|
[1]Alena R., Evenson D. and Rundquist V. (2002), “Analysis and testing of mobile wireless networks”, Proceedings of IEEE Aerospace Conference, vol.3, pp. 1131 – 1144. [2]Bender W., Gruhl D., Morimoto N. and Lu A. (1996), “Techniques for Data Hiding,” Journal of IBM Systems, vol.35, No.3 and No.4, pp. 313-336. [3]Chua K. C., Wong W. C.and Ngan K. N. (1990), “Error detection and correction of vector quantised digital images”, IEE Proceedings of Communications, Speech and Vision, vol.137, issue. 6, pp.417- 423. [4]Chang R. F. and Chen W. T. (1993), “Side-Match Vector Quantization for Reconstruction of Lost Blocks,” Journal of Visual. Comm. and Image Representation, vol. 4, no. 2, pp. 171-177. [5]Cheng S. C.(2003), “Content-based Image Retrieval Using Moment-preserving Edge Detection,” Image and Vision Computing, vol. 21 no 9,pp. 809-826. [6]Ephremides A. (1997), “Wireless networking”, Proceedings of Second IEEE Symposium on Computers and Communications, pp.2. [7]Eggers J. J., Su J. K.and Girod B. (2000), “Robustness of a blind image watermarking scheme”, Proceedings of International Conference on Image Processing, vol. 3, pp. 17 -20. [8]Findlay D., Flygare H., Hancock R.., Haslestad T., Hepworth E., Higgins D.and McCann S. (2002), “3G interworking with wireless LANs,” Third International Conference on 3G Mobile Communication Technologies, pp. 394 – 399. [9]Huifang S. and Kwok W. (1993), “Error concealment with directional filtering for block transform coding”, Proceedings of IEEE Global Telecommunications Conference, Houston, vol.2, pp.1304 - 1308. [10]Hung K. L., Chang C. C. and Chen T. S. (1999), “Recnstruction of lost blocks using codeword estimation”, IEEE Transactions on Consumer Electronics, vol.45,No.4,pp.1190-1199. [11]Jung K., Chang J. and Lee C. (1994), “Error concealment technique using projection data.for block-based image coding”, Proceedings of Visual Communications and Image Processing, vol. 2308, pp. 1466-1476. [12]Karybali I., Berberidis K.and Electronics (2003), “Blind image-adaptive watermarking”, Proceedings of the 10th IEEE International Conference on Circuits and Systems, vol.2, pp.894 - 897. [13]Kumwilaisak W. and Hartung F. (2004), “An intraframe error concealment: nonlinear pattern alignment and directional interpolation”, Proceedings of International Conference on Image Processing, vol.2, pp.825 - 828. [14]Lam W. M. and Reibman A. R. (1995), “An error concealment algorithm for images subject to channel errors”, IEEE Transactions on Image Processing, vol. 4, pp.533 - 542. [15]Rianto Y., Kondo S. and Kim T. (1999), “Detection of roads from satellite image using the optimal search”, Proceedings of International Conference on Image Analysis and Processing, pp.804 - 809. [16]Robie D. L. and Mersereau R. M. (2000),“The use of Hough transforms in spatial error concealment”, Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, vol.6, pp.2131-2134. [17]Roos A., Hartman M.and Dutnall S. (2003), “Critical issues for roaming in 3G”, Journal of IEEE Communications Society, vol. 10, issue. 1, pp.29 – 35. [18]Sun H. and Kwok W. (1995), “Concealment of damaged block transform coded images using projections onto convex sets,” IEEE Transactions on Image Processing, vol.4, pp.470 - 477. [19]Tzannes A. P. and Brooks D. H. (1999), “Detection of point targets in image sequences by hypothesis testing: a temporal test first approach”, Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, vol.6, pp.3377 - 3380. [20]Tseng Y. C. and Pan H. K. (2002), “Data hiding in 2-color images”, IEEE Transactions on Computers, vol.51, pp. 873 – 878. [21]Wang Z., Yu Y. and Zhang D. (1998), “ Best Neighborhood Matching:An information Loss Restoration Technique for block-based Image Coding System”, Transactions on Image Processing, vol. 7,no. 7,pp.1056-1061. [22]Wang C. M., Clayton C. C., Chen Y. N., Chung, Yang S. C., Chung P. C., Yang C. W. and Chang C. I. (2003), “Detection of spectral signatures in multispectral MR images for classification”, IEEE Transactions on Medical Imaging,vol.22, pp.50 - 61. [23]Wang F. H., Pan J. S., Jain L. C. and Huang H. C. (2004), “A VQ-based image-in-image data hiding scheme”, Proceedings of IEEE International Conference on Multimedia and Expo, vol. 3, pp.2191 - 2194. [24]Xiaolong D. and Khorram S. (1998), “The effects of image misregistration on the accuracy of remotely sensed change detection”, IEEE Transactions on Geoscience and Remote Sensing, vol.36, issue. 5, pp.1566 - 1577. [25]Xiao R., Li M. J. and Zhang H. J. (2004), “Robust multipose face detection in images”, IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, pp.31 - 41. [26]Ying Z., Schwartz S. and Orchard M. (2001), “Structure preserving error concealment with directional smoothness measure”, Proceedings of IEEE International Conference on Acoustics Speech and Signal Processing, vol.3, pp.1737- 1740. [27]Yazbeck S. (2003), “The US road to 3G: an overview of telecom regulations, carrier strategies, and the consumer market”, Proceedings of 10th International Conference on Telecommunications, vol.1, pp. 25- 32. [28]Zeng W. and Liu B.(1999), “Geometric-structure-Based Error Concealment with Novel Applications in Block-Based Low-Bit-Rate Coding,” IEEE Transactions on Circuits and System for Video Technology, vol. 9,No 4,pp.648-665. [29]Zhicheng N., Shi Y. Q., Ansari N.and Wei S. (2003), “Reversible data hiding”, Proceedings of the International Symposium on Circuits and Systems, vol.2, pp. 912 - 915. [30]Zhang G., Wang S. and Wen Q.(2004), “An adaptive block-based blind watermarking algorithm”, Proceedings of 7th International Conference on Signal Processing, vol.3, pp.2294 - 2297.
|