Ondrej Rohlik, Pavel Mautner, Vaclav Matousek, Juergen Kempf

Slides:



Advertisements
Similar presentations
1 Gesture recognition Using HMMs and size functions.
Advertisements

1 Chapter 3 Input Devices. 2 Overview of the Input Process.
Cognitive Systems, ICANN panel, Q1 What is machine intelligence, as beyond pattern matching, classification and prediction. What is machine intelligence,
Lecture 16 Hidden Markov Models. HMM Until now we only considered IID data. Some data are of sequential nature, i.e. have correlations have time. Example:
Speech Recognition Part 3 Back end processing. Speech recognition simplified block diagram Speech Capture Speech Capture Feature Extraction Feature Extraction.
Fusion of HMM’s Likelihood and Viterbi Path for On-line Signature Verification Bao Ly Van - Sonia Garcia Salicetti - Bernadette Dorizzi Institut National.
1 Probabilistic Artificial Neural Network For Recognizing the Arabic Hand Written Characters Khalaf khatatneh, Ibrahiem El Emary,and Basem Al- Rifai Journal.
Chapter 15 Probabilistic Reasoning over Time. Chapter 15, Sections 1-5 Outline Time and uncertainty Inference: ltering, prediction, smoothing Hidden Markov.
GMM-Based Multimodal Biometric Verification Yannis Stylianou Yannis Pantazis Felipe Calderero Pedro Larroy François Severin Sascha Schimke Rolando Bonal.
Hidden Markov Models Adapted from Dr Catherine Sweeney-Reed’s slides.
Hidden Markov Models Theory By Johan Walters (SR 2003)
Lecture 15 Hidden Markov Models Dr. Jianjun Hu mleg.cse.sc.edu/edu/csce833 CSCE833 Machine Learning University of South Carolina Department of Computer.
Feature Vector Selection and Use With Hidden Markov Models to Identify Frequency-Modulated Bioacoustic Signals Amidst Noise T. Scott Brandes IEEE Transactions.
HMM-BASED PATTERN DETECTION. Outline  Markov Process  Hidden Markov Models Elements Basic Problems Evaluation Optimization Training Implementation 2-D.
1 Hidden Markov Model Instructor : Saeed Shiry  CHAPTER 13 ETHEM ALPAYDIN © The MIT Press, 2004.
1 Security problems of your keyboard –Authentication based on key strokes –Compromising emanations consist of electrical, mechanical, or acoustical –Supply.
Dynamic Time Warping Applications and Derivation
INPUT DEVICES. KEYBOARD Most common input device for a computer.
Case Studies Dr Lee Nung Kion Faculty of Cognitive Sciences and Human Development UNIVERSITI MALAYSIA SARAWAK.
ETHEM ALPAYDIN © The MIT Press, Lecture Slides for.
Handwriting Copybook Style Analysis Of Pseudo-Online Data Student and Faculty Research Day Mary L. Manfredi, Dr. Sung-Hyuk Cha, Dr. Charles Tappert, Dr.
Advanced Signal Processing 2, SE Professor Horst Cerjak, Andrea Sereinig Graz, Basics of Hidden Markov Models Basics of HMM-based.
1 7-Speech Recognition (Cont’d) HMM Calculating Approaches Neural Components Three Basic HMM Problems Viterbi Algorithm State Duration Modeling Training.
7-Speech Recognition Speech Recognition Concepts
Jan Tichava – presenting author Ondřej Rohlík Jan Pikl Department of Computer Science and.
HMM - Basics.
Minimum Mean Squared Error Time Series Classification Using an Echo State Network Prediction Model Mark Skowronski and John Harris Computational Neuro-Engineering.
Compiled By: Raj G Tiwari.  A pattern is an object, process or event that can be given a name.  A pattern class (or category) is a set of patterns sharing.
Lecture 10: 8/6/1435 Machine Learning Lecturer/ Kawther Abas 363CS – Artificial Intelligence.
Online Arabic Handwriting Recognition Fadi Biadsy Jihad El-Sana Nizar Habash Abdul-Rahman Daud Done byPresented by KFUPM Information & Computer Science.
A New Approach to Signature Verification: Digital Data Acquisition Pen Ondřej Rohlík Department of Computer Science and Engineering University.
Signature with Text-Dependent and Text-Independent Speech for Robust Identity Verification B. Ly-Van*, R. Blouet**, S. Renouard** S. Garcia-Salicetti*,
