SlideShare a Scribd company logo
www.ijmer.com

International Journal of Modern Engineering Research (IJMER)
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3134-3136
ISSN: 2249-6645

Mislaid character analysis using 2-dimensional discrete wavelet
transform for edge refinement
Kushal Kumar1, Anamika Yadav2, Himanshi Rani3, Yashasvi Nijhawan4
1

(Electronics and Communication Engineering, Jaypee University of Engineering and Technology, India, 2013)
(Electronics and Communication Engineering, Bhagwan Parshuram Institute of Technology, GGSIPU, Delhi, India, 2012)
3
(Electronics and Communication Engineering, Vellore Institute of Technology, Chennai, India, 2015)
4
(Electronics and Communication, Jaypee University of Information Technology, Waknaghat, India, 2013)

2

ABSTRACT: Character recognition is an important tool used for many purposes limited only by imagination, some of
them being automatic number plate recognition and digital conversion of texts. In the present methods, edge detection
techniques perform well but they are time consuming and have errors if the data provided is not up to the mark. In this
paper, a novel method is proposed to minimize those errors and perform the edge detection of characters using 2dimensional wavelet transform pre-processing.
Keywords: 2-dimensional wavelets, Character recognition, Machine vision, Image processing, ANPR.

I.

INTRODUCTION

Today, many character recognition systems are used worldwide. The system works fine too in most of the cases, but
sometimes the characters on given image aredifficult to identify because of many reasons like bad lightning, or
mislaid/broken characters. In this paper, a vehicle number plate with difficult to detect characters is taken and, a novel image
processing method for detection of characters using wavelet pre-processing is proposed to segment the characters from that
image. The criterion used to compare different methods is touse the number of pixels of the characters the method could
detect with the conventional edge detection techniques to emphasize the benefit of 2D-DWT over those methods.
A series of steps in wavelet pre-processed edge detection are performed in a systematic way which detects the
characters. Edge detection is almost a prerequisite in various recognition tasks, like automatic number plate recognition,
which we have done in this paper. Edge is a boundary between two homogeneous surfaces. Fig.1 shows the text which was
used for edge detection in the proposed method and the conventional edge-detection methods (Sobel, Prewitt and Canny).
Various conventional techniques for edge detection of IC’s are available in literature[1]. Huang et al. (2011) proposes an
improved algorithm for canny edge detection. It uses an improved switch median filter algorithm instead of Gaussian filter
algorithms for filtering. [2]Somyot et al.(2012) used wavelet transforms to compress the image before edge detection.
II.
EDGE DETECTION
An edge is an abrupt change in the intensity level, which characterizes high frequency component in an image.
Noise is an unwanted signal which can cause inefficiency in edge detection.
In practice due to imperfection in image acquisition or sampling, the edges get blurred and tend to become thick.
However the derivatives play an important role in detecting the edges and locating the edge pixels in an image. The first
derivative is positive at the point of intensity variation and zero in the areas of constant intensity. The magnitude of first
derivative can be used to detect the presence of an edge. The second derivative is positive if the transition occurs on the dark
side of an edge and it is negative if transition is on the light side of an image. Hence, a second derivative can be used to
locate the edge pixels. For edge detection second derivative can also be used but its sensitivity towards noise limits its
application in edge detection. In the subsequent sections we will be discussing about the approximated first derivative
operators that are used for edge detection in the present investigation.

III.

CONVENTIONAL EDGE DETECTION METHODS

The edge detection methods used in this paper are Sobel, Prewitt and Canny, which are compared to each other and
then the best one of them is compared to the proposed algorithm. The algorithms are compared based on how much amount
of the character data can they extract from the given image. So, first we should know briefly what these methods are and
how do they work. Next, we extract the pin information from the original image as well as segmented edge-detected image
in the form of number of pin-pixels and compare which method extracts the maximum pin-information for analysis. In the
original image, the no. of pixels contained by the characters are 1882.
3.1 SOBEL
The Sobel edge detector is an approximated, first derivative two dimensional edge detector. It calculates gradient in
X and Y direction. It uses a convolutional mask to calculate the gradients as in equation (1) and gradient directions as in
equation (2). The masks are slid over the image and gradient values are calculated. In Sobel the centre coefficient of the
mask uses a weight of two, it is used so as to achieve a smoothing by giving more weightage to the central term of the mask.
The segmented image obtained by using a Sobel operator is shown in Fig.2. The number of pin-pixels detected by this
algorithm was 203.
|G|=|GX|+|GY|
(1)
-1 𝐺 𝑌
Θ=tan [ ]
(2)
𝐺𝑋

www.ijmer.com

3134 | Page
International Journal of Modern Engineering Research (IJMER)
www.ijmer.com
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2719-2727
ISSN: 2249-6645
3.2 PREWITT
Prewitt edge detector is also an approximated first derivative two dimensional edge detector. It uses aconvolutional
mask to calculate the gradient in X and Y directions respectively. The segmented image obtained by using Prewitt operator is
shown in Fig.3. The number of pin-pixels detected by this algorithm was 201.
3.3 CANNY
Canny edge detection is another method of edge detection. It follows a series of steps. In the first step it eliminates
the noise from the Image by filtering the Image using Gaussian filter. In the second step it calculates the gradient and the
edge direction of the Image using Sobel edge detection. In the third step it performs non-maximum suppression. The pixels
along the edge direction which do not satisfy (3) are set to 0 or considered as non-edge pixel. Further suppression is done
using hysteresis. Hysteresis uses two thresholds. T1 and T2. If the magnitude is below the first threshold then it is set to 0
(non-edge pixel). If the magnitude is above threshold T2 then it is considered as an edge pixel. If the magnitude lies between
T1 and T2 then depending upon the path between the current pixel and the pixel with magnitude greater than T2 the pixel is
considered as an edge pixel or non-edge pixel. The segmented image obtained by using a canny edge detector is shown in
Fig.4. The number of pin-pixels detected by this algorithm was 978.

