<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Chinese Handwritten writer identification based on Structure Features and extreme learning machine</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Jun Tan</string-name>
          <email>mcstj@mail.sysu.edu.cn</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>JianHuang Lai</string-name>
          <email>stsljh@mail.sysu.edu.cn</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Guangdong Province Key Laboratory of, Computational Science, Sun Yat-Sen University</institution>
          ,
          <addr-line>GuangZhou,PR China 510275</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>School of Information and, Science and Technology, Sun Yat-Sen University</institution>
          ,
          <addr-line>GuangZhou,PR China 510275</addr-line>
        </aff>
      </contrib-group>
      <abstract>
        <p>-In this paper,we propose a new approach for writer identification of Chinese handwritten.In our method, we deal with writer identification of Chinese handwritten using Chinese character structure features(CSF) and extreme learning machine(ELM).To extract the features embedded in Chinese handwriting characters, special structures have been explored according to the trait of Chinese handwriting characters,where 20 features are extracted from the structures, these features constitute patterns of writer handwriting. We also combine structure features with extreme learning machine (ELM) as a new scheme for writer recognition, ELM is single hidden layer feed forward networks (SLFN), which randomly chooses the input weights and analytically determines the output weights of SLFN. This algorithm learns much faster than traditional popular learning algorithms. Experimental results demonstrate CSF/ELM method can achieve better performance than other traditional schemes for writer identification.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>
        As one of the most important methods in the biometric
individual identification, writer identification has been widely
used in the fields of bank check, forensic, historic
document analysis, archaeology, identifying personality [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], many
approaches have been developed [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. According to the
different input methods, writer identification is commonly
classified into on-line and off-line.
      </p>
      <p>
        Compared with its on-line counterpart, off-line writer
identification is a rather challenging problem. Chinese characters are
ideo graphic in nature[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], Chinese characters can be expressed
in at least two common styles, such as in block or in cursive.In
block style, there is an average of 810 strokes. Meanwhile
there are more strokes in cursive style. According to [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ],
in Chinese characters, the complication structures are mostly
affected by multi stokes of each character. Additionally, as
shown in Fig.1, the stroke shapes and structures of Chinese
characters are quite different from those of other languages
such as English, which makes it more difficult to identify
Chinese handwriting [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. The approaches proposed for English
handwriting writer identification is no longer suitable for
the case of Chinese handwritings [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. In this paper, we
propose Chinese structure feature(CSF) as algorithm of feature
extraction and combine CSF with extreme learning machine
(ELM) as a new scheme for writer identification.
      </p>
      <p>The process of writer identification consists of three main
parts: preprocessing, feature extraction and identification (or
matching). The feature extraction and matching are the two
major topics in the literature of writer identification.</p>
      <p>
        Given a free style handwritten document, a preprocessing
is often required. Segmentation is an indispensable step in
preprocessing. Some methods have been proposed to segment
characters recently [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], we proposed a method for Chinese
character segmentation based on nonlinear clustering[
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>
        Handwriting features except CSF feature[
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] others such as
texture, edge, contour and character shape have been widely
studied recently. Several researchers [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] proposed to
take the handwriting as an image containing special texture,
and therefore regarded writer identification as the texture
identification. Among them, Zhu [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] adopted 2-D Gabor filtering
to extract the texture features, while Chen et al. [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] used the
Fourier transform. Xu and Ding[
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] proposed a
histogrambased feature to identify writer, called grid microstructure
feature which is extracted from the edge image of the scanned
images.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], we propose a method for extracting Chinese
structure features(CSF). Despite good performance, one serious
drawback is that, it only compare one by one sample using
algorithm of Similarity Matching, and it cannot classify
multisamples to different writer class. Several classifier methods
have been developed to overcome the problem.
      </p>
      <p>
        Once discriminant features have been extracted, they are
submitted to a classifier whose task is to identify writer that
they represent. The widely used classifiers at least include
Weighted Euclidean Distance(WED) classifier [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ],
Bayesian model,BP neural networks [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], likelihood ranking
[
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], SVM[
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. For matching singleton non-sequential
features such as texture, edge and contour, Weighted Euclidean
Distance (WED) has been shown to be effective by the
experiments. In [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], both Bayesian classifiers and neural networks
were used as the classifiers. Imdad [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] use Steered Hermite
Features to identify writer from a written document, and
the algorithm takes Support Vector Machine for training and
testing.
