{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T00:45:31Z","timestamp":1767141931340,"version":"build-2238731810"},"reference-count":73,"publisher":"Springer Science and Business Media LLC","issue":"24","license":[{"start":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T00:00:00Z","timestamp":1705536000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T00:00:00Z","timestamp":1705536000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"National Science and Technology Innovation 2030 Major Project","award":["2018AAA0100703"],"award-info":[{"award-number":["2018AAA0100703"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62006208"],"award-info":[{"award-number":["62006208"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62107035"],"award-info":[{"award-number":["62107035"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"DOI":"10.1007\/s11042-023-17844-y","type":"journal-article","created":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T01:01:49Z","timestamp":1705539709000},"page":"64963-64986","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["LanT: finding experts for digital calligraphy character restoration"],"prefix":"10.1007","volume":"83","author":[{"given":"Kaixin","family":"Han","sequence":"first","affiliation":[]},{"given":"Weitao","family":"You","sequence":"additional","affiliation":[]},{"given":"Huanghuang","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Lingyun","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Jinyu","family":"Song","sequence":"additional","affiliation":[]},{"given":"Zijin","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Heyang","family":"Yi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,18]]},"reference":[{"issue":"1","key":"17844_CR1","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.visinf.2022.02.001","volume":"6","author":"B Su","year":"2022","unstructured":"Su B, Liu X, Gao W, Yang Y, Chen S (2022) A restoration method using dual generate adversarial networks for chinese ancient characters. Vis Inf 6(1):26\u201334. https:\/\/doi.org\/10.1016\/j.visinf.2022.02.001","journal-title":"Vis Inf"},{"issue":"6","key":"17844_CR2","doi-asserted-by":"publisher","first-page":"8199","DOI":"10.1007\/s11042-022-11988-z","volume":"81","author":"S Cao","year":"2022","unstructured":"Cao S, Shu Z, Xu Z, Xie D, Xu Y (2022) Character segmentation and restoration of qin-han bamboo slips using local auto-focus thresholding method. Multimed Tool Appl 81(6):8199\u20138213","journal-title":"Multimed Tool Appl"},{"key":"17844_CR3","doi-asserted-by":"publisher","unstructured":"Cong Nguyen K, Tuan Nguyen C, Hotta S, Nakagawa M (2019) A character attention generative adversarial network for degraded historical document restoration. In: 2019 International Conference on Document Analysis and Recognition (ICDAR), pp 420\u2013425. https:\/\/doi.org\/10.1109\/ICDAR.2019.00074","DOI":"10.1109\/ICDAR.2019.00074"},{"key":"17844_CR4","doi-asserted-by":"publisher","first-page":"8","DOI":"10.7763\/IJCTE.2020.V12.1256","volume":"12","author":"RS Samosir","year":"2020","unstructured":"Samosir RS (2020) Enhancement of old document image after restoration with morphologycal approach. International Journal of Computer Theory and Engineering 12:8\u201314. https:\/\/doi.org\/10.7763\/IJCTE.2020.V12.1256","journal-title":"International Journal of Computer Theory and Engineering"},{"key":"17844_CR5","doi-asserted-by":"publisher","unstructured":"Wadhwani M, Kundu D, Chakraborty D, Chanda B (2021) In: Mukhopadhyay J, Sreedevi I, Chanda B, Chaudhury S, Namboodiri VP (eds) Text Extraction and Restoration of Old Handwritten Documents, pp 109\u2013132. