scispace - formally typeset
Search or ask a question
Author

Ching Y. Suen

Bio: Ching Y. Suen is an academic researcher from Concordia University. The author has contributed to research in topics: Handwriting recognition & Feature extraction. The author has an hindex of 65, co-authored 511 publications receiving 23594 citations. Previous affiliations of Ching Y. Suen include École de technologie supérieure & Concordia University Wisconsin.


Papers
More filters
Proceedings ArticleDOI
18 Sep 2011
TL;DR: A novel adaptive binarization algorithm using ternary entropy-based approach is proposed and Experimental results show that the proposed algorithm outperforms other state-of-the-art methods.
Abstract: A vast number of historical and badly degraded document images can be found in libraries, public, and national archives. Due to the complex nature of different artifacts, such poor quality documents are hard to read and to process. In this paper, a novel adaptive binarization algorithm using ternary entropy-based approach is proposed. Given an input image, the contrast of intensity is first estimated by a grayscale morphological closing operator. A double-threshold is generated by our Shannon entropy-based ternarizing method to classify pixels into text, near-text, and non-text regions. The pixels in the second region are relabeled by the local mean and the standard deviation. Our proposed method classifies noise into two categories which are processed by binary morphological operators, shrink and swell filters, and graph searching strategy. The method is tested with three databases that have been used in the Document Image Binarization Contest 2009 (DIBCO 2009), the Handwriting Document Image Binarization Contest 2010 (H-DBCIO 2010), and the International Conference on Frontier in Handwriting Recognition 2010 (ICFHR 2010). The evaluation is based upon nine distinct measures. Experimental results show that our proposed algorithm outperforms other state-of-the-art methods.

29 citations

Proceedings ArticleDOI
01 Sep 2001
TL;DR: A word segmentation method for handwritten Korean text lines that uses gap information to separate a text line into word units, where the gap is defined as a white-run obtained after a vertical projection of the line image.
Abstract: We propose a word segmentation method for handwritten Korean text lines. It uses gap information to separate a text line into word units, where the gap is defined as a white-run obtained after a vertical projection of the line image. Each gap is classified into a between-word gap or a within-word gap using a clustering technique. We take up three gap metrics - the bounding box (BB), run-length/Euclidean (RLE) and convex hull (CH) distances - which are known to have superior performance in Roman-style word segmentation, and three clustering techniques - the average linkage method, the modified MAX method and sequential clustering. An experiment with 498 text-line images extracted from live mail pieces has shown that the best performance is obtained by the sequential clustering technique using all three gap metrics.

29 citations

Journal ArticleDOI
TL;DR: A variational model is proposed to apply to localize the iris region belonging to given shape space using active contour method, a geometric shape prior, and the Mumford–Shah functional, which is robust against noise, poor localization and weak iris/sclera boundaries.
Abstract: Most state-of-the-art iris recognition algorithms claim to perform with a very high recognition accuracy in a strictly controlled environment. However, their recognition accuracies significantly decrease when the acquired images are affected by different noise factors including motion blur, camera diffusion, head movement, gaze direction, camera angle, reflections, contrast, luminosity, eyelid and eyelash occlusions, and problems due to contraction and dilation. The novelty of this research effort is that we propose to apply a variational model to localize the iris region belonging to given shape space using active contour method, a geometric shape prior, and the Mumford–Shah functional. This variational model is robust against noise, poor localization and weak iris/sclera boundaries. Furthermore, we apply the Modified Contribution-Selection Algorithm (MCSA) for iris feature ranking based on the Multi-Perturbation Shapley Analysis (MSA), a framework which relies on cooperative game theory to estimate the effectiveness of the features iteratively and select them accordingly, using either forward selection or backward elimination approaches. The verification and identification performance of the proposed scheme is validated using the ICE 2005, the UBIRIS Version 1, the CASIA Version 3 Interval, and WVU Nonideal datasets.