      </p>
      <p>
        The traditional algorithms for this issue such as
backpropagation (BP) need many iterative steps to calculate the
optimal values of the input weights and the output weights, so
their speeds are very slow in general. ELM [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] is an efficient
and practical learning mechanism for the single-hidden-layer
feed-forward neural networks. ELM[
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] can learn the input
weights and the output weights by directly calculating the
Moore−Penrose generalized inverse matrix of the hidden layer
output matrix of the neural network instead of using the
iterative steps. So, it is necessary to perform efficient features
extraction on the one hand, and to take steps to reduce the
training/testing time on the other hand[
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. ELM is an efficient
algorithm which tends to reach the smallest training error,
obtain smallest norm of weights, produce best generalization
performance, and runs faster than the iterative algorithms[
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
      </p>
      <p>The rest of the paper is organized as follows. In Sect. II,
we first briefly review algorithms of CSF feature extraction,
ELM is briefly explained in Sect.III. Our proposed scheme in
Sect.IV. We analyze the experimental results in Sect.V. Finally,
the conclusion is given in Sect. VI.</p>
    </sec>
    <sec id="sec-2">
      <title>II. CHINESE STRUCTURE FEATURES(CSF)</title>
      <p>Features are directly extracted from each single character.
Since the stroke shapes and structures of Chinese characters
are quite different from those of other languages such as
English, where the handwriting characteristics are embedded,
we propose to utilize the stroke shapes and structures for
handwriting identification.</p>
      <p>
        Through a number of experiments, we discover that the
discriminatory handwriting characteristics lie in the two
structures[
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. They are the bounding rectangle and a special
quadrilateral which we call TBLR quadrilateral, as shown in
Fig.2(a) and Fig.2(b) respectively.
      </p>
      <p>The following nine Chinese Structure features(CSF) are
obtained from the bounding rectangle as shown in Table I. F 1:
The ratio of the width to the height of the bounding rectangle
A; F 2; F 3: The relative horizontal and vertical positions of the
gravity center; F 4; F 5: The relative horizontal and vertical
gravity centers; F 6; F 7 : The distance between the gravity
center G1(x1; y1)and the geometric centerG2(x2; y2), and the
slope of the line connecting them; F 8: The ratio of the
foreground pixel number to the area of the bounding rectangle;
F 9: The stroke width property,where Pt is the binary pixel
Fig. 2: Two special structures of Chinese handwriting
character. (a) Bounding rectangle. (b) TBLR quadrilateral.
ith
1
2
3
until convergence, i.e., the change stops.</p>
      <p>Similarly, from the TBLR quadrilateral, we can obtain the
following seven CSF features as shown in Table II. F 10 : The
ratio of the area of the top half part Supto the area of the
whole quadrilateral S ; F 11 : The ratio of the area of the
left half part Slef t to S ; F 12 : The cosine of the angle of
the two diagonal lines,wherea and b are the direction vectors
of the two diagonal lines respectively. TheF 10; F 11; F 12
measure the global spatial structure of the character. F 13 : The
ratio of foreground pixel number Pinner within the T BLR
quadrilateral to the total foreground pixel number Ptotal . It
measures the global degree of stroke aggregation. F 14 : The
ratio of the Pinner to the area of the T BLR quadrilateral
ST BLR; F 15: The ratio of foreground pixel number of the
left half part Pleft within the T BLR quadrilateral to Ptotal;
F 16 : The ratio of foreground pixel number of the top half
part Ptop within the T BLR quadrilateral to Ptotal.</p>
      <p>Apart from the above sixteen features, we obtain another
four CSF features as follows:</p>
      <p>F 17 : The number of connected components. This feature
measures the joined-up writing habit. F 18 : The number
of hole within the character. F 19 : The number of stroke
segments. It can be obtained by deleting all crossing point of a
character, and the number is the total segment number. F 20 :
The ratio of the longest stroke segment to the second longest
stroke segment, where the stroke segments are obtained the
same as that of F 19 .</p>
    </sec>
    <sec id="sec-3">
      <title>III. EXTREME LEARNING MACHINE(ELM)</title>
      <p>For N arbitrary distinct samples (Xi; Ti), where Xi =
[xi1; xi2; : : : ; xin]T ∈ Rnand Ti = [ti1; ti2; : : : ; tim]T ∈ Rm,
standard SLFN withN^ hidden neurons and activation function
g(x) are mathematically modeled as follow:
^
N
∑ ig(Wi · Xj + bi) = Oj ; j = 1; 2; :::; N
i=1
where Wi = [wi1; wi2; :::; win]T is the weight vector
connecting the ith hidden neuron and the input neurons, i =
[ i1; i2; :::; im]T is the weight vector connecting the ith
hidden neuron and the output neurons, and bi is the threshold
of the ith hidden neuron. The numbers of input and output
neurons are represented using n and m respectively. Wi · Xj
denotes the inner product of Wi and Xj . The output neurons
are chosen linear in this experiment.</p>
      <p>The architecture of ELM classifier is shown in Fig.3. In the
training procedure, the SLFN with N^ hidden neurons with
activation function g(x) can approximate these N samples
with zero error means that ∑N^
i=1 ∥oj − tj ∥ = 0 i.e., there
exist i; Wiand bi such that
^
N
∑ ig(Wi · Xj + bi) = tj ; j = 1; 2; :::; N
i=1
The above N equations can be written compactly as:
H</p>
      <p>= T
where</p>
      <p>H(W1; :::; WN^ ; b1; :::; bN^ ; X1; :::; XN )
 g(W1 · X1 + b1)
.
