iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1049/IPR2.13044
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T07:14:36Z","timestamp":1726298076043},"reference-count":37,"publisher":"Institution of Engineering and Technology (IET)","issue":"6","license":[{"start":{"date-parts":[[2024,2,6]],"date-time":"2024-02-06T00:00:00Z","timestamp":1707177600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Image Processing"],"published-print":{"date-parts":[[2024,5]]},"abstract":"Abstract<\/jats:title>The Intelligent Evaluation System for Calligraphy Characters (IESCC) is used for teaching calligraphy, and users can learn calligraphy through the modifications given by the system. Chinese character skeleton extraction is an important step in the intelligent evaluation algorithm of calligraphic characters. The skeletons of Chinese characters extracted by traditional refinement algorithms are prone to redundant branches and deformed skeletons, which can lead to skeleton extraction results that do not conform to the topology of the original character. In this study, the focus lies on hard\u2010pen regular script, and skeleton repair and extraction are performed for these characters. According to the writing characteristics of regular script, the redundant burs are removed and the deformation zone of the thinned skeleton is detected, and then the idea of first splitting is used, then restructuring, to propose a skeleton extraction algorithm based on stroke characterization and ambiguous zone detection for hard\u2010pen regular script, referred to as SCAD. First, a thinning algorithm is used to extract the skeleton of Chinese characters and remove redundant pixels. By analyzing the stroke characteristics of regular script, the burrs are classified and different conditions are set to detect and remove the burrs. Then the ambiguous zones are detected according to the different kinds of junction points. Then, curvature, stroke width and direction deviation are used to analyze the continuity of stroke segments, and the decision function is used to classify the stroke segments. Finally, the stroke segments with optimal pairings were compensated by interpolation according to the direction trend. This concludes the skeleton extraction. Skeleton extraction is performed on 1000 sample characters, and the SCAD algorithm can extract the skeleton of Chinese characters with an accuracy of up to 98.37%. It is proved that the SCAD method proposed here is a practical and effective method to extract the skeleton of hard\u2010pen regular script.<\/jats:p>","DOI":"10.1049\/ipr2.13044","type":"journal-article","created":{"date-parts":[[2024,2,7]],"date-time":"2024-02-07T08:45:33Z","timestamp":1707295533000},"page":"1504-1515","update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Skeleton extraction of hard\u2010pen regular script based on stroke characterization and ambiguous zone detection"],"prefix":"10.1049","volume":"18","author":[{"given":"Zhanyang","family":"Xu","sequence":"first","affiliation":[{"name":"School of Software Nanjing University of Information Science & Technology Nanjing China"}]},{"ORCID":"http:\/\/orcid.org\/0009-0003-5879-0383","authenticated-orcid":false,"given":"Feiyang","family":"Qin","sequence":"additional","affiliation":[{"name":"School of Software Nanjing University of Information Science & Technology Nanjing China"}]},{"ORCID":"http:\/\/orcid.org\/0009-0006-8278-8760","authenticated-orcid":false,"given":"Ningyang","family":"Xiong","sequence":"additional","affiliation":[{"name":"School of Software Nanjing University of Information Science & Technology Nanjing China"}]},{"given":"Hongyan","family":"Shi","sequence":"additional","affiliation":[{"name":"School of Software Nanjing University of Information Science & Technology Nanjing China"}]},{"given":"Jiarui","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science Nanjing University of Information Science & Technology Nanjing China"}]},{"given":"Wei","family":"Lin","sequence":"additional","affiliation":[{"name":"Nanjing Technology R&D Center of Jiangsu Children's Spring Interconnection Education Technology Co. Nanjing China"}]}],"member":"265","published-online":{"date-parts":[[2024,2,6]]},"reference":[{"key":"e_1_2_11_2_1","doi-asserted-by":"crossref","unstructured":"Iwakiri Y. Shiraishi S. Yaokai F. Uchida S.:On the possibility of instance\u2010based stroke recovery. In:Presented at the 2012 International Conference on Frontiers in Handwriting Recognition.Springer Cham(2012)","DOI":"10.1109\/ICFHR.2012.248"},{"key":"e_1_2_11_3_1","doi-asserted-by":"crossref","unstructured":"Cordella L.P. De Stefano C. Marcelli A. Santoro A.:Writing order recovery from off\u2010line handwriting by graph traversal. In:Presented at the 2010 20th International Conference on Pattern Recognition.IEEE Piscataway(2010)","DOI":"10.1109\/ICPR.2010.467"},{"key":"e_1_2_11_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.68"},{"key":"e_1_2_11_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.216"},{"key":"e_1_2_11_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2021.108416"},{"key":"e_1_2_11_7_1","doi-asserted-by":"crossref","unstructured":"Wang T.\u2010Q. Liu C.