{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,19]],"date-time":"2024-08-19T17:06:15Z","timestamp":1724087175663},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2018,2,20]],"date-time":"2018-02-20T00:00:00Z","timestamp":1519084800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s12652-018-0707-5","type":"journal-article","created":{"date-parts":[[2018,2,20]],"date-time":"2018-02-20T05:10:12Z","timestamp":1519103412000},"page":"2955-2969","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["A novel character segmentation method for serial number on banknotes with complex background"],"prefix":"10.1007","volume":"10","author":[{"given":"Jingling","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Feng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jianrong","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Yun","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Huiqing","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,20]]},"reference":[{"issue":"1","key":"707_CR1","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1049\/iet-cps.2017.0010","volume":"2","author":"R Atat","year":"2017","unstructured":"Atat R, Liu L, Chen H, Wu J, Li H, Yi Y (2017) Enabling cyber-physical communication in 5g cellular networks: challenges, spatial spectrum sensing, and cyber-security. IET Cyber Phys Syst Theory Appl 2(1):49\u201354","journal-title":"IET Cyber Phys Syst Theory Appl"},{"issue":"8","key":"707_CR2","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1109\/TPAMI.2016.2608901","volume":"39","author":"X Chang","year":"2017","unstructured":"Chang X, Yu YL, Yang Y, Xing EP (2017) Semantic pooling for complex event analysis in untrimmed videos. IEEE Trans Pattern Anal Mach Intell 39(8):1617\u20131632","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"4","key":"707_CR3","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1049\/iet-ipr.2010.0078","volume":"6","author":"Q Chen","year":"2012","unstructured":"Chen Q, Zhao L, Lu J, Kuang G, Wang N, Jiang Y (2012) Modified two dimensional otsu image segmentation algorithm and fast realisation. IET Image Process 6(4):426\u2013433","journal-title":"IET Image Process"},{"key":"707_CR4","doi-asserted-by":"publisher","unstructured":"Feng BY, Ren M, Zhang XY, Suen CY (2013) Extraction of serial numbers on bank notes. In: International conference on document analysis and recognition. IEEE, pp 698\u2013702. https:\/\/doi.org\/10.1109\/ICDAR.2013.143","DOI":"10.1109\/ICDAR.2013.143"},{"key":"707_CR5","doi-asserted-by":"publisher","unstructured":"Hadjadj Z, Meziane A, Cherfa Y, Cheriet M, Setitra I (2016) Isauvola: Improved sauvolas algorithm for document image binarization. In: International conference image analysis and recognition. Springer, pp 737\u2013744. https:\/\/doi.org\/10.1007\/978-3-319-41501-7_82","DOI":"10.1007\/978-3-319-41501-7_82"},{"key":"707_CR6","first-page":"40","volume":"27","author":"L Huang","year":"2013","unstructured":"Huang L, Zhang J, Zhou Y, Tan F (2013) An improved image and text binarization algorithm based on non-uniform illumination. J Hunan Univ Technol 27:40\u201345","journal-title":"J Hunan Univ Technol"},{"key":"707_CR7","doi-asserted-by":"publisher","unstructured":"Kahraman F, Kurt B, Gkmen M (2009) License plate character segmentation based on the gabor transform and vector quantization. In: International symposium computer and information sciences. Springer, pp 381\u2013388. https:\/\/doi.org\/10.1007\/978-3-540-39737-3_48","DOI":"10.1007\/978-3-540-39737-3_48"},{"issue":"4","key":"707_CR9","first-page":"30","volume":"36","author":"F Li","year":"2015","unstructured":"Li F (2015) Extraction of near-infrared star target based on otsu algorithm. Infrared 36(4):30\u201333","journal-title":"Infrared"},{"issue":"2","key":"707_CR10","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1109\/TC.2013.208","volume":"64","author":"J Li","year":"2015","unstructured":"Li J, Li J, Chen X, Jia C, Lou W (2015) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64(2):425\u2013437","journal-title":"IEEE Trans Comput"},{"key":"707_CR11","doi-asserted-by":"publisher","unstructured":"Li J, Lu K, Zhu L, Li Z (2017a) Locality-constrained transfer coding for heterogeneous domain adaptation. In: Databases theory and applications: 28th Australasian database conference. Springer, pp 193\u2013204. https:\/\/doi.org\/10.1007\/978-3-319-68155-9_15","DOI":"10.1007\/978-3-319-68155-9_15"},{"key":"707_CR13","doi-asserted-by":"publisher","unstructured":"Li P, Li