##plugins.themes.academic_pro.article.main##
Abstract
Forensics document Examiner examines handwritten documents. The proposed system examines document using graphology science which generate a profile report of a person through handwritten text. The proposed system is a pattern recognition system for the organization which is involved in handwriting analysis and Cyber Crime Investigation. FODEX is designed to provide online facilities to the Users who want to verify their handwriting. This enhances the graphology to the next level where users can be across the globe. More specifically, FODEX is designed to provide a user interface which will facilitate easy of analyzing the handwriting samples. The system accepts scanned input image of handwriting and processes it using image processing algorithms and extract features from the image. These features are compared against a standard data set to generate a report about the sample submitted by the person later the generated report is either emailed or printed for the user accordingly. FODEX processes image and extracts features through various processed such as gray scale, threshold detection, RGB splitting, thinning, segmentation, scaling.Â
Â
Keywords: Image Processing, Handwriting Analysis, Forensic Document Examiner##plugins.themes.academic_pro.article.details##
References
2. Boribalburephan and Boonnatee Sakboonyarat , “An Algorithm Development for Handwritten Character Recognition by Personal Handwriting Identity Analysis [PHIA]â€, Knowledge and Smart Technology(KST),2012 TH International Conference, Pages 6-10.
3. Champa H N,K R Ananda Kumar, “Automated Human Behavior Prediction through Handwriting Analysisâ€, Procedings in integrated intelligent computing(ICIIC),2010 FIRST INTERNATIONAL CONFERENCE,PAGES 160-165, 2010.
4. Champa H N, Dr. K R AnandaKumar “Artificial Neural Network for Human Behavior Prediction through Handwriting Analysisâ€, International Journal of Computer Applications (0975 – 8887) Volume 2 – No.2, May 2010
5. S. N. Srihari, H. Srinivasan and K. Desai, "Questioned Document Examination using CEDAR-FOX,"Journal of Forensic Document Examination, 18, 2007, pp. 1-20
6. A. Srihari, S. Cha, H. Arora, S. Lee, “Individuality of Handwriting: A Validity Studyâ€,Proc. ICDAR‟01, Seattle (USA), pp 106-109, 2001.
7. Nobuyuki Otsu (1979). "A threshold selection method from gray-level histograms". IEEE Trans. Sys., Man., Cyber. 9 (1): 62 66
8. M. Sezgin and B. Sankur (2004). "Survey over image thresholding techniques and quantitative performance evaluation". Journal of Electronic Imaging 13 (1): 146–165.
9. L. Lam, S.W. Lee and C.Y. Suen, “Thinning Methodologies –A Comprehensive Surveyâ€, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 14, No. 9, Sept. 1992, pp. 869-885
10. Siew Hock Ow, Kean Siang Teh and Li Yi Yee, “An Overview on the Use of Graphology as a Tool for Career Guidanceâ€,CMU. Journal (2005) Vol. 4(1)