{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,14]],"date-time":"2025-04-14T04:26:02Z","timestamp":1744604762327},"reference-count":26,"publisher":"Elsevier BV","issue":"6-8","license":[{"start":{"date-parts":[[1999,5,1]],"date-time":"1999-05-01T00:00:00Z","timestamp":925516800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Signal Processing: Image Communication"],"published-print":{"date-parts":[[1999,5]]},"DOI":"10.1016\/s0923-5965(98)00061-7","type":"journal-article","created":{"date-parts":[[2002,7,26]],"date-time":"2002-07-26T00:20:51Z","timestamp":1027642851000},"page":"473-492","source":"Crossref","is-referenced-by-count":46,"title":["Error concealment algorithms for compressed video"],"prefix":"10.1016","volume":"14","author":[{"given":"Min-Cheol","family":"Hong","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Harald","family":"Schwab","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lisimachos P.","family":"Kondi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aggelos K.","family":"Katsaggelos","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"key":"10.1016\/S0923-5965(98)00061-7_BIB1","doi-asserted-by":"crossref","unstructured":"G.L. Anderson, A.N. Netravali, Image restoration based on a subjective criterion, IEEE Trans. System Man Cybernet. SMC-6 (December 1976) 845\u2013853.","DOI":"10.1109\/TSMC.1976.4309481"},{"key":"10.1016\/S0923-5965(98)00061-7_BIB2","doi-asserted-by":"crossref","unstructured":"S.L. Blake, S.A. Rajala, F. Gong, T.L. Mitchell, Efficient techniques for two-layer coding of video sequences, in: IEEE Proc. Internat. Conf. on Image Processing, Vol. 3, November 1994, pp. 253\u2013257.","DOI":"10.1109\/ICIP.1994.413314"},{"key":"10.1016\/S0923-5965(98)00061-7_BIB3","unstructured":"CCITT Draft Revision of Recommendation H.261, Video codec for audiovisual services at p\u00d7 64 kbits\/s, June 1989."},{"issue":"3","key":"10.1016\/S0923-5965(98)00061-7_BIB4","doi-asserted-by":"crossref","first-page":"560","DOI":"10.1109\/76.585936","article-title":"Error concealment of lost motion vectors with overlapped motion compensation","volume":"7","author":"Chen","year":"1997","journal-title":"IEEE Trans. Circuits Systems Video Technol."},{"key":"10.1016\/S0923-5965(98)00061-7_BIB5","unstructured":"H. Feichtinger, K. Grochenig, Wavelets: Mathematics and Application, CRC Press, Boca Raton, FL, 1994."},{"issue":"3","key":"10.1016\/S0923-5965(98)00061-7_BIB6","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1109\/76.224234","article-title":"Cell-loss concealment in atm video codecs","volume":"3","author":"Ghanbari","year":"1993","journal-title":"IEEE Trans. Circuits Systems Video Technol."},{"key":"10.1016\/S0923-5965(98)00061-7_BIB7","doi-asserted-by":"crossref","unstructured":"P. Haskell, D. Messerschmitt, Resynchronization of motion compensated video affected by atm cell loss, in: IEEE Proc. Internat. Conf. on Acoust. Speech and Signal Processing, March 1992, pp. 545\u2013548.","DOI":"10.1109\/ICASSP.1992.226155"},{"key":"10.1016\/S0923-5965(98)00061-7_BIB8","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1117\/12.251262","article-title":"An iterative regularized error concealment algorithm","volume":"2952","author":"Hong","year":"1996","journal-title":"SPIE Proc."},{"issue":"9","key":"10.1016\/S0923-5965(98)00061-7_BIB9","doi-asserted-by":"crossref","first-page":"805","DOI":"10.1109\/TC.1973.5009169","article-title":"The application of constraint least squares estimation to image restoration by digital computer","volume":"22","author":"Hunt","year":"1973","journal-title":"IEEE Trans. Computers"},{"key":"10.1016\/S0923-5965(98)00061-7_BIB10","unstructured":"ITU-T, Draft ITU-T Recommendation H.263, December 1995."},{"key":"10.1016\/S0923-5965(98)00061-7_BIB11","unstructured":"Joint Photographic Expert Group, JPEG Technical Specification, Revision 8, August 1990."},{"issue":"5","key":"10.1016\/S0923-5965(98)00061-7_BIB12","doi-asserted-by":"crossref","first-page":"594","DOI":"10.1109\/83.382494","article-title":"General choice of the regularization functional in regularized image restoration","volume":"4","author":"Kang","year":"1995","journal-title":"IEEE Trans. Image Processing"},{"issue":"7","key":"10.1016\/S0923-5965(98)00061-7_BIB13","doi-asserted-by":"crossref","first-page":"735","DOI":"10.1117\/12.7977030","article-title":"Iterative image restoration algorithms","volume":"28","author":"Katsaggelos","year":"1989","journal-title":"Opt. Eng."