J, Huang Z, Li T, Gao Cz, Chen WB, Chen K (2017b) Privacy-preserving outsourced classification in cloud computing. Clust Comput (1):1\u201310. https:\/\/doi.org\/10.1007\/s10586-017-0849-9","DOI":"10.1007\/s10586-017-0849-9"},{"key":"707_CR14","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.future.2017.02.006","volume":"74","author":"P Li","year":"2017","unstructured":"Li P, Li J, Huang Z, Li T, Cz Gao, Yiu SM, Chen K (2017c) Multi-key privacy-preserving deep learning in cloud computing. Future Gener Comput Syst 74:76\u201385","journal-title":"Future Gener Comput Syst"},{"issue":"10","key":"707_CR15","doi-asserted-by":"publisher","first-page":"2100","DOI":"10.1109\/TKDE.2017.2728531","volume":"29","author":"Z Li","year":"2017","unstructured":"Li Z, Nie F, Chang X, Yang Y (2017d) Beyond trace ratio: Weighted harmonic mean of trace ratios for multiclass discriminant analysis. IEEE Trans Knowl Data Eng 29(10):2100\u20132110","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"707_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2017.08.007","volume":"72","author":"J Li","year":"2018","unstructured":"Li J, Zhang Y, Chen X, Xiang Y (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72:1\u201312","journal-title":"Comput Secur"},{"key":"707_CR16","doi-asserted-by":"crossref","unstructured":"Liu L, Zhu L, Li Z (2017) Learning robust graph hashing for efficient similarity search. In: Australasian Database Conference. Springer, pp 110\u2013122","DOI":"10.1007\/978-3-319-68155-9_9"},{"issue":"2","key":"707_CR17","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1109\/LSP.2003.821748","volume":"11","author":"H Lu","year":"2004","unstructured":"Lu H, Kot AC, Shi YQ (2004) Distance-reciprocal distortion measure for binary document images. IEEE Signal Process Lett 11(2):228\u2013231","journal-title":"IEEE Signal Process Lett"},{"key":"707_CR18","doi-asserted-by":"publisher","unstructured":"Madhuri LG (2012) An improved bernsen algorithm approaches for license plate recognition. IOSR J Electron Commun Eng 3(4):1\u20135. https:\/\/doi.org\/10.9790\/2834-0340105","DOI":"10.9790\/2834-0340105"},{"key":"707_CR19","doi-asserted-by":"publisher","unstructured":"Marwa A, Kamel Z, Khaled G, Salah Z (2016) New rules to enhance the performances of histogram projection for segmenting small-sized Arabic words. In: Hybrid intelligent systems, Advances in intelligent systems and computing\u201415th international conference HIS 2016 on hybrid intelligent systems. Springer, pp 167\u2013176. https:\/\/doi.org\/10.1007\/978-3-319-27221-4_14","DOI":"10.1007\/978-3-319-27221-4_14"},{"issue":"2","key":"707_CR20","doi-asserted-by":"publisher","first-page":"808","DOI":"10.1109\/TVLSI.2015.2415932","volume":"24","author":"MH Najafi","year":"2016","unstructured":"Najafi MH, Salehi ME (2016) A fast fault-tolerant architecture for sauvola local image thresholding algorithm using stochastic computing. IEEE Trans Very Large Scale Integr Syst 24(2):808\u2013812","journal-title":"IEEE Trans Very Large Scale Integr Syst"},{"key":"707_CR21","doi-asserted-by":"publisher","unstructured":"Pan YF, Liu CL (2010) Performance evaluation for text localization algorithms: an empirical study. In: Chinese conference on pattern recognition (CCPR2010). IEEE, pp 1\u20135. https:\/\/doi.org\/10.1109\/CCPR.2010.5659339","DOI":"10.1109\/CCPR.2010.5659339"},{"key":"707_CR22","doi-asserted-by":"publisher","unstructured":"Pratikakis I, Gatos B, Ntirogiannis K (2009) ICDAR 2009 document image binarization contest (DIBCO2009). In: International conference on document analysis and recognition. vol. 14. IEEE, pp 1375\u20131382. https:\/\/doi.org\/10.1109\/ICDAR.2009.246","DOI":"10.1109\/ICDAR.2009.246"},{"key":"707_CR23","doi-asserted-by":"publisher","unstructured":"Su B, Lu S, Tan CL (2010) Binarization of historical document images using the local maximum and minimum. In: IAPR International workshop on document analysis systems, DAS 2010. Boston, ACM, pp 159\u2013166. https:\/\/doi.org\/10.1145\/1815330.1815351","DOI":"10.1145\/1815330.1815351"},{"key":"707_CR24","unstructured":"Talab AMA, Huang Z, Wang J (2014) An enhanced bernsen algorithm approaches for vehicle logo detection. Int J Signal Process Image Process and Pattern Recogn 7:203\u2013210"},{"key":"707_CR8","unstructured":"Vala MHJ, Baxi A (2013) A review on otsu image segmentation algorithm. Int J Adv Res Comput Eng & Technol (IJARCET) 2(2):387\u2013389"},{"issue":"12","key":"707_CR25","doi-asserted-by":"publisher","first-page":"3193","DOI":"10.1007\/s00500-015-2003-z","volume":"21","author":"F