{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:10:38Z","timestamp":1750306238306,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,12,18]],"date-time":"2016-12-18T00:00:00Z","timestamp":1482019200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,12,18]]},"DOI":"10.1145\/3009977.3010042","type":"proceedings-article","created":{"date-parts":[[2016,12,22]],"date-time":"2016-12-22T21:20:29Z","timestamp":1482441629000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Generating synthetic handwriting using n-gram letter glyphs"],"prefix":"10.1145","author":[{"given":"Arka Ujjal","family":"Dey","sequence":"first","affiliation":[{"name":"Indian Institute of Technology Jodhpur, Jodhpur, India"}]},{"given":"Gaurav","family":"Harit","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology Jodhpur, Jodhpur, India"}]}],"member":"320","published-online":{"date-parts":[[2016,12,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"ICFHR","author":"Achint T.","year":"2008","unstructured":"T. Achint and G. Venu . Generation and performance evaluation of synthetic handwritten captchas . In ICFHR , 2008 . T. Achint and G. Venu. Generation and performance evaluation of synthetic handwritten captchas. In ICFHR, 2008."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2007.903539"},{"key":"e_1_3_2_1_3_1","volume-title":"USENIX Security","author":"Ballard L.","year":"2006","unstructured":"L. Ballard , F. Monrose , and D. P. Lopresti . Biometric authentication revisited: Understanding the impact of wolves in sheep's clothing . In USENIX Security , 2006 . L. Ballard, F. Monrose, and D. P. Lopresti. Biometric authentication revisited: Understanding the impact of wolves in sheep's clothing. In USENIX Security, 2006."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74958-5_49"},{"key":"e_1_3_2_1_5_1","first-page":"78740G","volume-title":"IS&T\/SPIE Electronic Imaging","author":"Chen J.","year":"2011","unstructured":"J. Chen , W. Cheng , and D. Lopresti . Using perturbed handwriting to support writer identification in the presence of severe data constraints . In IS&T\/SPIE Electronic Imaging , pages 78740G -- 78740G . International Society for Optics and Photonics , 2011 . J. Chen, W. Cheng, and D. Lopresti. Using perturbed handwriting to support writer identification in the presence of severe data constraints. In IS&T\/SPIE Electronic Imaging, pages 78740G--78740G. International Society for Optics and Photonics, 2011."},{"key":"e_1_3_2_1_6_1","first-page":"78740Y","volume-title":"IS&T\/SPIE Electronic Imaging","author":"Cheng W.","year":"2011","unstructured":"W. Cheng and D. Lopresti . Parameter calibration for synthesizing realistic-looking variability in offline handwriting . In IS&T\/SPIE Electronic Imaging , pages 78740Y -- 78740Y . International Society for Optics and Photonics , 2011 . W. Cheng and D. Lopresti. Parameter calibration for synthesizing realistic-looking variability in offline handwriting. In IS&T\/SPIE Electronic Imaging, pages 78740Y--78740Y. International Society for Optics and Photonics, 2011."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10032-014-0231-x"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2014.09.013"},{"key":"e_1_3_2_1_9_1","volume-title":"Generating sequences with recurrent neural networks. arXiv preprint arXiv:1308.0850","author":"Graves A.","year":"2013","unstructured":"A. Graves . Generating sequences with recurrent neural networks. arXiv preprint arXiv:1308.0850 , 2013 . A. Graves. Generating sequences with recurrent neural networks. arXiv preprint arXiv:1308.0850, 2013."},{"key":"e_1_3_2_1_10_1","first-page":"140","volume-title":"IWFHR","author":"Guyon I.","year":"1996","unstructured":"I. Guyon . Handwriting synthesis from handwritten glyphs . In IWFHR , pages 140 -- 153 . Citeseer , 1996 . I. Guyon. Handwriting synthesis from handwritten glyphs. In IWFHR, pages 140--153. Citeseer, 1996."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-44871-6_39"},{"issue":"4","key":"e_1_3_2_1_12_1","first-page":"217","article-title":"Automatic generation of script font ligatures based on curve smoothness optimization","volume":"7","author":"Kokula M.","year":"1994","unstructured":"M. Kokula . Automatic generation of script font ligatures based on curve smoothness optimization . Electronic Publishing , 7 ( 4 ): 217 -- 229 , 1994 . M. Kokula. Automatic generation of script font ligatures based on curve smoothness optimization. Electronic Publishing, 7(4):217--229, 1994.","journal-title":"Electronic Publishing"},{"key":"e_1_3_2_1_13_1","volume-title":"Computational analysis of present-day {A} merican {E} nglish","author":"Ku H.","year":"1967","unstructured":"H. Ku , W. N. Francis , Computational analysis of present-day {A} merican {E} nglish . 