SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3462
A Detailed Review of Different Handwriting Recognition Methods
Suraj Singh Nagvanshi1, Akhandpratap Manoj Singh2, Shreya Yadav3, Deepanshi4
1,2Student, Computer Science and Engineering Department, ABES Engineering College, Ghaziabad, India
3Student, Information Technology Department, ABES Engineering College, Ghaziabad, India
4Asst. Professor, Computer Science and Engineering Department, ABES Engineering College, Ghaziabad, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - One of the major computer-related problems
that is being researched is to recognize and classify an
image. How machines can recognize images like humans
do. Things that can be recognized from an image is
handwriting, handwriting recognition can help with
human dependent work such as check analysis and for
handwritten form processing. In an image recognition, the
angle of view, light conditioning, and whether the
captured image is clear or not will affect the process of
recognizing the image. There exist several methods to be
discussed in this paper that can be used for handwriting
recognition.
Keywords - Handwritten method, Image Recognition,
Image Classification,
1. INTRODUCTION
One of the many computer-related problems that are
sought and researched is how images can be recognized
and classified. How a picture is recognized as a human
who recognizes the image. Image recognition is an
important process for image processing[1]. In image
recognition, the angle of view, light conditions, and
whether the captured image is clear or not will affect the
process of recognizing the image
 Handwriting recognition is one of the most sought
after and studied issues, since handwriting can help
humans do some work such as post-exposure, bank
check analysis, and handwritten processing on forms.
The recognition of images for handwriting is more
challenging because each person must have a different
handwriting form. In addition to writing handwriting
is not always straight sometimes there is a sloping up
and there is a downward slant, so handwriting will be
more difficult to detect than computer writing that
already has a definite form.
 Handwriting detection definitely has more factors that
will influence the successful recognition of a
handwriting. Because a misinterpretation will be
more handwriting than computer writing that is
certain to have a fixed form depending on the type.
For handwriting recognition, there are several
methods that can be used that will be discussed in the
next section.
2. IMAGE RECOGNITION METHODS
2.1 INCREMENTAL RECOGNITION METHOD
Incremental method is one method that can be used for
handwriting recognition. Incremental methods can not
only be applied to busy recognition but can be applied to
lazy recognition as well[2]. This incremental pure method
only sees the strokes just enter; in this method the
previous strokes are not seen. The process is also
illustrated in Figure 1. Figure 1 further clarifies the flow
from the initial process to the final process. Here is a
process done on the incremental method:
a) Receive a New Stroke
The stroke inputted comes from the user.
b) Update of Geometric Feature
The newly received stroke belongs to the geometric
feature. Based on the recently received information, the
current geometric feature average value is updated
immediately.
c) Symbol Candidate’s Recognition
Each symbol hypothesis is recognized by a combination of
online and offline recognition. The online method is great
for stroke connections, while offline will not be impacted
by irregular strokes or duplicate strokes.
d) CYK update table
The CYK table only needs to be expanded, the existing
table does not need to be changed anytime it receives a
new stroke. Figure 1 is a diagram of the incremental
process described above.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3463
Figure 1: Flow of Incremental Recognition [11]
2.2 SEMI INCREMENTAL RECOGNITION METHOD
This semi incremental method differs from the pure
incremental method. In this semi incremental method, the
waiting time will not be too visible. The pure incremental
method of seeing only the current scratches alone does not
see the previous scratches associated with the current
scratches, while the semi incremental considers the latest
stroke and previous segment, this is because the previous
strokes are related to the current stroke[3]. This method
focuses on handwriting calculations.
a) Strategy of Local Processing
Introduction with semi incremental method is done after
several new strokes entered. Incoming scars before new
strokes appear also affect the outcome of the introduction.
That's why strokes before new strokes come in and new
strokes both must be both processed. To know the best
recognition, by tracing from the first stroke.
b) Processing Flow
In the semi incremental method, the process in a pure
incremental method is performed again by a semi
incremental method, but in addition to using existing
processes in pure incremental methods, another process is
performed that is the process of correcting wrong
segmentation and correcting recognition errors.[3]
Figure 2: Flow of Semi Incremental Recognition
Figure 2 is a semi-incremental recognition diagram, a few
sentences after this will briefly explain the diagram. As
shown in Figure 2, from the user's handwriting, a new
stroke is inserted. The end result is reused for the next
processing cycle.
c) Determination of Scope
To determine the scope used the result of the
segmentation process. Stroke segmentation before and
after the system receives a new stroke and then compared
to each other. If the detected off stroke classification is
considered to be scratched before start.[4]
d) Seg_rp and Segmentation Point Determination
Seg_rp is determined from SP off-strokes. From the result
of the recognition of the text up to the last scope, that is
the best path to the latest scope in the src lattice, a stroke
between two recognizable characters can be considered
SP. Among off-strokes, Seg_rp selection is performed
based on the number of characters from each off-stroke
until the last character in the acknowledgment. If this
number is equal to N_CHAR, then the off-stroke will be
determined as new Seg_rp. N_CHAR itself is the number of
fixed characters needed to define a new Seg_rp.
2.3 CONVOLUTIONAL NEURAL NETWORK
Convolutional Neural Network (CNN) is one of the most
widely used methods for handwriting recognition. Before
entering into Convolutional Neural Network, the image
must go through pre-processing first.
The following are the steps of Pre-processing:
1) Input the image you want to recognize.
2) Do cropping or warping. The goal is that the image part
that does not want to be recognized is lost.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3464
3) Set the image size. Image size should be all the same.
Figure 3: Diagram Recognition of Handwritten [5]
Figure 4: The Example of CNN Architecture [11]
CNN generally consists of three layers: convolutional layer,
