A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Text Region Extraction in a Document Image Based on Discrete Wavelet transforms
2010
International Journal of MC Square Scientific Research
The detection of text region is achieved by the discrete wavelet transforms. Experimental results show that the proposed method gives better text extraction from the document images. ...
This paper presents a new approach for extracting text region from the document images employing the discrete wavelet transform. ...
Introduction The extraction of textual information from document images provides many useful applications in document analysis and understanding, such as optical character recognition, document retrieval ...
doi:10.20894/ijmsr.117.002.001.005
fatcat:ae3qhd752jgczfk6ypl2l262mi
A New Approach for Texture based Script Identification At Block Level using Quad Tree Decomposition
[article]
2020
arXiv
pre-print
In this paper, we present the significance of Gabor wavelets filters in extracting directional energy and entropy distributions for 11 official handwritten scripts namely, Bangla, Devanagari, Gujarati, ...
The experimentation is conducted at block level based on a quad-tree decomposition approach and evaluated using six different well-known classifiers. ...
(SRUVM) of Computer Science and Engineering Department, Jadavpur University, for providing infrastructure facilities during progress of the work. ...
arXiv:2009.07435v1
fatcat:l6dvmxz47fd2rminrhbaxm2gau
Algorithms for compressing compound document images with large text/background overlap
2004
IEE Proceedings - Vision Image and Signal Processing
The proposed algorithms apply a new method of segmentation to separate the text from the image in a compound document in which the text overlaps the background. ...
The proposed algorithms greatly outperform two well known image compression methods, JPEG and DjVu, and enable the effective extraction of the text from a complex background, achieving a high compression ...
Several other approaches use the features of wavelet coefficients [18 -21] to extract text. All these systems focus on processing document images whose texts do not overlap the complex background. ...
doi:10.1049/ip-vis:20040805
fatcat:vlk3ednlpzcijcrjo4ofvb5xoq
A Review Paper on Currency Recognition System
2015
International Journal of Computer Applications
A set of coefficient statistical moments are then extracted from the approximate efficient matrix. The extracted features can be used for recognition, classification and retrieval of currency notes. ...
The entire system is pre-processed for the optimal and efficient implementation of two dimensional discrete wavelet transform (2D DWT) which is used to develop a currency recognition system. ...
To obtain the next coarse level of wavelet coefficients, the sub-band LL1 can be decomposed and sampled. Two-level wavelet decomposition is shown in Fig.5 (b) . ...
doi:10.5120/20264-2669
fatcat:ztdb6da62bestc35jhb7bud3nq
Robust Watermarking of Document and Graphics Images in Wavelet Domain
2012
International Journal of Applied Information Systems
As can be seen in the computational results, clear white background area is ensured with better robustness presented on a variety of document and graphics images. ...
Document and graphics images are different from other images as such images are typically in two colors only (generally white as background and black or other color as text or drawing). ...
The document and graphics images differ from ordinary images. These images generally are of two colors for example white for background and black for text or drawing. ...
doi:10.5120/ijais12-450402
fatcat:u2tmtl4c7fconbxedew7ypi5d4
Watermarked Shadow Free Vop Sequences Using Hybrid Transforms
2014
IOSR Journal of Engineering
In object based coding, video frames are defined in terms of layers of Video Object Planes(VOP).With the development of modern technology more attention has been shifted towards spatial resolution for ...
Today, detection and tracking is vital to many applications dealing with image sequences such as video surveillance like military, defense systems, law enforcements and cryptography. ...
It will be used to as reference to every new frame which will result in the outline of objects and their shadows. I used the first frame of every video as the background reference image. ...
doi:10.9790/3021-04613040
fatcat:7mjfuzaqqrdftocsddo7fyxhri
OFF-LINE TEXT-INDEPENDENT WRITER RECOGNITION FOR CHINESE HANDWRITING: A REVIEW
2015
Jurnal Teknologi
off-line textindependent Chinese handwriting identification. ...
This paper provides a comprehensive review of existing works including the characteristics of Chinese characters' complex stroke crossing and challenges, which is still a largely unexplored subject for ...
A grey level run is a set of consecutive, collinear picture points having the same grey level value. ...
doi:10.11113/jt.v75.4975
fatcat:xhrgneqmurfedbdzabxvpga7ve
Query by low-quality image
2009
Image and Vision Computing
Throughout this paper, fax images will be used as the main source of low-quality image for query by low-quality image experiments. ...
Often the query image will have no associated metadata and will be produced from a low-resolution picture of the original artwork. ...