1967 . H. Ku, W. N. Francis, et al. Computational analysis of present-day {A} merican {E} nglish. 1967."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/21.44021"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1046920.1194909"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02811383"},{"key":"e_1_3_2_1_17_1","volume-title":"Gaussian processes for machine learning (gpml) toolbox. JMLR, 11(Nov):3011--3015","author":"Rasmussen C. E.","year":"2010","unstructured":"C. E. Rasmussen and H. Nickisch . Gaussian processes for machine learning (gpml) toolbox. JMLR, 11(Nov):3011--3015 , 2010 . C. E. Rasmussen and H. Nickisch. Gaussian processes for machine learning (gpml) toolbox. JMLR, 11(Nov):3011--3015, 2010."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3206.001.0001","volume-title":"Gaussian Processes for Machine Learning (Adaptive Computation and Machine Learning)","author":"Rasmussen C. E.","year":"2005","unstructured":"C. E. Rasmussen and C. K. I. Williams . Gaussian Processes for Machine Learning (Adaptive Computation and Machine Learning) . The MIT Press , 2005 . C. E. Rasmussen and C. K. I. Williams. Gaussian Processes for Machine Learning (Adaptive Computation and Machine Learning). The MIT Press, 2005."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0255(01)00176-1"},{"key":"e_1_3_2_1_20_1","first-page":"1257","volume-title":"NIPS","author":"Snelson E.","year":"2005","unstructured":"E. Snelson and Z. Ghahramani . Sparse gaussian processes using pseudo-inputs . In NIPS , pages 1257 -- 1264 , 2005 . E. Snelson and Z. Ghahramani. Sparse gaussian processes using pseudo-inputs. In NIPS, pages 1257--1264, 2005."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/938979.939265"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1018428.1020769"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/978-3-540-76280-5_13","volume-title":"Machine Learning in Document Analysis and Recognition","author":"Varga T.","year":"2008","unstructured":"T. Varga and H. Bunke . Perturbation models for generating synthetic training data in handwriting recognition . In Machine Learning in Document Analysis and Recognition , pages 333 -- 360 . Springer , 2008 . T. Varga and H. Bunke. Perturbation models for generating synthetic training data in handwriting recognition. In Machine Learning in Document Analysis and Recognition, pages 333--360. Springer, 2008."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10032-004-0131-6"},{"key":"e_1_3_2_1_25_1","first-page":"157","volume-title":"IWFHR","author":"Wang J.","year":"2002","unstructured":"J. Wang , C. Wu , Y.-Q. Xu , H.-Y. Shum , and L. Ji . Learning-based cursive handwriting synthesis . In IWFHR , pages 157 -- 162 . IEEE, 2002 . J. Wang, C. Wu, Y.-Q. Xu, H.-Y. Shum, and L. Ji. Learning-based cursive handwriting synthesis. In IWFHR, pages 157--162. IEEE, 2002."},{"key":"e_1_3_2_1_26_1","volume-title":"NIPS","author":"Williams C. K. I.","year":"1995","unstructured":"C. K. I. Williams and C. E. Rasmussen . Gaussian processes for regression . In NIPS , 1995 . C. K. I. Williams and C. E. Rasmussen. Gaussian processes for regression. In NIPS, 1995."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDAR.2005.122"}],"event":{"name":"ICVGIP '16: Indian Conference on Computer Vision, Graphics and Image Processing","sponsor":["Google Inc.","QI Qualcomm Inc.","Tata Consultancy Services","NVIDIA","MathWorks The MathWorks, Inc.","Microsoft Research Microsoft Research"],"location":"Guwahati Assam India","acronym":"ICVGIP '16"},"container-title":["Proceedings of the Tenth Indian Conference on Computer Vision, Graphics and Image Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3009977.3010042","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3009977.3010042","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:28Z","timestamp":1750220608000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3009977.3010042"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12,18]]},"references-count":27,"alternative-id":["10.1145\/3009977.3010042","10.1145\/3009977"],"URL":"https:\/\/doi.org\/10.1145\/3009977.3010042","relation":{},"subject":[],"published":{"date-parts":[[2016,12,18]]},"assertion":[{"value":"2016-12-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}