experts Team (JVET) of ITU-T SG 16 WP 3 and ISO\/IEC JTC 1\/SC 29\/WG 11"},{"issue":"3","key":"10333_CR19","doi-asserted-by":"publisher","first-page":"1689","DOI":"10.1109\/TCE.2010.5606314","volume":"56","author":"JT Chien","year":"2010","unstructured":"Chien JT, Li GL, Chen MJ (2010) Effective error concealment algorithm of whole frame loss for H.264 video coding standard by recursive motion vector refinement. IEEE Trans Consum Electron 56(3):1689\u20131695","journal-title":"IEEE Trans Consum Electron"},{"issue":"24","key":"10333_CR20","doi-asserted-by":"publisher","first-page":"31953","DOI":"10.1007\/s11042-018-6184-1","volume":"77","author":"G Choe","year":"2018","unstructured":"Choe G, Nam C, Chu C (2018) An effective temporal error concealment in H.264 video sequences based on scene change detection-PCA model. Multimed Tools Appl 77(24):31953\u201331967","journal-title":"Multimed Tools Appl"},{"issue":"6","key":"10333_CR21","doi-asserted-by":"publisher","first-page":"1535","DOI":"10.1109\/TCSVT.2019.2909564","volume":"30","author":"B Chung","year":"2019","unstructured":"Chung B, Yim C (2019) Bi-sequential video error concealment method using adaptive Homography-based registration. IEEE Transactions on circuits and systems for video technology 30(6):1535\u20131549","journal-title":"IEEE Transactions on circuits and systems for video technology"},{"issue":"2","key":"10333_CR22","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1109\/30.585539","volume":"43","author":"J Feng","year":"1997","unstructured":"Feng J, Lo K, Mehropour H, Karbowiak AE (1997) Error concealment for MPEG video transmissions. IEEE Trans Consumer Electron 43(2):183\u2013187","journal-title":"IEEE Trans Consumer Electron"},{"issue":"2","key":"10333_CR23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2174\/2210686311101020124","volume":"1","author":"M Fleury","year":"2011","unstructured":"Fleury M, Moiron S, Ghanbari M (2011) Innovations in video error resilience and concealment. Recent Patents Signal Process 1(2):1\u201311","journal-title":"Recent Patents Signal Process"},{"key":"10333_CR24","doi-asserted-by":"crossref","unstructured":"Fleury M, Altaf M, Moiron S, Qadri N, Ghanbari M (2012) Source coding methods for robust wireless video streaming. Multimedia Networking and Coding:175\u2013207","DOI":"10.4018\/978-1-4666-2660-7.ch007"},{"issue":"6","key":"10333_CR25","doi-asserted-by":"publisher","first-page":"9033","DOI":"10.1007\/s11042-016-3471-6","volume":"76","author":"S Ghahremani","year":"2017","unstructured":"Ghahremani S, Ghanbari M (2017) Error resilient video transmission in ad hoc networks using layered and multiple description coding. Multimed Tools Appl 76(6):9033\u20139049","journal-title":"Multimed Tools Appl"},{"key":"10333_CR26","first-page":"265","volume":"9","author":"M Ghanbari","year":"2011","unstructured":"Ghanbari M (2011) Standard codecs: image compression to advanced video coding. IET publication, 3rd edition. Ch 9:265\u2013271","journal-title":"Ch"},{"key":"10333_CR27","doi-asserted-by":"crossref","unstructured":"Ghanbari S, Bobber MZ (2002) A cluster-based method for the recovery of lost motion vectors in video coding. 4th IEEE Conference on Mobile and Wireless Communications Networks:9\u201311","DOI":"10.1109\/MWCN.2002.1045832"},{"key":"10333_CR28","doi-asserted-by":"publisher","unstructured":"Ghotbou A, Khansari M (2020) Comparing application layer protocols for video transmission in IoT low power lossy networks: an analytic comparison. Wireless Netw doi. https:\/\/doi.org\/10.1007\/s11276-020-02453-6","DOI":"10.1007\/s11276-020-02453-6"},{"key":"10333_CR29","unstructured":"Global Internet Phenomena Report, Sandvine, September 2019, page 5, \u201cThe massive impact of OTT fragmentation\u201d, Retrieved April 1, 2020 from: https:\/\/www.sandvine.com\/press-releases\/sandvine-releases-2019-global-internet-phenomena-report"},{"issue":"8","key":"10333_CR30","doi-asserted-by":"publisher","first-page":"2099","DOI":"10.1109\/TMM.2013.2281024","volume":"15","author":"H Hadizadeh","year":"2013","unstructured":"Hadizadeh H, Bajic I, Cheung G (2013) Video error concealment using a computation efficient low