IV.

WAVELETS

Wavelets are a small portion of the wave. Wavelet transform uses wavelets to capture different frequency
components of the signal whose resolution matches up with its scale. This technique is known as multi-resolution Analysis.
It comprises of a scaling function and a wavelet function. Scaling function gives the series of approximation of the signal,
where each approximated signal differs by a factor of two. Wavelet functions are used to add the detailed information in the
difference of the two neighbouring approximations. Hence in wavelet analysis we get the approximated part and the detailed
part of the signal.
In case of Images the wavelet analysis is carried out in two dimensions. In X and Y direction respectively, the two
dimensional wavelet decomposition is shown in the form of an image in Fig. 5. It is known as filter bank analysis. It consists
of high pass and low pass filters. First the analysis is done along the columns and then along the rows. The output of the low
pass filter gives the approximated coefficients and the output of the high pass filter gives detailed coefficients. The
approximated coefficients at scale j+1 are used to construct the detailed and approximated coefficients at scale j. In case of
two dimensions we get three sets of detailed coefficients (rest three squares) and one set of approximated coefficient (upper
left square).

V.

PROPOSED METHOD

In the proposed method, we have first subjected the image to a 2-Dimensional discrete wavelet transform (2-D
DWT). Doing this, we get a set of 4 images, one is the set of approximated coefficients and the other three are set of detailed
coefficients. We ignore the approximated coefficient and reconstruct the image using the set of detailed coefficients, i.e. we
take inverse 2-D DWT. The image is now ready to be edge-detected using any conventional algorithm like Canny in this
case. So, we choose the best one of the conventional methods, which comes out to be Canny and then compare it with our
proposed method in Fig. 6. The number of pin-pixels detected by this algorithm was 5636, i.e. 84.25% of the pin-information
is accurately extracted.

VI.

Fig.1 Original IC image.
detected image.

Fig.3 Pin segmentation on Prewitt edgedetected image

FIGURES

Fig.2Character segmentation on Sobel edge-

Fig.4
www.ijmer.com

Character
segmentation
edge-detected image.

on

Canny
3135 | Page
www.ijmer.com

International Journal of Modern Engineering Research (IJMER)
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2719-2727
ISSN: 2249-6645

Fig.5 2-D DWT illustration.

Fig.6 Pin segmentation on Wavelet preprocessed Canny edge-detected image.

VII.

CONCLUSION

Based on the results the following inferences can be made. When wavelet pre-processing was not performed, canny
edge detection, Fig.4 was found to be the most efficient method followed by Sobel, Fig.2 and Prewitt, Fig.3, which are pretty
close to each other. When wavelet pre-processing was used, the results obtained are as shown in Fig. 6 which arefar more
accurate than the results obtained without using wavelet pre-processing as in Fig. 2, 3 and 4. The proposed method detects
over 50% of the pixels while the conventional methods could detect only about 10%. On using wavelet pre-processing the
low frequency component of the image was removed and high frequency components were retained during reconstruction.
The edges which comprises of high frequencies were efficiently detected. Thus the choice of using wavelet pre-processing
made edge detection more efficient. Better and efficient extraction of IC pin information was achieved.
Many sectors could benefit from this approach, like the traffic regulation sector or the handwriting analysis sector. The
number of man-hours will be greatly reduced and the results would be more accurate than any of the current methods. This
method could be implemented over existing hardware.

ACKNOWLEDGMENTS
I, Kushal Kumar, would like to thank Dr. Sudha Radhika who was an inspiration for me to take up this project.

REFERENCES
[1]
[2]

[3]
[4]
[5]

Ying Huang, Qi Pan,Qi Liu,XinPeng He,Yun Feng Liu,Yong Quan Yu, “Application of Improved Canny Algorithm on the IC
Chip pin Inspection”,Advanced Materials Research Vols. 317-319 (2011) pp 854-858.
K. Somyot, S. Anakapon and K. Anantawat, “Pattern recognition technique for IC pins inspection using wavelet transform with
chain code discrete Fourier Transform and signal correlation”, International Journal of Physical Sciences, Vol.7 (9), pp. 1326-1332,
23 February 2012.
Tim Edwards, “Discrete Wavelet Transform: Implementation and theory”, Stanford University, September 1991.
Rafael C. Gonzalez, Richard E. Woods Digital Image Processing (ISBN-13: 978-0131687288,3rdEdition, 2007)
Barroso, J. ; Seccao de Engenharias, Dagless, E.L. ; Rafael, A. ; Bulas-Cruz, J., “Number plate reading using computer vision”,
ISIE '97., Proceedings of the IEEE International Symposium on Industrial Electronics, 1997.

