SlideShare a Scribd company logo
1 of 4
Download to read offline
Computer Engineering and Intelligent Systems                                                   www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.4, 2011


        Document Image Binarization Using Post Processing Method
                                                     E. Balamurugan
                                          Department of Computer Applications
                                         Bannari Amman Institute of Technology
                                         Sathyamangalam, Tamilnadu, India
                                               E-mail: rethinbs@gmail.com
                                                       K. Sangeetha
                                          Department of Computer Applications
                                         Bannari Amman Institute of Technology
                                         Sathyamangalam, Tamilnadu, India
                                              E-mail: kavigeeth@yahoo.com
                                                   Dr. P. Sengottuvelan
                                         Department of Information Technology
                                        Bannari Amman Institute of Technology
                                        Sathyamangalam, Tamilnadu,, India
                                           E-mail: sengottuvelan@rediff.com


Abstract
Binarization is the preliminary process of Document Image Analysis and Processing. Image binarization is
performed through Local and Global threshold methods. In this paper local thresholding method Nilblack method
with post processing was implemented. The Nilblack algorithm was implemented using Matlab and tested with a
sample of ground tooth images selected from TOBACCO research database.
Keywords: Document Image, Nilblack method, Post Processing
1. Introduction
Image binarization is the process of turning a greyscale image to a black and white image. In a grey-scale image, a
pixel can take on 256 different intensity values while in binary image each pixel is assigned to be either black or
white. This conversion from grey-scale to black and white is performed by applying a threshold value to the image.
Representation of documents in binary form is essential for further processing like finding texts, lines, graphics,
logos etc. It is the primary step of document image analysis and processing research. Binarization is performed
through global or local threshold values. In global approach single threshold value is applied for entire image while
local thresholding apply different threshold values to different regions of images. A critical component in the
binarization process is choosing a correct value for the threshold. If the threshold is set too low, then the resulting
binary image will primarily be comprised of white pixels. Conversely, if the threshold is set too high, the resulting
image will feature a large number of undesired black pixels. Thus, the threshold must be selected carefully to ensure
the data information is preserved. Here, the section 2 has an over view of global and local thresholding methods and
Tobacco research database. In section 3 about Nilblack method with post processing step.          In section 4 Matlab
implementation results for Nilblack method with post processing. Finally we have concluded with           session 5.
2 .Local and Global Thresholding
In Global Thresholding method a single threshold value is calculated for the whole image. Pixels with a grey scale
level under the threshold level are labelled as print, pixels with a grey scale level above the threshold level are
                                                          14
Computer Engineering and Intelligent Systems                                                     www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.4, 2011

labelled as background. Among many global thresholding methods, Otsu’s method is one among the best method,
based on an analysis of the grey scale level histogram of the whole image and selects an optimal threshold according to
the discriminant theory. The computation of Otsu’s method is fast and simple and efficient for large images. But, for
images with uneven illuminations, the method cannot separate objects from their backgrounds effectively. In Local
thresholding to calculate the threshold for a window as being the mean value of the maximum and minimum values
within the window. Another local method uses gradient. Pixels are identified in, or very close to, areas where sharp
changes (edges) exist in the grey level image. The areas with sharp edges are then checked for evidence labelling
them as either text or background. Tobacco800, composed of 1290 document images, is a realistic database for
document image analysis and retrieval as these documents were collected and scanned using a wide variety of
equipment over time. In addition, a significant percentage of Tobacco800 are consecutively numbered multi-page
business documents, making it a valuable tested for various content-based document retrieval approaches.
Resolutions of documents in Tobacco800 vary significantly from 150 to 300 DPI and the dimensions of images
range from 1200 by 1600 to 2500 by 3200 pixels .
3. Nilblack Method
Nilblack’s method is based on the calculation of the local mean and of the local standard deviation. The threshold T
at pixel (x, y) is determined by the following equation:
         T (x, y) = m(x, y) + k · s(x, y)
where m(x, y) and s(x, y) are respectively the average of a local area and the standard deviation values. The size of the
neighbourhood should be small enough to preserve local details, but at the same time large enough to suppress noise.
The value of k is used to determine how much of the total print object boundary is taken as a part of the given object.
This method can distinguish the object from the background effectively in the areas close to the objects. But it cannot
suppress background noise situated far away from the objects. Thus, if the objects are sparse in an image, a lot of
background noise will be left. Suggested using the grey-level values at high gradient regions as known data to
interpolate the threshold surface of image document texture features. The post processing step a threshold surface is
constructed by finding the edge points of the smoothed image. The gradient magnitude image is computed and thinned
to one pixel-wide line to identify edge points. An iterative interpolation process is employed to get a smooth surface
passing through the edge points. The image is threshold by the constructed surface. In an iterative interpolation
process, the interpolated surface is set at image grey scale at the edge points and 0 at the other points. Then the
interpolation residual R(x, y) and new pixel value Pn+1(x, y) at iteration (n + 1) are calculated. The iteration will stop
when the residual R(x, y) is lower than a small number. The residual Rn(x, y) at the nth iteration and the new pixel
value Pn+1(x, y) are defined as follows:
R(x, y) = Pn(x, y+1) +Pn(x, y−1) +Pn (x−1, y) +Pn(x+1, y) −4Pn(x, y)         --   a
Pn+1(x, y) = Pn(x, y) + (β · Rn(x, y) /4)                                  -- b
Where 1 < β < 2 for fast convergence. Final false print objects are removed by the post processing step.
4. Implementation
Nilblack’s method calculates the thresholding value using the local average and the local standard deviation but
because of the limitation caused by the window size of [15, 15], the information outside the window is not taken into
account. Therefore large areas of noise cannot be separated from their useful object information. Experiments show
that Nilblack’s method can separate the wide spaces from the sentences and remove the noise close to the words but
cannot remove the noise far from the objects but if we are applying post processing to find the object boundary
points for smoothing and averaging filter is applied to identify the edges available in the document image.


Process flow:
                                            Document Image
                                                           15


                                              Nilblack’s Method
Computer Engineering and Intelligent Systems                                                 www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.4, 2011




The binarization methods were tested on sample document images from Tobacco800 document images realistic
database. We can see from the results that our implementation of fig 1. a, b,c retains most of the useful object
information and suppresses the background noise effectively
5. Conclusion
In this paper, we have implemented nilblacks method with post processing step using matlab7.6 and tested random
samples from the Tobacco800 database, for binarizing document images based on a criterion of iterative
interpolation process. We have shown the result a sample, which is formulated in terms of contrast instead of grey
values, is robust against noise variations. By testing the binarization system against various challenging document
images, we have also demonstrated the effectiveness of nilblack method with post processing algorithm.
References
Nilblack, W (1986) ‘An Introduction to Digital Image Processing’, Englewood Cliffs, Prentice Hall,
pp 115-116.
Yanowitz, S D and Bruckstein, A M 1989 ‘A new method for image segmentation’, Computer Vision, Graphics and
Image Processing, vol. 46, no. 1, pp. 82-95.
Otsu, N 1979 ‘A Threshold Selection Method from Gray-Level Histograms’ IEEE Transactions on Systems,Man,
and Cybernetic, Vol.9(1) pp. 62-66.
Mehmet Sezgin and Bulent Sankur, 2004 ‘Survey over Image Thresholding Techniques and Quantitative
Performance Evaluation’, Journal of Electronic Imaging, Vol. 13(1) pp. 146-165.
Lewis, D Agam, G Argamon, S Frieder,O Grossman, D and Heard, J 2006 ‘Building a test collection for
complex document information processing’, in Proc. Annual Int. ACM SIGIR Conference, pp.665 - C666.
Agam, G Argamon, S Frieder, O Grossman, D and Lewis, D 2006 ‘The Complex Document Image
Processing(CDIP) test collection’, Illinois Institute of Technology, http://ir.iit.edu/projects/CDIP.html
The Legacy Tobacco Document            Library   (LTDL)      2007,   University   of   California,   San   Francisco,
http://legacy.library.ucsf.edu/




                                                        16
Computer Engineering and Intelligent Systems                            www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 2, No.4, 2011




Results:
1.a Grey Scale Image               1.b. Niblacks Method   1.c. post processing step




                                                 17

More Related Content

What's hot

Dissertation synopsis for imagedenoising(noise reduction )using non local me...
Dissertation synopsis for  imagedenoising(noise reduction )using non local me...Dissertation synopsis for  imagedenoising(noise reduction )using non local me...
Dissertation synopsis for imagedenoising(noise reduction )using non local me...Arti Singh
 
Color image steganography in YCbCr space
Color image steganography in YCbCr spaceColor image steganography in YCbCr space
Color image steganography in YCbCr spaceIJECEIAES
 
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHMPIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHMijcsit
 
A Robust Image Watermarking Technique using Luminance Based Area Selection an...
A Robust Image Watermarking Technique using Luminance Based Area Selection an...A Robust Image Watermarking Technique using Luminance Based Area Selection an...
A Robust Image Watermarking Technique using Luminance Based Area Selection an...IRJET Journal
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
 
Thesis on Image compression by Manish Myst
Thesis on Image compression by Manish MystThesis on Image compression by Manish Myst
Thesis on Image compression by Manish MystManish Myst
 
A new approach of colour image encryption based on henon like chaotic map
A new approach of colour image encryption based on henon like chaotic mapA new approach of colour image encryption based on henon like chaotic map
A new approach of colour image encryption based on henon like chaotic mapAlexander Decker
 
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONijcseit
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
 
Blank Background Image Lossless Compression Technique
Blank Background Image Lossless Compression TechniqueBlank Background Image Lossless Compression Technique
Blank Background Image Lossless Compression TechniqueCSCJournals
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...CSCJournals
 
Digital image compression techniques
Digital image compression techniquesDigital image compression techniques
Digital image compression techniqueseSAT Publishing House
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...ijma
 

What's hot (19)

Sub1586
Sub1586Sub1586
Sub1586
 
M017427985
M017427985M017427985
M017427985
 
Dissertation synopsis for imagedenoising(noise reduction )using non local me...
Dissertation synopsis for  imagedenoising(noise reduction )using non local me...Dissertation synopsis for  imagedenoising(noise reduction )using non local me...
Dissertation synopsis for imagedenoising(noise reduction )using non local me...
 
Color image steganography in YCbCr space
Color image steganography in YCbCr spaceColor image steganography in YCbCr space
Color image steganography in YCbCr space
 
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHMPIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
 
A Robust Image Watermarking Technique using Luminance Based Area Selection an...
A Robust Image Watermarking Technique using Luminance Based Area Selection an...A Robust Image Watermarking Technique using Luminance Based Area Selection an...
A Robust Image Watermarking Technique using Luminance Based Area Selection an...
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
Thesis on Image compression by Manish Myst
Thesis on Image compression by Manish MystThesis on Image compression by Manish Myst
Thesis on Image compression by Manish Myst
 
Ab4506151155
Ab4506151155Ab4506151155
Ab4506151155
 
A new approach of colour image encryption based on henon like chaotic map
A new approach of colour image encryption based on henon like chaotic mapA new approach of colour image encryption based on henon like chaotic map
A new approach of colour image encryption based on henon like chaotic map
 
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
 
Blank Background Image Lossless Compression Technique
Blank Background Image Lossless Compression TechniqueBlank Background Image Lossless Compression Technique
Blank Background Image Lossless Compression Technique
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
 
Digital image compression techniques
Digital image compression techniquesDigital image compression techniques
Digital image compression techniques
 
E017443136
E017443136E017443136
E017443136
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
 

Viewers also liked

Introduccion ala ingieneria de sistemas
Introduccion ala ingieneria de sistemasIntroduccion ala ingieneria de sistemas
Introduccion ala ingieneria de sistemasAngel Aguirre
 
Andrew Page - The demand for search in a social network
Andrew Page - The demand for search in a social networkAndrew Page - The demand for search in a social network
Andrew Page - The demand for search in a social networkDERIGalway
 
Future Ready
Future Ready Future Ready
Future Ready cromaine
 
Synops emotion recognize
Synops emotion recognizeSynops emotion recognize
Synops emotion recognizeAvdhesh Gupta
 
Performance comparison between the
Performance comparison between thePerformance comparison between the
Performance comparison between thecsandit
 
Configuring The Physician Bundle
Configuring The Physician BundleConfiguring The Physician Bundle
Configuring The Physician Bundlegr8situation
 
X2 t01 01 complex definitions (2012)
X2 t01 01 complex definitions (2012)X2 t01 01 complex definitions (2012)
X2 t01 01 complex definitions (2012)Nigel Simmons
 
Diana Khandzhyan Speech 104 power point
Diana Khandzhyan Speech 104 power pointDiana Khandzhyan Speech 104 power point
Diana Khandzhyan Speech 104 power pointdianakhandzhyan
 
Child custody matters divorce lawyer
Child custody matters divorce lawyerChild custody matters divorce lawyer
Child custody matters divorce lawyersherilynjar
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
Browns Booking &amp; Tracking System
Browns Booking &amp; Tracking SystemBrowns Booking &amp; Tracking System
Browns Booking &amp; Tracking SystemDavidBrownJnr
 
Технический анализ украинского рынка
Технический анализ украинского рынкаТехнический анализ украинского рынка
Технический анализ украинского рынкаiTrader
 
The Lighter Side Of Philips
The Lighter Side Of PhilipsThe Lighter Side Of Philips
The Lighter Side Of Philipsgr8situation
 
Bob raets turnhout 2300
Bob raets turnhout 2300Bob raets turnhout 2300
Bob raets turnhout 2300NancyMaus
 

Viewers also liked (20)

