{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2019:WRHU5UHKCE4JK6A2DZASOA765B","short_pith_number":"pith:WRHU5UHK","canonical_record":{"source":{"id":"1901.00363","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2019-01-02T14:00:33Z","cross_cats_sorted":[],"title_canon_sha256":"b5e3ac89087978d89b0ee31b010bc6980a12ea0fcb0ed3f424c1c140f3717a97","abstract_canon_sha256":"240e0ebd1c80aae2dec0efe11a881bc7aefcac0af3206218457ccbd5509d3bf7"},"schema_version":"1.0"},"canonical_sha256":"b44f4ed0ea113895781a1e412703fee8553524db297889555e3f97c3898920ee","source":{"kind":"arxiv","id":"1901.00363","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1901.00363","created_at":"2026-05-17T23:57:04Z"},{"alias_kind":"arxiv_version","alias_value":"1901.00363v1","created_at":"2026-05-17T23:57:04Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1901.00363","created_at":"2026-05-17T23:57:04Z"},{"alias_kind":"pith_short_12","alias_value":"WRHU5UHKCE4J","created_at":"2026-05-18T12:33:30Z"},{"alias_kind":"pith_short_16","alias_value":"WRHU5UHKCE4JK6A2","created_at":"2026-05-18T12:33:30Z"},{"alias_kind":"pith_short_8","alias_value":"WRHU5UHK","created_at":"2026-05-18T12:33:30Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2019:WRHU5UHKCE4JK6A2DZASOA765B","target":"record","payload":{"canonical_record":{"source":{"id":"1901.00363","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2019-01-02T14:00:33Z","cross_cats_sorted":[],"title_canon_sha256":"b5e3ac89087978d89b0ee31b010bc6980a12ea0fcb0ed3f424c1c140f3717a97","abstract_canon_sha256":"240e0ebd1c80aae2dec0efe11a881bc7aefcac0af3206218457ccbd5509d3bf7"},"schema_version":"1.0"},"canonical_sha256":"b44f4ed0ea113895781a1e412703fee8553524db297889555e3f97c3898920ee","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-17T23:57:04.086659Z","signature_b64":"el9Vrenyef0EZRzMdV89HfoV4xttYledwg4fvxGnBq+hYuxWC/LSYwDdbvJzEuHjbc8koMngiG9h3KeWd9KbCQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"b44f4ed0ea113895781a1e412703fee8553524db297889555e3f97c3898920ee","last_reissued_at":"2026-05-17T23:57:04.086190Z","signature_status":"signed_v1","first_computed_at":"2026-05-17T23:57:04.086190Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1901.00363","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:57:04Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"3bORBbmy3khk+VZYr0ApfeaBisUnRHK6JRWYCVpDBCrw3jg6cVAHj8hBd/EOADasxVlJRSlvjEyZutrt2BDLDQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-18T23:18:52.192777Z"},"content_sha256":"d75c9f7636e74f32716d0013b459b072dc02872dafc62bdef119a427165a7dd1","schema_version":"1.0","event_id":"sha256:d75c9f7636e74f32716d0013b459b072dc02872dafc62bdef119a427165a7dd1"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2019:WRHU5UHKCE4JK6A2DZASOA765B","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Detecting Text in the Wild with Deep Character Embedding Network","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.CV","authors_text":"Chengquan Zhang, Errui Ding, Jiaming Liu, Junyu Han, Yipeng Sun","submitted_at":"2019-01-02T14:00:33Z","abstract_excerpt":"Most text detection methods hypothesize texts are horizontal or multi-oriented and thus define quadrangles as the basic detection unit. However, text in the wild is usually perspectively distorted or curved, which can not be easily tackled by existing approaches. In this paper, we propose a deep character embedding network (CENet) which simultaneously predicts the bounding boxes of characters and their embedding vectors, thus making text detection a simple clustering task in the character embedding space. The proposed method does not require strong assumptions of forming a straight line on gen"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1901.00363","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-17T23:57:04Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"61TnEYtYxojIDrpdiBs1bfBTW3+SUuY+sZYHAKrTs49c++F296ACmASg6D1mRG028abmn9NVc6OFjLqKiJ4xCw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-18T23:18:52.193489Z"},"content_sha256":"8c4a2f0eb7592d104395dec90563f1808d60a0c90c5dc2519d96a9a90a0cc82f","schema_version":"1.0","event_id":"sha256:8c4a2f0eb7592d104395dec90563f1808d60a0c90c5dc2519d96a9a90a0cc82f"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/WRHU5UHKCE4JK6A2DZASOA765B/bundle.json","state_url":"https://pith.science