{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:17:49Z","timestamp":1729621069176,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/iscas.2006.1693582","type":"proceedings-article","created":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T13:01:13Z","timestamp":1158930073000},"page":"4","source":"Crossref","is-referenced-by-count":0,"title":["A binarization method for scanned documents based on hidden Markov model"],"prefix":"10.1109","author":[{"family":"Songtao Huang","sequence":"first","affiliation":[]},{"given":"M.A.","family":"Sid-Ahmed","sequence":"additional","affiliation":[]},{"given":"M.","family":"Ahmadi","sequence":"additional","affiliation":[]},{"given":"I.","family":"El-Feghi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","first-page":"12","article-title":"A truly 2-D hidden Markov model for offline handwritten character recognition","volume":"31","author":"park","year":"1849","journal-title":"Patt Recogn"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/78.823977"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/89.365385"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(96)00161-6"},{"key":"11","first-page":"18","article-title":"An inequality and associated maximization technique in statistical estimation for probabilistic functions of finite state Markov chains","author":"baum","year":"1972","journal-title":"Inequalities III"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177697196"},{"key":"3","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/TSMC.1979.4310076","article-title":"A threshold selection method from gray-level histogram","volume":"9","author":"otsu","year":"1979","journal-title":"IEEE Trans Systems Man Cybernet"},{"key":"2","first-page":"259","volume":"9","author":"doyle","year":"1962","journal-title":"Operation useful for similarity-invariant pattern recognition J"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1749-6632.1965.tb11715.x"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/0167-8655(94)90105-8"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/0734-189X(88)90125-9"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(86)90030-0"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1985.6313443"},{"key":"4","article-title":"Adaptive document image thresholding using foreground and background clusterThe 7th International Conference on Electronics, Information, and Communications (ICEIC04)","volume":"icip98","author":"savakis","year":"0","journal-title":"ing Proceedings of International Conference on Image Processing"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(94)E0043-K"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(94)00175-L"}],"event":{"name":"2006 IEEE International Symposium on Circuits and Systems","acronym":"ISCAS-06","location":"Island of Kos, Greece"},"container-title":["2006 IEEE International Symposium on Circuits and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/11145\/35661\/01693582.pdf?arnumber=1693582","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T05:30:46Z","timestamp":1497677446000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1693582\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iscas.2006.1693582","relation":{},"subject":[]}}