sub-sampling layer, and fully connection layer. But it can
also be inserted another layer like softmax layer. Each
layer linked to the previous layer. The softmax layer works
to improve the accuracy of image detection. In Figure 4 is
an example of CNN architecture without inserted an
additional layer. The number of layers applied to CNN is
not always the same, depending on the need. Differences
in recognizable handwriting language also affect what
layers will be used and how many layers. Additional layers
inserted on CNN are optional. If an additional layer is
inserted on CNN there will be an effect, for example, if the
softmax layer is inserted into CNN then the handwriting
recognition accuracy will be higher than CNN which is not
inserted the softmax layer.
Below are the layers in the Convolutional Neural Network
(CNN):
a) Convolutional Layer
Convolutional layer is the basic layer that builds a CNN. In
this layer, the convolution process is performed. The
convolution operation of this image serves to extract the
input image feature. The final convolution layer to
maintain the spatial position and gray level information of
the convolution feature map.
b) Subsampling Layer
Pooling Layer (Subsampling). Serves to change the input
feature into a representation of statistical results of the
features around it, so the resulting feature size will be
much smaller than the previous feature. Most of the
subsampling on CNN uses Max pooling.
c) Fully-Connected Layer
As a classifier on CNN, this layer is a CNN architecture
consisting of input layer, hidden layer, and output layer.
d) Softmax Layer
The softmax layer is the last layer on CNN. Softmax Layer
is used to present output to the form of probability. Very
useful for classification. The softmax layer is used to
classify characters. The softmax function has a value
between 0 and 1. The class with the maximum value will
be selected as the class for the image, while the smaller
value means not including the main image to be detected.
Here is the Equation [6]:
Where xi is the input value, k is the number of kernels, and
x is a vector of scores. Where fi is the element to i at f.
The stages of the CNN method for image recognition in
writing as below:
1) Pre-Processing: The image is resized, if too
large then the calculation will be high or too small will be
difficult to adjust to large networks. Larger images are cut
and padding will be applied to smaller images to get the
standard size.
2) Creation of datasets: If no open source dataset
is available for handwriting characters to be detected, it
must be built in a new dataset, but if a dataset is available
then an existing dataset can be used.
3) Final Data Determination: A large dataset is
required to train CNN. To achieve this, the images that
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3465
have been obtained are modified and changed to get a
large number of variations.
4) Classification: The CNN end layer is the
Softmax layer and the softmax layer is used to classify the
given input image.
5) Testing: The test module is related to the test
image. The test images were obtained by splitting the
randomly enlarged dataset.
2.4 LINE AND WORD SEGMENTATION
Handwriting segmentation is a difficult problem in
handwriting recognition. Even in recognition, handwriting
is harder to recognize than computer writing. One factor is
everyone has different handwriting forms. The other
factor is the slope factor of a writing. In the recognition of
handwriting, the word segmentation into letters is a
usable approach. The word segmentation is complex, but it
is even more complicated if this method has to recognize
the dial. A Line and Words Segmentation Approach for
Printed Documents to project a powerful process. A
writing can be segmented based on line, word, and
character. On line segmentation is detected by scanning
the written image that has been inputted horizontally.
The following is a step by step of the method:
a) View scanned images and crop imagery to find areas of
interest.
b) Remove existing noise in image using subtraction
method. To remove the noise on the image inputted pre-
processing done. The size of the image that has been
inputted adapted its size. Then the resized image is
subtracted from the blank image for a noise-free image.
c) The image is converted to binary by way of mining text
and removing the background. Change the grayscale image
to binary image. Where 0 is black and 1 is white.
d) Correction and skew detection using Hough Transform.
Skew's handwriting image is inevitable. Therefore, a
change of tilt is a serious thing. Hough Transform is used
to know the slope accurately by mapping the dot on the
cartesian space (x, y) to the sinusoidal curve.
Skew is defined by Ɵ. For Correction skew in a direction in
the opposite direction of the same angle.
e) The use of 'bwmorph' morphology function for thinning
process. The morphological process applied here is
Thinning. Thinning is used to remove marked pixels
marked from binary images, much like erosion.
6) Horizontal Projection Profile is used for line
segmentation. In the histogram of a handwriting, a peak
and valley indicate the writing and space between each
line.
7) Use of dilation and Vertical Projection Profile word
segmentation is done.
2.5 PART-BASED METHOD
Part-Based methods have been used to recognize an
object. Below are the properties of the part-based method
[7]:
a) Use multiple key points to represent a single image.
b) In evaluating the similarity of global features is often
overlooked, this leads to an increase in resistance to object
display variations.
c) Image similarity depends on whether or not the image
with key point, if the same then the image will be
considered to be in the same class as Key point.
d) Each class is sometimes represented by a collection of
key points extracted from several (different) class images
for many variations.
The following are the benefits of the Part-Based method:
1) Characters can still be recognized although difficult to
normalize with preprocessing.
2) It does not depend on the global structure, therefore, if
there is a line or curve of writing, it is still recognizable.
3) Equivalent to the most unconstrained image distortion
model, each local part is disturbed around its original
position to represent deformation. As a result, it is very
powerful to serve deformation.
4) Can be directly applied to cursive script because it can
recognize its component character. This relaxes the
difficulty of segmentation.
5) Can be applied to scenery images to detect the
characters in the image.
Part-based character recognition methods are organized
in two steps, the first step of the training and the second
introductory step. Here, the steps are:
1) Training Step
The keystrokes will be detected on each training pattern
using the SURF key detector. The square area around each
key point is represented as a 128-dimensional SURF
feature vector (reference vector), then stored into a
