Proceedings of 3rd International Conference on Document Analysis and Recognition

14-16 Aug. 1995

Go

Filter Results

Displaying Results 1 - 25 of 152
  • Author index

    Publication Year: 1995, Page(s):A1 - A7
    Request permission for commercial reuse | PDF file iconPDF (361 KB)
    Freely Available from IEEE
  • Zone classification in a document using the method of feature vector generation

    Publication Year: 1995, Page(s):541 - 544 vol.2
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB)

    A document can be divided into zones on the basis of its content. For example, a zone can be either text or non-text. This paper describes an algorithm to classify each given document zone into one of nine different classes. Features for each zone such as run length mean and variance, spatial mean and variance, fraction of the total number of black pixels in the zone, and the zone width ratio for ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An intelligent Chinese official document processing system

    Publication Year: 1995, Page(s):974 - 977 vol.2
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB)

    Automated Chinese official document processing techniques and the public-key based cryptographic methodology are used to improve the efficiency of the existing Chinese executive information systems. They provide executive officials more room to achieve the best decision-making. One of the best solutions in document automation and message transmission is to combine low-cost computing power with sta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extraction of reference lines from documents with grey-level background using sub-images of wavelets

    Publication Year: 1995, Page(s):571 - 574 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB)

    Based on wavelets, a new theoretical method has been developed to process form documents. In this method, two-dimensional multiresolution analysis (MSA), wavelet decomposition algorithm, and compactly supported orthonormal wavelets are used to transform a document image into sub-images. According to these sub-images, the reference lines of forms can be extracted, and knowledge about the geometric ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for validating recognized results in understanding table-form document images

    Publication Year: 1995, Page(s):536 - 539 vol.2
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB)

    We address the knowledge representation for understanding table-form documents. In particular, we focus on the knowledge for establishing the correctness of recognized results in addition to the traditional syntactic/constructive-oriented understanding framework. In order to attain to this subject, we introduce the semantic information to specify domains and relationships among individual items de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extracting meaningful handwriting features with fuzzy aggregation method

    Publication Year: 1995, Page(s):841 - 844 vol.2
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    Recognition methods use different features to assign a pattern to a prototype class. The recognition accuracy strongly depends on the selected features. We present a novel fuzzy methodology to extract appropriate fuzzy features from the handwriting data. From these meaningful features a set of linguistic rules are derived which in turn constitute a fuzzy rule base for character recognition. The fu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A structural model of continuous transformation of handwritten characters

    Publication Year: 1995, Page(s):685 - 688 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    An essential problem in handwriting recognition is how to cope with complex shape deformation, and therefore, the modeling of the deformation and its metamorphosis (transformation of an instance of a class into an instance of the other class via continuous transformation) is a key to breaking through the difficulties in handwriting recognition. Based on the structural feature extraction and descri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Clustering and classification of document structure-a machine learning approach

    Publication Year: 1995, Page(s):587 - 591 vol.2
    Cited by:  Papers (16)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (464 KB)

    We describe a system which is capable of learning the presentation of document logical structures, exemplarily shown for business letters. Presenting a set of instances to the system, it clusters them into structural concepts and induces a concept hierarchy. This concept hierarchy is taken as a source for classifying future input. The paper introduces the different learning steps, describes how th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recognition of objects in images of paper based line drawings

    Publication Year: 1995, Page(s):970 - 973 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB)

    This paper presents an algorithm for recognition of objects in skeletonized line drawings. The proposed algorithm employs the grammar to define the set of structural descriptions of objects and detects the elements of these objects during the process of their recognition under the control of the grammar. For recognition new objects grammars of these objects must be only specified without rewriting... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new approach to document analysis based on modified fractal signature

    Publication Year: 1995, Page(s):567 - 570 vol.2
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB)

    This paper presents a new approach to document analysis. The proposed approach is based on modified fractal signature. Instead of the time-consuming traditional approaches (top-down and bottom-up approaches) where iterative operations are necessary to break a document into blocks to extract its geometric (layout) structure, this new approach can divide a document into blocks in only one step. This... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of an interactive tool for handwritten form description

    Publication Year: 1995, Page(s):1185 - 1188 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB)

    A highly time-consuming activity in many areas of commerce and business is the manual entry into computer of data handwritten on forms. All forms in widespread use contain discrete fields where specific information can be entered. Automatic recognition of these forms could be achieved using existing state-of-the-art OCR algorithms for numerals, alphabetic characters, cursive words, signatures and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bibliography references validation using emergent architecture

    Publication Year: 1995, Page(s):532 - 535 vol.2
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    We present an AI approach for the semantic recognition of bibliography references. The objective is to produce for each reference (given by an OCR flow), a structured data containing the list of the different sub-fields recognized and semantically validated. The validation is operated according to a Bibliography reference database, by the exam of principal terms in each reference field. The system... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reading encrypted postal indicia

    Publication Year: 1995, Page(s):1018 - 1023 vol.2
    Cited by:  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB)

    The next generation of postal processing equipment will incorporate some method of verifying the postal revenue block (postal indicia) as a means of reducing postal fraud. The introduction of new digital printing technologies necessitates the encryption of revenue block information. This paper presents an approach for the verification process which includes algorithms for reading an encrypted post... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Incremental character recognition with feature attribution

    Publication Year: 1995, Page(s):837 - 840 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB)

    The neural network learning algorithm presented in the paper splits the problem of handwritten digit recognition into easy steps by learning character classes incrementally: at each step, the neurons most relevant to the considered class are fixed so that subsequent classes will not disrupt the knowledge already acquired, but will be able to use it. A new relevance measure is also defined, for whi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neural approaches for human signature verification

    Publication Year: 1995, Page(s):1055 - 1058 vol.2
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    This paper describes three neural network (NN) based approaches for on-line human signature verification: Bayes multilayer perceptrons (BMP), time-delay neural networks (TDNN), input-oriented neural networks (IONN). The backpropagation algorithm was used for the network training. A signature is input as a sequence of instantaneous absolute velocity (|v(t)|) extracted from a pair of spatial coordin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hough based algorithm for extracting text lines in handwritten documents

    Publication Year: 1995, Page(s):774 - 777 vol.2
    Cited by:  Papers (44)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB)

    The method herein proposed detects text lines on handwritten pages which may include either lines oriented in several directions, erasures, or annotations between main lines. The method has a hypothesis-validation strategy which is iteratively activated until the end of the segmentation is reached. At each stage of the process, the best text-line hypothesis is generated in the Hough domain. Taking... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Faxed image restoration using Kalman filtering

    Publication Year: 1995, Page(s):677 - 680 vol.2
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    We present a new scheme for the restoration of faxed images degraded by both salient noise and additive white noise. We consider two fundamental aspects of faxed image restoration: modeling and the restoration algorithm. First, a model of a faxed image is presented. The model is based on an autoregressive Gauss-Markov random field and includes vertical and horizontal overlap effects. In particular... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A visual programming toolkit demonstrator for offline handwritten forms recognition

    Publication Year: 1995, Page(s):707 - 710 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB)

    Successful commercialisation of off-line handwritten forms-based applications requires integration of numerous different handwriting recognition components with form-specific syntactic and contextual knowledge. To support these requirements, we are developing a handwritten forms recognition toolkit which is based upon a visual programming paradigm. In this paper, we outline the main components of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recursive X-Y cut using bounding boxes of connected components

    Publication Year: 1995, Page(s):952 - 955 vol.2
    Cited by:  Papers (19)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB)

    A top-down page segmentation technique known as the recursive X-Y cut decomposes a document image recursively into a set of rectangular blocks. This paper proposes that the recursive X-Y cut be implemented using bounding boxes of connected components of black pixels instead of using image pixels. The advantage is that great improvement can be achieved in computation. In fact, once bounding boxes o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A shape band-pass filter for character recognition and texture segmentation

    Publication Year: 1995, Page(s):681 - 684 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (352 KB)

    Character recognition and texture segmentation are performed by a filter based on morphological opening. The filter is characterized by two shape patterns, one of them being larger than the other. If it is applied to an image, the output image will keep only the image objects which are smaller than the large shape pattern but larger that the small one. Thus, the filter has shape band-pass characte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A method for table structure analysis using DP matching

    Publication Year: 1995, Page(s):583 - 586 vol.2
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB)

    This paper presents a novel method for table structure analysis. Many documents have table areas, and some have both table and figure areas. It is very important to be able to classify table and figure areas automatically. Furthermore, in tables, the column and row in which a character string is located are very important pieces of information. To detect and analyze table areas, the following meth... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strategies in character segmentation: a survey

    Publication Year: 1995, Page(s):1028 - 1033 vol.2
    Cited by:  Papers (27)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (756 KB)

    This paper provides a review of advances in character segmentation. Segmentation methods are listed under four main headings. The operation of attempting to decompose the image into classifiable units on the basis of general image features is called “dissection”. The second class of methods avoids dissection, and segments the image either explicitly, by classification of specified wind... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A system for recognizing a large class of engineering drawings

    Publication Year: 1995, Page(s):791 - 794 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    We present a complete system for recognizing a large class of symbolic engineering drawings that includes flowcharts, chemical plant diagrams, and logic & electrical circuits. The output of the system, a netlist identifying the symbol types and interconnections, may be used for design verification or as a compact portable representation of the drawing. The automatic recognition task is done in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semi-automatic delineation of regions in floor plans

    Publication Year: 1995, Page(s):964 - 969 vol.2
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (696 KB)

    We propose a technique that uses a proximity metric for delineating partially or fully bounded regions of a scanned bitmap that depicts a building floor plan. A proximity field is defined over the bitmap, which is used both to identify the centers of subjective regions in the image and to assign pixels to regions by proximity. The region boundaries generated by the method tend to match well the su... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Item searching in forms: Application to French tax form

    Publication Year: 1995, Page(s):744 - 747 vol.2
    Cited by:  Papers (8)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (340 KB)

    Cell searching is an important step in form analysis. Information in a form is contained mainly inside its cells. The goal of this paper is to describe a robust method to locate the items whose boundaries are lines without using any a priori information about the form. Our method is based on the detection of lines by Hough transform and on searching of cycles, corresponding to cell location, in a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.