Please use this identifier to cite or link to this item:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/74292
Full metadata record
???org.dspace.app.webui.jsptag.ItemTag.dcfield??? | Value | Language |
---|---|---|
dc.contributor.advisor | 丁建均 | |
dc.contributor.author | Guan-Hua Wang | en |
dc.contributor.author | 王冠驊 | zh_TW |
dc.date.accessioned | 2021-06-17T08:28:18Z | - |
dc.date.available | 2019-08-20 | |
dc.date.copyright | 2019-08-20 | |
dc.date.issued | 2019 | |
dc.date.submitted | 2019-08-12 | |
dc.identifier.citation | [1] N. A. Murshed, F. Bortolozzi, and R. Sabourin, 'Binary image compression using identity mapping backpropagation neural network', Electronic Imaging '97. International Society for Optics and Photonics, 1997, pp. 29-35.
[2] N. A. Murshed, R. Sabourin, and F. Bortolozzi, 'A cognitive approach to off-line signature verification', International Journal of Pattern Recognition and Artificial Intelligence, vol. 11, no. 05, 1997, pp. 801-825. [3] H. Khalajzadeh, M. Mansouri, and M. Teshnehlab, 'Persian Signature Verification using Convolutional Neural Networks', International Journal of Engineering Research and Technology, vol. 1, 2012. [4] L. Hafemann, R. Sabourin, and L. Oliveira, 'Writer-independent feature learning for offline signature verification using convolutional neural networks', Neural Networks The 2016 International Joint Conference on, 2016. [5] D. Field, 'Relations between the statistics of natural images and the response properties of cortical cells,' Journal of the Optical Society of America A, 1987, pp. 2379-2394 [6] What Are Log-Gabor Filters and Why Are They Good? http://www.csse.uwa.edu.au/~pk/research/matlabfns/PhaseCongruency/Docs/convexpl.html [7] T. Ojala, M. Pietikäinen, and D. Harwood. “A comparative study of texture measures with classification based on featured distributions.” Pattern Recognition 29 , 1996, pp.51-59. [8] M. B. Yilmaz, B. Yanikoglu, C. Tirkaz, and A. Kholmatov, 'Offline signature verification using classifier combination of HOG and LBP features,' 2011 International Joint Conference on Biometrics (IJCB), Washington, DC, 2011, pp. 1-7. [9] M. A. Ferrer, A. Morales, and J. F. Vargas, 'Off-line signature verification using local patterns,' CONATEL 2011, Catolica San Pablo, Arequipa, 2011, pp. 1-6. [10] T. Jabid, M. H. Kabir and O. Chae, 'Facial expression recognition using Local Directional Pattern (LDP),' 2010 IEEE International Conference on Image Processing, Hong Kong, 2010, pp. 1605-1608. [11] G. Cash, M. Hatamian. 'Optical character recognition by the method of moments.'Computer Vision, Graphics, and Image Processing, 1987, pp. 291-310. [12] J. Y. Huang and J. J. Ding, “Automatic handwriting verification algorithm in Chinese words using point-matching position features,” Computer Vision, Graphics, and Image Processing, Tainan, Taiwan, Aug. 2018. [13] M. K. Hu. 'Visual pattern recognition by moment invariants.' Information Theory, IRE Transactions on 8.2, 1962. pp. 179-187. [14] J. Flusser, T. Suk. 'Pattern recognition by affine moment invariants.' Pattern recognition 26.1, 1993. pp. 167-174. [15] K. D. Tsirikolias, and B. G. Mertzios. 'Statistical pattern recognition using efficient two-dimensional moments with applications to character recognition.'Pattern Recognition 26.6, 1993, pp. 877-882. [16] Y. C. Chim, A. A. Kassim, and Y. Ibrahim. 'Character recognition using statistical moments.' Image and vision Computing 17.3, 1999, pp. 299-307. [17] P. X. Lee, J. J. Ding, T. C. Wang, and Y. C. Lee. 