database (dictionary). Figure 5 is a picture of the SURF
feature vector that has been briefly described in this step
training.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3466
Figure 5: Describing a local part as a 128-dimensional
SURF feature vector.
2) Recognition Step
The next recognition step consists of two sub-steps,
namely the feature-level and character-level recognition.
2.6 SLOPE AND SLANT CORRECTION METHOD
Slope and slant correction in handwriting is used to
reduce the style variation in writing. When writing
variation is simple it will help the recognition process.
Careful slope correction not only makes the segmentation
process simpler but also the accuracy of the writing
recognition itself.
 Slope Correction Method
In the proposed method, the slope of the word text can be
estimated based on the slope of the baseline. Ascenders
and descenders have no contribution to the initial
formation, they are thrown out as much as possible and
then the best straight line as expected from the remaining
part of the word. The basic slope is found then the slope
corrected by rotating the word about with the angle of the
slope. The slope of the word is estimated from the slope of
the baseline. First, select the core area of the word and
then determine the best load line from the bottom area of
the core. Then the selected part is divided into small
pieces. To reduce as much as possible the effect of slope on
a post, the skewed correction must be performed before
segmentation, feature extraction, training, and
classification stages. The initially slanted writing will
become upright. Leverage is the value of deviation from
the variable mean. Leverage is the average of Li.
Here is the Equation of Li [8, 11]:
 Slant Correction Method
Directed textures can be detected and analyzed efficiently
by using Gabor filters. This capability is attached to the
Gabor filter because it can provide bank filters depending
on the length variations as well as the angle parameters.
The resemblance of the image can be improved. The slope
is estimated and considered as the slope of the original
image. Finally, using a sliding transform, the slope of the
original image is corrected.
2.7 ZONING METHOD
Zoning is a method that can be used for handwriting
recognition. The pattern image is divided into several
zones that provide regional information. The zoning
method is quite successfully applied to handwriting
recognition. There are two methods of zoning, static and
dynamic. The following is an explanation of the Zoning
method [9]:
a) Static Zoning
In this static zoning, zones are distributed evenly
(uniformly), so that the zones of one and the other are the
same. The more zones in an image then the accuracy of the
image will be higher. Figure 6 is a description of the
uniformity of zone divisions.
Figure 6: Static Zoning
b) Dynamic Zoning
In dynamic zoning, the number of zones dividing from a
large image is not the same. In figure 7 it shows the non-
uniform zone division, the magnitude is different.
Figure 7: Dynamic Zoning
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3467
3. CONCLUSION
Image recognition is an important process for the image
processing. Image feature extraction has several
constraints such as differences in image capture position
and different lighting conditions when the image is taken.
The image recognition in handwriting is more challenging
because everyone has different handwriting forms, so that
on the detection also handwriting will be more difficult to
detect compared writings from computers that already
have a definite standard form. There are seven methods
discussed and which have the highest accuracy is the
Method of Convolutional Neural Network (CNN). The
method of the lowest accuracy is Slope and Slant
Correction Method.
ACKNOWLEDGEMENT
We would like to express our gratitude towards our
University, Dr A. P. J. Abdul Kalam Technical University for
giving us a chance to explore various technologies under
our final year Project in Engineering Courses this enables
us to understand the depth and importance of subject.
Also, we would like to thank our institution ABES
Engineering College, Ghaziabad for their kind support and
guidance in our work. We are thankful to Mrs. Pratibha
Singh, our project coordinator for her unfailing support
through this journey. Also, we extend our gratitude out Ms.
Deepanshi our Project guide and Mr. Pankaj Sharma, Head
and Professor, Computer Science and Engineering
Department for their support and guidance.
Finally, we must express our very profound gratitude to
our parents for providing us with unfailing support and
continuous encouragement throughout, this achievement
would not have been possible without them.
REFERENCES
[1] Zhu. Xianwen and Jing fu. “Image recognition method
based on artificial life and support vector machine”, Sixth
International Conference on Intelligent Human-Machine
Systems and Cybernetics, 2014.
[2] Phan. Khanh Minh, Cuong Tuan Nguyen, Anh Due Le
and Masaki Nakagawa. “An Incremental Recognition
Method for Online Handwritten Mathematical Expression”,
3rd IAPR Asian Conference on Pattern Recognition, 2015.
[3] Phan. Khanh Minh, Anh Le Due, and Masaki Nakagawa.
"Semi-Incremental Recognition of Online Handwritten
Mathematical Expressions", 15th International Conference
on Frontiers in Handwriting Recognition, 2016.
[4] Nguyen. Cuong Tuan, Bilan Zhu, and Masaki Nakagawa.
"A semi-incremental recognition method for on-line
handwritten Japanese text", 12th International Conference
on Document Analysis and Recognition, 2013.
[5] Nair. Pranav P, Ajay James, and C saravnan. "Malayalam
Handwritten Character Recognition Using Convolutional
Neural Network", International Conference on Inventive
Communication and Computational Technologies (ICICC),
2017.
[6] Tsai. Charlie. “Recognizing Handwritten Japanese
Characters Using Deep Convolutional Neural Networks”,
Department of Chemical Engineering Stanford University,
2015.
[7] Song. Wang, Seiichi Uchida and Marcus Liwieki.
“Comparative Study of Part-Based Handwritten Character
Recognition Methods”, International Conference on
Document Analysis and Recognition, 2015.
[8] Gupta. Jija Das and Bhabatosh Chanda. “Novel Methods
for Slope and Slant Correction of Off-line Handwritten Text
Word”, International Conference on Emerging Applications
of Information Technology (EAIT), 2012.
[9] Impedovo. S, G. Pirlo, R. Modugno, and A Ferrante.
“Zoning Methods for Hand-Written Character Recognition:
An Overview”, 12th International Conference on Frontiers
in Handwriting Recognition, 2010.
[10] A. A. Ahmed Ali, M. Suresha and H. A. Mohsin Ahmed,
"Different Handwritten Character Recognition Methods: A
Review," 2019 Global Conference for Advancement in
Technology (GCAT), BANGALURU, India, 2019, pp. 1-8.
[11] Salma Shofia Rosyda and Tito Waluyo Purboyo, "A
Review of Various Handwriting Recognition Methods",
International Journal of Applied Engineering Research
ISSN 0973-4562 Volume 13, Number 2(2018) pp.1155-
1164

