{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:00:04Z","timestamp":1729630804072,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/dial.2004.1263257","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T10:19:45Z","timestamp":1086862785000},"page":"288-298","source":"Crossref","is-referenced-by-count":3,"title":["Construction of handwriting databases using transcript-based mapping"],"prefix":"10.1109","author":[{"family":"Bin Zhang","sequence":"first","affiliation":[]},{"given":"C.","family":"Tomai","sequence":"additional","affiliation":[]},{"given":"S.","family":"Srihari","sequence":"additional","affiliation":[]},{"given":"V.","family":"Govindaraju","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"819","article-title":"Writer recognition by prototype related deformation of handprinted characters","author":"naske","year":"1982","journal-title":"Proc Int Conf Pattern Recognition"},{"key":"17","first-page":"237","article-title":"Recognition of writer of handwritten texts","author":"mihelic","year":"1977","journal-title":"Proc 1977 Int Conf on Crime Countermeasures - Sci Engin"},{"key":"18","first-page":"1","article-title":"Writer recognition by spectrum analysis","author":"kuckuck","year":"1980","journal-title":"Proc 1980 Int Conf Security Through Sci Engin"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.1109\/ICDAR.2003.1227824","article-title":"Individuality of handwritten characters","author":"zhang","year":"2003","journal-title":"Proc Seventh Int l Conf Document Analysis and Recognition"},{"key":"16","doi-asserted-by":"crossref","DOI":"10.1109\/ICDAR.2003.1227835","article-title":"Analysis of handwritten individuality using handwritten words","author":"zhang","year":"2003","journal-title":"Proc Seventh Int l Conf Document Analysis and Recognition"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1520\/JFS15447J"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2003.1227826"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s100440070020"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/IWFHR.2002.1030945"},{"key":"21","doi-asserted-by":"crossref","first-page":"909","DOI":"10.1016\/0031-3203(91)90010-3","article-title":"Off-line writer verification using ordinary characters as the object","volume":"24","author":"yoshimura","year":"1991","journal-title":"Pattern Recognition"},{"key":"20","first-page":"405","article-title":"Ancient hebraic handwriting identification with run-length histograms","volume":"smc 12","author":"dinstein","year":"1982","journal-title":"IEEE Trans Syst Man Cyber"},{"journal-title":"Personal Identification Based on Pea","year":"0","author":"zuo","key":"22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(99)00006-0"},{"key":"24","first-page":"52","article-title":"Matching document images with ground truth","volume":"1","author":"hobby","year":"1998","journal-title":"International Journal on Document Analysis and Recognition (IJDAR)"},{"key":"25","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/TSMC.1979.4310076","article-title":"A threshold selection method from gray-level histograms","volume":"9","author":"otsu","year":"1979","journal-title":"IEEE Trans Systems Man and Cybernetics"},{"key":"26","first-page":"262","article-title":"Efficient chaincode based image manipulation for handwritten word recognition","author":"kim","year":"1996","journal-title":"Proc IS&T\/SPIE Symp Electronic Imaging Science and Technology"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(94)90016-7"},{"key":"28","first-page":"61","author":"seni","year":"1992","journal-title":"Segmenting Handwritten Text Lines into Words Using Distance Algorithms"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.1995.598958"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1980.11675"},{"key":"2","first-page":"67","article-title":"A system for handwriting matching and recognition","author":"srihari","year":"2003","journal-title":"Proceedings of the 2003 Symposium on Document Image Understanding and Technology"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.1996.517139"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(89)90059-9"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/226931.226960"},{"key":"7","first-page":"75","article-title":"The application of image processing and pattern recognition techniques to the forensic analysis of handwriting","author":"klement","year":"1980","journal-title":"International Conference on Security Through Science and Engineering"},{"key":"6","first-page":"142","article-title":"Penman: A system for reading unconstrained handwritten page images","author":"srihari","year":"1997","journal-title":"Symposium on Document Image Understanding Technology (SDIUT) Annapolis MD"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s100320050035"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/DIA.1997.627095"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/34.824821"},{"key":"9","article-title":"Computer-aided analysis of handwriting, the nifotno approach","author":"de jong","year":"1994","journal-title":"4th European Handwriting Conference for Police and Gov Handwriting Experts"},{"key":"8","first-page":"75","article-title":"An application system for the computer-assisted identification of handwritings","author":"klement","year":"1983","journal-title":"Proceedings International Carnahan Conference on Security Technology"}],"event":{"name":"First International Workshop on Document Image Analysis for Libraries, 2004.","location":"Palo Alto, CA, USA"},"container-title":["First International Workshop on Document Image Analysis for Libraries, 2004. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8926\/28251\/01263257.pdf?arnumber=1263257","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T03:56:09Z","timestamp":1497585369000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1263257\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/dial.2004.1263257","relation":{},"subject":[]}}