Paper
8 February 2015 A comparison of 1D and 2D LSTM architectures for the recognition of handwritten Arabic
Author Affiliations +
Proceedings Volume 9402, Document Recognition and Retrieval XXII; 94020H (2015) https://doi.org/10.1117/12.2075930
Event: SPIE/IS&T Electronic Imaging, 2015, San Francisco, California, United States
Abstract
In this paper, we present an Arabic handwriting recognition method based on recurrent neural network. We use the Long Short Term Memory (LSTM) architecture, that have proven successful in different printed and handwritten OCR tasks. Applications of LSTM for handwriting recognition employ the two-dimensional architecture to deal with the variations in both vertical and horizontal axis. However, we show that using a simple pre-processing step that normalizes the position and baseline of letters, we can make use of 1D LSTM, which is faster in learning and convergence, and yet achieve superior performance. In a series of experiments on IFN/ENIT database for Arabic handwriting recognition, we demonstrate that our proposed pipeline can outperform 2D LSTM networks. Furthermore, we provide comparisons with 1D LSTM networks trained with manually crafted features to show that the automatically learned features in a globally trained 1D LSTM network with our normalization step can even outperform such systems.
© (2015) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Mohammad Reza Yousefi, Mohammad Reza Soheili, Thomas M. Breuel, and Didier Stricker "A comparison of 1D and 2D LSTM architectures for the recognition of handwritten Arabic", Proc. SPIE 9402, Document Recognition and Retrieval XXII, 94020H (8 February 2015); https://doi.org/10.1117/12.2075930
Lens.org Logo
CITATIONS
Cited by 29 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Optical character recognition

Image segmentation

Feature extraction

Neural networks

Data hiding

Network architectures

Convolutional neural networks

Back to Top