SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 3 Issue 5, August 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD27981 | Volume – 3 | Issue – 5 | July - August 2019 Page 2610
Reconstructing the Path of the Object Based on
Time and Date OCR in Surveillance System
Pyae Phyo Thu, Mie Mie Tin, Ei Phyu Win, Cho Thet Mon
Faculty of Information Science, Myanmar Institute of Information Technology, Mandalay, Myanmar
How to cite this paper: Pyae Phyo Thu |
Mie Mie Tin | Ei Phyu Win | Cho Thet Mon
"Reconstructing the Path of the Object
based on Time and Date OCR in
Surveillance
System" Published
in International
Journal of Trend in
Scientific Research
and Development
(ijtsrd), ISSN: 2456-
6470, Volume-3 |
Issue-5, August 2019, pp.2610-2612,
https://doi.org/10.31142/ijtsrd27981
Copyright © 2019 by author(s) and
International Journal ofTrend inScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
Commons Attribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
ABSTRACT
The inclusion of time-based queries in videoindexing applicationis enables by
the recognition of time and date stamps in CCTV video. In this paper, we
propose the system for reconstructing the path of the object in surveillance
cameras based on time and date optical character recognition system. Since
there is no boundary in region for time and date, Discrete Cosine Transform
(DCT) method is applied in order to locate the region area. After the regionfor
time and date is located, it is segmented and then features for the symbols of
the time and date are extracted. Back propagation neural network is used for
recognition of the features and then stores the result in the database. By using
the resulted database, the system reconstructs thepathfortheobjectbasedon
time. The proposed system will be implemented in MATLAB.
KEYWORDS: Localization, Character Segmentation, Character Recognition, Back
Propagation Neural Network
INTRODUCTION
In the last few years, optical character recognition in digital video has received
an increasing interest [1]. It is widelyusedinmanyapplications suchas security
control, supermarkets, banks, traffic monitoring, and etc... Some approaches
exist and have been described in literature. They are mainly based on pattern
matching and normalized correlations withalargedatabaseofstoredtemplates
[3, 4]. The aim of the system is to recognize time and date stamps for allowing
time-based queries and for reconstructing the path of the object.
Because the two main problems in video OCR are complex
background and low resolution, it is widely accepted [1, 2].
The text to recognize is not a mere sequence of characters,
but a valid date and time. Different format of time and date
have to be considered. The format includes time and date in
one or two lines; date above or below; numericoralphabetic
month representation; seconds withonedecimal digit;order
of day and month in the date; different separators, etc.
This learning approach has been shown to guarantee high
rate of convergence and properties of stability and
robustness of the solution. The recognition process starts
with the search and the extraction of the portion of the
original image. The characters contained in the plate region
are localized by a robust processing using a non-traditional
Discrete Cosine Transform (DCT) and subsequently
segmented by applying low pass filtering on the plateregion
image and convert the gray scale plate region image into by
using histogram-based shareholding method. Afterlabeling,
object with small area, which might be noise, are moved.
From this segmented image we need to recognize the actual
characters and numbers. Back propagation neural network
is used for character recognition.
PROPOSED SYSTEM
In this study, the proposed system is based on the
localization of time and date region and camera number,
segmentation of these characters and recognition of
characters and store these characters in the database. And
then the system reconstructs the path of the object based on
time.
3.1 Localization of the Time and Date Region
In the localization part, the entire image is input, and then
the time and date region is localized by using block-based
DCT (DiscreteCosineTransform).DCTtransforms thespatial
domain image into the frequency domain one. So, we can
localize the time and date region from the DCT image
because the numbers or characters on the region usually
have high frequency. We detect the time and date region by
scanning a window on the DCT image. If the number of
horizontal, vertical and diagonal edges in the window is
above a threshold value, then we assume that position is the
region.
Fig 1 Example Input Image
3.2 Segmentation