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-57907-4_6","DOI":"10.1007\/978-3-030-57907-4_6"},{"issue":"8","key":"17844_CR6","doi-asserted-by":"publisher","first-page":"2297","DOI":"10.1016\/j.patcog.2012.12.015","volume":"46","author":"R Hedjam","year":"2013","unstructured":"Hedjam R, Cheriet M (2013) Historical document image restoration using multispectral imaging system. Pattern Recog 46(8):2297\u20132312","journal-title":"Pattern Recog"},{"key":"17844_CR7","doi-asserted-by":"publisher","unstructured":"Wang J, Pan G, Sun D, Zhang J (2021) Chinese character inpainting with contextual semantic constraints. Proceedings of the 29th ACM International Conference on Multimedia, pp 1829\u20131837. https:\/\/doi.org\/10.1145\/3474085.3475333","DOI":"10.1145\/3474085.3475333"},{"key":"17844_CR8","doi-asserted-by":"publisher","unstructured":"Sober B, Levin D (2017) Computer aided restoration of handwritten character strokes. CAD Computer Aided Design 89, 12\u201324. Publisher Copyright: $${\\copyright }$$ 2017 Elsevier Ltd. https:\/\/doi.org\/10.1016\/j.cad.2017.04.005","DOI":"10.1016\/j.cad.2017.04.005"},{"key":"17844_CR9","doi-asserted-by":"publisher","unstructured":"Zhong Z, Yin F, Zhang X-Y, Liu C-L (2017) Handwritten chinese character blind inpainting with conditional generative adversarial nets. In: 2017 4th IAPR Asian Conference on Pattern Recognition (ACPR), pp 804\u2013809. https:\/\/doi.org\/10.1109\/ACPR.2017.60","DOI":"10.1109\/ACPR.2017.60"},{"issue":"9","key":"17844_CR10","doi-asserted-by":"publisher","first-page":"4805","DOI":"10.1007\/s00521-018-3854-x","volume":"32","author":"J Li","year":"2018","unstructured":"Li J, Song G, Zhang M (2018) Occluded offline handwritten chinese character recognition using deep convolutional generative adversarial network and improved googlenet. Neural Comput Appl 32(9):4805\u20134819. https:\/\/doi.org\/10.1007\/s00521-018-3854-x","journal-title":"Neural Comput Appl"},{"key":"17844_CR11","doi-asserted-by":"publisher","first-page":"2895","DOI":"10.1007\/s00371-021-02218-y","volume":"37","author":"H Li","year":"2021","unstructured":"Li H, Zhong Z, Guan W, Du C, Yang Y, Wei Y, Ye C (2021) Generative character inpainting guided by structural information. Vis Comput 37:2895\u20132960. https:\/\/doi.org\/10.1007\/s00371-021-02218-y","journal-title":"Vis Comput"},{"key":"17844_CR12","doi-asserted-by":"publisher","unstructured":"Qin M, Chen X (2019) Restore the incomplete calligraphy based on style transfer. In: 2019 Chinese Control Conference (CCC), pp 8812\u20138817. https:\/\/doi.org\/10.23919\/ChiCC.2019.8866187","DOI":"10.23919\/ChiCC.2019.8866187"},{"key":"17844_CR13","first-page":"1070","volume":"7","author":"S Bhat","year":"2019","unstructured":"Bhat S, Seshikala G (2019) Restoration of characters in degraded inscriptions using phase based binarization and geodesic morphology. International Journal of Recent Technology and Engineering (IJRTE) 7:1070\u20131075","journal-title":"International Journal of Recent Technology and Engineering (IJRTE)"},{"key":"17844_CR14","doi-asserted-by":"publisher","first-page":"2053","DOI":"10.1109\/ICPR.2010.506","volume":"2010","author":"G Caner","year":"2010","unstructured":"Caner G, Haritaoglu I (2010) Shapedna: Effective character restoration and enhancement for arabic text. International Conference on Pattern Recognition 2010:2053\u20132056. https:\/\/doi.org\/10.1109\/ICPR.2010.506","journal-title":"International Conference on Pattern Recognition"},{"key":"17844_CR15","doi-asserted-by":"publisher","unstructured":"Melnik G, Yekutieli Y, Sharf A (2022) Deep segmentation of corrupted glyphs. J Comput Cult Herit 15(1). https:\/\/doi.org\/10.1145\/3465629","DOI":"10.1145\/3465629"},{"key":"17844_CR16","doi-asserted-by":"publisher","unstructured":"Casillo M, Colace F, Lorusso A, Marongiu F, Santaniello D (2022) In: Nedjah N, Abd El-Latif AA, Gupta BB, Mourelle LM (eds) An IoT-Based System for Expert User Supporting to Monitor, Manage and Protect Cultural Heritage Buildings, pp 143\u2013154. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-96737-6_8","DOI":"10.1007\/978-3-030-96737-6_8"},{"key":"17844_CR17","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.inffus.2021.09.022","volume":"79","author":"N D\u00edaz-Rodr\u00edguez","year":"2022","unstructured":"D\u00edaz-Rodr\u00edguez N, Lamas A, Sanchez J, Franchi G, Donadello I, Tabik S, Filliat D, Cruz P, Montes R, Herrera F (2022) Explainable neural-symbolic learning (x-nesyl) methodology to fuse deep learning representations with expert knowledge graphs: The monumai cultural heritage use case. Information Fusion 79:58\u201383. https:\/\/doi.org\/10.1016\/j.inffus.2021.09.022","journal-title":"Information Fusion"},{"issue":"21","key":"17844_CR18","doi-asserted-by":"publisher","first-page":"9747","DOI":"10.1007\/s11042-014-2149-1","volume":"74","author":"A Maronidis","year":"2015","unstructured":"Maronidis A, Voutounos C, Lanitis A (2015) Designing and evaluating an expert system for restoring damaged byzantine icons. Multimed Tool Appl 74(21):9747\u20139770","journal-title":"Multimed Tool Appl"},{"issue":"03","key":"17844_CR19","doi-asserted-by":"publisher","first-page":"2577","DOI":"10.1609\/aaai.v34i03.5641","volume":"34","author":"Y Kotturi","year":"2020","unstructured":"Kotturi Y, Kahng A, Procaccia A, Kulkarni C (2020) Hirepeer: Impartial peer-assessed hiring at scale in expert crowdsourcing markets. Proceedings of the AAAI Conference on Artificial Intelligence 34(03):2577\u20132584. https:\/\/doi.org\/10.1609\/aaai.v34i03.5641","journal-title":"Proceedings of the AAAI Conference on Artificial Intelligence"},{"key":"17844_CR20","doi-asserted-by":"publisher","unstructured":"Paul SA (2016) Find an expert: Designing expert selection interfaces for formal help-giving. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems. CHI \u201916, pp 3038\u20133048. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/2858036.2858131","DOI":"10.1145\/2858036.2858131"},{"key":"17844_CR21","doi-asserted-by":"publisher","unstructured":"Pal A, Konstan JA (2010) Expert identification in community question answering: Exploring question selection bias. In: Proceedings of the 19th ACM International Conference on Information and Knowledge Management. CIKM \u201910, pp 1505\u20131508. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/1871437.1871658","DOI":"10.1145\/1871437.1871658"},{"key":"17844_CR22","doi-asserted-by":"publisher","unstructured":"Oliveira J, Pinheiro D, Figueiredo E (2020) Jexpert: A tool for library expert identification. In: Proceedings of the 34th Brazilian Symposium on Software Engineering. SBES \u201920, pp 386\u2013392. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3422392.3422500","DOI":"10.1145\/3422392.3422500"},{"key":"17844_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2020.103351","volume":"287","author":"Y Jin","year":"2020","unstructured":"Jin Y, Carman MJ, Zhu Y, Xiang Y (2020) A technical survey on statistical modelling and design methods for crowdsourcing quality control. Artif Intell 287:103351. https:\/\/doi.org\/10.1016\/j.artint.2020.103351","journal-title":"Artif Intell"},{"issue":"1","key":"17844_CR24","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/3148148","volume":"51","author":"F Daniel","year":"2018","unstructured":"Daniel F, Kucherbaev P, Cappiello C, Benatallah B, Allahbakhsh M (2018) Quality control in