|
|
|
|
LEADER |
01000naa a22002652 4500 |
001 |
NLM216814537 |
003 |
DE-627 |
005 |
20231224032632.0 |
007 |
cr uuu---uuuuu |
008 |
231224s2012 xx |||||o 00| ||eng c |
024 |
7 |
|
|a 10.1109/TIP.2012.2192850
|2 doi
|
028 |
5 |
2 |
|a pubmed24n0722.xml
|
035 |
|
|
|a (DE-627)NLM216814537
|
035 |
|
|
|a (NLM)22481824
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
100 |
1 |
|
|a Tsiligianni, Evaggelia
|e verfasserin
|4 aut
|
245 |
1 |
0 |
|a Shape error concealment based on a shape-preserving boundary approximation
|
264 |
|
1 |
|c 2012
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a ƒaComputermedien
|b c
|2 rdamedia
|
338 |
|
|
|a ƒa Online-Ressource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Date Completed 07.04.2014
|
500 |
|
|
|a Date Revised 06.09.2013
|
500 |
|
|
|a published: Print-Electronic
|
500 |
|
|
|a Citation Status MEDLINE
|
520 |
|
|
|a In objectbased video representation, video scenes are composed of several arbitrarily shaped video objects (VOs), defined by their texture, shape and motion. In errorprone communications, packet loss results in missing information at the decoder. The impact of transmission errors is minimised through error concealment. In this paper, we propose a spatial error concealment technique for recovering lost shape data. We consider a geometric shape representation consisting of the object boundary, which can be extracted from the -plane. Missing macroblocks result in a broken boundary. A Bspline curve is constructed to replace a missing boundary segment, based on a T spline representation of the received boundary. We use Tsplines because they produce shapepreserving approximations and do not change the characteristics of the original boundary. The representation ensures a good estimation of the first derivatives at the points touching the missing segment. Applying smoothing conditions, we manage to construct a new spline that joins smoothly with the received boundary, leading to successful concealment results. Experimental results on object shapes with different concealment difficulty demonstrate the performance of the proposed method. Comparisons with prior proposed methods are also presented
|
650 |
|
4 |
|a Journal Article
|
700 |
1 |
|
|a Kondi, Lisimachos P
|e verfasserin
|4 aut
|
700 |
1 |
|
|a Katsaggelos, Aggelos K
|e verfasserin
|4 aut
|
773 |
0 |
8 |
|i Enthalten in
|t IEEE transactions on image processing : a publication of the IEEE Signal Processing Society
|d 1992
|g 21(2012), 8 vom: 21. Aug., Seite 3573-85
|w (DE-627)NLM09821456X
|x 1941-0042
|7 nnns
|
773 |
1 |
8 |
|g volume:21
|g year:2012
|g number:8
|g day:21
|g month:08
|g pages:3573-85
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1109/TIP.2012.2192850
|3 Volltext
|
912 |
|
|
|a GBV_USEFLAG_A
|
912 |
|
|
|a SYSFLAG_A
|
912 |
|
|
|a GBV_NLM
|
912 |
|
|
|a GBV_ILN_350
|
951 |
|
|
|a AR
|
952 |
|
|
|d 21
|j 2012
|e 8
|b 21
|c 08
|h 3573-85
|