Character Recognition

Size: px
Start display at page:

Download "Character Recognition"

Transcription

1 Character Recognition 5.1 INTRODUCTION Recognition is one of the important steps in image processing. There are different methods such as Histogram method, Hough transformation, Neural computing approaches and fuzzy theory approaches. These approaches are computationally expensive and hence quite complex to implement. In this work, a simple approach called 14-segment display method is used to recognize the characters. In this method, the principle of projection is used. Section 5.2 discusses about the various stages in recognition process, section 5.3 gives details about projection onto 14 segments section 5.4 describes about the knowledge base, and finally section 5.5 gives details about methodology-i and methodology-ii. 52

2 5.2 STAGES IN RECOGNITION PROCESS The stages involved in this method are depicted in Figure fig 5.1. The method of recognizing the numeral is discussed in the subsequent sections of this chapter. Preprocessed numeral image Projection of the numeral onto 14 segments of numeral size Classification of the numeral image Conflict Knowledge base about the numerals Conflict resolution Numeral Recognition Figure 5.1 Block diagram showing the activities in proposed method 5.3 PROJECTION ONTO 14 SEGMENTS A thin distortion free and clear image of a handwritten number is considered as the input for recognition. A logical box enclosing the number is imagined. The logical box is segmented to 14 lines as shown in Figure The pixels of the numeral image are projected on to the predefined segments as explained below: 53

3 i. The box area enclosing a numeral image is logically divided into four as shown in Figure.5.3a. ii. All bright pixels in the part 1 are projected onto segment f; in the part 2 are projected onto segment e in the part 3 are projected onto segment b and in part 4 are projected onto segment c iii. Similarly, the box area is divided into three parts horizontally as shown in Figure.5.3b. iv. All the pixels are projected in the part 7 onto segment d. Figure- 5.2 Segmentation of the logical box into 14 lines Dynamic threshold for each segment based on the size of the numeral is computed. The threshold determined for each segment is used to select or drop the segment. 54

4 Neatly written numerals will always form well defined segment strings. For example, neatly written numeral 3 forms the segment string abcdg. A decision tree classifies the numeral based on the segments formulated in the first stage and uses the built in knowledge base to resolve any conflict in recognizing the classified numeral in the next stage. Figure 5.3(a) Vertical partition box area Figure 5.3(b) Horizontal Partition box area Knowledge base Knowledge base plays an important role in recognition of the numeral and the knowledge base is a repository of derived information. In fact, an inference engine is used for deriving such knowledge on numerals. Initially, the classification of numerals is done based on the segments formulated by projection. If the segments formulated by projections are not sufficient to classify the numeral or encounter conflicts in numeral recognition, then the system proceeds with the support of knowledge base in recognition process. Most of the segments obtained by projection are sufficient to recognize the numeral and such cases are nearly written numerals and do not make use of knowledge base. However, many a time the segments formulated 55

5 are not sufficient to recognize the numeral and also lead to conflicts. Under such situations, knowledge base is used for further investigations to overcome conflicts and extracts more features from the numeral image to recognize the numeral. The cases that make use of the knowledge base are mentioned below: 1. Sometimes, the projections of numerals 1 and 7 show conflict in the segment a. The knowledge about the height and width of the numeral image overcomes the conflict. The ratio of the length and height of numeral 1 is relatively less than that of numeral Projection of numerals 7 and 9 show conflict when numeral 9 fails to project onto segment g. The knowledge about the density of pixels in part 5 (Figure 5.3b) overcomes the conflict.number of pixels for numeral 7 in this part is very much close to the numeral whereas for numeral 9, the number of pixels is greater than 1.4 times the width of the numeral. 3. Projection for numerals 1 and 6 show conflict when numeral 6 fails to project onto segment g. The knowledge about the density of pixels in part 7 (Figure 5.3b) overcomes the conflict. Number of pixels in this part is very much close to the width of the numeral whereas for numeral 6, the number of pixels is greater than 1.4 times the width of the numeral. 4. Sometimes segments formulated by projection of numerals 2 and 3 are not sufficient for recognition and show conflict by forming segments abcd. Then the knowledge about the density of pixels in the overlapping area of part 2 and part 7 (Figure 5.3a & Figure.5.3b) comes into picture to overcome conflict. The 56

6 density of pixels in this area is high for numeral 2 with respect to the total area of the overlapping region. 5. Similarly, segment string formulated by numeral 4, sometimes resembles projection of numeral 6. In such projection, the segment string obtained is acdef. Then the knowledge of number of projected pixels at the bottom end of the segment c overcomes the conflict. In case of number 4, the number of projected pixels at the bottom end of the segment c overcomes the conflict. In case of numeral 4, the number of projected pixels is almost zero, where as for numeral 6, it is almost equal to the height considered at the bottom end of the segment c. 6. Sometimes segments formulated by numerals 5 and 6 show conflict by forming the segment string acdefg. Under this situation, the number of pixels projected on to segment e overcomes the conflict. For numeral 6, the number of pixels projected on to segment e is greater than or equal to the size of the segment c and for numeral 5, it is less than the size of that segment. 7. The conflict in projections of numerals 1 and 9 can be overcome similarly as explained in item 3 by considering overlapping regions of part- 1 and part 5 ( Figure 5.3a & Figure 5.3b). 8. The conflict in projections of numerals 1 and 2 is overcome with knowledge of number of pixels projected onto the segment a and density of pixels in the overlapping regions of part 3 and part -7 (Figure 5.3a & Figure 5.3b). The number of pixels projected on to segment a is less than 1.3 times the height 57

7 part 1 and greater than or equal to 1.3 times the height of the part 1. Further, the overlapping region overcomes the conflict as explained in item METHODOLOGY 1 The steps involved in the method for projection, classification and recognition are: 1. The logical box is divided into four parts as shown in fig 5.3a. 2. All the pixels are projected horizontally in the part 1 onto segment f. 3. All the pixels are projected horizontally in the part 2 onto segment e. 4. All the pixels are projected horizontally in the part 3 on to segment b. 5. All the pixels are projected horizontally in the part 4 onto segment e. 6. The logical box is divided into three parts as shown in Fig 5.3b. First part (part 5) is top ¼ th of the height of the numeral image. Second part (part -6) is center half portion of the numeral image. The remaining last ¼ th portion is the third part (part 7). 7. All the pixels are projected vertically in the part 5 on to segment a 8. All the pixels are projected vertically in the part 6 on to segment g 9. All the pixels are projected vertically in the part - 7 onto segment d 10. Determine if threshold for every segment pixels count are above the respective thresholds. Form a string of such segments in sequence. 11. Identify the segments whose projected pixels counts are above the respective thresholds. Form a string of such segments in sequence. 12. Classify the numeral image based on the decision tree on segments formulated for neatly written case. 13. Apply knowledgebase to recognize the numeral when the segments formulated are not sufficient for classification and when encounter of conflicting situations are encountered. 58