Introduccion ala ingieneria de sistemas
Introduccion ala ingieneria de sistemasIntroduccion ala ingieneria de sistemas
Introduccion ala ingieneria de sistemas
 
Andrew Page - The demand for search in a social network
Andrew Page - The demand for search in a social networkAndrew Page - The demand for search in a social network
Andrew Page - The demand for search in a social network
 
De Basisvorming
De BasisvormingDe Basisvorming
De Basisvorming
 
Future Ready
Future Ready Future Ready
Future Ready
 
Synops emotion recognize
Synops emotion recognizeSynops emotion recognize
Synops emotion recognize
 
Performance comparison between the
Performance comparison between thePerformance comparison between the
Performance comparison between the
 
Configuring The Physician Bundle
Configuring The Physician BundleConfiguring The Physician Bundle
Configuring The Physician Bundle
 
X2 t01 01 complex definitions (2012)
X2 t01 01 complex definitions (2012)X2 t01 01 complex definitions (2012)
X2 t01 01 complex definitions (2012)
 
Diana Khandzhyan Speech 104 power point
Diana Khandzhyan Speech 104 power pointDiana Khandzhyan Speech 104 power point
Diana Khandzhyan Speech 104 power point
 
Bio Lab Paper
Bio Lab PaperBio Lab Paper
Bio Lab Paper
 
Mediiaa
MediiaaMediiaa
Mediiaa
 
40120130405005
4012013040500540120130405005
40120130405005
 
Child custody matters divorce lawyer
Child custody matters divorce lawyerChild custody matters divorce lawyer
Child custody matters divorce lawyer
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Biometrics
BiometricsBiometrics
Biometrics
 
I04302068075
I04302068075I04302068075
I04302068075
 
Browns Booking &amp; Tracking System
Browns Booking &amp; Tracking SystemBrowns Booking &amp; Tracking System
Browns Booking &amp; Tracking System
 
Технический анализ украинского рынка
Технический анализ украинского рынкаТехнический анализ украинского рынка
Технический анализ украинского рынка
 
The Lighter Side Of Philips
The Lighter Side Of PhilipsThe Lighter Side Of Philips
The Lighter Side Of Philips
 
Bob raets turnhout 2300
Bob raets turnhout 2300Bob raets turnhout 2300
Bob raets turnhout 2300
 

Similar to 3 e.balamurugan 14-17

Binarization of Degraded Text documents and Palm Leaf Manuscripts
Binarization of Degraded Text documents and Palm Leaf ManuscriptsBinarization of Degraded Text documents and Palm Leaf Manuscripts
Binarization of Degraded Text documents and Palm Leaf ManuscriptsIRJET Journal
 
IRJET - Change Detection in Satellite Images using Convolutional Neural N...
IRJET -  	  Change Detection in Satellite Images using Convolutional Neural N...IRJET -  	  Change Detection in Satellite Images using Convolutional Neural N...
IRJET - Change Detection in Satellite Images using Convolutional Neural N...IRJET Journal
 
PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...
PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...
PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...ijcsit
 
Adaptive Image Contrast with Binarization Technique for Degraded Document Image
Adaptive Image Contrast with Binarization Technique for Degraded Document ImageAdaptive Image Contrast with Binarization Technique for Degraded Document Image
Adaptive Image Contrast with Binarization Technique for Degraded Document Imagetheijes
 
A UTILIZATION OF CONVOLUTIONAL MATRIX METHODS ON SLICED HIPPOCAMPAL NEURON RE...
A UTILIZATION OF CONVOLUTIONAL MATRIX METHODS ON SLICED HIPPOCAMPAL NEURON RE...A UTILIZATION OF CONVOLUTIONAL MATRIX METHODS ON SLICED HIPPOCAMPAL NEURON RE...
A UTILIZATION OF CONVOLUTIONAL MATRIX METHODS ON SLICED HIPPOCAMPAL NEURON RE...ijscai
 
A UTILIZATION OF CONVOLUTIONAL MATRIX METHODS ON SLICED HIPPOCAMPAL NEURON RE...
A UTILIZATION OF CONVOLUTIONAL MATRIX METHODS ON SLICED HIPPOCAMPAL NEURON RE...A UTILIZATION OF CONVOLUTIONAL MATRIX METHODS ON SLICED HIPPOCAMPAL NEURON RE...
A UTILIZATION OF CONVOLUTIONAL MATRIX METHODS ON SLICED HIPPOCAMPAL NEURON RE...ijscai
 