www.ijmer.com

3136 | Page

More Related Content

What's hot

Paper id 21201419
Paper id 21201419Paper id 21201419
Paper id 21201419
IJRAT
 
Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...
eSAT Journals
 
Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...
eSAT Publishing House
 
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
IOSR Journals
 
EDGE DETECTION OF MICROSCOPIC IMAGE
EDGE DETECTION OF MICROSCOPIC IMAGEEDGE DETECTION OF MICROSCOPIC IMAGE
EDGE DETECTION OF MICROSCOPIC IMAGE
IAEME Publication
 
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
ijistjournal
 
A survey on efficient no reference blur estimation methods
A survey on efficient no reference blur estimation methodsA survey on efficient no reference blur estimation methods
A survey on efficient no reference blur estimation methods
eSAT Journals
 
A survey on efficient no reference blur estimation
A survey on efficient no reference blur estimationA survey on efficient no reference blur estimation
A survey on efficient no reference blur estimation
eSAT Publishing House
 
Bx4301429434
Bx4301429434Bx4301429434
Bx4301429434
IJERA Editor
 
Edge detection by modified otsu method
Edge detection by modified otsu methodEdge detection by modified otsu method
Edge detection by modified otsu method
csandit
 
EDGE DETECTION BY MODIFIED OTSU METHOD
EDGE DETECTION BY MODIFIED OTSU METHOD EDGE DETECTION BY MODIFIED OTSU METHOD
EDGE DETECTION BY MODIFIED OTSU METHOD
cscpconf
 
Automatic Detection of Radius of Bone Fracture
Automatic Detection of Radius of Bone FractureAutomatic Detection of Radius of Bone Fracture
Automatic Detection of Radius of Bone Fracture
IRJET Journal
 
Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques
CSCJournals
 
3 ijaems nov-2015-6-development of an advanced technique for historical docum...
3 ijaems nov-2015-6-development of an advanced technique for historical docum...3 ijaems nov-2015-6-development of an advanced technique for historical docum...
3 ijaems nov-2015-6-development of an advanced technique for historical docum...
INFOGAIN PUBLICATION
 
Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...
Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...
Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...
idescitation
 
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
IJECEIAES
 
Signal Processing, Statistical and Learning Machine Techniques for Edge Detec...
Signal Processing, Statistical and Learning Machine Techniques for Edge Detec...Signal Processing, Statistical and Learning Machine Techniques for Edge Detec...
Signal Processing, Statistical and Learning Machine Techniques for Edge Detec...
idescitation
 
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
CSCJournals
 
Importance of Mean Shift in Remote Sensing Segmentation
Importance of Mean Shift in Remote Sensing SegmentationImportance of Mean Shift in Remote Sensing Segmentation
Importance of Mean Shift in Remote Sensing Segmentation
IOSR Journals
 
IRJET- Digit Identification in Natural Images
IRJET- Digit Identification in Natural ImagesIRJET- Digit Identification in Natural Images
IRJET- Digit Identification in Natural Images
IRJET Journal
 

What's hot (20)

Paper id 21201419
Paper id 21201419Paper id 21201419
Paper id 21201419
 
Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...
 
Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...Fpga implementation of image segmentation by using edge detection based on so...
Fpga implementation of image segmentation by using edge detection based on so...
 
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
 
EDGE DETECTION OF MICROSCOPIC IMAGE
EDGE DETECTION OF MICROSCOPIC IMAGEEDGE DETECTION OF MICROSCOPIC IMAGE
EDGE DETECTION OF MICROSCOPIC IMAGE
 
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
 
A survey on efficient no reference blur estimation methods
A survey on efficient no reference blur estimation methodsA survey on efficient no reference blur estimation methods
A survey on efficient no reference blur estimation methods
 
A survey on efficient no reference blur estimation
A survey on efficient no reference blur estimationA survey on efficient no reference blur estimation
A survey on efficient no reference blur estimation
 
Bx4301429434
Bx4301429434Bx4301429434
Bx4301429434
 
Edge detection by modified otsu method
Edge detection by modified otsu methodEdge detection by modified otsu method
Edge detection by modified otsu method
 
EDGE DETECTION BY MODIFIED OTSU METHOD
EDGE DETECTION BY MODIFIED OTSU METHOD EDGE DETECTION BY MODIFIED OTSU METHOD
EDGE DETECTION BY MODIFIED OTSU METHOD
 
Automatic Detection of Radius of Bone Fracture
Automatic Detection of Radius of Bone FractureAutomatic Detection of Radius of Bone Fracture
Automatic Detection of Radius of Bone Fracture
 
Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques
 
3 ijaems nov-2015-6-development of an advanced technique for historical docum...
3 ijaems nov-2015-6-development of an advanced technique for historical docum...3 ijaems nov-2015-6-development of an advanced technique for historical docum...
3 ijaems nov-2015-6-development of an advanced technique for historical docum...
 
Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...
Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...
Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...
 
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
Comparative Analysis of Common Edge Detection Algorithms using Pre-processing...
 
Signal Processing, Statistical and Learning Machine Techniques for Edge Detec...
Signal Processing, Statistical and Learning Machine Techniques for Edge Detec...Signal Processing, Statistical and Learning Machine Techniques for Edge Detec...
Signal Processing, Statistical and Learning Machine Techniques for Edge Detec...
 
