By Topic

Segmentation of single- or multiple-touching handwritten numeral string using background and foreground analysis

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Yi-Kai Chen ; Inst. of Inf. Eng., Nat. Cheng Kung Univ., Tainan, Taiwan ; Jhing-Fa Wang

An approach of segmenting a single- or multiple-touching handwritten numeral string (two-digits) is proposed. Most algorithms for segmenting connected digits mainly focus on the analysis of foreground pixels. Some concentrated on the analysis of background pixels only and others are based on a recognizer. We combine background and foreground analysis to segment single- or multiple-touching handwritten numeral strings. Thinning of both foreground and background regions are first processed on the image of connected numeral strings and the feature points on foreground and background skeletons are extracted. Several possible segmentation paths are then constructed and useless strokes are removed. Finally, the parameters of geometric properties of each possible segmentation paths are determined and these parameters are analyzed by the mixture Gaussian probability function to decide the best segmentation path or reject it. Experimental results on NIST special database 19 (an update of NIST special database 3) and some other images collected by ourselves show that our algorithm can get a correct rate of 96 percent with rejection rate of 7.8 percent, which compares favorably with those reported in the literature.

Published in:

Pattern Analysis and Machine Intelligence, IEEE Transactions on  (Volume:22 ,  Issue: 11 )