In the segmentation part, we segment each number or
character from the plate area image. First weapplylow-pass
filtering in the plate area image 3x3 averaging operator in
IJTSRD27981
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD27981 | Volume – 3 | Issue – 5 | July - August 2019 Page 2611
order to remove noise, then we convert the grey scale plate
area image into binary image by using histogram-based
shareholding method. The image size 640x480 pixelsis used
for input. First of all, all program read image file and find
some information from that need to handle image. While
reading processing ends, image data will be row image. And
it is necessary to get only brightness information. After that
image was converted into YCbCr color system and adopt
only Y image. Interval of the window’s movement is 4 pixels
in row and column in order to reduce processingtime.When
we get plate image, which sized 170 x 90 to reduce error
(each 10 more pixels in 4 directions).
It is required to know more about exact location of letters in
plate so that some pre-processing steps have to be
implemented. The first processing is ‘binarization’. We used
general binarization. The threshold value is very important
thing. Next the extracted characters areconverted intoblack
and white characters represented by using binarization. To
get a more accurate binarization results, this process uses
several local threshold values since illumination of the
plates, in general, is not uniform.
Next to extract the plate characters and then proceeds to
their identification, a labeling process is applied to the
binary image, which is a very useful technique to segment
characters with some inclination and different sizes. The
labeling process allows the segmentation of the plate
characters. After labeling, objects with small area, which
might be noise, are removed.
3.3 Feature Extraction
The obtained characters were separately saved as an image
file in feature extraction. A feature extraction process plays
an important role in content based imageclassification.Back
propagation ANN classifies the numbers and the letters for
increasing the success rate of the recognition phase. The
character images should be extracted as features before
classification. These extracted features provide us to obtain
the most discriminating information of an image. This
information can be presented as a feature vector. The
comparison between characters can bemade whena feature
vector that includes global and local features of a character
should be encoded. In this system, the feature vector of an
image was encoded by using Average Absolute Deviation
algorithm [5]. This algorithm is defined as:
(1)
Where N is the number of pixels in the image, m is the mean
of the image and f (x, y) is the value at point (x, y). The
feature vectors with the length of 49 bytes for numbers and
48 bytes for letters are obtained.Back propagationANNuses
the entire feature vectors as an input for classification of the
characters.
3.3 Recognition of the Characters
Once each individual digit and/or character is extracted, it
must be identified in some way. This processis calledOptical
Character Recognition, and there are several different
solutions to this problem. The outputofagenericOCR would
basically consist of taking the characters that produce the
highest matching for every segment in string. An
interpretation of the result as a valid time and date is
required. The numbers and the letters were classified by
using back propagation ANN for increasing the success rate
of the recognition phase.
3.3.1 Back Propagation Neural Network
In this approach, back propagation neural network is used.
To improve the network until it is able to perform the task
for which it is being trained, its iterative, recursive and
efficient method for calculatingthe weights updates areused
as main features of back propagation. Fig 2 is shown for a
general block diagram of back propagation neural network.
Firstly, the training parameters are defined:
 Initial Conditions
 Number of iterations
 Number of hidden layer
Fig 2 Back Propagation Neural Network
Multilayer Neural Network which is based upon back
propagation algorithm for training is a Back Propagation
Neural Network (BPNN). This neural network is based upon
extended gradient descentbasedDeltalearningrulewhich is
known as Back Propagation rule.Wemustadjusttheweights
of each unit in such a way that the error between thedesired
output and the actual output is reduced to train a neural
network to perform some task. This process requires that
the neural network computes the error derivative of the
weights. In other words, it must calculate how the error