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
 
Importance of Mean Shift in Remote Sensing Segmentation
Importance of Mean Shift in Remote Sensing SegmentationImportance of Mean Shift in Remote Sensing Segmentation
Importance of Mean Shift in Remote Sensing Segmentation
 
IRJET- Digit Identification in Natural Images
IRJET- Digit Identification in Natural ImagesIRJET- Digit Identification in Natural Images
IRJET- Digit Identification in Natural Images
 

Viewers also liked

Ijmer 46051622
Ijmer 46051622Ijmer 46051622
Ijmer 46051622
IJMER
 
Go BlackBerry Z30 ready
Go BlackBerry Z30 readyGo BlackBerry Z30 ready
Go BlackBerry Z30 ready
Bhasker Thapan
 
Bn32839844
Bn32839844Bn32839844
Bn32839844
IJMER
 
Fin 370 final exam set 1
Fin 370 final exam set 1Fin 370 final exam set 1
Fin 370 final exam set 1
liam111221
 
Trough External Service Management Improve Quality & Productivity
Trough External Service Management Improve Quality & ProductivityTrough External Service Management Improve Quality & Productivity
Trough External Service Management Improve Quality & Productivity
IJMER
 
Acc 349 final exam
Acc 349 final examAcc 349 final exam
Acc 349 final exam
liam111221
 
C0502 01 1116
C0502 01 1116C0502 01 1116
C0502 01 1116
IJMER
 
Dt2645164520
Dt2645164520Dt2645164520
Dt2645164520
IJMER
 
Cy3210661070
Cy3210661070Cy3210661070
Cy3210661070
IJMER
 
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETsAn Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
IJMER
 
Prospect of bioenergy substitution in tea industries of North East India
Prospect of bioenergy substitution in tea industries of North East IndiaProspect of bioenergy substitution in tea industries of North East India
Prospect of bioenergy substitution in tea industries of North East India
IJMER
 
Improving overall equipment effectiveness by Implementing Total Productive Ma...
Improving overall equipment effectiveness by Implementing Total Productive Ma...Improving overall equipment effectiveness by Implementing Total Productive Ma...
Improving overall equipment effectiveness by Implementing Total Productive Ma...
IJMER
 
Variant Origin and Course of Ulnar Artery
Variant Origin and Course of Ulnar ArteryVariant Origin and Course of Ulnar Artery
Variant Origin and Course of Ulnar Artery
IJMER
 
10 Steps to Make Moving Easier
10 Steps to Make Moving Easier10 Steps to Make Moving Easier
10 Steps to Make Moving Easier
Garrett's Moving Inc
 
Receiver Module of Smart power monitoring and metering distribution system u...
Receiver Module of Smart power monitoring and metering  distribution system u...Receiver Module of Smart power monitoring and metering  distribution system u...
Receiver Module of Smart power monitoring and metering distribution system u...
IJMER
 
Bx31302306
Bx31302306Bx31302306
Bx31302306
IJMER
 
D04010 03 2328
D04010 03 2328D04010 03 2328
D04010 03 2328
IJMER
 
Trajectory Control With MPC For A Robot Manipülatör Using ANN Model
Trajectory Control With MPC For A Robot Manipülatör Using  ANN ModelTrajectory Control With MPC For A Robot Manipülatör Using  ANN Model
Trajectory Control With MPC For A Robot Manipülatör Using ANN Model
IJMER
 
Www youtube com_watch_v_p_n_huv50kbfe
Www youtube com_watch_v_p_n_huv50kbfeWww youtube com_watch_v_p_n_huv50kbfe
Www youtube com_watch_v_p_n_huv50kbfe
Rancyna James
 

Viewers also liked (20)

Ijmer 46051622
Ijmer 46051622Ijmer 46051622
Ijmer 46051622
 
Go BlackBerry Z30 ready
Go BlackBerry Z30 readyGo BlackBerry Z30 ready
Go BlackBerry Z30 ready
 
Bn32839844
Bn32839844Bn32839844
Bn32839844
 
Fin 370 final exam set 1
Fin 370 final exam set 1Fin 370 final exam set 1
Fin 370 final exam set 1
 
Trough External Service Management Improve Quality & Productivity
Trough External Service Management Improve Quality & ProductivityTrough External Service Management Improve Quality & Productivity
Trough External Service Management Improve Quality & Productivity
 
Acc 349 final exam
Acc 349 final examAcc 349 final exam
Acc 349 final exam
 
C0502 01 1116
C0502 01 1116C0502 01 1116
C0502 01 1116
 
Hobbes
HobbesHobbes
Hobbes
 
Dt2645164520
Dt2645164520Dt2645164520
Dt2645164520
 
Cy3210661070
Cy3210661070Cy3210661070
Cy3210661070
 
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETsAn Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
An Optimal Risk- Aware Mechanism for Countering Routing Attacks in MANETs
 
Prospect of bioenergy substitution in tea industries of North East India
Prospect of bioenergy substitution in tea industries of North East IndiaProspect of bioenergy substitution in tea industries of North East India
Prospect of bioenergy substitution in tea industries of North East India
 
Improving overall equipment effectiveness by Implementing Total Productive Ma...
Improving overall equipment effectiveness by Implementing Total Productive Ma...Improving overall equipment effectiveness by Implementing Total Productive Ma...
Improving overall equipment effectiveness by Implementing Total Productive Ma...
 