.
.</p>
      <p>:::
.
.
.</p>
      <p>g(WN^ · X1 + b ^ ) </p>
      <p>N
.
.
.
= 



g(W1 · XN + b1) ::: g(WN^ · XN + b ^ ) N N^
N
(5)
 1T 
=  ... </p>
      <p>T
N^ N^ m</p>
      <p>t1T 
and T =  ... 
tTN N m
(2)
(3)
(4)
(6)</p>
      <p>
        Fig. 3: The structure of Extreme Learning Machine classifier.
H is called the hidden layer output matrix of the neural
network; the ith column of H is the ith hidden neuron’s output
vector with respect to inputs X1; X2; : : : ; XN [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>If the number of hidden neurons is equal to the number of
distinct training samples,i.e.N^ = N , matrix H is square and
invertible, and SLFN can approximate these training samples
with zero error. However, in most cases the number of hidden
neurons is much less than the number of distinct training
samples, N^ ≪ N , so H is a non square matrix and there
may not exist Wi; bi; i(i = 1; : : : ; N^ ) such that H = T .
Thus, one may need to find specific W^i; b^i; ^i(i = 1; : : : ; N )
such that
∥H(W^1; : : : ; W^ N^ ; b^1; : : : ; ^bN^ ) ^ − T∥
=</p>
      <p>min ∥H(W1; : : : ; WN^ ; b1; : : : ; bN^ )
Wi;bi; i
− T∥ (7)
the smallest norm least squares solution of the above linear
system is:
^ = HyT
(8)</p>
      <p>Algorithm ELM: Given a training set ℵ =
(xi; ti)|xi ∈ Rn; ti ∈ Rm; i = 1; : : : ; N ; activation function
g(x) and hidden neuron number N^ ,</p>
      <p>Step 1: Assign arbitrary input weight wi and bias bi, i =
1; : : : ; N^</p>
      <p>Step 2: Calculate the hidden layer output matrix H.
Step 3: Calculate the output weight ^ by Eqs.(8),
where H and T are defined as Eqs. (5) and (6).</p>
    </sec>
    <sec id="sec-4">
      <title>IV. OUR SCHEME</title>
      <p>
        Some of the results in this paper were first presented
in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. In this paper, we present more technique details
effectiveness of CSF/ELM approach. Fig.4 demonstrate the
flowchart of the proposed approach. There are three main steps
for Chinese handwritten writer identification. The first step is
handwritten image preprocessing, which removes noises and
normalizes the images into the same size. The second step is
feature extraction, which finds effective representation of the
difference of writers in handwritten. Instead of using complex
feature extraction methods, we propose Chinese structure
features(CSF) for feature extraction. The last step is to apply
ELM learning method to classify different writers.
written by 200 writers respectively. Fig.5 and Fig.6 shows
some samples of the databases.
      </p>
      <p>For example, the entire process of CSF/ELM-based
handwritten writer recognition is as follows:</p>
      <p>Step 1: The appropriate training strategy based on the
selected training set, we randomly selected from a
handwritten database as part of the training set T rainSet =
Si; i = 1; :::; N; where N is the total of training samples,
and the remaining samples as the test set;
Step 2: Image pre-processing for training set, through the
noise removal and standardization;
Step 3: CSF feature extraction method to extract the
optimal recognition feature vector, 20 features are
extracted from structures of Bounding Box and TBLR
quadrilateral;
Step 4: ELM train phase, using Algorithm ELM and Eqs.
