Sciweavers

DAS
2004
Springer
14 years 5 months ago
Adaptive Region Growing Color Segmentation for Text Using Irregular Pyramid
This paper presents the result of an adaptive region growing segmentation technique for color document images using an irregular pyramid structure. The emphasis is in the segmentat...
Poh Kok Loo, Chew Lim Tan
DAS
2004
Springer
14 years 5 months ago
Results of a Study on Invoice-Reading Systems in Germany
Companies order, receive, and pay for goods. Hence they continually receive and process invoices. For the most part these are printed on paper and are dealt with manually, so that ...
Bertin Klein, Stefan Agne, Andreas Dengel
ICDAR
2005
IEEE
14 years 6 months ago
Unconstrained Numeral Pair Recognition Using Enhanced Error Correcting Output Coding: A Holistic Approach
– This paper describes a new approach to recognize touching numeral strings. Currently most methods for numeral string recognition require segmenting the string image into separa...
Jie Zhou, Ching Y. Suen
ICDAR
2005
IEEE
14 years 6 months ago
Grouping Text Lines in Freeform Handwritten Notes
Handwritten text lines are prominent structures in freeform digital ink notes and their reliable detection is the foundation to a natural and intelligent interface for note editin...
Ming Ye, Herry Sutanto, Sashi Raghupathy, Chengyan...
ICDAR
2005
IEEE
14 years 6 months ago
Handwriting Matching and Its Application to Handwriting Synthesis
Since it is extremely expensive to collect a large volume of handwriting samples, synthesized data are often used to enlarge the training set. We argue that, in order to generate ...
Yefeng Zheng, David S. Doermann
ICDAR
2005
IEEE
14 years 6 months ago
Warped Image restoration with Applications to Digital Libraries
Recently, high resolution digital cameras have made the digitization process more flexible and convenient than traditional scanning technology. Therefore, document image analysis ...
Li Zhang, Chew Lim Tan
ICDAR
2005
IEEE
14 years 6 months ago
A Study on Vulnerability in On-line Writer Verification System
The analysis of vulnerabilities and threats in biometrics-based personal authentication systems is indispensable for the development and promotion of wide spread utilization of bi...
Yasushi Yamazaki, Akane Nakashima, Kazunobu Tasaka...
ICDAR
2005
IEEE
14 years 6 months ago
Using Fuzzy Logic to Analyze Superscript and Subscript Relations in Handwritten Mathematical Expressions
Handwritten mathematical notation contains ambiguities of various kinds. Here we focus on ambiguity in spatial relationships; in particular, we use fuzzy logic to treat ambiguity ...
Ling Zhang, Dorothea Blostein, Richard Zanibbi
ICDAR
2005
IEEE
14 years 6 months ago
The Recognition Strategy Language
The table recognition literature contains many strategies specified informally as a sequence of operations, obscuring both models of table structure and the effects of individual...
Richard Zanibbi, Dorothea Blostein, James R. Cordy
ICDAR
2005
IEEE
14 years 6 months ago
Historical Recall and Precision: Summarizing Generated Hypotheses
Document recognition involves many kinds of hypotheses: segmentation hypotheses, classification hypotheses, spatial relationship hypotheses, and so on. Many recognition strategie...
Richard Zanibbi, Dorothea Blostein, James R. Cordy