首页 | 本学科首页   官方微博 | 高级检索  
     


Writer identification using intra-stroke and inter-stroke information for security enhancements in P2P systems
Authors:Jungpil Shin  Zhaofeng Liu  Cheol Min Kim  Hyung-Jin Mun
Affiliation:1.School of Computer Science and Engineering,The University of Aizu,Fukushima,Japan;2.Network Service Division,NTT Communications Corporation,Tokyo,Japan;3.Department of Computer Education,Jeju National University,Jeju,South Korea;4.Department of Information & Communication Engineering,Sungkyul University,Anyang,Republic of Korea
Abstract:Chinese language has enormous number of characters and complicated stroke structures. So it is very difficult to efficiently and accurately identify a Chinese writer from his/her handwritings. This paper proposes a novel writer identification method for Chinese characters commonly used in Japan which can be used in peer-to-peer (P2P) systems. As a preliminary task, we have analyzed the shapes of strokes and the types of block division structures in Chinese characters and selected some characters for writer identification. The method consists of two efficient algorithms, i.e. the Hidden-feature analysis and the Block-type model, which respectively utilize intra-stroke and inter-stroke features of handwritings to enhance the writer identification accuracy. The Hidden-feature analysis makes template classes of reference characters with online features of training samples such as pen-pressure, pen-speed, pen-altitude, and pen-azimuth of each stroke. The Block-type model also creates such classes for writer identification based on offline features, i.e. the positional information about blocks of sample characters. The experimental results show that the Hidden-feature analysis requires eight Chinese characters while the Block-type model requires only four characters and four ones to achieve writer identification accuracy over 98%. Additionally, the results also demonstrate that any eight Chinese characters are enough to achieve an identification accuracy over 99.9% when the combination of the two algorithms is applied.
Keywords:
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号