saliency prior. IEEE Transactions on Multimedia 15(8):2099\u20132113","journal-title":"IEEE Transactions on Multimedia"},{"key":"10333_CR31","doi-asserted-by":"crossref","unstructured":"Haskell P, Messerschmitt D (1992) Resynchronization of motion compensated video affected by ATM cell loss. IEEE Int. Conf. Acoustics, Speech, and Signal Processing:545\u2013548","DOI":"10.1109\/ICASSP.1992.226155"},{"key":"10333_CR32","doi-asserted-by":"publisher","first-page":"100110","DOI":"10.1016\/j.iot.2019.100110","volume":"8","author":"R Herrero","year":"2019","unstructured":"Herrero R (2019) A comparison of mechanisms for RTC in the context of IoT. Internet Things 8:100110","journal-title":"Internet Things"},{"key":"10333_CR33","doi-asserted-by":"publisher","first-page":"100168","DOI":"10.1016\/j.iot.2020.100168","volume":"9","author":"R Herrero","year":"2020","unstructured":"Herrero R (2020) Analysis of IoT mechanisms for media streaming. Internet Things 9:100168","journal-title":"Internet Things"},{"key":"10333_CR34","first-page":"380","volume-title":"Temporal and spatial error concealment using cooperative game","author":"C-L Ho","year":"2014","unstructured":"Ho C-L, Chang L-W (2014) Temporal and spatial error concealment using cooperative game. Proc. ISEEE, Sapporo, Japan, pp 380\u2013384"},{"key":"10333_CR35","doi-asserted-by":"publisher","first-page":"7449","DOI":"10.1007\/s11042-019-08538-5","volume":"79","author":"S Hojati","year":"2020","unstructured":"Hojati S, Kazemi M, Moallem P (2020) Error concealment with parallelogram partitioning of the lost area. Multimed Tools Appl 79:7449\u20137469","journal-title":"Multimed Tools Appl"},{"issue":"10","key":"10333_CR36","doi-asserted-by":"publisher","first-page":"693","DOI":"10.1049\/iet-ipr.2016.0043","volume":"10","author":"SC Hsia","year":"2016","unstructured":"Hsia SC, Hsiao CH (2016) Fast-efficient shape error concealment technique based on block classification. IET Image Process 10(10):693\u2013700","journal-title":"IET Image Process"},{"issue":"5","key":"10333_CR37","doi-asserted-by":"publisher","first-page":"860","DOI":"10.1109\/TMM.2005.854432","volume":"7","author":"SC Hsia","year":"2005","unstructured":"Hsia SC, Cheng SC, Chou SW (2005) Efficient adaptive error concealment technique for video decoding system. IEEE Transactions on Multimedia 7(5):860\u2013868","journal-title":"IEEE Transactions on Multimedia"},{"key":"10333_CR38","doi-asserted-by":"crossref","unstructured":"Huang Z, Cai Q (2018) A video data recovery algorithm in wireless communication networks. IEEE 18th International Conference on Communication Technology:727\u2013731","DOI":"10.1109\/ICCT.2018.8599966"},{"issue":"3","key":"10333_CR39","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1109\/TBC.2008.2001150","volume":"54","author":"S-C Huang","year":"2008","unstructured":"Huang S-C, Kuo S-Y (2008) Optimization of hybridized error concealment for H.264. IEEE Trans Broadcast 54(3):499\u2013516","journal-title":"IEEE Trans Broadcast"},{"issue":"2","key":"10333_CR40","doi-asserted-by":"publisher","first-page":"676","DOI":"10.1109\/TCE.2006.1649696","volume":"52","author":"YL Huang","year":"2006","unstructured":"Huang YL, Lien HY (2006) Temporal error concealment for MPEG coded video using a self-organizing map. IEEE Trans Consum Electron 52(2):676\u2013681","journal-title":"IEEE Trans Consum Electron"},{"issue":"1","key":"10333_CR41","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/TCE.2008.4470039","volume":"54","author":"MC Hwang","year":"2008","unstructured":"Hwang MC, Kim JH, Yang HY, Ko SJ, Morales AW (2008) Frame error concealment technique using adaptive inter-mode estimation for H.264\/AVC. IEEE Trans Consum Electron 54(1):163\u2013170","journal-title":"IEEE Trans Consum Electron"},{"issue":"2","key":"10333_CR42","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TBC.2008.917274","volume":"54","author":"MC Hwang","year":"2008","unstructured":"Hwang MC, Kim JH, Duong DT, Ko SJ (2008) Hybrid temporal error concealment methods for block-based compressed video transmission. IEEE Trans Broadcast 54(2):198\u2013207","journal-title":"IEEE Trans Broadcast"},{"key":"10333_CR43","unstructured":"International