More Related Content

What's hot

Ganesan dhawanrpt
Ganesan dhawanrptGanesan dhawanrpt
Ganesan dhawanrpt
pramod naik
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
IRJET- Universal Currency Identifier
IRJET-  	  Universal Currency IdentifierIRJET-  	  Universal Currency Identifier
IRJET- Universal Currency Identifier
IRJET Journal
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System
iosrjce
 
Pcb
PcbPcb
Offline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural NetworkOffline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural Network
ijiert bestjournal
 
Text Extraction and Recognition Using Median Filter
Text Extraction and Recognition Using Median FilterText Extraction and Recognition Using Median Filter
Text Extraction and Recognition Using Median Filter
IRJET Journal
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...
ijfcstjournal
 
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
CSCJournals
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural network
eSAT Journals
 
Real Time Face Recognition Based on Face Descriptor and Its Application
Real Time Face Recognition Based on Face Descriptor and Its ApplicationReal Time Face Recognition Based on Face Descriptor and Its Application
Real Time Face Recognition Based on Face Descriptor and Its Application
TELKOMNIKA JOURNAL
 
A Review on Geometrical Analysis in Character Recognition
A Review on Geometrical Analysis in Character RecognitionA Review on Geometrical Analysis in Character Recognition
A Review on Geometrical Analysis in Character Recognition
iosrjce
 
Modified Skip Line Encoding for Binary Image Compression
Modified Skip Line Encoding for Binary Image CompressionModified Skip Line Encoding for Binary Image Compression
Modified Skip Line Encoding for Binary Image Compression
idescitation
 
Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...
Priyanka Pradhan
 
IRJET- A Review on Face Detection and Expression Recognition
IRJET-  	  A Review on Face Detection and Expression RecognitionIRJET-  	  A Review on Face Detection and Expression Recognition
IRJET- A Review on Face Detection and Expression Recognition
IRJET Journal
 
IRJET- Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET- 	  Document Layout analysis using Inverse Support Vector Machine (I-SV...IRJET- 	  Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET- Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET Journal
 
IRJET-Analysis of Face Recognition System for Different Classifier
IRJET-Analysis of Face Recognition System for Different ClassifierIRJET-Analysis of Face Recognition System for Different Classifier
IRJET-Analysis of Face Recognition System for Different Classifier
IRJET Journal
 

What's hot (19)

Ganesan dhawanrpt
Ganesan dhawanrptGanesan dhawanrpt
Ganesan dhawanrpt
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IRJET- Universal Currency Identifier
IRJET-  	  Universal Currency IdentifierIRJET-  	  Universal Currency Identifier
IRJET- Universal Currency Identifier
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System
 
Pcb
PcbPcb
Pcb
 
1304.2109
1304.21091304.2109
1304.2109
 
Offline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural NetworkOffline Handwritten Signature Verification using Neural Network
Offline Handwritten Signature Verification using Neural Network
 
Text Extraction and Recognition Using Median Filter
Text Extraction and Recognition Using Median FilterText Extraction and Recognition Using Median Filter
Text Extraction and Recognition Using Median Filter
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...
 
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural network
 
Ijetcas14 337
Ijetcas14 337Ijetcas14 337
Ijetcas14 337
 
Real Time Face Recognition Based on Face Descriptor and Its Application
Real Time Face Recognition Based on Face Descriptor and Its ApplicationReal Time Face Recognition Based on Face Descriptor and Its Application
Real Time Face Recognition Based on Face Descriptor and Its Application
 
A Review on Geometrical Analysis in Character Recognition
A Review on Geometrical Analysis in Character RecognitionA Review on Geometrical Analysis in Character Recognition
A Review on Geometrical Analysis in Character Recognition
 
Modified Skip Line Encoding for Binary Image Compression
Modified Skip Line Encoding for Binary Image CompressionModified Skip Line Encoding for Binary Image Compression
Modified Skip Line Encoding for Binary Image Compression
 
Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...
 
IRJET- A Review on Face Detection and Expression Recognition
IRJET-  	  A Review on Face Detection and Expression RecognitionIRJET-  	  A Review on Face Detection and Expression Recognition
IRJET- A Review on Face Detection and Expression Recognition
 
IRJET- Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET- 	  Document Layout analysis using Inverse Support Vector Machine (I-SV...IRJET- 	  Document Layout analysis using Inverse Support Vector Machine (I-SV...
IRJET- Document Layout analysis using Inverse Support Vector Machine (I-SV...
 
IRJET-Analysis of Face Recognition System for Different Classifier
IRJET-Analysis of Face Recognition System for Different ClassifierIRJET-Analysis of Face Recognition System for Different Classifier
IRJET-Analysis of Face Recognition System for Different Classifier
 

Similar to IRJET - A Detailed Review of Different Handwriting Recognition Methods

An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
IRJET Journal
 
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
IRJET Journal
 
Lane Detection and Traffic Sign Recognition using OpenCV and Deep Learning fo...
Lane Detection and Traffic Sign Recognition using OpenCV and Deep Learning fo...Lane Detection and Traffic Sign Recognition using OpenCV and Deep Learning fo...
Lane Detection and Traffic Sign Recognition using OpenCV and Deep Learning fo...
IRJET Journal
 
AUTOMATIC IMAGE PROCESSING ENGINE ORIENTED ON QUALITY CONTROL OF ELECTRONIC B...
AUTOMATIC IMAGE PROCESSING ENGINE ORIENTED ON QUALITY CONTROL OF ELECTRONIC B...AUTOMATIC IMAGE PROCESSING ENGINE ORIENTED ON QUALITY CONTROL OF ELECTRONIC B...
AUTOMATIC IMAGE PROCESSING ENGINE ORIENTED ON QUALITY CONTROL OF ELECTRONIC B...
sipij
 
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET Journal
 
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET Journal
 
IRJET- Smart Classroom Attendance System: Survey
IRJET- Smart Classroom Attendance System: SurveyIRJET- Smart Classroom Attendance System: Survey
IRJET- Smart Classroom Attendance System: Survey
IRJET Journal
 