Variant Origin and Course of Ulnar Artery
Variant Origin and Course of Ulnar ArteryVariant Origin and Course of Ulnar Artery
Variant Origin and Course of Ulnar Artery
 
10 Steps to Make Moving Easier
10 Steps to Make Moving Easier10 Steps to Make Moving Easier
10 Steps to Make Moving Easier
 
Receiver Module of Smart power monitoring and metering distribution system u...
Receiver Module of Smart power monitoring and metering  distribution system u...Receiver Module of Smart power monitoring and metering  distribution system u...
Receiver Module of Smart power monitoring and metering distribution system u...
 
Bx31302306
Bx31302306Bx31302306
Bx31302306
 
D04010 03 2328
D04010 03 2328D04010 03 2328
D04010 03 2328
 
Trajectory Control With MPC For A Robot Manipülatör Using ANN Model
Trajectory Control With MPC For A Robot Manipülatör Using  ANN ModelTrajectory Control With MPC For A Robot Manipülatör Using  ANN Model
Trajectory Control With MPC For A Robot Manipülatör Using ANN Model
 
Www youtube com_watch_v_p_n_huv50kbfe
Www youtube com_watch_v_p_n_huv50kbfeWww youtube com_watch_v_p_n_huv50kbfe
Www youtube com_watch_v_p_n_huv50kbfe
 

Similar to Mislaid character analysis using 2-dimensional discrete wavelet transform for edge refinement

Hardware Unit for Edge Detection with Comparative Analysis of Different Edge ...
Hardware Unit for Edge Detection with Comparative Analysis of Different Edge ...Hardware Unit for Edge Detection with Comparative Analysis of Different Edge ...
Hardware Unit for Edge Detection with Comparative Analysis of Different Edge ...
paperpublications3
 
A NOBEL HYBRID APPROACH FOR EDGE DETECTION
A NOBEL HYBRID APPROACH FOR EDGE  DETECTIONA NOBEL HYBRID APPROACH FOR EDGE  DETECTION
A NOBEL HYBRID APPROACH FOR EDGE DETECTION
ijcses
 
A Flexible Scheme for Transmission Line Fault Identification Using Image Proc...
A Flexible Scheme for Transmission Line Fault Identification Using Image Proc...A Flexible Scheme for Transmission Line Fault Identification Using Image Proc...
A Flexible Scheme for Transmission Line Fault Identification Using Image Proc...
IJEEE
 
Image segmentation methods for brain mri images
Image segmentation methods for brain mri imagesImage segmentation methods for brain mri images
Image segmentation methods for brain mri images
eSAT Journals
 
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
ijistjournal
 
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING
sipij
 
E017443136
E017443136E017443136
E017443136
IOSR Journals
 
Image Blur Detection with 2D Haar Wavelet Transform and Its Effect on Skewed ...
Image Blur Detection with 2D Haar Wavelet Transform and Its Effect on Skewed ...Image Blur Detection with 2D Haar Wavelet Transform and Its Effect on Skewed ...
Image Blur Detection with 2D Haar Wavelet Transform and Its Effect on Skewed ...
Vladimir Kulyukin
 
Rigorous Pack Edge Detection Fuzzy System
Rigorous Pack Edge Detection Fuzzy SystemRigorous Pack Edge Detection Fuzzy System
Rigorous Pack Edge Detection Fuzzy System
inventy
 
A010110104
A010110104A010110104
A010110104
IOSR Journals
 
Algorithm for the Comparison of Different Types of First Order Edge Detection...
Algorithm for the Comparison of Different Types of First Order Edge Detection...Algorithm for the Comparison of Different Types of First Order Edge Detection...
Algorithm for the Comparison of Different Types of First Order Edge Detection...
IOSR Journals
 
Paper on image processing
Paper on image processingPaper on image processing
Paper on image processing
Saloni Bhatia
 
NMS and Thresholding Architecture used for FPGA based Canny Edge Detector for...
NMS and Thresholding Architecture used for FPGA based Canny Edge Detector for...NMS and Thresholding Architecture used for FPGA based Canny Edge Detector for...
NMS and Thresholding Architecture used for FPGA based Canny Edge Detector for...
idescitation
 
IRJET- Image Feature Extraction using Hough Transformation Principle
IRJET- Image Feature Extraction using Hough Transformation PrincipleIRJET- Image Feature Extraction using Hough Transformation Principle
IRJET- Image Feature Extraction using Hough Transformation Principle
IRJET Journal
 
Evaluate Combined Sobel-Canny Edge Detector for Image Procssing
Evaluate Combined Sobel-Canny Edge Detector for Image ProcssingEvaluate Combined Sobel-Canny Edge Detector for Image Procssing
Evaluate Combined Sobel-Canny Edge Detector for Image Procssing
idescitation
 
ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...
ANALYSIS OF INTEREST POINTS OF CURVELET  COEFFICIENTS CONTRIBUTIONS OF MICROS...ANALYSIS OF INTEREST POINTS OF CURVELET  COEFFICIENTS CONTRIBUTIONS OF MICROS...
ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...
sipij
 