Telecommunication Union. Information technology - Generic coding of moving pictures and associated audio information: Systems. ITU-T Recommendation H.222.0, approved and In force 2018-08-29"},{"issue":"3","key":"10333_CR44","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/s00530-013-0319-z","volume":"20","author":"M Kazemi","year":"2013","unstructured":"Kazemi M, Shirmohammadi S, Sadeghi KH (2013) A review of multiple description coding techniques for error-resilient video delivery. Multimedia Systems, Springer 20(3):283\u2013309","journal-title":"Multimedia Systems, Springer"},{"key":"10333_CR45","doi-asserted-by":"publisher","first-page":"5937","DOI":"10.1109\/TIP.2020.2984356","volume":"29","author":"M Kazemi","year":"2020","unstructured":"Kazemi M, Ghanbari M, Shirmohammadi S (2020) The performance of quality metrics in assessing error-concealed video quality. IEEE Trans Image Process 29:5937\u20135952","journal-title":"IEEE Trans Image Process"},{"issue":"12","key":"10333_CR46","doi-asserted-by":"publisher","first-page":"1294","DOI":"10.1109\/TCSVT.2004.837018","volume":"14","author":"E Khan","year":"2004","unstructured":"Khan E, Lehmann S, Gunji H, Ghanbari M (2004) Iterative error detection and correction of H.263 coded video for wireless networks. IEEE Transactions on Circuits and Systems for Video Technology 14(12):1294\u20131307","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"2","key":"10333_CR47","doi-asserted-by":"publisher","first-page":"266","DOI":"10.4218\/etrij.2017-0078","volume":"40","author":"DH Kim","year":"2018","unstructured":"Kim DH, Kwon YJ, Choi KH (2018) Motion-vector refinement for video error concealment using downhill simplex approach. ETRI J 40(2):266\u2013274","journal-title":"ETRI J"},{"issue":"7","key":"10333_CR48","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1109\/TCSVT.2006.877391","volume":"16","author":"WY Kung","year":"2006","unstructured":"Kung WY, Kim CS, Jay Kuo C-C (2006) Spatial and temporal error concealment techniques for video transmission over Noisy channels. IEEE Trans Circuits Syst Video Technol 16(7):789\u2013802","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"10333_CR49","doi-asserted-by":"crossref","unstructured":"Lam WM, Reibman AR, Liu B (1993) Recovery of lost or erroneously received motion vectors. in Proc IEEE Int Conf Acoust Speech Signal Process:417\u2013420","DOI":"10.1109\/ICASSP.1993.319836"},{"issue":"5","key":"10333_CR50","doi-asserted-by":"publisher","first-page":"574","DOI":"10.4218\/etrij.06.0105.0246","volume":"28","author":"PJ Lee","year":"2006","unstructured":"Lee PJ, Lin ML (2006) Fuzzy logic based temporal error concealment for H.264 video. ETRI J 28(5):574\u2013582","journal-title":"ETRI J"},{"issue":"11","key":"10333_CR51","doi-asserted-by":"publisher","first-page":"1314","DOI":"10.1109\/TIP.2002.804275","volume":"11","author":"YC Lee","year":"2002","unstructured":"Lee YC, Altunbasak Y, Mersereau RM (2002) Multi-frame error concealment for MPEG-coded video delivery over error-prone networks. IEEE Trans Image Process 11(11):1314\u20131331","journal-title":"IEEE Trans Image Process"},{"issue":"13","key":"10333_CR52","doi-asserted-by":"publisher","first-page":"14993","DOI":"10.1007\/s11042-017-4407-5","volume":"76","author":"Y Li","year":"2017","unstructured":"Li Y, Chen R (2017) Motion vector recovery for video error concealment based on the plane fitting. Springer Multimedia Tools and Applications 76(13):14993\u201315006","journal-title":"Springer Multimedia Tools and Applications"},{"issue":"2","key":"10333_CR53","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s11042-011-0811-4","volume":"65","author":"H Li","year":"2013","unstructured":"Li H, Zhong Y (2013) Motion characteristic differentiated error concealment. Multimed Tools Appl 65(2):297\u2013320","journal-title":"Multimed Tools Appl"},{"issue":"8","key":"10333_CR54","doi-asserted-by":"publisher","first-page":"982","DOI":"10.1109\/TCSVT.2006.879119","volume":"16","author":"WN Lie","year":"2006","unstructured":"Lie WN, Gao ZW (2006) Video error concealment by integrating greedy suboptimization and Kalman filtering