IRJET- VISITX: Face Recognition Visitor Management System
IRJET-  	  VISITX: Face Recognition Visitor Management SystemIRJET-  	  VISITX: Face Recognition Visitor Management System
IRJET- VISITX: Face Recognition Visitor Management System
IRJET Journal
 
IRJET- Note to Coin Converter
IRJET- Note to Coin ConverterIRJET- Note to Coin Converter
IRJET- Note to Coin Converter
IRJET Journal
 
IRJET- Advanced Control Strategies for Mold Level Process
IRJET- Advanced Control Strategies for Mold Level ProcessIRJET- Advanced Control Strategies for Mold Level Process
IRJET- Advanced Control Strategies for Mold Level Process
IRJET Journal
 
Monitor and Quality Control for Automatic Production Line System
Monitor and Quality Control for Automatic Production Line SystemMonitor and Quality Control for Automatic Production Line System
Monitor and Quality Control for Automatic Production Line System
IRJET Journal
 
IRJET - Automatic Licence Plate Detection and Recognition
IRJET -  	  Automatic Licence Plate Detection and RecognitionIRJET -  	  Automatic Licence Plate Detection and Recognition
IRJET - Automatic Licence Plate Detection and Recognition
IRJET Journal
 
Traffic Sign Recognition System
Traffic Sign Recognition SystemTraffic Sign Recognition System
Traffic Sign Recognition System
IRJET Journal
 
Application of Digital Image Correlation: A Review
Application of Digital Image Correlation: A ReviewApplication of Digital Image Correlation: A Review
Application of Digital Image Correlation: A Review
IRJET Journal
 
IRJET - Finger Vein Extraction and Authentication System for ATM
IRJET -  	  Finger Vein Extraction and Authentication System for ATMIRJET -  	  Finger Vein Extraction and Authentication System for ATM
IRJET - Finger Vein Extraction and Authentication System for ATM
IRJET Journal
 
IRJET- Crowd Density Estimation using Image Processing
IRJET- Crowd Density Estimation using Image ProcessingIRJET- Crowd Density Estimation using Image Processing
IRJET- Crowd Density Estimation using Image Processing
IRJET Journal
 
Identify Defects in Gears Using Digital Image Processing
Identify Defects in Gears Using Digital Image ProcessingIdentify Defects in Gears Using Digital Image Processing
Identify Defects in Gears Using Digital Image Processing
IJERD Editor
 
IRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine LearningIRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine Learning
IRJET Journal
 
Face Recognition Technique using ICA and LBPH
Face Recognition Technique using ICA and LBPHFace Recognition Technique using ICA and LBPH
Face Recognition Technique using ICA and LBPH
IRJET Journal
 
CNN MODEL FOR TRAFFIC SIGN RECOGNITION
CNN MODEL FOR TRAFFIC SIGN RECOGNITIONCNN MODEL FOR TRAFFIC SIGN RECOGNITION
CNN MODEL FOR TRAFFIC SIGN RECOGNITION
IRJET Journal
 

Similar to IRJET - A Detailed Review of Different Handwriting Recognition Methods (20)

An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
 
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
 
Lane Detection and Traffic Sign Recognition using OpenCV and Deep Learning fo...
Lane Detection and Traffic Sign Recognition using OpenCV and Deep Learning fo...Lane Detection and Traffic Sign Recognition using OpenCV and Deep Learning fo...
Lane Detection and Traffic Sign Recognition using OpenCV and Deep Learning fo...
 
AUTOMATIC IMAGE PROCESSING ENGINE ORIENTED ON QUALITY CONTROL OF ELECTRONIC B...
AUTOMATIC IMAGE PROCESSING ENGINE ORIENTED ON QUALITY CONTROL OF ELECTRONIC B...AUTOMATIC IMAGE PROCESSING ENGINE ORIENTED ON QUALITY CONTROL OF ELECTRONIC B...
AUTOMATIC IMAGE PROCESSING ENGINE ORIENTED ON QUALITY CONTROL OF ELECTRONIC B...
 
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
IRJET- Automated Student’s Attendance Management using Convolutional Neural N...
 
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
 
IRJET- Smart Classroom Attendance System: Survey
IRJET- Smart Classroom Attendance System: SurveyIRJET- Smart Classroom Attendance System: Survey
IRJET- Smart Classroom Attendance System: Survey
 
IRJET- VISITX: Face Recognition Visitor Management System
IRJET-  	  VISITX: Face Recognition Visitor Management SystemIRJET-  	  VISITX: Face Recognition Visitor Management System
IRJET- VISITX: Face Recognition Visitor Management System
 
IRJET- Note to Coin Converter
IRJET- Note to Coin ConverterIRJET- Note to Coin Converter
IRJET- Note to Coin Converter
 
IRJET- Advanced Control Strategies for Mold Level Process
IRJET- Advanced Control Strategies for Mold Level ProcessIRJET- Advanced Control Strategies for Mold Level Process
IRJET- Advanced Control Strategies for Mold Level Process
 
Monitor and Quality Control for Automatic Production Line System
Monitor and Quality Control for Automatic Production Line SystemMonitor and Quality Control for Automatic Production Line System
Monitor and Quality Control for Automatic Production Line System
 
IRJET - Automatic Licence Plate Detection and Recognition
IRJET -  	  Automatic Licence Plate Detection and RecognitionIRJET -  	  Automatic Licence Plate Detection and Recognition
IRJET - Automatic Licence Plate Detection and Recognition
 
Traffic Sign Recognition System
Traffic Sign Recognition SystemTraffic Sign Recognition System
Traffic Sign Recognition System
 
Application of Digital Image Correlation: A Review
Application of Digital Image Correlation: A ReviewApplication of Digital Image Correlation: A Review
Application of Digital Image Correlation: A Review
 
IRJET - Finger Vein Extraction and Authentication System for ATM
IRJET -  	  Finger Vein Extraction and Authentication System for ATMIRJET -  	  Finger Vein Extraction and Authentication System for ATM
IRJET - Finger Vein Extraction and Authentication System for ATM
 