15 20 jul17 6jun 16151 gunawanedgenn jul17final(edit)n
15 20 jul17 6jun 16151 gunawanedgenn jul17final(edit)n15 20 jul17 6jun 16151 gunawanedgenn jul17final(edit)n
15 20 jul17 6jun 16151 gunawanedgenn jul17final(edit)n
IAESIJEECS
 
ALGORITHM AND TECHNIQUE ON VARIOUS EDGE DETECTION: A SURVEY
ALGORITHM AND TECHNIQUE ON VARIOUS EDGE DETECTION: A SURVEYALGORITHM AND TECHNIQUE ON VARIOUS EDGE DETECTION: A SURVEY
ALGORITHM AND TECHNIQUE ON VARIOUS EDGE DETECTION: A SURVEY
sipij
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
10 Important AI Research Papers.pdf
10 Important AI Research Papers.pdf10 Important AI Research Papers.pdf
10 Important AI Research Papers.pdf
Linda Garcia
 

Similar to Mislaid character analysis using 2-dimensional discrete wavelet transform for edge refinement (20)

Hardware Unit for Edge Detection with Comparative Analysis of Different Edge ...
Hardware Unit for Edge Detection with Comparative Analysis of Different Edge ...Hardware Unit for Edge Detection with Comparative Analysis of Different Edge ...
Hardware Unit for Edge Detection with Comparative Analysis of Different Edge ...
 
A NOBEL HYBRID APPROACH FOR EDGE DETECTION
A NOBEL HYBRID APPROACH FOR EDGE  DETECTIONA NOBEL HYBRID APPROACH FOR EDGE  DETECTION
A NOBEL HYBRID APPROACH FOR EDGE DETECTION
 
A Flexible Scheme for Transmission Line Fault Identification Using Image Proc...
A Flexible Scheme for Transmission Line Fault Identification Using Image Proc...A Flexible Scheme for Transmission Line Fault Identification Using Image Proc...
A Flexible Scheme for Transmission Line Fault Identification Using Image Proc...
 
Image segmentation methods for brain mri images
Image segmentation methods for brain mri imagesImage segmentation methods for brain mri images
Image segmentation methods for brain mri images
 
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...
 
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING
AN ENHANCED BLOCK BASED EDGE DETECTION TECHNIQUE USING HYSTERESIS THRESHOLDING
 
E017443136
E017443136E017443136
E017443136
 
Image Blur Detection with 2D Haar Wavelet Transform and Its Effect on Skewed ...
Image Blur Detection with 2D Haar Wavelet Transform and Its Effect on Skewed ...Image Blur Detection with 2D Haar Wavelet Transform and Its Effect on Skewed ...
Image Blur Detection with 2D Haar Wavelet Transform and Its Effect on Skewed ...
 
Rigorous Pack Edge Detection Fuzzy System
Rigorous Pack Edge Detection Fuzzy SystemRigorous Pack Edge Detection Fuzzy System
Rigorous Pack Edge Detection Fuzzy System
 
A010110104
A010110104A010110104
A010110104
 
Algorithm for the Comparison of Different Types of First Order Edge Detection...
Algorithm for the Comparison of Different Types of First Order Edge Detection...Algorithm for the Comparison of Different Types of First Order Edge Detection...
Algorithm for the Comparison of Different Types of First Order Edge Detection...
 
Paper on image processing
Paper on image processingPaper on image processing
Paper on image processing
 
NMS and Thresholding Architecture used for FPGA based Canny Edge Detector for...
NMS and Thresholding Architecture used for FPGA based Canny Edge Detector for...NMS and Thresholding Architecture used for FPGA based Canny Edge Detector for...
NMS and Thresholding Architecture used for FPGA based Canny Edge Detector for...
 
IRJET- Image Feature Extraction using Hough Transformation Principle
IRJET- Image Feature Extraction using Hough Transformation PrincipleIRJET- Image Feature Extraction using Hough Transformation Principle
IRJET- Image Feature Extraction using Hough Transformation Principle
 
Evaluate Combined Sobel-Canny Edge Detector for Image Procssing
Evaluate Combined Sobel-Canny Edge Detector for Image ProcssingEvaluate Combined Sobel-Canny Edge Detector for Image Procssing
Evaluate Combined Sobel-Canny Edge Detector for Image Procssing
 
ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...
ANALYSIS OF INTEREST POINTS OF CURVELET  COEFFICIENTS CONTRIBUTIONS OF MICROS...ANALYSIS OF INTEREST POINTS OF CURVELET  COEFFICIENTS CONTRIBUTIONS OF MICROS...
ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...
 
15 20 jul17 6jun 16151 gunawanedgenn jul17final(edit)n
15 20 jul17 6jun 16151 gunawanedgenn jul17final(edit)n15 20 jul17 6jun 16151 gunawanedgenn jul17final(edit)n
15 20 jul17 6jun 16151 gunawanedgenn jul17final(edit)n
 
ALGORITHM AND TECHNIQUE ON VARIOUS EDGE DETECTION: A SURVEY
ALGORITHM AND TECHNIQUE ON VARIOUS EDGE DETECTION: A SURVEYALGORITHM AND TECHNIQUE ON VARIOUS EDGE DETECTION: A SURVEY
ALGORITHM AND TECHNIQUE ON VARIOUS EDGE DETECTION: A SURVEY
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
10 Important AI Research Papers.pdf
10 Important AI Research Papers.pdf10 Important AI Research Papers.pdf
10 Important AI Research Papers.pdf
 

