{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:27:21Z","timestamp":1743031641983,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319959290"},{"type":"electronic","value":"9783319959306"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-95930-6_3","type":"book-chapter","created":{"date-parts":[[2018,7,5]],"date-time":"2018-07-05T02:12:40Z","timestamp":1530756760000},"page":"15-24","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An Adaptive Segmentation Algorithm for Degraded Chinese Rubbing Image Binarization Based on Background Estimation"],"prefix":"10.1007","author":[{"given":"Han","family":"Huang","sequence":"first","affiliation":[]},{"given":"Zhi-Kai","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Yong-Li","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Ling-Ying","family":"Hou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,6]]},"reference":[{"issue":"05","key":"3_CR1","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1142\/S0129065708001671","volume":"18","author":"A Khashman","year":"2008","unstructured":"Khashman, A., Sekeroglu, B.: Document image binarisation using a supervised neural network. Int. J. Neural Syst. 18(05), 405\u2013418 (2008)","journal-title":"Int. J. Neural Syst."},{"issue":"2","key":"3_CR2","first-page":"899","volume":"205","author":"ZK Huang","year":"2008","unstructured":"Huang, Z.K., Chau, K.W.: A new image thresholding method based on Gaussian mixture model. Appl. Math. Comput. 205(2), 899\u2013907 (2008)","journal-title":"Appl. Math. Comput."},{"issue":"1","key":"3_CR3","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/TSMC.1979.4310076","volume":"9","author":"N Otsu","year":"1979","unstructured":"Otsu, N.: A threshold selection method from gray-level histograms. IEEE Trans. Syst. Man Cybern. 9(1), 62\u201366 (1979)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"issue":"8","key":"3_CR4","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1109\/34.784289","volume":"21","author":"Y Solihin","year":"1999","unstructured":"Solihin, Y., Leedham, C.G.: Integral ratio: a new class of global thresholding techniques for handwriting images. IEEE Trans. Pattern Anal. Mach. Intell. 21(8), 761\u2013768 (1999)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"2","key":"3_CR5","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1016\/S0031-3203(99)00055-2","volume":"33","author":"J Sauvola","year":"2000","unstructured":"Sauvola, J., Pietik\u00e4inen, M.: Adaptive document image binarization. Pattern Recogn. 33(2), 225\u2013236 (2000)","journal-title":"Pattern Recogn."},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Su, B., Lu, S., Tan, C.L.: Binarization of historical document images using the local maximum and minimum. In: Proceedings of the 9th IAPR International Workshop on Document Analysis Systems, pp. 159\u2013166. ACM (2010)","DOI":"10.1145\/1815330.1815351"},{"issue":"1","key":"3_CR7","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1117\/1.1631315","volume":"13","author":"M Sezgin","year":"2004","unstructured":"Sezgin, M., Sankur, B.: Survey over image thresholding techniques and quantitative performance evaluation. J. Electron. Imaging 13(1), 146\u2013166 (2004)","journal-title":"J. Electron. Imaging"},{"issue":"6","key":"3_CR8","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1006\/cgip.1994.1044","volume":"56","author":"L O\u2019Gorman","year":"1994","unstructured":"O\u2019Gorman, L.: Binarization and multithresholding of document images using connectivity. CVGIP Graph. Models Image Process. 56(6), 494\u2013506 (1994)","journal-title":"CVGIP Graph. Models Image Process."},{"issue":"3","key":"3_CR9","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/j.patrec.2008.10.003","volume":"30","author":"DY Huang","year":"2009","unstructured":"Huang, D.Y., Wang, C.H.: Optimal multi-level thresholding using a two-stage Otsu optimization approach. Pattern Recogn. Lett. 30(3), 275\u2013284 (2009)","journal-title":"Pattern Recogn. Lett."