techniques. IEEE Transactions on Circuits and Systems for Video Technology 16(8):982\u2013992","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"1","key":"10333_CR55","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1109\/TMM.2013.2281587","volume":"16","author":"W Lie","year":"2014","unstructured":"Lie W, Lee C, Yeh C, Gao Z (2014) Motion vector recovery for video error concealment by using iterative dynamic programming optimization. IEEE Transactions on Multimedia 16(1):216\u2013227","journal-title":"IEEE Transactions on Multimedia"},{"key":"10333_CR56","doi-asserted-by":"crossref","unstructured":"Lim CP, Tan EAW, Ghanbari M, Ghanbari S (1999) Cell loss concealment and packetization in packet video. International Journal of Imaging Systems and Technology, Special Issue on Image and Video Compression:54\u201358","DOI":"10.1002\/(SICI)1098-1098(1999)10:1<54::AID-IMA6>3.0.CO;2-H"},{"key":"10333_CR57","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCC.2013.6664106","volume-title":"Error concealment algorithm for HEVC coded video using block partition decisions","author":"T Lin","year":"2013","unstructured":"Lin T, Yang N, Syu R (2013) Error concealment algorithm for HEVC coded video using block partition decisions. IEEE International Conference on Signal Processing, Communication and Computing (ICSPCC)"},{"issue":"4","key":"10333_CR58","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1109\/TBC.2013.2275056","volume":"59","author":"TL Lin","year":"2013","unstructured":"Lin TL, Chen WC, Lai CK (2013) Recovery of lost motion vectors using encoded residual signals. IEEE Trans Broadcast 59(4):705\u2013716","journal-title":"IEEE Trans Broadcast"},{"issue":"11","key":"10333_CR59","doi-asserted-by":"publisher","first-page":"1451","DOI":"10.1109\/JDT.2016.2595640","volume":"12","author":"TL Lin","year":"2016","unstructured":"Lin TL, Ding TL, Yang NC, Wu PY, Tung KH, Lai CK, Chang TE (2016) Video motion vector recovery method using decoding partition information. J Disp Technol 12(11):1451\u20131463","journal-title":"J Disp Technol"},{"issue":"1","key":"10333_CR60","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/s11042-015-3056-9","volume":"76","author":"T-L Lin","year":"2017","unstructured":"Lin T-L, Ding T-L, Fan C-Y, Chen W-C (2017) Error concealment algorithm based on sparse optimization. Springer Multimedia Tools and Applications 76(1):397\u2013413","journal-title":"Springer Multimedia Tools and Applications"},{"issue":"2","key":"10333_CR61","doi-asserted-by":"publisher","first-page":"782","DOI":"10.1109\/TIP.2016.2623481","volume":"26","author":"X Liu","year":"2016","unstructured":"Liu X, Zhai D, Zhou J, Wang S, Zhao D, Guo H (2016) Sparsity-based image error concealment via adaptive dual dictionary learning and regularization. IEEE Trans Image Process 26(2):782\u2013796","journal-title":"IEEE Trans Image Process"},{"issue":"3","key":"10333_CR62","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1109\/TCSVT.2009.2035839","volume":"20","author":"M Ma","year":"2010","unstructured":"Ma M, Au O, Chan SG, Sun M (2010) Edge-directed error concealment. IEEE Transactions on Circuits and Systems for Video Technology 20(3):382\u2013394","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"10333_CR63","doi-asserted-by":"publisher","unstructured":"Nam C, Chu C, Kim T, Han S (2020) A novel motion recovery using temporal and spatial correlation for a fast temporal error concealment over H.264 video sequences. Multimedia Tools and Applications. https:\/\/doi.org\/10.1007\/s11042-019-08176-x","DOI":"10.1007\/s11042-019-08176-x"},{"key":"10333_CR64","doi-asserted-by":"publisher","first-page":"8202","DOI":"10.1109\/ACCESS.2020.2964280","volume":"8","author":"A Nauman","year":"2020","unstructured":"Nauman A, Qadri YA, Amjad M, Zikria YB, Afzal MK, Kim SW (2020) Multimedia internet of things: a comprehensive survey. IEEE ACCESS 8:8202\u20138250","journal-title":"IEEE ACCESS"},{"key":"10333_CR65","doi-asserted-by":"crossref","unstructured":"Oztas B, Pourazad MT, Nasiopoulos P, Leung VCM (2012) A study on the HEVC performance over lossy networks. 