<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462006000100006</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Spatial Error Concealment Based on Bezier Curves]]></article-title>
<article-title xml:lang="es"><![CDATA[Ocultamiento de Errores Espacial Mediante Curvas de Bezier]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Hasimoto-Beltrá n]]></surname>
<given-names><![CDATA[Rogelio]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Khokhar]]></surname>
<given-names><![CDATA[Ashfaq A]]></given-names>
</name>
<xref ref-type="aff" rid="A02"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Centro de Investigación en Matemáticas  ]]></institution>
<addr-line><![CDATA[Guanajuato Gto]]></addr-line>
<country>México</country>
</aff>
<aff id="A02">
<institution><![CDATA[,University of Illinois at Chicago Departments of Computer Sciences and Electrical and Computer Engineering ]]></institution>
<addr-line><![CDATA[Chicago IL]]></addr-line>
<country>USA</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>03</month>
<year>2006</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>03</month>
<year>2006</year>
</pub-date>
<volume>9</volume>
<numero>3</numero>
<fpage>256</fpage>
<lpage>269</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462006000100006&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462006000100006&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462006000100006&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[We present a geometric error concealment scheme for Discrete Cosine Transform (DCT) based image/video data based on the Bezier Curves (BC). Our scheme unlike the original proposal of Zeng and Liu, 1999, makes use of the average edge direction and local curvature (extracted from healthy blocks around the damaged block) as boundary conditions to create an n-degree BC. The BC is then used to interpolate the edge of the lost block (8x8 pixels), as well as to directionally reconstruct its low frequency data. In those cases where more than one edge is found to cross the lost area, a cost function defined in terms of the local and global edge curvature is used to find their best match. Results show that our approach provides an almost perfect reconstruction and excellent subjective quality of the restored data, outperforming current linear interpolations schemes in the literature.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[Se presenta un esquema nuevo para el ocultamiento de errores de transmisión (pérdidas de paquetes) en imágenes y video basado en las Curvas de Bezier (BC). El esquema propuesto a diferencia de la propuesta original de Zeng y Liu, 1999, hace uso de la dirección promedio de los bordes y curvatura local alrededor de la zona dañada como condiciones de frontera para crear una curva de Bezier de grado n. La BC es usada para interpolar los bordes del bloque perdido (8x8 pixels), así como también para la reconstrucción de la información correspondiente a las bajas frecuencias. En casos donde más de un borde atraviesa la zona dañada, se propone una función de costo en términos de sus curvaturas local y global para encontrar sus correspondientes pares y proceder con el proceso de interpolación (reconstrucción) de la información perdida. Los resultados muestran que nuestro esquema reconstruye casi perfectamente la información perdida (durante la transmisión) lo que repercute en una excelente calidad subjetiva de la imagen/video reconstruido. Nuestro esquema es muy superior a los interpoladores lineales encontrados en la literatura.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Error Concealment]]></kwd>
<kwd lng="en"><![CDATA[DCT-based compression]]></kwd>
<kwd lng="en"><![CDATA[Bezier Curves]]></kwd>
<kwd lng="es"><![CDATA[Ocultamiento de Errores]]></kwd>
<kwd lng="es"><![CDATA[Compresión basada en la DCT]]></kwd>
<kwd lng="es"><![CDATA[Curvas de Bezier]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[ <p align="justify"><font face="verdana" size="4">Art&iacute;culos</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="4"><b>Spatial Error Concealment Based on Bezier Curves</b></font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="4"><i>Ocultamiento de Errores Espacial Mediante Curvas de Bezier</i></font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="2"><b>Rogelio Hasimoto&#150;Beltr&aacute;n<sup>1</sup> and Ashfaq A. Khokhar<sup>2</sup></b></font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="2"><i>1 Centro de Investigaci&oacute;n en Matem&aacute;ticas &#150; CIMAT    <br> Jalisco s/n, Col. Mineral de Valenciana, Guanajuato, Gto., M&eacute;xico 36240    ]]></body>
