SlideShare a Scribd company logo
1 of 7
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1025
Digit Identification in Natural Images
Govardhan Gayake1, Dr. Arati Dandavate2
1ME Student, Savitribai Phule University of Pune, Department of Computer Engineering JSPM COE, Hadapsar, Pune
2Professor, Savitribai Phule University of Pune, Department of Computer Engineering JSPM COE, Hadapsar, Pune
----------------------------------------------------------------------------***---------------------------------------------------------------------------
Abstract — Number recognition from images is a complex task to achieve in this digital era. Advanced applications that are
beyond Automatic Number Plate Recognition (ANPR) are developed with different algorithms and image processing
techniques to recognize numbers from an image with much adverse scenarios. In this paper, we are describing a technique to
locate and recognize the numbers in an image. It includes preprocessing for image smoothening, Edge detection to recognize
boundaries of all objects. Maximal stable extremal region is used to identify the potential candidate objects. Feature extraction
is used to predict the possible number for that object.
Keywords — MSER, Sobel, Feature Extraction
I. INTRODUCTION
Today world has advanced to digital age. People are making out more work with less effort through the help of digitization.
The work which is used to take hours is now done within seconds. People prefer digital documents over hard copies as it’s
handy and portable. The digital documents are digital books, images etc.
In many scenarios, it’s required to extract information from these digital documents. This information may include
numbers and text.
In this paper, we are discussing process to locate and recognize numbers in the image. Initially image is preprocessed to
remove noise. The preprocessing involves gray scaling of RGB image. The preprocessed image undergoes edge detection
process. The edge detected image is used to find MSER (Maximally stable extremal regions) regions.
The MSER regions are the regions which has very stable intensity. The MSER regions are the region where numbers lies in
the images. Finally feature extraction is used to predict the number.
This paper is divided in 5 sections as: Second section describes pre-processing techniques. The third section explains the
working of edge detection technique. The fourth section describes the MSER regions. The fifth section explains feature
extraction to predict number and finally conclusion is given.
II. PRE-PROCESSING
The aim of preprocessing is an improvement of image data that suppresses unwanted distortions or enhances some image
features important for the image processing. Also, it enhances the visual appearance of images.
A. Gaussian Blur
Gausssian blur is used as pre-processing technique to smoothen the image by noise removal. It is performed by convolving
the image using the Gaussian function. The Gaussian distribution in 1-D has the form:
Fig 1. Gaussian distribution
Where sigma is the standard deviation of the distribution. Gaussian blurring is commonly used when reducing the size of
an image. When down sampling an image, it is common to apply a low-pass filter to the image prior to resampling. This is to
ensure that spurious high-frequency information does not appear in the down sampled image.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1026
III. EDGE DETECTION
Edge detection plays important role in image processing. Significant transitions in an image are called as edges. It
differentiates between different objects, the outline in the foreground and background object. Different features such as
shapes, boundary can be measured between the designs of image
[1]. Edge detection technique works by finding discontinuity in the images [2].
The different edge detection algorithms are as follows:
A. Sobel Operator
Working of Sobel Operator is as follows:
It function like first order derivative, in edge region the difference of pixel intensities is calculated. An image intensity
functions approximation of the gradient is computed, the Gaussian smoothing and differentiation is combined. It is a pair of
3x3 convolution kernel that takes first kernel and rotates another kernel by 90 in anticlockwise direction.
Fig 2. Kernel matrix
Fig 3. Edge detected image using Sobel operator
The above designed kernels respond to horizontal and vertical running edges. To produce the gradient component in each
orientation Gx and Gy, combine these to produce magnitude of Gradient [2] [3].
Appoximate magnitude is calculated using equation 2.
The angle of orientation of the edge is calculated by equation 3.
Ɵ = arctan (Gy/Gx) (3)
