{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:54:16Z","timestamp":1760597656047,"version":"3.37.3"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2015,7,25]],"date-time":"2015-07-25T00:00:00Z","timestamp":1437782400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61201424"],"award-info":[{"award-number":["61201424"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61301238"],"award-info":[{"award-number":["61301238"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61212005"],"award-info":[{"award-number":["61212005"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Tianjin Fundamental Research Funds under","award":["14JCTPJC00556"],"award-info":[{"award-number":["14JCTPJC00556"]}]},{"name":"Tianjin Fundamental Research Funds under","award":["14JCTPJC00501"],"award-info":[{"award-number":["14JCTPJC00501"]}]},{"name":"Natural Science Foundation of Tianjin, China","award":["12JCYBJC10100"],"award-info":[{"award-number":["12JCYBJC10100"]}]},{"name":"Natural Science Foundation of Tianjin, China","award":["14ZCDZGX00831"],"award-info":[{"award-number":["14ZCDZGX00831"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1007\/s00500-015-1811-5","type":"journal-article","created":{"date-parts":[[2015,7,24]],"date-time":"2015-07-24T03:20:31Z","timestamp":1437708031000},"page":"753-763","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["An intelligent character recognition method to filter spam images on cloud"],"prefix":"10.1007","volume":"21","author":[{"given":"Jun","family":"Chen","sequence":"first","affiliation":[]},{"given":"Hong","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Jufeng","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,25]]},"reference":[{"key":"1811_CR1","doi-asserted-by":"crossref","unstructured":"Attar A, Rad RM, Atani RE (2013) A survey of image spamming and filtering techniques 40:71\u2013105","DOI":"10.1007\/s10462-011-9280-4"},{"issue":"10","key":"1811_CR2","doi-asserted-by":"crossref","first-page":"1436","DOI":"10.1016\/j.patrec.2011.03.022","volume":"32","author":"B Biggio","year":"2011","unstructured":"Biggio B, Fumera G, Pillai I, Roli F (2011) A survey and experimental evaluation of image spam filtering techniques. Pattern Recogn Lett 32(10):1436\u20131446","journal-title":"Pattern Recogn Lett"},{"key":"1811_CR3","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/s10462-009-9109-6","volume":"29","author":"E Blanzieri","year":"2008","unstructured":"Blanzieri E, Bryl A (2008) A survey of learning-based techniques of email spam filtering. Artif Intell Rev 29:63\u201392","journal-title":"Artif Intell Rev"},{"key":"1811_CR4","doi-asserted-by":"crossref","unstructured":"Caruana G, Li M (2012) A survey of emerging approaches to spam filtering. ACM Comput Surv 44(2) (article 9)","DOI":"10.1145\/2089125.2089129"},{"key":"1811_CR5","doi-asserted-by":"crossref","unstructured":"Cho MS, Seok JH, Lee S, Kim JH (2011) Scene text extraction by superpixel crfs combining multiple character features. In: Proc. of the 11th Int\u2019l Conf. on Document Analysis and Recognition. IEEE, pp 1034\u20131038","DOI":"10.1109\/ICDAR.2011.209"},{"key":"1811_CR6","doi-asserted-by":"crossref","unstructured":"Creusen IM, Wijnhoven RGJ, Herbschleb E, de With PHN (2010) Color exploitation in hog-based traffic sign detection. In: Proc. of the 17th Int\u2019l Conf. on Image Processing. IEEE, pp 2669\u20132672","DOI":"10.1109\/ICIP.2010.5651637"},{"key":"1811_CR7","doi-asserted-by":"crossref","unstructured":"Dalal N, Triggs B (2005) Histograms of oriented gradients for human detection. In: Proc. of IEEE Conf. on Computer Vision and Pattern Recognition. IEEE, pp 886\u2013893","DOI":"10.1109\/CVPR.2005.177"},{"key":"1811_CR8","unstructured":"de Campos TE, Babu BR, Varma M (2009) Character recognition in natural images. In: Proc. of the Int\u2019l Conf. on Computer Vision Theory and Application"},{"key":"1811_CR9","doi-asserted-by":"crossref","unstructured":"Epshtein