8 14. If the segment string formulated and knowledgebase does not lead to a decision, then the system fails to recognize the numeral. Figure 5.4 shows the decision tree for numeral classification. Notations used in the tree diagram are as follows. The label indicated, the left sub tree is obtained when the segment specified at branching is not formed. The digits mentioned at each node indicate the set of digits within that level of classification. The decision starts with segment f and proceeds with e, g a etc. These segments are arbitrarily considered to cover maximum number of items with in a subclass at each decision. Figure 5.4 shows decision tree for numeral classification. 59

9 The Figure 5.5 shows how the hand written number 3 is divided horizontally and vertically. It also indicates the projections of the pixels on to the segments and the formulated segment string. Figure 5.5 Projection of number 3 to segments and formulation of Segment string 60

10 5.5 EXPERIMENTAL RESULTS For each numeral a sample set of 50 different specimens are used for testing the system. The numeral sizes are varied from 15 X 15 pixels to 100 X 100 pixels. The recognition rate is 90%. It is clear from the result that the method shows good performance. Table 5.1 Recognition rates of numerals Numbers Percentage of recognition for printed characters Percentage of recognition for Hand written characters ,1,7, ,6, The system fails to recognize when the numerals are written in unusual ways. For numerals 2 and 3, recognition is relatively low because a lot of variability is noticed in writing of these two. The rate of wrong recognition or misclassification is about 3 % - 8 % because of the threshold computed for selecting a segment and knowledgebase. Misclassification is noticed in numeral sets (6, 8, and 9) (4, 9) and (2, 3). No failure cases are reported since the numeral is classified into any one class. The system recognizes numerals written in normal style to an extent of 100%. The efficiency of the system reduces for distorted and incomplete numbers. Recognition shows the same performance for slightly skewed numerals but degrades for more skewed numerals since skew correction is not taken care of. The efficiency also reduces if the numerals written are too asymmetric as the projection of the numeral is beyond prediction. 61

11 Conclusions :- In this work, a simple approach called 14-segment display method is used to recognize the characters. In this method, the principle of projection is used and no mathematical or statistical model is used. The system does not require normalization of the numeral image, as the method works fairly well for common writing sizes on the documents. The system may be used as a substitute to histogram method for recognizing printed numerals, as this method shows 98% recognition, requires less computation and implementation is much simpler than the histogram method. The method can be applied to perform automatic reading of numerals from documents. There is scope for making the system more efficient by making the knowledgebase more powerful to overcome misrecognitions or misclassifications. The algorithms that are available for character recognition have high accuracy and high speed. However, still many suffer from a fairly simple flaw (15). When they do make mistakes (and they all do), the mistakes are often very unnatural to the human point of view. That is, mistaking a 5 for an S is not too surprising because most people are willing to agree that these two characters are similar, but mistaking a 5 for an M is counter-intuitive and unexpected. Algorithms make such mistakes because they generally operate on a different set of features than humans for computational reasons. This algorithm, presently avoids thinning (and other preprocessing) by assuming that the input eight by eight data is not particularly aberrant. L ines in an eight by eight grid should not normally be thicker than two pixels. With this assumption, it then proceeds to look for feature points. 62

12 A feature point is a point of human interest in an image, a place where something happens. It could be an intersection between two lines, or it could be a corner, or it could be just a dot surrounded by space. Such points serve to help define the relationship between different strokes. Two strokes could fully cross each other, together in a Y or a T intersection, forms a corner, or avoids each other altogether. People tend to be sensitive to these relationships, the fact that the lines in a Z connect in certain way is more important than the individual lengths of those lines. These relationships are what should be used for character identification and the feature points can be exploited for the task. The procedure for extracting these feature points utilized by this algorithm is fairly straightforward. Since an eight by eight character consists of only sixty four pixels, it is viable to simply loop through the entire character and examine each pixel in turn. If a pixel is on, its eight neighbors are checked, since each neighbor can also only be on or off, there are merely 256 possible combinations of neighborhoods. Of these 256, fifty eight were found to represent significant feature points in a fairly unambiguous way. Extracting feature points is thus reduced to calculating a number between zero and 256 to describe a pixel s neighborhood and then comparing that number against a table of known feature points (Enumeration of Possible Pixel Neighborhoods). While it is true that this method does not always catch every feature point. (Some can only be seen in a larger context) it catches the majority. Missing feature points is certainly not a limiting factor in the algorithm s accuracy. It also does not suffer from labeling too many uninteresting points as being feature points. It has virtually no false positives. The feature point extractor is thus fast and reliable. 63

13 Characters cannot be identified by the extraction of feature points alone. Without a database of characters and their associated feature points, the ultimate feature point extractor would be useless. Only with such a database can the feature point extraction results from an unknown character be compared against what is expected for real world characters and a judgment of the unknown s identity made. Thus, a gold standard dictionary of characters and their associated features must be defined. Ideally, this dictionary should contain details for the average appearance of every character manifestation (many English characters have multiple different accepted manifestations such as Z versus Z ). If poor representative appearances for characters are chosen, valid characters at the extremes will not be identified as readily. If some manifestations of characters are missed, the program will certainly not be able to identify characters belonging to these groups at all. With both a method for extracting feature points and a dictionary of characters and associated feature point data for reference, identifying characters becomes a problem of measuring the degree of similarity between two sets of features. The method employed by this algorithm is just a slight modification of Euclidean distance. All the distances between each of the feature points in the unknown character and their closest corresponding feature points in the reference character are summed and missing or extra feature points are penalized. Identification is then a matter of finding the character in the dictionary that is, within a certain threshold distance of the unknown character. In practice, the algorithm currently checks every character in the reference set to first locate the minimum distance, and then verifies that the minimum distance is less than the threshold. Additionally, the algorithm tries to make some simple compensation for noise by noting that pixels surrounded by completely empty 64