B. Canny Edge
The Canny operator works in a multi-stage process. Canny edge algorithm makes use of calculus of variations. The tracking
process exhibits hysteresis controlled by two thresholds: T1 and T2, with T1 > T2.
|G| = (1)
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1027
Canny Edge algorithm is as follows:
Step 1: Initially, the Gaussian filter is applied to smooth image and noise is removed. Step 2: Intensity of images is
calculated.
Step 3: To get rid from non-genuine response to edge detection non-maximum suppression is applied. Step 4: Potential
edges are determined by applying double threshold.
Step 5: Other weak edges are suppressed which are not connected to strong edge [4].
Fig 3 Edge detection using Canny Edge algorithm
C. Prewitts Operator
In Prewitts operator, mask is applied on the image which calculates difference of pixel intensities of the edge region.
Horizontal and vertical edges are detected in Prewitts operator. Differences of pixel intensities of corresponding pixel are used
to calculate edges.
The mask for detection of edges in vertical direction,
The mask for detection of edges in horizontal direction,
Above mask will find edges in horizontal direction and it is because of zeros in middle row [7] [9].
IV. MSER
Maximally stable extremal regions (MSER) are used to obtain all possible candidate regions. Candidate regions are the text
regions which we are interested in. In MSER we firstly perform the sorting operation on the pixels. After sorting, pixels are
marked in the image, and the list of growing and merging connected components and their areas is maintained using the
union-find algorithm [8].
There are two types of MSER i.e positive and negative. First type we get by thresholding all intensities of grayscale images.
E.g. for a threshold T = 45, all pixels with intensity <= 45 are assigned black, or foreground, and all pixels > 45
intensity are white or background. While the second type consists of only two intensities 0 and 255.
Compared with other five region detectors which are Harris-affine region detector, Hessian-affine detector, edgebased
regions, intensity extremal detector, and salient regions detector MSER provides many advantages.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1028
• Density of Region
MSER offers 2600 regions for texture blur image and 230 regions for light changed and has repeatability of 92% for this
tests.
• Size of Region
MSER goes for smaller region detection as compared larger regions.
• Change of Scale
After Hessian-affine detector, MSER comes in second under scale change and in-plane rotation of image.
• Change of light
MSER showed the highest repeatability score for this type of scenario compared to other region detectors.
Fig 4.1 Edge directed image
Fig 4.2 Candidate Region
Above images show MSER region obtained from edge detected image.
V. NUMBER RECOGNITION
Once we get the area where digits are located next step is to recognize the digits. The digits can be recognized using feature
extraction technique. The feature extraction is process which involves finding some specific pattern or features which can be
easily compared with trained data to recognize the objects in an image. The features can be edges, corners or blob in the
image. The shaped based features are nothing but lines, circles. [11][12] [13].
A. Segmentation of Digits
• Vertical projection
The vertical projection is used to segment each digit. The vertical projection is the process of calculating sum of pixels in
each column of an image. In vertical projection, troughs represent the boundary between two digits [15].
• Using Contours
The contours are the boundaries of any object in the image. To find contours in the image, initially image is converted into
black and white image. The black and white image will have pixels with intensity 0 and 1 where 0 or white represent
background part of image and 1 or black represent pattern [16].
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1029
Fig 5. Projection image
Fig 6. Segmentation of Digits
B. Feature Extraction
After segmentation, bounding box is formed around each segmented digit. For each bonding box features are extracted.
Now to recognize each digit, extracted features need to be classified. To classify each digits technique such as KNN neighbor or
probabilistic Neural Network can be used. In KNN algorithms, initially samples of digits are used for training classifier. This
classifier is used to classify each digit based upon features.
The complete step wise procedure is described below
Fig 7.1. Preprocessing on input image
Fig 7.2. Edge detected image using Sobel operator
Fig 7.3. Detect MSER Region
