Filters








1,315 Hits in 5.9 sec

Text Region Extraction in a Document Image Based on Discrete Wavelet transforms

S. Audithan, RM. Chandrasekaran
2010 International Journal of MC Square Scientific Research  
The detection of text region is achieved by the discrete wavelet transforms. Experimental results show that the proposed method gives better text extraction from the document images.  ...  This paper presents a new approach for extracting text region from the document images employing the discrete wavelet transform.  ...  Introduction The extraction of textual information from document images provides many useful applications in document analysis and understanding, such as optical character recognition, document retrieval  ... 
doi:10.20894/ijmsr.117.002.001.005 fatcat:ae3qhd752jgczfk6ypl2l262mi

A New Approach for Texture based Script Identification At Block Level using Quad Tree Decomposition [article]

Pawan Kumar Singh, Supratim Das, Ram Sarkar, Mita Nasipuri
2020 arXiv   pre-print
In this paper, we present the significance of Gabor wavelets filters in extracting directional energy and entropy distributions for 11 official handwritten scripts namely, Bangla, Devanagari, Gujarati,  ...  The experimentation is conducted at block level based on a quad-tree decomposition approach and evaluated using six different well-known classifiers.  ...  (SRUVM) of Computer Science and Engineering Department, Jadavpur University, for providing infrastructure facilities during progress of the work.  ... 
arXiv:2009.07435v1 fatcat:l6dvmxz47fd2rminrhbaxm2gau

Algorithms for compressing compound document images with large text/background overlap

B.-F. Wu, C.-C. Chiu, Y.-L. Chen
2004 IEE Proceedings - Vision Image and Signal Processing  
The proposed algorithms apply a new method of segmentation to separate the text from the image in a compound document in which the text overlaps the background.  ...  The proposed algorithms greatly outperform two well known image compression methods, JPEG and DjVu, and enable the effective extraction of the text from a complex background, achieving a high compression  ...  Several other approaches use the features of wavelet coefficients [18 -21] to extract text. All these systems focus on processing document images whose texts do not overlap the complex background.  ... 
doi:10.1049/ip-vis:20040805 fatcat:vlk3ednlpzcijcrjo4ofvb5xoq

A Review Paper on Currency Recognition System

Ami Shah, Komal Vora, Jay Mehta
2015 International Journal of Computer Applications  
A set of coefficient statistical moments are then extracted from the approximate efficient matrix. The extracted features can be used for recognition, classification and retrieval of currency notes.  ...  The entire system is pre-processed for the optimal and efficient implementation of two dimensional discrete wavelet transform (2D DWT) which is used to develop a currency recognition system.  ...  To obtain the next coarse level of wavelet coefficients, the sub-band LL1 can be decomposed and sampled. Two-level wavelet decomposition is shown in Fig.5 (b) .  ... 
doi:10.5120/20264-2669 fatcat:ztdb6da62bestc35jhb7bud3nq

Robust Watermarking of Document and Graphics Images in Wavelet Domain

C. Patvardhan, A. K. Verma, C. Vasantha Lakshmi
2012 International Journal of Applied Information Systems  
As can be seen in the computational results, clear white background area is ensured with better robustness presented on a variety of document and graphics images.  ...  Document and graphics images are different from other images as such images are typically in two colors only (generally white as background and black or other color as text or drawing).  ...  The document and graphics images differ from ordinary images. These images generally are of two colors for example white for background and black for text or drawing.  ... 
doi:10.5120/ijais12-450402 fatcat:u2tmtl4c7fconbxedew7ypi5d4

Watermarked Shadow Free Vop Sequences Using Hybrid Transforms

T. Vishnu Priya
2014 IOSR Journal of Engineering  
In object based coding, video frames are defined in terms of layers of Video Object Planes(VOP).With the development of modern technology more attention has been shifted towards spatial resolution for  ...  Today, detection and tracking is vital to many applications dealing with image sequences such as video surveillance like military, defense systems, law enforcements and cryptography.  ...  It will be used to as reference to every new frame which will result in the outline of objects and their shadows. I used the first frame of every video as the background reference image.  ... 
doi:10.9790/3021-04613040 fatcat:7mjfuzaqqrdftocsddo7fyxhri

OFF-LINE TEXT-INDEPENDENT WRITER RECOGNITION FOR CHINESE HANDWRITING: A REVIEW

Gloria Jennis Tan, Ghazali Sulong, Mohd Shafry Mohd Rahim
2015 Jurnal Teknologi  
off-line textindependent Chinese handwriting identification.  ...  This paper provides a comprehensive review of existing works including the characteristics of Chinese characters' complex stroke crossing and challenges, which is still a largely unexplored subject for  ...  A grey level run is a set of consecutive, collinear picture points having the same grey level value.  ... 
doi:10.11113/jt.v75.4975 fatcat:xhrgneqmurfedbdzabxvpga7ve