crowdsourcing: A survey of quality attributes, assessment techniques, and assurance actions. ACM Comput Surv 51(1):7\u20131740. https:\/\/doi.org\/10.1145\/3148148","journal-title":"ACM Comput Surv"},{"key":"17844_CR25","doi-asserted-by":"crossref","unstructured":"Yu H, Li J, Wu Z, Xu H, Zhu L (2022) Two-step learning for crowdsourcing data classification. Multimed Tool Appl 1\u201316","DOI":"10.1007\/s11042-022-12793-4"},{"issue":"23","key":"17844_CR26","doi-asserted-by":"publisher","first-page":"33357","DOI":"10.1007\/s11042-019-08054-6","volume":"78","author":"J Li","year":"2019","unstructured":"Li J, Yu H, Zhang L, Wen G (2019) Double weighted k-nearest voting for label aggregation in crowdsourcing learning. Multimed Tool Appl 78(23):33357\u201333374","journal-title":"Multimed Tool Appl"},{"key":"17844_CR27","doi-asserted-by":"publisher","unstructured":"May MJ, Kantor E, Zror N (2021) Cemomemo: Making more out of gravestones (with help from the crowd). J Comput Cult Herit 14(4). https:\/\/doi.org\/10.1145\/3467888","DOI":"10.1145\/3467888"},{"issue":"1","key":"17844_CR28","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1108\/JCHMSD-03-2018-0018","volume":"9","author":"E Ch\u2019ng","year":"2019","unstructured":"Ch\u2019ng E, Cai S, Zhang TE, Leow F-T (2019) Crowdsourcing 3d cultural heritage: best practice for mass photogrammetry. Journal of Cultural Heritage Management and Sustainable Development 9(1):24\u201342. https:\/\/doi.org\/10.1108\/JCHMSD-03-2018-0018","journal-title":"Journal of Cultural Heritage Management and Sustainable Development"},{"key":"17844_CR29","doi-asserted-by":"publisher","unstructured":"Can G, Odobez J-M, Gatica-Perez D (2018) How to tell ancient signs apart? recognizing and visualizing maya glyphs with cnns. J Comput Cult Herit 11(4). https:\/\/doi.org\/10.1145\/3230670","DOI":"10.1145\/3230670"},{"key":"17844_CR30","doi-asserted-by":"publisher","first-page":"2480","DOI":"10.1109\/TPAMI.2020.2968521","volume":"43","author":"Y Zhang","year":"2021","unstructured":"Zhang Y, Tian Y, Kong Y, Zhong B, Fu YR (2021) Residual dense network for image restoration. IEEE Trans Patt Anal Mach Intell 43:2480\u20132495","journal-title":"IEEE Trans Patt Anal Mach Intell"},{"key":"17844_CR31","doi-asserted-by":"publisher","first-page":"8199","DOI":"10.1007\/s11042-022-11988-z","volume":"81","author":"S Cao","year":"2022","unstructured":"Cao S, Shu Z, Xu Z, Xie D, Xu Y (2022) Character segmentation and restoration of qin-han bamboo slips using local auto-focus thresholding method. Multimed Tool Appl 81:8199\u20138213. https:\/\/doi.org\/10.1007\/s11042-022-11988-z","journal-title":"Multimed Tool Appl"},{"key":"17844_CR32","first-page":"735","volume-title":"Chen JI-Z, Tavares JMRS, Shakya S, Iliyasu AM","author":"N Sandhya","year":"2021","unstructured":"Sandhya N, Krishnan R, Babu DRR (2021) A framework for degraded kannada character recognition. In: Processing Image, Networks Capsule (eds) Chen JI-Z, Tavares JMRS, Shakya S, Iliyasu AM. Springer, Cham, pp 735\u2013745"},{"issue":"4","key":"17844_CR33","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/s10032-005-0012-7","volume":"8","author":"B Allier","year":"2006","unstructured":"Allier B, Bali N, Emptoz H (2006) Automatic accurate broken character restoration for patrimonial documents. International Journal of Document Analysis and Recognition (IJDAR) 8(4):246\u2013261. https:\/\/doi.org\/10.1007\/s10032-005-0012-7","journal-title":"International Journal of Document Analysis and Recognition (IJDAR)"},{"key":"17844_CR34","doi-asserted-by":"crossref","unstructured":"Bannigidad P, Gudada C (2018) Restoration of degraded historical kannada handwritten document images using