{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:27:44Z","timestamp":1743035264635,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319221793"},{"type":"electronic","value":"9783319221809"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22180-9_46","type":"book-chapter","created":{"date-parts":[[2015,8,10]],"date-time":"2015-08-10T13:07:32Z","timestamp":1439212052000},"page":"477-482","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Binarization Chinese Rubbing Images Using Gaussian Mixture Model"],"prefix":"10.1007","author":[{"given":"Zhi-Kai","family":"Huang","sequence":"first","affiliation":[]},{"given":"Fang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jun-Mei","family":"Xi","sequence":"additional","affiliation":[]},{"given":"Han","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,11]]},"reference":[{"key":"46_CR1","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Rubbing"},{"key":"46_CR2","unstructured":"http:\/\/archive.fieldmuseum.org\/chineserubbings\/introduction_2.asp"},{"key":"46_CR3","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-81-322-1817-3_14","volume-title":"Emerging Trends in Computing and Communication","author":"B Roy","year":"2014","unstructured":"Roy, B., Chatterjee, R.K.: Historical handwritten document image segmentation using morphology. In: Sengupta, S\t., Das, K., Khan, G. (eds.) ETCC 2014. LNEE, vol. 298, pp. 123\u2013131. Springer, Heidelberg (2014)"},{"issue":"2","key":"46_CR4","doi-asserted-by":"publisher","first-page":"899","DOI":"10.1016\/j.amc.2008.05.130","volume":"205","author":"Z-K Huang","year":"2008","unstructured":"Huang, Z.-K., Chau, K.-W.: A new image thresholding method based on Gaussian mixture model. Appl. Math. Comput. 205(2), 899\u2013907 (2008)","journal-title":"Appl. Math. Comput."},{"key":"46_CR5","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/0734-189X(90)90053-X","volume":"52","author":"SU Le","year":"1990","unstructured":"Le, S.U., Chung, S.Y., Park, R.H.: A comparative performance study of several global thresholding techniques for segmentation. Graph. Models Image Process. 52, 171\u2013190 (1990)","journal-title":"Graph. Models Image Process."},{"key":"46_CR6","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/0734-189X(85)90093-3","volume":"30","author":"J Kittler","year":"1985","unstructured":"Kittler, J., Illingworth, J.: Threshold selection based on a simple image statistic. Comput. Vis. Graph. Image Process. CVGIP 30, 125\u2013147 (1985)","journal-title":"Comput. Vis. Graph. Image Process. CVGIP"},{"key":"46_CR7","first-page":"115","volume-title":"An Introduction to Digital Image Processing","author":"W Niblack","year":"1986","unstructured":"Niblack, W.: An Introduction to Digital Image Processing, pp. 115\u2013116. Prentice-Hall, Englewood Cliffs (1986)"},{"key":"46_CR8","doi-asserted-by":"crossref","unstructured":"Sa\u00efdane, Z., Garcia, C.: Robust binarization for video text recognition. In: International Conference on Document Analysis and Recognition, vol. 2, pp. 874\u2013879 (2007)","DOI":"10.1109\/ICDAR.2007.4377040"},{"key":"46_CR9","doi-asserted-by":"crossref","unstructured":"Mishra, A., Alahari, K., Jawahar, C.: An MRF model for binarization of natural scene text. In: International Conference on Document Analysis and Recognition, pp. 11\u201316 (2011)","DOI":"10.1109\/ICDAR.2011.12"},{"issue":"6","key":"46_CR10","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.patcog.2005.09.010","volume":"39","author":"B Gatos","year":"2006","unstructured":"Gatos, B., Pratikakis, I., Perantonis, S.J.: Adaptive degraded document image binarization. Pattern Recogn. 39(6), 317\u2013327 (2006)","journal-title":"Pattern Recogn."},{"key":"46_CR11","doi-asserted-by":"crossref","unstructured":"Agam, G., Bal, G., Frieder, G., Frieder, O.: Degraded document image enhancement. In: Lin, X., Yanikoglu, B.A. (eds.) Document Recognition and Retrieval XIV. Proceeding of the SPIE, vol. 6500, pp. 65000C-1\u201365000C-11 (2007)","DOI":"10.1117\/12.706484"},{"key":"46_CR12","doi-asserted-by":"crossref","unstructured":"Zhou, Z., Li, L., Tan, C.: Edge based binarization for video text images. In: International Conference on Pattern Recognition, pp. 133\u2013136 (2010)","DOI":"10.1109\/ICPR.2010.41"},{"key":"46_CR13","unstructured":"http:\/\/pds.lib.harvard.edu\/pds\/view\/10401767?n=1&imagesize=1200&jp2Res=.25&printThumbnails=no"},{"issue":"2","key":"46_CR14","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1137\/1026034","volume":"26","author":"RA Redner","year":"1984","unstructured":"Redner, R.A., Walker, H.F.: Mixture densities, maximum likelihood and the EM algorithm. SIAM Rev. 26(2), 195\u2013239 (1984)","journal-title":"SIAM Rev."},{"issue":"1","key":"46_CR15","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s10032-005-0007-4","volume":"8","author":"U Garain","year":"2006","unstructured":"Garain, U., Paquet, T., Heutte, L.: On foreground\u2014background separation in low quality document images. Int. J. Doc. Anal. Recogn. (IJDAR) 8(1), 47\u201363 (2006)","journal-title":"Int. J. Doc. Anal. Recogn. (IJDAR)"}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Theories and Methodologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22180-9_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T06:05:53Z","timestamp":1676959553000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22180-9_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319221793","9783319221809"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22180-9_46","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"11 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}