Sequence Models With slides by me, Joshua Goodman, Fei Xia.
Jun-Won Suh Intelligent Electronic Systems Human and Systems Engineering Department of Electrical and Computer Engineering Speaker Verification System.
22CS 338: Graphical User Interfaces. Dario Salvucci, Drexel University. Lecture 10: Advanced Input.
CS774. Markov Random Field : Theory and Application Lecture 19 Kyomin Jung KAIST Nov
Feature Vector Selection and Use With Hidden Markov Models to Identify Frequency-Modulated Bioacoustic Signals Amidst Noise T. Scott Brandes IEEE Transactions.
ECE 8443 – Pattern Recognition ECE 8423 – Adaptive Signal Processing Objectives: ML and Simple Regression Bias of the ML Estimate Variance of the ML Estimate.
ECE 8443 – Pattern Recognition ECE 8527 – Introduction to Machine Learning and Pattern Recognition Objectives: Reestimation Equations Continuous Distributions.
Robotic Chapter 8. Artificial IntelligenceChapter 72 Robotic 1) Robotics is the intelligent connection of perception action. 2) A robotic is anything.
CHAPTER 8 DISCRIMINATIVE CLASSIFIERS HIDDEN MARKOV MODELS.
Speech Communication Lab, State University of New York at Binghamton Dimensionality Reduction Methods for HMM Phonetic Recognition Hongbing Hu, Stephen.
Experimental Results Abstract Fingerspelling is widely used for education and communication among signers. We propose a new static fingerspelling recognition.
Speech Recognition with CMU Sphinx Srikar Nadipally Hareesh Lingareddy.
Feature Selection and Weighting using Genetic Algorithm for Off-line Character Recognition Systems Faten Hussein Presented by The University of British.
1 Robotic Chapter AI & ESChapter 7 Robotic 2 Robotic 1) Robotics is the intelligent connection of perception action. 2) A robotic is anything.
Section 2B. Objectives List two reasons why some people prefer alternative methods of input over a standard keyboard or mouse. List three categories of.
EEL 6586: AUTOMATIC SPEECH PROCESSING Hidden Markov Model Lecture Mark D. Skowronski Computational Neuro-Engineering Lab University of Florida March 31,
ECE 8443 – Pattern Recognition ECE 8527 – Introduction to Machine Learning and Pattern Recognition Objectives: Reestimation Equations Continuous Distributions.
Pattern Recognition NTUEE 高奕豪 2005/4/14. Outline Introduction Definition, Examples, Related Fields, System, and Design Approaches Bayesian, Hidden Markov.
A Hybrid Model of HMM and RBFN Model of Speech Recognition 길이만, 김수연, 김성호, 원윤정, 윤아림 한국과학기술원 응용수학전공.
Handwriting Recognition
Chapter 21 Robotic Perception and action Chapter 21 Robotic Perception and action Artificial Intelligence ดร. วิภาดา เวทย์ประสิทธิ์ ภาควิชาวิทยาการคอมพิวเตอร์
1 7-Speech Recognition Speech Recognition Concepts Speech Recognition Approaches Recognition Theories Bayse Rule Simple Language Model P(A|W) Network Types.
Basic Element of Electronics Data Processing Hardware Hardware Software Software Networking Networking Person involved in Computer Fields Person involved.
Arabic Handwriting Recognition Thomas Taylor. Roadmap  Introduction to Handwriting Recognition  Introduction to Arabic Language  Challenges of Recognition.
Neural networks (2) Reminder Avoiding overfitting Deep neural network Brief summary of supervised learning methods.
By: Shane Serafin.  What is handwriting recognition  History  Different types  Uses  Advantages  Disadvantages  Conclusion  Questions  Sources.
핵심어 검출을 위한 단일 끝점 DTW 알고리즘 Yong-Sun Choi and Soo-Young Lee
Artificial Intelligence for Speech Recognition
EEL 6586: AUTOMATIC SPEECH PROCESSING Hidden Markov Model Lecture
BTEC NCF Dip in Comp: Unit 01 Principles of Computer Science Lesson 01 – Computational Thinking Mr C Johnston.
Chapter 5 - Input.
Online Handwriting Recognition
Introduction to Computers
Online Arabic Handwriting Recognition
Handwritten Characters Recognition Based on an HMM Model
Introduction to Computers
The monitor shows information.
Presentation transcript:

Ondrej Rohlik, Pavel Mautner, Vaclav Matousek, Juergen Kempf HMM Based Handwritten Text Recognition Using Biometrical Data Acquisition Pen Ondrej Rohlik, Pavel Mautner, Vaclav Matousek, Juergen Kempf Department of Computer Science and Engineering University of West Bohemia in Pilsen

Outline Data acquisition device: The BiSP pen Handwritten text recognition Hidden Markov models Experimental results Future Work Ondrej Rohlik, IEEE CIRA 2003, Kobe, Japan

Input Devices – Overview off-line (static) scanners cameras* on-line (dynamic) electronic pens digitizers, tablets mouse* Ondrej Rohlik, IEEE CIRA 2003, Kobe, Japan

Input Device: The BiSP Pen Electronic pen* is used for data acquisition * built at University of Applied Sciences in Regensburg, Germany Ondrej Rohlik, IEEE CIRA 2003, Kobe, Japan

Input Device – Writing Ondrej Rohlik, IEEE CIRA 2003, Kobe, Japan

Input Device – Signals Ondrej Rohlik, IEEE CIRA 2003, Kobe, Japan

Handwritten Text Recognition Objective: To convert handwritten sentences or phrases in analog form (off-line or on-line sources) into digital form (ASCII or Unicode). isolated character recognition (TM, DTW, NN) word recognition (HMMs) gesture recognition Ondrej Rohlik, IEEE CIRA 2003, Kobe, Japan

Hanwritten Text hand printed characters spaced descrete characters cursive script words Ondrej Rohlik, IEEE CIRA 2003, Kobe, Japan

Primitive (observation) Signal Description Pairs of x and y signals are transformed into sequence of primitives Primitive (observation) Signal trend x y 1  2  3 4 Ondrej Rohlik, IEEE CIRA 2003, Kobe, Japan

Hidden Markov Models left-to-right model (used mostly in speech recognition) Ondrej Rohlik, IEEE CIRA 2003, Kobe, Japan

Hidden Markov Models Training – Baum-Welch algorithm Recognition – Backward algorithm Matrices that describes the model (A, B, ) are decomposed after the training – one model for each letter Ondrej Rohlik, IEEE CIRA 2003, Kobe, Japan

Word HMM Decomposition Ondrej Rohlik, IEEE CIRA 2003, Kobe, Japan

Word HMM Composition Ondrej Rohlik, IEEE CIRA 2003, Kobe, Japan

Experimental Results method have been tested on three independent data sets of various sizes limited number of letters used in our data sets: 15 reduced complexity of tagging the training set Vocabulary size 1649 2198 5129 Recognition rate (%) 88 90 82 Recognition time (min) 17-26 27-49 360 Ondrej Rohlik, IEEE CIRA 2003, Kobe, Japan

Future Work to speed up the algorithm to achieve real-time recognition incorporation of language models to improve the recognition rate special attention will be paid to signature analysis and signature verification application in tele-robotics and robot sensing  robot aided signature forging Ondrej Rohlik, IEEE CIRA 2003, Kobe, Japan

Forgeries – Overwiew a) genuine c) unskilled b) zero-effort d) skilled Ondrej Rohlik, IEEE CIRA 2003, Kobe, Japan

Example of Two Features Ondrej Rohlik, IEEE CIRA 2003, Kobe, Japan

Class Boundaries Ondrej Rohlik, IEEE CIRA 2003, Kobe, Japan

Signature Verification – Algorithms For each class C Training algorithm For each feature f For each pair of signatures Classes[C][i] and Classes[C][j] Compute the difference between Classes[C][i] and Classes[C][j] and add it to an extra variable Sum[f] Compute mean value mean[f] and variance var[f] of each feature over all pairs using the variable Sum[f] Compute critical cluster coefficient using variances var[f] and weights w[f] over all features f For class C to be verified Classification algorithm For each pattern Classes[c][i] For each feature f Compute the difference and remember the least one over all patterns Sum up products of least differences and weights w[f] and compare the sum with Critical cluster coefficient Ondrej Rohlik, IEEE CIRA 2003, Kobe, Japan