{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,21]],"date-time":"2025-04-21T04:43:00Z","timestamp":1745210580660},"reference-count":25,"publisher":"Elsevier BV","issue":"1-2","license":[{"start":{"date-parts":[[1999,9,1]],"date-time":"1999-09-01T00:00:00Z","timestamp":936144000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Signal Processing: Image Communication"],"published-print":{"date-parts":[[1999,9]]},"DOI":"10.1016\/s0923-5965(99)00024-7","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T13:26:40Z","timestamp":1027603600000},"page":"57-76","source":"Crossref","is-referenced-by-count":20,"title":["Error concealment in video transmission over packet networks by a sketch-based approach"],"prefix":"10.1016","volume":"15","author":[{"given":"Luigi","family":"Atzori","sequence":"first","affiliation":[]},{"given":"Francesco G.B","family":"De Natale","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0923-5965(99)00024-7_BIB1","doi-asserted-by":"crossref","unstructured":"R. Aravind, M.R. Civanlar, A.R. Reibman, Packet loss resilience of MPEG-2 scalable video coding algorithms, IEEE Trans. Circuits Systems Video Technol. 6 (5) (October 1996) 426\u2013435.","DOI":"10.1109\/76.538925"},{"key":"10.1016\/S0923-5965(99)00024-7_BIB2","doi-asserted-by":"crossref","unstructured":"J. Canny, A computational approach to edge detection, IEEE Trans. Pattern Anal. Mach. Intell. 8 (6) (November 1986) 679\u2013698.","DOI":"10.1109\/TPAMI.1986.4767851"},{"key":"10.1016\/S0923-5965(99)00024-7_BIB3","doi-asserted-by":"crossref","unstructured":"S. Carlsson, Sketch based coding of grey level images, Signal Processing 15 (July 1988) 57\u201383.","DOI":"10.1016\/0165-1684(88)90028-X"},{"key":"10.1016\/S0923-5965(99)00024-7_BIB4","doi-asserted-by":"crossref","unstructured":"M. Ghanbari, Two layer coding of video signals for VBR networks, IEEE J. Select. Areas Commun. 7 (5) (June 1989) 771\u2013781.","DOI":"10.1109\/49.32340"},{"key":"10.1016\/S0923-5965(99)00024-7_BIB5","doi-asserted-by":"crossref","unstructured":"M. Ghanbari, Postprocessing of late cells for packet video IEEE Trans. Circuits Systems Video Technol. 6 (6) (December 1996) 669\u2013678.","DOI":"10.1109\/76.544738"},{"key":"10.1016\/S0923-5965(99)00024-7_BIB6","series-title":"Integrated Broadband Networks\u2013An Introduction to ATM-Based Networks","author":"Handel","year":"1991"},{"key":"10.1016\/S0923-5965(99)00024-7_BIB7","doi-asserted-by":"crossref","unstructured":"R.M. Haralick, Digital step edges from zero crossing of second directional derivatives, IEEE Trans. Pattern Anal. Mach. Intell. 6 (1) (January 1984) 58\u201368.","DOI":"10.1109\/TPAMI.1984.4767475"},{"key":"10.1016\/S0923-5965(99)00024-7_BIB8","doi-asserted-by":"crossref","unstructured":"L. H\u00e9rault, R. Horaud, Figure-ground discrimination: a combinatorial optimization approach, IEEE Trans. Pattern Anal. Mach. Intell. 15 (9) (September 1993) 899\u2013914.","DOI":"10.1109\/34.232076"},{"key":"10.1016\/S0923-5965(99)00024-7_BIB9","doi-asserted-by":"crossref","unstructured":"T.H. Hong, M. Shneier, A. Rosenfeld, Border extraction using linked edge pyramids, IEEE Trans. Systems Man and Cybernet. 12 (5) (September\u2013October 1982) 660\u2013668.","DOI":"10.1109\/TSMC.1982.4308886"},{"key":"10.1016\/S0923-5965(99)00024-7_BIB10","doi-asserted-by":"crossref","unstructured":"D.P. Huttenlocher, P.C. Wayner, Finding convex edge grouping in an image, Internat. J. Comput. Vision 8 (1) (July 1992) 7\u201327.","DOI":"10.1007\/BF00126398"},{"key":"10.1016\/S0923-5965(99)00024-7_BIB11","doi-asserted-by":"crossref","unstructured":"Y. Itoh, An edge-oriented progressive image coding, IEEE Trans. Circuits Systems Video Technol. 6 (2) (April 1996) 135\u2013142.","DOI":"10.1109\/76.488821"},{"key":"10.1016\/S0923-5965(99)00024-7_BIB12","doi-asserted-by":"crossref","unstructured":"D.W. Jacobs, Robust and efficient detection of salient convex group, IEEE Trans. Pattern Anal. Mach. Intell. 18 (1) (January 1996) 23\u201337.","DOI":"10.1109\/34.476008"},{"key":"10.1016\/S0923-5965(99)00024-7_BIB13","doi-asserted-by":"crossref","unstructured":"L.H. Kieu, K.N. Ngan, Cell-loss concealment techniques for layered video codecs in an ATM network, IEEE Trans. Image Process. 3 (5) (September 1994) 666\u2013677.","DOI":"10.1109\/83.334978"},{"key":"10.1016\/S0923-5965(99)00024-7_BIB14","doi-asserted-by":"crossref","unstructured":"M. Kunt, A. Ikonomopoulos, M. Kocher, Second-generation image-coding techniques, Proc. IEEE 73 (4) (April 1985) 549\u2013574.","DOI":"10.1109\/PROC.1985.13184"},{"key":"10.1016\/S0923-5965(99)00024-7_BIB15","doi-asserted-by":"crossref","unstructured":"X. Lee, Y.-Q. Zhang, A. Leon-Garcia, Information loss recovery for block-based image coding techniques \u2013 A fuzzy logic approach, IEEE Trans. Image Process. 4 (3) (March 1995) 259\u2013273.","DOI":"10.1109\/83.366475"},{"key":"10.1016\/S0923-5965(99)00024-7_BIB16","first-page":"145","article-title":"Theory of edge detection","volume":"16","author":"Marr","year":"1980","journal-title":"Appl. Opt."},{"key":"10.1016\/S0923-5965(99)00024-7_BIB17","series-title":"MPEG Video Compression Standard","author":"Mitchell","year":"1997"},{"key":"10.1016\/S0923-5965(99)00024-7_BIB18","doi-asserted-by":"crossref","unstructured":"R. Mohan, R. Nevatia, Perceptual organization for scene segmentation and description, IEEE Trans. Pattern Anal. Mach. Intell. 14 (6) (June 1992) 616\u2013635.","DOI":"10.1109\/34.141553"},{"key":"10.1016\/S0923-5965(99)00024-7_BIB19","doi-asserted-by":"crossref","unstructured":"J.W. Park, J.W. Kim, S.U. Lee, DCT coefficients recovery-based error concealment technique and its application to the MPEG-2 bit stream error, IEEE Trans. Circuits Systems Video Technol. 7 (6) (December 1997) 845\u2013854.","DOI":"10.1109\/76.644064"},{"key":"10.1016\/S0923-5965(99)00024-7_BIB20","series-title":"JPEG Still Image Data Compression Standard","author":"Pennebaker","year":"1992"},{"key":"10.1016\/S0923-5965(99)00024-7_BIB21","doi-asserted-by":"crossref","unstructured":"M.O. Shneier, Extracting linear features from images using pyramids, IEEE Trans Systems Man Cybernet. 12 (4) (July\u2013August 1982) 569\u2013572.","DOI":"10.1109\/TSMC.1982.4308865"},{"key":"10.1016\/S0923-5965(99)00024-7_BIB22","doi-asserted-by":"crossref","unstructured":"H. Sun, W. Kwok, Concealment of damaged block transform coded images using projections onto convex sets, IEEE Trans. Image Process. 4 (4) (April 1995) 470\u2013477.","DOI":"10.1109\/83.370675"},{"key":"10.1016\/S0923-5965(99)00024-7_BIB23","doi-asserted-by":"crossref","unstructured":"H. Sun, J.W. Zdepski, W. Kwok, D. Raychaudhuri, Error concealment algorithms for robust decoding of MPEG compressed video, Signal Processing: Image Communication 10 (4) (September 1997) 249\u2013268.","DOI":"10.1016\/S0923-5965(96)00023-9"},{"key":"10.1016\/S0923-5965(99)00024-7_BIB24","doi-asserted-by":"crossref","unstructured":"I-W. Tsai, C.-L. Huang, Hybrid cell loss concealment methods for MPEG-II-based packet video, Signal Processing: Image Communication 9 (2) (January 1997) 99\u2013124.","DOI":"10.1016\/0923-5965(95)00013-5"},{"key":"10.1016\/S0923-5965(99)00024-7_BIB25","doi-asserted-by":"crossref","unstructured":"Y. Wang, Q.F. Zhu, L. Shaw, Maximally smooth image recovery in transform coding, IEEE Trans. Commun. 41 (10) (October 1993) 1544\u20131551.","DOI":"10.1109\/26.237889"}],"container-title":["Signal Processing: Image Communication"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0923596599000247?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0923596599000247?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T12:28:21Z","timestamp":1556540901000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0923596599000247"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,9]]},"references-count":25,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[1999,9]]}},"alternative-id":["S0923596599000247"],"URL":"https:\/\/doi.org\/10.1016\/s0923-5965(99)00024-7","relation":{},"ISSN":["0923-5965"],"issn-type":[{"value":"0923-5965","type":"print"}],"subject":[],"published":{"date-parts":[[1999,9]]}}}