|
[1] CCITT Recommendation T.81, “Digital Compression and Coding of Continuous-tone Still Images,” 1992. [2] G. Wallace ,”The JPEG Still Picture Compression Standard,” IEEE Trans. Consumer Elec., vol. 38, no. 1, Feb. 1992, pp. xviii-xxxiii. [3] CCITT Recommendation H.261, “Video codec for audiovisual services at px64 kbit/s,” 1990. [4] D. Le Gall, “MPEG: A Video Compression Standard for Multimedia Applications,” Commun. ACM, vol.34, no. 4, Apr. 1991, pp. 46-58. [5] Petsalis, M.E.; Soleymani, M.R.; Swamy, M.N.S., “Effects of errors and error recovery in images compressed by the JPEG still image compression standard algorithm,” Conference Proceedings., 1994 Canadian Conference on, 1994, Page(s): 396 -400 vol.1. [6] Wai-Man Lam; Reibman, A.R., “An error concealment algorithm for images subject to channel errors,” IEEE Transactions on, Volume: 4 Issue: 5, May 1995, Page(s): 533 –542. [7] Lam, W.-M.; Reibman, A.R., “Self-synchronizing variable-length codes for image transmission,” IEEE International Conference on , Volume: 3 , 1992,Page(s): 477 -480 vol.3. [8] Hemami, S.S., “Robust image transmission using resynchronizing variable-length codes and error concealment,” IEEE Journal on, Volume: 18 Issue: 6, June 2000, Page(s): 927 –939. [9] Victor DeBrunner, Linda DeBrunner, Longji Wang, and Sridhar Radhakrishnan, The University of Oklahoma, “Error Control and Concealment for Image Transmission,” IEEE Communications Surveys & Tutorials, First Quarter 2000,vol. 3 no. 1.
[10] Yao Wang; Qin-Fan Zhu, “Error control and concealment for video communication: a review,” Proceedings of the IEEE, Volume: 86 Issue: 5, May 1998, Page(s): 974 –997. [11] W. Kwok and H. Sun, “Multi-Directional Interpolation for Spatial Error Concealment,” IEEE Trans. Consumer Elec., vol. 39, no. 3, Aug. 1993, pp. 45560. [12] Yeung, M.M.; Mintzer, F., “An invisible watermarking technique for image verification,” Proceedings, International Conference on, 1997, Page(s): 680 -683 vol.2. [13] Jae-Won Suh; Yo-Sung Ho, “Error concealment based on directional interpolation,” IEEE Transactions on, Volume: 43 Issue: 3, Aug. 1997,Page(s): 295 -30.2. [14] Vijitha Weerackody, Christine Podilchuk, nad Anthony Estrella, “Transmission of JPEG-coded images over wireless channels,” Bell Labs Technical Journal, 1996. [15] Victor DeBrunner, Linda DeBrunner, Longji Wang, and Sridhar Radhakrishnan, The University of Oklahoma, “Error Control and Concealment for Image Transmission,” IEEE Communicarions, Surveys and Tutorials, The electronic magazine of original poor-reviewed survey articles. [16] Zhou Wang; Yinglin Yu; Zhang, D., “Best neighborhood matching: an information loss restoration technique for block-based image coding systems,” IEEE Transactions on, Volume: 7 Issue: 7, July 1998, Page(s): 1056 –1061. [17] Jong Wook Park; Jong Won Kim; Sang Uk Lee, “DCT coefficients recovery-based error concealment technique and its application to the MPEG-2 bit stream error,” IEEE Transactions on, Volume: 7 Issue: 6, Dec. 1997,Page(s): 845 –854. [18] Eugene T. Lin and Edward J. Delp, “A Review of Fragile Image Watermarks,” Video and Image Processing Laboratory (VIPER) School of Electrical and Computer Engineering, Purdue University, 1999. [19] Fridrich, J., Goljan, M., Baldoza, A. C., “New Fragile Authentication Watermark for Images,” In Proc. ICIP, Vancouver, Canada, September, 2000.
[20] Ching-Yung Lin and Shih-Fu Chang, “Semi-Fragile Watermarking for Authenticating JPEG Visual Content,” Department of Electrical Engineering Columbia University, New York, NY 10027, USA, 2000. [21] Fridrich, J., “A hybrid watermark for tamper detection in digital images,” Signal Processing and Its Applications, 1999. ISSPA '99. Proceedings of the Fifth International Symposium on, Volume: 1, 1999, Page(s): 301 -304 vol.1. [22] Fridrich, J.; Goljan, M., “Images with self-correcting capabilities,” International Conference on, Volume: 3, 1999, Page(s): 792 -796 vol.3. [23] Shao Yafei; Zhang Li; Wu Guowei; Lin Xinggang, “Reconstruction of missing blocks in image transmission by using self-embedding,” Proceedings of 2001 International Symposium on, 2001, Page(s): 535 –538. [24] Peng Yin; Bede Liu; Yu, H.H., “Error concealment using data hiding,” IEEE International Conference on, Volume: 3, 2001, Page(s): 1453 -1456 vol.3. [25] Yu, H.H.; Peng Yin, “Multimedia data recovery using information hiding,” IEEE, Volume: 3, 2000, Page(s): 1344 -1348 vol.3. [26] Jue Wang; Liang Ji, “A region and data hiding based error concealment scheme for images,” IEEE Transactions on, Volume: 47 Issue: 2, May 2001,Page(s): 257 –262. [27] Jae-Won Suh; Yo-Sung Ho, “Error concealment based on directional interpolation,” IEEE Transactions on, Volume: 43 Issue: 3, Aug. 1997,Page(s): 295 –302. [28] Bhattacharyya, K.; Jamadagni, H.S., “DCT coefficient-based error detection technique for compressed video stream,” IEEE International Conference on, Volume: 3, 2000, Page(s): 1483 -1486 vol.3. [29] Ancis, M.; Giusto, D.D., “Reconstruction of missing blocks in JPEG picture transmission,” IEEE Pacific Rim Conference on, 1999, Page(s): 288 –291. [30] Shirani, S.; Kossentini, F.; Ward, R., “Error concealment methods, a comparative study,” IEEE Canadian Conference on, Volume: 2, 1999, Page(s): 835 -840 vol.2.
