{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:47:31Z","timestamp":1742953651205,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030688837"},{"type":"electronic","value":"9783030688844"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-68884-4_34","type":"book-chapter","created":{"date-parts":[[2021,2,8]],"date-time":"2021-02-08T23:29:09Z","timestamp":1612826949000},"page":"409-419","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Multi-patch Deep Learning System for Text-Independent Writer Identification"],"prefix":"10.1007","author":[{"given":"Dawei","family":"Liang","sequence":"first","affiliation":[]},{"given":"Meng","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,7]]},"reference":[{"issue":"3","key":"34_CR1","doi-asserted-by":"publisher","first-page":"699","DOI":"10.1007\/s10044-014-0438-y","volume":"19","author":"S Al-Maadeed","year":"2014","unstructured":"Al-Maadeed, S., Hassaine, A., Bouridane, A., Tahir, M.A.: Novel geometric features for off-line writer identification. Pattern Anal. Appl. 19(3), 699\u2013708 (2014). https:\/\/doi.org\/10.1007\/s10044-014-0438-y","journal-title":"Pattern Anal. Appl."},{"key":"34_CR2","doi-asserted-by":"publisher","unstructured":"Aliakbarzadeh, M., Razzazi, F.: Online Persian\/Arabic writer identification using gated recurrent unit neural networks. Majlesi J. Electr. Eng. 14(3), 73\u201379 (2020). https:\/\/doi.org\/10.29252\/mjee.14.3.9. http:\/\/www.mjee.org\/index\/index.php\/ee\/article\/view\/mjee.14.3.9","DOI":"10.29252\/mjee.14.3.9"},{"issue":"6","key":"34_CR3","doi-asserted-by":"publisher","first-page":"2069","DOI":"10.1016\/j.eswa.2012.10.016","volume":"40","author":"D Bertolini","year":"2013","unstructured":"Bertolini, D., Oliveira, L.S., Justino, E.J.R., Sabourin, R.: Texture-based descriptors for writer identification and verification. Expert Syst. Appl. 40(6), 2069\u20132080 (2013). https:\/\/doi.org\/10.1016\/j.eswa.2012.10.016","journal-title":"Expert Syst. Appl."},{"key":"34_CR4","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1016\/j.patcog.2016.10.005","volume":"63","author":"V Christlein","year":"2017","unstructured":"Christlein, V., Bernecker, D., H\u00f6nig, F., Maier, A.K., Angelopoulou, E.: Writer identification using GMM supervectors and exemplar-SVMs. Pattern Recognit. 63, 258\u2013267 (2017). https:\/\/doi.org\/10.1016\/j.patcog.2016.10.005","journal-title":"Pattern Recognit."},{"key":"34_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1007\/978-3-319-24947-6_45","volume-title":"Pattern Recognition","author":"V Christlein","year":"2015","unstructured":"Christlein, V., Bernecker, D., Maier, A., Angelopoulou, E.: Offline writer identification using convolutional neural network activation features. In: Gall, J., Gehler, P., Leibe, B. (eds.) GCPR 2015. LNCS, vol. 9358, pp. 540\u2013552. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24947-6_45"},{"key":"34_CR6","doi-asserted-by":"publisher","unstructured":"Christlein, V., Gropp, M., Fiel, S., Maier, A.K.: Unsupervised feature learning for writer identification and writer retrieval. In: 14th IAPR International Conference on Document Analysis and Recognition, ICDAR 2017, Kyoto, Japan, 9\u201315 November 2017, pp. 991\u2013997. IEEE (2017). https:\/\/doi.org\/10.1109\/ICDAR.2017.165","DOI":"10.1109\/ICDAR.2017.165"},{"key":"34_CR7","doi-asserted-by":"publisher","unstructured":"Christlein, V., Maier, A.K.: Encoding CNN activations for writer recognition. In: 13th IAPR International Workshop on Document Analysis Systems, DAS 2018, Vienna, Austria, 24\u201327 April 2018, pp. 169\u2013174. IEEE (2018). https:\/\/doi.org\/10.1109\/DAS.2018.9","DOI":"10.1109\/DAS.2018.9"},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Cilia, N.D., De Stefano, C., Fontanella, F., Marrocco, C., Molinara, M., Freca, A.S.d.: An experimental comparison between deep learning and classical machine learning approaches for writer identification in medieval documents. J. Imaging 6(9), 89 (2020)","DOI":"10.3390\/jimaging6090089"},{"key":"34_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/978-3-030-30754-7_19","volume-title":"New Trends in Image Analysis and Processing \u2013 ICIAP 2019","author":"ND Cilia","year":"2019","unstructured":"Cilia, N.D., De Stefano, C., Fontanella, F., Marrocco, C., Molinara, M., Scotto di Freca, A.: A page-based reject option for writer identification in medieval books. In: Cristani, M., Prati, A., Lanz, O., Messelodi, S., Sebe, N. (eds.) ICIAP 2019. LNCS, vol. 11808, pp. 187\u2013197. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30754-7_19"},{"key":"34_CR10","unstructured":"Dengel, A., Ahmad, R.: A novel skew detection and correction approach for scanned documents. In: 12th International IAPR Workshop on Document Analysis Systems, DAS 2016, April 2016"},{"key":"34_CR11","doi-asserted-by":"publisher","unstructured":"Diem, M., Kleber, F., Sablatnig, R.: Text line detection for heterogeneous documents. In: 12th International Conference on Document Analysis and Recognition, ICDAR 2013, Washington, DC, USA, 25\u201328 August 2013, pp. 743\u2013747. IEEE (2013). https:\/\/doi.org\/10.1109\/ICDAR.2013.152","DOI":"10.1109\/ICDAR.2013.152"},{"key":"34_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/978-3-319-23117-4_3","volume-title":"Computer Analysis of Images and Patterns","author":"S Fiel","year":"2015","unstructured":"Fiel, S., Sablatnig, R.: Writer identification and retrieval using a convolutional neural network. In: Azzopardi, G., Petkov, N. (eds.) CAIP 2015. LNCS, vol. 9257, pp. 26\u201337. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23117-4_3"},{"key":"34_CR13","unstructured":"Glorot, X., Bordes, A., Bengio, Y.: Domain adaptation for large-scale sentiment classification: a deep learning approach. In: Getoor, L., Scheffer, T. (eds.) Proceedings of the 28th International Conference on Machine Learning, ICML 2011, Bellevue, Washington, USA, 28 June - 2 July 2011, pp. 513\u2013520. Omnipress (2011). https:\/\/icml.cc\/2011\/papers\/342_icmlpaper.pdf"},{"key":"34_CR14","doi-asserted-by":"publisher","unstructured":"He, K., Zhang, X., Ren, S., Sun, J.: Deep residual learning for image recognition. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, Las Vegas, NV, USA, 27\u201330 June 2016, pp. 770\u2013778. IEEE (2016). https:\/\/doi.org\/10.1109\/CVPR.2016.90","DOI":"10.1109\/CVPR.2016.90"},{"key":"34_CR15","doi-asserted-by":"publisher","unstructured":"Javidi, M., Jampour, M.: A deep learning framework for text-independent writer identification. Eng. Appl. Artif. Intell. 95, 103912 (2020). https:\/\/doi.org\/10.1016\/j.engappai.2020.103912. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0952197620302463","DOI":"10.1016\/j.engappai.2020.103912"},{"key":"34_CR16","doi-asserted-by":"publisher","unstructured":"Kleber, F., Fiel, S., Diem, M., Sablatnig, R.: CVL -database: an off-line database for writer retrieval, writer identification and word spotting. In: 12th International Conference on Document Analysis and Recognition, ICDAR 2013, Washington, DC, USA, 25\u201328 August 2013, pp. 560\u2013564. IEEE (2013). https:\/\/doi.org\/10.1109\/ICDAR.2013.117","DOI":"10.1109\/ICDAR.2013.117"},{"key":"34_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1007\/978-3-030-24900-7_19","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"Z Li","year":"2019","unstructured":"Li, Z., Jiang, X., Pang, Y.: Evaluation of face recognition techniques based on Symlet 2 wavelet and support vector machine. In: Wang, G., Feng, J., Bhuiyan, M.Z.A., Lu, R. (eds.) SpaCCS 2019. LNCS, vol. 11637, pp. 228\u2013239. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-24900-7_19"},{"key":"34_CR18","doi-asserted-by":"publisher","unstructured":"Louloudis, G., Gatos, B., Stamatopoulos, N., Papandreou, A.: ICDAR 2013 competition on writer identification. In: 12th International Conference on Document Analysis and Recognition, ICDAR 2013, Washington, DC, USA, 25\u201328 August 2013, pp. 1397\u20131401. IEEE (2013). https:\/\/doi.org\/10.1109\/ICDAR.2013.282","DOI":"10.1109\/ICDAR.2013.282"},{"key":"34_CR19","doi-asserted-by":"publisher","unstructured":"Louloudis, G., Stamatopoulos, N., Gatos, B.: ICDAR 2011 writer identification contest. In: 2011 International Conference on Document Analysis and Recognition, ICDAR 2011, Beijing, China, 18\u201321 September 2011, pp. 1475\u20131479. IEEE (2011). https:\/\/doi.org\/10.1109\/ICDAR.2011.293","DOI":"10.1109\/ICDAR.2011.293"},{"key":"34_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/978-3-030-05345-1_36","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"P Oser","year":"2018","unstructured":"Oser, P., Kargl, F., L\u00fcders, S.: Identifying devices of the internet of things using machine learning on clock characteristics. In: Wang, G., Chen, J., Yang, L.T. (eds.) SpaCCS 2018. LNCS, vol. 11342, pp. 417\u2013427. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-05345-1_36"},{"key":"34_CR21","doi-asserted-by":"publisher","first-page":"17149","DOI":"10.1109\/ACCESS.2018.2890810","volume":"7","author":"A Rehman","year":"2019","unstructured":"Rehman, A., Naz, S., Razzak, M.I., Hameed, I.A.: Automatic visual features for writer identification: a deep learning approach. IEEE Access 7, 17149\u201317157 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2018.2890810","journal-title":"IEEE Access"},{"key":"34_CR22","doi-asserted-by":"publisher","unstructured":"Shaus, A., Turkel, E.: Writer identification in modern and historical documents via binary pixel patterns, Kolmogorov-Smirnov test and Fisher\u2019s method. In: Rogowitz, B.E., Pappas, T.N., de Ridder, H. (eds.) Human Vision and Electronic Imaging 2017, Burlingame, CA, USA, 29 January 2017\u20132 February 2017, pp. 203\u2013211. Ingenta (2017). https:\/\/doi.org\/10.2352\/ISSN.2470-1173.2017.14.HVEI-144","DOI":"10.2352\/ISSN.2470-1173.2017.14.HVEI-144"},{"key":"34_CR23","doi-asserted-by":"publisher","unstructured":"Tang, Y., Wu, X.: Text-independent writer identification via CNN features and joint Bayesian. In: 15th International Conference on Frontiers in Handwriting Recognition, ICFHR 2016, Shenzhen, China, 23\u201326 October 2016, pp. 566\u2013571. IEEE (2016). https:\/\/doi.org\/10.1109\/ICFHR.2016.0109","DOI":"10.1109\/ICFHR.2016.0109"},{"issue":"3","key":"34_CR24","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1109\/TIFS.2014.2301274","volume":"9","author":"X Wu","year":"2014","unstructured":"Wu, X., Tang, Y., Bu, W.: Offline text-independent writer identification based on scale invariant feature transform. IEEE Trans. Inf. Foren. Secur. 9(3), 526\u2013536 (2014). https:\/\/doi.org\/10.1109\/TIFS.2014.2301274","journal-title":"IEEE Trans. Inf. Foren. Secur."},{"key":"34_CR25","doi-asserted-by":"publisher","unstructured":"Xing, L., Qiao, Y.: Deepwriter: a multi-stream deep CNN for text-independent writer identification. In: 15th International Conference on Frontiers in Handwriting Recognition, ICFHR 2016, Shenzhen, China, 23\u201326 October 2016, pp. 584\u2013589. IEEE (2016). https:\/\/doi.org\/10.1109\/ICFHR.2016.0112","DOI":"10.1109\/ICFHR.2016.0112"},{"key":"34_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1007\/978-3-030-05345-1_43","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"X Yan","year":"2018","unstructured":"Yan, X., Cui, B., Li, J.: Malicious domain name recognition based on deep neural networks. In: Wang, G., Chen, J., Yang, L.T. (eds.) SpaCCS 2018. LNCS, vol. 11342, pp. 497\u2013505. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-05345-1_43"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-68884-4_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,8]],"date-time":"2021-02-08T23:47:29Z","timestamp":1612828049000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-68884-4_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030688837","9783030688844"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-68884-4_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"7 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.spaccs2020.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"131","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}