14 space (dots) and pixels surrounded by completely full space (blots) are quite uncommon in normal characters and are probably the result of some type of noise in the input. It would also be possible to examine the space between individual feature points to determine whether or not contiguous straight lines have connected them. This would also greatly enhance the accuracy of the algorithm and would prevent a W from being recognized as an E. This particular modification would both slow the algorithm down considerably and consume quite a bit more memory, but it could still be justifiable if the accuracy increase were significant. A line and / or curve extractor could be used in conjunction with (or independently of) the above mentioned modification, and would provide yet more usable features that could be exploited for identification. The exploration of modifications that would make the algorithm more invariant to translation would certainly be useful. If the use of lines connecting feature points, as described above provided enough information of itself to accurately identify characters, it would be preferable to the current method of using feature point location as it would be translation invariant while the current method is clearly not. Even if the dependence on location cannot be fully removed, it could be reduced through a separate preprocessing step. Each character could be centered in the eight by eight grid with special attention being paid, so position information is not lost on characters where such information is vital (the comma and apostrophe, for example). Numerous other little miscellaneous improvements could be made to various features of the algorithm. The noise detection / handling procedure is currently little more than 65

15 a stub and could be readily improved. The character dictionary could be sorted in order of frequency and the thresholds trusted more completely to improve overall speed (the current algorithm is fairly quick). Suggested future work includes both the testing of these algorithm changes and further testing of the algorithm with more character data. Of particular interest would be character data that is deliberately noisy and character data that has been reduced to eight by eight resolution from some greater resolution. Both of these cases reflect real world problems. The total number of samples taken for testing is 84 Character recognition results using feature point extraction Table 5.2 the total number of samples taken for testing is 84 Character recognition results using feature point extraction Total number of correct recognition 72 86% Total number of correct recognition without counting identical characters 21 25% Total unknowns 5 6% Total wrong guesses 7 8% Experimental results and conclusions: Overall, the results of this experiment were mixed. On the one hand, the initial results certainly are not of commercial quality. When only a couple of pixels differed between the unknown character and the reference, the results were fairly good, but larger differences often made the algorithm unable to correctly recognize the unknown character. On the other hand, the low success rate is not indicative of the general algorithm but just the current implementation. There are many possible changes that could vastly improve the algorithm s recognition abilities. With a few of these changes implemented, the mistakes the algorithm would make would indeed be very similar to the types of mistakes humans would make. Thus, general algorithm 66

16 holds promise as a character recognizer that identifies characters in a manner similar to the way that humans identify characters. In experimentation, a sample set of 75 different vehicle images are taken from a camcorder. The recognition of number plates and recognition of characters varies from 70% to 80% for different images. In this experiment the system will only recognize English characters as well as numbers. It is assumed that the number plate is written in normal font. However, if some of the number plates are written in fancy styles, it is difficult to recognize. The percentage of success is about 75% because many vehicles will have stylish number plates. Table 5.3 shows statistics and experimental results Number of Vehicle passed 75 Number of Vehicle passed with plate of correct type 70 Number of Vehicle passed to recognition algorithm with plates of correct type 70 Number of Picture passed to recognition algorithm 75 Number of Picture passed to recognition algorithm which contains number plate 68 Total number of algorithm successes 63 Total number of failures 5 67

17 68

18 er 6 69

Toward Part-based Document Image Decoding

Toward Part-based Document Image Decoding 2012 10th IAPR International Workshop on Document Analysis Systems Toward Part-based Document Image Decoding Wang Song, Seiichi Uchida Kyushu University, Fukuoka, Japan wangsong@human.ait.kyushu-u.ac.jp,

More information

A Generalized Method to Solve Text-Based CAPTCHAs

A Generalized Method to Solve Text-Based CAPTCHAs A Generalized Method to Solve Text-Based CAPTCHAs Jason Ma, Bilal Badaoui, Emile Chamoun December 11, 2009 1 Abstract We present work in progress on the automated solving of text-based CAPTCHAs. Our method

More information

CS 223B Computer Vision Problem Set 3

CS 223B Computer Vision Problem Set 3 CS 223B Computer Vision Problem Set 3 Due: Feb. 22 nd, 2011 1 Probabilistic Recursion for Tracking In this problem you will derive a method for tracking a point of interest through a sequence of images.

More information

A System to Automatically Index Genealogical Microfilm Titleboards Introduction Preprocessing Method Identification

A System to Automatically Index Genealogical Microfilm Titleboards Introduction Preprocessing Method Identification A System to Automatically Index Genealogical Microfilm Titleboards Samuel James Pinson, Mark Pinson and William Barrett Department of Computer Science Brigham Young University Introduction Millions of

More information

2. On classification and related tasks

2. On classification and related tasks 2. On classification and related tasks In this part of the course we take a concise bird s-eye view of different central tasks and concepts involved in machine learning and classification particularly.

More information

Data Mining and Data Warehousing Classification-Lazy Learners

Data Mining and Data Warehousing Classification-Lazy Learners Motivation Data Mining and Data Warehousing Classification-Lazy Learners Lazy Learners are the most intuitive type of learners and are used in many practical scenarios. The reason of their popularity is

More information

Hidden Loop Recovery for Handwriting Recognition

Hidden Loop Recovery for Handwriting Recognition Hidden Loop Recovery for Handwriting Recognition David Doermann Institute of Advanced Computer Studies, University of Maryland, College Park, USA E-mail: doermann@cfar.umd.edu Nathan Intrator School of

More information

CS 231A Computer Vision (Fall 2012) Problem Set 3

CS 231A Computer Vision (Fall 2012) Problem Set 3 CS 231A Computer Vision (Fall 2012) Problem Set 3 Due: Nov. 13 th, 2012 (2:15pm) 1 Probabilistic Recursion for Tracking (20 points) In this problem you will derive a method for tracking a point of interest

More information

CRF Based Point Cloud Segmentation Jonathan Nation

CRF Based Point Cloud Segmentation Jonathan Nation CRF Based Point Cloud Segmentation Jonathan Nation jsnation@stanford.edu 1. INTRODUCTION The goal of the project is to use the recently proposed fully connected conditional random field (CRF) model to

More information

Equation to LaTeX. Abhinav Rastogi, Sevy Harris. I. Introduction. Segmentation.

