{"id":"https://openalex.org/W2062268552","doi":"https://doi.org/10.1109/icdim.2010.5664732","title":"A feedback-based method for adaptive ROI protection in H.264/AVC","display_name":"A feedback-based method for adaptive ROI protection in H.264/AVC","publication_year":2010,"publication_date":"2010-07-01","ids":{"openalex":"https://openalex.org/W2062268552","doi":"https://doi.org/10.1109/icdim.2010.5664732","mag":"2062268552"},"language":"en","primary_location":{"id":"doi:10.1109/icdim.2010.5664732","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdim.2010.5664732","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Fifth International Conference on Digital Information Management (ICDIM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069990986","display_name":"Yanchun Zhong","orcid":null},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yanchun Zhong","raw_affiliation_strings":["State key Laboratory of software development Environment, Beihang University, Beijing, China","State Key Lab of Software Development Environment, Beihang University, Beijing 100191, China#TAB#"],"affiliations":[{"raw_affiliation_string":"State key Laboratory of software development Environment, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]},{"raw_affiliation_string":"State Key Lab of Software Development Environment, Beihang University, Beijing 100191, China#TAB#","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100338781","display_name":"Heng Li","orcid":"https://orcid.org/0000-0001-5441-6763"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Heng Li","raw_affiliation_strings":["State key Laboratory of software development Environment, Beihang University, Beijing, China","State Key Lab of Software Development Environment, Beihang University, Beijing 100191, China#TAB#"],"affiliations":[{"raw_affiliation_string":"State key Laboratory of software development Environment, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]},{"raw_affiliation_string":"State Key Lab of Software Development Environment, Beihang University, Beijing 100191, China#TAB#","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5054939233","display_name":"Jialei Bi","orcid":null},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jialei Bi","raw_affiliation_strings":["State key Laboratory of software development Environment, Beihang University, Beijing, China","State Key Lab of Software Development Environment, Beihang University, Beijing 100191, China#TAB#"],"affiliations":[{"raw_affiliation_string":"State key Laboratory of software development Environment, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]},{"raw_affiliation_string":"State Key Lab of Software Development Environment, Beihang University, Beijing 100191, China#TAB#","institution_ids":["https://openalex.org/I82880672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5069990986"],"corresponding_institution_ids":["https://openalex.org/I82880672"],"apc_list":null,"apc_paid":null,"fwci":0.66864917,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.69027066,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"11","issue":null,"first_page":"145","last_page":"151"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10741","display_name":"Video Coding and Compression Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10741","display_name":"Video Coding and Compression Technologies","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11165","display_name":"Image and Video Quality Assessment","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9937999844551086,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8567283749580383},{"id":"https://openalex.org/keywords/encoder","display_name":"Encoder","score":0.6466044783592224},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5899646282196045},{"id":"https://openalex.org/keywords/region-of-interest","display_name":"Region of interest","score":0.5808663964271545},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5782209634780884},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.5030381083488464},{"id":"https://openalex.org/keywords/packet-loss","display_name":"Packet loss","score":0.4804950952529907},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.4401014745235443},{"id":"https://openalex.org/keywords/computational-complexity-theory","display_name":"Computational complexity