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1030
Fig 7.4. Segmentation of Digits
7.5. Feature extraction for each digit
Fig 7.6. Classification of each Digit
VI.CONCLUSION
The canny edge detection algorithm requires threshold for detecting edges where as sobel can find all edges using
horizontal and vertical gradients. The MSER region provides smaller precise regions than any other region detector. The
optical character recognition system uses training data set having hundred of samples which consumes lot of memory space.
To recognize numbers using feature extraction, it needs either no training data or smaller training data resulting in saving
memory space and computation time.
VII. FUTURE SCOPE
Above techniques performs efficiently when input images has plain background .The accuracy degrades as complexity of
background of image increases. The complex background introduces unwanted edges after edge detection due to which
unexpected features of images get extracted. So algorithm to remove unwanted edges due to complex background can be
included in system to make robust in all condition.
REFERENCES
1. G. Eason, B. Noble, and I. N. Sneddon, “On certain integrals of Lipschitz-Hankel type involving products of Bessel
functions,” Phil. Trans. Roy. Soc. London, vol. A247, pp. 529–551, April 1955.
2. B.Pechiammal, Dr.J.Arokia Renjith, “AN EFFICIENT APPROACH FOR AUTOMATIC LICENSE PLATE RECOGNITION
SYSTEM”, 2017 Third International Conference on Science Technology Engineering & Management (ICONSTEM), 2017
IEEE
3. Jack Greenhalgh and Majid Mirmehdi, Recognizing Text-Based Traffic Signs, IEEE TRANSACTIONS ON INTELLIGENT
TRANSPORTA-TION SYSTEMS, VOL. 16, NO. 3, JUNE 2015.
4. Huizhong Chen, Sam S. Tsai, Georg Schroth, David M. Chen, Radek Grzeszczuk and Bernd Girod, Robust Text Detection
in Natural Images with egde-enhanced Maximally Stable Extremal Regions, ICIP 2011.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1031
5. Govardhan Gayake, “A Survey on Text Detection from Natural and Scanned Images”, International Journal of IT,
Engineering and Applied Sciences Research (IJIEASR) ISSN: 2319-4413 Volume 8, No. 1, January 2019
6. Shubham Saini, Bhavesh Kasliwal, Shraey Bhatia, “Comparative Study of Image Edge Detection Algorithms”.
7. http://in.mathworks.com/discovery/edgedetection.html?s_tid=gn_loc_dro p
8. https://en.wikipedia.org/wiki/Sobel_operator
9. http://homepages.inf.ed.ac.uk/rbf/HIPR2/sobel.htm
10. https://en.wikipedia.org/wiki/Canny_edge_detector
11. http://www.tutorialspoint.com/dip/prewitt_operator.htm
12. [8] K. Mikolajczyk, T.Tuytelaars, C. Schmid, A. Zisserman, T. Kadir and L. Van Gool, “A Comparison of Affine
Region Detectors"; International Journal of Computer Vision, Volume 65, Numbers 1-2 / November, 2005, pp 43-72
13. Jayshree Ghorpade-Aher, Sumeet Gajbhar, Amey Sarode, Govardhan Gayake, Piyush Daund, ”Text Retrieval from
Natural and Scanned Images” International Journal of Computer Applications (0975 – 8887) Volume 133 – No.8,
January 2016
14. Jayshree Ghorpade, Raviraj Palvankar, Ajinkya Patankar and Snehal Rathi, “EXTRACTING TEXT FROM VIDEO, Signal &
Image Processing” An International Journal (SIPIJ) Vol.2, No.2, June 2011
15. Sushruth Shastry, Gunasheela G, Thejus Dutt, Vinay D S and Sudhir Rao Rupanagudi, ‘i - A novel algorithm for Optical
Character Recognition (OCR)’, 978 -1-4673-5090-7/13 IEEE, 2013
16. http://docs.opencv.org/3.0beta/doc/py_tutorials/py_feature2d/py_feature
s_meaning/py_features_meaning.html#features-meaning [13] Ivind Due Trier, Anil k Jain and Torfinn Taxt ,”Feature
Extraction Methods For Character Recognition - A Survey”
17. M. Zahid Hossain, M. Ashraful Amin, Hong Yan, “Rapid Feature Extraction for Optical Character Recognition” 2012
18. http://4imageprocessing.blogspot.in/2009/05/opencv8-find-verticalprojection-of.html
19. http://www.imageprocessingplace.com/downloads_V3/root_downloads/t
utorials/contour_tracing_Abeer_George_Ghuneim/intro.html
20. Jack Greenhalgh, Majid Mirmehdi, “Recognizing Text-Based Traffic Signs” IEEE TRANSACTIONS ON INTELLIGENT
TRANSPORTA-TION SYSTEMS, VOL. 16, NO. 3, JUNE 2015
21. Huizhong Chen, Sam S. Tsai, Georg Schroth, David M. Chen, Radek Grzeszczuk and Bernd Girod, “Robust Text
Detection in Natural Images with egde-enhanced Maximally Stable Extremal Regions”, ICIP 2011
22. Binh Quang Long Mai, Tue Huu Huynh, Anh Dong Doan, “A Study about the Reconstruction of Remote, Low
Resolution Mobile Captured Text Images for OCR”, 978-1-4799-6956-2/14 IEEE, 2014.
23. Faisal Mohammad, Jyoti Anarase, Milan Shingote, Pratik Ghanwat, “Optical Character Recognition Implementation
Using Pattern Matching, International Journal of Computer Science and Information Technologies”, Vol. 5 (2) , 2014.