image enhancement techniques. In: Proceedings of the Eighth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2016, (ed) Abraham A, Cherukuri AK, Madureira AM, Muda AK. Springer, Cham, pp 498\u2013508","DOI":"10.1007\/978-3-319-60618-7_49"},{"key":"17844_CR35","doi-asserted-by":"crossref","unstructured":"Chen J, Zuo W, Zhan Y (2022) Image restoration in the presence of impulse noise by adaptive equidistant median filter. Multimedia Tools and Applications 1\u201317","DOI":"10.1007\/s11042-022-12057-1"},{"key":"17844_CR36","doi-asserted-by":"publisher","unstructured":"Cohen R, Kedem K, Dinstein I, El-Sana J (2012) Occluded character restoration using active contour with shape priors. In: 2012 International Conference on Frontiers in Handwriting Recognition, pp 497-502. https:\/\/doi.org\/10.1109\/ICFHR.2012.243","DOI":"10.1109\/ICFHR.2012.243"},{"issue":"2","key":"17844_CR37","doi-asserted-by":"publisher","first-page":"2047","DOI":"10.1007\/s11042-020-09685-w","volume":"80","author":"A Fakhari","year":"2021","unstructured":"Fakhari A, Kiani K (2021) A new restricted boltzmann machine training algorithm for image restoration. Multimed Tool Appl 80(2):2047\u20132062","journal-title":"Multimed Tool Appl"},{"issue":"1","key":"17844_CR38","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s11036-020-01717-x","volume":"26","author":"R Liu","year":"2021","unstructured":"Liu R, Wang X, Lu H, Wu Z, Fan Q, Li S, Jin X (2021) Sccgan: Style and characters inpainting based on cgan. Mobile Networks Appl 26(1):3\u201312","journal-title":"Mobile Networks Appl"},{"key":"17844_CR39","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.neucom.2020.07.046","volume":"415","author":"G Song","year":"2020","unstructured":"Song G, Li J, Wang Z (2020) Occluded offline handwritten chinese character inpainting via generative adversarial network and self-attention mechanism. Neurocomputing 415:146\u2013156","journal-title":"Neurocomputing"},{"key":"17844_CR40","unstructured":"Zhang J (2023) An inpainting method using novel generative adversarial networks for chinese characters. Pattern Recogn Lett"},{"key":"17844_CR41","doi-asserted-by":"crossref","unstructured":"Xing C, Ren Z (2023) Binary inscription character inpainting based on improved context encoders. IEEE Access","DOI":"10.1109\/ACCESS.2023.3282442"},{"issue":"1","key":"17844_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40494-023-00882-y","volume":"11","author":"Z Wenjun","year":"2023","unstructured":"Wenjun Z, Benpeng S, Ruiqi F, Xihua P, Shanxiong C (2023) Eagan: Restoration of text in ancient chinese books based on an example attention generative adversarial network. Heritage Science 11(1):1\u201313","journal-title":"Heritage Science"},{"issue":"9","key":"17844_CR43","doi-asserted-by":"publisher","first-page":"11567","DOI":"10.1007\/s11042-015-2731-1","volume":"76","author":"Z Xu","year":"2017","unstructured":"Xu Z, Liu Y, Xuan J, Chen H, Mei L (2017) Crowdsourcing based social media data analysis of urban emergency events. Multimed Tool Appl 76(9):11567\u201311584","journal-title":"Multimed Tool Appl"},{"issue":"20","key":"17844_CR44","doi-asserted-by":"publisher","first-page":"26769","DOI":"10.1007\/s11042-018-5888-6","volume":"77","author":"A Kerbiche","year":"2018","unstructured":"Kerbiche A, Jabra SB, Zagrouba E, Charvillat V (2018) A robust video watermarking based on feature regions and crowdsourcing. Multimed Tool Appl 77(20):26769\u201326791","journal-title":"Multimed Tool Appl"},{"issue":"14","key":"17844_CR45","doi-asserted-by":"publisher","first-page":"19201","DOI":"10.1007\/s11042-019-7312-2","volume":"78","author":"MN de Amorim","year":"2019","unstructured":"de Amorim