2015 13th International Conference on Document Analysis and Recognition (ICDAR) 2015
DOI: 10.1109/icdar.2015.7333856
|View full text |Cite
|
Sign up to set email alerts
|

Use case visual Bag-of-Words techniques for camera based identity document classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(14 citation statements)
references
References 12 publications
0
13
0
1
Order By: Relevance
“…Research teams are forced to create and maintain their own datasets using their own resources. This can be easily observed by looking through the recent papers devoted to identity document analysis, for instance [16,2,24]. For some teams having access to such sensitive data is not a problem, especially if they are industry-oriented, already have a product related to identity document analysis, have government support and possess the required expertise in data security.…”
Section: Introductionmentioning
confidence: 99%
“…Research teams are forced to create and maintain their own datasets using their own resources. This can be easily observed by looking through the recent papers devoted to identity document analysis, for instance [16,2,24]. For some teams having access to such sensitive data is not a problem, especially if they are industry-oriented, already have a product related to identity document analysis, have government support and possess the required expertise in data security.…”
Section: Introductionmentioning
confidence: 99%
“…Local feature points, such as SIFT [21], are widely used as local features due to their description capabilities. Regarding the second step, image encoding, BOW were originally used to encode the feature point's distribution in a global image representation [12,16]. Fisher vectors and VLAD later showed improvement over the BOW [23,14].…”
Section: Previous Workmentioning
confidence: 99%
“…Moreover, in the last decade, the performance of mobile devices has been improved every year, allowing them to be able to capture an image, processing it and get results similar to those of a flatbed scanner (Chabchoub, Kessentini, Kanoun, Eglin, & Lebourgeois, 2016;de las Heras, Terrades, Llados, Fernandez-Mota, & Canero, 2015;Kaur & Garg, 2015;Sharma & Sharma, 2016). Features such as the size, mobility and ability to instantly capture images in an easy way, compared to a scanner, have made smartphones receive more attention in their use as a mobile scanner (Bai, Yin, & Liu, 2013;Jacobs, Simard, Viola, & Rinker, 2005;Sharma & Sharma, 2016).…”
Section: Research Contextmentioning
confidence: 99%
“…Usually, pictures taken by smartphone cameras are captured in natural scenes. Distortion of perspective, different styles of text and light sources that introduce shadows and reflections are some of the drawbacks present in the images captured in natural scenes that hinder the process of text recognition (Bai et al, 2013;de las Heras et al, 2015;Zhu & Zanibbi, 2016). Therefore, in order to efficiently segment the text of the rest of the objects, an integration of different DIP algorithms must be performed.…”
Section: Research Contextmentioning
confidence: 99%
See 1 more Smart Citation