Handwriting Copybook Style Analysis Of Pseudo-Online Data Student and Faculty Research Day Mary L. Manfredi, Dr. Sung-Hyuk Cha, Dr. Charles Tappert, Dr.

Slides:



Advertisements
Similar presentations
Yinyin Yuan and Chang-Tsun Li Computer Science Department
Advertisements

ONLINE ARABIC HANDWRITING RECOGNITION By George Kour Supervised by Dr. Raid Saabne.
Writer identification through information retrieval Ralph Niels, Franc Grootjen & Louis Vuurpijl.
Handwriting Recognition for Genealogical Records Luke Hutchison FHT 2003.
1 Probabilistic Artificial Neural Network For Recognizing the Arabic Hand Written Characters Khalaf khatatneh, Ibrahiem El Emary,and Basem Al- Rifai Journal.
Computer Science Research for Family History and Genealogy David W. Embley Heath Nielson, Mike Rimer, Luke Hutchison, Ken Tubbs, Doug Kennard, Tom Finnigan.
The Statistics of Fingerprints A Matching Algorithm to be used in an Investigation into the Reliability of the Use of Fingerprints for Identification Bob.
HMM-BASED PATTERN DETECTION. Outline  Markov Process  Hidden Markov Models Elements Basic Problems Evaluation Optimization Training Implementation 2-D.
Forged Handwriting Detection Hung-Chun Chen M.S. Thesis in Computer Science Advisors: Drs. Cha and Tappert.
Keystroke Biometric Studies Security Research at Pace Keystroke Biometric Drs. Charles Tappert and Allen Stix Seidenberg School of CSIS.
PLT 2007 CSIS Shorthand Handwriting Recognition for Pen-Centric Interfaces Charles C. Tappert 1 and Jean R. Ward 2 1 School of CSIS, Pace University, New.
Keystroke Biometric Studies Assignment 2 – Review of the Literature Case Study – Keystroke Biometric Describe problem investigated (intro + abstract) Developed.
Emerging Information Technologies Dr. Charles C. Tappert Department of CSIS Pace University.
Keystroke Biometric Studies Keystroke Biometric Identification and Authentication on Long-Text Input Book chapter in Behavioral Biometrics for Human Identification.
Basic concepts of Data Mining, Clustering and Genetic Algorithms Tsai-Yang Jea Department of Computer Science and Engineering SUNY at Buffalo.
Data Mining on NIJ data Sangjik Lee. Unstructured Data Mining Text Keyword Extraction Structured Data Base Data Mining Image Feature Extraction Structured.
Online Handwriting Recognition, Pen Computing, and Shorthand Alphabets (with discussion of the Xerox v Palm patent infringement case on the Graffiti alphabet)
Robert S. Zack, Charles C. Tappert, and Sung-Hyuk Cha Pace University, New York Performance of a Long-Text-Input Keystroke Biometric Authentication System.
Hazırlayan NEURAL NETWORKS Radial Basis Function Networks I PROF. DR. YUSUF OYSAL.
Dynamic Time Warping Applications and Derivation
Computer-Based Animation. ● To animate something – to bring it to life ● Animation covers all changes that have visual effects – Positon (motion dynamic)
Radial-Basis Function Networks
Hazırlayan NEURAL NETWORKS Radial Basis Function Networks II PROF. DR. YUSUF OYSAL.
(Off-Line) Cursive Word Recognition Tal Steinherz Tel-Aviv University.
ONLINE HANDWRITTEN GURMUKHI SCRIPT RECOGNITION AND ITS CHALLENGES R. K. SHARMA THAPAR UNIVERSITY, PATIALA.
嵌入式視覺 Pattern Recognition for Embedded Vision Template matching Statistical / Structural Pattern Recognition Neural networks.
How to make a presentation (Oral and Poster) Dr. Bernard Chen Ph.D. University of Central Arkansas July 5 th Applied Research in Healthy Information.
Pattern Recognition: Baysian Decision Theory Charles Tappert Seidenberg School of CSIS, Pace University.
Chapter 15 Kendall/Hunt Publishing Company0 Handwriting.
Presented by Tienwei Tsai July, 2005
Ondrej Rohlik, Pavel Mautner, Vaclav Matousek, Juergen Kempf
Artificial Neural Nets and AI Connectionism Sub symbolic reasoning.
A Neural Network Classifier for Junk Ian Stuart, Sung-Hyuk Cha, and Charles Tappert CSIS Student/Faculty Research Day May 7, 2004.
1 CIS336 Website design, implementation and management (also Semester 2 of CIS219, CIS221 and IT226) Lecture 6 XSLT (Based on Møller and Schwartzbach,
BACKGROUND LEARNING AND LETTER DETECTION USING TEXTURE WITH PRINCIPAL COMPONENT ANALYSIS (PCA) CIS 601 PROJECT SUMIT BASU FALL 2004.
Loop Investigation for Cursive Handwriting Processing and Recognition By Tal Steinherz Advanced Seminar (Spring 05)
Data Mining Chapter 1 Introduction -- Basic Data Mining Tasks -- Related Concepts -- Data Mining Techniques.
Ralph Niels & Louis Vuurpijl Nijmegen Institute for Cognition and Information Radboud University Nijmegen The Netherlands.
Intelligent Vision Systems ENT 496 Object Shape Identification and Representation Hema C.R. Lecture 7.
Generalized Fuzzy Clustering Model with Fuzzy C-Means Hong Jiang Computer Science and Engineering, University of South Carolina, Columbia, SC 29208, US.
1 Multiple Classifier Based on Fuzzy C-Means for a Flower Image Retrieval Keita Fukuda, Tetsuya Takiguchi, Yasuo Ariki Graduate School of Engineering,
Hidden Markov Models in Keystroke Dynamics Md Liakat Ali, John V. Monaco, and Charles C. Tappert Seidenberg School of CSIS, Pace University, White Plains,
22CS 338: Graphical User Interfaces. Dario Salvucci, Drexel University. Lecture 10: Advanced Input.
DOCUMENT AND HANDWRITING ANALYSIS. DOCUMENTS AS EVIDENCE Document specialists are called to : Verify handwriting and signatures Authenticate documents.
© S. Cha8/8/2002CSIS Automatic Detection of Handwriting forgery Dr. Sung-Hyuk Cha & Dr. Charlies C. Tappert School of Computer Science & Information Systems.
Handwriting Recognition for Genealogical Records
WHAT IS DATA MINING?  The process of automatically extracting useful information from large amounts of data.  Uses traditional data analysis techniques.
Preliminary Transformations Presented By: -Mona Saudagar Under Guidance of: - Prof. S. V. Jain Multi Oriented Text Recognition In Digital Images.
WHAT IS DATA MINING?  The process of automatically extracting useful information from large amounts of data.  Uses traditional data analysis techniques.
Handwriting Recognition
IEEE AI - BASED POWER SYSTEM TRANSIENT SECURITY ASSESSMENT Dr. Hossam Talaat Dept. of Electrical Power & Machines Faculty of Engineering - Ain Shams.
Arabic Handwriting Recognition Thomas Taylor. Roadmap  Introduction to Handwriting Recognition  Introduction to Arabic Language  Challenges of Recognition.
Neural Networks Lecture 4 out of 4. Practical Considerations Input Architecture Output.
1 A Statistical Matching Method in Wavelet Domain for Handwritten Character Recognition Presented by Te-Wei Chiang July, 2005.
By: Shane Serafin.  What is handwriting recognition  History  Different types  Uses  Advantages  Disadvantages  Conclusion  Questions  Sources.
Clustering [Idea only, Chapter 10.1, 10.2, 10.4].
Optical Character Recognition
Handwriting Comparison
Data Mining, Neural Network and Genetic Programming
Handwriting Vector Quantizer
Online Handwriting Recognition
Forged Handwriting Detection
Face Recognition and Detection Using Eigenfaces
Target 4-2 Handwriting Analysis.
Handwriting Analysis Like Fingerprints, every person’s handwriting is unique and personalized Handwriting is difficult to disguise or forge Questioned.
DATA MINING Introductory and Advanced Topics Part II - Clustering
network of simple neuron-like computing elements
Handwritten Characters Recognition Based on an HMM Model
Department of Computer Science Ben-Gurion University of the Negev
Automatic Handwriting Generation
Presentation transcript:

Handwriting Copybook Style Analysis Of Pseudo-Online Data Student and Faculty Research Day Mary L. Manfredi, Dr. Sung-Hyuk Cha, Dr. Charles Tappert, Dr. Sungsoo Yoon May 6, 2005

Sample of Copybook Style

Common Forensic Problem – Determine Writer of Questioned Document: e.g., Ransom Note

Feasibility Study that might help in the writer identification process Reduce the suspect population of the writer of a questioned document Identify the Copybook Style of a questioned document Use cluster analysis to reveal similarities among copybook styles

I/O Sample Input Output Copybook style = usa2

Many Techniques Used for Writer Identification (Online and Offline) Fragmented Connected-Component Contours Hidden Markov Methods Neural Networks Gray Level Distribution Fractal Analysis Directional Element Features and Linear Transform All techniques have pros and limitations More accurate ways always being sought

Offline versus Online Data Offline data are usually scanned images and only have static information Online uses special equipment (e.g., tablet digitizers, pen computers) to also capture the dynamic information (stroke number, order, direction, pressure, velocity etc..) as a person writes

Pseudo-Online Data Taking offline data and tracing it using a mouse or pen-enabled tablet to give it dynamic characteristics.

Offline Feature extraction 3 (left)8 (middle)8 (right) 3 (left) (middle) (right)54610 Distances between characters using Template Matching

Pseudo-Online Feature extraction 3 (left)8 (middle)8 (right) 3 (left) (middle) (right)1980 Distances between characters using SDSS (stroke direction sequence strings)

Stroke Directions

DB Creation Obtain various Roman copybook styles both cursive and manuscript Scan in each letter Apply normalization procedures to the letters Trace each letter with either a mouse or pen-enabled tablet and capture its dynamic characteristics

Methodology for processing a questioned document Determine Copybook Style Trace each letter of interest from a questioned document Match each letter against each of the corresponding letters in the DB. The letter with the smallest distance is the matched copybook style

Questioned Document

Distance Matrix (try to determine the questioned document style )

Further analysis of Copybook Styles Clustering It is the unsupervised organization of patterns into groups so that the patterns in the same group are more similar to each other than to patterns in other groups Bring most similar letters together based on certain characteristics (here it is distance) We take each letter in the copybook style DB and calculate the distance between all others of the same letter (compare all uppercase As against all other uppercase As )

Partial Distance Matrix for Cluster Analysis

Dendrogram of Uppercase As

Clusters Resulting from the Uppercase A copybook style

Summary Feasibility study for a new approach to help writer identification by narrowing the suspect population by determining the copybook style of a questioned document Cluster analysis of the copybook styles Will it help ? More work necessary to determine this

Future Work Do a more extensive analysis of the copybook styles. This would include adding more copybook styles to the DB, producing and naming the resulting clusters and producing various copybook style classifications. Get input from document examiners as to the possible value of this work