changes as each weight is increased or decreased slightly.
The back propagation algorithm is the most widely used
method for determining the derivative of Weight. If all the
units in the network are linear, the back propagation
algorithm is easiest to understand. In backward direction
from output to hidden layer in this network to input layer in
order to train the network, error signal between desired
output and actual output is being propagated.
Input layer, hidden layer and output layer are included in
artificial neural network. Initially, training data are placed
into the input layer. This is transmitted to the hidden layer
and the output layer. The process is known as forward pass.
The appropriate weight between nodes and generateoutput
value of the resulting sum are computed and adjusted by
each node in the input layer, hidden layer and output layer.
After that the actual output values will becomparedwiththe
target output values. In order to update the weight of each
node again, the error between these outputs will be
calculated and propagated back to hidden layer. The error
calculated is shown as in equation (2).
E= ½[dk-yk]2 (2)
Where dk is the output for neural network.
Until the error is acceptable, the network will iterate over
many cycles. For any new input data, the trained network is
ready to use after the training step is done. The input for
testing is placed into the input layer and results based on its
knowledge from trained network will be generated by the
feed forward network. The algorithm calculates each
derivative of error by first calculating the rate at which the
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD27981 | Volume – 3 | Issue – 5 | July - August 2019 Page 2612
error changes as the activity level of a unit is changed. For
output units, the difference between the actual and the
desired output is the error. We first identify all the weights
between that hidden unit and the output units to which it is
connected to compute the error for a hidden unitinthelayer
just before the output layer. Then, we multiply the error of
those output units by those weights and add the products.
The error for the chosen hidden unit is equal to this sum.
Moving from layer to layer in a direction opposite totheway
activities propagate through the network, we can compute
the EAs for other layers after calculating all the errors in
the hidden layer just before the output layer. It is straight
forward to compute thederivativeoferrorforeachincoming
connection of the unit once the error has been computed for
a unit. In neural network, back propagation algorithm is
most generally used. The input for testing is given to input
layer and it will provide results according to knowledge it
gets from training.
After the recognition phase, the result of date and time and
camera number are stored in the database. Finally, the
system arranges the camera information based on time and
date for the object that passed the cameras. In table 1, the
object passed through GA-2030, GF-3065,GF1020,GF-2451,
GA-2076 and so on. The flow chart of the proposedsystem is
shown in fig 3.
Point No
Extracted Video Frame
Camera Information Point and Place
Year Month Day Hours Min Sec
1 2019 3 15 12 26 6 GA-2030 Gate Point
2 2019 3 15 1 30 34 GA-2076 Gate Point
3 2019 3 15 12 45 12 GF-3065 Front of Building
4 2019 3 15 12 56 23 GF-1020 Mid of Building
5 2019 3 15 1 20 5 GF-2451 End of Building
… … … … … … … … …
Fig 3 System Flow Diagram
CONCLUSIONS
In this paper, we proposed the system for reconstructingthe
path of the object based on time and dateOCRinsurveillance
camera. Time and date OCR in surveillance system provides
useful information. The integration of the proposed system
in a bigger application will offer the ability of performing
time-based queries.
REFERENCES
[1] Sato, T., Kanade, T., Hughes, E.K., Smith, M.A., Satoh, S.:
Video OCR: Indexing Digital News Libraries by
Recognition of Superimposed Captions. ACM
Multimedia Systems, Vol. 7, No. 5 (1999) 385–395.
[2] J. Choi, “A study on the extraction and recognition of a
car number plate by image processing”, Journal of
Korea Institute of Telmetric and electronics, Vol.24,
No.2, PP-309-315.
[3] K. K. Kim, K. I. Kim, J. Baeking, H. J. Kim, “Learning
based Approach for Lisence Plate Reformation”,
Journal of the Institute of signal processingandsystem,
PP-1-11, 2001.
[4] L. Ma, Y. Wang, T. Tan, “Iris recognition based on
Multichannel Gabor Filtering”, The 5th Asian
Conference on Computer Vision, Australia, 2002.
[5] H. Erdinc Kocer, K. Kursat Cevik, ”Artificial neural
networks based vehicle license plate recognition”,
Procedia Computer Science 3 (2011) 1033-1037.

