Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 6/2018

08.09.2017

Writer identification using intra-stroke and inter-stroke information for security enhancements in P2P systems

verfasst von: Jungpil Shin, Zhaofeng Liu, Cheol Min Kim, Hyung-Jin Mun

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 6/2018

Einloggen

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Chinese language has enormous number of characters and complicated stroke structures. So it is very difficult to efficiently and accurately identify a Chinese writer from his/her handwritings. This paper proposes a novel writer identification method for Chinese characters commonly used in Japan which can be used in peer-to-peer (P2P) systems. As a preliminary task, we have analyzed the shapes of strokes and the types of block division structures in Chinese characters and selected some characters for writer identification. The method consists of two efficient algorithms, i.e. the Hidden-feature analysis and the Block-type model, which respectively utilize intra-stroke and inter-stroke features of handwritings to enhance the writer identification accuracy. The Hidden-feature analysis makes template classes of reference characters with online features of training samples such as pen-pressure, pen-speed, pen-altitude, and pen-azimuth of each stroke. The Block-type model also creates such classes for writer identification based on offline features, i.e. the positional information about blocks of sample characters. The experimental results show that the Hidden-feature analysis requires eight Chinese characters while the Block-type model requires only four characters and four ones to achieve writer identification accuracy over 98%. Additionally, the results also demonstrate that any eight Chinese characters are enough to achieve an identification accuracy over 99.9% when the combination of the two algorithms is applied.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Han J (2015) Distributed hybrid P2P networking systems. Peer-to-Peer Networking Appl 8(4):555–556CrossRef Han J (2015) Distributed hybrid P2P networking systems. Peer-to-Peer Networking Appl 8(4):555–556CrossRef
2.
Zurück zum Zitat Jiang Q, Lu X, Tian Y (2015) An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Networking Appl 8(6):1070–1081CrossRef Jiang Q, Lu X, Tian Y (2015) An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Networking Appl 8(6):1070–1081CrossRef
3.
Zurück zum Zitat Mun H-J, Han K-H (2016) Blackhole attack: user identity and password seize attack using honeypot. J Comput Virology Hacking Tech 12(3):185–190CrossRef Mun H-J, Han K-H (2016) Blackhole attack: user identity and password seize attack using honeypot. J Comput Virology Hacking Tech 12(3):185–190CrossRef
5.
Zurück zum Zitat Yan Y, Chen C, Deng W, Yuan F (2009) Chinese handwriting identification based on stable spectral feature of texture images. Int J Intell Eng Syst 2(1):17–22CrossRef Yan Y, Chen C, Deng W, Yuan F (2009) Chinese handwriting identification based on stable spectral feature of texture images. Int J Intell Eng Syst 2(1):17–22CrossRef
6.
Zurück zum Zitat Abdi MN, Khemakhem M (2010) Off-line text-independent Arabic writer identification using contour-based features. Int J Signal Image Proc 1-2010(1):4–11 Abdi MN, Khemakhem M (2010) Off-line text-independent Arabic writer identification using contour-based features. Int J Signal Image Proc 1-2010(1):4–11
7.
Zurück zum Zitat Said H, Tan T, Baker K (2000) Personal identification based on handwriting. Pattern Recogn 33(1):149–160CrossRef Said H, Tan T, Baker K (2000) Personal identification based on handwriting. Pattern Recogn 33(1):149–160CrossRef
8.
Zurück zum Zitat Schomaker L, Bulacu M (2004) Automatic writer identification using connected-component contours and edge-based features of uppercase western script. IEEE Trans Pattern Anal Mach Intell 26(6):787–798CrossRef Schomaker L, Bulacu M (2004) Automatic writer identification using connected-component contours and edge-based features of uppercase western script. IEEE Trans Pattern Anal Mach Intell 26(6):787–798CrossRef
9.
Zurück zum Zitat Bensefia A, Paquet T, Heutte L (2005) A Writer Identification and Verification system. Pattern Recogn Lett 26(13):2080–2092CrossRefMATH Bensefia A, Paquet T, Heutte L (2005) A Writer Identification and Verification system. Pattern Recogn Lett 26(13):2080–2092CrossRefMATH
10.
Zurück zum Zitat Srihari SN, Cha S-H, Arora H, Lee S (2002) Individuality of handwriting. J Forensic Sci 47(4):1–17CrossRef Srihari SN, Cha S-H, Arora H, Lee S (2002) Individuality of handwriting. J Forensic Sci 47(4):1–17CrossRef
11.