<body><![CDATA[<br> Tel: +52&#150;(473)&#150;732&#150;7155 ext. 49636, Fax: +52&#150;(473)&#150;732&#150;5749</i>    <br> <a href="mailto:hasimoto@cimat.mx">hasimoto@cimat.mx</a></font></p>     <p align="center"><font face="verdana" size="2"><i>2 University of Illinois at Chicago,    <br> Departments of Computer Sciences and Electrical and Computer Engineering,    <br> 851 South Morgan Street, Chicago, IL 60607, USA</i>    <br> <a href="mailto:ashfaq@uic.edu">ashfaq@uic.edu</a></font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="2"><u>Article received on December 16, 2003; accepted on December 12, 2005 </u></font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Abstract</b></font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">We present a geometric error concealment scheme for Discrete Cosine Transform (DCT) based image/video data based on the Bezier Curves (BC). Our scheme unlike the original proposal of Zeng and Liu, 1999, makes use of the average edge direction and local curvature (extracted from healthy blocks around the damaged block) as boundary conditions to create an n&#150;degree BC. The BC is then used to interpolate the edge of the lost block (8x8 pixels), as well as to directionally reconstruct its low frequency data. In those cases where more than one edge is found to cross the lost area, a cost function defined in terms of the local and global edge curvature is used to find their best match. Results show that our approach provides an almost perfect reconstruction and excellent subjective quality of the restored data, outperforming current linear interpolations schemes in the literature.</font></p>     <p align="justify"><font face="verdana" size="2"><b>Keywords: </b>Error Concealment, DCT&#150;based compression, Bezier Curves.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Resumen</b></font></p>     <p align="justify"><font face="verdana" size="2">Se presenta un esquema nuevo para el ocultamiento de errores de transmisi&oacute;n (p&eacute;rdidas de paquetes) en im&aacute;genes y video basado en las Curvas de Bezier (BC). El esquema propuesto a diferencia de la propuesta original de Zeng y Liu, 1999, hace uso de la direcci&oacute;n promedio de los bordes y curvatura local alrededor de la zona da&ntilde;ada como condiciones de frontera para crear una curva de Bezier de grado <i>n. </i>La BC es usada para interpolar los bordes del bloque perdido (8x8 pixels), as&iacute; como tambi&eacute;n para la reconstrucci&oacute;n de la informaci&oacute;n correspondiente a las bajas frecuencias. En casos donde m&aacute;s de un borde atraviesa la zona da&ntilde;ada, se propone una funci&oacute;n de costo en t&eacute;rminos de sus curvaturas local y global para encontrar sus correspondientes pares y proceder con el proceso de interpolaci&oacute;n (reconstrucci&oacute;n) de la informaci&oacute;n perdida. Los resultados muestran que nuestro esquema reconstruye casi perfectamente la informaci&oacute;n perdida (durante la transmisi&oacute;n) lo que repercute en una excelente calidad subjetiva de la imagen/video reconstruido. Nuestro esquema es muy superior a los interpoladores lineales encontrados en la literatura.</font></p>     <p align="justify"><font face="verdana" size="2"><b>Palabras Clave: </b>Ocultamiento de Errores, Compresi&oacute;n basada en la DCT, Curvas de Bezier.</font></p>     <p align="justify">&nbsp;</p>     <p align="justify"><font face="verdana" size="2"><a href="/pdf/cys/v9n3/v9n3a6.pdf" target="_blank">DESCARGA ARTICULO EN FORMATO PDF</a></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Acknowledgement</b></font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">This work was supported by CONCYTEG (Consejo Estatal de Ciencia y Tecnolog&iacute;a de Guanjuato) under grant number 04&#150;02&#150;K117&#150;020.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>References</b></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">1. <b>Farin G., </b>"Curves and Surfaces for Computer Aided Geometric Design". <i>Computer Science and Scientific Computation, </i>Academic Press, Inc., New York, NY, 1993.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2040257&pid=S1405-5546200600010000600001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">2. <b>Hasimoto, R. B., </b>"Error Resilient Framework for Image/Video Transmission over Packet Switch Networks". Ph.D Thesis, <i>University of Delaware, </i>Sept. 2001.