More Related Content

What's hot

A survey on human face recognition invariant to illumination
A survey on human face recognition invariant to illuminationA survey on human face recognition invariant to illumination
A survey on human face recognition invariant to illumination
IAEME Publication
 
A new technique to fingerprint recognition based on partial window
A new technique to fingerprint recognition based on partial windowA new technique to fingerprint recognition based on partial window
A new technique to fingerprint recognition based on partial window
Alexander Decker
 
Brain tumor segmentation using asymmetry based histogram thresholding and k m...
Brain tumor segmentation using asymmetry based histogram thresholding and k m...Brain tumor segmentation using asymmetry based histogram thresholding and k m...
Brain tumor segmentation using asymmetry based histogram thresholding and k m...
eSAT Publishing House
 

What's hot (19)

Matching algorithm performance analysis for autocalibration method of stereo ...
Matching algorithm performance analysis for autocalibration method of stereo ...Matching algorithm performance analysis for autocalibration method of stereo ...
Matching algorithm performance analysis for autocalibration method of stereo ...
 
Mislaid character analysis using 2-dimensional discrete wavelet transform for...
Mislaid character analysis using 2-dimensional discrete wavelet transform for...Mislaid character analysis using 2-dimensional discrete wavelet transform for...
Mislaid character analysis using 2-dimensional discrete wavelet transform for...
 
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
 
IRJET- Image De-Blurring using Blind De-Convolution Algorithm
IRJET-  	  Image De-Blurring using Blind De-Convolution AlgorithmIRJET-  	  Image De-Blurring using Blind De-Convolution Algorithm
IRJET- Image De-Blurring using Blind De-Convolution Algorithm
 
An Efficient Algorithm for Edge Detection of Corroded Surface
An Efficient Algorithm for Edge Detection of Corroded SurfaceAn Efficient Algorithm for Edge Detection of Corroded Surface
An Efficient Algorithm for Edge Detection of Corroded Surface
 
40120140502010
4012014050201040120140502010
40120140502010
 
B42020710
B42020710B42020710
B42020710
 
Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques
 
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
 
A vlsi architecture for efficient removal of noises and enhancement of images
A vlsi architecture for efficient removal of noises and enhancement of imagesA vlsi architecture for efficient removal of noises and enhancement of images
A vlsi architecture for efficient removal of noises and enhancement of images
 
2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...
2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...
2-Dimensional Wavelet pre-processing to extract IC-Pin information for disarr...
 
F43053237
F43053237F43053237
F43053237
 
A survey on human face recognition invariant to illumination
A survey on human face recognition invariant to illuminationA survey on human face recognition invariant to illumination
A survey on human face recognition invariant to illumination
 
Mm3422322236
Mm3422322236Mm3422322236
Mm3422322236
 
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
 
An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...
 
A new technique to fingerprint recognition based on partial window
A new technique to fingerprint recognition based on partial windowA new technique to fingerprint recognition based on partial window
A new technique to fingerprint recognition based on partial window
 
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
EV-SIFT - An Extended Scale Invariant Face Recognition for Plastic Surgery Fa...
 
Brain tumor segmentation using asymmetry based histogram thresholding and k m...
Brain tumor segmentation using asymmetry based histogram thresholding and k m...Brain tumor segmentation using asymmetry based histogram thresholding and k m...
Brain tumor segmentation using asymmetry based histogram thresholding and k m...
 

Similar to IRJET- Digit Identification in Natural Images

Similar to IRJET- Digit Identification in Natural Images (20)

Study of Various Edge Detection Techniques and Implementation of Real Time Fr...
Study of Various Edge Detection Techniques and Implementation of Real Time Fr...Study of Various Edge Detection Techniques and Implementation of Real Time Fr...
Study of Various Edge Detection Techniques and Implementation of Real Time Fr...
 
