Title: Comparison of handwritings 2' Specification
1Comparison of handwritings2. Specification
Architecture
- Miroslava Boeková
- Thesis supervisor Doc. RNDr. Milan Ftácnik, PhD
- http//sprite.edi.fmph.uniba.sk/bozekova
2Goal
- Input is one or more handwritings
- the task is to create methods, which could
determine whether the document/documents was/were
written by the same person or not. - Implement and make experiments.
3I / O data
- Input scanned images
- Output data information
4Input
- IAM Handwriting Database
- My own scanning images
- Another Databases
- For more information see the first presentation
Experimental Data Sets
5Application I.
- Preprocessing
- Grayscale
- Binarization
- Normalization deskew document
- Noise reduction (identification handwriting from
noisy documents) - Rule Line Removal
- Lines Segmentation
6Application II.
- Normalization deskew and deslant
- Words Segmentation
- Graphemes Segmentation
- Grapheme codebook generation
- Feature extraction
- Feature matching/combination
- Writer verification
- Forgery detection
7Binarization I.
8Binarization II.
- Thresholding techniques
- Otsus method 1979 (global method)
- Kapur 1985, Niblack 1986
- Wang and Pavlidis 1993, Brink 1995
- Solihin and C.Leedham 1999 (two global
techniques native integral ratio (NIR) and
quadratic integral ratio (QIR)) - Sauvola 2000
- Zhang and Tan 2001 (improved Niblack)
9Normalization I.
10Normalization II.
- E. Kavallieratou, N. Fakotakis, G. Kokkinakis.
2002. Skew angle estimation for printed and
handwritten documents using the WignerVille
distribution. Image and Vision Computing 20
(2002) 813824. 2002.
11Identification handwriting I.
12Identification handwriting II.
- Segmentation process divide into regions - a
rectangular window (size determined dynamically
for each document or size of the character, word,
zone) - Classification process identify regions as one
of Machine-print, Handwriting or Noise - Noise - salt and pepper noise, scan noise,
scratches, black borders, logos
13Identification handwriting III.
- Y. Zheng. 2006. Handwriting identification,
matching and indexing in noisy document images.
LAMP-TR-129/CS-TR-4781/UMIACS-TR-2006-06,
University of Maryland, College Park, January
2006. 2006. - S. Shetty, H. Srinivasan, M. Beal and S. Srihari.
2007. Segmentation and labeling of documents
using Conditional Random Fields. Document
Recognition and Retrieval XIV, Xiaofan Lin
Berrin A. Yanikoglu, Editors, 65000U. 2007.
14Rule Line Detection and Removal I.
15Rule Line Detection and Removal II.
- Directional singly-connected chains (DSCC)
16Rule Line Detection and Removal III.
- DSCC-based text filtering
- perform horizontal vertical projection with a
hidden Markov model (HMM) decoding process to
detect lines - The Viterbi algorithm - search the optimal
positions of lines simultaneously from the
projection profile. - Line removal algorithm - a line width
thresholding based approach
17Rule Line Detection and Removal IV.
18Rule Line Detection and Removal V.
- Y. Zheng. 2006. Handwriting identification,
matching and indexing in noisy document images.
LAMP-TR-129/CS-TR-4781/UMIACS-TR-2006-06,
University of Maryland, College Park, January
2006. 2006.
19Line Segmentation I.
20Line Segmentation II.
- Chain code document representation
- Get initial set of candidate lines.
- Decisions if obstructed components belong above
or below (probabilistic, distance)
21Line Segmentation III.
22Line Segmentation IV.
- M. Arivazhagan, H. Srinivasan and S. Srihari.
2007. A Statistical approach to line segmentation
in handwritten documents. Document Recognition
and Retrieval XIV, Xiaofan Lin Berrin A.
Yanikoglu, Editors, 65000T. 2007.
23Deskew and deslant lines
24Word segmentation I.
- Several approaches
- the gaps between words (inter-word gaps) are
larger than those inside the words (intra-word
gaps) connected components the distances
between components (using some heuristic called
gap metric) a gap is an interword gap if the
size of the gap is above a threshold value the
extracted words may contain punctuation marks
(e.g. dot, comma, etc.) attached
25Word segmentation II.
- Using a neural network
- Scale space techniques
- The utilization of semantic knowledge
- Structure tree
26Word segmentation III.