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2040258&pid=S1405-5546200600010000600002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">3. <b>Hemami, S. S. and T. H.&#150;Y Meng, </b>"Transform Coded Image Reconstruction Exploiting Interblock Correlation". <i>IEEE Trans. Image Processing, </i>Vol. 4, pp&#150;1023&#150;1027, July 1995.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2040259&pid=S1405-5546200600010000600003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">4. <b>Jung K.&#150;H., J.&#150;H. Chang, and W. Lee, </b>"Error Concealment Using Projection for Block&#150;Based Image Coding". <i>SPIE </i>Vol. 2308, pp. 1466&#150;1476, 1994.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2040260&pid=S1405-5546200600010000600004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">5. <b>Kwok W. and H. Sun, </b>"Multidirectional Interpolation for Spatial Error Concealment. IEEE Trans. Consumer Electron., Vol. 39, pp. 455&#150;460., August 1993.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2040261&pid=S1405-5546200600010000600005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">6. <b>Pei&#150;Chun C. T., and T. Chen, </b>"Second&#150;Generation Error Concealment for Video Transport Over Error Prone Channels. <i>ICIP </i>2002.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2040262&pid=S1405-5546200600010000600006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">7. <b>Posnak E. J., S. P. Gallindo, A.P. Stephens, and H.M. Vin, </b>Techniques for Resilient Transmission of JPEG Video Streams. <i>Proc. of Multimedia Computing and Networking, </i>pp. 243&#150;252, February 1995.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2040263&pid=S1405-5546200600010000600007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">8. <b>Salama P., N. B. Shroff, and E. J. Delp, </b>"Error Concealment in Encoded Video", <i>IEEE Journal on Selected Areas in Communications. , </i>Vol. 18, No. 6, June 2000, pp. 1129 &#150;114.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2040264&pid=S1405-5546200600010000600008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">9. <b>Shahram, S., Kossentini F., and Ward R., </b>An Adaptive Markov Random Field Based Error Concealment Method for Video Communication in an Error Prone Environment. <i>IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP) </i>1999.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2040265&pid=S1405-5546200600010000600009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">10. <b>Wang Y., Q&#150;F. Zhu, and L. Shaw, </b>"Maximally Smooth Recovery in Transform Coding. <i>IEEE Trans. Commun., </i>Vol. 41, No. 10, 1993, pp. 1544&#150;1551.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2040266&pid=S1405-5546200600010000600010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">11. <b>Zeng W. and B. Liu, </b>"Geometric&#150;Structure&#150;based Error Concealment with Novel Applications in Block&#150;based Low Bit Rate Coding". <i>IEEE Trans. Circuits and Systems for Video Tech., </i>June 1999.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2040267&pid=S1405-5546200600010000600011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">12. <b>Zhu Q.&#150;F., Y. Wang, and L. Shaw, </b>Coding and Cell Loss Recovery for DCT&#150;based Packet Video. <i>IEEE Trans. Circuits Syst. Video Tech., </i>Vol. 3, pp. 248&#150;258, June 1993.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2040268&pid=S1405-5546200600010000600012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> ]]></body><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Farin]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<source><![CDATA[Curves and Surfaces for Computer Aided Geometric Design: Computer Science and Scientific Computation]]></source>
<year>1993</year>
<publisher-loc><![CDATA[New York^eNY NY]]></publisher-loc>
<publisher-name><![CDATA[Academic Press, Inc]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hasimoto]]></surname>
<given-names><![CDATA[R. B]]></given-names>
</name>
</person-group>
<source><![CDATA[Error Resilient Framework for Image/Video Transmission over Packet Switch Networks]]></source>
<year>Sept</year>
<month>. </month>
<day>20</day>
<publisher-name><![CDATA[University of Delaware]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hemami]]></surname>
<given-names><![CDATA[S. S]]></given-names>