More Related Content

What's hot

Deep Learning for Natural Language Processing
Deep Learning for Natural Language ProcessingDeep Learning for Natural Language Processing
Deep Learning for Natural Language ProcessingIRJET Journal
 
SAR Image Classification by Multilayer Back Propagation Neural Network
SAR Image Classification by Multilayer Back Propagation Neural NetworkSAR Image Classification by Multilayer Back Propagation Neural Network
SAR Image Classification by Multilayer Back Propagation Neural NetworkIJMTST Journal
 
IRJET- Data Embedding using Image Steganography
IRJET-  	  Data Embedding using Image SteganographyIRJET-  	  Data Embedding using Image Steganography
IRJET- Data Embedding using Image SteganographyIRJET Journal
 
Improved block based segmentation for jpeg compressed document images
Improved block based segmentation for jpeg compressed document imagesImproved block based segmentation for jpeg compressed document images
Improved block based segmentation for jpeg compressed document imageseSAT Journals
 
Image Fusion using PCA Based Fusion Rule in Wavelet Domain
Image Fusion using PCA Based Fusion Rule in Wavelet DomainImage Fusion using PCA Based Fusion Rule in Wavelet Domain
Image Fusion using PCA Based Fusion Rule in Wavelet Domainijtsrd
 
Image transmission in wireless sensor networks
Image transmission in wireless sensor networksImage transmission in wireless sensor networks
Image transmission in wireless sensor networkseSAT Publishing House
 
Improved block based segmentation for jpeg
Improved block based segmentation for jpegImproved block based segmentation for jpeg
Improved block based segmentation for jpegeSAT Publishing House
 
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...AM Publications,India
 
High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...IAEME Publication
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueEditor IJCATR
 
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...ijait
 
Review and comparison of tasks scheduling in cloud computing
Review and comparison of tasks scheduling in cloud computingReview and comparison of tasks scheduling in cloud computing
Review and comparison of tasks scheduling in cloud computingijfcstjournal
 
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYS
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYSA NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYS
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYSEditor IJMTER
 
A simple framework for contrastive learning of visual representations
A simple framework for contrastive learning of visual representationsA simple framework for contrastive learning of visual representations
A simple framework for contrastive learning of visual representationsDevansh16
 
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONijcseit
 

What's hot (18)

Deep Learning for Natural Language Processing
Deep Learning for Natural Language ProcessingDeep Learning for Natural Language Processing
Deep Learning for Natural Language Processing
 
J25043046
J25043046J25043046
J25043046
 
SAR Image Classification by Multilayer Back Propagation Neural Network
SAR Image Classification by Multilayer Back Propagation Neural NetworkSAR Image Classification by Multilayer Back Propagation Neural Network
SAR Image Classification by Multilayer Back Propagation Neural Network
 
By4301435440
By4301435440By4301435440
By4301435440
 
IRJET- Data Embedding using Image Steganography
IRJET-  	  Data Embedding using Image SteganographyIRJET-  	  Data Embedding using Image Steganography
IRJET- Data Embedding using Image Steganography
 
Improved block based segmentation for jpeg compressed document images
Improved block based segmentation for jpeg compressed document imagesImproved block based segmentation for jpeg compressed document images
Improved block based segmentation for jpeg compressed document images
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
 
Image Fusion using PCA Based Fusion Rule in Wavelet Domain
Image Fusion using PCA Based Fusion Rule in Wavelet DomainImage Fusion using PCA Based Fusion Rule in Wavelet Domain
Image Fusion using PCA Based Fusion Rule in Wavelet Domain
 
Image transmission in wireless sensor networks
Image transmission in wireless sensor networksImage transmission in wireless sensor networks
Image transmission in wireless sensor networks
 
Improved block based segmentation for jpeg
Improved block based segmentation for jpegImproved block based segmentation for jpeg
Improved block based segmentation for jpeg
 
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...
 
High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
 
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
 
Review and comparison of tasks scheduling in cloud computing
Review and comparison of tasks scheduling in cloud computingReview and comparison of tasks scheduling in cloud computing
Review and comparison of tasks scheduling in cloud computing
 
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYS
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYSA NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYS
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYS
 
A simple framework for contrastive learning of visual representations
A simple framework for contrastive learning of visual representationsA simple framework for contrastive learning of visual representations
A simple framework for contrastive learning of visual representations
 
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
 

Similar to Reconstructing the Path of the Object based on Time and Date OCR in Surveillance System

IRJET- Intelligent Character Recognition of Handwritten Characters
IRJET- Intelligent Character Recognition of Handwritten CharactersIRJET- Intelligent Character Recognition of Handwritten Characters
IRJET- Intelligent Character Recognition of Handwritten CharactersIRJET Journal
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...ijfcstjournal
 
Scene Text Detection of Curved Text Using Gradiant Vector Flow Method
Scene Text Detection of Curved Text Using Gradiant Vector Flow MethodScene Text Detection of Curved Text Using Gradiant Vector Flow Method
Scene Text Detection of Curved Text Using Gradiant Vector Flow MethodIJTET Journal
 
IRJET- Automatic Data Collection from Forms using Optical Character Recognition
IRJET- Automatic Data Collection from Forms using Optical Character RecognitionIRJET- Automatic Data Collection from Forms using Optical Character Recognition
IRJET- Automatic Data Collection from Forms using Optical Character RecognitionIRJET Journal
 
Text Extraction and Recognition Using Median Filter
Text Extraction and Recognition Using Median FilterText Extraction and Recognition Using Median Filter
Text Extraction and Recognition Using Median FilterIRJET Journal
 