IRJET- Crowd Density Estimation using Image Processing
IRJET- Crowd Density Estimation using Image ProcessingIRJET- Crowd Density Estimation using Image Processing
IRJET- Crowd Density Estimation using Image Processing
 
Identify Defects in Gears Using Digital Image Processing
Identify Defects in Gears Using Digital Image ProcessingIdentify Defects in Gears Using Digital Image Processing
Identify Defects in Gears Using Digital Image Processing
 
IRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine LearningIRJET- Face Recognition using Machine Learning
IRJET- Face Recognition using Machine Learning
 
Face Recognition Technique using ICA and LBPH
Face Recognition Technique using ICA and LBPHFace Recognition Technique using ICA and LBPH
Face Recognition Technique using ICA and LBPH
 
CNN MODEL FOR TRAFFIC SIGN RECOGNITION
CNN MODEL FOR TRAFFIC SIGN RECOGNITIONCNN MODEL FOR TRAFFIC SIGN RECOGNITION
CNN MODEL FOR TRAFFIC SIGN RECOGNITION
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
MuhammadTufail242431
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 

Recently uploaded (20)

HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 

IRJET - A Detailed Review of Different Handwriting Recognition Methods

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3462 A Detailed Review of Different Handwriting Recognition Methods Suraj Singh Nagvanshi1, Akhandpratap Manoj Singh2, Shreya Yadav3, Deepanshi4 1,2Student, Computer Science and Engineering Department, ABES Engineering College, Ghaziabad, India 3Student, Information Technology Department, ABES Engineering College, Ghaziabad, India 4Asst. Professor, Computer Science and Engineering Department, ABES Engineering College, Ghaziabad, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - One of the major computer-related problems that is being researched is to recognize and classify an image. How machines can recognize images like humans do. Things that can be recognized from an image is handwriting, handwriting recognition can help with human dependent work such as check analysis and for handwritten form processing. In an image recognition, the angle of view, light conditioning, and whether the captured image is clear or not will affect the process of recognizing the image. There exist several methods to be discussed in this paper that can be used for handwriting recognition. Keywords - Handwritten method, Image Recognition, Image Classification, 1. INTRODUCTION One of the many computer-related problems that are sought and researched is how images can be recognized and classified. How a picture is recognized as a human who recognizes the image. Image recognition is an important process for image processing[1]. In image recognition, the angle of view, light conditions, and whether the captured image is clear or not will affect the process of recognizing the image  Handwriting recognition is one of the most sought after and studied issues, since handwriting can help humans do some work such as post-exposure, bank check analysis, and handwritten processing on forms. The recognition of images for handwriting is more challenging because each person must have a different handwriting form. In addition to writing handwriting is not always straight sometimes there is a sloping up and there is a downward slant, so handwriting will be more difficult to detect than computer writing that already has a definite form.  Handwriting detection definitely has more factors that will influence the successful recognition of a handwriting. Because a misinterpretation will be more handwriting than computer writing that is certain to have a fixed form depending on the type. For handwriting recognition, there are several methods that can be used that will be discussed in the next section. 2. IMAGE RECOGNITION METHODS 2.1 INCREMENTAL RECOGNITION METHOD Incremental method is one method that can be used for handwriting recognition. Incremental methods can not only be applied to busy recognition but can be applied to lazy recognition as well[2]. This incremental pure method only sees the strokes just enter; in this method the previous strokes are not seen. The process is also illustrated in Figure 1. Figure 1 further clarifies the flow from the initial process to the final process. Here is a process done on the incremental method: a) Receive a New Stroke The stroke inputted comes from the user. b) Update of Geometric Feature The newly received stroke belongs to the geometric feature. Based on the recently received information, the current geometric feature average value is updated immediately. c) Symbol Candidate’s Recognition Each symbol hypothesis is recognized by a combination of online and offline recognition. The online method is great for stroke connections, while offline will not be impacted by irregular strokes or duplicate strokes. d) CYK update table The CYK table only needs to be expanded, the existing table does not need to be changed anytime it receives a new stroke. Figure 1 is a diagram of the incremental process described above.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3463 Figure 1: Flow of Incremental Recognition [11] 2.2 SEMI INCREMENTAL RECOGNITION METHOD This semi incremental method differs from the pure incremental method. In this semi incremental method, the waiting time will not be too visible. The pure incremental method of seeing only the current scratches alone does not see the previous scratches associated with the current scratches, while the semi incremental considers the latest stroke and previous segment, this is because the previous strokes are related to the current stroke[3]. This method focuses on handwriting calculations. a) Strategy of Local Processing Introduction with semi incremental method is done after several new strokes entered. Incoming scars before new strokes appear also affect the outcome of the introduction. That's why strokes before new strokes come in and new strokes both must be both processed. To know the best recognition, by tracing from the first stroke. b) Processing Flow In the semi incremental method, the process in a pure incremental method is performed again by a semi incremental method, but in addition to using existing processes in pure incremental methods, another process is performed that is the process of correcting wrong segmentation and correcting recognition errors.[3] Figure 2: Flow of Semi Incremental Recognition Figure 2 is a semi-incremental recognition diagram, a few sentences after this will briefly explain the diagram. As shown in Figure 2, from the user's handwriting, a new stroke is inserted. The end result is reused for the next processing cycle. c) Determination of Scope To determine the scope used the result of the segmentation process. Stroke segmentation before and after the system receives a new stroke and then compared to each other. If the detected off stroke classification is considered to be scratched before start.