MN, Saleme EB, Assis Neto FRd, Santos CA, Ghinea G (2019) Crowdsourcing authoring of sensory effects on videos. Multimed Tool Appl 78(14):19201\u201319227","journal-title":"Multimed Tool Appl"},{"issue":"CSCW2","key":"17844_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3476073","volume":"5","author":"D Hettiachchi","year":"2021","unstructured":"Hettiachchi D, Schaekermann M, McKinney T, Lease M (2021) The challenge of variable effort crowdsourcing and how visible gold can help. Proc ACM Hum Comput Interact 5(CSCW2):1\u201326. https:\/\/doi.org\/10.1145\/3476073","journal-title":"Proc ACM Hum Comput Interact"},{"key":"17844_CR47","doi-asserted-by":"publisher","unstructured":"Xing Q, Zhao W, Yang J, Wu J, Wang Q, Wang M (2019) Groexpert: A novel group-aware experts identification approach in crowdsourcing. In: Web Information Systems Engineering - WISE 2019, pp 3\u201317. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-34223-4_1","DOI":"10.1007\/978-3-030-34223-4_1"},{"key":"17844_CR48","unstructured":"Rjab AB, Kharoune M, Miklos Z, Martin A (2016) Characterization of experts in crowdsourcing platforms"},{"key":"17844_CR49","doi-asserted-by":"publisher","unstructured":"Foong E, Gergle D, Gerber EM (2017) Novice and expert sensemaking of crowdsourced design feedback. Proc ACM Hum Comput Interact 1(CSCW):45\u201314518. https:\/\/doi.org\/10.1145\/3134680","DOI":"10.1145\/3134680"},{"key":"17844_CR50","unstructured":"Ho C-J, Jabbari S, Vaughan JW (2013) Adaptive task assignment for crowdsourced classification. In: ICML, pp 534\u2013542"},{"issue":"23","key":"17844_CR51","doi-asserted-by":"publisher","first-page":"15901","DOI":"10.1007\/s11042-015-2897-6","volume":"75","author":"A Carlier","year":"2016","unstructured":"Carlier A, Salvador A, Cabezas F, Giro-i-Nieto X, Charvillat V, Marques O (2016) Assessment of crowdsourcing and gamification loss in userassisted object segmentation. Multimed Tool Appl 75(23):15901\u201315928","journal-title":"Multimed Tool Appl"},{"key":"17844_CR52","unstructured":"Khattak FK (2011) Quality control of crowd labeling through expert evaluation"},{"key":"17844_CR53","doi-asserted-by":"publisher","unstructured":"Fan J, Li G, Ooi BC, Tan K, Feng J (2015) icrowd: An adaptive crowdsourcing framework. In: Sellis TK, Davidson SB, Ives ZG (eds) Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31 - June 4, 2015, pp 1015\u20131030. ACM, ???. https:\/\/doi.org\/10.1145\/2723372.2750550","DOI":"10.1145\/2723372.2750550"},{"issue":"7","key":"17844_CR54","doi-asserted-by":"publisher","first-page":"1879","DOI":"10.1109\/TPDS.2015.2457924","volume":"27","author":"D Dang","year":"2016","unstructured":"Dang D, Liu Y, Zhang X, Huang S (2016) A crowdsourcing worker quality evaluation algorithm on mapreduce for big data applications. IEEE Trans Parallel Distrib Syst 27(7):1879\u20131888. https:\/\/doi.org\/10.1109\/TPDS.2015.2457924","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"17844_CR55","doi-asserted-by":"publisher","unstructured":"Dong Y, Yuan B, Shi Z, An J, Zhu M (2012) A region segmentation and region labeling algorithm in aerial images about bridge over water. In: 2012 5th International Congress on Image and Signal Processing, pp 630\u2013633. https:\/\/doi.org\/10.1109\/CISP.2012.6469670","DOI":"10.1109\/CISP.2012.6469670"},{"issue":"3","key":"17844_CR56","doi-asserted-by":"publisher","first-page":"2973","DOI":"10.1007\/s11042-017-4688-8","volume":"77","author":"L Wang","year":"2018","unstructured":"Wang L, Gong X, Zhang Y, Xu P, Chen X, Fang D, Zheng X, Guo J (2018) Artistic features extraction from chinese calligraphy works viaregional guided filter with reference image. Multim Tools Appl 