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET Journal
 
Currency recognition on mobile phones
Currency recognition on mobile phonesCurrency recognition on mobile phones
Currency recognition on mobile phoneshabeebsab
 
Handwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdf
Handwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdfHandwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdf
Handwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdfSachin414679
 
Recognition Technology for Four Arithmetic Operations
Recognition Technology for Four Arithmetic OperationsRecognition Technology for Four Arithmetic Operations
Recognition Technology for Four Arithmetic OperationsTELKOMNIKA JOURNAL
 
Automatic License Plate Detection in Foggy Condition using Enhanced OTSU Tech...
Automatic License Plate Detection in Foggy Condition using Enhanced OTSU Tech...Automatic License Plate Detection in Foggy Condition using Enhanced OTSU Tech...
Automatic License Plate Detection in Foggy Condition using Enhanced OTSU Tech...IRJET Journal
 
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...IRJET Journal
 
Devanagari Digit and Character Recognition Using Convolutional Neural Network
Devanagari Digit and Character Recognition Using Convolutional Neural NetworkDevanagari Digit and Character Recognition Using Convolutional Neural Network
Devanagari Digit and Character Recognition Using Convolutional Neural NetworkIRJET Journal
 
IRJET- Advanced Character based Recognition and Phone Handling for Blind ...
IRJET-  	  Advanced Character based Recognition and Phone Handling for Blind ...IRJET-  	  Advanced Character based Recognition and Phone Handling for Blind ...
IRJET- Advanced Character based Recognition and Phone Handling for Blind ...IRJET Journal
 
Binarization of Degraded Text documents and Palm Leaf Manuscripts
Binarization of Degraded Text documents and Palm Leaf ManuscriptsBinarization of Degraded Text documents and Palm Leaf Manuscripts
Binarization of Degraded Text documents and Palm Leaf ManuscriptsIRJET Journal
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System iosrjce
 
Feature Extraction and Feature Selection using Textual Analysis
Feature Extraction and Feature Selection using Textual AnalysisFeature Extraction and Feature Selection using Textual Analysis
Feature Extraction and Feature Selection using Textual Analysisvivatechijri
 
IRJET- Automatic Traffic Sign Detection and Recognition using CNN
IRJET- Automatic Traffic Sign Detection and Recognition using CNNIRJET- Automatic Traffic Sign Detection and Recognition using CNN
IRJET- Automatic Traffic Sign Detection and Recognition using CNNIRJET Journal
 

Similar to Reconstructing the Path of the Object based on Time and Date OCR in Surveillance System (20)

Assignment-1-NF.docx
Assignment-1-NF.docxAssignment-1-NF.docx
Assignment-1-NF.docx
 
IRJET- Intelligent Character Recognition of Handwritten Characters
IRJET- Intelligent Character Recognition of Handwritten CharactersIRJET- Intelligent Character Recognition of Handwritten Characters
IRJET- Intelligent Character Recognition of Handwritten Characters
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...
 
Scene Text Detection of Curved Text Using Gradiant Vector Flow Method
Scene Text Detection of Curved Text Using Gradiant Vector Flow MethodScene Text Detection of Curved Text Using Gradiant Vector Flow Method
Scene Text Detection of Curved Text Using Gradiant Vector Flow Method
 
IRJET- Automatic Data Collection from Forms using Optical Character Recognition
IRJET- Automatic Data Collection from Forms using Optical Character RecognitionIRJET- Automatic Data Collection from Forms using Optical Character Recognition
IRJET- Automatic Data Collection from Forms using Optical Character Recognition
 
Text Extraction and Recognition Using Median Filter
Text Extraction and Recognition Using Median FilterText Extraction and Recognition Using Median Filter
Text Extraction and Recognition Using Median Filter
 
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
 
Currency recognition on mobile phones
Currency recognition on mobile phonesCurrency recognition on mobile phones
Currency recognition on mobile phones
 
Handwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdf
Handwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdfHandwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdf
Handwriting_Recognition_using_KNN_classificatiob_algorithm_ijariie6729 (1).pdf
 
Recognition Technology for Four Arithmetic Operations
Recognition Technology for Four Arithmetic OperationsRecognition Technology for Four Arithmetic Operations
Recognition Technology for Four Arithmetic Operations
 
Automatic License Plate Detection in Foggy Condition using Enhanced OTSU Tech...
Automatic License Plate Detection in Foggy Condition using Enhanced OTSU Tech...Automatic License Plate Detection in Foggy Condition using Enhanced OTSU Tech...
Automatic License Plate Detection in Foggy Condition using Enhanced OTSU Tech...
 