Equation to LaTeX. Abhinav Rastogi, Sevy Harris. I. Introduction. Segmentation. Equation to LaTeX Abhinav Rastogi, Sevy Harris {arastogi,sharris5}@stanford.edu I. Introduction Copying equations from a pdf file to a LaTeX document can be time consuming because there is no easy way

More information

Advanced Image Processing, TNM034 Optical Music Recognition

Advanced Image Processing, TNM034 Optical Music Recognition Advanced Image Processing, TNM034 Optical Music Recognition Linköping University By: Jimmy Liikala, jimli570 Emanuel Winblad, emawi895 Toms Vulfs, tomvu491 Jenny Yu, jenyu080 1 Table of Contents Optical

More information

An Efficient Character Segmentation Based on VNP Algorithm

An Efficient Character Segmentation Based on VNP Algorithm Research Journal of Applied Sciences, Engineering and Technology 4(24): 5438-5442, 2012 ISSN: 2040-7467 Maxwell Scientific organization, 2012 Submitted: March 18, 2012 Accepted: April 14, 2012 Published:

More information

Report: Reducing the error rate of a Cat classifier

Report: Reducing the error rate of a Cat classifier Report: Reducing the error rate of a Cat classifier Raphael Sznitman 6 August, 2007 Abstract The following report discusses my work at the IDIAP from 06.2007 to 08.2007. This work had for objective to

More information

Training Algorithms for Robust Face Recognition using a Template-matching Approach

Training Algorithms for Robust Face Recognition using a Template-matching Approach Training Algorithms for Robust Face Recognition using a Template-matching Approach Xiaoyan Mu, Mehmet Artiklar, Metin Artiklar, and Mohamad H. Hassoun Department of Electrical and Computer Engineering

More information

Time Stamp Detection and Recognition in Video Frames

Time Stamp Detection and Recognition in Video Frames Time Stamp Detection and Recognition in Video Frames Nongluk Covavisaruch and Chetsada Saengpanit Department of Computer Engineering, Chulalongkorn University, Bangkok 10330, Thailand E-mail: nongluk.c@chula.ac.th

More information

A Framework for Efficient Fingerprint Identification using a Minutiae Tree

A Framework for Efficient Fingerprint Identification using a Minutiae Tree A Framework for Efficient Fingerprint Identification using a Minutiae Tree Praveer Mansukhani February 22, 2008 Problem Statement Developing a real-time scalable minutiae-based indexing system using a

More information

Computer security experts often tell us not to choose an easy to guess word as a password. For example, the user name or date of birth.

Computer security experts often tell us not to choose an easy to guess word as a password. For example, the user name or date of birth. Graphical Passwords: Computer security experts often tell us not to choose an easy to guess word as a password. For example, the user name or date of birth. The Graphical Passwords team have been working

More information

FUZZY INFERENCE SYSTEMS

FUZZY INFERENCE SYSTEMS CHAPTER-IV FUZZY INFERENCE SYSTEMS Fuzzy inference is the process of formulating the mapping from a given input to an output using fuzzy logic. The mapping then provides a basis from which decisions can

More information

OCR For Handwritten Marathi Script

OCR For Handwritten Marathi Script International Journal of Scientific & Engineering Research Volume 3, Issue 8, August-2012 1 OCR For Handwritten Marathi Script Mrs.Vinaya. S. Tapkir 1, Mrs.Sushma.D.Shelke 2 1 Maharashtra Academy Of Engineering,

More information

Part-Based Skew Estimation for Mathematical Expressions

Part-Based Skew Estimation for Mathematical Expressions Soma Shiraishi, Yaokai Feng, and Seiichi Uchida shiraishi@human.ait.kyushu-u.ac.jp {fengyk,uchida}@ait.kyushu-u.ac.jp Abstract We propose a novel method for the skew estimation on text images containing

More information

One type of these solutions is automatic license plate character recognition (ALPR).

One type of these solutions is automatic license plate character recognition (ALPR). 1.0 Introduction Modelling, Simulation & Computing Laboratory (msclab) A rapid technical growth in the area of computer image processing has increased the need for an efficient and affordable security,

More information

A Neural Network Based Bank Cheque Recognition system for Malaysian Cheques

A Neural Network Based Bank Cheque Recognition system for Malaysian Cheques A Neural Network Based Bank Cheque Recognition system for Malaysian Cheques Ahmad Ridhwan Wahap 1 Marzuki Khalid 1 Abd. Rahim Ahmad 3 Rubiyah Yusof 1 1 Centre for Artificial Intelligence and Robotics,

More information

Robust Shape Retrieval Using Maximum Likelihood Theory

Robust Shape Retrieval Using Maximum Likelihood Theory Robust Shape Retrieval Using Maximum Likelihood Theory Naif Alajlan 1, Paul Fieguth 2, and Mohamed Kamel 1 1 PAMI Lab, E & CE Dept., UW, Waterloo, ON, N2L 3G1, Canada. naif, mkamel@pami.uwaterloo.ca 2

More information

DATA EMBEDDING IN TEXT FOR A COPIER SYSTEM

DATA EMBEDDING IN TEXT FOR A COPIER SYSTEM DATA EMBEDDING IN TEXT FOR A COPIER SYSTEM Anoop K. Bhattacharjya and Hakan Ancin Epson Palo Alto Laboratory 3145 Porter Drive, Suite 104 Palo Alto, CA 94304 e-mail: {anoop, ancin}@erd.epson.com Abstract

More information

Handwritten Script Recognition at Block Level

Handwritten Script Recognition at Block Level Chapter 4 Handwritten Script Recognition at Block Level -------------------------------------------------------------------------------------------------------------------------- Optical character recognition

More information

Pedestrian Detection Using Correlated Lidar and Image Data EECS442 Final Project Fall 2016

Pedestrian Detection Using Correlated Lidar and Image Data EECS442 Final Project Fall 2016 edestrian Detection Using Correlated Lidar and Image Data EECS442 Final roject Fall 2016 Samuel Rohrer University of Michigan rohrer@umich.edu Ian Lin University of Michigan tiannis@umich.edu Abstract

More information

CHAPTER 8 COMPOUND CHARACTER RECOGNITION USING VARIOUS MODELS

CHAPTER 8 COMPOUND CHARACTER RECOGNITION USING VARIOUS MODELS CHAPTER 8 COMPOUND CHARACTER RECOGNITION USING VARIOUS MODELS 8.1 Introduction The recognition systems developed so far were for simple characters comprising of consonants and vowels. But there is one

More information

Cs : Computer Vision Final Project Report

Cs : Computer Vision Final Project Report Cs 600.461: Computer Vision Final Project Report Giancarlo Troni gtroni@jhu.edu Raphael Sznitman sznitman@jhu.edu Abstract Given a Youtube video of a busy street intersection, our task is to detect, track,

More information

Object Classification Using Tripod Operators

Object Classification Using Tripod Operators Object Classification Using Tripod Operators David Bonanno, Frank Pipitone, G. Charmaine Gilbreath, Kristen Nock, Carlos A. Font, and Chadwick T. Hawley US Naval Research Laboratory, 4555 Overlook Ave.