B, Ofek E, Wexler Y (2010) Detecting text in natural scenes with stroke width transform. In: IEEE Conf. on Computer Vision and Pattern Recognition. IEEE, pp 2963\u20132970","DOI":"10.1109\/CVPR.2010.5540041"},{"key":"1811_CR10","doi-asserted-by":"crossref","unstructured":"Esposito C, Ficco M, Palmieri F, Castiglione A (2015) Smart cloud storage service selection based on fuzzy logic, theory of evidence and game theory. IEEE Trans Comput","DOI":"10.1109\/TC.2015.2389952"},{"key":"1811_CR11","doi-asserted-by":"crossref","unstructured":"Garg R, Hassan E, Chaudhury S, Gopal M (2011) A crf based scheme for overlapping multi-colored text graphics separation. In: Proc. of the 11th Int\u2019l Conf. on Document Analysis and Recognition. IEEE, pp 1215\u20131219","DOI":"10.1109\/ICDAR.2011.245"},{"key":"1811_CR12","doi-asserted-by":"crossref","unstructured":"Ghebghoub Y, Boussaid O, Oukid S (2014) security model based encryption to protect data on cloud. In: Proc. of the International Conference on Information Systems and Design of Communication. pp 50\u201355","DOI":"10.1145\/2618168.2618176"},{"key":"1811_CR13","unstructured":"He JY, Li SF (2004) Hybrid chinese\/english text identification in web images. In: Proc. of the 3rd Int\u2019l Conf. on Image and Graphics. pp 361\u2013364"},{"key":"1811_CR14","doi-asserted-by":"crossref","unstructured":"Iwamura M, Kobayashi T, Kise K (2011) Recognition of multiple characters in a scene image using arrangement of local features. In: Proc. of the 11th Int\u2019l Conf. on Document Analysis and Recognition. IEEE, pp 1409\u20131413","DOI":"10.1109\/ICDAR.2011.283"},{"key":"1811_CR15","doi-asserted-by":"crossref","unstructured":"Janeela Theresa MM, Joseph Raj V (2015) A maximum spanning tree-based dynamic fuzzy supervised neural network architecture for classification of murder cases. In: Soft Computing","DOI":"10.1007\/s00500-015-1645-1"},{"key":"1811_CR16","doi-asserted-by":"crossref","unstructured":"Karatzas D, Mestre SR, Mas J, Nourbakhsh F, Roy PP (2011) Icdar 2011 robust reading competition challenge 1: reading text in born-digital images (web and email). In: Proc. of the 11th Int\u2019l Conf. on Document Analysis and Recognition. IEEE, pp 485\u20131490","DOI":"10.1109\/ICDAR.2011.295"},{"issue":"6","key":"1811_CR17","doi-asserted-by":"crossref","first-page":"1153","DOI":"10.1109\/TASSP.1981.1163711","volume":"29","author":"R Keys","year":"1981","unstructured":"Keys R (1981) Cubic convolution interpolation for digital image processing. IEEE Trans Acoust Speech Signal Process 29(6):1153\u20131160","journal-title":"IEEE Trans Acoust Speech Signal Process"},{"issue":"4","key":"1811_CR18","first-page":"231","volume":"15","author":"C Lee","year":"2013","unstructured":"Lee C, Chung P, Hwang M (2013) A survey on attribute-based encryption schemes of access control in cloud environments. Int J Netw Secur 15(4):231\u2013240","journal-title":"Int J Netw Secur"},{"key":"1811_CR19","doi-asserted-by":"crossref","unstructured":"Lee JJ, Lee PH, Lee SW, Yuille A, Koch C (2011) Adaboost for text detection in natural scene. In: Proc. of the 11th Int\u2019l Conf. on Document Analysis and Recognition. IEEE, pp 429\u2013434","DOI":"10.1109\/ICDAR.2011.93"},{"issue":"9","key":"1811_CR20","first-page":"1681","volume":"180","author":"J Li","year":"2010","unstructured":"Li J, Kim K (2010) Hidden attribute-based signatures without anonymity revocation. IEEE Trans Parallel Distrib Syst 180(9):1681\u20131689","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"1811_CR21","doi-asserted-by":"crossref","unstructured":"Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: Proc. of the 29th IEEE International Conference on Computer Communications(INFOCOM 2010). IEEE, pp 441\u2013445","DOI":"10.1109\/INFCOM.2010.5462196"},{"issue":"8","key":"1811_CR22","doi-asserted-by":"crossref","first-page":"2201","DOI":"10.1109\/TPDS.2013.271","volume":"25","author":"J