<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">First International Workshop on Automated Forensic Handwriting Analysis (AFHA) 2011</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
				<date type="published" when="2011-09-18">18 September 2011</date>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<affiliation key="aff0">
								<address>
									<settlement>Beijing</settlement>
									<country key="CN">China</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">First International Workshop on Automated Forensic Handwriting Analysis (AFHA) 2011</title>
					</analytic>
					<monogr>
						<imprint>
							<date type="published" when="2011-09-18">18 September 2011</date>
						</imprint>
					</monogr>
					<idno type="MD5">BAC70CC994DB2083361A67CC7E0899DF</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-23T20:55+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract/>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>PREFACE</head><p>Handwriting is considered as a representative of human behavior and characteristics since centuries. With the evolution of modern computing technologies, researchers have moved towards the automated analysis of handwriting. The shift towards automated analysis of handwriting has even fortified by the interest various industries have in this field. One of the most important applications of automated handwriting analysis systems is in forensic environments. Up till now, most of the forensic cases of handwriting analysis are solved without actual application of automated systems. This is because there is an ever increasing gap between the demands of Forensic Handwriting Experts (FHEs) and the computer science community. Actually the underlying issue is the incapability of most of the state of the art handwriting examination systems to be directly applicable to the forensic cases. This is because the computer science community in general has moved by considering the cases which are either trivial w.r.t. forensic situations or not considered the needs of FHEs. Thus there is a great demand to bring the forensic experts and the computer science experts under one roof. This purpose is fulfilled by the First International Workshop and Tutorial on Automated Forensic Handwriting Analysis (AFHA) 2011.</p><p>The AFHA 2011 takes place on 17-18 September 2011, in Beijing, China. It is a novel approach of bringing together researchers in the field of automated handwriting analysis and signature verification and experts from the forensic handwriting examination community. It is organized as a two-day combined workshop and tutorial.</p><p>On the first day, an introductory tutorial on forensic handwriting examination is given. This includes a description of the forensics point of view and examples of real casework as well as a summary of important approaches in the area of automated handwriting examination. The major topics include: how forensic experts make comparisons (similarities versus differences, subjectivity and bias), natural variation, line quality, quality versus quantity; what forensic experts need from the document analysis community; what the document analysis community needs to understand about FHEs work; existing systems and system problems; Quite some attention will be paid to the Bayesian approach to forensic evidence evaluation (i.e. using the Likelihood Ratios a measure of the strength of evidence), and reporting by means of a verbal conclusion scale.</p><p>On the second day, the AFHA workshop is organized. This volume contains the proceedings of AFHA workshop. Nine submissions were received and after a single-blind-peer review process, eight papers were accepted for this volume.</p><p>In particular, the paper entitled 'Non-English and Non-Latin Signature Verification Systems: A Survey' is the first one in this volume as it provides a detailed survey of the field.</p><p>The second paper entitled 'The Effect of Training Data Selection and Sampling Time Intervals on Signature Verification' considers the influence of various methods of training data selection and effect of data collection time intervals on the overall results of a signature verification system.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>The third paper entitled 'Classification of Features into Strong and Weak Features for an</head><p>Intelligent Online Signature Verification System' outlines an efficient algorithm for classification of features for a signature verification system and provides improved results than some counterparts.</p><p>The fourth paper entitled 'Forensic vs. Computing Writing Features as Seen by Rex, the Intuitive Document Retriever' describes the superficial matching between script features as understood by forensic experts and computer scientists and advocates the development of computational instruments tailored to fit the features traditionally used by FHEs.</p><p>The fifth paper entitled 'Automated Off-Line Writer Verification Using Short Sentences and Grid Features' presents a feature extraction algorithm modeling the connected component distribution along predetermined curvature and line paths of a handwritten image.</p><p>The sixth paper entitled 'Evaluation of Local and Global Features for Offline Signature Verification' compares local and global features It shows that the system based on local features outperforms the system based on global features particularly in situations involving disguised signatures.</p><p>The seventh paper entitled 'Static Signature Verification by Optical Flow Analysis' estimates local stability of signatures and performs signature verification using alternating decision trees exclusively by optical flow analysis.</p><p>Finally, the eighth paper entitled 'A Co-training based Framework for Writer Identification in Offline Handwriting' proposes a co-training approach that overcomes the requirements of automated signature verification systems to have a large corpus of labeled dataset.</p><p>We would like to thank the authors for their paper submission, our program committee members for their reviews and active participation in various activities concerning tutorial and workshop, and the AFHA 2011 workshop chairs for their advice and guidance throughout the entire endeavor. We would also like to thank our sponsors: Signature &amp; Handwriting Forensics Pty. Ltd., Netherlands Forensic Institute and German Research Center for Artificial Intelligence.</p><p>The AFHA 2011 PC-chairs, September 2011.</p></div>		</body>
		<back>
			<div type="annex">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Committees</head></div>			</div>
			<div type="references">

				<listBibl/>
			</div>
		</back>
	</text>
</TEI>