More information

Module 7 VIDEO CODING AND MOTION ESTIMATION

Module 7 VIDEO CODING AND MOTION ESTIMATION Module 7 VIDEO CODING AND MOTION ESTIMATION Lesson 22 Other fast search motion estimation algorithms At the end of this lesson, the students should be able to: 1. Provide an overview of the following fast

More information

(Refer Slide Time 00:17) Welcome to the course on Digital Image Processing. (Refer Slide Time 00:22)

(Refer Slide Time 00:17) Welcome to the course on Digital Image Processing. (Refer Slide Time 00:22) Digital Image Processing Prof. P. K. Biswas Department of Electronics and Electrical Communications Engineering Indian Institute of Technology, Kharagpur Module Number 01 Lecture Number 02 Application

More information

Isolated Handwritten Words Segmentation Techniques in Gurmukhi Script

Isolated Handwritten Words Segmentation Techniques in Gurmukhi Script Isolated Handwritten Words Segmentation Techniques in Gurmukhi Script Galaxy Bansal Dharamveer Sharma ABSTRACT Segmentation of handwritten words is a challenging task primarily because of structural features

More information

Chapter 4. Clustering Core Atoms by Location

Chapter 4. Clustering Core Atoms by Location Chapter 4. Clustering Core Atoms by Location In this chapter, a process for sampling core atoms in space is developed, so that the analytic techniques in section 3C can be applied to local collections

More information

Comparative Study of Partial Closed-loop Versus Open-loop Motion Estimation for Coding of HDTV

Comparative Study of Partial Closed-loop Versus Open-loop Motion Estimation for Coding of HDTV Comparative Study of Partial Closed-loop Versus Open-loop Motion Estimation for Coding of HDTV Jeffrey S. McVeigh 1 and Siu-Wai Wu 2 1 Carnegie Mellon University Department of Electrical and Computer Engineering

More information

A Labeling Approach for Mixed Document Blocks. A. Bela d and O. T. Akindele. Crin-Cnrs/Inria-Lorraine, B timent LORIA, Campus Scientique, B.P.

A Labeling Approach for Mixed Document Blocks. A. Bela d and O. T. Akindele. Crin-Cnrs/Inria-Lorraine, B timent LORIA, Campus Scientique, B.P. A Labeling Approach for Mixed Document Blocks A. Bela d and O. T. Akindele Crin-Cnrs/Inria-Lorraine, B timent LORIA, Campus Scientique, B.P. 39, 54506 Vand uvre-l s-nancy Cedex. France. Abstract A block

More information

Review and Implementation of DWT based Scalable Video Coding with Scalable Motion Coding.

Review and Implementation of DWT based Scalable Video Coding with Scalable Motion Coding. Project Title: Review and Implementation of DWT based Scalable Video Coding with Scalable Motion Coding. Midterm Report CS 584 Multimedia Communications Submitted by: Syed Jawwad Bukhari 2004-03-0028 About

More information

Getting Students Excited About Learning Mathematics

Getting Students Excited About Learning Mathematics Getting Students Excited About Learning Mathematics Introduction Jen Mei Chang Department of Mathematics and Statistics California State University, Long Beach jchang9@csulb.edu It wasn t so long ago when

More information

Optical Character Recognition (OCR) for Printed Devnagari Script Using Artificial Neural Network

Optical Character Recognition (OCR) for Printed Devnagari Script Using Artificial Neural Network International Journal of Computer Science & Communication Vol. 1, No. 1, January-June 2010, pp. 91-95 Optical Character Recognition (OCR) for Printed Devnagari Script Using Artificial Neural Network Raghuraj

More information

A Novel Approach to Image Segmentation for Traffic Sign Recognition Jon Jay Hack and Sidd Jagadish

A Novel Approach to Image Segmentation for Traffic Sign Recognition Jon Jay Hack and Sidd Jagadish A Novel Approach to Image Segmentation for Traffic Sign Recognition Jon Jay Hack and Sidd Jagadish Introduction/Motivation: As autonomous vehicles, such as Google s self-driving car, have recently become

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION CHAPTER 1 INTRODUCTION 1.1 Introduction Pattern recognition is a set of mathematical, statistical and heuristic techniques used in executing `man-like' tasks on computers. Pattern recognition plays an

More information

Chapter 9. Software Testing

Chapter 9. Software Testing Chapter 9. Software Testing Table of Contents Objectives... 1 Introduction to software testing... 1 The testers... 2 The developers... 2 An independent testing team... 2 The customer... 2 Principles of

More information

Going digital Challenge & solutions in a newspaper archiving project. Andrey Lomov ATAPY Software Russia

Going digital Challenge & solutions in a newspaper archiving project. Andrey Lomov ATAPY Software Russia Going digital Challenge & solutions in a newspaper archiving project Andrey Lomov ATAPY Software Russia Problem Description Poor recognition results caused by low image quality: noise, white holes in characters,

More information

Digital Image Processing. Prof. P.K. Biswas. Department of Electronics & Electrical Communication Engineering

Digital Image Processing. Prof. P.K. Biswas. Department of Electronics & Electrical Communication Engineering Digital Image Processing Prof. P.K. Biswas Department of Electronics & Electrical Communication Engineering Indian Institute of Technology, Kharagpur Image Segmentation - III Lecture - 31 Hello, welcome