</name>
<name>
<surname><![CDATA[Meng]]></surname>
<given-names><![CDATA[T. H.- Y]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Transform Coded Image Reconstruction Exploiting Interblock Correlation]]></article-title>
<source><![CDATA[IEEE Trans. Image Processing]]></source>
<year>July</year>
<month> 1</month>
<day>99</day>
<volume>4</volume>
<page-range>1023-1027</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jung]]></surname>
<given-names><![CDATA[K.-H]]></given-names>
</name>
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[J.-H]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Error Concealment Using Projection for Block-Based Image Coding]]></article-title>
<source><![CDATA[SPIE]]></source>
<year>1994</year>
<volume>2308</volume>
<page-range>1466-1476</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kwok]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
<name>
<surname><![CDATA[Sun]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Multidirectional Interpolation for Spatial Error Concealment]]></article-title>
<source><![CDATA[IEEE Trans. Consumer Electron]]></source>
<year>Augu</year>
<month>st</month>
<day> 1</day>
<volume>39</volume>
<page-range>455-460</page-range></nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pei-Chun]]></surname>
<given-names><![CDATA[C. T]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<source><![CDATA[Second-Generation Error Concealment for Video Transport Over Error Prone Channels]]></source>
<year>2002</year>
<publisher-name><![CDATA[ICIP]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Posnak]]></surname>
<given-names><![CDATA[E. J]]></given-names>
</name>
<name>
<surname><![CDATA[Gallindo]]></surname>
<given-names><![CDATA[S. P]]></given-names>
</name>
<name>
<surname><![CDATA[Stephens]]></surname>
<given-names><![CDATA[A.P]]></given-names>
</name>
<name>
<surname><![CDATA[Vin]]></surname>
<given-names><![CDATA[H.M]]></given-names>
</name>
</person-group>
<source><![CDATA[Techniques for Resilient Transmission of JPEG Video Streams: Proc. of Multimedia Computing and Networking]]></source>
<year>Febr</year>
<month>ua</month>
<day>ry</day>
<page-range>243-252</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Salama]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Shroff]]></surname>
<given-names><![CDATA[N. B]]></given-names>
</name>
<name>
<surname><![CDATA[Delp]]></surname>
<given-names><![CDATA[E. J]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Error Concealment in Encoded Video]]></article-title>
<source><![CDATA[IEEE Journal on Selected Areas in Communications]]></source>
<year>June</year>
<month> 2</month>
<day>00</day>
<volume>18</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>1129 -114</page-range></nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shahram]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Kossentini]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Ward]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<source><![CDATA[An Adaptive Markov Random Field Based Error Concealment Method for Video Communication in an Error Prone Environment]]></source>
<year></year>
<conf-name><![CDATA[ IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP)]]></conf-name>
<conf-date>1999</conf-date>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[Q-F]]></given-names>
</name>
<name>
<surname><![CDATA[Shaw]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Maximally Smooth Recovery in Transform Coding]]></article-title>
<source><![CDATA[IEEE Trans. Commun]]></source>
<year>1993</year>
<volume>41</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>1544-1551</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zeng]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<source><![CDATA[Geometric-Structure-based Error Concealment with Novel Applications in Block-based Low Bit Rate Coding: IEEE Trans. Circuits and Systems for Video Tech]]></source>
<year>June</year>
<month> 1</month>
<day>99</day>
</nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhu]]></surname>
<given-names><![CDATA[Q.-F]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Shaw]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Coding and Cell Loss Recovery for DCT-based Packet Video]]></article-title>
<source><![CDATA[IEEE Trans. Circuits Syst. Video Tech]]></source>
<year>June</year>
<month> 1</month>
<day>99</day>
<volume>3</volume>
<page-range>248-258</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