[4] d) Seg_rp and Segmentation Point Determination Seg_rp is determined from SP off-strokes. From the result of the recognition of the text up to the last scope, that is the best path to the latest scope in the src lattice, a stroke between two recognizable characters can be considered SP. Among off-strokes, Seg_rp selection is performed based on the number of characters from each off-stroke until the last character in the acknowledgment. If this number is equal to N_CHAR, then the off-stroke will be determined as new Seg_rp. N_CHAR itself is the number of fixed characters needed to define a new Seg_rp. 2.3 CONVOLUTIONAL NEURAL NETWORK Convolutional Neural Network (CNN) is one of the most widely used methods for handwriting recognition. Before entering into Convolutional Neural Network, the image must go through pre-processing first. The following are the steps of Pre-processing: 1) Input the image you want to recognize. 2) Do cropping or warping. The goal is that the image part that does not want to be recognized is lost.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3464 3) Set the image size. Image size should be all the same. Figure 3: Diagram Recognition of Handwritten [5] Figure 4: The Example of CNN Architecture [11] CNN generally consists of three layers: convolutional layer, sub-sampling layer, and fully connection layer. But it can also be inserted another layer like softmax layer. Each layer linked to the previous layer. The softmax layer works to improve the accuracy of image detection. In Figure 4 is an example of CNN architecture without inserted an additional layer. The number of layers applied to CNN is not always the same, depending on the need. Differences in recognizable handwriting language also affect what layers will be used and how many layers. Additional layers inserted on CNN are optional. If an additional layer is inserted on CNN there will be an effect, for example, if the softmax layer is inserted into CNN then the handwriting recognition accuracy will be higher than CNN which is not inserted the softmax layer. Below are the layers in the Convolutional Neural Network (CNN): a) Convolutional Layer Convolutional layer is the basic layer that builds a CNN. In this layer, the convolution process is performed. The convolution operation of this image serves to extract the input image feature. The final convolution layer to maintain the spatial position and gray level information of the convolution feature map. b) Subsampling Layer Pooling Layer (Subsampling). Serves to change the input feature into a representation of statistical results of the features around it, so the resulting feature size will be much smaller than the previous feature. Most of the subsampling on CNN uses Max pooling. c) Fully-Connected Layer As a classifier on CNN, this layer is a CNN architecture consisting of input layer, hidden layer, and output layer. d) Softmax Layer The softmax layer is the last layer on CNN. Softmax Layer is used to present output to the form of probability. Very useful for classification. The softmax layer is used to classify characters. The softmax function has a value between 0 and 1. The class with the maximum value will be selected as the class for the image, while the smaller value means not including the main image to be detected. Here is the Equation [6]: Where xi is the input value, k is the number of kernels, and x is a vector of scores. Where fi is the element to i at f. The stages of the CNN method for image recognition in writing as below: 1) Pre-Processing: The image is resized, if too large then the calculation will be high or too small will be difficult to adjust to large networks. Larger images are cut and padding will be applied to smaller images to get the standard size. 2) Creation of datasets: If no open source dataset is available for handwriting characters to be detected, it must be built in a new dataset, but if a dataset is available then an existing dataset can be used. 3) Final Data Determination: A large dataset is required to train CNN. To achieve this, the images that
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3465 have been obtained are modified and changed to get a large number of variations. 4) Classification: The CNN end layer is the Softmax layer and the softmax layer is used to classify the given input image. 5) Testing: The test module is related to the test image. The test images were obtained by splitting the randomly enlarged dataset. 2.4 LINE AND WORD SEGMENTATION Handwriting segmentation is a difficult problem in handwriting recognition. Even in recognition, handwriting is harder to recognize than computer writing. One factor is everyone has different handwriting forms. The other factor is the slope factor of a writing. In the recognition of handwriting, the word segmentation into letters is a usable approach. The word segmentation is complex, but it is even more complicated if this method has to recognize the dial. A Line and Words Segmentation Approach for Printed Documents to project a powerful process. A writing can be segmented based on line, word, and character. On line segmentation is detected by scanning the written image that has been inputted horizontally. The following is a step by step of the method: a) View scanned images and crop imagery to find areas of interest. b) Remove existing noise in image using subtraction method. To remove the noise on the image inputted pre- processing done. The size of the image that has been inputted adapted its size. Then the resized image is subtracted from the blank image for a noise-free image. c) The image is converted to binary by way of mining text and removing the background. Change the grayscale image to binary image. Where 0 is black and 1 is white. d) Correction and skew detection using Hough Transform. Skew's handwriting image is inevitable. Therefore, a change of tilt is a serious thing. Hough Transform is used to know the slope accurately by mapping the dot on the cartesian space (x, y) to the sinusoidal curve. Skew is defined by Ɵ. For Correction skew in a direction in the opposite direction of the same angle. e) The use of 'bwmorph' morphology function for thinning process. The morphological process applied here is Thinning. Thinning is used to remove marked pixels marked from binary images, much like erosion. 6) Horizontal Projection Profile is used for line segmentation. In the histogram of a handwriting, a peak and valley indicate the writing and space between each line. 7) Use of dilation and Vertical Projection Profile word segmentation is done. 2.5 PART-BASED METHOD Part-Based methods have been used to recognize an object. Below are the properties of the part-based method [7]: a) Use multiple key points to represent a single image. b) In evaluating the similarity of global features is often overlooked, this leads to an increase in resistance to object display variations. c) Image similarity depends on whether or not the image with key point, if the same then the image will be considered to be in the same class as Key point. d) Each class is sometimes represented by a collection of key points extracted from several (different) class images for many variations. The following are the benefits of the Part-Based method: 1) Characters can still be recognized although difficult to normalize with preprocessing. 2) It does not depend on the global structure, therefore, if there is a line or curve of writing, it is still recognizable. 3) Equivalent to the most unconstrained image distortion model, each local part is disturbed around its original position to represent deformation. As a result, it is very powerful to serve deformation. 4) Can be directly applied to cursive script because it can recognize its component character. This relaxes the difficulty of segmentation. 