IST_1999_11978 (The Artiste Project), and to one of our collaborators, the Victoria and Albert Museum (London, UK) for use of their images. ...
doi:10.1016/j.imavis.2008.07.007
fatcat:ewvscn2bjbakppyl6kphwytyly
An Intelligent System for Detecting Image Spam based on Exploration of Text Information Embedded into Images
2020
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
The final phase of the work is a complete image spam detection system with the two proposed works built to detect spam messages. ...
Detection of image spam mails is divided into two separate components- character segmentation and character recognition. ...
Text Extraction A methodology [16] used to extract text from different images The authors have use discrete wavelet transform (DWT) for extract text or content from multifaceted images. ...
doi:10.35940/ijitee.c9108.019320
fatcat:zrreltsezndmtlbsowaq52zzza
Design and FPGA Implementation of DWT, Image Text Extraction Technique
2015
Procedia Computer Science
In the extraction method, the image is segmental in text regions from a compound image. ...
In digital image processing, detection and extraction of text from a documentary image is found a challenging task, especially for inclined, vertical and circular text. ...
In the paper it is extended the text extraction scheme for the segmentation of document images into texture analysis, background, and picture components which include graphics and continuous tone images ...
doi:10.1016/j.procs.2015.07.512
fatcat:d3vlzd74cng57mxwxpsv3rabye
Generic Scale-Space Architecture for Handwriting Documents Analysis
[chapter]
2010
Pattern Recognition Recent Advances
Other approaches use direct correlation methods applied on the grey levels for image similarity comparison. ...
or a distance between two images, the reference image defined by the user and the target images representing the rest of the page or all the pages from a multi-page document. ...
Generic Scale-Space Architecture for Handwriting Documents Analysis, Pattern Recognition Recent Advances, Adam Herout (Ed.), ISBN: 978-953-7619-90-9, InTech, Available from: http://www.intechopen.com/books ...
doi:10.5772/9358
fatcat:nky4w4k4orbn7os23qjoybxyem
High quality document image compression with "DjVu"
1998
Journal of Electronic Imaging (JEI)
Then, several novel techniques are used to maximize the compression ratio: the bi-level foreground image is encoded with AT&T's proposal to the new JBIG2 fax standard, and a new wavelet-based compression ...
method is used for the backgrounds and pictures. ...
This approach w orks well for bi-level documents Witten et al., 1994] o r color documents with uniform backgrounds where the images are clearly separated from the text. ...
doi:10.1117/1.482609
fatcat:zxve2ne2jjgzpbdmlftbtzgmc4
A Review on Optical Character Recognition and Text to Speech Conversion
2016
International Journal of Science and Research (IJSR)
Initially steps involves capturing of image, distinguishing image with text portion and residual regions, image pre-processing on region of interest, after the extraction of characters and words, conversion ...
Text detection, line detection, character identification, feature extraction, training of extracted features are the steps in sequence that are executed. ...
Z),grey-scale images were used with Times New Roman font type, using bitmap image format with 240 x 240 image size and recognizing the alphabet by comparing between two images. ...
doi:10.21275/v5i6.nov164524
fatcat:74egnfqapnf3romxcgzfgvnism
Identity document authentication using steganographic techniques: The challenges of noise
2017
2017 28th Irish Signals and Systems Conference (ISSC)
Although steganography is often associated with nefarious activities, conceptually it asserts several characteristics that render it useful in contemporary security applications. ...
This application of steganography allows for identification images storing additional information to verify both the identity of the subject as well as the authenticity of the image. ...
While extractions from images b1q, b2q and b4q (depicted in Figure 2) were successful, all attempted extractions from image b3q, also referred to as the third quadrant, resulted in a corrupted data string ...
doi:10.1109/issc.2017.7983646
fatcat:eyfdazpctfashhwex33dy24lm4
A robust watermark algorithm for copyright protection by using 5-level DWT and two logos
2021
Indonesian Journal of Electrical Engineering and Computer Science
In this paper, A robust watermark algorithm based on a 5-level DWT and Two Log was proposed to enhance the copyright protection of images in unsecured media. ...
In this technique, a watermarked document was integrated into electronic data to prevent unauthorized access. ...
Experimental results: extraction after attacks During the experiment, embedded sub bands such as LH2, HL2, HH2, LL1, LL3, and LL5 were also extracted from the watermarked images before and after applying ...
doi:10.11591/ijeecs.v22.i2.pp842-856
fatcat:gyhor24ffnawrotqnivlkmy3fm
« Previous
Showing results 1 — 15 out of 1,315 results