[1] T. Wiegand, G. Sullivan, and A. Luthra, “Draft ITU-T
recommendation and final draft international standard of joint video
specification (ITU-T Rec. H.264 | ISO/IEC 14496-10 AVC),” Joint
Video Team (JVT) of ISO/IEC MPEG and ITU-T VCEG, JVT
G050r1, Geneva, Switzerland, May 2003.
[2] “Draft ITU-T recommendation and final draft international standard
of joint video specification,” in Joint Video Team of ISOIEC MPEG
ITUT VCEG, JVTG050, 2003.
[3] Bernd Girod and Niko Farber,“Feedback-Based Error Control for
Mobile Video Transmission,” Proceedings of the IEEE, vol. 86, no.10,pp. 1707-1723, October 1999.
[4] Yao Wang and Qin-Fan Zhu , “Error control and concealment for
video communication: a review” Proceedings of the IEEE , vol. 86, no. 5, pp. 974 – 997 , May 1998.
[5]Huifang Sun and Wilson Kwok, “Concealment of Damaged Block Transform Coded Images Using Projections onto Convex Sets,” IEEE Transaction on Images Processing, vol. 4, no. 4, pp. 470-477, April 1995.
[6]Tsekeridou, S., Alaya Cheikh, F., Gabbouj, M. and Pitas, I., “Motion field estimation by vector rational interpolation for error concealment purposes,” Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. 6, pp.3397-3400,
1999
[7] J. Zheng and Lap-Pui Chau, “A Temporal error concealment
algorithm for H.264 using Lagrange Interpolation,” IEEE
International Symposium on Circuits and Systems, vol. 2, pp.133-136,May 2004.
[8]W.-M. LAM, A. R. Reibman, and B. Liu, “Recovery of lost or erroneously received motion vectors,” in Proc. Of IEEE Int’l Conf. Acoustic, Speech and Signal processing, vol. 5,pp. 417-420, Apr. 1993.
[9]E. T. Kim, S.-J. Choi, and H.-M. Kim, “Weighted boundary matching algorithm for error concealment in the MPEG-2 video bit stream,” Signal Processing 73, pp. 297-295, Jan. 1999
[10]T. H. Tsai, Y. X. Lee, and Y. F. Lin, “Video error concealment techniques using progressive interpolation and boundary matching algorithm,” in Proc.of IEEE Int’l Symp. Circuits and System, vol. 5, pp. 433-436, May 2004.
[11] J. Feng, K.-T. Lo, H. Mehrpour, and A. E. Karbowiak, “Loss recovery techniques for transmission of MPEG video over ATM networks,” in Proc of IEEE int’l Conf. Communications, vol. 3, pp. 1406-1410, June 1996
[12] T. Chen, X. Zhang, and Y.-Q Shi, “Error concealment using refined boundary matching algorithm,” in Proc. of IEEE Int’l Conf. Information Technology, Research and Education, pp. 55-59, Aug. 2003
[13] Y. L. Xu and Y. H. Zhou, “H.264 video communication based refined error concealment schemes,” IEEE Transactions on Consumer Electronics, vol. 50, no. 6, pp. 1135-1141, November 2004.
[14] Sylvie Jeannin, Radu Jasinschi, Alfred She, Thumpudi Naveen, Benoit Mory, and Ali Tabatabai, “Motion descriptor for content-based video representation”, Signal Processing: Image Communication 16, 2000, pp59-85.
[15] Yap-Peng Tan, Sanjeev R. Kulkarni and Peter J.Ramadge, “A new method for camera motion parameter estimation”, in Proc.1995 IEEE Int.Conf. Image Processing,vol.1,Oct.1995,pp.406-409
[16]Yao Wang, Jorn Ostermann. And Ya-Qin Zhang, Video Processing and Communications, Prentic Hall, 2001.
[17]Ye-Kui Wang, M. M. Hannuksela, V. Varsa, A. Hourunranta and A. Gabbouj, “The error concealment feature in the H.26L test model,” IEEE International Conference on Image Processing, vol. 2, pp. 729-732, September 2002.
[18]S. Wenger, “H.264/AVC over IP,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 13, pp.645-656, July 2003.
[19]蕭偉權,建構於物體運動軌跡特徵之視訊搜尋研究,國立中正大學電機所碩士論文,July 2001.[20]R. C. Walker, Introduction to Mathematical Programming, Prentice-Hall Inc., 1999.
[21]D. P. Bertsekas, Dynamic Programming: Deterministic and Stochastic Model, Englewood Cliffs, NJ: Prentice-Hall, 1987.