{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T07:52:24Z","timestamp":1722585144389},"reference-count":43,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2015,10,15]],"date-time":"2015-10-15T00:00:00Z","timestamp":1444867200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100004052","name":"King Abdullah University of Science and Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004052","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Computer Graphics Forum"],"published-print":{"date-parts":[[2016,9]]},"abstract":"Abstract<\/jats:title>Are simple strokes unique to the artist or designer who renders them? If so, can this idea be used to identify authorship or to classify artistic drawings? Also, could training methods be devised to develop particular styles? To answer these questions, we propose the Stroke Authorship Recognition (SAR) approach, a novel method that distinguishes the authorship of 2D digitized drawings. SAR converts a drawing into a histogram of stroke attributes that is discriminative of authorship. We provide extensive classification experiments on a large variety of data sets, which validate SAR's ability to distinguish unique authorship of artists and designers. We also demonstrate the usefulness of SAR in several applications including the detection of fraudulent sketches, the training and monitoring of artists in learning a particular new style and the first quantitative way to measure the quality of automatic sketch synthesis tools.<\/jats:p>","DOI":"10.1111\/cgf.12733","type":"journal-article","created":{"date-parts":[[2015,10,15]],"date-time":"2015-10-15T15:25:49Z","timestamp":1444922749000},"page":"73-86","update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["SAR: Stroke Authorship Recognition"],"prefix":"10.1111","volume":"35","author":[{"given":"Sara","family":"Shaheen","sequence":"first","affiliation":[{"name":"King Abdullah University of Science and Technology (KAUST) Thuwal Saudi Arabia"}]},{"given":"Alyn","family":"Rockwood","sequence":"additional","affiliation":[{"name":"King Abdullah University of Science and Technology (KAUST) Thuwal Saudi Arabia"}]},{"given":"Bernard","family":"Ghanem","sequence":"additional","affiliation":[{"name":"King Abdullah University of Science and Technology (KAUST) Thuwal Saudi Arabia"}]}],"member":"311","published-online":{"date-parts":[[2015,10,15]]},"reference":[{"key":"e_1_2_10_2_1","doi-asserted-by":"publisher","DOI":"10.1093\/brain\/105.2.331"},{"key":"e_1_2_10_3_1","unstructured":"[ADO10]\u00a0ADOBE:Illustrator."},{"key":"e_1_2_10_4_1","unstructured":"[BBM05]\u00a0BergA. BergT. MalikJ.:Shape matching and object recognition using low distortion correspondences. InProceedings of CVPR(2005) vol. 1 IEEE pp.26\u201333."},{"key":"e_1_2_10_5_1","unstructured":"[BMP01]\u00a0BelongieS. MalikJ. PuzichaJ.:Matching shapes. InProceedings of ICCV(2001) IEEE vol. 1 pp.454\u2013461."},{"key":"e_1_2_10_6_1","unstructured":"[Bou14]\u00a0BoureauY.\u2010L.:Learning Hierarchical Feature Extractors for Image Recognition. PhD thesis New York University 2014."},{"key":"e_1_2_10_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2461912.2461964"},{"key":"e_1_2_10_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1360612.1360687"},{"key":"e_1_2_10_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185520.2185540"},{"key":"e_1_2_10_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2010.266"},{"key":"e_1_2_10_11_1","doi-asserted-by":"publisher","DOI":"10.1523\/JNEUROSCI.05-07-01688.1985"},{"key":"e_1_2_10_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/PL00013565"},{"key":"e_1_2_10_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/588272.588277"},{"key":"e_1_2_10_14_1","first-page":"3865","article-title":"A new algorithm on graphical user authentication (GUA) based on multi\u2010line grids","author":"Gani A.","year":"2010","journal-title":"Scientific Research and Essays"},{"key":"e_1_2_10_15_1","doi-asserted-by":"crossref","unstructured":"[GM07]\u00a0GovindarajuluN. S. MadhvanathS.:Password management using doodles. InICMI(2007).","DOI":"10.1145\/1322192.1322233"},{"key":"e_1_2_10_16_1","volume-title":"Results of an observational study on sketching","author":"Grimm C.","year":"2011"},{"key":"e_1_2_10_17_1","unstructured":"[HOCS02]\u00a0HertzmannA. OliverN. CurlessB. SeitzS. M.:Curve analogies. InProceedings of Rendering Techniques(2002) pp.233\u2013246."},{"key":"e_1_2_10_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cviu.2011.02.006"},{"key":"e_1_2_10_19_1","first-page":"817","article-title":"Automatic signature verification: The state of the art","author":"Impedovo D.","year":"2008","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics"},{"key":"e_1_2_10_20_1","unstructured":"[JHY03]\u00a0JinR. HauptmannA. YanR.:Image classification using a bigram model. InProceedings of AAAI Spring Symposium on Intelligent Multimedia Knowledge Management(2003)."},{"key":"e_1_2_10_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.574797"},{"key":"e_1_2_10_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2012.10.011"},{"key":"e_1_2_10_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2012.160"},{"key":"e_1_2_10_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2077341.2077342"},{"key":"e_1_2_10_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2461912.2462016"},{"key":"e_1_2_10_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/01431160600746456"},{"key":"e_1_2_10_27_1","first-page":"46:1","article-title":"Helpinghand: Example\u2010based stroke stylization","author":"Lu J.","year":"2012","journal-title":"ACM Transactions on Graphics"},{"key":"e_1_2_10_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2008.2005597"},{"key":"e_1_2_10_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.149591"},{"key":"e_1_2_10_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2011.01.008"},{"key":"e_1_2_10_31_1","first-page":"459","article-title":"Spatial control of arm movements","volume":"29","author":"Morasso P.","year":"1981","journal-title":"Experimental Brain Research"},{"key":"e_1_2_10_32_1","first-page":"4","article-title":"Topology\u2010driven vectorization of clean line drawings","author":"Noris G.","year":"2013","journal-title":"ACM Transactions on Graphics"},{"key":"e_1_2_10_33_1","unstructured":"[NSS*13]\u00a0NorrisG. SykoraD. ShamirA. CorosS. HornungA. SumnerR. SimmonsM. WhitedB. GrossM.:Smart scribbles for sketch segmentation Sept. 19 2013. US Patent App. 13\/424 083."},{"key":"e_1_2_10_34_1","unstructured":"[OKX*08]\u00a0OkaM. KatoK. XuY. LiangL. WenF.:Scribble\u2010a\u2010secret: Similarity\u2010based password authentication using sketches. InProceedigs of ICPR(2008) IEEE pp.1\u20134."},{"key":"e_1_2_10_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2008.04.001"},{"key":"e_1_2_10_36_1","unstructured":"[SL03]\u00a0SrihariS. N. LeedhamG.:A survey of computer methods in forensic document examination. pp.278\u2013281"},{"key":"e_1_2_10_37_1","doi-asserted-by":"crossref","unstructured":"[SMGE11]\u00a0ShrivastavaA. MalisiewiczT. GuptaA. EfrosA. A.:Data\u2010driven visual similarity for cross\u2010domain image matching. InProceedings of ACM SIGGRAPH(2011).","DOI":"10.1145\/2024156.2024188"},{"key":"e_1_2_10_38_1","unstructured":"[SS04]\u00a0SrihariS. ShiZ.:Forensic handwritten document retrieval system. InProceedings of International Workshop on Document Image Analysis for Libraries(2004) IEEE pp.188\u2013194."},{"key":"e_1_2_10_39_1","doi-asserted-by":"crossref","unstructured":"[SWZZ12]\u00a0SunZ. WangC. ZhangL. ZhangL.:Sketch2tag: Automatic hand\u2010drawn sketch recognition. InProceedings of ACM MM(2012).","DOI":"10.1145\/2393347.2396429"},{"key":"e_1_2_10_40_1","doi-asserted-by":"crossref","unstructured":"[SZ03]\u00a0SivicJ. ZissermanA.:Video Google: A text retrieval approach to object matching in videos. InProceedings of ICCV(2003).","DOI":"10.1109\/ICCV.2003.1238663"},{"key":"e_1_2_10_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/34.103273"},{"issue":"2","key":"e_1_2_10_42_1","first-page":"88","article-title":"Face recognition: A literature review","volume":"2","author":"Tolba A.","year":"2006","journal-title":"International Journal of Signal Processing"},{"key":"e_1_2_10_43_1","unstructured":"[VKR04]\u00a0VarenhorstC. KleekM. RudolphL.:Passdoodles: A lightweight authentication method. Research Science Institute 2004."},{"key":"e_1_2_10_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.79"}],"container-title":["Computer Graphics Forum"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1111%2Fcgf.12733","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/cgf.12733","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,4]],"date-time":"2023-10-04T02:22:24Z","timestamp":1696386144000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/cgf.12733"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,15]]},"references-count":43,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2016,9]]}},"alternative-id":["10.1111\/cgf.12733"],"URL":"https:\/\/doi.org\/10.1111\/cgf.12733","archive":["Portico"],"relation":{},"ISSN":["0167-7055","1467-8659"],"issn-type":[{"value":"0167-7055","type":"print"},{"value":"1467-8659","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,10,15]]},"assertion":[{"value":"2015-10-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}