IRJET- DNA Fragmentation Pattern and its Application in DNA Sample Type Class...
IRJET- DNA Fragmentation Pattern and its Application in DNA Sample Type Class...IRJET- DNA Fragmentation Pattern and its Application in DNA Sample Type Class...
IRJET- DNA Fragmentation Pattern and its Application in DNA Sample Type Class...
 
Techniques of Brain Cancer Detection from MRI using Machine Learning
Techniques of Brain Cancer Detection from MRI using Machine LearningTechniques of Brain Cancer Detection from MRI using Machine Learning
Techniques of Brain Cancer Detection from MRI using Machine Learning
 
An Efficient Algorithm for Edge Detection of Corroded Surface
An Efficient Algorithm for Edge Detection of Corroded SurfaceAn Efficient Algorithm for Edge Detection of Corroded Surface
An Efficient Algorithm for Edge Detection of Corroded Surface
 
Real Time Implementation of Ede Detection Technique for Angiogram Images on FPGA
Real Time Implementation of Ede Detection Technique for Angiogram Images on FPGAReal Time Implementation of Ede Detection Technique for Angiogram Images on FPGA
Real Time Implementation of Ede Detection Technique for Angiogram Images on FPGA
 
IRJET- Kidney Stone Classification using Deep Neural Networks and Facilitatin...
IRJET- Kidney Stone Classification using Deep Neural Networks and Facilitatin...IRJET- Kidney Stone Classification using Deep Neural Networks and Facilitatin...
IRJET- Kidney Stone Classification using Deep Neural Networks and Facilitatin...
 
IRJET- Kidney Stone Classification using Deep Neural Networks and Facilitatin...
IRJET- Kidney Stone Classification using Deep Neural Networks and Facilitatin...IRJET- Kidney Stone Classification using Deep Neural Networks and Facilitatin...
IRJET- Kidney Stone Classification using Deep Neural Networks and Facilitatin...
 
IRJET- Shape based Image Classification using Geometric ­–Properties
IRJET-  	  Shape based Image Classification using Geometric ­–PropertiesIRJET-  	  Shape based Image Classification using Geometric ­–Properties
IRJET- Shape based Image Classification using Geometric ­–Properties
 
IRJET- Universal Currency Identifier
IRJET-  	  Universal Currency IdentifierIRJET-  	  Universal Currency Identifier
IRJET- Universal Currency Identifier
 
Application of Digital Image Correlation: A Review
Application of Digital Image Correlation: A ReviewApplication of Digital Image Correlation: A Review
Application of Digital Image Correlation: A Review
 
Conceptual and Practical Examination of Several Edge Detection Strategies
Conceptual and Practical Examination of Several Edge Detection StrategiesConceptual and Practical Examination of Several Edge Detection Strategies
Conceptual and Practical Examination of Several Edge Detection Strategies
 
IRJET- A Review on Face Detection and Expression Recognition
IRJET-  	  A Review on Face Detection and Expression RecognitionIRJET-  	  A Review on Face Detection and Expression Recognition
IRJET- A Review on Face Detection and Expression Recognition
 
Ex4301908912
Ex4301908912Ex4301908912
Ex4301908912
 
Implementation of Distributed Canny Edge Detection Technique
Implementation of Distributed Canny Edge Detection TechniqueImplementation of Distributed Canny Edge Detection Technique
Implementation of Distributed Canny Edge Detection Technique
 
IRJET - Computer-Assisted ALL, AML, CLL, CML Detection and Counting for D...
IRJET -  	  Computer-Assisted ALL, AML, CLL, CML Detection and Counting for D...IRJET -  	  Computer-Assisted ALL, AML, CLL, CML Detection and Counting for D...
IRJET - Computer-Assisted ALL, AML, CLL, CML Detection and Counting for D...
 
G010124245
G010124245G010124245
G010124245
 
EDGE Detection Filter for Gray Image and Observing Performances
EDGE Detection Filter for Gray Image and Observing PerformancesEDGE Detection Filter for Gray Image and Observing Performances
EDGE Detection Filter for Gray Image and Observing Performances
 
EDGE Detection Filter for Gray Image and Observing Performances
EDGE Detection Filter for Gray Image and Observing PerformancesEDGE Detection Filter for Gray Image and Observing Performances
EDGE Detection Filter for Gray Image and Observing Performances
 
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
Enhanced Optimization of Edge Detection for High Resolution Images Using Veri...
 
