|
[1]http://www.bluetooth.com/[2]Bluetooth SIG Groups, Specification of the Bluetooth System, ver. 1.1, Feb. 22, 2001.[3]M. F. Tariq, P. Czerepinski, A. Nix, D. Bull, and N. Canagarajah, “Robust and scalable matching pursuits video transmission using the Bluetooth air interface standard,” IEEE Trans. Consumer Electronics, vol. 46, pp. 673-681, Aug. 2000.[4]M. C. Tu, K. J. Ho, T. S. Lee, and S. G. Miaou, “Improving H.263 video quality for the bluetooth-based packet transmission under the interference of wireless local area network using error concealment techniques,” Chung-Yuan J., vol. 30, no. 1, pp. 71-83, March 2002.[5]J. C. Haartsen, “The Bluetooth radio system,” IEEE Personal Commun., vol. 7, pp. 28-36, Feb. 2000.[6]P. Phagwat, “Bluetooth: technology for short-range wireless apps,” IEEE Internet Computing, vol. 5, pp. 96-103, May-June 2001.[7]R. Schneiderman, “Bluetooth's slow dawn,” IEEE Spectrum, vol. 37, pp. 61-65, Nov. 2000.[8]Draft ITU-T Recommendation H.263: Video Coding for Low Bitrate Communication, ITU, May 1996.[9]ITU-T Recommendation H.263: Video Coding for Low Bit Rate Communication, ITU, Feb. 1998.[10]王騰興,資料隱藏技術應用於 H.263 視訊編碼之錯誤偵測,中央大學電機工程研究所碩士論文,2000。[11]C. H. Chang and J. J. Leou, “Detection and correction of transmission errors in DPCM images,” IEEE Trans. Circuits and Systems for Video Technol., vol. 5, no. 2, pp. 166-171, April 1995.[12]W. L. Shyu and J. J. Leou, “Detection and correction of transmission errors in facsimile images,” IEEE Trans. Commun., vol. 44, no. 8, pp. 938-948, Aug. 1996.[13]C. Y. Chang and J. J. Leou, “Detection and elimination of 2-D transmission error patterns in DPCM images,” IEEE Trans. Commun., vol. 44, no. 10, pp. 1251-1256, Oct. 1996.[14]W. J. Chu and J. J. Leou, “Detection and concealment of transmission errors in H.261 Images,” IEEE Trans. Circuits and Systems for Video Technol., vol. 8, no. 1, pp. 74-84, Feb. 1998[15]Y. H. Han and J. J. Leou, “Detection and correction of transmission errors in JPEG images,” IEEE Trans. Circuits and Systems for Video Technol., vol. 8, no. 2, pp. 221-231, April 1998.[16]H. C. Shyu and J. J. Leou, “Detection and concealment of transmission errors in MPEG images - a genetic algorithm approach,” IEEE Trans. Circuits and Systems for Video Technol., vol. 9, no. 6, pp. 937-948, Sept. 1999.[17]J. Cao and Z. Wang, “Analysis and detection of transmission errors for MPEG-2 video signal,” Proc. of IEEE Asia-Pacific Conf. on Circuits and Systems, pp. 105-108, Dec. 2000.[18]M. R. Pickering, M. R. Frater and J. F. Arnold, “A statistical error detection technique for low bit-rate video,” Proc. of IEEE Tencon - Speech and Image Technologies for Computing and Telecommun., vol. 2, pp. 773-776, 1997.[19]J. W. Park, J. W. Kim and S. U. Lee, “DCT coefficients recovery-based error concealment technique and its application to the MPEG-2 bit stream error,” IEEE Trans. Circuits and Systems for Video Technol. vol. 7, pp. 845-854, Dec. 1997.[20]K. Bhattacharyya and H. S. Jamadagni, “DCT coefficient-based error detection technique for compressed video stream,” ICME 2000, vol. 3, pp. 1483-1486, Aug. 2000.[21]P. Cherriman, C. H. Wong and L. Hanzo, “Turbo- and BCH-coded wide-band burst-by-burst adaptive H.263-assisted wireless video telephony,” IEEE Trans. Circuits and Systems for Video Technol., vol. 10, no. 8, pp. 1355-1363, Dec. 2000.[22]Z. Peng, Y. F. Huang and D. J. Costello, “Turbo codes for image transmission - a joint channel and source decoding approach,” IEEE J. on Selected Areas in Commun., vol. 18, no. 6, pp. 868-879, June 2000.