19th IEEE International Conference on Electronics, Circuits and Systems (ICECS):785\u2013788","DOI":"10.1109\/ICECS.2012.6463542"},{"key":"10333_CR66","doi-asserted-by":"crossref","unstructured":"Peng Y-T, Cosman PC (2014) Weighted boundary matching error concealment for HEVC using block partition decisions. 48th Asilomar Conference on Signals, Systems and Computers:921\u2013925","DOI":"10.1109\/ACSSC.2014.7094587"},{"key":"10333_CR67","first-page":"10","volume":"1","author":"Q Peng","year":"2002","unstructured":"Peng Q, Yang T, Zhu C (2002) Block-based temporal error concealment for video packet using motion vector extrapolation. IEEE Int Conf Commun Circuits Syst West Sino Expo 1:10\u201314","journal-title":"IEEE Int Conf Commun Circuits Syst West Sino Expo"},{"key":"10333_CR68","first-page":"417","volume-title":"Video streaming: overview and challenges in the internet of things","author":"R Pereira","year":"2016","unstructured":"Pereira R, Pereira EG (2016) Video streaming: overview and challenges in the internet of things. Pervasive Computing, Next Generation Platforms for Intelligent Data Collection, In, pp 417\u2013444"},{"issue":"5","key":"10333_CR69","doi-asserted-by":"publisher","first-page":"1048","DOI":"10.1109\/TIP.2009.2014261","volume":"18","author":"D Persson","year":"2009","unstructured":"Persson D, Eriksson T (2009) Mixture model- and least squares-based packet video error concealment. IEEE Trans Image Process 18(5):1048\u20131054","journal-title":"IEEE Trans Image Process"},{"issue":"2","key":"10333_CR70","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1109\/TIP.2007.914151","volume":"17","author":"D Persson","year":"2008","unstructured":"Persson D, Eriksson T, Hedelin P (2008) Packet video error concealment with Gaussian mixture models. IEEE Trans Image Process 17(2):145\u2013154","journal-title":"IEEE Trans Image Process"},{"issue":"1","key":"10333_CR71","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1049\/ip-vis:20045225","volume":"153","author":"W Pongpadpinit","year":"2006","unstructured":"Pongpadpinit W, Pearmain A (2006) Recovery of motion vectors for error concealment based on an edge-detection approach. IEE Proc-Vis Image Signal Process 153(1):63\u201369","journal-title":"IEE Proc-Vis Image Signal Process"},{"key":"10333_CR72","first-page":"380","volume-title":"Video error concealment using deep neural networks","author":"SA Punjabi","year":"2018","unstructured":"Punjabi SA, Katsaggelos AK (2018) Video error concealment using deep neural networks. In Proceedings of the IEEE International Conference on Image Processing, Athens, Greece, pp 380\u2013384"},{"issue":"4","key":"10333_CR73","doi-asserted-by":"publisher","first-page":"1013","DOI":"10.1109\/TCE.2003.1261189","volume":"49","author":"J-Y Pyun","year":"2003","unstructured":"Pyun J-Y, Lee J-S, Jeong J-W, Jeong J-H, Ko S-J (2003) Robust error concealment for visual communications in burst-packet-loss networks. IEEE Trans Consumer Electron 49(4):1013\u20131019","journal-title":"IEEE Trans Consumer Electron"},{"issue":"4","key":"10333_CR74","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1109\/TMM.2009.2017609","volume":"11","author":"X Qian","year":"2009","unstructured":"Qian X, Liu G, Wang H (2009) Recovering connected error region based on adaptive error concealment order determination. IEEE Trans Multimedia 11(4):683\u2013695","journal-title":"IEEE Trans Multimedia"},{"issue":"2","key":"10333_CR75","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/s11760-014-0743-3","volume":"10","author":"AG Radmehr","year":"2016","unstructured":"Radmehr AG (2016) Error concealment via particle filter by Gaussian mixture modeling of motion vectors for H.264\/AVC. SIViP 10(2):311\u2013318","journal-title":"SIViP"},{"key":"10333_CR76","doi-asserted-by":"publisher","first-page":"39852","DOI":"10.1109\/ACCESS.2019.2907157","volume":"7","author":"WU Rahman","year":"2019","unstructured":"Rahman WU, Choi Y-S, Chung K (2019) Performance evaluation of video streaming application over CoAP in IoT. IEEE Access 7:39852\u201339861","journal-title":"IEEE Access"},{"issue":"6","key":"10333_CR77","doi-asserted-by":"publisher","first-page":"1129","DOI":"10.1109\/49.848263","volume":"18","author":"P