Edge detection by using lookup table
Edge detection by using lookup tableEdge detection by using lookup table
Edge detection by using lookup table
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
hublikarsn
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 

Recently uploaded (20)

Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 

IRJET- Digit Identification in Natural Images

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1025 Digit Identification in Natural Images Govardhan Gayake1, Dr. Arati Dandavate2 1ME Student, Savitribai Phule University of Pune, Department of Computer Engineering JSPM COE, Hadapsar, Pune 2Professor, Savitribai Phule University of Pune, Department of Computer Engineering JSPM COE, Hadapsar, Pune ----------------------------------------------------------------------------***--------------------------------------------------------------------------- Abstract — Number recognition from images is a complex task to achieve in this digital era. Advanced applications that are beyond Automatic Number Plate Recognition (ANPR) are developed with different algorithms and image processing techniques to recognize numbers from an image with much adverse scenarios. In this paper, we are describing a technique to locate and recognize the numbers in an image. It includes preprocessing for image smoothening, Edge detection to recognize boundaries of all objects. Maximal stable extremal region is used to identify the potential candidate objects. Feature extraction is used to predict the possible number for that object. Keywords — MSER, Sobel, Feature Extraction I. INTRODUCTION Today world has advanced to digital age. People are making out more work with less effort through the help of digitization. The work which is used to take hours is now done within seconds. People prefer digital documents over hard copies as it’s handy and portable. The digital documents are digital books, images etc. In many scenarios, it’s required to extract information from these digital documents. This information may include numbers and text. In this paper, we are discussing process to locate and recognize numbers in the image. Initially image is preprocessed to remove noise. The preprocessing involves gray scaling of RGB image. The preprocessed image undergoes edge detection process. The edge detected image is used to find MSER (Maximally stable extremal regions) regions. The MSER regions are the regions which has very stable intensity. The MSER regions are the region where numbers lies in the images. Finally feature extraction is used to predict the number. This paper is divided in 5 sections as: Second section describes pre-processing techniques. The third section explains the working of edge detection technique. The fourth section describes the MSER regions. The fifth section explains feature extraction to predict number and finally conclusion is given. II. PRE-PROCESSING The aim of preprocessing is an improvement of image data that suppresses unwanted distortions or enhances some image features important for the image processing. Also, it enhances the visual appearance of images. A. Gaussian Blur Gausssian blur is used as pre-processing technique to smoothen the image by noise removal. It is performed by convolving the image using the Gaussian function. The Gaussian distribution in 1-D has the form: Fig 1. Gaussian distribution Where sigma is the standard deviation of the distribution. Gaussian blurring is commonly used when reducing the size of an image. When down sampling an image, it is common to apply a low-pass filter to the image prior to resampling. This is to ensure that spurious high-frequency information does not appear in the down sampled image.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1026 III. EDGE DETECTION Edge detection plays important role in image processing. Significant transitions in an image are called as edges. It differentiates between different objects, the outline in the foreground and background object. Different features such as shapes, boundary can be measured between the designs of image [1]. Edge detection technique works by finding discontinuity in the images [2]. The different edge detection algorithms are as follows: A. Sobel Operator Working of Sobel Operator is as follows: It function like first order derivative, in edge region the difference of pixel intensities is calculated. An image intensity functions approximation of the gradient is computed, the Gaussian smoothing and differentiation is combined. It is a pair of 3x3 convolution kernel that takes first kernel and rotates another kernel by 90 in anticlockwise direction. Fig 2. Kernel matrix Fig 3. Edge detected image using Sobel operator The above designed kernels respond to horizontal and vertical running edges. To produce the gradient component in each orientation Gx and Gy, combine these to produce magnitude of Gradient [2] [3]. Appoximate magnitude is calculated using equation 2. The angle of orientation of the edge is calculated by equation 3. Ɵ = arctan (Gy/Gx) (3) B. Canny Edge The Canny operator works in a multi-stage process. Canny edge algorithm makes use of calculus of variations. The tracking process exhibits hysteresis controlled by two thresholds: T1 and T2, with T1 > T2. |G| = (1)