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
 
Devanagari Digit and Character Recognition Using Convolutional Neural Network
Devanagari Digit and Character Recognition Using Convolutional Neural NetworkDevanagari Digit and Character Recognition Using Convolutional Neural Network
Devanagari Digit and Character Recognition Using Convolutional Neural Network
 
IRJET- Advanced Character based Recognition and Phone Handling for Blind ...
IRJET-  	  Advanced Character based Recognition and Phone Handling for Blind ...IRJET-  	  Advanced Character based Recognition and Phone Handling for Blind ...
IRJET- Advanced Character based Recognition and Phone Handling for Blind ...
 
Binarization of Degraded Text documents and Palm Leaf Manuscripts
Binarization of Degraded Text documents and Palm Leaf ManuscriptsBinarization of Degraded Text documents and Palm Leaf Manuscripts
Binarization of Degraded Text documents and Palm Leaf Manuscripts
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System
 
K012647982
K012647982K012647982
K012647982
 
K012647982
K012647982K012647982
K012647982
 
Feature Extraction and Feature Selection using Textual Analysis
Feature Extraction and Feature Selection using Textual AnalysisFeature Extraction and Feature Selection using Textual Analysis
Feature Extraction and Feature Selection using Textual Analysis
 
IRJET- Automatic Traffic Sign Detection and Recognition using CNN
IRJET- Automatic Traffic Sign Detection and Recognition using CNNIRJET- Automatic Traffic Sign Detection and Recognition using CNN
IRJET- Automatic Traffic Sign Detection and Recognition using CNN
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

Reconstructing the Path of the Object based on Time and Date OCR in Surveillance System