(5)(6)(9), set the input weight parameters arbitrary wi
and bias bi,i = 1; : : : ; N^ randomly, get the hidden layer
output matrix H and the output weight , the model of
training has been trained, the training process is complete;
Step 5: ELM test phase. Testing the model parameters
obtained from the training model, and then we can obtain
the actual output through the test image by the Eqs. (3),
to identify the writer.</p>
      <p>V. EXPERIMENTS AND ANALYSIS
A. Handwritten Database</p>
      <p>
        To test the performance of the proposed method in the
writer identification, we do some experiments over 2 Chinese
handwritten databases: SYSU [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] and KAIST Hanja1 [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ].
Among them, SYSU database which was generated and
collected by ourselves as follows, 245 volunteers were asked to
sign his (or her) name and one of the others names twice,
and a correction of 950 Chinese characters are obtained. The
KAIST Hanja1 database contains 783 frequently used Chinese
characters, where each character consisting of 200 samples
      </p>
      <p>In experiment, because the features may have large
differences in value, in order to avoid large values of features to
submerge the contributions of the small value of features, all
samples were normalized between 0 and 1 before sending to
the learning algorithms as input.</p>
      <p>
        We compare the proposed method with three well-known
methods including the methods in[
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. Each of the
compared methods is well-adjusted/trained to generate the best
results. Both the recognition accuracy of writer identification
and average time cost are reported and compared.
      </p>
      <p>
        Furthermore, learning method is also an important problem.
We used learning methods(ELM,BP[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ],SVM[
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]) for testing,
and the average training time and the average test time is
calculated. The cost time of the experiments is shown in table
III. From the table, we can see that SVM[
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] and BP[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]
training times are relative much more than the ELM training
time,the average total time of ELM, SVM, BP are 1.3001,
31.395, 34.801 seconds respectively. Therefore, the method of
ELM has the highest speed.
      </p>
      <p>
        Finally, we compare our scheme with approaches [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ],
[
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]in the Chinese handwritten database Hanja and
SYSU. These approaches use different features and classifiers.
method[
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] using Gabor feature and WED classifier, GMSF
method[
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] using GMSF feature and Weighted Chi-square,
and Fourier feature and Mathematical expectations classifier
are for method[
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. In the comparison, Table IV gives the
Top-1, Top-5, Top-10 and Top-20 recognition accuracies of
the four methods. We show the recognition accuracies of the
algorithms on the handwritten database in Table IV. From the
table, we can see the accuracies of our method are higher
than the others. The lowest accuracy of method[
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] is 42.7%,
and our method has the similar accuracy of method[
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. It
is obvious that our method is more effective for identifying
writer in Chinese handwriting.
      </p>
    </sec>
    <sec id="sec-5">
      <title>VI. CONCLUSION</title>
      <p>
        In this paper, we list some results of the literatures. Gabor
and wavelet features[
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] used in the traditional methods of
Chinese writer identification are affected greatly by the
normalization and the arrangement of characters in texture blocks.
Differently, CSF feature uses original handwriting images and
tries to find out the writing structure of the writer in local
regions. The ELM is a classifier used to train a single hidden
layer neural network. From the experimental results. We can
see that, Table IV includes the performance of our method
and some other methods for Chinese writer identification.
The recognition accuracy of our method using the CSF/ELM
seems better than the existing methods for Chinese writer
identification. compared with traditional learning algorithm,
ELM has faster speed, better generalization performances. The
effectiveness of CSF/ELM for Chinese writer identification is
proved by the experiments.
      </p>
      <p>It is expectable that our approach can be used for
multilingual handwriting including western handwritings and arabic
number.</p>
    </sec>
    <sec id="sec-6">
      <title>ACKNOWLEDGMENT</title>
      <p>This work was supported by Guangdong Provincial
Government of China through the ”Computational Science Innovative
Research Team” program and Guangdong Province Key
Laboratory of Computational Science at the Sun Yat-sen University,
the Technology Program of GuangDong (2011B061300081).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>S.</given-names>
            <surname>Impedovo</surname>
          </string-name>
          and
          <string-name>
            <given-names>G.</given-names>
            <surname>Pirlo</surname>
          </string-name>
          .
