Graphology based handwritten character analysis for human behaviour identification

被引:83
作者
Ghosh, Subhankar [1 ]
Shivakumara, Palaiahnakote [2 ]
Roy, Prasun [1 ]
Pal, Umapada [1 ]
Lu, Tong [3 ]
机构
[1] Indian Stat Inst, Kolkata 700108, India
[2] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur 50603, Malaysia
[3] Nanjing Univ, Natl Key Lab Novel Software Technol, Nanjing 210093, Peoples R China
关键词
Behavioral research - Character recognition - Social aspects;
D O I
10.1049/trit.2019.0051
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Graphology-based handwriting analysis to identify human behavior, irrespective of applications, is interesting. Unlike existing methods that use characters, words and sentences for behavioural analysis with human intervention, we propose an automatic method by analysing a few handwritten English lowercase characters from a to z to identify person behaviours. The proposed method extracts structural features, such as loops, slants, cursive, straight lines, stroke thickness, contour shapes, aspect ratio and other geometrical properties, from different zones of isolated character images to derive the hypothesis based on a dictionary of Graphological rules. The derived hypothesis has the ability to categorise the personal, positive, and negative social aspects of an individual. To evaluate the proposed method, an automatic system is developed which accepts characters from a to z written by different individuals across different genders and age groups. This automatic privacy projected system is available on the website (http://subha.pythonanywhere.com). For quantitative evaluation of the proposed method, several people are requested to use the system to check their characteristics with the system automatic response based on his/her handwriting by choosing to agree or disagree options. The automatic system receives 5300 responses from the users, for which, the proposed method achieves 86.70% accuracy.
引用
收藏
页码:55 / 65
页数:11
相关论文
共 16 条
[1]  
Asra S, 2017, 2017 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER, AND OPTIMIZATION TECHNIQUES (ICEECCOT), P260
[2]  
Boser B. E., 1992, Proceedings of the Fifth Annual ACM Workshop on Computational Learning Theory, P144, DOI 10.1145/130385.130401
[3]  
Brewer J.F, 1999, GRAPHOLOGY, V5, P6
[4]  
Champa H. N., 2010, Proceedings of the 2010 First International Conference on Integrated Intelligent Computing (ICIIC 2010), P160, DOI 10.1109/ICIIC.2010.29
[5]  
Champa HN., 2010, INT J COMPUTER APPL, V2, P36, DOI DOI 10.5120/629-878
[6]  
Coll Ricard, 2009, 2009 10th International Conference on Document Analysis and Recognition (ICDAR), P1081, DOI 10.1109/ICDAR.2009.213
[7]  
Fallah B, 2016, 2016 ARTIFICIAL INTELLIGENCE AND ROBOTICS (IRANOPEN), P120, DOI 10.1109/RIOS.2016.7529501
[8]  
Gattupalli V, 2016, INT C PATT RECOG, P2446, DOI 10.1109/ICPR.2016.7900003
[9]  
Hafemann LG, 2016, INT C PATT RECOG, P2989, DOI 10.1109/ICPR.2016.7900092
[10]  
KEDAR SV, 2015, P ICIP, P326