{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T08:15:05Z","timestamp":1765268105714,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1109\/wacv.2011.5711519","type":"proceedings-article","created":{"date-parts":[[2011,2,11]],"date-time":"2011-02-11T18:09:55Z","timestamp":1297447795000},"page":"307-314","source":"Crossref","is-referenced-by-count":31,"title":["A recursive Otsu thresholding method for scanned document binarization"],"prefix":"10.1109","author":[{"given":"Oliver","family":"Nina","sequence":"first","affiliation":[]},{"given":"Bryan","family":"Morse","sequence":"additional","affiliation":[]},{"given":"William","family":"Barrett","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(99)00055-2"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1147\/rd.274.0400"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"874","DOI":"10.1109\/PROC.1980.11753","article-title":"data compression for check processing machines","volume":"68","author":"yasuda","year":"1980","journal-title":"Proceedings of the IEEE"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.1988.28220"},{"key":"ref14","first-page":"1251","article-title":"Dynamic thresholding of gray level images","author":"bernsen","year":"0","journal-title":"International Conference on Pattern Recognition"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICPR.2004.1334167"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/0167-8655(95)00014-8"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.09.010"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2006.04.043"},{"key":"ref19","first-page":"239","article-title":"Decompose-threshold approach to handwriting extraction in degraded historical document images","author":"yan","year":"0","journal-title":"International Workshop on Frontiers in Handwriting Recognition"},{"article-title":"Document image binarization using background estimation and stroke edges","year":"2009","author":"lu","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.1998.710815"},{"article-title":"Text segmentation of historical degraded handwritten documents","year":"2010","author":"nina","key":"ref27"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/0734-189X(85)90125-2","article-title":"A new method for gray-level picture thresholding using the entropy of the histogram","volume":"29","author":"kapur","year":"1985","journal-title":"Computer Vision Graphics and Image Proc"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(86)90030-0"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1109\/83.366472","article-title":"A new criterion for automatic multilevel thresholding","volume":"4","author":"yen","year":"1995","journal-title":"IEEE Trans Image Processing"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2003.10.008"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/TSMC.1979.4310076","article-title":"A threshold selection method from gray-level histograms","volume":"9","author":"otsu","year":"1979","journal-title":"IEEE Trans Systems Man and Cybernetics"},{"journal-title":"An Introduction to Digital Image Processing","year":"1985","author":"niblack","key":"ref9"},{"key":"ref1","first-page":"955","article-title":"Document image binarization based on stroke enhancement","author":"zhu","year":"0","journal-title":"International Conference on Pattern Recognition"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-3203(99)00094-1"},{"key":"ref22","first-page":"1375","article-title":"Document image binarization contest","author":"gatos","year":"0","journal-title":"International Conference on Document Analysis and Recognition (ICDAR)"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1117\/1.1631315","article-title":"Survey over image thresholding techniques and quantitative performance evaluation","volume":"13","author":"sezgin","year":"2004","journal-title":"Journal of Electronic Imaging"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s10032-005-0003-8"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1284420.1284426"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2007.902329"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1986.4767851"}],"event":{"name":"2011 IEEE Workshop on Applications of Computer Vision (WACV)","start":{"date-parts":[[2011,1,5]]},"location":"Kona, HI, USA","end":{"date-parts":[[2011,1,7]]}},"container-title":["2011 IEEE Workshop on Applications of Computer Vision (WACV)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5707201\/5711474\/05711519.pdf?arnumber=5711519","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T15:42:18Z","timestamp":1497886938000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5711519\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/wacv.2011.5711519","relation":{},"subject":[],"published":{"date-parts":[[2011,1]]}}}