29 citations

Book
01 Mar 1986
TL;DR: This book presents 6,321 of the most commonly used Chinese words in two orderings: one in descending frequency, and the other in phonetic groups according to Suen's new phonetic system.
Abstract: Following the rapid growth of powerful computer hardware and sophisticated software, Chinese computing and data processing has become a very exciting field. This book presents 6,321 of the most commonly used Chinese words in two orderings: one in descending frequency, and the other in phonetic groups according to Suen's new phonetic system. Extracted from a corpus of over forty thousand Chinese words, these most frequently used words cover 90% of almost one million word samples selected from various sources like popular newspapers, novels and various reading materials.The data presented in this book are of the most fundamental importance in the design and construction of word processors and computers for processing Chinese text and data, investigation of lexicographical and phonological matters. Linguists, computer scientists, psychologists, students, teachers, and specialists of the Chinese language, as well as sinologists and scholars in computational studies of Chinese words and sounds should find this book very informative and interesting.

29 citations

Proceedings ArticleDOI
03 Sep 2000
TL;DR: A methodology of combining HMM (hidden Markov model) and MLP (multilayer perceptron) for cursive word recognition is presented and a new probability measure for the hybrid classifier as well as conventional combining schemes are introduced.
Abstract: A methodology of combining HMM (hidden Markov model) and MLP (multilayer perceptron) for cursive word recognition is presented in this paper. We have designed an explicit segmentation based HMM, and combined it with an implicit segmentation based MLP using weighting coefficients. The main idea of this methodology is that more distinct classifiers can better complement each other. We also introduced a new probability measure for the hybrid classifier as well as conventional combining schemes. Experiments were conducted with month word and legal word databases of CENPARMI and improved performances of 87.3% for 21 month word classes and 92.2% for 32 legal word classes have been achieved.

29 citations


Cited by
More filters
Journal ArticleDOI
01 Jan 1998
TL;DR: In this article, a graph transformer network (GTN) is proposed for handwritten character recognition, which can be used to synthesize a complex decision surface that can classify high-dimensional patterns, such as handwritten characters.
Abstract: Multilayer neural networks trained with the back-propagation algorithm constitute the best example of a successful gradient based learning technique. Given an appropriate network architecture, gradient-based learning algorithms can be used to synthesize a complex decision surface that can classify high-dimensional patterns, such as handwritten characters, with minimal preprocessing. This paper reviews various methods applied to handwritten character recognition and compares them on a standard handwritten digit recognition task. Convolutional neural networks, which are specifically designed to deal with the variability of 2D shapes, are shown to outperform all other techniques. Real-life document recognition systems are composed of multiple modules including field extraction, segmentation recognition, and language modeling. A new learning paradigm, called graph transformer networks (GTN), allows such multimodule systems to be trained globally using gradient-based methods so as to minimize an overall performance measure. Two systems for online handwriting recognition are described. Experiments demonstrate the advantage of global training, and the flexibility of graph transformer networks. A graph transformer network for reading a bank cheque is also described. It uses convolutional neural network character recognizers combined with global training techniques to provide record accuracy on business and personal cheques. It is deployed commercially and reads several million cheques per day.