\u2010L.:Handwriting trajectory recovery from off\u2010line multi\u2010stroke characters by deep ordering prediction and heuristic search. In:Presented at the 2021 IEEE International Conference on Multimedia and Expo (ICME).IEEE Piscataway(2021)","DOI":"10.1109\/ICME51207.2021.9428463"},{"key":"e_1_2_11_8_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11868"},{"key":"e_1_2_11_9_1","doi-asserted-by":"publisher","DOI":"10.1111\/cgf.13365"},{"key":"e_1_2_11_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11263\u2010023\u201001926\u20103"},{"key":"e_1_2_11_11_1","doi-asserted-by":"crossref","unstructured":"Zhang Y. Sang L. Grzegorzek M. See J. Yang C.:BlumNet: graph component detection for object skeleton extraction. In:Proceedings of the 30th ACM International Conference on Multimedia pp.5527\u20135536.ACM New York(2022)","DOI":"10.1145\/3503161.3547816"},{"key":"e_1_2_11_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/tip.2021.3078079"},{"key":"e_1_2_11_13_1","doi-asserted-by":"crossref","unstructured":"Nathan S. Kansal P.:Skeletonnet: Shape pixel to skeleton pixel. In:Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops. IEEE Piscataway (2019)","DOI":"10.1109\/CVPRW.2019.00156"},{"issue":"4","key":"e_1_2_11_14_1","first-page":"90","article-title":"The method of removing burrs in skeleton extraction","volume":"31","author":"Wan\u2010Xin W.","year":"2014","journal-title":"J. Guangdong Univ. Technol."},{"key":"e_1_2_11_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.59"},{"key":"e_1_2_11_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2010.08.021"},{"key":"e_1_2_11_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432\u2010012\u20104715\u20103"},{"key":"e_1_2_11_18_1","unstructured":"Ma J. Ren X. Konopelko V. Tsviatkou V.:An automatic pruning method for skeleton images. In:Pattern Recognition and Information Processing (PRIP'2021): Proceedings of the 15th International Conference pp.232\u2013235.IEEE Piscataway(2021)"},{"key":"e_1_2_11_19_1","doi-asserted-by":"crossref","unstructured":"Noubigh Z. Kherallah M.:A survey on handwriting recognition based on the trajectory recovery technique. In:2017 1st International Workshop on Arabic Script Analysis and Recognition (ASAR) pp.69\u201373. IEEE Piscataway (2017)","DOI":"10.1109\/ASAR.2017.8067762"},{"key":"e_1_2_11_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(90)90068-V"},{"key":"e_1_2_11_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.877517"},{"key":"e_1_2_11_22_1","unstructured":"Qiao Y. Yasuhara M.:Recovering dynamic information from static handwritten images. In:Ninth International Workshop on Frontiers in Handwriting Recognition pp.118\u2013123.IEEE Piscataway(2004)"},{"key":"e_1_2_11_23_1","doi-asserted-by":"publisher","DOI":"10.5392\/IJoC.2015.11.3.007"},{"key":"e_1_2_11_24_1","doi-asserted-by":"crossref","unstructured":"Crispo G. Diaz M. Marcelli A. Ferrer M.A.:Tracking the ballistic trajectory in complex and long handwritten signatures. In:Presented at the 2018 16th International Conference on Frontiers in Handwriting Recognition (ICFHR).Springer Cham(2018)","DOI":"10.1109\/ICFHR-2018.2018.00068"},{"key":"e_1_2_11_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2015.05.022"},{"key":"e_1_2_11_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12293-023-00397-w"},{"key":"e_1_2_11_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10032\u2010009\u20100085\u20109"},{"key":"e_1_2_11_28_1","doi-asserted-by":"crossref","unstructured":"Bui Q.A. Visani M. Mullot R.:Invariants extraction method applied in an omni\u2010language old document navigating system. In:2013 12th International Conference on Document Analysis and Recognition pp.1325\u20131329.IEEE Piscataway(2013)","DOI":"10.1109\/ICDAR.2013.268"},{"issue":"1","key":"e_1_2_11_29_1","first-page":"358","article-title":"Triangulation based skeletonization and trajectory recovery for handwritten character patterns","volume":"9","author":"Phan D.","year":"2015","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"e_1_2_11_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/s0031\u20103203(99)00103\u2010x"},{"key":"e_1_2_11_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.736691"},{"key":"e_1_2_11_32_1","doi-asserted-by":"crossref","unstructured":"Zhou Z. Zhan E. Zheng J.:Stroke extraction of handwritten Chinese character based on ambiguous zone information. In:2017 2nd International Conference on Multimedia and Image Processing (ICMIP) pp.68\u201372.IEEE Piscataway(2017)","DOI":"10.1109\/ICMIP.2017.45"},{"key":"e_1_2_11_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2020.3003994"},{"key":"e_1_2_11_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10044\u2010021\u201001039\u2010y"},{"key":"e_1_2_11_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/357994.358023"},{"key":"e_1_2_11_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/0734-189X(87)90054-5"},{"key":"e_1_2_11_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.799914"},{"key":"e_1_2_11_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10044\u2010009\u20100166\u2010x"}],"container-title":["IET Image Processing"],"original-title":[],"language":"en","deposited":{"date-parts":[[2024,5,1]],"date-time":"2024-05-01T11:21:58Z","timestamp":1714562518000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/ipr2.13044"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,6]]},"references-count":37,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,5]]}},"alternative-id":["10.1049\/ipr2.13044"],"URL":"http:\/\/dx.doi.org\/10.1049\/ipr2.13044","archive":["Portico"],"relation":{},"ISSN":["1751-9659","1751-9667"],"issn-type":[{"value":"1751-9659","type":"print"},{"value":"1751-9667","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,6]]},"assertion":[{"value":"2023-10-31","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-01-27","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-02-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}