[23]D. Cammia and L. Favalli, “Turbo-codes and layered video for adaptive QoS and improved service in the DVB-S system,” Prof. of IEEE GLOBECOM, vol. 3, pp. 2050-2054, Nov. 2001.[24]P. Cherriman, B. L. Yeap and L. Hanzo, “Turbo-equalised H.263-based video telephony for GSM/GPRS,” Proc. of IEEE Int. Conf. on Comm., vol. 2, pp. 422-426, June 2001.[25]M. G. Kim and J. H. Lee, “Undetected error probabilities of binary primitive BCH codes for both error correction and detection,” IEEE Trans. Commun., vol. 44, no. 5, pp. 575-580, May 1996.[26]F. Bartolini, A. Manetti, A. Piva and M. Barni, “A data hiding approach for correcting errors in H.263 video transmitted over a noisy channel,” Proc. of IEEE Fourth Workshop on Multimedia Signal Processing, pp. 65-70, Oct. 2001.[27]J. Wang and L. Ji, “A region and data hiding based error concealment scheme for images,” IEEE Trans. Consumer Electronics, vol. 47, no. 2, pp. 257-262, May 2001.[28]L. J. Wang and J. J. Leou, “Detection and correction of transmission errors in pyramid images,” IEEE Trans. Circuits and Systems for Video Technol., vol. 8, no. 1, pp. 25-30, Feb. 1998.[29]C. S. Kim, R. C. Kim and S. U. Lee, “Robust transmission of video sequence over noisy channel using parity-check motion vector,” IEEE Trans. Circuits and Systems for Video Technol., vol. 9, no. 7, pp. 1063-1074, Oct. 1999.[30]R. Anand and K. Ramchandran, “Application of continuous error detection for joint equalization and coding for ISI channels,” Proc. of IEEE Int. Conf. on Commun., vol. 1, pp. 21-25, June 2000.[31]G. R. Redinbo, “Concurrent error detection in fast unitary transform algorithms,” Proc. of The Int. Conf. on Dependable Systems and Networks, pp. 37-46, July 2001.[32]C. Boyd, J. G. Cleary, S. A. Irvine, I. Rinsma-Melchert and I. H. Witten, “Integrating error detection into arithmetic coding,” IEEE Trans. Commun., vol. 45, no. 1, pp. 1-3, Jan. 1997.[33]M. G. Martini and M. Chiahni, “Joint source-channel error detection with standard compatibility for wireless video transmission,” Proc. of IEEE Wireless Comm. and Networking Conf., vol. 1, pp. 215-219, March 2002.[34]J. Wen and J. D. Villasenor, “Reversible variable length codes for robust image and video transmission,” Conf. Record of the Thirty-First Asilomar Conf. on Signals, Systems & Computers, vol. 2, pp. 973-979, Nov. 1997.[35]S. Aign and K. Fazel, “Temporal and spatial error concealment trchniques for hierarchical MPEG-2 video codec,” IEEE Int. Conf. on Commun., vol. 3, pp. 1778-1783, 1995.[36]S. Jae-Won and H. Yo-Sung, “Error concealment based on directional interpolation,” IEEE Trans. Consumer Electronics, vol. 43, pp. 295-302, Aug. 1997.[37]K. Feher, Wireless Digital Communications: Modulation & Spread Spectrum Applications, Prentice-Hall, New Jersey, 1995.[38]J. Wong and A. Cheng, “2GFSK-4GFSK demodulation in DSP based wireless receiver,” Proc. of Int. Conf. on Signal Processing, vol. 2, pp. 1708-1711, Oct. 1998.[39]]M. E. Frerking, Digital Signal Processing in Communication Systems, Van Nostrand Reinhold, New York, 1994.[40]Source code for H.263 TMN encoder (based on the Test Model Near-term (TMN8) in the ITU-T LBC Experts Group), UBC Image Processing Laboratory, University of British Columbia, Canada, 1997.[41]I. Cohen and G. Medioni, “Detecting and tracking moving objects for video surveillance,” Proc. of IEEE Computer Society Conf. on Computer Vision and Pattern Recognition, vol. 2, pp. 319-325, June 1999.
|