[31] Wang, Y.; Zhu, Q.-F.; Shaw, L., “Maximally smooth image recovery in transform coding,” Communications, IEEE Transactions on , Volume: 41 Issue: 10 , Oct. 1993,Page(s): 1544 –1551. [32] Kwok, W.; Sun, H., “Multi-directional interpolation for spatial error concealment,” IEEE Transactions on, Volume: 39 Issue: 3, Aug. 1993, Page(s): 455 –460. [33] Aign, S.; Fazel, K., “Temporal and spatial error concealment techniques for hierarchical MPEG-2 video codec,” IEEE International Conference on, Volume: 3, 1995, Page(s): 1778 -1783 vol.3. [34] Myeong-Hoon Jo; Woo-Jin Song, “Error concealment for MPEG-2 video decoders with enhanced coding mode estimation,” Consumer Electronics, IEEE Transactions on, Volume: 46 Issue: 4, Nov. 2000, Page(s): 962 –969. [35] Fridrich, J., Goljan, M., Memon, N., “Further Attacks on Yeung-Mintzer Fragile Watermarking Scheme,” In Proc. SPIE, Security and Watermarking of Multimedia Contents, San Jose, California, January, 2000, 428-437. [36] Fridrich, J., Goljan, M., Memon, N., “Cryptanalysis of the Yeung-Mintzer Fragile Watermarking Technique,” Submitted to the Journal of Electronic Imaging, March, 2000. [37] Ismaeil, I.; Shirani, S.; Kossentini, F.; Ward, R., “An efficient, similarity-based error concealment method for block-based coded images,” International Conference on, 2000, Page(s): 388 -391 vol.3. [38] Wong, W.Y.; Cheng, A.K.Y.; Ip, H.H.S., “Concealment of damaged blocks by neighborhood regions partitioned matching,” International Conference on, Volume: 2, 2001, Page(s): 45 -48 vol.2. [39] C. Christopoulos, J. Askelof and M. Larsson, “Efficient methods for encoding regions of interest in the upcoming JPEG2000 still image coding standard,” IEEE Signal Processing Letters, September 2000. [40] Jiwu Huang; Shi, Y.Q., “Embedding gray level images,” The 2001 IEEE International Symposium on, Volume: 5, 2001, Page(s): 239 -242 vol. 5.
[41] Jaejin Lee; Chee Sun Won, “Image integrity and correction using parities of error control coding,” IEEE International Conference on, Volume: 3, 2000, Page(s): 1297 -1300 vol.3. [42] Farzam, M.; Shirani, S., “A robust multimedia watermarking technique using Zernike transform,” IEEE Fourth Workshop on, 2001, Page(s): 529 –534. [43] Vijitha Weerackody, Christine Podilchuk, nad Anthony Estrella, “Transmission of JPEG-coded images over wireless channels,” Bell Labs Technical Journal, 1996. [44] Yeung, M.M.; Mintzer, F., “An invisible watermarking technique for image verification,” International Conference on, 1997, Page(s): 680 -683 vol.2. [45] Tien-Hsu Lee; Hsiu-Hua Hsu; Pao-Chi Chang, “Restart marker regulation technique for progressive JPEG image coding in mobile communications,” IEEE Communications Letters, Volume: 4 Issue: 12, Dec. 2000, Page(s): 411 -413 . [46] Yi-Huang Han; Jin-Jang Leou, “Detection and correction of transmission errors in JPEG images,” IEEE Transactions on, Volume: 8 Issue: 2, April 1998, Page(s): 221 –231. [47] Min Wu; Bede Liu, “Watermarking for image authentication,” International Conference on, Volume: 2, 1998, Page(s): 437 -441 vol.2. [48] Christopoulos, C.; Skodras, A.; Ebrahimi, T.,” The JPEG2000 still image coding system: an overview,” Consumer Electronics, IEEE Transactions on, Volume: 46 Issue: 4, Nov. 2000,Page(s): 1103 –1127. [49] Moccagatta, I.; Soudagar, S.; Liang, J.; Chen, H.,”Error-resilient coding in JPEG-2000 and MPEG-4,” IEEE Journal on, Volume: 18 Issue: 6, June 2000, Page(s): 899 –914. [50] Diego Santa-Cruz, Raphaël Grosbois and Touradj Ebrahimi.,”JPEG 2000 performance evaluation and assessment,” Signal Processing: Image Communication, pages 113-130, volume 17, no. 1, 2002. [51] Diego Santa-Cruz, Touradj Ebrahimi, Joel Askelöf, Mathias Larsson and Charilaos Christopoulos. “JPEG 2000 still image coding versus other standards,” In Proc. of the SPIE's 45th annual meeting, Applications of Digital Image Processing XXIII, volume 4115, pages 446-454, San Diego, California, Jul. 30-Aug. 4, 2000.
|