},{"key":"3_CR10","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1016\/j.neucom.2004.12.006","volume":"67","author":"S Chen","year":"2005","unstructured":"Chen, S., Wang, M.: Seeking multi-thresholds directly from support vectors for image segmentation. Neurocomputing 67, 335\u2013344 (2005)","journal-title":"Neurocomputing"},{"issue":"3","key":"3_CR11","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.patcog.2005.09.010","volume":"39","author":"B Gatos","year":"2006","unstructured":"Gatos, B., Pratikakis, I., Perantonis, S.J.: Adaptive degraded document image binarization. Pattern Recogn. 39(3), 317\u2013327 (2006)","journal-title":"Pattern Recogn."},{"issue":"6","key":"3_CR12","doi-asserted-by":"publisher","first-page":"2186","DOI":"10.1016\/j.patcog.2009.12.024","volume":"43","author":"RF Moghaddam","year":"2010","unstructured":"Moghaddam, R.F., Cheriet, M.: A multi-scale framework for adaptive binarization of degraded document images. Pattern Recogn. 43(6), 2186\u20132198 (2010)","journal-title":"Pattern Recogn."},{"issue":"12","key":"3_CR13","doi-asserted-by":"publisher","first-page":"4695","DOI":"10.1109\/TIP.2012.2214050","volume":"21","author":"A Mittal","year":"2012","unstructured":"Mittal, A., Moorthy, A.K., Bovik, A.C.: No-reference image quality assessment in the spatial domain. IEEE Trans. Image Process. 21(12), 4695\u20134708 (2012)","journal-title":"IEEE Trans. Image Process."},{"key":"3_CR14","unstructured":"http:\/\/www.lib.berkeley.edu\/EAL\/stone\/rubbings.html"},{"key":"3_CR15","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.neucom.2014.11.106","volume":"188","author":"ZK Huang","year":"2016","unstructured":"Huang, Z.K., Li, Z.H., Huang, H., et al.: Comparison of different image denoising algorithms for Chinese calligraphy images. Neurocomputing 188, 102\u2013112 (2016)","journal-title":"Neurocomputing"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Lu, S.J., Tan, C.L.: Binarization of badly illuminated document images through shading estimation and compensation. In: International Conference on Document Analysis and Recognition, pp. 312\u2013316. IEEE (2007)","DOI":"10.1109\/ICDAR.2007.4378723"},{"key":"3_CR17","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1016\/j.ijleo.2018.02.072","volume":"164","author":"W Xiong","year":"2018","unstructured":"Xiong, W., Xu, J., Xiong, Z., et al.: Degraded historical document image binarization using local features and support vector machine (SVM). Optik 164, 218\u2013223 (2018)","journal-title":"Optik"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Su, B., Lu, S., Tan, C.: Binarization of historical document images using the local maximum and minimum. In: Proceedings of the 9th IAPR International Workshop DAS, pp. 159\u2013166 (2010)","DOI":"10.1145\/1815330.1815351"},{"issue":"7","key":"3_CR19","doi-asserted-by":"publisher","first-page":"2916","DOI":"10.1109\/TIP.2014.2322451","volume":"23","author":"HZ Nafchi","year":"2014","unstructured":"Nafchi, H.Z., Moghaddam, R.F., Cheriet, M.: Phase-based binarization of ancient document images: model and applications. IEEE Trans. Image Process. Publ. IEEE Sig. Process. Soc. 23(7), 2916\u20132930 (2014)","journal-title":"IEEE Trans. Image Process. Publ. IEEE Sig. Process. Soc."},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Hadjadj, Z., Meziane, A., Cheriet, M., et al.: An active contour based method for image binarization: application to degraded historical document images. In: Isko-Maghreb: Concepts and Tools for Knowledge Management, pp. 1\u20137. IEEE (2015)","DOI":"10.1109\/ISKO-Maghreb.2014.7033452"}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Theories and Application"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-95930-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T08:38:54Z","timestamp":1710232734000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-95930-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319959290","9783319959306"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-95930-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"6 July 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Wuhan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ic-ic.tongji.edu.cn\/2018\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"LOD","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"632","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"275","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"72","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.46","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}