Salama","year":"2000","unstructured":"Salama P, Shroff NB, Delp EJ (2000) Error concealment in MPEG video streams over ATM networks. IEEE Journal on Selected Areas in Communications 18(6):1129\u20131144","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"2","key":"10333_CR78","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1109\/TIP.2005.863090","volume":"15","author":"GM Schuster","year":"2006","unstructured":"Schuster GM, Katsaggelos AK (2006) Motion compensated shape error concealment. IEEE Trans Image Process 15(2):501\u2013510","journal-title":"IEEE Trans Image Process"},{"issue":"4","key":"10333_CR79","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1109\/TBC.2010.2058030","volume":"56","author":"K Seth","year":"2010","unstructured":"Seth K, Kamakoti V, Srinivasan S (2010) Efficient motion vector recovery algorithm for H.264 using B-spline approximation. IEEE Trans Broadcast 56(4):467\u2013480","journal-title":"IEEE Trans Broadcast"},{"issue":"2","key":"10333_CR80","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/TMM.2003.811624","volume":"5","author":"T Shanableh","year":"2003","unstructured":"Shanableh T, Ghanbari M (2003) Loss concealment using b-pictures motion information. IEEE Trans Multimedia 5(2):257\u2013266","journal-title":"IEEE Trans Multimedia"},{"issue":"6","key":"10333_CR81","doi-asserted-by":"publisher","first-page":"1122","DOI":"10.1109\/49.848261","volume":"18","author":"S Shirani","year":"2000","unstructured":"Shirani S, Kossentini F, Ward R (2000) A concealment method for video communications in an error-prone environment. IEEE Journal On Selected Areas In Communications 18(6):1122\u20131128","journal-title":"IEEE Journal On Selected Areas In Communications"},{"issue":"3","key":"10333_CR82","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1109\/6046.865483","volume":"2","author":"S Shirani","year":"2000","unstructured":"Shirani S, Erol B, Kossentin F (2000) A concealment method for shape information in MPEG-4 coded video sequences. IEEE Transactions on Multimedia 2(3):185\u2013190","journal-title":"IEEE Transactions on Multimedia"},{"issue":"2","key":"10333_CR83","doi-asserted-by":"publisher","first-page":"704","DOI":"10.1109\/TCE.2007.381749","volume":"53","author":"K Song","year":"2007","unstructured":"Song K, Chung T, Kim Y, Oh Y, Kim CS (2007) Error concealment of H.264\/AVC video frames for Mobile video broadcasting. IEEE Trans Consum Electron 53(2):704\u2013711","journal-title":"IEEE Trans Consum Electron"},{"issue":"4","key":"10333_CR84","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1109\/TBC.2002.806797","volume":"48","author":"JW Suh","year":"2002","unstructured":"Suh JW, Ho YS (2002) Error Concealment Techniques for Digital TV. IEEE Trans Broadcast 48(4):299\u2013306","journal-title":"IEEE Trans Broadcast"},{"issue":"12","key":"10333_CR85","doi-asserted-by":"publisher","first-page":"1648","DOI":"10.1109\/TCSVT.2012.2221191","volume":"22","author":"GJ Sullivan","year":"2012","unstructured":"Sullivan GJ, Ohm J-R, Han W-J, Wiegand T (2012) Overview of the high efficiency video coding (HEVC) standard. IEEE Trans Circuits Syst Video Technol 22(12):1648\u20131667","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"10333_CR86","doi-asserted-by":"crossref","unstructured":"Topiwala P, Krishnan M, Dai W (2019) Performance comparison of VVC, AV1 and EVC. Proc. SPIE Vol. 11137, applications of digital image processing XLII, document 1113715, San Diego, California. USA","DOI":"10.1117\/12.2530559"},{"issue":"4","key":"10333_CR87","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1109\/76.845010","volume":"10","author":"S Tsekeridou","year":"2000","unstructured":"Tsekeridou S, Pitas I (2000) MPEG-2 error concealment based on block-matching principles. IEEE Trans Circuits Syst Video Technol 10(4):646\u2013658","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"6","key":"10333_CR88","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1109\/TCSVT.2002.800318","volume":"12","author":"DS Turaga","year":"2002","unstructured":"Turaga DS, Chen T (2002) Model-based error concealment for wireless video. IEEE Transactions on Circuits and Systems for Video