77(3):2973\u20132990. https:\/\/doi.org\/10.1007\/s11042-017-4688-8","journal-title":"Multim Tools Appl"},{"issue":"2","key":"17844_CR57","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1016\/j.patcog.2006.04.043","volume":"40","author":"MR Gupta","year":"2007","unstructured":"Gupta MR, Jacobson NP, Garcia EK (2007) Ocr binarization and image pre-processing for searching historical documents. Pattern Recog 40(2):389\u2013397","journal-title":"Pattern Recog"},{"issue":"2","key":"17844_CR58","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.jvcir.2008.11.007","volume":"20","author":"Y Zhuang","year":"2009","unstructured":"Zhuang Y, Lu W, Wu J (2009) Latent style model: Discovering writing styles for calligraphy works. J Vis Commun Image Represent 20(2):84\u201396. https:\/\/doi.org\/10.1016\/j.jvcir.2008.11.007","journal-title":"J Vis Commun Image Represent"},{"key":"17844_CR59","doi-asserted-by":"crossref","unstructured":"Hou Y, Zheng L, Gould S (2020) Multiview detection with feature perspective transformation. In: European Conference on Computer Vision, pp 1\u201318. Springer","DOI":"10.1007\/978-3-030-58571-6_1"},{"key":"17844_CR60","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/j.neucom.2013.12.013","volume":"135","author":"W Li","year":"2014","unstructured":"Li W, Song Y, Zhou C (2014) Computationally evaluating and synthesizing chinese calligraphy. Neurocomputing 135:299\u2013305","journal-title":"Neurocomputing"},{"issue":"03","key":"17844_CR61","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/MIS.2012.46","volume":"27","author":"S Xu","year":"2012","unstructured":"Xu S, Jiang H, Lau FC, Pan Y (2012) Computationally evaluating and reproducing the beauty of chinese calligraphy. IEEE Intell Syst 27(03):63\u201372","journal-title":"IEEE Intell Syst"},{"key":"17844_CR62","unstructured":"Sun R, Lian Z, Tang Y, Xiao J (2015) Aesthetic visual quality evaluation of chinese handwritings. In: Yang Q, Wooldridge MJ (eds) Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, IJCAI 2015, Buenos Aires, Argentina, July 25-31, 2015, pp 2510\u20132516. AAAI Press, ???. http:\/\/ijcai.org\/Abstract\/15\/356"},{"issue":"6","key":"17844_CR63","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1108\/SR-04-2019-0092","volume":"39","author":"S Wang","year":"2019","unstructured":"Wang S, Han K, Jin J (2019) Review of image low-level feature extraction methods for content-based image retrieval. Sensor Review 39(6):783\u2013809","journal-title":"Sensor Review"},{"key":"17844_CR64","doi-asserted-by":"crossref","unstructured":"Isola P, Zhu J-Y, Zhou T, Efros AA (2017) Image-to-image translation with conditional adversarial networks. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp 1125\u20131134","DOI":"10.1109\/CVPR.2017.632"},{"key":"17844_CR65","doi-asserted-by":"publisher","unstructured":"He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: 2016 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2016, Las Vegas, NV, USA, June 27-30, 2016, pp 770\u2013778. IEEE Computer Society, ???. https:\/\/doi.org\/10.1109\/CVPR.2016.90","DOI":"10.1109\/CVPR.2016.90"},{"key":"17844_CR66","doi-asserted-by":"publisher","unstructured":"Ronneberger O, Fischer P, Brox T (2015) U-net: Convolutional networks for biomedical image segmentation. In: Navab N, Hornegger J, III WMW, Frangi AF (eds) Medical Image Computing and Computer-Assisted Intervention - MICCAI 2015 - 18th International Conference Munich, Germany, October 5 - 9, 2015, Proceedings, Part III. Lecture Notes in Computer Science, vol. 9351, pp. 234\u2013241. Springer, ???. https:\/\/doi.org\/10.1007\/978-3-319-24574-4_28","DOI":"10.1007\/978-3-319-24574-4_28"},{"issue":"1","key":"17844_CR67","first-page":"8","volume":"2","author":"T