A UTILIZATION OF CONVOLUTIONAL MATRIX METHODS ON SLICED HIPPOCAMPAL NEURON RE...
A UTILIZATION OF CONVOLUTIONAL MATRIX METHODS ON SLICED HIPPOCAMPAL NEURON RE...A UTILIZATION OF CONVOLUTIONAL MATRIX METHODS ON SLICED HIPPOCAMPAL NEURON RE...
A UTILIZATION OF CONVOLUTIONAL MATRIX METHODS ON SLICED HIPPOCAMPAL NEURON RE...ijscai
 
Finding similarities between structured documents as a crucial stage for gene...
Finding similarities between structured documents as a crucial stage for gene...Finding similarities between structured documents as a crucial stage for gene...
Finding similarities between structured documents as a crucial stage for gene...Alexander Decker
 
Restoration of Old Documents that Suffer from Degradation
Restoration of Old Documents that Suffer from DegradationRestoration of Old Documents that Suffer from Degradation
Restoration of Old Documents that Suffer from DegradationIRJET Journal
 
Plant Disease Detection using Convolution Neural Network (CNN)
Plant Disease Detection using Convolution Neural Network (CNN)Plant Disease Detection using Convolution Neural Network (CNN)
Plant Disease Detection using Convolution Neural Network (CNN)IRJET Journal
 
A Flexible Scheme for Transmission Line Fault Identification Using Image Proc...
A Flexible Scheme for Transmission Line Fault Identification Using Image Proc...A Flexible Scheme for Transmission Line Fault Identification Using Image Proc...
A Flexible Scheme for Transmission Line Fault Identification Using Image Proc...IJEEE
 
A Real Time Image Processing Based Fire Safety Intensive Automatic Assistance...
A Real Time Image Processing Based Fire Safety Intensive Automatic Assistance...A Real Time Image Processing Based Fire Safety Intensive Automatic Assistance...
A Real Time Image Processing Based Fire Safety Intensive Automatic Assistance...IJMTST Journal
 
AN EFFICIENT FEATURE EXTRACTION AND CLASSIFICATION OF HANDWRITTEN DIGITS USIN...
AN EFFICIENT FEATURE EXTRACTION AND CLASSIFICATION OF HANDWRITTEN DIGITS USIN...AN EFFICIENT FEATURE EXTRACTION AND CLASSIFICATION OF HANDWRITTEN DIGITS USIN...
AN EFFICIENT FEATURE EXTRACTION AND CLASSIFICATION OF HANDWRITTEN DIGITS USIN...IJCSEA Journal
 
De-Noisy Image of Activity Tracking System in Digital Image Processing
De-Noisy Image of Activity Tracking System in Digital Image ProcessingDe-Noisy Image of Activity Tracking System in Digital Image Processing
De-Noisy Image of Activity Tracking System in Digital Image ProcessingIRJET Journal
 
De-Noisy Image of Activity Tracking System in Digital Image Processing
De-Noisy Image of Activity Tracking System in Digital Image ProcessingDe-Noisy Image of Activity Tracking System in Digital Image Processing
De-Noisy Image of Activity Tracking System in Digital Image ProcessingIRJET Journal
 
APPLICATION OF CONVOLUTIONAL NEURAL NETWORK IN LAWN MEASUREMENT
APPLICATION OF CONVOLUTIONAL NEURAL NETWORK IN LAWN MEASUREMENTAPPLICATION OF CONVOLUTIONAL NEURAL NETWORK IN LAWN MEASUREMENT
APPLICATION OF CONVOLUTIONAL NEURAL NETWORK IN LAWN MEASUREMENTsipij
 
APPLICATION OF CONVOLUTIONAL NEURAL NETWORK IN LAWN MEASUREMENT
APPLICATION OF CONVOLUTIONAL NEURAL NETWORK IN LAWN MEASUREMENTAPPLICATION OF CONVOLUTIONAL NEURAL NETWORK IN LAWN MEASUREMENT
APPLICATION OF CONVOLUTIONAL NEURAL NETWORK IN LAWN MEASUREMENTsipij
 
Handwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdf
Handwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdfHandwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdf
Handwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdfSachin414679
 
A Novel Adaptive Denoising Method for Removal of Impulse Noise in Images usin...
A Novel Adaptive Denoising Method for Removal of Impulse Noise in Images usin...A Novel Adaptive Denoising Method for Removal of Impulse Noise in Images usin...
A Novel Adaptive Denoising Method for Removal of Impulse Noise in Images usin...iosrjce
 

Similar to 3 e.balamurugan 14-17 (20)

Binarization of Degraded Text documents and Palm Leaf Manuscripts
Binarization of Degraded Text documents and Palm Leaf ManuscriptsBinarization of Degraded Text documents and Palm Leaf Manuscripts
Binarization of Degraded Text documents and Palm Leaf Manuscripts
 
IRJET - Change Detection in Satellite Images using Convolutional Neural N...
IRJET -  	  Change Detection in Satellite Images using Convolutional Neural N...IRJET -  	  Change Detection in Satellite Images using Convolutional Neural N...
IRJET - Change Detection in Satellite Images using Convolutional Neural N...
 
PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...
PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...
PARALLEL GENERATION OF IMAGE LAYERS CONSTRUCTED BY EDGE DETECTION USING MESSA...
 
Adaptive Image Contrast with Binarization Technique for Degraded Document Image
Adaptive Image Contrast with Binarization Technique for Degraded Document ImageAdaptive Image Contrast with Binarization Technique for Degraded Document Image
Adaptive Image Contrast with Binarization Technique for Degraded Document Image
 
A UTILIZATION OF CONVOLUTIONAL MATRIX METHODS ON SLICED HIPPOCAMPAL NEURON RE...
A UTILIZATION OF CONVOLUTIONAL MATRIX METHODS ON SLICED HIPPOCAMPAL NEURON RE...A UTILIZATION OF CONVOLUTIONAL MATRIX METHODS ON SLICED HIPPOCAMPAL NEURON RE...
A UTILIZATION OF CONVOLUTIONAL MATRIX METHODS ON SLICED HIPPOCAMPAL NEURON RE...
 
A UTILIZATION OF CONVOLUTIONAL MATRIX METHODS ON SLICED HIPPOCAMPAL NEURON RE...
A UTILIZATION OF CONVOLUTIONAL MATRIX METHODS ON SLICED HIPPOCAMPAL NEURON RE...A UTILIZATION OF CONVOLUTIONAL MATRIX METHODS ON SLICED HIPPOCAMPAL NEURON RE...
A UTILIZATION OF CONVOLUTIONAL MATRIX METHODS ON SLICED HIPPOCAMPAL NEURON RE...
 
A UTILIZATION OF CONVOLUTIONAL MATRIX METHODS ON SLICED HIPPOCAMPAL NEURON RE...
A UTILIZATION OF CONVOLUTIONAL MATRIX METHODS ON SLICED HIPPOCAMPAL NEURON RE...A UTILIZATION OF CONVOLUTIONAL MATRIX METHODS ON SLICED HIPPOCAMPAL NEURON RE...
A UTILIZATION OF CONVOLUTIONAL MATRIX METHODS ON SLICED HIPPOCAMPAL NEURON RE...
 
Finding similarities between structured documents as a crucial stage for gene...
Finding similarities between structured documents as a crucial stage for gene...Finding similarities between structured documents as a crucial stage for gene...
Finding similarities between structured documents as a crucial stage for gene...
 
Restoration of Old Documents that Suffer from Degradation
Restoration of Old Documents that Suffer from DegradationRestoration of Old Documents that Suffer from Degradation
Restoration of Old Documents that Suffer from Degradation
 
Plant Disease Detection using Convolution Neural Network (CNN)
Plant Disease Detection using Convolution Neural Network (CNN)Plant Disease Detection using Convolution Neural Network (CNN)
Plant Disease Detection using Convolution Neural Network (CNN)
 
A Flexible Scheme for Transmission Line Fault Identification Using Image Proc...
A Flexible Scheme for Transmission Line Fault Identification Using Image Proc...A Flexible Scheme for Transmission Line Fault Identification Using Image Proc...
A Flexible Scheme for Transmission Line Fault Identification Using Image Proc...
 
A Real Time Image Processing Based Fire Safety Intensive Automatic Assistance...
A Real Time Image Processing Based Fire Safety Intensive Automatic Assistance...A Real Time Image Processing Based Fire Safety Intensive Automatic Assistance...
A Real Time Image Processing Based Fire Safety Intensive Automatic Assistance...
 
AN EFFICIENT FEATURE EXTRACTION AND CLASSIFICATION OF HANDWRITTEN DIGITS USIN...
AN EFFICIENT FEATURE EXTRACTION AND CLASSIFICATION OF HANDWRITTEN DIGITS USIN...AN EFFICIENT FEATURE EXTRACTION AND CLASSIFICATION OF HANDWRITTEN DIGITS USIN...
AN EFFICIENT FEATURE EXTRACTION AND CLASSIFICATION OF HANDWRITTEN DIGITS USIN...
 