Technology 12(6):483\u2013495","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"10333_CR89","doi-asserted-by":"crossref","unstructured":"Usman M, He X, Xu M, Lam K (2015) Survey of error concealment techniques: research directions and open issues. IEEE Picture Coding Symposium:233\u2013238","DOI":"10.1109\/PCS.2015.7170081"},{"issue":"5","key":"10333_CR90","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1109\/TMM.2016.2537200","volume":"18","author":"M Usman","year":"2016","unstructured":"Usman M, He X, Lam KM, Xu M, Bokhari SMM, Chen J (2016) Frame interpolation for cloud-based Mobile video streaming. IEEE Transactions on Multimedia 18(5):831\u2013839","journal-title":"IEEE Transactions on Multimedia"},{"issue":"5","key":"10333_CR91","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1109\/49.32344","volume":"7","author":"M Wada","year":"1989","unstructured":"Wada M (1989) Selective recovery of video packet loss using error concealment. IEEE Journal on Selected Areas in Communications 7(5):807\u2013814","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"5","key":"10333_CR92","doi-asserted-by":"publisher","first-page":"974","DOI":"10.1109\/5.664283","volume":"86","author":"Y Wang","year":"1998","unstructured":"Wang Y, Zhu QF (1998) Error control and concealment for video communication: a review. Proc IEEE 86(5):974\u2013997","journal-title":"Proc IEEE"},{"issue":"4","key":"10333_CR93","first-page":"61","volume":"1","author":"Y Wang","year":"2000","unstructured":"Wang Y, Wenger S, Wen J, Katsaggelos AK (2000) Review of error resilient coding techniques for real-time video communications. IEEE signal process. Mag. 1(4):61\u201382","journal-title":"Mag."},{"key":"10333_CR94","first-page":"729","volume":"2","author":"Y Wang","year":"2002","unstructured":"Wang Y, Hannuksela MM, Varsa V, Hourunranta A, Gabbouj M (2002) The error concealment feature in the H.26L test model. In Proc. Int. Conf. Image Processing 2:729\u2013732","journal-title":"Image Processing"},{"issue":"1","key":"10333_CR95","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/JPROC.2004.839618","volume":"93","author":"Y Wang","year":"2005","unstructured":"Wang Y, Reibman A, Lin S (2005) Multiple description coding for video delivery. Proc IEEE 93(1):57\u201370","journal-title":"Proc IEEE"},{"key":"10333_CR96","unstructured":"Wu Z, Boyce J (2006) An error concealment scheme for entire frame losses based on H.264\/AVC. in Proc. ISCAS\u201906, Island of Kos, Greece: 4463\u20134466"},{"issue":"4","key":"10333_CR97","doi-asserted-by":"publisher","first-page":"1880","DOI":"10.1109\/TCE.2008.4711249","volume":"54","author":"J Wu","year":"2008","unstructured":"Wu J, Liu X, Yoo KY (2008) A temporal error concealment method for H.264\/AVC using motion vector recovery. IEEE Trans Consum Electron 54(4):1880\u20131885","journal-title":"IEEE Trans Consum Electron"},{"key":"10333_CR98","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2019.8683622","volume-title":"Generative adversarial networks based error concealment for low resolution video","author":"J Xiang","year":"2019","unstructured":"Xiang J, Xu C, Yan Q, Peng XW (2019) Generative adversarial networks based error concealment for low resolution video. IEEE International Conference On Acoustics, Speech And Signal Processing (ICASSP)"},{"issue":"4","key":"10333_CR99","doi-asserted-by":"publisher","first-page":"1135","DOI":"10.1109\/TCE.2004.1362510","volume":"50","author":"Y Xu","year":"2004","unstructured":"Xu Y, Zhou Y (2004) H.264 video communication based refined error concealment schemes. IEEE Trans Consum Electron 50(4):1135\u20131141","journal-title":"IEEE Trans Consum Electron"},{"issue":"4","key":"10333_CR100","doi-asserted-by":"publisher","first-page":"1846","DOI":"10.1109\/TCE.2008.4711244","volume":"54","author":"Y Xu","year":"2008","unstructured":"Xu Y, Zhou Y (2008) Adaptive temporal error concealment scheme for H.264\/AVC video decoder. IEEE Trans Consum Electron 54(4):1846\u20131851","journal-title":"IEEE Trans Consum Electron"},{"issue":"1","key":"10333_CR101","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1109\/TIP.2009.2032311","volume":"19","author":"B