Sharma","year":"2022","unstructured":"Sharma T, Nair R, Gomathi S (2022) Breast cancer image classification using transfer learning and convolutional neural network. International Journal of Modern Research 2(1):8\u201316","journal-title":"International Journal of Modern Research"},{"key":"17844_CR68","doi-asserted-by":"crossref","unstructured":"Sharma S, Guleria K (2022) Deep learning models for image classification: comparison and applications. In: 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), pp 1733\u20131738. IEEE","DOI":"10.1109\/ICACITE53722.2022.9823516"},{"issue":"2","key":"17844_CR69","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1007\/s10044-022-01113-z","volume":"26","author":"G Chen","year":"2023","unstructured":"Chen G, Chen Q, Long S, Zhu W, Yuan Z, Wu Y (2023) Quantum convolutional neural network for image classification. Pattern Anal Applic 26(2):655\u2013667","journal-title":"Pattern Anal Applic"},{"key":"17844_CR70","doi-asserted-by":"crossref","unstructured":"Goyal N, Kumar N et al (2022) Leaf bagging: A novel meta heuristic optimization based framework for leaf identification. Multimed Tool Appl 1\u201322","DOI":"10.1007\/s11042-022-12825-z"},{"key":"17844_CR71","doi-asserted-by":"crossref","unstructured":"Patil S, Sasikala M (2022) Segmentation and identification of medicinal plant through weighted knn. Multimed Tool Appl 1\u201315","DOI":"10.1007\/s11042-022-13201-7"},{"key":"17844_CR72","doi-asserted-by":"crossref","unstructured":"Rahman SU, Alam F, Ahmad N, Arshad S (2022) Image processing based system for the detection, identification and treatment of tomato leaf diseases. Multimed Tool Appl 1\u201315","DOI":"10.1007\/s11042-022-13715-0"},{"key":"17844_CR73","doi-asserted-by":"crossref","unstructured":"Dhiman G, Oliva D, Kaur A, Singh KK, Vimal S, Sharma A, Cengiz K (2021) Bepo: A novel binary emperor penguin optimizer for automatic feature selection. Knowledge-Based Systems 211","DOI":"10.1016\/j.knosys.2020.106560"}],"updated-by":[{"DOI":"10.1007\/s11042-024-18446-y","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000}}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17844-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-023-17844-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-023-17844-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T13:04:54Z","timestamp":1720443894000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-023-17844-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,18]]},"references-count":73,"journal-issue":{"issue":"24","published-online":{"date-parts":[[2024,7]]}},"alternative-id":["17844"],"URL":"https:\/\/doi.org\/10.1007\/s11042-023-17844-y","relation":{},"ISSN":["1573-7721"],"issn-type":[{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1,18]]},"assertion":[{"value":"10 October 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 September 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 December 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 January 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 February 2024","order":5,"name":"change_date","label":"Change Date","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Correction","order":6,"name":"change_type","label":"Change Type","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"A Correction to this paper has been published:","order":7,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"https:\/\/doi.org\/10.1007\/s11042-024-18446-y","URL":"https:\/\/doi.org\/10.1007\/s11042-024-18446-y","order":8,"name":"change_details","label":"Change Details","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}}]}}