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 3 Issue 5, August 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD27981 | Volume – 3 | Issue – 5 | July - August 2019 Page 2610 Reconstructing the Path of the Object Based on Time and Date OCR in Surveillance System Pyae Phyo Thu, Mie Mie Tin, Ei Phyu Win, Cho Thet Mon Faculty of Information Science, Myanmar Institute of Information Technology, Mandalay, Myanmar How to cite this paper: Pyae Phyo Thu | Mie Mie Tin | Ei Phyu Win | Cho Thet Mon "Reconstructing the Path of the Object based on Time and Date OCR in Surveillance System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-3 | Issue-5, August 2019, pp.2610-2612, https://doi.org/10.31142/ijtsrd27981 Copyright © 2019 by author(s) and International Journal ofTrend inScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) ABSTRACT The inclusion of time-based queries in videoindexing applicationis enables by the recognition of time and date stamps in CCTV video. In this paper, we propose the system for reconstructing the path of the object in surveillance cameras based on time and date optical character recognition system. Since there is no boundary in region for time and date, Discrete Cosine Transform (DCT) method is applied in order to locate the region area. After the regionfor time and date is located, it is segmented and then features for the symbols of the time and date are extracted. Back propagation neural network is used for recognition of the features and then stores the result in the database. By using the resulted database, the system reconstructs thepathfortheobjectbasedon time. The proposed system will be implemented in MATLAB. KEYWORDS: Localization, Character Segmentation, Character Recognition, Back Propagation Neural Network INTRODUCTION In the last few years, optical character recognition in digital video has received an increasing interest [1]. It is widelyusedinmanyapplications suchas security control, supermarkets, banks, traffic monitoring, and etc... Some approaches exist and have been described in literature. They are mainly based on pattern matching and normalized correlations withalargedatabaseofstoredtemplates [3, 4]. The aim of the system is to recognize time and date stamps for allowing time-based queries and for reconstructing the path of the object. Because the two main problems in video OCR are complex background and low resolution, it is widely accepted [1, 2]. The text to recognize is not a mere sequence of characters, but a valid date and time. Different format of time and date have to be considered. The format includes time and date in one or two lines; date above or below; numericoralphabetic month representation; seconds withonedecimal digit;order of day and month in the date; different separators, etc. This learning approach has been shown to guarantee high rate of convergence and properties of stability and robustness of the solution. The recognition process starts with the search and the extraction of the portion of the original image. The characters contained in the plate region are localized by a robust processing using a non-traditional Discrete Cosine Transform (DCT) and subsequently segmented by applying low pass filtering on the plateregion image and convert the gray scale plate region image into by using histogram-based shareholding method. Afterlabeling, object with small area, which might be noise, are moved. From this segmented image we need to recognize the actual characters and numbers. Back propagation neural network is used for character recognition. PROPOSED SYSTEM In this study, the proposed system is based on the localization of time and date region and camera number, segmentation of these characters and recognition of characters and store these characters in the database. And then the system reconstructs the path of the object based on time. 3.1 Localization of the Time and Date Region In the localization part, the entire image is input, and then the time and date region is localized by using block-based DCT (DiscreteCosineTransform).DCTtransforms thespatial domain image into the frequency domain one. So, we can localize the time and date region from the DCT image because the numbers or characters on the region usually have high frequency. We detect the time and date region by scanning a window on the DCT image. If the number of horizontal, vertical and diagonal edges in the window is above a threshold value, then we assume that position is the region. Fig 1 Example Input Image 3.2 Segmentation In the segmentation part, we segment each number or character from the plate area image. First weapplylow-pass filtering in the plate area image 3x3 averaging operator in IJTSRD27981
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD27981 | Volume – 3 | Issue – 5 | July - August 2019 Page 2611 order to remove noise, then we convert the grey scale plate area image into binary image by using histogram-based shareholding method. The image size 640x480 pixelsis used for input. First of all, all program read image file and find some information from that need to handle image. While reading processing ends, image data will be row image. And it is necessary to get only brightness information. After that image was converted into YCbCr color system and adopt only Y image. Interval of the window’s movement is 4 pixels in row and column in order to reduce processingtime.When we get plate image, which sized 170 x 90 to reduce error (each 10 more pixels in 4 directions). It is required to know more about exact location of letters in plate so that some pre-processing steps have to be implemented. The first processing is ‘binarization’. We used general binarization. The threshold value is very important thing. Next the extracted characters areconverted intoblack and white characters represented by using binarization. To get a more accurate binarization results, this process uses several local threshold values since illumination of the plates, in general, is not uniform. Next to extract the plate characters and then proceeds to their identification, a labeling process is applied to the binary image, which is a very useful technique to segment characters with some inclination and different sizes. The labeling process allows the segmentation of the plate characters. After labeling, objects with small area, which might be noise, are removed. 