Yan","year":"2009","unstructured":"Yan B, Gharavi H (2009) A hybrid frame concealment algorithm for H.264\/AVC. IEEE Trans Image Process 19(1):98\u2013107","journal-title":"IEEE Trans Image Process"},{"key":"10333_CR102","doi-asserted-by":"crossref","unstructured":"Yu W, Sun H G. He and Z. Zhang (2017) a multi-step temporal error concealment method. International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS)","DOI":"10.1109\/ISPACS.2017.8266461"},{"issue":"2","key":"10333_CR103","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1109\/TIP.2003.809003","volume":"12","author":"Y Zhang","year":"2003","unstructured":"Zhang Y, Ma KK (2003) Error concealment for video transmission with dual multiscale Markov random field modeling. IEEE Trans Image Process 12(2):236\u2013242","journal-title":"IEEE Trans Image Process"},{"issue":"4","key":"10333_CR104","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1109\/76.845011","volume":"10","author":"J Zhang","year":"2000","unstructured":"Zhang J, Arnold JF, Frater MR (2000) A cell-loss concealment technique for MPEG-2 coded video. IEEE Transactions on Circuits and Systems for Video Technology 10(4):659\u2013665","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"1","key":"10333_CR105","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/TCSVT.2011.2130450","volume":"22","author":"Y Zhang","year":"2012","unstructured":"Zhang Y, Xiang X, Zhao D, Ma S, Gao W (2012) Packet video error concealment with auto regressive model. IEEE Trans Circuits Syst Video Technol 22(1):12\u201327","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"10333_CR106","unstructured":"Zhao C, Ma S, Zhang J, Gao W (2013) A highly effective error concealment method for whole frame loss. IEEE international symposium on circuits and systems (ISCAS), Beijing, China"},{"key":"10333_CR107","unstructured":"Zheng J, Chau LP (2004) A temporal error concealment algorithm for H.264\/AVC using Lagrange interpolation. In Int. Symp. Circuits Syst (ISCAS):133\u2013136"},{"issue":"6","key":"10333_CR108","doi-asserted-by":"publisher","first-page":"801","DOI":"10.1109\/TMM.2004.837246","volume":"6","author":"J Zheng","year":"2004","unstructured":"Zheng J, Chau LP (2004) Error-concealment algorithm for H.26L using first-order plane estimation. IEEE Transactions on Multimedia 6(6):801\u2013805","journal-title":"IEEE Transactions on Multimedia"},{"issue":"3","key":"10333_CR109","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1109\/TMM.2005.843343","volume":"7","author":"J Zheng","year":"2005","unstructured":"Zheng J, Chau L-P (2005) Efficient motion vector recovery algorithm for H.264 based on a polynomial model. IEEE Trans Multimedia 7(3):507\u2013513","journal-title":"IEEE Trans Multimedia"},{"key":"10333_CR110","doi-asserted-by":"crossref","unstructured":"Zhiliang X, Zhiheng Z, Weijun L (2009) Fuzzy optical flow using in error concealment. International Conference on Fuzzy Systems and Knowledge Discovery","DOI":"10.1109\/FSKD.2009.11"},{"issue":"1","key":"10333_CR111","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/TBC.2010.2086771","volume":"57","author":"J Zhou","year":"2011","unstructured":"Zhou J, Yan B, Gharavi H (2011) Efficient motion vector interpolation for error concealment of H.264\/AVC. IEEE Trans Broadcast 57(1):75\u201380","journal-title":"IEEE Trans Broadcast"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10333-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-10333-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-10333-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,17]],"date-time":"2023-10-17T13:36:26Z","timestamp":1697549786000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-10333-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,12]]},"references-count":111,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["10333"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-10333-6","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,12]]},"assertion":[{"value":"2 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 December 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 December 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}