          <article-title>Verification of handwritten signatures: an overview</article-title>
          .
          <source>In Image Analysis and Processing</source>
          ,
          <year>2007</year>
          .
          <source>ICIAP</source>
          <year>2007</year>
          . 14th International Conference on, pages
          <fpage>191</fpage>
          -
          <lpage>196</lpage>
          . IEEE,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Z.</given-names>
            <surname>He</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.Y.</given-names>
            <surname>Tang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>X.</given-names>
            <surname>You</surname>
          </string-name>
          .
          <article-title>A contourlet-based method for writer identification</article-title>
          .
          <source>In Systems, Man and Cybernetics</source>
          , 2005 IEEE International Conference on, volume
          <volume>1</volume>
          , pages
          <fpage>364</fpage>
          -
          <lpage>368</lpage>
          . IEEE,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M.</given-names>
            <surname>Bulacu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Schomaker</surname>
          </string-name>
          , and
          <string-name>
            <given-names>L.</given-names>
            <surname>Vuurpijl</surname>
          </string-name>
          .
          <article-title>Writer identification using edge-based directional features</article-title>
          .
          <source>writer, 1:1</source>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>L.</given-names>
            <surname>Shan</surname>
          </string-name>
          .
          <article-title>Passport to chinese: 100 most commonly used chinese characters</article-title>
          ,
          <source>book 1</source>
          ,
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>F.H.</given-names>
            <surname>Cheng</surname>
          </string-name>
          <article-title>. Multi-stroke relaxation matching method for handwritten chinese character recognition</article-title>
          .
          <source>Pattern recognition</source>
          ,
          <volume>31</volume>
          (
          <issue>4</issue>
          ):
          <fpage>401</fpage>
          -
          <lpage>410</lpage>
          ,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Schlapbach</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Bunke</surname>
          </string-name>
          .
          <article-title>Off-line handwriting identification using hmm based recognizers</article-title>
          .
          <source>In Pattern Recognition</source>
          ,
          <year>2004</year>
          .
          <article-title>ICPR 2004</article-title>
          .
          <source>Proceedings of the 17th International Conference on</source>
          , volume
          <volume>2</volume>
          , pages
          <fpage>654</fpage>
          -
          <lpage>658</lpage>
          . IEEE,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>L.</given-names>
            <surname>Schomaker</surname>
          </string-name>
          and
          <string-name>
            <given-names>L.</given-names>
            <surname>Vuurpijl</surname>
          </string-name>
          .
          <article-title>Forensic writer identification: A benchmark data set and a comparison of two systems [internal report for the {</article-title>
          Netherlands Forensic Institute}].
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>L.Y.</given-names>
            <surname>Tseng</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.C.</given-names>
            <surname>Chen</surname>
          </string-name>
          .
          <article-title>Segmenting handwritten chinese characters based on heuristic merging of stroke bounding boxes and dynamic programming1</article-title>
          .
          <source>Pattern Recognition Letters</source>
          ,
          <volume>19</volume>
          (
          <issue>10</issue>
          ):
          <fpage>963</fpage>
          -
          <lpage>973</lpage>
          ,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>J.</given-names>
            <surname>Tan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.H.</given-names>
            <surname>Lai</surname>
          </string-name>
          , and C.D.;
          <string-name>
            <surname>Wang</surname>
          </string-name>
          .
          <article-title>A new handwritten character segmentation method based on nonlinear clustering</article-title>
          .
          <source>NEUROCOMPUTING</source>
          ,
          <volume>89</volume>
          (
          <issue>8</issue>
          ):
          <fpage>213</fpage>
          -
          <lpage>219</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>J.</given-names>
            <surname>Tan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.H.</given-names>
            <surname>Lai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.D.</given-names>
            <surname>Wang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.S.</given-names>
            <surname>Feng</surname>
          </string-name>
          .
          <article-title>A stroke shape and structure based approach for off-line chinese handwriting identification</article-title>
          .
          <source>International Journal of Intelligent Systems and Applications (IJISA)</source>
          ,
          <volume>3</volume>
          (
          <issue>2</issue>
          ):
          <fpage>1</fpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Tan</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          .
          <article-title>Biometric personal identification based on handwriting</article-title>
          .