More from IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
IJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
IJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
IJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
IJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
IJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
IJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
IJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
IJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
IJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
IJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
IJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
IJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
IJMER
 

More from IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Recently uploaded

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 

Recently uploaded (20)

Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 

Mislaid character analysis using 2-dimensional discrete wavelet transform for edge refinement

  • 1. www.ijmer.com International Journal of Modern Engineering Research (IJMER) Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3134-3136 ISSN: 2249-6645 Mislaid character analysis using 2-dimensional discrete wavelet transform for edge refinement Kushal Kumar1, Anamika Yadav2, Himanshi Rani3, Yashasvi Nijhawan4 1 (Electronics and Communication Engineering, Jaypee University of Engineering and Technology, India, 2013) (Electronics and Communication Engineering, Bhagwan Parshuram Institute of Technology, GGSIPU, Delhi, India, 2012) 3 (Electronics and Communication Engineering, Vellore Institute of Technology, Chennai, India, 2015) 4 (Electronics and Communication, Jaypee University of Information Technology, Waknaghat, India, 2013) 2 ABSTRACT: Character recognition is an important tool used for many purposes limited only by imagination, some of them being automatic number plate recognition and digital conversion of texts. In the present methods, edge detection techniques perform well but they are time consuming and have errors if the data provided is not up to the mark. In this paper, a novel method is proposed to minimize those errors and perform the edge detection of characters using 2dimensional wavelet transform pre-processing. Keywords: 2-dimensional wavelets, Character recognition, Machine vision, Image processing, ANPR. I. INTRODUCTION Today, many character recognition systems are used worldwide. The system works fine too in most of the cases, but sometimes the characters on given image aredifficult to identify because of many reasons like bad lightning, or mislaid/broken characters. In this paper, a vehicle number plate with difficult to detect characters is taken and, a novel image processing method for detection of characters using wavelet pre-processing is proposed to segment the characters from that image. The criterion used to compare different methods is touse the number of pixels of the characters the method could detect with the conventional edge detection techniques to emphasize the benefit of 2D-DWT over those methods. A series of steps in wavelet pre-processed edge detection are performed in a systematic way which detects the characters. Edge detection is almost a prerequisite in various recognition tasks, like automatic number plate recognition, which we have done in this paper. Edge is a boundary between two homogeneous surfaces. Fig.1 shows the text which was used for edge detection in the proposed method and the conventional edge-detection methods (Sobel, Prewitt and Canny). Various conventional techniques for edge detection of IC’s are available in literature[1]. Huang et al. (2011) proposes an improved algorithm for canny edge detection. It uses an improved switch median filter algorithm instead of Gaussian filter algorithms for filtering. [2]Somyot et al.(2012) used wavelet transforms to compress the image before edge detection. II. EDGE DETECTION An edge is an abrupt change in the intensity level, which characterizes high frequency component in an image. Noise is an unwanted signal which can cause inefficiency in edge detection. In practice due to imperfection in image acquisition or sampling, the edges get blurred and tend to become thick. However the derivatives play an important role in detecting the edges and locating the edge pixels in an image. The first derivative is positive at the point of intensity variation and zero in the areas of constant intensity. The magnitude of first derivative can be used to detect the presence of an edge. The second derivative is positive if the transition occurs on the dark side of an edge and it is negative if transition is on the light side of an image. Hence, a second derivative can be used to locate the edge pixels. For edge detection second derivative can also be used but its sensitivity towards noise limits its application in edge detection. In the subsequent sections we will be discussing about the approximated first derivative operators that are used for edge detection in the present investigation. III. CONVENTIONAL EDGE DETECTION METHODS The edge detection methods used in this paper are Sobel, Prewitt and Canny, which are compared to each other and then the best one of them is compared to the proposed algorithm. The algorithms are compared based on how much amount of the character data can they extract from the given image. So, first we should know briefly what these methods are and how do they work. Next, we extract the pin information from the original image as well as segmented edge-detected image in the form of number of pin-pixels and compare which method extracts the maximum pin-information for analysis. In the original image, the no. of pixels contained by the characters are 1882. 3.1 SOBEL The Sobel edge detector is an approximated, first derivative two dimensional edge detector. It calculates gradient in X and Y direction. It uses a convolutional mask to calculate the gradients as in equation (1) and gradient directions as in equation (2). The masks are slid over the image and gradient values are calculated. In Sobel the centre coefficient of the mask uses a weight of two, it is used so as to achieve a smoothing by giving more weightage to the central term of the mask. The segmented image obtained by using a Sobel operator is shown in Fig.2. The number of pin-pixels detected by this algorithm was 203. |G|=|GX|+|GY| (1) -1 𝐺 𝑌 Θ=tan [ ] (2) 𝐺𝑋 www.ijmer.com 3134 | Page