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1027 Canny Edge algorithm is as follows: Step 1: Initially, the Gaussian filter is applied to smooth image and noise is removed. Step 2: Intensity of images is calculated. Step 3: To get rid from non-genuine response to edge detection non-maximum suppression is applied. Step 4: Potential edges are determined by applying double threshold. Step 5: Other weak edges are suppressed which are not connected to strong edge [4]. Fig 3 Edge detection using Canny Edge algorithm C. Prewitts Operator In Prewitts operator, mask is applied on the image which calculates difference of pixel intensities of the edge region. Horizontal and vertical edges are detected in Prewitts operator. Differences of pixel intensities of corresponding pixel are used to calculate edges. The mask for detection of edges in vertical direction, The mask for detection of edges in horizontal direction, Above mask will find edges in horizontal direction and it is because of zeros in middle row [7] [9]. IV. MSER Maximally stable extremal regions (MSER) are used to obtain all possible candidate regions. Candidate regions are the text regions which we are interested in. In MSER we firstly perform the sorting operation on the pixels. After sorting, pixels are marked in the image, and the list of growing and merging connected components and their areas is maintained using the union-find algorithm [8]. There are two types of MSER i.e positive and negative. First type we get by thresholding all intensities of grayscale images. E.g. for a threshold T = 45, all pixels with intensity <= 45 are assigned black, or foreground, and all pixels > 45 intensity are white or background. While the second type consists of only two intensities 0 and 255. Compared with other five region detectors which are Harris-affine region detector, Hessian-affine detector, edgebased regions, intensity extremal detector, and salient regions detector MSER provides many advantages.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1028 • Density of Region MSER offers 2600 regions for texture blur image and 230 regions for light changed and has repeatability of 92% for this tests. • Size of Region MSER goes for smaller region detection as compared larger regions. • Change of Scale After Hessian-affine detector, MSER comes in second under scale change and in-plane rotation of image. • Change of light MSER showed the highest repeatability score for this type of scenario compared to other region detectors. Fig 4.1 Edge directed image Fig 4.2 Candidate Region Above images show MSER region obtained from edge detected image. V. NUMBER RECOGNITION Once we get the area where digits are located next step is to recognize the digits. The digits can be recognized using feature extraction technique. The feature extraction is process which involves finding some specific pattern or features which can be easily compared with trained data to recognize the objects in an image. The features can be edges, corners or blob in the image. The shaped based features are nothing but lines, circles. [11][12] [13]. A. Segmentation of Digits • Vertical projection The vertical projection is used to segment each digit. The vertical projection is the process of calculating sum of pixels in each column of an image. In vertical projection, troughs represent the boundary between two digits [15]. • Using Contours The contours are the boundaries of any object in the image. To find contours in the image, initially image is converted into black and white image. The black and white image will have pixels with intensity 0 and 1 where 0 or white represent background part of image and 1 or black represent pattern [16].
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1029 Fig 5. Projection image Fig 6. Segmentation of Digits B. Feature Extraction After segmentation, bounding box is formed around each segmented digit. For each bonding box features are extracted. Now to recognize each digit, extracted features need to be classified. To classify each digits technique such as KNN neighbor or probabilistic Neural Network can be used. In KNN algorithms, initially samples of digits are used for training classifier. This classifier is used to classify each digit based upon features. The complete step wise procedure is described below Fig 7.1. Preprocessing on input image Fig 7.2. Edge detected image using Sobel operator Fig 7.3. Detect MSER Region