},{"issue":"4","key":"10.1016\/S0923-5965(98)00061-7_BIB14","doi-asserted-by":"crossref","first-page":"914","DOI":"10.1109\/78.80914","article-title":"A regularized iterative image restoration algorithm","volume":"39","author":"Katsaggelos","year":"1991","journal-title":"IEEE Trans. Signal Process."},{"key":"10.1016\/S0923-5965(98)00061-7_BIB15","unstructured":"A.K. Katsaggelos, F. Ishtiaq, L.P. Kondi, M.-C. Hong, M. Banham, J. Brailean, Error resilience and concealment in video coding, in: Proc. European Signal Processing Conf., Rhodes, Greece, 1998, pp. 221\u2013228."},{"issue":"5","key":"10.1016\/S0923-5965(98)00061-7_BIB16","first-page":"535","article-title":"An error concealment algorithm for images subject to channel errors","volume":"4","author":"Lam","year":"1995","journal-title":"IEEE Trans. Image Processing"},{"key":"10.1016\/S0923-5965(98)00061-7_BIB17","doi-asserted-by":"crossref","unstructured":"W. Lam, A.R. Reibman, B. Liu, Recovery of lost or errorneously received motion vectors, in: IEEE Proc. Internat. Conf. on Acoustics Speech and Signal Processing, Vol. 5, 1993, pp. 417\u2013420.","DOI":"10.1109\/ICASSP.1993.319836"},{"key":"10.1016\/S0923-5965(98)00061-7_BIB18","unstructured":"Motion Picture Experts Group, MPEG video simulation model 3 (SM3), July 1990."},{"key":"10.1016\/S0923-5965(98)00061-7_BIB19","doi-asserted-by":"crossref","unstructured":"P. Salama, N. Shroff, E.J. Delp, A bayesian approach to error concealment in encoded video streams, in: IEEE Proc. Internat. Conf. on Image Processing, 1996, pp. 49\u201352.","DOI":"10.1109\/ICIP.1996.560598"},{"key":"10.1016\/S0923-5965(98)00061-7_BIB20","doi-asserted-by":"crossref","unstructured":"P. Salama, N.B. Shroff, E.J. Coyle, E. Delp, Error concealment techniques for encoded video streams, in: IEEE Proc. Internat. Conf. on Image Processing, 1995, pp. 9\u201312.","DOI":"10.1109\/ICIP.1995.529026"},{"issue":"4","key":"10.1016\/S0923-5965(98)00061-7_BIB21","doi-asserted-by":"crossref","first-page":"540","DOI":"10.1109\/83.563319","article-title":"Computationally attractive reconstruction of band limited images from irregular samples","volume":"6","author":"Strohmer","year":"1997","journal-title":"IEEE Trans. Image Processing"},{"issue":"4","key":"10.1016\/S0923-5965(98)00061-7_BIB22","doi-asserted-by":"crossref","first-page":"470","DOI":"10.1109\/83.370675","article-title":"Concealment of damaged block transform coded images using projection onto convex sets","volume":"4","author":"Sun","year":"1995","journal-title":"IEEE Trans. Image Processing"},{"key":"10.1016\/S0923-5965(98)00061-7_BIB23","doi-asserted-by":"crossref","unstructured":"A.S. Tom, C. Lung, F. Chu, Packet video for cell-loss protection using deinterleaving and scrambling, in: IEEE Proc. Internat. Conf. on Acoustics Speech and Signal Processing, May 1991, pp. 2857\u20132860.","DOI":"10.1109\/ICASSP.1991.150998"},{"issue":"9","key":"10.1016\/S0923-5965(98)00061-7_BIB24","doi-asserted-by":"crossref","first-page":"1623","DOI":"10.1109\/49.12890","article-title":"The impact of the atm concept on video coding","volume":"6","author":"Verbiest","year":"1988","journal-title":"IEEE J. Selected Areas Commun."},{"issue":"5","key":"10.1016\/S0923-5965(98)00061-7_BIB25","doi-asserted-by":"crossref","first-page":"807","DOI":"10.1109\/49.32344","article-title":"Selective recovery of video packet loss using error concealment","volume":"7","author":"Wada","year":"1988","journal-title":"IEEE J. Selective Areas Commun."},{"issue":"3","key":"10.1016\/S0923-5965(98)00061-7_BIB26","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1109\/76.224235","article-title":"Coding and cell-loss recovery in dct-based packet video","volume":"3","author":"Zhu","year":"1993","journal-title":"IEEE Trans. Circuits Systems Video Technol."}],"container-title":["Signal Processing: Image Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0923596598000617?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0923596598000617?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,2,4]],"date-time":"2020-02-04T16:44:44Z","timestamp":1580834684000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0923596598000617"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,5]]},"references-count":26,"journal-issue":{"issue":"6-8","published-print":{"date-parts":[[1999,5]]}},"alternative-id":["S0923596598000617"],"URL":"https:\/\/doi.org\/10.1016\/s0923-5965(98)00061-7","relation":{},"ISSN":["0923-5965"],"issn-type":[{"value":"0923-5965","type":"print"}],"subject":[],"published":{"date-parts":[[1999,5]]}}}