Li","year":"2014","unstructured":"Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201\u20132210","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"1811_CR23","doi-asserted-by":"crossref","unstructured":"Li J, Li J, Chen X, Jia C, Lou W (2015) Identity-based encryption with outsourced revocation in cloud computing. In: IEEE Transactions on Computer. IEEE (available online)","DOI":"10.1109\/TC.2013.208"},{"issue":"1","key":"1811_CR24","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1109\/TPDS.2012.97","volume":"24","author":"M Li","year":"2013","unstructured":"Li M, Yu S, Zheng Y, Ren K, Lou W (2013) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst 24(1):131\u2013143","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"1811_CR25","doi-asserted-by":"crossref","unstructured":"Liu J, Zhang SW, Li HP, Liang W (2011) A chinese character localization method based on intergrating structure and cc-clustering for advertising images. In: Proc. of the 11th Int\u2019l Conf. on Document Analysis and Recognition. IEEE, pp 1044\u20131048","DOI":"10.1109\/ICDAR.2011.211"},{"key":"1811_CR26","doi-asserted-by":"crossref","unstructured":"Liu Z, Li J, Chen X, Yang J, Jia C (2014) Thin-model data sharing scheme supporting keyword search in cloud storage. In: 19th Australasian Conference on Information Security and Privacy (ACISP)","DOI":"10.1007\/978-3-319-08344-5_8"},{"key":"1811_CR27","doi-asserted-by":"crossref","unstructured":"Mishra A, Alahari K, Jawahar CV (2011) An mrf model for binarization of natural scene text. In: Proc. of the 11th Int\u2019l Conf. on Document Analysis and Recognition. IEEE, pp 11\u201316","DOI":"10.1109\/ICDAR.2011.12"},{"key":"1811_CR28","doi-asserted-by":"crossref","unstructured":"Mishra A, Alahari K, Jawahar CV (2012) Top-down and bottom-up cues for scene text recognition. In: Proc. of IEEE Conf. on Computer Vision and Pattern Recognition. IEEE, pp 2687\u20132694","DOI":"10.1109\/CVPR.2012.6247990"},{"issue":"1","key":"1811_CR29","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/34.824820","volume":"22","author":"G Nagy","year":"2000","unstructured":"Nagy G (2000) Twenty years of document image analysis in pami. IEEE Trans Pattern Anal Mach Intell 22(1):38\u201362","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"1811_CR30","doi-asserted-by":"crossref","unstructured":"Newell AJ, Griffin LD (2011) Multiscale histogram of oriented gradient descriptors for robust character recognition. In: Proc. of the 11th Int\u2019l Conf. on Document Analysis and Recognition. IEEE, pp 1085\u20131089","DOI":"10.1109\/ICDAR.2011.219"},{"issue":"3","key":"1811_CR31","doi-asserted-by":"crossref","first-page":"800","DOI":"10.1109\/TIP.2010.2070803","volume":"20","author":"YF Pan","year":"2011","unstructured":"Pan YF, Hou XW, Liu CL (2011) A hybrid approach to detect and localize texts in natural scene images. IEEE Trans Image Process 20(3):800\u2013813","journal-title":"IEEE Trans Image Process"},{"key":"1811_CR32","unstructured":"Perantonis SJ, Gatos B, Maragos V (2003) A novel web image processing algorithm for text area identification that helps commercial ocr engines to improve their web image recognition efficiency. In: Proc. of the 2nd Int\u2019l Workshop on Web Document Analysis. pp 61\u201364"},{"key":"1811_CR33","doi-asserted-by":"crossref","unstructured":"Perantonis SJ, Gatos B, Maragos V, Karkaletsis V, Petasis G (2004) Text area identification in web images. In: Proc. of Methods and Applications of Artificial Intelligence. pp 82\u201392","DOI":"10.1007\/978-3-540-24674-9_10"},{"key":"1811_CR34","doi-asserted-by":"crossref","unstructured":"Situ LJ, Liu RZ, Tan CL (2011) Text localization in web images using probabilistic candidate selection model. In: Proc. of the 11th Int\u2019l Conf. on Document Analysis and Recognition. IEEE, pp 1359\u20131363","DOI":"10.1109\/ICDAR.2011.273"},{"key":"1811_CR35","doi-asserted-by":"crossref","unstructured":"Uchida