          <source>In Pattern Recognition</source>
          ,
          <year>2000</year>
          . Proceedings. 15th International Conference on, volume
          <volume>2</volume>
          , pages
          <fpage>797</fpage>
          -
          <lpage>800</lpage>
          . IEEE,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>Q.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Deng</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Yuan</surname>
          </string-name>
          .
          <article-title>Handwriting identification based on constructing texture</article-title>
          .
          <source>In Intelligent Networks and Intelligent Systems</source>
          ,
          <year>2008</year>
          . ICINIS'
          <volume>08</volume>
          . First International Conference on, pages
          <fpage>523</fpage>
          -
          <lpage>526</lpage>
          . IEEE,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Lu</surname>
            <given-names>Xu</given-names>
          </string-name>
          , Xiaoqing Ding, Liangrui Peng, and
          <string-name>
            <given-names>Xin</given-names>
            <surname>Li</surname>
          </string-name>
          .
          <article-title>An improved method based on weighted grid micro-structure feature for text-independent writer recognition</article-title>
          .
          <source>In Document Analysis and Recognition (ICDAR)</source>
          , 2011 International Conference on, pages
          <fpage>638</fpage>
          -
          <lpage>642</lpage>
          . IEEE,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>G.</given-names>
            <surname>Zhu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zheng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Doermann</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Jaeger</surname>
          </string-name>
          .
          <article-title>Signature detection and matching for document image retrieval</article-title>
          .
          <source>Pattern Analysis and Machine Intelligence</source>
          , IEEE Transactions on,
          <volume>31</volume>
          (
          <issue>11</issue>
          ):
          <fpage>2015</fpage>
          -
          <lpage>2031</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>A.</given-names>
            <surname>Imdad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Bres</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Eglin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Emptoz</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Rivero-Moreno</surname>
          </string-name>
          .
          <article-title>Writer identification using steered hermite features and svm</article-title>
          .
          <source>In Document Analysis and Recognition</source>
          ,
          <year>2007</year>
          .
          <article-title>ICDAR 2007</article-title>
          . Ninth International Conference on, volume
          <volume>2</volume>
          , pages
          <fpage>839</fpage>
          -
          <lpage>843</lpage>
          . IEEE,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>G.B.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.Y.</given-names>
            <surname>Zhu</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.K.</given-names>
            <surname>Siew</surname>
          </string-name>
          .
          <article-title>Extreme learning machine: theory and applications</article-title>
          . Neurocomputing,
          <volume>70</volume>
          (
          <issue>1</issue>
          ):
          <fpage>489</fpage>
          -
          <lpage>501</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>N.Y.</given-names>
            <surname>Liang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.B.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Saratchandran</surname>
          </string-name>
          , and
          <string-name>
            <given-names>N.</given-names>
            <surname>Sundararajan</surname>
          </string-name>
          .
          <article-title>A fast and accurate online sequential learning algorithm for feedforward networks</article-title>
          .
          <source>Neural Networks</source>
          , IEEE Transactions on,
          <volume>17</volume>
          (
          <issue>6</issue>
          ):
          <fpage>1411</fpage>
          -
          <lpage>1423</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>X.Z.</given-names>
            <surname>Wang</surname>
          </string-name>
          and
          <string-name>
            <given-names>C.R.</given-names>
            <surname>Dong</surname>
          </string-name>
          .
          <article-title>Improving generalization of fuzzy if-then rules by maximizing fuzzy entropy</article-title>
          .
          <source>Fuzzy Systems</source>
          , IEEE Transactions on,
          <volume>17</volume>
          (
          <issue>3</issue>
          ):
          <fpage>556</fpage>
          -
          <lpage>567</lpage>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>G.B.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.H.</given-names>
            <surname>Wang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Lan</surname>
          </string-name>
          .
          <article-title>Extreme learning machines: a survey</article-title>
          .
          <source>International Journal of Machine Learning and Cybernetics</source>
          ,
          <volume>2</volume>
          (
          <issue>2</issue>
          ):
          <fpage>107</fpage>
          -
          <lpage>122</lpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>I.J.</given-names>
            <surname>Kim</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.H.</given-names>
            <surname>Kim</surname>
          </string-name>
          .
          <article-title>Statistical character structure modeling and its application to handwritten chinese character recognition</article-title>
          .
          <source>Pattern Analysis and Machine Intelligence</source>
          , IEEE Transactions on,
          <volume>25</volume>
          (
          <issue>11</issue>
          ):
          <fpage>1422</fpage>
          -
          <lpage>1436</lpage>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>