{"title":"书写者验证任务中字形复杂度的相关性","authors":"A. Bensefia, Chawki Djeddi","doi":"10.1109/IRI49571.2020.00016","DOIUrl":null,"url":null,"abstract":"Recognizing and identifying people, based on their physical and behavioral characteristics, have always had a wide range of applications, inciting researchers to propose dedicated human recognition systems for each human characteristic. These systems operate according to two different modes: identification mode, where the task is to assign one of the preregistered identities in the system to the human’s sample read as input. The second mode is the verification (authentication), is a decision task stating if a human’s sample read as input belongs really to the claimed identity. Handwriting has emerged as one of these behavioral features that attracted a lot of interests during the last decade. Many writer identification systems have been developed comparing to writer verification (authentication) systems. In this paper we propose an original approach based on the usage of the shape complexity to authenticate writers’ identities. To this end, a local feature (grapheme) is considered, where the graphemes are generated automatically with a dedicated segmentation module. The Fourier Elliptic Transform was used to measure the shape complexity of the resulting graphemes. Only the top complex graphemes (K-Graphemes) were used to measure the similarity between a pair of handwritten samples. The approach was evaluated with 3 sets of 50 different writers of the BFL dataset, where we obtained a performance of almost 80% of good acceptance at 8% error rate. These results validate completely the relevance of the shape complexity in writer recognition tasks.","PeriodicalId":93159,"journal":{"name":"2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science : IRI 2020 : proceedings : virtual conference, 11-13 August 2020. IEEE International Conference on Information Reuse and Integration (21st : 2...","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Relevance of Grapheme’s Shape Complexity in Writer Verification Task\",\"authors\":\"A. Bensefia, Chawki Djeddi\",\"doi\":\"10.1109/IRI49571.2020.00016\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recognizing and identifying people, based on their physical and behavioral characteristics, have always had a wide range of applications, inciting researchers to propose dedicated human recognition systems for each human characteristic. These systems operate according to two different modes: identification mode, where the task is to assign one of the preregistered identities in the system to the human’s sample read as input. The second mode is the verification (authentication), is a decision task stating if a human’s sample read as input belongs really to the claimed identity. Handwriting has emerged as one of these behavioral features that attracted a lot of interests during the last decade. Many writer identification systems have been developed comparing to writer verification (authentication) systems. In this paper we propose an original approach based on the usage of the shape complexity to authenticate writers’ identities. To this end, a local feature (grapheme) is considered, where the graphemes are generated automatically with a dedicated segmentation module. The Fourier Elliptic Transform was used to measure the shape complexity of the resulting graphemes. Only the top complex graphemes (K-Graphemes) were used to measure the similarity between a pair of handwritten samples. The approach was evaluated with 3 sets of 50 different writers of the BFL dataset, where we obtained a performance of almost 80% of good acceptance at 8% error rate. These results validate completely the relevance of the shape complexity in writer recognition tasks.\",\"PeriodicalId\":93159,\"journal\":{\"name\":\"2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science : IRI 2020 : proceedings : virtual conference, 11-13 August 2020. IEEE International Conference on Information Reuse and Integration (21st : 2...\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science : IRI 2020 : proceedings : virtual conference, 11-13 August 2020. IEEE International Conference on Information Reuse and Integration (21st : 2...\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IRI49571.2020.00016\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science : IRI 2020 : proceedings : virtual conference, 11-13 August 2020. IEEE International Conference on Information Reuse and Integration (21st : 2...","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IRI49571.2020.00016","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

基于人的身体和行为特征来识别和识别人,一直有着广泛的应用,这促使研究人员为每个人的特征提出专门的人类识别系统。这些系统根据两种不同的模式运行:识别模式,其中任务是将系统中预注册的身份之一分配给人类的样本读取作为输入。第二种模式是验证(authentication),这是一项决策任务,说明作为输入读取的人类样本是否真正属于所声称的身份。在过去的十年里,书写已经成为这些行为特征之一,吸引了很多人的兴趣。与编写器验证(身份验证)系统相比,已经开发了许多编写器识别系统。本文提出了一种基于形状复杂度的作者身份认证方法。为此,考虑了一个局部特征(字素),其中字素是用专用的分割模块自动生成的。傅里叶椭圆变换用于测量所得到的石墨烯的形状复杂度。仅使用顶部复杂石墨烯(k -石墨烯)来测量一对手写样本之间的相似性。我们用BFL数据集的3组50个不同的作者对该方法进行了评估,我们在8%的错误率下获得了几乎80%的良好接受度。这些结果完全验证了形状复杂性在写作者识别任务中的相关性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Relevance of Grapheme’s Shape Complexity in Writer Verification Task
Recognizing and identifying people, based on their physical and behavioral characteristics, have always had a wide range of applications, inciting researchers to propose dedicated human recognition systems for each human characteristic. These systems operate according to two different modes: identification mode, where the task is to assign one of the preregistered identities in the system to the human’s sample read as input. The second mode is the verification (authentication), is a decision task stating if a human’s sample read as input belongs really to the claimed identity. Handwriting has emerged as one of these behavioral features that attracted a lot of interests during the last decade. Many writer identification systems have been developed comparing to writer verification (authentication) systems. In this paper we propose an original approach based on the usage of the shape complexity to authenticate writers’ identities. To this end, a local feature (grapheme) is considered, where the graphemes are generated automatically with a dedicated segmentation module. The Fourier Elliptic Transform was used to measure the shape complexity of the resulting graphemes. Only the top complex graphemes (K-Graphemes) were used to measure the similarity between a pair of handwritten samples. The approach was evaluated with 3 sets of 50 different writers of the BFL dataset, where we obtained a performance of almost 80% of good acceptance at 8% error rate. These results validate completely the relevance of the shape complexity in writer recognition tasks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Attention-Guided Generative Adversarial Network to Address Atypical Anatomy in Synthetic CT Generation. Natural Language-based Integration of Online Review Datasets for Identification of Sex Trafficking Businesses. An Adaptive and Dynamic Biosensor Epidemic Model for COVID-19 Relating the Empirical Foundations of Attack Generation and Vulnerability Discovery Latent Feature Modelling for Recommender Systems
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1