Wang","year":"2017","unstructured":"Wang F, Zhang Y, Rao Q, Li K, Zhang H (2017) Exploring mutual information-based sentimental analysis with kernel-based extreme learning machine for stock prediction. Soft Comput 21(12):3193\u20133205","journal-title":"Soft Comput"},{"key":"707_CR26","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.ins.2018.01.027","volume":"436\u2013437","author":"F Wang","year":"2018","unstructured":"Wang F, Zhang H, Li K, Lin Z, Yang J, Shen XL (2018) A hybrid particle swarm optimization algorithm using adaptive learning strategy. Inf Sci 436\u2013437:162\u2013177","journal-title":"Inf Sci"},{"key":"707_CR27","doi-asserted-by":"publisher","unstructured":"Wolf C, Jolion JM, Chassaing F (2002) Text localization, enhancement and binarization in multimedia documents. In: Proceedings of the international conference on pattern recognition. vol\u00a02. IEEE, pp 1037\u20131040. https:\/\/doi.org\/10.1109\/ICPR.2002.1048482","DOI":"10.1109\/ICPR.2002.1048482"},{"key":"707_CR28","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1016\/j.asoc.2017.07.034","volume":"61","author":"H Wu","year":"2017","unstructured":"Wu H, Kuang L, Wang F, Rao Q, Gong M, Li Y (2017) A multiobjective box-covering algorithm for fractal modularity on complex networks. Appl Soft Comput 61:294\u2013313","journal-title":"Appl Soft Comput"},{"issue":"3","key":"707_CR29","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1109\/JSYST.2016.2550530","volume":"10","author":"J Wu","year":"2016","unstructured":"Wu J, Guo S, Li J, Zeng D (2016a) Big data meet green challenges: big data toward green applications. IEEE Syst J 10(3):888\u2013900","journal-title":"IEEE Syst J"},{"issue":"3","key":"707_CR30","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1109\/JSYST.2016.2550538","volume":"10","author":"J Wu","year":"2016","unstructured":"Wu J, Guo S, Li J, Zeng D (2016b) Big data meet green challenges: greening big data. IEEE Syst J 10(3):873\u2013887","journal-title":"IEEE Syst J"},{"issue":"1","key":"707_CR31","first-page":"112","volume":"43","author":"LS Wu","year":"2010","unstructured":"Wu LS, Chen JX, Li W (2010) Niblack-based binaryzation algorithm for palm vein image. Commun Technol 43(1):112\u2013114","journal-title":"Commun Technol"},{"key":"707_CR32","doi-asserted-by":"publisher","unstructured":"Xia H, Liao D (2011) The study of license plate character segmentation algorithm based on vetical projection. In: International conference on consumer electronics, communications and networks. IEEE, pp 4583\u20134586. https:\/\/doi.org\/10.1109\/CECNET.2011.5768714","DOI":"10.1109\/CECNET.2011.5768714"},{"key":"707_CR33","unstructured":"Zhang Q (2013) Research on the image recognition technology of the rmb serial number. Ph.D thesis, Nanjing University of Science and Technology"},{"key":"707_CR34","unstructured":"Zhang X (2007) Research on the identification method and application of bill character. Ph.D thesis, Huazhong University of Science and Technology"},{"key":"707_CR35","doi-asserted-by":"publisher","unstructured":"Zhang Y, Zhang C (2003) A new algorithm for character segmentation of license plate. In: Intelligent vehicles symposium. IEEE, pp 106\u2013109. https:\/\/doi.org\/10.1109\/IVS.2003.1212892","DOI":"10.1109\/IVS.2003.1212892"},{"issue":"4","key":"707_CR36","first-page":"1","volume":"9045","author":"M Zhou","year":"2013","unstructured":"Zhou M, Wu Z, Zhou Y (2013) An improved vein image segmentation algorithm based on slic and niblack threshold method. Proc SPIE Int Soc Opt Eng 9045(4):1\u201310","journal-title":"Proc SPIE Int Soc Opt Eng"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-018-0707-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-018-0707-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-018-0707-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,14]],"date-time":"2022-08-14T15:17:50Z","timestamp":1660490270000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-018-0707-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,20]]},"references-count":36,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["707"],"URL":"https:\/\/doi.org\/10.1007\/s12652-018-0707-5","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,20]]},"assertion":[{"value":"28 November 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 February 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 February 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}