De-Noisy Image of Activity Tracking System in Digital Image Processing
De-Noisy Image of Activity Tracking System in Digital Image ProcessingDe-Noisy Image of Activity Tracking System in Digital Image Processing
De-Noisy Image of Activity Tracking System in Digital Image Processing
 
De-Noisy Image of Activity Tracking System in Digital Image Processing
De-Noisy Image of Activity Tracking System in Digital Image ProcessingDe-Noisy Image of Activity Tracking System in Digital Image Processing
De-Noisy Image of Activity Tracking System in Digital Image Processing
 
APPLICATION OF CONVOLUTIONAL NEURAL NETWORK IN LAWN MEASUREMENT
APPLICATION OF CONVOLUTIONAL NEURAL NETWORK IN LAWN MEASUREMENTAPPLICATION OF CONVOLUTIONAL NEURAL NETWORK IN LAWN MEASUREMENT
APPLICATION OF CONVOLUTIONAL NEURAL NETWORK IN LAWN MEASUREMENT
 
APPLICATION OF CONVOLUTIONAL NEURAL NETWORK IN LAWN MEASUREMENT
APPLICATION OF CONVOLUTIONAL NEURAL NETWORK IN LAWN MEASUREMENTAPPLICATION OF CONVOLUTIONAL NEURAL NETWORK IN LAWN MEASUREMENT
APPLICATION OF CONVOLUTIONAL NEURAL NETWORK IN LAWN MEASUREMENT
 
Handwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdf
Handwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdfHandwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdf
Handwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdf
 
A Novel Adaptive Denoising Method for Removal of Impulse Noise in Images usin...
A Novel Adaptive Denoising Method for Removal of Impulse Noise in Images usin...A Novel Adaptive Denoising Method for Removal of Impulse Noise in Images usin...
A Novel Adaptive Denoising Method for Removal of Impulse Noise in Images usin...
 