'Automatic Handwriting verification Algorithm for Chinese Words Semi-Global Features and Adaptive Classifier.'International Conference on Multimedia & Expo Workshops (ICMEW), 2018, pp. 1–6. [18] Y. Sun, W. Liu, Y. Wang, 'United moment invariants for shape discrimination, 'IEEE International Conference on Robotics, Intelligent Systems and Signal Processing, 2003, pp. 88-93. [19] G. F. Fitriana, 'Handwriting Digit Recognition using United Moment Invariant feature extraction and Self Organizing Maps,' 2014 Third ICT International Student Project Conference (ICT-ISPC), 2014, pp. 43-46. [20] R. M. Haralick, K. Shanmugam, and I. Dinstein, 'Textural Features for Image Classification,' in IEEE Transactions on Systems, Man, and Cybernetics, vol. SMC-3, no. 6, pp. 610-621, Nov. 1973. [21] J. F. Vargas, M. A. Ferrer, C. M. Travieso, and J. B. Alonso, 'Off-line signature verification based on grey level information using texture features.' Pattern Recognition, vol 44-2, 2011, pp. 375-385. [22] D. G. Lowe, 'Distinctive image features from scale-invariant keypoints.'International journal of computer vision, 2004, pp. 91-110. [23] J. Woodard, M. Lancaster, A. Kundu, D. Ruiz, and J. Ryan, 'Writer recognition of Arabic text by generative local features,' 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS), Washington, DC, 2010, pp. 1-7. [24] M. Sreeraj and S. M. Idicula, 'The effect of SIFT features as content descriptors in the context of automatic writer identification in Malayalam language,' 2012 IV International Congress on Ultra Modern Telecommunications and Control Systems, St. Petersburg, 2012, pp. 613-617. [25] X. Wu, Y. Tang, and W. Bu, 'Offline Text-Independent Writer Identification Based on Scale Invariant Feature Transform,' in IEEE Transactions on Information Forensics and Security, vol. 9, no. 3,2014, pp. 526-536. [26] Introduction to k-Nearest Neighbors: A powerful Machine Learning Algorithm. https://www.analyticsvidhya.com/blog/2018/03/introduction-k-neighbours-algorithm-clustering/ [27] S. Lloyd, 'Least squares quantization in PCM,' in IEEE Transactions on Information Theory, vol. 28, no. 2, pp. 129-137, March 1982. [28] http://ai.stanford.edu [29] C. Cortes, and V. Vladimir. 'Support-vector networks.' Machine learning 20.3, 1995, pp. 273-297. [30] https://medium.com/@chih.sheng.huang821/機器學習-支撐向量機-support-vector-machine-svm-詳細推導-c320098a3d2e [31] B. E. Boser, I. M. Guyon, and V. N. Vapnik. 'A training algorithm for optimal margin classifiers.' In D. Haussler, editor, 5th Annual ACM Workshop on COLT, 1992, pp. 144–152. [32] Hsu, Chih-Wei, Chih-Chung Chang, and Chih-Jen Lin. 'A practical guide to support vector classification.' (2003). | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/74292 | - |
dc.description.abstract | 字筆跡鑑定的目的在於分辨是該文件是否為當事人所寫,亦或是被別人偽造。字跡辨識在法務鑑定上扮演非常重要的角色,其鑑定的內容十分的廣,例如信用卡、賬單、遺書等等。
要準確的做到筆跡鑑定是一項極需眼力跟細心程度且費時費力的工作。筆跡鑑定的關鍵在於如何從筆跡之間的差異分辨該筆跡是否為同一人所寫。然而,由於同一個人的字跡也存在個體變異,這使得字跡真偽辨識困難許多。 在這篇論文中,我們提出了一套針對中文字的字跡真偽辨識演算法。比起其他語言中的文字,中文字擁有比較複雜的結構。因此,我們所提出的演算法使用了3種不同的特徵集;全局特徵、匹配偏旁特徵以及匹配點特徵。相對於全局特徵,匹配偏旁特徵以及匹配點特徵為局部特徵。局部特徵幫助我們從較小的維度觀察中文文字。我們希望結合這3種特徵集可以更完整的描述整個文字。考量到在做真偽辨識時,不同的特徵對於不同的字有不同的重要性,我們使用k-value來篩選合適的特徵。所有篩選出來的特徵被組合成代表該字的特徵向量。支持向量機則會根據組合特徵驗證該手寫文字是否為偽造的文字。實驗結果顯示,我們的演算法在字跡真偽辨識中的準確率達到95.85%,並明顯優於其他現有的辨識方法。此外,實驗結果也顯示我們提出的演算法具有較好的可靠性。 | zh_TW |
dc.description.abstract | The purpose of handwriting verification is to identify whether the handwritten words were written by a person itself or is forged by others. Handwriting verification plays a very important role in forensics. The content is very extensive, such as credit cards, bills, testaments. Accurate handwriting verification is a work that requires a lot of eyesight and care; overall it is time-consuming and laborious. The key to handwriting verification is how to identify the authenticity of the handwriting from the difference between. However, since there is also an individual variation in the handwriting of the same person, it makes handwriting verification a challenging topic.
In this thesis, we proposed a verification algorithm for the Chinese word. Comparing with words in other languages, Chinese words often have a more complex structure. Therefore, our algorithm adopted three different sets of features, the global features, the matched side feature, the matched point feature. With respect to global features, matched side feature and matched point feature are local features, which help the algorithm to observe the Chinese word in smaller magnitude levels. We hope the combination of the three feature sets is able to completely describe the entire word. Considering that different features may have different importance for the different word, we use k-value to select suitable features for each word. All the selected features are combined and the support vector machine with a linear kernel is used as a classifier to verify whether the handwritten word was forged according to the combined feature. Experimental results show that the proposed algorithm reaches 95.85% accuracy in handwriting verification and outperforms several other methods. Moreover, our proposed algorithm shows robustness while dealing with different words. | en |
dc.description.provenance | Made available in DSpace on 2021-06-17T08:28:18Z (GMT). No. of bitstreams: 1 ntu-108-R05942102-1.pdf: 3715887 bytes, checksum: 31ad071ac6e3551af350aca63e8d7a33 (MD5) Previous issue date: 2019 | en |
dc.description.tableofcontents | 口試委員會審定書 i
誌謝 ii 中文摘要 iii ABSTRACT iv CONTENTS vi LIST OF FIGURES ix LIST OF TABLES xii Chapter 1 Introduction 1 1.1 Background 1 1.2 Thesis Organization 4 Chapter 2 Feature Extraction Methods 5 2.1 Log-Gabor Filter 5 2.2 Local Pattern 8 2.2.1 Local Binary Pattern (LBP) 8 2.2.2 Local Directional Pattern (LDP) 9 2.3 Moment Features 12 2.3.1 Spatial and Central Moment 12 2.3.2 Hu Moments 14 2.3.3 Affine Moments 15 2.3.4 Tsirikolias-Mertzios moments 17 2.3.5 United Moments 18 2.4 Gray Level Co-occurrence Matrix (GLCM) 18 2.5 Scale-Invariant Feature Transform (SIFT) 22 Chapter 3 Classification Methods 28 3.1 Weighted Euclidean Distance 28 3.2 K-Nearest Neighbor (KNN) 30 3.3 K-Means Clustering 32 3.4 Support Vector Machine (SVM) 35 Chapter 4 Proposed Algorithm 40 4.1 Overview of the Proposed Framework 40 4.2 Feature Extraction Stage 41 4.2.1 Global features 42 4.2.2 Matched Side Feature 48 4.2.3 Matched point Feature 52 4.3 Feature Selection and Classification 57 Chapter 5 Database 59 5.1 Introduction of Database 59 5.2 Questionnaire Collecting 61 5.3 Segmentation 63 5.4 Image Noise Reduction 65 Chapter 6 Experiment Result 67 6.1 Matching Result 67 6.1.1 Point matching 67 6.1.2 Side matching 71 6.2 Model Evaluation 74 6.3 Simulation Result 77 Chapter 7 Conclusions and Future Work 82 7.1 Conclusions 82 7.2 Future Work 83 REFERENCE 85 | |
dc.language.iso | en | |
dc.title | 基於特徵點與偏旁資訊之中文字跡真偽辨識演算法 | zh_TW |
dc.title | Chinese Handwriting Verification Algorithm Using Point and Side Information | en |
dc.type | Thesis | |
dc.date.schoolyear | 107-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 郭景明,許文良,張榮吉 | |
dc.subject.keyword | 字跡,辨識,中文字,點匹配,偏旁匹配,偏旁,偽造, | zh_TW |
dc.subject.keyword | handwriting,verification,Chinese word,point matching,word side,side matching,forge, | en |
dc.relation.page | 88 | |
dc.identifier.doi | 10.6342/NTU201902924 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2019-08-13 | |
dc.contributor.author-college | 電機資訊學院 | zh_TW |
dc.contributor.author-dept | 電信工程學研究所 | zh_TW |
Appears in Collections: | 電信工程學研究所 |
Files in This Item:
File | Size | Format | |
---|---|---|---|
ntu-108-1.pdf Restricted Access | 3.63 MB | Adobe PDF |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.