27Word segmentation IV.
28Word segmentation III.
- Tamás Varga. 2006. Off-line Cursive Handwriting
Recognition Using Synthetic Training Data.
Medium Paperback, Year of Publication 2006,
ISBN158603636X. 2006.
29Graphemes segmentation I.
- Grapheme (sub or supra-allographic fragments) -
may or may not overlap a complete character - Allograph - one particular letter from an
alphabet can be realized using a number of
shapes. - Ligatures - the line segments that form
connections between characters
30Graphemes segmentation II.
- segment the ink at the minima in the lower
contour with the condition that the distance to
the upper contour is on the order of the
ink-trace width.
31Graphemes segmentation III.
- graphemes are extracted as connected components,
followed by a size normalization to 30x30 pixel
bitmaps, preserving the aspect ratio of the
original pattern.
32Grapheme codebook generation I.
- 3 clustering methods will be used to generate the
grapheme codebook - k-means (partitional clustering number of
clusters (k) is dedicated in advance) - Kohonen SOM 1D and 2D (self-organizing map,
without teacher).
33Grapheme codebook generation II.
34Grapheme codebook generation III.
35Grapheme codebook generation IV.
36Grapheme codebook generation II.
- Kohonen training show spatial order
- k-means is disorderly (k number of clusters)
- ksom1D - a long linear string of shapes and
gradual transitions can be observed if the map is
read in left-to-right top-to-bottom order. - The ksom2D codebook shows a clear bidimensional
organization.
37Writer verification vs. Writer identification
38Writer verification I.
- is to determine whether two documents were
written by the same person or not - ideal world no forged or disguised handwriting
- 2 levels the texture level (habitual pen-grip -
slant) and the allograph (character-shape) level.
39Writer verification II.
- feature extraction
- probability distribution functions (PDFs) -
vector of probabilities capturing a facet of
handwriting uniqueness - feature matching/feature combination
- writer verification
40Writer verification III.
41Writer verification IV.
- Contour-Direction PDF (f1)
42Writer verification V.
43Writer verification VI.
- Direction Co-Occurrence PDFs (f3h, f3v)
44Writer verification VII.
45Writer verification VIII.
- the PDF features (f1, f2, f3, f4, f5)
- distance measure between the feature vectors
between two given handwriting samples - q, i samples
- k is the number of bins
- in the PDF (the dimensionality of the feature),
p are entries in the PDF
46Writer verification IX.
- other distance measures Hamming, Euclid,
Bhattacharya, Minkowski up to order 5, 3,2 and
Hausdorff. - Distances up to a predefined decision threshold T
are deemed sufficiently low for considering that
the two samples have been written by the same
person. - Beyond T, the samples are considered to have been
written by different persons.
47Writer verification X.
48Forgery detection I.
- Sung-Hyuk Cha, Yi-Min Chee, and Charles C.
Tappert. 2004. Automatic Detection of Handwriting
Forgery Using a Fractal Number Estimate of
Wrinkliness. International Journal of Pattern
Recognition and Artificial Intelligence, Vol. 18,
No. 7 (2004) 1361-1371. 2004.
49Forgery detection II.
- forgers often carefully copy or trace genuine
handwriting - good forgeries retain the shape and size of
genuine writing are usually written more slowly
and are therefore wrinklier (less smooth) than
genuine writing. - the wrinkliness of the good forgeries is
significantly greater than that of the genuine
writings
50Forgery detection III.
- This wrinkliness feature can be measured using a
fractal dimension measure. - 8 features
- Centroid ratio
- Slant, Stroke width, and Ascender/Descender
- side-projected histogram, bottom-projected
histograms, the gradient histogram - the wrinkliness
51Forgery detection IV.
52Forgery detection V.
53Forgery detection VI.
54Three layer architecture
55GUI
- Work environment
- Graphs
- Results of methods/algorithms
56Application
57Database
- Storing the following data
- Information about images (author, paper, type of
writing utensil, source,) XML - Programs results (which images, which
methods/algorithms, errors,) - Will be input for experimental research
58Software
- Java
- NetBeans vs. Eclipse
- Libraries
- GUI Swing, Awt
- Jimi - class library for managing images (GIF,
JPEG, TIFF, PNG, PICT, Photoshop, BMP, ) - JAXB, JAXP
- MySQL, XML
59References
60