  • 2. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2719-2727 ISSN: 2249-6645 3.2 PREWITT Prewitt edge detector is also an approximated first derivative two dimensional edge detector. It uses aconvolutional mask to calculate the gradient in X and Y directions respectively. The segmented image obtained by using Prewitt operator is shown in Fig.3. The number of pin-pixels detected by this algorithm was 201. 3.3 CANNY Canny edge detection is another method of edge detection. It follows a series of steps. In the first step it eliminates the noise from the Image by filtering the Image using Gaussian filter. In the second step it calculates the gradient and the edge direction of the Image using Sobel edge detection. In the third step it performs non-maximum suppression. The pixels along the edge direction which do not satisfy (3) are set to 0 or considered as non-edge pixel. Further suppression is done using hysteresis. Hysteresis uses two thresholds. T1 and T2. If the magnitude is below the first threshold then it is set to 0 (non-edge pixel). If the magnitude is above threshold T2 then it is considered as an edge pixel. If the magnitude lies between T1 and T2 then depending upon the path between the current pixel and the pixel with magnitude greater than T2 the pixel is considered as an edge pixel or non-edge pixel. The segmented image obtained by using a canny edge detector is shown in Fig.4. The number of pin-pixels detected by this algorithm was 978. IV. WAVELETS Wavelets are a small portion of the wave. Wavelet transform uses wavelets to capture different frequency components of the signal whose resolution matches up with its scale. This technique is known as multi-resolution Analysis. It comprises of a scaling function and a wavelet function. Scaling function gives the series of approximation of the signal, where each approximated signal differs by a factor of two. Wavelet functions are used to add the detailed information in the difference of the two neighbouring approximations. Hence in wavelet analysis we get the approximated part and the detailed part of the signal. In case of Images the wavelet analysis is carried out in two dimensions. In X and Y direction respectively, the two dimensional wavelet decomposition is shown in the form of an image in Fig. 5. It is known as filter bank analysis. It consists of high pass and low pass filters. First the analysis is done along the columns and then along the rows. The output of the low pass filter gives the approximated coefficients and the output of the high pass filter gives detailed coefficients. The approximated coefficients at scale j+1 are used to construct the detailed and approximated coefficients at scale j. In case of two dimensions we get three sets of detailed coefficients (rest three squares) and one set of approximated coefficient (upper left square). V. PROPOSED METHOD In the proposed method, we have first subjected the image to a 2-Dimensional discrete wavelet transform (2-D DWT). Doing this, we get a set of 4 images, one is the set of approximated coefficients and the other three are set of detailed coefficients. We ignore the approximated coefficient and reconstruct the image using the set of detailed coefficients, i.e. we take inverse 2-D DWT. The image is now ready to be edge-detected using any conventional algorithm like Canny in this case. So, we choose the best one of the conventional methods, which comes out to be Canny and then compare it with our proposed method in Fig. 6. The number of pin-pixels detected by this algorithm was 5636, i.e. 84.25% of the pin-information is accurately extracted. VI. Fig.1 Original IC image. detected image. Fig.3 Pin segmentation on Prewitt edgedetected image FIGURES Fig.2Character segmentation on Sobel edge- Fig.4 www.ijmer.com Character segmentation edge-detected image. on Canny 3135 | Page
  • 3. www.ijmer.com International Journal of Modern Engineering Research (IJMER) Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2719-2727 ISSN: 2249-6645 Fig.5 2-D DWT illustration. Fig.6 Pin segmentation on Wavelet preprocessed Canny edge-detected image. VII. CONCLUSION Based on the results the following inferences can be made. When wavelet pre-processing was not performed, canny edge detection, Fig.4 was found to be the most efficient method followed by Sobel, Fig.2 and Prewitt, Fig.3, which are pretty close to each other. When wavelet pre-processing was used, the results obtained are as shown in Fig. 6 which arefar more accurate than the results obtained without using wavelet pre-processing as in Fig. 2, 3 and 4. The proposed method detects over 50% of the pixels while the conventional methods could detect only about 10%. On using wavelet pre-processing the low frequency component of the image was removed and high frequency components were retained during reconstruction. The edges which comprises of high frequencies were efficiently detected. Thus the choice of using wavelet pre-processing made edge detection more efficient. Better and efficient extraction of IC pin information was achieved. Many sectors could benefit from this approach, like the traffic regulation sector or the handwriting analysis sector. The number of man-hours will be greatly reduced and the results would be more accurate than any of the current methods. This method could be implemented over existing hardware. ACKNOWLEDGMENTS I, Kushal Kumar, would like to thank Dr. Sudha Radhika who was an inspiration for me to take up this project. REFERENCES [1] [2] [3] [4] [5] Ying Huang, Qi Pan,Qi Liu,XinPeng He,Yun Feng Liu,Yong Quan Yu, “Application of Improved Canny Algorithm on the IC Chip pin Inspection”,Advanced Materials Research Vols. 317-319 (2011) pp 854-858. K. Somyot, S. Anakapon and K. Anantawat, “Pattern recognition technique for IC pins inspection using wavelet transform with chain code discrete Fourier Transform and signal correlation”, International Journal of Physical Sciences, Vol.7 (9), pp. 1326-1332, 23 February 2012. Tim Edwards, “Discrete Wavelet Transform: Implementation and theory”, Stanford University, September 1991. Rafael C. Gonzalez, Richard E. Woods Digital Image Processing (ISBN-13: 978-0131687288,3rdEdition, 2007) Barroso, J. ; Seccao de Engenharias, Dagless, E.L. ; Rafael, A. ; Bulas-Cruz, J., “Number plate reading using computer vision”, ISIE '97., Proceedings of the IEEE International Symposium on Industrial Electronics, 1997. www.ijmer.com 3136 | Page