theory","score":0.4116731882095337},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4023224115371704},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3567125201225281},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.24630561470985413},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.23844054341316223},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.11597245931625366}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8567283749580383},{"id":"https://openalex.org/C118505674","wikidata":"https://www.wikidata.org/wiki/Q42586063","display_name":"Encoder","level":2,"score":0.6466044783592224},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5899646282196045},{"id":"https://openalex.org/C19609008","wikidata":"https://www.wikidata.org/wiki/Q2138203","display_name":"Region of interest","level":2,"score":0.5808663964271545},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5782209634780884},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.5030381083488464},{"id":"https://openalex.org/C54108766","wikidata":"https://www.wikidata.org/wiki/Q391064","display_name":"Packet loss","level":3,"score":0.4804950952529907},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.4401014745235443},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.4116731882095337},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4023224115371704},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3567125201225281},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.24630561470985413},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.23844054341316223},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.11597245931625366},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icdim.2010.5664732","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdim.2010.5664732","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2010 Fifth International Conference on Digital Information Management (ICDIM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W14928276","https://openalex.org/W1562775432","https://openalex.org/W1654894100","https://openalex.org/W1797157937","https://openalex.org/W2021877474","https://openalex.org/W2041616987","https://openalex.org/W2054308511","https://openalex.org/W2063142364","https://openalex.org/W2096208199","https://openalex.org/W2098768521","https://openalex.org/W2102373785","https://openalex.org/W2106219841","https://openalex.org/W2113032778","https://openalex.org/W2113172355","https://openalex.org/W2121123711","https://openalex.org/W2137298097","https://openalex.org/W2140199336","https://openalex.org/W2143270250","https://openalex.org/W2157852096","https://openalex.org/W2162287270","https://openalex.org/W2544243751","https://openalex.org/W4300698483","https://openalex.org/W6600592833","https://openalex.org/W6633612415","https://openalex.org/W6637272580","https://openalex.org/W6638240310","https://openalex.org/W6655999948","https://openalex.org/W6663952830","https://openalex.org/W6674646537","https://openalex.org/W6677089234","https://openalex.org/W6680168007","https://openalex.org/W6728936274"],"related_works":["https://openalex.org/W2095407248","https://openalex.org/W1997714924","https://openalex.org/W2129190845","https://openalex.org/W4389045637","https://openalex.org/W1994209155","https://openalex.org/W2076843925","https://openalex.org/W4384300015","https://openalex.org/W2054979592","https://openalex.org/W2100712766","https://openalex.org/W2078701219"],"abstract_inverted_index":{"The":[0],"bit":[1],"error":[2],"and":[3,12,51,119],"packet":[4,83],"loss":[5],"in":[6,132],"unreliable":[7],"channels":[8],"such":[9],"as":[10],"Internet":[11],"wireless":[13],"networks":[14],"lead":[15],"the":[16,27,53,67,74,87,93,101,105,111],"quality":[17],"of":[18,115],"video":[19],"data":[20],"unacceptable,":[21],"which":[22,85],"force":[23],"us":[24],"to":[25,47,66,80,90],"take":[26],"network":[28,54,63,71,82],"adaptive":[29,112],"transmission":[30],"into":[31],"account.":[32],"In":[33],"this":[34],"paper,":[35],"we":[36],"firstly":[37],"propose":[38],"a":[39,129],"novel":[40],"Greedy":[41],"Spread":[42],"(GS)":[43],"ROI":[44,49,94,106],"extraction":[45],"method":[46,103,113],"extract":[48],"effectively,":[50],"then":[52],"state":[55,72],"changing":[56],"is":[57,78,114],"quickly":[58],"perceived":[59],"without":[60],"occupying":[61],"additional":[62],"overhead.":[64],"According":[65],"feedback":[68],"about":[69],"current":[70],"from":[73],"receiver,":[75],"Gilbert":[76],"model":[77],"used":[79],"predict":[81],"loss,":[84],"enables":[86],"source":[88],"encoder":[89],"dynamically":[91],"adjust":[92],"protecting":[95],"schemes.":[96],"Experimental":[97],"results":[98],"shows":[99],"that":[100],"GS":[102],"extracts":[104],"at":[107],"high":[108,120],"accuracy,":[109],"also":[110],"low":[116],"computational":[117],"complexity":[118],"protection":[121],"capability,":[122],"suitable":[123],"for":[124],"real-time":[125],"applications,":[126],"so":[127],"make":[128],"notable":[130],"improvement":[131],"visual":[133],"quality.":[134]},"counts_by_year":[{"year":2015,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