5) Can be applied to scenery images to detect the characters in the image. Part-based character recognition methods are organized in two steps, the first step of the training and the second introductory step. Here, the steps are: 1) Training Step The keystrokes will be detected on each training pattern using the SURF key detector. The square area around each key point is represented as a 128-dimensional SURF feature vector (reference vector), then stored into a database (dictionary). Figure 5 is a picture of the SURF feature vector that has been briefly described in this step training.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3466 Figure 5: Describing a local part as a 128-dimensional SURF feature vector. 2) Recognition Step The next recognition step consists of two sub-steps, namely the feature-level and character-level recognition. 2.6 SLOPE AND SLANT CORRECTION METHOD Slope and slant correction in handwriting is used to reduce the style variation in writing. When writing variation is simple it will help the recognition process. Careful slope correction not only makes the segmentation process simpler but also the accuracy of the writing recognition itself.  Slope Correction Method In the proposed method, the slope of the word text can be estimated based on the slope of the baseline. Ascenders and descenders have no contribution to the initial formation, they are thrown out as much as possible and then the best straight line as expected from the remaining part of the word. The basic slope is found then the slope corrected by rotating the word about with the angle of the slope. The slope of the word is estimated from the slope of the baseline. First, select the core area of the word and then determine the best load line from the bottom area of the core. Then the selected part is divided into small pieces. To reduce as much as possible the effect of slope on a post, the skewed correction must be performed before segmentation, feature extraction, training, and classification stages. The initially slanted writing will become upright. Leverage is the value of deviation from the variable mean. Leverage is the average of Li. Here is the Equation of Li [8, 11]:  Slant Correction Method Directed textures can be detected and analyzed efficiently by using Gabor filters. This capability is attached to the Gabor filter because it can provide bank filters depending on the length variations as well as the angle parameters. The resemblance of the image can be improved. The slope is estimated and considered as the slope of the original image. Finally, using a sliding transform, the slope of the original image is corrected. 2.7 ZONING METHOD Zoning is a method that can be used for handwriting recognition. The pattern image is divided into several zones that provide regional information. The zoning method is quite successfully applied to handwriting recognition. There are two methods of zoning, static and dynamic. The following is an explanation of the Zoning method [9]: a) Static Zoning In this static zoning, zones are distributed evenly (uniformly), so that the zones of one and the other are the same. The more zones in an image then the accuracy of the image will be higher. Figure 6 is a description of the uniformity of zone divisions. Figure 6: Static Zoning b) Dynamic Zoning In dynamic zoning, the number of zones dividing from a large image is not the same. In figure 7 it shows the non- uniform zone division, the magnitude is different. Figure 7: Dynamic Zoning
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 3467 3. CONCLUSION Image recognition is an important process for the image processing. Image feature extraction has several constraints such as differences in image capture position and different lighting conditions when the image is taken. The image recognition in handwriting is more challenging because everyone has different handwriting forms, so that on the detection also handwriting will be more difficult to detect compared writings from computers that already have a definite standard form. There are seven methods discussed and which have the highest accuracy is the Method of Convolutional Neural Network (CNN). The method of the lowest accuracy is Slope and Slant Correction Method. ACKNOWLEDGEMENT We would like to express our gratitude towards our University, Dr A. P. J. Abdul Kalam Technical University for giving us a chance to explore various technologies under our final year Project in Engineering Courses this enables us to understand the depth and importance of subject. Also, we would like to thank our institution ABES Engineering College, Ghaziabad for their kind support and guidance in our work. We are thankful to Mrs. Pratibha Singh, our project coordinator for her unfailing support through this journey. Also, we extend our gratitude out Ms. Deepanshi our Project guide and Mr. Pankaj Sharma, Head and Professor, Computer Science and Engineering Department for their support and guidance. Finally, we must express our very profound gratitude to our parents for providing us with unfailing support and continuous encouragement throughout, this achievement would not have been possible without them. REFERENCES [1] Zhu. Xianwen and Jing fu. “Image recognition method based on artificial life and support vector machine”, Sixth International Conference on Intelligent Human-Machine Systems and Cybernetics, 2014. [2] Phan. Khanh Minh, Cuong Tuan Nguyen, Anh Due Le and Masaki Nakagawa. “An Incremental Recognition Method for Online Handwritten Mathematical Expression”, 3rd IAPR Asian Conference on Pattern Recognition, 2015. [3] Phan. Khanh Minh, Anh Le Due, and Masaki Nakagawa. "Semi-Incremental Recognition of Online Handwritten Mathematical Expressions", 15th International Conference on Frontiers in Handwriting Recognition, 2016. [4] Nguyen. Cuong Tuan, Bilan Zhu, and Masaki Nakagawa. "A semi-incremental recognition method for on-line handwritten Japanese text", 12th International Conference on Document Analysis and Recognition, 2013. [5] Nair. Pranav P, Ajay James, and C saravnan. "Malayalam Handwritten Character Recognition Using Convolutional Neural Network", International Conference on Inventive Communication and Computational Technologies (ICICC), 2017. [6] Tsai. Charlie. “Recognizing Handwritten Japanese Characters Using Deep Convolutional Neural Networks”, Department of Chemical Engineering Stanford University, 2015. [7] Song. Wang, Seiichi Uchida and Marcus Liwieki. “Comparative Study of Part-Based Handwritten Character Recognition Methods”, International Conference on Document Analysis and Recognition, 2015. [8] Gupta. Jija Das and Bhabatosh Chanda. “Novel Methods for Slope and Slant Correction of Off-line Handwritten Text Word”, International Conference on Emerging Applications of Information Technology (EAIT), 2012. [9] Impedovo. S, G. Pirlo, R. Modugno, and A Ferrante. “Zoning Methods for Hand-Written Character Recognition: An Overview”, 12th International Conference on Frontiers in Handwriting Recognition, 2010. [10] A. A. Ahmed Ali, M. Suresha and H. A. Mohsin Ahmed, "Different Handwritten Character Recognition Methods: A Review," 2019 Global Conference for Advancement in Technology (GCAT), BANGALURU, India, 2019, pp. 1-8. [11] Salma Shofia Rosyda and Tito Waluyo Purboyo, "A Review of Various Handwriting Recognition Methods", International Journal of Applied Engineering Research ISSN 0973-4562 Volume 13, Number 2(2018) pp.1155- 1164