R01725115118
R01725115118R01725115118
R01725115118
 

More from Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

More from Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

3 e.balamurugan 14-17

  • 1. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.4, 2011 Document Image Binarization Using Post Processing Method E. Balamurugan Department of Computer Applications Bannari Amman Institute of Technology Sathyamangalam, Tamilnadu, India E-mail: rethinbs@gmail.com K. Sangeetha Department of Computer Applications Bannari Amman Institute of Technology Sathyamangalam, Tamilnadu, India E-mail: kavigeeth@yahoo.com Dr. P. Sengottuvelan Department of Information Technology Bannari Amman Institute of Technology Sathyamangalam, Tamilnadu,, India E-mail: sengottuvelan@rediff.com Abstract Binarization is the preliminary process of Document Image Analysis and Processing. Image binarization is performed through Local and Global threshold methods. In this paper local thresholding method Nilblack method with post processing was implemented. The Nilblack algorithm was implemented using Matlab and tested with a sample of ground tooth images selected from TOBACCO research database. Keywords: Document Image, Nilblack method, Post Processing 1. Introduction Image binarization is the process of turning a greyscale image to a black and white image. In a grey-scale image, a pixel can take on 256 different intensity values while in binary image each pixel is assigned to be either black or white. This conversion from grey-scale to black and white is performed by applying a threshold value to the image. Representation of documents in binary form is essential for further processing like finding texts, lines, graphics, logos etc. It is the primary step of document image analysis and processing research. Binarization is performed through global or local threshold values. In global approach single threshold value is applied for entire image while local thresholding apply different threshold values to different regions of images. A critical component in the binarization process is choosing a correct value for the threshold. If the threshold is set too low, then the resulting binary image will primarily be comprised of white pixels. Conversely, if the threshold is set too high, the resulting image will feature a large number of undesired black pixels. Thus, the threshold must be selected carefully to ensure the data information is preserved. Here, the section 2 has an over view of global and local thresholding methods and Tobacco research database. In section 3 about Nilblack method with post processing step. In section 4 Matlab implementation results for Nilblack method with post processing. Finally we have concluded with session 5. 2 .Local and Global Thresholding In Global Thresholding method a single threshold value is calculated for the whole image. Pixels with a grey scale level under the threshold level are labelled as print, pixels with a grey scale level above the threshold level are 14
  • 2. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.4, 2011 labelled as background. Among many global thresholding methods, Otsu’s method is one among the best method, based on an analysis of the grey scale level histogram of the whole image and selects an optimal threshold according to the discriminant theory. The computation of Otsu’s method is fast and simple and efficient for large images. But, for images with uneven illuminations, the method cannot separate objects from their backgrounds effectively. In Local thresholding to calculate the threshold for a window as being the mean value of the maximum and minimum values within the window. Another local method uses gradient. Pixels are identified in, or very close to, areas where sharp changes (edges) exist in the grey level image. The areas with sharp edges are then checked for evidence labelling them as either text or background. Tobacco800, composed of 1290 document images, is a realistic database for document image analysis and retrieval as these documents were collected and scanned using a wide variety of equipment over time. In addition, a significant percentage of Tobacco800 are consecutively numbered multi-page business documents, making it a valuable tested for various content-based document retrieval approaches. Resolutions of documents in Tobacco800 vary significantly from 150 to 300 DPI and the dimensions of images range from 1200 by 1600 to 2500 by 3200 pixels . 3. Nilblack Method Nilblack’s method is based on the calculation of the local mean and of the local standard deviation. The threshold T at pixel (x, y) is determined by the following equation: T (x, y) = m(x, y) + k · s(x, y) where m(x, y) and s(x, y) are respectively the average of a local area and the standard deviation values. The size of the neighbourhood should be small enough to preserve local details, but at the same time large enough to suppress noise. The value of k is used to determine how much of the total print object boundary is taken as a part of the given object. This method can distinguish the object from the background effectively in the areas close to the objects. But it cannot suppress background noise situated far away from the objects. Thus, if the objects are sparse in an image, a lot of background noise will be left. Suggested using the grey-level values at high gradient regions as known data to interpolate the threshold surface of image document texture features. The post processing step a threshold surface is constructed by finding the edge points of the smoothed image. The gradient magnitude image is computed and thinned to one pixel-wide line to identify edge points. An iterative interpolation process is employed to get a smooth surface passing through the edge points. The image is threshold by the constructed surface. In an iterative interpolation process, the interpolated surface is set at image grey scale at the edge points and 0 at the other points. Then the interpolation residual R(x, y) and new pixel value Pn+1(x, y) at iteration (n + 1) are calculated. The iteration will stop when the residual R(x, y) is lower than a small number. The residual Rn(x, y) at the nth iteration and the new pixel value Pn+1(x, y) are defined as follows: R(x, y) = Pn(x, y+1) +Pn(x, y−1) +Pn (x−1, y) +Pn(x+1, y) −4Pn(x, y) -- a Pn+1(x, y) = Pn(x, y) + (β · Rn(x, y) /4) -- b Where 1 < β < 2 for fast convergence. Final false print objects are removed by the post processing step. 4. Implementation Nilblack’s method calculates the thresholding value using the local average and the local standard deviation but because of the limitation caused by the window size of [15, 15], the information outside the window is not taken into account. Therefore large areas of noise cannot be separated from their useful object information. Experiments show that Nilblack’s method can separate the wide spaces from the sentences and remove the noise close to the words but cannot remove the noise far from the objects but if we are applying post processing to find the object boundary points for smoothing and averaging filter is applied to identify the edges available in the document image. Process flow: Document Image 15 Nilblack’s Method
  • 3. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.4, 2011 The binarization methods were tested on sample document images from Tobacco800 document images realistic database. We can see from the results that our implementation of fig 1. a, b,c retains most of the useful object information and suppresses the background noise effectively 5. Conclusion In this paper, we have implemented nilblacks method with post processing step using matlab7.6 and tested random samples from the Tobacco800 database, for binarizing document images based on a criterion of iterative interpolation process. We have shown the result a sample, which is formulated in terms of contrast instead of grey values, is robust against noise variations. By testing the binarization system against various challenging document images, we have also demonstrated the effectiveness of nilblack method with post processing algorithm. References Nilblack, W (1986) ‘An Introduction to Digital Image Processing’, Englewood Cliffs, Prentice Hall, pp 115-116. Yanowitz, S D and Bruckstein, A M 1989 ‘A new method for image segmentation’, Computer Vision, Graphics and Image Processing, vol. 46, no. 1, pp. 82-95. Otsu, N 1979 ‘A Threshold Selection Method from Gray-Level Histograms’ IEEE Transactions on Systems,Man, and Cybernetic, Vol.9(1) pp. 62-66. Mehmet Sezgin and Bulent Sankur, 2004 ‘Survey over Image Thresholding Techniques and Quantitative Performance Evaluation’, Journal of Electronic Imaging, Vol. 13(1) pp. 146-165. Lewis, D Agam, G Argamon, S Frieder,O Grossman, D and Heard, J 2006 ‘Building a test collection for complex document information processing’, in Proc. Annual Int. ACM SIGIR Conference, pp.665 - C666. Agam, G Argamon, S Frieder, O Grossman, D and Lewis, D 2006 ‘The Complex Document Image Processing(CDIP) test collection’, Illinois Institute of Technology, http://ir.iit.edu/projects/CDIP.html The Legacy Tobacco Document Library (LTDL) 2007, University of California, San Francisco, http://legacy.library.ucsf.edu/ 16
  • 4. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 2, No.4, 2011 Results: 1.a Grey Scale Image 1.b. Niblacks Method 1.c. post processing step 17