3.3 Feature Extraction The obtained characters were separately saved as an image file in feature extraction. A feature extraction process plays an important role in content based imageclassification.Back propagation ANN classifies the numbers and the letters for increasing the success rate of the recognition phase. The character images should be extracted as features before classification. These extracted features provide us to obtain the most discriminating information of an image. This information can be presented as a feature vector. The comparison between characters can bemade whena feature vector that includes global and local features of a character should be encoded. In this system, the feature vector of an image was encoded by using Average Absolute Deviation algorithm [5]. This algorithm is defined as: (1) Where N is the number of pixels in the image, m is the mean of the image and f (x, y) is the value at point (x, y). The feature vectors with the length of 49 bytes for numbers and 48 bytes for letters are obtained.Back propagationANNuses the entire feature vectors as an input for classification of the characters. 3.3 Recognition of the Characters Once each individual digit and/or character is extracted, it must be identified in some way. This processis calledOptical Character Recognition, and there are several different solutions to this problem. The outputofagenericOCR would basically consist of taking the characters that produce the highest matching for every segment in string. An interpretation of the result as a valid time and date is required. The numbers and the letters were classified by using back propagation ANN for increasing the success rate of the recognition phase. 3.3.1 Back Propagation Neural Network In this approach, back propagation neural network is used. To improve the network until it is able to perform the task for which it is being trained, its iterative, recursive and efficient method for calculatingthe weights updates areused as main features of back propagation. Fig 2 is shown for a general block diagram of back propagation neural network. Firstly, the training parameters are defined:  Initial Conditions  Number of iterations  Number of hidden layer Fig 2 Back Propagation Neural Network Multilayer Neural Network which is based upon back propagation algorithm for training is a Back Propagation Neural Network (BPNN). This neural network is based upon extended gradient descentbasedDeltalearningrulewhich is known as Back Propagation rule.Wemustadjusttheweights of each unit in such a way that the error between thedesired output and the actual output is reduced to train a neural network to perform some task. This process requires that the neural network computes the error derivative of the weights. In other words, it must calculate how the error changes as each weight is increased or decreased slightly. The back propagation algorithm is the most widely used method for determining the derivative of Weight. If all the units in the network are linear, the back propagation algorithm is easiest to understand. In backward direction from output to hidden layer in this network to input layer in order to train the network, error signal between desired output and actual output is being propagated. Input layer, hidden layer and output layer are included in artificial neural network. Initially, training data are placed into the input layer. This is transmitted to the hidden layer and the output layer. The process is known as forward pass. The appropriate weight between nodes and generateoutput value of the resulting sum are computed and adjusted by each node in the input layer, hidden layer and output layer. After that the actual output values will becomparedwiththe target output values. In order to update the weight of each node again, the error between these outputs will be calculated and propagated back to hidden layer. The error calculated is shown as in equation (2). E= ½[dk-yk]2 (2) Where dk is the output for neural network. Until the error is acceptable, the network will iterate over many cycles. For any new input data, the trained network is ready to use after the training step is done. The input for testing is placed into the input layer and results based on its knowledge from trained network will be generated by the feed forward network. The algorithm calculates each derivative of error by first calculating the rate at which the
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD27981 | Volume – 3 | Issue – 5 | July - August 2019 Page 2612 error changes as the activity level of a unit is changed. For output units, the difference between the actual and the desired output is the error. We first identify all the weights between that hidden unit and the output units to which it is connected to compute the error for a hidden unitinthelayer just before the output layer. Then, we multiply the error of those output units by those weights and add the products. The error for the chosen hidden unit is equal to this sum. Moving from layer to layer in a direction opposite totheway activities propagate through the network, we can compute the EAs for other layers after calculating all the errors in the hidden layer just before the output layer. It is straight forward to compute thederivativeoferrorforeachincoming connection of the unit once the error has been computed for a unit. In neural network, back propagation algorithm is most generally used. The input for testing is given to input layer and it will provide results according to knowledge it gets from training. After the recognition phase, the result of date and time and camera number are stored in the database. Finally, the system arranges the camera information based on time and date for the object that passed the cameras. In table 1, the object passed through GA-2030, GF-3065,GF1020,GF-2451, GA-2076 and so on. The flow chart of the proposedsystem is shown in fig 3. Point No Extracted Video Frame Camera Information Point and Place Year Month Day Hours Min Sec 1 2019 3 15 12 26 6 GA-2030 Gate Point 2 2019 3 15 1 30 34 GA-2076 Gate Point 3 2019 3 15 12 45 12 GF-3065 Front of Building 4 2019 3 15 12 56 23 GF-1020 Mid of Building 5 2019 3 15 1 20 5 GF-2451 End of Building … … … … … … … … … Fig 3 System Flow Diagram CONCLUSIONS In this paper, we proposed the system for reconstructingthe path of the object based on time and dateOCRinsurveillance camera. Time and date OCR in surveillance system provides useful information. The integration of the proposed system in a bigger application will offer the ability of performing time-based queries. REFERENCES [1] Sato, T., Kanade, T., Hughes, E.K., Smith, M.A., Satoh, S.: Video OCR: Indexing Digital News Libraries by Recognition of Superimposed Captions. ACM Multimedia Systems, Vol. 7, No. 5 (1999) 385–395. [2] J. Choi, “A study on the extraction and recognition of a car number plate by image processing”, Journal of Korea Institute of Telmetric and electronics, Vol.24, No.2, PP-309-315. [3] K. K. Kim, K. I. Kim, J. Baeking, H. J. Kim, “Learning based Approach for Lisence Plate Reformation”, Journal of the Institute of signal processingandsystem, PP-1-11, 2001. [4] L. Ma, Y. Wang, T. Tan, “Iris recognition based on Multichannel Gabor Filtering”, The 5th Asian Conference on Computer Vision, Australia, 2002. [5] H. Erdinc Kocer, K. Kursat Cevik, ”Artificial neural networks based vehicle license plate recognition”, Procedia Computer Science 3 (2011) 1033-1037.