42,067 citations

Journal ArticleDOI
TL;DR: Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis.
Abstract: Machine Learning is the study of methods for programming computers to learn. Computers are applied to a wide range of tasks, and for most of these it is relatively easy for programmers to design and implement the necessary software. However, there are many tasks for which this is difficult or impossible. These can be divided into four general categories. First, there are problems for which there exist no human experts. For example, in modern automated manufacturing facilities, there is a need to predict machine failures before they occur by analyzing sensor readings. Because the machines are new, there are no human experts who can be interviewed by a programmer to provide the knowledge necessary to build a computer system. A machine learning system can study recorded data and subsequent machine failures and learn prediction rules. Second, there are problems where human experts exist, but where they are unable to explain their expertise. This is the case in many perceptual tasks, such as speech recognition, hand-writing recognition, and natural language understanding. Virtually all humans exhibit expert-level abilities on these tasks, but none of them can describe the detailed steps that they follow as they perform them. Fortunately, humans can provide machines with examples of the inputs and correct outputs for these tasks, so machine learning algorithms can learn to map the inputs to the outputs. Third, there are problems where phenomena are changing rapidly. In finance, for example, people would like to predict the future behavior of the stock market, of consumer purchases, or of exchange rates. These behaviors change frequently, so that even if a programmer could construct a good predictive computer program, it would need to be rewritten frequently. A learning program can relieve the programmer of this burden by constantly modifying and tuning a set of learned prediction rules. Fourth, there are applications that need to be customized for each computer user separately. Consider, for example, a program to filter unwanted electronic mail messages. Different users will need different filters. It is unreasonable to expect each user to program his or her own rules, and it is infeasible to provide every user with a software engineer to keep the rules up-to-date. A machine learning system can learn which mail messages the user rejects and maintain the filtering rules automatically. Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis. Statistics focuses on understanding the phenomena that have generated the data, often with the goal of testing different hypotheses about those phenomena. Data mining seeks to find patterns in the data that are understandable by people. Psychological studies of human learning aspire to understand the mechanisms underlying the various learning behaviors exhibited by people (concept learning, skill acquisition, strategy change, etc.).

13,246 citations

Journal ArticleDOI
TL;DR: The objective of this review paper is to summarize and compare some of the well-known methods used in various stages of a pattern recognition system and identify research topics and applications which are at the forefront of this exciting and challenging field.
Abstract: The primary goal of pattern recognition is supervised or unsupervised classification. Among the various frameworks in which pattern recognition has been traditionally formulated, the statistical approach has been most intensively studied and used in practice. More recently, neural network techniques and methods imported from statistical learning theory have been receiving increasing attention. The design of a recognition system requires careful attention to the following issues: definition of pattern classes, sensing environment, pattern representation, feature extraction and selection, cluster analysis, classifier design and learning, selection of training and test samples, and performance evaluation. In spite of almost 50 years of research and development in this field, the general problem of recognizing complex patterns with arbitrary orientation, location, and scale remains unsolved. New and emerging applications, such as data mining, web searching, retrieval of multimedia data, face recognition, and cursive handwriting recognition, require robust and efficient pattern recognition techniques. The objective of this review paper is to summarize and compare some of the well-known methods used in various stages of a pattern recognition system and identify research topics and applications which are at the forefront of this exciting and challenging field.

6,527 citations

Journal ArticleDOI
TL;DR: A common theoretical framework for combining classifiers which use distinct pattern representations is developed and it is shown that many existing schemes can be considered as special cases of compound classification where all the pattern representations are used jointly to make a decision.
Abstract: We develop a common theoretical framework for combining classifiers which use distinct pattern representations and show that many existing schemes can be considered as special cases of compound classification where all the pattern representations are used jointly to make a decision. An experimental comparison of various classifier combination schemes demonstrates that the combination rule developed under the most restrictive assumptions-the sum rule-outperforms other classifier combinations schemes. A sensitivity analysis of the various schemes to estimation errors is carried out to show that this finding can be justified theoretically.

5,670 citations

Book
01 Jan 1996
TL;DR: Professor Ripley brings together two crucial ideas in pattern recognition; statistical methods and machine learning via neural networks in this self-contained account.
Abstract: From the Publisher: Pattern recognition has long been studied in relation to many different (and mainly unrelated) applications, such as remote sensing, computer vision, space research, and medical imaging. In this book Professor Ripley brings together two crucial ideas in pattern recognition; statistical methods and machine learning via neural networks. Unifying principles are brought to the fore, and the author gives an overview of the state of the subject. Many examples are included to illustrate real problems in pattern recognition and how to overcome them.This is a self-contained account, ideal both as an introduction for non-specialists readers, and also as a handbook for the more expert reader.

5,632 citations