More information

Recognizing hand-drawn images using shape context

Recognizing hand-drawn images using shape context Recognizing hand-drawn images using shape context Gyozo Gidofalvi Department of Computer Science and Engineering University of California, San Diego La Jolla, CA 92037 gyozo@cs.ucsd.edu Abstract The objective

More information

Vision Based Parking Space Classification

Vision Based Parking Space Classification 1 Vision Based Parking Space Classification Ananth Nallamuthu, Sandeep Lokala, Department of ECE, Clemson University. Abstract The problem of Vacant Parking space detection from static images using computer

More information

AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE

AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE sbsridevi89@gmail.com 287 ABSTRACT Fingerprint identification is the most prominent method of biometric

More information

Area and Perimeter EXPERIMENT. How are the area and perimeter of a rectangle related? You probably know the formulas by heart:

Area and Perimeter EXPERIMENT. How are the area and perimeter of a rectangle related? You probably know the formulas by heart: Area and Perimeter How are the area and perimeter of a rectangle related? You probably know the formulas by heart: Area Length Width Perimeter (Length Width) But if you look at data for many different

More information

A Model-based Line Detection Algorithm in Documents

A Model-based Line Detection Algorithm in Documents A Model-based Line Detection Algorithm in Documents Yefeng Zheng, Huiping Li, David Doermann Laboratory for Language and Media Processing Institute for Advanced Computer Studies University of Maryland,

More information

Logical Templates for Feature Extraction in Fingerprint Images

Logical Templates for Feature Extraction in Fingerprint Images Logical Templates for Feature Extraction in Fingerprint Images Bir Bhanu, Michael Boshra and Xuejun Tan Center for Research in Intelligent Systems University of Califomia, Riverside, CA 9252 1, USA Email:

More information

Detecting Spam with Artificial Neural Networks

Detecting Spam with Artificial Neural Networks Detecting Spam with Artificial Neural Networks Andrew Edstrom University of Wisconsin - Madison Abstract This is my final project for CS 539. In this project, I demonstrate the suitability of neural networks

More information

Feature Extractors. CS 188: Artificial Intelligence Fall Some (Vague) Biology. The Binary Perceptron. Binary Decision Rule.

Feature Extractors. CS 188: Artificial Intelligence Fall Some (Vague) Biology. The Binary Perceptron. Binary Decision Rule. CS 188: Artificial Intelligence Fall 2008 Lecture 24: Perceptrons II 11/24/2008 Dan Klein UC Berkeley Feature Extractors A feature extractor maps inputs to feature vectors Dear Sir. First, I must solicit

More information

OBJECT detection in general has many applications

OBJECT detection in general has many applications 1 Implementing Rectangle Detection using Windowed Hough Transform Akhil Singh, Music Engineering, University of Miami Abstract This paper implements Jung and Schramm s method to use Hough Transform for

More information

Slant Correction using Histograms

Slant Correction using Histograms Slant Correction using Histograms Frank de Zeeuw Bachelor s Thesis in Artificial Intelligence Supervised by Axel Brink & Tijn van der Zant July 12, 2006 Abstract Slant is one of the characteristics that

More information

Depiction of program declaring a variable and then assigning it a value

Depiction of program declaring a variable and then assigning it a value Programming languages I have found, the easiest first computer language to learn is VBA, the macro programming language provided with Microsoft Office. All examples below, will All modern programming languages

More information

Cluster Analysis using Spherical SOM

Cluster Analysis using Spherical SOM Cluster Analysis using Spherical SOM H. Tokutaka 1, P.K. Kihato 2, K. Fujimura 2 and M. Ohkita 2 1) SOM Japan Co-LTD, 2) Electrical and Electronic Department, Tottori University Email: {tokutaka@somj.com,

More information

3 Graphical Displays of Data

3 Graphical Displays of Data 3 Graphical Displays of Data Reading: SW Chapter 2, Sections 1-6 Summarizing and Displaying Qualitative Data The data below are from a study of thyroid cancer, using NMTR data. The investigators looked

More information

The Detection of Faces in Color Images: EE368 Project Report

The Detection of Faces in Color Images: EE368 Project Report The Detection of Faces in Color Images: EE368 Project Report Angela Chau, Ezinne Oji, Jeff Walters Dept. of Electrical Engineering Stanford University Stanford, CA 9435 angichau,ezinne,jwalt@stanford.edu

More information

EE368 Project Report CD Cover Recognition Using Modified SIFT Algorithm

EE368 Project Report CD Cover Recognition Using Modified SIFT Algorithm EE368 Project Report CD Cover Recognition Using Modified SIFT Algorithm Group 1: Mina A. Makar Stanford University mamakar@stanford.edu Abstract In this report, we investigate the application of the Scale-Invariant

More information

Two-dimensional Totalistic Code 52

Two-dimensional Totalistic Code 52 Two-dimensional Totalistic Code 52 Todd Rowland Senior Research Associate, Wolfram Research, Inc. 100 Trade Center Drive, Champaign, IL The totalistic two-dimensional cellular automaton code 52 is capable

More information

Tutorial 3. Jun Xu, Teaching Asistant csjunxu/ February 16, COMP4134 Biometrics Authentication

Tutorial 3. Jun Xu, Teaching Asistant   csjunxu/ February 16, COMP4134 Biometrics Authentication Tutorial 3 Jun Xu, Teaching Asistant http://www4.comp.polyu.edu.hk/ csjunxu/ COMP4134 Biometrics Authentication February 16, 2017 Table of Contents Problems Problem 1: Answer the questions Problem 2: Pattern

More information

Keywords: clustering, construction, machine vision

Keywords: clustering, construction, machine vision CS4758: Robot Construction Worker Alycia Gailey, biomedical engineering, graduate student: asg47@cornell.edu Alex Slover, computer science, junior: ais46@cornell.edu Abstract: Progress has been made in

More information

A System for Joining and Recognition of Broken Bangla Numerals for Indian Postal Automation

A System for Joining and Recognition of Broken Bangla Numerals for Indian Postal Automation A System for Joining and Recognition of Broken Bangla Numerals for Indian Postal Automation K. Roy, U. Pal and B. B. Chaudhuri CVPR Unit; Indian Statistical Institute, Kolkata-108; India umapada@isical.ac.in

More information

(Refer Slide Time: 00:02:00)