S, Shigeyoshi Y, Kunishige Y, Yaokai F (2011) A keypoint-based approach toward scenery character detection. In: Proc. of the 11th Int\u2019l Conf. on Document Analysis and Recognition. IEEE, pp 819\u2013823","DOI":"10.1109\/ICDAR.2011.168"},{"key":"1811_CR36","doi-asserted-by":"crossref","unstructured":"Wakahara T, Kita K (2011) Binarization of color character strings in scene images using k-means clustering and support vector machines. In: Proc. of the 11th Int\u2019l Conf. on Document Analysis and Recognition. IEEE, pp 274\u2013278","DOI":"10.1109\/ICDAR.2011.63"},{"key":"1811_CR37","doi-asserted-by":"crossref","unstructured":"Wang K, Belongie S (2010) Word spotting in the wild. In: Proc. of the European Conf. on Computer Vision. IEEE, pp 519\u2013604","DOI":"10.1007\/978-3-642-15549-9_43"},{"key":"1811_CR38","unstructured":"Wang K, Babenko B, Belongie S (2011a) End-to-end scene text recognition. In: Proc. of the 13th Int\u2019l Conf. on Computer Vision. IEEE, pp 1457\u20131464"},{"key":"1811_CR39","doi-asserted-by":"crossref","unstructured":"Wang XF, Huang L, Liu CP (2011b) A novel method for embedded text segmentation based on stroke and color. In: Proc. of the 11th Int\u2019l Conf. on Document Analysis and Recognition. IEEE, pp 151\u2013155","DOI":"10.1109\/ICDAR.2011.39"},{"issue":"10","key":"1811_CR40","doi-asserted-by":"crossref","first-page":"1733","DOI":"10.1109\/TPAMI.2009.38","volume":"31","author":"JJ Weinman","year":"2009","unstructured":"Weinman JJ, Learned-Miller, Hanson A (2009) Scene text recognition using similarity and a lexicon with sparse belief propagation. IEEE Trans Pattern Anal Mach Intell 31(10):1733\u20131746","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"1811_CR41","doi-asserted-by":"crossref","unstructured":"Yao C, Bai X, Shi B, Liu W (2014) Strokelets: a learned multi-scale representation for scene text recognition. In: IEEE Conf. on Computer Vision and Pattern Recognition. IEEE, pp 4042\u20134049","DOI":"10.1109\/CVPR.2014.515"},{"key":"1811_CR42","doi-asserted-by":"crossref","unstructured":"Yi CC, Tian YL (2011) Text string detection from natural scenes by structure-based partition and grouping. IEEE Trans Image Process 20(9):2594\u20132605","DOI":"10.1109\/TIP.2011.2126586"},{"key":"1811_CR43","doi-asserted-by":"crossref","unstructured":"Zhang HW, Liu CS, Yang C, Ding XQ (2011) An improved scene text extraction method using conditional random field and optical character recognition. In: Proc. of the 11th Int\u2019l Conf. on Document Analysis and Recognition. IEEE, pp 708\u2013712","DOI":"10.1109\/ICDAR.2011.148"},{"issue":"3","key":"1811_CR44","doi-asserted-by":"crossref","first-page":"790","DOI":"10.1109\/TIP.2010.2068553","volume":"20","author":"X Zhao","year":"2011","unstructured":"Zhao X, Lin KH, Fu Y, Hu Y, Liu Y, Huang TS (2011) Text from corners: a novel approach to detect text and caption in videos. IEEE Trans Image Process 20(3):790\u2013799","journal-title":"IEEE Trans Image Process"},{"key":"1811_CR45","unstructured":"Zheng Q, Chen K, Zhou Y, Gu C, Guan H (2010) Text localization and recognition in complex scenes using local features. In: Proc. of the 10th Asian Conf. on Computer Vision. Springer, pp 121\u2013132"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-1811-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-015-1811-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-1811-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-1811-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,28]],"date-time":"2019-08-28T13:28:17Z","timestamp":1566998897000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-015-1811-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,25]]},"references-count":45,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,2]]}},"alternative-id":["1811"],"URL":"https:\/\/doi.org\/10.1007\/s00500-015-1811-5","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2015,7,25]]}}}