Query by low-quality image

Mohammad Faizal Ahmad Fauzi, Paul H. Lewis
2009 Image and Vision Computing  
Throughout this paper, fax images will be used as the main source of low-quality image for query by low-quality image experiments.  ...  Often the query image will have no associated metadata and will be produced from a low-resolution picture of the original artwork.  ...  IST_1999_11978 (The Artiste Project), and to one of our collaborators, the Victoria and Albert Museum (London, UK) for use of their images.  ... 
doi:10.1016/j.imavis.2008.07.007 fatcat:ewvscn2bjbakppyl6kphwytyly

An Intelligent System for Detecting Image Spam based on Exploration of Text Information Embedded into Images

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
The final phase of the work is a complete image spam detection system with the two proposed works built to detect spam messages.  ...  Detection of image spam mails is divided into two separate components- character segmentation and character recognition.  ...  Text Extraction A methodology [16] used to extract text from different images The authors have use discrete wavelet transform (DWT) for extract text or content from multifaceted images.  ... 
doi:10.35940/ijitee.c9108.019320 fatcat:zrreltsezndmtlbsowaq52zzza

Design and FPGA Implementation of DWT, Image Text Extraction Technique

Adesh Kumar, Prakshi Rastogi, Pragyan Srivastava
2015 Procedia Computer Science  
In the extraction method, the image is segmental in text regions from a compound image.  ...  In digital image processing, detection and extraction of text from a documentary image is found a challenging task, especially for inclined, vertical and circular text.  ...  In the paper it is extended the text extraction scheme for the segmentation of document images into texture analysis, background, and picture components which include graphics and continuous tone images  ... 
doi:10.1016/j.procs.2015.07.512 fatcat:d3vlzd74cng57mxwxpsv3rabye

Generic Scale-Space Architecture for Handwriting Documents Analysis [chapter]

Joutel Guillaume, Eglin Veronique, Emptoz Hubert
2010 Pattern Recognition Recent Advances  
Other approaches use direct correlation methods applied on the grey levels for image similarity comparison.  ...  or a distance between two images, the reference image defined by the user and the target images representing the rest of the page or all the pages from a multi-page document.  ...  Generic Scale-Space Architecture for Handwriting Documents Analysis, Pattern Recognition Recent Advances, Adam Herout (Ed.), ISBN: 978-953-7619-90-9, InTech, Available from: http://www.intechopen.com/books  ... 
doi:10.5772/9358 fatcat:nky4w4k4orbn7os23qjoybxyem

High quality document image compression with "DjVu"

Le´on Bottou
1998 Journal of Electronic Imaging (JEI)  
Then, several novel techniques are used to maximize the compression ratio: the bi-level foreground image is encoded with AT&T's proposal to the new JBIG2 fax standard, and a new wavelet-based compression  ...  method is used for the backgrounds and pictures.  ...  This approach w orks well for bi-level documents Witten et al., 1994] o r color documents with uniform backgrounds where the images are clearly separated from the text.  ... 
doi:10.1117/1.482609 fatcat:zxve2ne2jjgzpbdmlftbtzgmc4

A Review on Optical Character Recognition and Text to Speech Conversion

2016 International Journal of Science and Research (IJSR)  
Initially steps involves capturing of image, distinguishing image with text portion and residual regions, image pre-processing on region of interest, after the extraction of characters and words, conversion  ...  Text detection, line detection, character identification, feature extraction, training of extracted features are the steps in sequence that are executed.  ...  Z),grey-scale images were used with Times New Roman font type, using bitmap image format with 240 x 240 image size and recognizing the alphabet by comparing between two images.  ... 
doi:10.21275/v5i6.nov164524 fatcat:74egnfqapnf3romxcgzfgvnism

Identity document authentication using steganographic techniques: The challenges of noise

Juanita Blue, Joan Condell, Tom Lunney
2017 2017 28th Irish Signals and Systems Conference (ISSC)  
Although steganography is often associated with nefarious activities, conceptually it asserts several characteristics that render it useful in contemporary security applications.  ...  This application of steganography allows for identification images storing additional information to verify both the identity of the subject as well as the authenticity of the image.  ...  While extractions from images b1q, b2q and b4q (depicted in Figure 2) were successful, all attempted extractions from image b3q, also referred to as the third quadrant, resulted in a corrupted data string  ... 
doi:10.1109/issc.2017.7983646 fatcat:eyfdazpctfashhwex33dy24lm4

A robust watermark algorithm for copyright protection by using 5-level DWT and two logos

Alaa Rishek Hoshi, Nasharuddin Zainal, Mahamod Ismail, Abd Al-Razak T. Rahem, Salim Muhsin Wadi
2021 Indonesian Journal of Electrical Engineering and Computer Science  
In this paper, A robust watermark algorithm based on a 5-level DWT and Two Log was proposed to enhance the copyright protection of images in unsecured media.  ...  In this technique, a watermarked document was integrated into electronic data to prevent unauthorized access.  ...  Experimental results: extraction after attacks During the experiment, embedded sub bands such as LH2, HL2, HH2, LL1, LL3, and LL5 were also extracted from the watermarked images before and after applying  ... 
doi:10.11591/ijeecs.v22.i2.pp842-856 fatcat:gyhor24ffnawrotqnivlkmy3fm
« Previous Showing results 1 — 15 out of 1,315 results