(Refer Slide Time: 00:02:00) Computer Graphics Prof. Sukhendu Das Dept. of Computer Science and Engineering Indian Institute of Technology, Madras Lecture - 18 Polyfill - Scan Conversion of a Polygon Today we will discuss the concepts

More information

Including the Size of Regions in Image Segmentation by Region Based Graph

Including the Size of Regions in Image Segmentation by Region Based Graph International Journal of Emerging Engineering Research and Technology Volume 3, Issue 4, April 2015, PP 81-85 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Including the Size of Regions in Image Segmentation

More information

CS231A Course Project Final Report Sign Language Recognition with Unsupervised Feature Learning

CS231A Course Project Final Report Sign Language Recognition with Unsupervised Feature Learning CS231A Course Project Final Report Sign Language Recognition with Unsupervised Feature Learning Justin Chen Stanford University justinkchen@stanford.edu Abstract This paper focuses on experimenting with

More information

Morphological Image Processing

Morphological Image Processing Morphological Image Processing Ranga Rodrigo October 9, 29 Outline Contents Preliminaries 2 Dilation and Erosion 3 2. Dilation.............................................. 3 2.2 Erosion..............................................

More information

Worksheet Answer Key: Scanning and Mapping Projects > Mine Mapping > Investigation 2

Worksheet Answer Key: Scanning and Mapping Projects > Mine Mapping > Investigation 2 Worksheet Answer Key: Scanning and Mapping Projects > Mine Mapping > Investigation 2 Ruler Graph: Analyze your graph 1. Examine the shape formed by the connected dots. i. Does the connected graph create

More information

7. Decision or classification trees

7. Decision or classification trees 7. Decision or classification trees Next we are going to consider a rather different approach from those presented so far to machine learning that use one of the most common and important data structure,

More information

CHAPTER 3 ADAPTIVE DECISION BASED MEDIAN FILTER WITH FUZZY LOGIC

CHAPTER 3 ADAPTIVE DECISION BASED MEDIAN FILTER WITH FUZZY LOGIC 48 CHAPTER 3 ADAPTIVE DECISION BASED MEDIAN ILTER WITH UZZY LOGIC In the previous algorithm, the noisy pixel is replaced by trimmed mean value, when all the surrounding pixels of noisy pixel are noisy.

More information

Lecture #3: PageRank Algorithm The Mathematics of Google Search

Lecture #3: PageRank Algorithm The Mathematics of Google Search Lecture #3: PageRank Algorithm The Mathematics of Google Search We live in a computer era. Internet is part of our everyday lives and information is only a click away. Just open your favorite search engine,

More information

On Adaptive Confidences for Critic-Driven Classifier Combining

On Adaptive Confidences for Critic-Driven Classifier Combining On Adaptive Confidences for Critic-Driven Classifier Combining Matti Aksela and Jorma Laaksonen Neural Networks Research Centre Laboratory of Computer and Information Science P.O.Box 5400, Fin-02015 HUT,

More information

Face Recognition using Eigenfaces SMAI Course Project

Face Recognition using Eigenfaces SMAI Course Project Face Recognition using Eigenfaces SMAI Course Project Satarupa Guha IIIT Hyderabad 201307566 satarupa.guha@research.iiit.ac.in Ayushi Dalmia IIIT Hyderabad 201307565 ayushi.dalmia@research.iiit.ac.in Abstract

More information

Offline Signature verification and recognition using ART 1

Offline Signature verification and recognition using ART 1 Offline Signature verification and recognition using ART 1 R. Sukanya K.Malathy M.E Infant Jesus College of Engineering And Technology Abstract: The main objective of this project is signature verification

More information

Learning to Learn: additional notes

Learning to Learn: additional notes MASSACHUSETTS INSTITUTE OF TECHNOLOGY Department of Electrical Engineering and Computer Science 6.034 Artificial Intelligence, Fall 2008 Recitation October 23 Learning to Learn: additional notes Bob Berwick

More information

Discover the Depths of your Data with iarchives OWR The benefits of Optical Word Recognition

Discover the Depths of your Data with iarchives OWR The benefits of Optical Word Recognition Discover the Depths of your Data with iarchives OWR The benefits of Optical Word Recognition Through unique technological developments, iarchives is continually exceeding the quality and efficiency standards

More information

Line Net Global Vectorization: an Algorithm and Its Performance Evaluation

Line Net Global Vectorization: an Algorithm and Its Performance Evaluation Line Net Global Vectorization: an Algorithm and Its Performance Evaluation Jiqiang Song 1, Feng Su 1, Jibing Chen 1, Chiewlan Tai 2, and Shijie Cai 1 1 Department of Computer Science of Nanjing University,

More information

IRIS SEGMENTATION OF NON-IDEAL IMAGES

IRIS SEGMENTATION OF NON-IDEAL IMAGES IRIS SEGMENTATION OF NON-IDEAL IMAGES William S. Weld St. Lawrence University Computer Science Department Canton, NY 13617 Xiaojun Qi, Ph.D Utah State University Computer Science Department Logan, UT 84322

More information

Solving Word Jumbles

Solving Word Jumbles Solving Word Jumbles Debabrata Sengupta, Abhishek Sharma Department of Electrical Engineering, Stanford University { dsgupta, abhisheksharma }@stanford.edu Abstract In this report we propose an algorithm

More information

Machine Learning and Pervasive Computing

Machine Learning and Pervasive Computing Stephan Sigg Georg-August-University Goettingen, Computer Networks 17.12.2014 Overview and Structure 22.10.2014 Organisation 22.10.3014 Introduction (Def.: Machine learning, Supervised/Unsupervised, Examples)

More information

Graph Structure Over Time

Graph Structure Over Time Graph Structure Over Time Observing how time alters the structure of the IEEE data set Priti Kumar Computer Science Rensselaer Polytechnic Institute Troy, NY Kumarp3@rpi.edu Abstract This paper examines

More information

Stefano Cavuoti INAF Capodimonte Astronomical Observatory Napoli

Stefano Cavuoti INAF Capodimonte Astronomical Observatory Napoli Stefano Cavuoti INAF Capodimonte Astronomical Observatory Napoli By definition, machine learning models are based on learning and self-adaptive techniques. A priori, real world data are intrinsically carriers

