{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T06:57:48Z","timestamp":1761807468243,"version":"3.41.2"},"reference-count":29,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2009,3,27]],"date-time":"2009-03-27T00:00:00Z","timestamp":1238112000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.emeraldinsight.com\/page\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int Jnl of Intel Comp &amp; Cyber"],"published-print":{"date-parts":[[2009,3,27]]},"DOI":"10.1108\/17563780910939282","type":"journal-article","created":{"date-parts":[[2009,3,21]],"date-time":"2009-03-21T08:02:07Z","timestamp":1237622527000},"page":"148-174","source":"Crossref","is-referenced-by-count":6,"title":["Binarization of pre\u2010filtered historical manuscripts images"],"prefix":"10.1108","volume":"2","author":[{"given":"Ntogas","family":"Nikolaos","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ventzas","family":"Dimitrios","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"140","reference":[{"key":"b4","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr:20050311"},{"key":"b2","unstructured":"Badekas, E., Nikolaou, N. and Papamarkos, N. (2007), \u201cText binarization in color documents\u201d,Wiley Periodicals, Inc., Vol. 16, pp. 262\u201074."},{"key":"b5","unstructured":"Bartolo, A., Camilleri, K., Borg, J. and Farrugia, P. (2004), \u201cAdaptation of Brensen's thresholding algorithm for sketched line drawings\u201d,Proceedings of the 2004 Eurographics Workshop on Sketch\u2010Based Interfaces and Modeling, Grenoble, France, pp. 81\u201090."},{"key":"b32","unstructured":"Bieniecki, W. and Grabowski, S. (2005), \u201cMulti\u2010pass approach to adaptive thresholding based image segmentation\u201d,Proceedings of CADSM'2005, Lviv\u2010Slavske, Ukraine."},{"key":"b1","unstructured":"Burgoyne, J.A., Pugin, L., Eustace, G. and Fujinaga, I. (2007), \u201cA comparative survey of image binarisation algorithms for optical recognition on degraded musical sources\u201d,ISMIR2007\u2010Proceedings of the 8th International Conference on Music Information, Centre for Interdisciplinary Research in Music and Media Technology, Montreal, Canada, p. 509."},{"key":"b6","unstructured":"Canon Europa N.V. and Canon Europe Ltd (2007),Digital SRL Camera \u201c5D\u201d, 2002\u20102007, available at: www.canon\u2010europe.com\/For_Home\/Product_Finder\/Cameras\/Digital_SLR\/EOS_5D\/index.asp."},{"key":"b7","doi-asserted-by":"publisher","DOI":"10.1049\/ip-vis:20045054"},{"key":"b20","unstructured":"Fan, L., Fan, L. and Tan, C. (2003), \u201cWavelet diffusion for document image denoising\u201d,Proceedings of the 7th International Conference on Document Analysis and Recognition (ICDAR), Edinburgh, UK."},{"key":"b10","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-005-0013-7"},{"key":"b12","doi-asserted-by":"crossref","unstructured":"He, J., Do, Q.D.M., Downton, A.C. and Kim, J.H. (2005), \u201cA comparison of binarization methods for historical archive documents\u201d,Proceedings of the 8th IEEE International Conference on Document Analysis and Recognition (ICDAR'05), Seoul, South Korea.","DOI":"10.1109\/ICDAR.2005.3"},{"key":"b13","doi-asserted-by":"publisher","DOI":"10.1016\/0734-189X(85)90125-2"},{"key":"b15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2005.1"},{"key":"b14","doi-asserted-by":"publisher","DOI":"10.1007\/11558484_86"},{"key":"b17","doi-asserted-by":"crossref","unstructured":"Kitadai, A., Saito, K., Hachiya, D., Nakagawa, M., Baba, H. and Watanabe, A. (2005), \u201cDesign and prototype of a support system for archeologists to decode scripts on Mokkan\u201d,Proceedings of the 13th Conference of the International Graphonomics Society (IGS), Salerno, Italy, pp. 54\u20108.","DOI":"10.1109\/ICDAR.2005.223"},{"key":"b18","doi-asserted-by":"publisher","DOI":"10.1007\/s10032-007-0042-4"},{"key":"b19","doi-asserted-by":"crossref","unstructured":"Leedham, G., Yan, C., Takru, K., Nata Tan, J.H. and Mian, L. (2003), \u201cComparison of some thresholding algorithms for text\/background segmentation in difficult document images\u201d,Proceedings of 7th International Conference on Document Analysis and Recognition, Edinburgh, UK.","DOI":"10.1109\/ICDAR.2003.1227784"},{"key":"b22","unstructured":"Motwani, M.C., Gadiya, M.C., Rakhi, C., Motwani, R.C. and Harris, F.C. Jr (2004), \u201cSurvey of image denoising techniques\u201d,Proceedings of GSPx, Santa Clara Convention Center, Santa Clara, CA, USA."},{"key":"b24","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1979.4310076"},{"key":"b26","doi-asserted-by":"crossref","unstructured":"Randolph, T.R. and Smith, M.J.T. (2001), \u201cEnhancement of fax documents using a binary angular representation\u201d,Proceedings of 2001, International Symposium on Intelligent Multimedia, Video and Speech Processing, Hong Kong, China.","DOI":"10.1109\/ISIMP.2001.925348"},{"key":"b27","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(99)00055-2"},{"key":"b28","doi-asserted-by":"publisher","DOI":"10.1117\/1.1631315"},{"key":"b29","doi-asserted-by":"publisher","DOI":"10.1109\/34.784289"},{"key":"b16","doi-asserted-by":"publisher","DOI":"10.1108\/17563780810874708"},{"key":"b31","unstructured":"Ventzas, D. (1994), \u201cEdge detection techniques in the industry\u201d,Advances in Modelling & Analysis, Series B, Vol. 29 No. 2, pp. 57\u201064."},{"key":"b33","doi-asserted-by":"publisher","DOI":"10.1109\/34.809116"},{"key":"b36","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(99)00094-1"},{"key":"b35","doi-asserted-by":"publisher","DOI":"10.1016\/S0734-189X(89)80017-9"},{"key":"b37","doi-asserted-by":"crossref","unstructured":"Zhang, Z. and Tan, C. (2001), \u201cRestoration of images scanned from thick bound documents\u201d,Proceedings of International Conference on Image Processing, Thessaloniki, Greece, Vol. 1, pp. 1074\u20107.","DOI":"10.1109\/ICIP.2001.959235"},{"key":"frd1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2006.04.003"}],"container-title":["International Journal of Intelligent Computing and Cybernetics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/17563780910939282","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full\/10.1108\/17563780910939282","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:44:14Z","timestamp":1753400654000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ijicc\/article\/2\/1\/148-174\/273835"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3,27]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,3,27]]}},"alternative-id":["10.1108\/17563780910939282"],"URL":"https:\/\/doi.org\/10.1108\/17563780910939282","relation":{},"ISSN":["1756-378X"],"issn-type":[{"type":"print","value":"1756-378X"}],"subject":[],"published":{"date-parts":[[2009,3,27]]}}}