{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:53:26Z","timestamp":1725562406677},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540219378"},{"type":"electronic","value":"9783540246749"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24674-9_50","type":"book-chapter","created":{"date-parts":[[2010,8,5]],"date-time":"2010-08-05T01:36:21Z","timestamp":1280972181000},"page":"476-485","source":"Crossref","is-referenced-by-count":3,"title":["Locating Text in Historical Collection Manuscripts"],"prefix":"10.1007","author":[{"given":"Basilios","family":"Gatos","sequence":"first","affiliation":[]},{"given":"Ioannis","family":"Pratikakis","sequence":"additional","affiliation":[]},{"given":"Stavros J.","family":"Perantonis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"50_CR1","volume-title":"Digital Picture Processing","author":"A. Rosenfeld","year":"1982","unstructured":"Rosenfeld, A., Kak, A.C.: Digital Picture Processing, 2nd edn. Academic Press, New York (1982)","edition":"2"},{"issue":"1","key":"50_CR2","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/TSMC.1979.4310076","volume":"9","author":"N. Otsu","year":"1979","unstructured":"Otsu, N.: A threshold selection method from gray-level histograms. IEEE Trans. Systems Man Cybernet.\u00a09(1), 62\u201366 (1979)","journal-title":"IEEE Trans. Systems Man Cybernet."},{"key":"50_CR3","doi-asserted-by":"crossref","first-page":"652","DOI":"10.1109\/TSMC.1985.6313443","volume":"15","author":"J. Kittler","year":"1985","unstructured":"Kittler, J., Illingworth, J.: On threshold selection using clustering criteria. IEEE Trans. Systems Man Cybernet.\u00a015, 652\u2013655 (1985)","journal-title":"IEEE Trans. Systems Man Cybernet."},{"issue":"8","key":"50_CR4","doi-asserted-by":"publisher","first-page":"803","DOI":"10.1016\/0031-3203(92)90034-G","volume":"25","author":"A.D. Brink","year":"1992","unstructured":"Brink, A.D.: Thresholding of digital images using two-dimensional entropies. Pattern Recognition\u00a025(8), 803\u2013808 (1992)","journal-title":"Pattern Recognition"},{"issue":"12","key":"50_CR5","doi-asserted-by":"publisher","first-page":"2025","DOI":"10.1016\/S0031-3203(96)00050-7","volume":"29","author":"H. Yan","year":"1996","unstructured":"Yan, H.: Unified formulation of a class of image thresholding techniques. Pattern Recognition\u00a029(12), 2025\u20132032 (1996)","journal-title":"Pattern Recognition"},{"issue":"2","key":"50_CR6","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/0734-189X(88)90022-9","volume":"41","author":"P.K. Sahoo","year":"1988","unstructured":"Sahoo, P.K., Soltani, S., Wong, A.K.C.: A survey of Thresholding Techniques. Computer Vision, Graphics and Image Processing\u00a041(2), 233\u2013260 (1988)","journal-title":"Computer Vision, Graphics and Image Processing"},{"key":"50_CR7","unstructured":"Kim, I.K., Park, R.H.: Local adaptive thresholding based on a water flow model. In: Second Japan-Korea Joint Workshop on Computer Vision, Japan, pp. 21\u201327 (1996)"},{"key":"50_CR8","first-page":"115","volume-title":"An Introduction to Digital Image Processing","author":"W. Niblack","year":"1986","unstructured":"Niblack, W.: An Introduction to Digital Image Processing, pp. 115\u2013116. Prentice Hall, Englewood Cliffs (1986)"},{"issue":"2","key":"50_CR9","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/0167-8655(94)90043-4","volume":"15","author":"J. Yang","year":"1994","unstructured":"Yang, J., Chen, Y., Hsu, W.: Adaptive thresholding algorithm and its hardware implementation. Pattern Recognition Lett\u00a015(2), 141\u2013150 (1994)","journal-title":"Pattern Recognition Lett"},{"key":"50_CR10","doi-asserted-by":"crossref","unstructured":"Parker, J.R., Jennings, C., Salkauskas, A.G.: Thresholding using an illumination model. In: ICDAR 1993, pp. 270\u2013273 (1993)","DOI":"10.1109\/ICDAR.1993.395734"},{"key":"50_CR11","doi-asserted-by":"crossref","unstructured":"Sauvola, J., Seppanen, T., Haapakoski, S., Pietikainen, M.: Adaptive Document Binarization. In: International Conference on Document Analysis and Recognition, pp. 147\u2013152 (1997)","DOI":"10.1109\/ICDAR.1997.619831"},{"key":"50_CR12","unstructured":"Chang, M., Kang, S., Rho, W., Kim, H., Kim, D.: Improved binarization algorithm for document image by histogram and edge detection. In: ICDAR 1995, pp. 636\u2013643 (1993)"},{"issue":"12","key":"50_CR13","doi-asserted-by":"publisher","first-page":"1191","DOI":"10.1109\/34.476511","volume":"17","author":"O.D. Trier","year":"1995","unstructured":"Trier, O.D., Jain, A.K.: Goal-Directed Evaluation of Binarization Methods. IEEE Trans. on Patt. Anal. and Mach. Intell.\u00a017(12), 1191\u20131201 (1995)","journal-title":"IEEE Trans. on Patt. Anal. and Mach. Intell."},{"key":"50_CR14","unstructured":"Eikvil, L., Taxt, T., Moen, K.: A fast adaptive method for binarization of document images. In: Int. Conf. Document Analysis and Recognition, France, pp. 435\u2013443 (1991)"},{"key":"50_CR15","doi-asserted-by":"crossref","unstructured":"Seeger, M., Dance, C.: Binarising Camera Images for OCR. In: Sixth International Conference on Document Analysis and Recognition (ICDAR 2001), Seattle, Washington, pp. 54\u201358 (2001)","DOI":"10.1109\/ICDAR.2001.953754"},{"key":"50_CR16","volume-title":"Fundamentals of Digital Image Processing","author":"A. Jain","year":"1989","unstructured":"Jain, A.: Fundamentals of Digital Image Processing. Prantice Hall, Englewood Cliffs (1989)"},{"key":"50_CR17","unstructured":"http:\/\/www.finereader.com"},{"key":"50_CR18","first-page":"707","volume":"6","author":"V.I. Levenshtein","year":"1966","unstructured":"Levenshtein, V.I.: Binary codes capable of correcting deletions, insertions and reversals. Sov. Phys. Dokl.\u00a06, 707\u2013710 (1966)","journal-title":"Sov. Phys. Dokl."}],"container-title":["Lecture Notes in Computer Science","Methods and Applications of Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24674-9_50.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:00:23Z","timestamp":1620010823000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24674-9_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540219378","9783540246749"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24674-9_50","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}