Zurück zum Zitat E. Zois, Morphological waveform coding for writer identification. Electronics Laboratory, Physics Department, University of Patras, Greece, 33: 385–398, 2000 E. Zois, Morphological waveform coding for writer identification. Electronics Laboratory, Physics Department, University of Patras, Greece, 33: 385–398, 2000
12.
Zurück zum Zitat C. Tomai, B. Zhang, and S. Srihari, Discriminatory power of handwritten words for writer recognition. International conference pattern recognition (ICPR2004), NY, 2: 638–641, 2004 C. Tomai, B. Zhang, and S. Srihari, Discriminatory power of handwritten words for writer recognition. International conference pattern recognition (ICPR2004), NY, 2: 638–641, 2004
13.
Zurück zum Zitat Zhang B, Srihari S, Lee S (2003) Individuality of handwritten characters. Seventh international conference on document analysis and recognition (ICDAR), pp 1086-1090 Zhang B, Srihari S, Lee S (2003) Individuality of handwritten characters. Seventh international conference on document analysis and recognition (ICDAR), pp 1086-1090
14.
Zurück zum Zitat Soma A, Mizutani K, Arai M (2014) Writer identification for offline handwritten kanji characters using multiple features. Int J Inf Electron Eng 4(5):331–335 Soma A, Mizutani K, Arai M (2014) Writer identification for offline handwritten kanji characters using multiple features. Int J Inf Electron Eng 4(5):331–335
15.
Zurück zum Zitat Siewkeng C, Yonghaur T, Christian V (2007) Online text independent writer identification using character prototypes distribution. 6th international conference on information, Communications & Signal Processing, Utar, Malaysia, pp 1–5, 10–13 Siewkeng C, Yonghaur T, Christian V (2007) Online text independent writer identification using character prototypes distribution. 6th international conference on information, Communications & Signal Processing, Utar, Malaysia, pp 1–5, 10–13
16.
Zurück zum Zitat Schlapbach A, Liwicki M, Bunke H (2008) A Writer Identification System for on-line whiteboard data. Pattern Recogn 41(7):2381–2397CrossRefMATH Schlapbach A, Liwicki M, Bunke H (2008) A Writer Identification System for on-line whiteboard data. Pattern Recogn 41(7):2381–2397CrossRefMATH
17.
Zurück zum Zitat Li B, Sun Z, Tan T (2009) Hierarchical Shape Primitive Features for Online Text-Independent Writer Identification. 10th International Conference on Document Analysis and Recognition, ICDAR 2009, Barcelona, Spain, pp 986–990, 26–29 Li B, Sun Z, Tan T (2009) Hierarchical Shape Primitive Features for Online Text-Independent Writer Identification. 10th International Conference on Document Analysis and Recognition, ICDAR 2009, Barcelona, Spain, pp 986–990, 26–29
18.
Zurück zum Zitat Yang W, Jin L, Liu M (2015) Chinese character-level writer identification using path signature feature, DropStroke and deep CNN. 13th international conference on document analysis and recognition (ICDAR), Nancy, France, pp 546–550, 23–26 Yang W, Jin L, Liu M (2015) Chinese character-level writer identification using path signature feature, DropStroke and deep CNN. 13th international conference on document analysis and recognition (ICDAR), Nancy, France, pp 546–550, 23–26
19.
Zurück zum Zitat Long Z, Yunhong W, Tieniu T (2002) Personal handwriting identification based on PCA. Proceedings of the SPIE second international conference on image and graphics, pp 766–771 Long Z, Yunhong W, Tieniu T (2002) Personal handwriting identification based on PCA. Proceedings of the SPIE second international conference on image and graphics, pp 766–771
20.
Zurück zum Zitat Matsuura T, Thumwarin P, Kato N (2008) On-line writer identification based on handwriting velocity and curvature of script. 23rd international conference on image and vision computing, New Zealand, pp 192–197, 26–28 Matsuura T, Thumwarin P, Kato N (2008) On-line writer identification based on handwriting velocity and curvature of script. 23rd international conference on image and vision computing, New Zealand, pp 192–197, 26–28
21.
Zurück zum Zitat Shin J, Liu Z (2015) Writer identification method using inter and intra-stroke information. The fifth international conference on advanced communications and computation (Infocomp2015), pp 80-83, June 21-26, Brussels, Belgium Shin J, Liu Z (2015) Writer identification method using inter and intra-stroke information. The fifth international conference on advanced communications and computation (Infocomp2015), pp 80-83, June 21-26, Brussels, Belgium
Metadaten
Titel
Writer identification using intra-stroke and inter-stroke information for security enhancements in P2P systems
verfasst von
Jungpil Shin
Zhaofeng Liu
Cheol Min Kim
Hyung-Jin Mun
Publikationsdatum
08.09.2017
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 6/2018
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-017-0606-0

Weitere Artikel der Ausgabe 6/2018

Peer-to-Peer Networking and Applications 6/2018 Zur Ausgabe