/pith/WRHU5UHKCE4JK6A2DZASOA765B/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/WRHU5UHKCE4JK6A2DZASOA765B/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-18T23:18:52Z","links":{"resolver":"https://pith.science/pith/WRHU5UHKCE4JK6A2DZASOA765B","bundle":"https://pith.science/pith/WRHU5UHKCE4JK6A2DZASOA765B/bundle.json","state":"https://pith.science/pith/WRHU5UHKCE4JK6A2DZASOA765B/state.json","well_known_bundle":"https://pith.science/.well-known/pith/WRHU5UHKCE4JK6A2DZASOA765B/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2019:WRHU5UHKCE4JK6A2DZASOA765B","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"240e0ebd1c80aae2dec0efe11a881bc7aefcac0af3206218457ccbd5509d3bf7","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2019-01-02T14:00:33Z","title_canon_sha256":"b5e3ac89087978d89b0ee31b010bc6980a12ea0fcb0ed3f424c1c140f3717a97"},"schema_version":"1.0","source":{"id":"1901.00363","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1901.00363","created_at":"2026-05-17T23:57:04Z"},{"alias_kind":"arxiv_version","alias_value":"1901.00363v1","created_at":"2026-05-17T23:57:04Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1901.00363","created_at":"2026-05-17T23:57:04Z"},{"alias_kind":"pith_short_12","alias_value":"WRHU5UHKCE4J","created_at":"2026-05-18T12:33:30Z"},{"alias_kind":"pith_short_16","alias_value":"WRHU5UHKCE4JK6A2","created_at":"2026-05-18T12:33:30Z"},{"alias_kind":"pith_short_8","alias_value":"WRHU5UHK","created_at":"2026-05-18T12:33:30Z"}],"graph_snapshots":[{"event_id":"sha256:8c4a2f0eb7592d104395dec90563f1808d60a0c90c5dc2519d96a9a90a0cc82f","target":"graph","created_at":"2026-05-17T23:57:04Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"Most text detection methods hypothesize texts are horizontal or multi-oriented and thus define quadrangles as the basic detection unit. However, text in the wild is usually perspectively distorted or curved, which can not be easily tackled by existing approaches. In this paper, we propose a deep character embedding network (CENet) which simultaneously predicts the bounding boxes of characters and their embedding vectors, thus making text detection a simple clustering task in the character embedding space. The proposed method does not require strong assumptions of forming a straight line on gen","authors_text":"Chengquan Zhang, Errui Ding, Jiaming Liu, Junyu Han, Yipeng Sun","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2019-01-02T14:00:33Z","title":"Detecting Text in the Wild with Deep Character Embedding Network"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1901.00363","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:d75c9f7636e74f32716d0013b459b072dc02872dafc62bdef119a427165a7dd1","target":"record","created_at":"2026-05-17T23:57:04Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"240e0ebd1c80aae2dec0efe11a881bc7aefcac0af3206218457ccbd5509d3bf7","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CV","submitted_at":"2019-01-02T14:00:33Z","title_canon_sha256":"b5e3ac89087978d89b0ee31b010bc6980a12ea0fcb0ed3f424c1c140f3717a97"},"schema_version":"1.0","source":{"id":"1901.00363","kind":"arxiv","version":1}},"canonical_sha256":"b44f4ed0ea113895781a1e412703fee8553524db297889555e3f97c3898920ee","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"b44f4ed0ea113895781a1e412703fee8553524db297889555e3f97c3898920ee","first_computed_at":"2026-05-17T23:57:04.086190Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-17T23:57:04.086190Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"el9Vrenyef0EZRzMdV89HfoV4xttYledwg4fvxGnBq+hYuxWC/LSYwDdbvJzEuHjbc8koMngiG9h3KeWd9KbCQ==","signature_status":"signed_v1","signed_at":"2026-05-17T23:57:04.086659Z","signed_message":"canonical_sha256_bytes"},"source_id":"1901.00363","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:d75c9f7636e74f32716d0013b459b072dc02872dafc62bdef119a427165a7dd1","sha256:8c4a2f0eb7592d104395dec90563f1808d60a0c90c5dc2519d96a9a90a0cc82f"],"state_sha256":"b136e28b34a0a38487c6c82d72293da307eecf441969c07a7482fd863896b2f2"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"TyfP3wzdvJAELwLvpW32ir5Z8amXj2R7N5Q85JL3Lj52hCq1jwxwxhzJvaJXGPAgzHziTq6RJciYnDWnp5LXAg==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-18T23:18:52.195386Z","bundle_sha256":"ae06668c78a12fb37602b99ba010fdbcde917844e6d5358912514bd88439d370"}}