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1030 Fig 7.4. Segmentation of Digits 7.5. Feature extraction for each digit Fig 7.6. Classification of each Digit VI.CONCLUSION The canny edge detection algorithm requires threshold for detecting edges where as sobel can find all edges using horizontal and vertical gradients. The MSER region provides smaller precise regions than any other region detector. The optical character recognition system uses training data set having hundred of samples which consumes lot of memory space. To recognize numbers using feature extraction, it needs either no training data or smaller training data resulting in saving memory space and computation time. VII. FUTURE SCOPE Above techniques performs efficiently when input images has plain background .The accuracy degrades as complexity of background of image increases. The complex background introduces unwanted edges after edge detection due to which unexpected features of images get extracted. So algorithm to remove unwanted edges due to complex background can be included in system to make robust in all condition. REFERENCES 1. G. Eason, B. Noble, and I. N. Sneddon, “On certain integrals of Lipschitz-Hankel type involving products of Bessel functions,” Phil. Trans. Roy. Soc. London, vol. A247, pp. 529–551, April 1955. 2. B.Pechiammal, Dr.J.Arokia Renjith, “AN EFFICIENT APPROACH FOR AUTOMATIC LICENSE PLATE RECOGNITION SYSTEM”, 2017 Third International Conference on Science Technology Engineering & Management (ICONSTEM), 2017 IEEE 3. Jack Greenhalgh and Majid Mirmehdi, Recognizing Text-Based Traffic Signs, IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTA-TION SYSTEMS, VOL. 16, NO. 3, JUNE 2015. 4. Huizhong Chen, Sam S. Tsai, Georg Schroth, David M. Chen, Radek Grzeszczuk and Bernd Girod, Robust Text Detection in Natural Images with egde-enhanced Maximally Stable Extremal Regions, ICIP 2011.
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1031 5. Govardhan Gayake, “A Survey on Text Detection from Natural and Scanned Images”, International Journal of IT, Engineering and Applied Sciences Research (IJIEASR) ISSN: 2319-4413 Volume 8, No. 1, January 2019 6. Shubham Saini, Bhavesh Kasliwal, Shraey Bhatia, “Comparative Study of Image Edge Detection Algorithms”. 7. http://in.mathworks.com/discovery/edgedetection.html?s_tid=gn_loc_dro p 8. https://en.wikipedia.org/wiki/Sobel_operator 9. http://homepages.inf.ed.ac.uk/rbf/HIPR2/sobel.htm 10. https://en.wikipedia.org/wiki/Canny_edge_detector 11. http://www.tutorialspoint.com/dip/prewitt_operator.htm 12. [8] K. Mikolajczyk, T.Tuytelaars, C. Schmid, A. Zisserman, T. Kadir and L. Van Gool, “A Comparison of Affine Region Detectors"; International Journal of Computer Vision, Volume 65, Numbers 1-2 / November, 2005, pp 43-72 13. Jayshree Ghorpade-Aher, Sumeet Gajbhar, Amey Sarode, Govardhan Gayake, Piyush Daund, ”Text Retrieval from Natural and Scanned Images” International Journal of Computer Applications (0975 – 8887) Volume 133 – No.8, January 2016 14. Jayshree Ghorpade, Raviraj Palvankar, Ajinkya Patankar and Snehal Rathi, “EXTRACTING TEXT FROM VIDEO, Signal & Image Processing” An International Journal (SIPIJ) Vol.2, No.2, June 2011 15. Sushruth Shastry, Gunasheela G, Thejus Dutt, Vinay D S and Sudhir Rao Rupanagudi, ‘i - A novel algorithm for Optical Character Recognition (OCR)’, 978 -1-4673-5090-7/13 IEEE, 2013 16. http://docs.opencv.org/3.0beta/doc/py_tutorials/py_feature2d/py_feature s_meaning/py_features_meaning.html#features-meaning [13] Ivind Due Trier, Anil k Jain and Torfinn Taxt ,”Feature Extraction Methods For Character Recognition - A Survey” 17. M. Zahid Hossain, M. Ashraful Amin, Hong Yan, “Rapid Feature Extraction for Optical Character Recognition” 2012 18. http://4imageprocessing.blogspot.in/2009/05/opencv8-find-verticalprojection-of.html 19. http://www.imageprocessingplace.com/downloads_V3/root_downloads/t utorials/contour_tracing_Abeer_George_Ghuneim/intro.html 20. Jack Greenhalgh, Majid Mirmehdi, “Recognizing Text-Based Traffic Signs” IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTA-TION SYSTEMS, VOL. 16, NO. 3, JUNE 2015 21. Huizhong Chen, Sam S. Tsai, Georg Schroth, David M. Chen, Radek Grzeszczuk and Bernd Girod, “Robust Text Detection in Natural Images with egde-enhanced Maximally Stable Extremal Regions”, ICIP 2011 22. Binh Quang Long Mai, Tue Huu Huynh, Anh Dong Doan, “A Study about the Reconstruction of Remote, Low Resolution Mobile Captured Text Images for OCR”, 978-1-4799-6956-2/14 IEEE, 2014. 23. Faisal Mohammad, Jyoti Anarase, Milan Shingote, Pratik Ghanwat, “Optical Character Recognition Implementation Using Pattern Matching, International Journal of Computer Science and Information Technologies”, Vol. 5 (2) , 2014.