Abstract book (pdf) - ICPR 2010
Abstract book (pdf) - ICPR 2010
Abstract book (pdf) - ICPR 2010
- TAGS
- abstract
- icpr
- icpr2010.org
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
opportunities in literary analyses of Ottoman poetry where the majority of it is in handwritten form. In this study, we propose<br />
a matching criterion and method, Red if Extraction using Contour Segments (RECS) using the proposed matching criterion,<br />
that detects redifs in handwritten Ottoman literary texts using only visual analysis. Our method provides a success rate of<br />
0.682 in a test collection of 100 poems.<br />
13:30-16:30,Paper TuBCT9.24<br />
Analysis of Local Features for Handwritten Character Recognition<br />
Uchida, Seiichi, Kyushu Univ.<br />
Liwicki, Marcus, DFKI<br />
This paper investigates a part-based recognition method of handwritten digits. In the proposed method, the global structure<br />
of digit patterns is discarded by representing each pattern by just a set of local feature vectors. The method is then comprised<br />
of two steps. First, each of J local feature vectors of a target pattern is recognized into one of ten categories (``0’’—``9’’) by<br />
the nearest neighbor discrimination with a large database of reference vectors. Second, the category of the target pattern is<br />
determined by the majority voting on the J local recognition results. Despite a pessimistic expectation, we have reached<br />
recognition rates much higher than 90% for the task of digit recognition.<br />
13:30-16:30,Paper TuBCT9.25<br />
Detect Visual Spoofing in Unicode-Based Text<br />
Qiu, Bite, City Univ. of Hong Kong<br />
Fang, Ning, City Univ. of Hong Kong<br />
Liu, Wenyin, City U of HK<br />
Visual spoofing in Unicode-based text is anticipated as a severe web security problem in the near future as more and more<br />
Unicode-based web documents will be used. In this paper, to detect whether a suspicious Unicode character in a word is<br />
visual spoofing or not, the context of the suspicious character is utilized by employing a Bayesian framework. Specifically,<br />
two contexts are taken into consideration: simple context and general context. Simple context of a suspicious character is<br />
the word where the character exists while general context consists of all homoglyphs of the character within Universal Character<br />
Set (UCS). Three decision rules are designed and used jointly for convicting a suspicious character. Preliminary evaluations<br />
and user study show that the proposed approach can detect Unicode-based visual spoofing with high effectiveness<br />
and efficiency.<br />
13:30-16:30,Paper TuBCT9.26<br />
Comparing Several Techniques for Offline Recognition of Printed Mathematical Symbols<br />
Álvaro, Francisco, Inst. Tecnológico de Informática<br />
Sánchez, Joan Andreu, Univ. Pol. De Valencia<br />
Automatic recognition of printed mathematical symbols is a fundamental problem for recognition of mathematical expressions.<br />
Several classification techniques has been previously used, but there are very few works that compare different classification<br />
techniques on the same database and with the same experimental conditions. In this work we have tested classical<br />
and novelty classification techniques for mathematical symbol recognition on two databases.<br />
13:30-16:30,Paper TuBCT9.27<br />
Symbol Classification using Dynamic Aligned Shape Descriptor<br />
Fornés, Alicia Computer Vision Center<br />
Escalera, Sergio UB<br />
Llados, Josep Computer Vision Center<br />
Valveny, Ernest Univ. Autònoma de Barcelona<br />
Shape representation is a difficult task because of several symbol distortions, such as occlusions, elastic deformations, gaps<br />
or noise. In this paper, we propose a new descriptor and distance computation for coping with the problem of symbol recognition<br />
in the domain of Graphical Document Image Analysis. The proposed D-Shape descriptor encodes the arrangement information<br />
of object parts in a circular structure, allowing different levels of distortion. The classification is performed using<br />
a cyclic Dynamic Time Warping based method, allowing distortions and rotation. The methodology has been validated on<br />
different data sets, showing very high recognition rates.<br />
- 148 -