More information

Identifying Layout Classes for Mathematical Symbols Using Layout Context

Identifying Layout Classes for Mathematical Symbols Using Layout Context Rochester Institute of Technology RIT Scholar Works Articles 2009 Identifying Layout Classes for Mathematical Symbols Using Layout Context Ling Ouyang Rochester Institute of Technology Richard Zanibbi

More information

CS 4758 Robot Navigation Through Exit Sign Detection

CS 4758 Robot Navigation Through Exit Sign Detection CS 4758 Robot Navigation Through Exit Sign Detection Aaron Sarna Michael Oleske Andrew Hoelscher Abstract We designed a set of algorithms that utilize the existing corridor navigation code initially created

More information

Human Motion Detection and Tracking for Video Surveillance

Human Motion Detection and Tracking for Video Surveillance Human Motion Detection and Tracking for Video Surveillance Prithviraj Banerjee and Somnath Sengupta Department of Electronics and Electrical Communication Engineering Indian Institute of Technology, Kharagpur,

More information

Segmentation of Images

Segmentation of Images Segmentation of Images SEGMENTATION If an image has been preprocessed appropriately to remove noise and artifacts, segmentation is often the key step in interpreting the image. Image segmentation is a

More information

Clustering & Classification (chapter 15)

Clustering & Classification (chapter 15) Clustering & Classification (chapter 5) Kai Goebel Bill Cheetham RPI/GE Global Research goebel@cs.rpi.edu cheetham@cs.rpi.edu Outline k-means Fuzzy c-means Mountain Clustering knn Fuzzy knn Hierarchical

More information

Computer Graphics. The Two-Dimensional Viewing. Somsak Walairacht, Computer Engineering, KMITL

Computer Graphics. The Two-Dimensional Viewing. Somsak Walairacht, Computer Engineering, KMITL Computer Graphics Chapter 6 The Two-Dimensional Viewing Somsak Walairacht, Computer Engineering, KMITL Outline The Two-Dimensional Viewing Pipeline The Clipping Window Normalization and Viewport Transformations

More information

Creating Icons for Leopard Buttons

Creating Icons for Leopard Buttons Creating Icons for Leopard Buttons Introduction Among the new features that C-Max 2.0 brings to the Ocelot and Leopard controllers, one of the more sophisticated ones allows the user to create icons that

More information

Enhanced Hemisphere Concept for Color Pixel Classification

Enhanced Hemisphere Concept for Color Pixel Classification 2016 International Conference on Multimedia Systems and Signal Processing Enhanced Hemisphere Concept for Color Pixel Classification Van Ng Graduate School of Information Sciences Tohoku University Sendai,

More information

3 Graphical Displays of Data

3 Graphical Displays of Data 3 Graphical Displays of Data Reading: SW Chapter 2, Sections 1-6 Summarizing and Displaying Qualitative Data The data below are from a study of thyroid cancer, using NMTR data. The investigators looked

More information

Automatic Machinery Fault Detection and Diagnosis Using Fuzzy Logic

Automatic Machinery Fault Detection and Diagnosis Using Fuzzy Logic Automatic Machinery Fault Detection and Diagnosis Using Fuzzy Logic Chris K. Mechefske Department of Mechanical and Materials Engineering The University of Western Ontario London, Ontario, Canada N6A5B9

More information

Motivation. Technical Background

Motivation. Technical Background Handling Outliers through Agglomerative Clustering with Full Model Maximum Likelihood Estimation, with Application to Flow Cytometry Mark Gordon, Justin Li, Kevin Matzen, Bryce Wiedenbeck Motivation Clustering

More information

Semi-Automatic Transcription Tool for Ancient Manuscripts

Semi-Automatic Transcription Tool for Ancient Manuscripts The Venice Atlas A Digital Humanities atlas project by DH101 EPFL Students Semi-Automatic Transcription Tool for Ancient Manuscripts In this article, we investigate various techniques from the fields of

More information

Postprint.

Postprint. http://www.diva-portal.org Postprint This is the accepted version of a paper presented at 14th International Conference of the Biometrics Special Interest Group, BIOSIG, Darmstadt, Germany, 9-11 September,

More information

Chapter 3 Image Registration. Chapter 3 Image Registration

Chapter 3 Image Registration. Chapter 3 Image Registration Chapter 3 Image Registration Distributed Algorithms for Introduction (1) Definition: Image Registration Input: 2 images of the same scene but taken from different perspectives Goal: Identify transformation

More information

EE368 Project: Visual Code Marker Detection

EE368 Project: Visual Code Marker Detection EE368 Project: Visual Code Marker Detection Kahye Song Group Number: 42 Email: kahye@stanford.edu Abstract A visual marker detection algorithm has been implemented and tested with twelve training images.

More information

MORPHOLOGICAL EDGE DETECTION AND CORNER DETECTION ALGORITHM USING CHAIN-ENCODING

MORPHOLOGICAL EDGE DETECTION AND CORNER DETECTION ALGORITHM USING CHAIN-ENCODING MORPHOLOGICAL EDGE DETECTION AND CORNER DETECTION ALGORITHM USING CHAIN-ENCODING Neeta Nain, Vijay Laxmi, Ankur Kumar Jain & Rakesh Agarwal Department of Computer Engineering Malaviya National Institute

More information

Computer Graphics. Attributes of Graphics Primitives. Somsak Walairacht, Computer Engineering, KMITL 1

Computer Graphics. Attributes of Graphics Primitives. Somsak Walairacht, Computer Engineering, KMITL 1 Computer Graphics Chapter 4 Attributes of Graphics Primitives Somsak Walairacht, Computer Engineering, KMITL 1 Outline OpenGL State Variables Point Attributes t Line Attributes Fill-Area Attributes Scan-Line

More information

The Problem of Calculating Vertex Normals for Unevenly Subdivided Smooth Surfaces

The Problem of Calculating Vertex Normals for Unevenly Subdivided Smooth Surfaces The Problem of Calculating Vertex Normals for Unevenly Subdivided Smooth Surfaces Ted Schundler tschundler (a) gmail _ com Abstract: Simply averaging normals of the faces sharing a vertex does not produce

More information

Estimating the wavelength composition of scene illumination from image data is an

Estimating the wavelength composition of scene illumination from image data is an Chapter 3 The Principle and Improvement for AWB in DSC 3.1 Introduction Estimating the wavelength composition of scene illumination from image data is an important topics in color engineering. Solutions

More information