The analysis of vulnerabilities and threats in biometrics-based personal authentication systems is indispensable for the development and promotion of wide spread utilization of bi...
A discriminant-based framework for automatic recognition of online handwriting data is presented in this paper. We identify the substrokes that are more useful in discriminating b...
Karteek Alahari, Satya Lahari Putrevu, C. V. Jawah...
This paper proposes a multi-signature document identification method that works robustly with lowresolution documents captured from handheld devices. The proposed method is based ...
This work addresses the problem of acquiring, indexing and retrieving slides in the context of automatic oral presentation processing. Since the most suitable acquisition techniqu...
N. Daddaoua, Jean-Marc Odobez, Alessandro Vinciare...
This paper presents two fast and robust algorithms for word skew and slant corrections based on Radon transform. For the skew correction, we maximize a global measure which is deļ...
Jian-xiong Dong, Dominique Ponson, Adam Krzyzak, C...