Computer Science ›› 2015, Vol. 42 ›› Issue (7): 300-304.doi: 10.11896/j.issn.1002-137X.2015.07.064

Previous Articles     Next Articles

Study on High Compact Recognition Method for Continuously Overlaid Chinese Handwriting

SU Tong-hua, DAI Hong-liang, ZHANG Jian, MA Pei-jun and DENG Sheng-chun   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Continuous Chinese handwriting recognition is the primary bottleneck for Chinese handwritten character input method.Naturally and quickly inputting Chinese text is the fundamental goal to the pattern recognition field even to the artificial intelligence.A novel recognition method was proposed for overlaid Chinese handwriting.It follows a segmentation-recognition integrated framework.Firstly,an over-segmentation algorithm is used to partition the handwriting trajectory.Then a perceptron algorithm is developed to locate the candidate character boundaries.Finally,multiple contexts including character recognition score,geometrical score and linguistic score,are utilized to decode the optimal recognition path.To match different mobile terminals,an appealing compression algorithm was proposed to make the character classifier compact,which reduces the storage consumption both in memory fingerprint and disk storage.The principled method is successfully ported to Android platform,enabling overlaid Chinese handwriting to be input on smart phones and further tested on large overlaid Chinese handwriting samples.Experimental results verify the effectiveness and efficiency of the method.It also works smoothly on smart phone,whose overlapped handwriting input function makes handwriting input remarkably efficient.

Key words: Pattern recognition,Overlaid Chinese handwriting,Stroke classification,Classifier compression,Beam search

[1] Shimodaira H,Sudo T,Nakai M,et al.On-line Overlaid-Handwriting Recognition Based on Substroke HMMs[C]∥Seventh International Conference on Document Analysis and Recognition.Washington DC:IEEE,2003:1043-1047
[2] Wan Xiang,Liu Chang-song,Zou Yan-ming.On-line ChineseCharacter Recognition System for Overlapping Samples[C]∥2011 International Conference on Document Analysis and Re-cognition.Washington DC:IEEE,2011:799-803
[3] Zou Yan-ming,Liu Ying-fei,Liu Ying,et al.Overlapped handwriting input on mobile phones[C]∥2011 International Confe-rence on Document Analysis and Recognition.Washington DC:IEEE,2011:369-373
[4] Wang Qiu-feng,Yin Fei,Liu Cheng-lin.Handwritten ChineseText Recognition by Integrating Multiple Contexts[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2012,34(8):1469-1481
[5] Yin Fei,Wang Da-han,Wang Qiu-feng.CASIA Online and Offline Chinese Handwriting Databases[C]∥2011 International Conference on Document Analysis and Recognition.Washington DC:IEEE,2011:37-41
[6] Wang Da-han,Liu Cheng-lin,Zhou Xiang-dong.An approach for real-time recognition of online Chinese handwritten sentences[J].Pattern Recognition,2012,45(10):3661-3675
[7] Liu Cheng-lin.Classifier Combination Based on ConfidenceTransformation[J].Pattern Recognition,2005,38(1):11-28
[8] Teng Long,Jin Lian-wen.Building compact MQDF classifier for large character set recognition by subspace distribution sharing[J].Pattern Recognition,2008,41(9):2916-2925
[9] Wang Yong-qiang,Huo Qiang.Building compact recognizers of handwritten Chinese characters using precision constrained Gaussian model,minimum classification error training and parameter compression[J].International Journal on Document Analysis and Recognition,2011,14(3):255-262
[10] 杨军.聚类分析及其在大类别汉字识别中的应用 [D].广州:华南理工大学,2007 Yang Jun.Application of the Clustering Analysis in the Large vocabulary Chinese Character Recognition[D].Guangzhou:South China University of Technology ,2007

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .