A Computer Vision System for Automated Container Code Recognition

Similar documents
A Binarization Algorithm specialized on Document Images and Photos

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

An Image Fusion Approach Based on Segmentation Region

TN348: Openlab Module - Colocalization

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Research and Application of Fingerprint Recognition Based on MATLAB

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity

An Improved Image Segmentation Algorithm Based on the Otsu Method

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Face Recognition Based on SVM and 2DPCA

Local Quaternary Patterns and Feature Local Quaternary Patterns

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images

Pictures at an Exhibition

Face Recognition University at Buffalo CSE666 Lecture Slides Resources:

Range images. Range image registration. Examples of sampling patterns. Range images and range surfaces

Cluster Analysis of Electrical Behavior

Feature Reduction and Selection

A Novel Adaptive Descriptor Algorithm for Ternary Pattern Textures

A PATTERN RECOGNITION APPROACH TO IMAGE SEGMENTATION

Face Recognition by Fusing Binary Edge Feature and Second-order Mutual Information

Histogram-Enhanced Principal Component Analysis for Face Recognition

Fuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches

Image Alignment CSC 767

Classifying Acoustic Transient Signals Using Artificial Intelligence

Video Object Tracking Based On Extended Active Shape Models With Color Information

Detection of an Object by using Principal Component Analysis

PCA Based Gait Segmentation

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting

Recognizing Faces. Outline

The Research of Support Vector Machine in Agricultural Data Classification

A new segmentation algorithm for medical volume image based on K-means clustering

Modular PCA Face Recognition Based on Weighted Average

Human Face Recognition Using Generalized. Kernel Fisher Discriminant

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

Image Representation & Visualization Basic Imaging Algorithms Shape Representation and Analysis. outline

Classification of Face Images Based on Gender using Dimensionality Reduction Techniques and SVM

Feature Extractions for Iris Recognition

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

EDGE DETECTION USING MULTISPECTRAL THRESHOLDING

SRBIR: Semantic Region Based Image Retrieval by Extracting the Dominant Region and Semantic Learning

A B-Snake Model Using Statistical and Geometric Information - Applications to Medical Images

Unsupervised Learning

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements

2-Dimensional Image Representation. Using Beta-Spline

A NEW FUZZY C-MEANS BASED SEGMENTATION STRATEGY. APPLICATIONS TO LIP REGION IDENTIFICATION

Fast Feature Value Searching for Face Detection

A fast algorithm for color image segmentation

Maximum Variance Combined with Adaptive Genetic Algorithm for Infrared Image Segmentation

On Modeling Variations For Face Authentication

Face Detection with Deep Learning

Lecture 13: High-dimensional Images

Background Removal in Image indexing and Retrieval

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Comparison Study of Textural Descriptors for Training Neural Network Classifiers

Edge Detection in Noisy Images Using the Support Vector Machines

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters

ANALYSIS OF ADAPTIF LOCAL REGION IMPLEMENTATION ON LOCAL THRESHOLDING METHOD

Hybrid Non-Blind Color Image Watermarking

Feature Selection for Target Detection in SAR Images

A Gradient Difference based Technique for Video Text Detection

Robust Classification of ph Levels on a Camera Phone

S1 Note. Basis functions.

A Background Subtraction for a Vision-based User Interface *

A Gradient Difference based Technique for Video Text Detection

12/2/2009. Announcements. Parametric / Non-parametric. Case-Based Reasoning. Nearest-Neighbor on Images. Nearest-Neighbor Classification

ABSTRACT 1. INTRODUCTION

Mining Image Features in an Automatic Two- Dimensional Shape Recognition System

Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram

A Study on Clustering for Clustering Based Image De-Noising

Fuzzy Logic Based RS Image Classification Using Maximum Likelihood and Mahalanobis Distance Classifiers

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines

An Optimal Algorithm for Prufer Codes *

Gender Classification using Interlaced Derivative Patterns

Lecture 4: Principal components

Computer Generated Integral Imaging (II) System Using Depth-Camera

CLASSIFICATION OF ULTRASONIC SIGNALS

Object-Based Techniques for Image Retrieval

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide

Life Tables (Times) Summary. Sample StatFolio: lifetable times.sgp

Accurate Overlay Text Extraction for Digital Video Analysis

Fuzzy C-Means Initialized by Fixed Threshold Clustering for Improving Image Retrieval

A Clustering Algorithm for Key Frame Extraction Based on Density Peak

3D Face Reconstruction With Local Feature Refinement. Abstract

A Novel Video Retrieval Method Based on Web Community Extraction Using Features of Video Materials

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES

An Efficient Background Updating Scheme for Real-time Traffic Monitoring

1. Introduction. Abstract

Histogram of Template for Pedestrian Detection

Novel Fuzzy logic Based Edge Detection Technique

Scale Selective Extended Local Binary Pattern For Texture Classification

Open Access Early Fire Smoke Image Segmentation in a Complex Large Space

Classifier Selection Based on Data Complexity Measures *

Correlative features for the classification of textural images

Transcription:

A Computer Vson System for Automated Contaner Code Recognton Hsn-Chen Chen, Chh-Ka Chen, Fu-Yu Hsu, Yu-San Ln, Yu-Te Wu, Yung-Nen Sun * Abstract Contaner code examnaton s an essental step n the contaner flow management. To date, ths step s mostly acheved by human vsual nspectons, whch are however tme-consumng and error-prone. We hence propose a new computer vson system for automated contaner code recognton. The proposed system conssts of model constructon and code recognton stages. In the model constructon stage, we frst ncorporate a locally thresholdng method wth pror knowledge of code character geometry to segment the code characters, ncludng Englsh characters A-Z and numerc characters 0-9, from a tranng set of contaner mages. Wth the segmentaton results of each character, we subsequently construct ts Egen-feature model usng the prncpal component analyss (PCA). In the recognton stage, the code characters are frstly segmented from the gven contaner mage. Each segmented character s then recognzed by fndng the best matched Egen-feature model that mantans the mnmal PCA reconstructon error of the character appearance. Experments showed that the proposed method acheved the code recognton wth a hgh recognton rate and lttle recognton tme for each mage automatcally. Overall, our proposed system has great potental for mprovng the effcency of contaner termnals as well as enhancng the contaner management. Index Terms code recognton, locally thresholdng, character geometry, Egen-feature model, prncpal component analyss C I. INTRODUCTION ONTAINER code examnaton s a crtcal step n the procedure of contaner securty and flow management. Manuscrpt receved December 28, 2010. Ths work was supported under contract CSIST-0839-V201 (99) from the Chung-Shan Insttute of Scence and Technology, Tawan, R.O.C. and utlzed the shared facltes supported by the Program of Top 100 Unverstes Advancement, Mnstry of Educaton, Tawan, R.O.C.. H.C. Chen s wth Department of Computer Scence and Informaton (e-mal: wale1212@gmal.com). C.K. Chen s wth Department of Computer Scence and Informaton (e-mal: heartthrob.ka@gmal.com). F.Y. Hsu s wth Department of Computer Scence and Informaton (e-mal: cash.barca@gmal.com). Y.S. Ln s wth Arborne Electronc Secton, Electronc System Research Dvson, Chung-Shan Insttute of Scence and Technology, Taoyuan, Tawan, R.O.C. (e-mal: dostoevosky@yahoo.com.tw). Y.T. Wu s wth Department of Bomedcal Imagng and Radologcal Scences, Natonal Yang-Mng Unversty, Tape, Tawan, R.O.C. (e-mal: ytwu@ym.edu.tw). Y.N. Sun s wth Department of Computer Scence and Informaton (correspondng author to provde phone: +886-6-2757575 ext. 62526; fax: +886-6-2747076; e-mal: ynsun@mal.ncku.edu.tw). Nowadays, human vsual nspecton, whch s laborous and error-prone, remans the most common approach n port gates for checkng the nformaton of contaners. Rapdly and relably examnng the contaner code, whch s helpful for ncreasng the economc effcency of contaner termnals, hence becomes mportant. For ths purpose, our research ams to develop a computer vson system for automated contaner code recognton. The proposed computer vson system contans two techncal parts, whch are code segmentaton and recognton. Up to present, there have been several knds of methods developed for mage segmentaton, and a popular one s the thresholdng-based method [1] [5]. Otsu s thresholdng method [1] s a typcal one of global thresholdng. It dvdes the mage nto foreground and background regons based on the optmal computaton wth ntensty hstogram of the entre mage. Bascally, the Otsu s method s easy to mplement and effcent n computaton. However, t may not be suted for the mages whose ntensty hstogram s not bmodal. On the other hand, locally thresholdng methods estmate a threshold value for every pxel n the mage based on the ntensty dstrbuton of ts neghborhood. Therefore, they are less constraned by the global ntensty dstrbuton of the mage. Pradhan et al. [3] proposed a locally thresholdng method wth adaptve wndow to segment objects from the mages under uneven lghtng condton. Moreover, the locally thresholdng technques were employed n the applcatons of medcal mage analyss for segmentng tssues of nterest, such as the works of Zhang et al. [4] and Peng et al. [5]. Overall, the thresholdng-based methods segment objects manly based on the ntensty value. Hence, rrelevant regons wth ntensty values smlar to the target objects tend to be ncluded n the thresholded results. To resolve ths problem, features other than ntensty value, should be taken nto account n the segmentaton protocols. For example, Sankaran et al. [6] ncorporated the geometry nformaton of cells, ncludng area and shape, nto the segmentaton process and obtaned satsfactory segmentaton results. As to the character recognton part, the correlaton coeffcent s commonly used to evaluate the smlarty of grey-level dstrbuton between two segmented character regons [7]. However, the correlaton coeffcent s senstve to the pose varaton between the characters. To overcome ths problem, Wakahara et al. [8] proposed a character recognton algorthm based on the non-rgd regstraton. Unfortunately, ther method suffers a lot from computatonal cost. The computaton problem and recognton rate can be sgnfcantly mproved by carefully selectng the mage space of character recognton. Moreover, the egen space s a

wdely adopted feature space for character recognton. Park et al. [9] and Manjunath et al. [10] recognzed characters based on the Egen-feature space and acheved good results. These lteratures manly focused on character recognton, and however, less dscussed the detals of segmentaton. In ths paper, character segmentaton and recognton are both addressed for automated contaner code recognton. The features of proposed method are descrbed below. Frst, we ncorporate a locally thresholdng method wth pror knowledge of character geometry to segment the characters from contaner mages automatcally. Second, the Egen-feature space, whch can better accommodate the noses and deformaton n character appearances, s thus adopted to recognze the segmented code characters. Thrd, we employ the generaton rule of code characters n the recognton protocol to reduce the ms-recognton rate. Expermental results showed that our proposed system could acheve promsng results wth a hgh recognton rate and low computatonal tme. (a) II. OVERVIEW OF THE PROPOSED METHOD The proposed method conssts of model constructon and code recognton stages. In the model constructon stage, we frstly segment the code characters from a tranng set of contaner mages by ncorporatng a locally thresholdng method wth pror knowledge of code character geometry. We subsequently construct an Egen-feature model for each code character based on ts segmentaton results on the tranng mages. Gven a contaner mage n the code recognton stage, we segment the code characters usng the above-mentoned segmentaton protocol. Each segmented character s then recognzed by fndng the best matched Egen-feature model that mantans the mnmal reconstructon error of character appearance. The detals of the proposed method are descrbed n the followng sectons. (b) (c) III. MODEL CONSTRUCTION A. Locally Thresholdng Segmentaton Three ntensty propertes of contaner mage are used to segment the contaner code characters. Frst, the code characters are wth smlar ntenstes to each other. Second, the ntensty contrast of characters wth respect to ther surroundngs s large. Thrd, there s possble uneven sunlght llumnaton n the mage. Based on these observatons, we hence select the locally thresholdng method [11] to segment the contaner code characters. The locally thresholdng method s desgned based on the ntensty dstrbuton of the neghborhood of every ndvdual pxel n the mage. At frst, we transform the nput mage from RGB color to grayscale. Then, we slde a fxed-szed wndow over the mage. For each pxel at the center of the wndow, we calculate the average ntensty from the neghborhood pxels covered by the wndow. The examned pxel s classfed as the foreground (wth zero ntensty n Fg. 1(c) and Fg. 1(d)) f ts ntensty s lower than c percent of the average ntensty, and s assgned as the background otherwse. After ths step, we can obtan the segmented (d) Fg. 1. Locally thresholdng segmentaton: (a) and (b) the orgnal contaner mages; (c) and (d) the segmentaton results of (a) and (b) respectvely. foreground denoted as FG. We also employed the ntegral mage technque to speed up the threshold computaton. The length of the sde of the sldng wndow was set to 1/30 of the mage wdth, and c was assgned as 80. The aforementoned thresholdng crteron s only sutable for the contaner mage, n whch the code character regons are darker than the surroundng regons. In some cases, the ntenstes of code characters, however, may be hgher than those of surroundng regons. An erroneous segmentaton may thus occur such that the code characters are msclassfed nto the background. Therefore, a confrmaton strategy s desgned to compensate ths lmtaton. At frst, we apply the Otsu s method [1] to the orgnal grayscale mage and obtan two clusters of pxels denoted as C1 and C2. Snce the contaner occupes most parts of the mage, t s supposed to be ncluded n the larger szed cluster (assumed to be C1). On the other hand, as the code characters and markers are darker or brghter than the surroundngs n ntensty (.e. hgher n

ntensty contrast) and smaller n sze n the contaner mage, the code characters are contaned n the other cluster C2. We subsequently calculate the average ntensty on the orgnal grayscale mage for C1 and C2 respectvely. If the dfference between average ntenstes of FG and C1 s smaller than the one between FG and C2, an error of local segmentaton s detected. We then change the crteron of the local thresholdng and process the mage agan. A pxel s classfed nto the foreground f ts ntensty s hgher than the average ntensty of ts neghborhood, and nto the background otherwse. Based on the confrmaton process, we effcently obtan acceptable segmentaton results of the code characters n ether black or whte, as shown n Fg 1. (a) B. Character Extracton Based on Geometry Features The thresholdng result however contans a number of non-code character regons. As the code characters are supposed to be wth certan geometry propertes, e.g., wth the sze n a certan range, we then estmate for each regon several geometry parameters, ncludng area, crcumference, wdth, and heght. If the values of parameters of a regon are out of the emprcally determned ranges, t s fltered out, and otherwse s preserved. After that, those rrelevant regons such as the levers on the contaner door can be easly removed, as shown n Fg. 2(a). Next, t s further consdered that the code characters are located close together. We thus desgn a dstance-based groupng algorthm to pck out the code character regons: Step 1. Step 2. Step 3. Step 4. Step 5. Step 6. Label all the regons as FALSE and set ther groupng states to UNGROUPED. Label an arbtrary FALSE regon as TRUE. If there s any FALSE regon satsfyng the followng two rules: (1) The dstance between ts center and the centers of any TRUE & UNGROUPRED regons s smaller than one-hundred pxels, (2) The dfference of x- or y-axs coordnates between ts center and the center of any TRUE & UNGROUPRED regons s smaller than eght pxels, then the examned regon s labeled as TRUE. Go to step 3 untl there are no more TRUE regons found. Group these TRUE & UNGROUPRED regons together, and set ther groupng state to GROUPED. Go to step 2 untl there are no more groups found. After the groupng process we can obtan several groups as shown n Fg. 2(b). The code character regons can be dentfed by the largest szed group ndcated by the red rectangle, and each ndvdual character can also be readly extracted (see Fg. 2(c)). C. Egen-feature Models Usng the proposed segmentaton method, we can automatcally extract the character regons from the tranng (b) (c) Fg. 2. Character extracton from Fg. 1(c): (a) the flterng result by geometry features; (b) the groupng result by character dstance; (c) the character extracton result. mages. For each Englsh and numerc character, we construct an Egen-feature model based on the PCA to characterze ts appearance varaton among dfferent tranng mages. In the model constructon process, ts bnary segmentaton results are frst algned to each other to elmnate the pose dfferences. The algnment results then serve as the tranng samples, denoted as X = (x 1, x 2,, x,, x m-1, x m ), where m s the number of tranng samples. Each tranng sample x s represented by a one-dmensonal vector (x 1, x 2,, x j,, x n-1, x n ) T, where x j s the ntensty value of the j-th pxel n the tranng sample and n s the number of pxels. Next, we average the m samples to obtan the mean vector x, and then calculate the covarance matrx C mplyng the varance between each tranng sample and the mean vector. 1 m T And C s gven by ( x x)( x x). We subsequently m 1 solve the egenvalues (v 1, v 2,, v,, v n-1, v n ) and ther correspondng egenvectors (u 1, u 2,, u,, u n-1, u n ) from the covarance matrx. Gven the egenvalues n descendng order, the dmenson of the egen features s reduced by preservng the frst t components, subject to ( t v 1 n 1 v ) 0.95. At last, the resultng Egen-feature model, characterzed wth the mean vector and egenvectors, can be utlzed to dentfy the character appearance. By applyng ths constructon process to all the characters ncludng 0-9 and A-Z, we can consequently obtan a set of Egen-feature models and apply them to the subsequent recognton stage.

IV. CODE RECOGNITION In the recognton stage, we frst segment the code characters from a gven mage. Each unknown character s then compared to all Egen-feature models, and s recognzed by fndng the best matched model whch mantans the mnmal PCA reconstructon error of the character appearance. The detals of character recognton algorthm are delneated below. Step 1. Input an unknown character C unknown (.e., a one-dmensonal ntensty vector) and the set of Egen-feature models. Step 2. Select an Egen-feature model and project the character vector C unknown from the mage space u1 onto the model space, u 2 y. [ Cunknown x] ut Step 3. Reconstruct the character appearance through a u1 back projecton process, u 2 xˆ. y x ut Step 4. Calculate the reconstructon error, Cunknown xˆ. Step 5. Record the value of the error, and then go to step 2 untl all the Egen-feature models are examned. Step 6. Fnd the character wth the mnmal reconstructon error as the recognton result of C unknown. An example of the character recognton s demonstrated n Fg. 3. The unknown character s shown n Fg. 3(a), and the reconstructed appearances usng the Egen-feature models of 2, 3, and 7 are dsplayed n Fgs. 3(b)-(d), respectvely. It s observed that usng the correspondng Egen-feature model to reconstruct the character appearance can lead to the smallest dstorton. After all the characters are recognzed, we can obtan the recognton result of the entre contaner code. On the other hand, to ncrease the recognton rate of the proposed system, we further ncorporate the nformaton of contaner code generaton rule nto the recognton process based on the standard of ISO 6346 [12]. The generaton rule provdes the nformaton that a character s supposed to be matched to ether numerc or Englsh characters, as shown n Table I. For example, the frst three characters of the contaner code represent the owner d n Englsh. Hence, only Englsh characters are taken as feasble solutons for ther recognton. Consequently, the ms-recognton between the numerc and Englsh characters wth smlar appearance, e.g., 1 and I, can be easly avoded. V. RESULTS AND DISCUSSION The followng experments conssted of three parts ncludng segmentaton accuracy, recognton accuracy and computatonal performance evaluatons. The valdaton work ncluded 94 contaner mages and was performed on a T (a) (b) (c) (d) Fg. 3. Example of the character recognton: (a) the unknown character; (b)-(d) the reconstructed appearances usng three dfferent Egen-feature models. TABLE I CODE GENERATION RULE FOR THE PROPOSED RECOGNITION ALGORITHM 1 st Row Code characters Specfc meanng Character type The frst three characters Owner d Englsh character The fourth character Category dentfer Englsh character The last one character Check dgt Numerc character The other characters Seral number Numerc character 2 nd Row Code characters Specfc meanng Character type The frst two characters Sze code Numerc character The second character Type code Englsh character The last character Type code Numerc character desktop PC wth 3.0GHz Intel Core 2 Duo E8400 processor, wndows XP Professonal, and 2GB memory. A. Segmentaton Accuracy Evaluaton To evaluate the segmentaton accuracy, the proposed method was appled to the 94 valdaton mages. A successful segmentaton n an mage has to satsfy that every character (totally 15 characters n a contaner code) s ncluded n the segmentaton result. The success rate n these segmentatons was 88.3 % (83/94), ndcatng a satsfactory accuracy of the proposed segmentaton method. B. Recognton Accuracy Evaluaton In ths experment, the recognton accuracy wth respect to ndvdual character and entre code was valdated. At frst, we counted the number of total occurrences of each character n the 83 successfully segmented mages. For each ndvdual character, ts recognton success rate (RSR) was gven by the proporton of the number of correct recogntons to the total occurrences, as lsted n Table II. The average RSR of all the characters was 98.22 %. Moreover, t was observed that the RSRs of two characters, B and N, were much lower than the others. Ths may be because ther sample szes are very small. If more testng mages are ncluded, the RSRs are supposed to ncrease. Moreover, we also valdated the recognton accuracy wth respect to the entre contaner code. We calculated the number of mages, n whch the code wth 15 characters was correctly recognzed. 73 successful recogntons were obtaned among these 83 mages, that s, 87.95 % recognton rate. If more data can be ncluded n the future experments, the recognton rate s expected to be further mproved. C. Computatonal Performance Evaluaton In ths experment the computatonal performance of the proposed system was also evaluated. For each of the 83 mages, we measured the computatonal tme n code segmentaton and recognton, and obtaned an average computatonal tme less than 1 second. Overall, the proposed system can acheve the segmentaton and recognton of contaner code effcently.

VI. CONCLUSION In ths paper we have proposed a computer vson system for automated contaner code recognton. We employed the locally thresholdng method and character geometry features to automatcally segment the contaner code from the gven mage. In the segmentaton process we further desgned an ntensty-based strategy to compensate the error of locally thresholdng segmentaton. In addton, the Egen-feature models were utlzed n the code recognton process for accommodatng mage noses and deformaton n character appearances. And, the generaton rule of contaner code was taken nto account to avod ms-recogntons between Englsh and numerc characters wth smlar appearance. The expermental results showed that our proposed method can automatcally acheve code recognton wth a hgh average RSR. In the future research, more contaner mages wll be ncluded to fne-tune the models n ths system for mprovng the recognton rate. Moreover, the recognton of markers n contaner mage (e.g., trangular or rectangular sgns) wll also be conducted for constructng a more complete examnaton system. TABLE II RECOGNITION SUCCESS RATE (RSR) OF INDIVIDUAL CHARACTER Character Number of Number of correct RSR occurrences recogntons 0 71 69 97.18 % 1 164 162 98.78 % 2 176 176 100 % 3 68 68 100 % 4 114 113 99.12 % 5 89 89 100 % 6 56 56 100 % 7 63 63 100 % 8 58 56 96.55 % 9 59 59 100 % A 10 10 100 % B 4 3 75 % C 24 24 100 % D 2 2 100 % E 2 2 100 % F 9 9 100 % G 103 102 99.3 % H 12 12 100 % I 11 11 100 % J 0 0 None K 10 10 100 % L 35 35 100 % M 27 26 96.3 % N 5 4 80 % O 39 39 100 % P 4 4 100 % Q 0 0 None R 9 9 100 % S 23 23 100 % T 15 15 100 % U 94 93 98.94 % V 0 0 None W 2 2 100 % X 3 3 100 % Y 9 9 100 % Z 7 7 100 % Average RSR 98.22 % [2] Gonzalez, R.C., and Woods, R.E., Dgtal Image Processng. 3rd ed, Pearson Ed. New Jersey, USA, 2010, pp. 760 785. [3] Pradhan, S.S., and Nanda, P.K., Adaptve thresholdng based mage segmentaton wth uneven 11 lghtng condton, IEEE Regon 10 Colloquum and the thrd ICIIS 2008, pp. 1 6. [4] Zhang, J., Yan, C.H., Chu, C.K., and Ong, S.H., Fast segmentaton of bone n CT mages usng 3D adaptve thresholdng, Computers n Bology and Medcne, 40, 2010, pp. 231 236. [5] Peng, J.Y., and Hsu, C.N., Adaptve local thresholdng for fluorescence cell mcrographs, Techncal Rep. No. TR-IIS-09-008, Nov. 11, 2009. [6] Sankaran, P., & Asar, V.K., Adaptve thresholdng based cell segmentaton for cell-destructon actvty verfcaton, n 2006 IEEE Conf. AIPR, pp. 14. [7] Ozbay, S., and Erceleb, E., Automatc vehcle dentfcaton by plate recognton, Proceedngs of World Academy of Scence, Engneerng and Technology, 2005, pp. 222 225. [8] Wakahara, T., and Odaka, K., Adaptve normalzaton of handwrtten characters usng global/local affne transformaton, IEEE Trans. Pattern Analyss and Machne Intellgence, vol. 20, no. 12, pp. 1332-1341, Dec. 1998. [9] Park HS, Km SY, Lee SW, Gray-scale handwrtten character recognton based on prncpal features. SPIE vol. 3027, pp. 40 49, 2000. [10] Manjunath AVN, Hemantha KG, and Noushath S., Two-dmensonal matrx prncpal component analyss useful for character recognton, ICIA, pp. 390 393, 2006. [11] Bradley, D., and Roth, G., Adaptve thresholdng usng the ntegral mage, Journal of Graphcs, GPU, & Game Tools, vol. 12, no. 2, pp. 13 21, 2007. [12] Contaner Handbook: Cargo loss preventon nformaton from German marne nsurers, ch. 3.4. [Onlne]. Avalable: http://www.contanerhandbuch.de/chb_e/stra/ndex.html?/chb_e/stra/s tra_03_04_00.html REFERENCES [1] Otsu, N., A threshold selecton method from gray-level hstograms, IEEE Trans. Systems, Man and Cybernetcs, vol. 9, no. 1, pp. 62 66, Jan. 1979.