SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 325
SCENE TEXT RECOGNITION IN MOBILE APPLICATIONS BY
CHARACTER DESCRIPTOR AND STRUCTURE CONFIGURATION
Sathish Kumar Penchala1
, Pallavi S.Umap2
1
Assistant Professor, Dept. of Computer Engineering, Dr. D.Y.Patil SOET., Lohegaon, Pune-47, Maharashtra, India
2
ME 2nd
year, Dept. of Computer Engineering, Dr.D.Y.Patil SOET., Lohegaon, Pune-47, Maharashtra India
Abstract
Camera-based scene images usually have complex background filled with non-text objects in multiple shapes and colors. The
existing system is sensitive to font scale changes and background interference. The main focusof this system is on two character
recognition methods. In text detection, previously proposed algorithms are used to search for regions of text strings. Proposed
system uses character descriptor which is effective to extract representative and discriminative text features for both recognition
schemes. The local features descriptor HOG is compatible with all above key point detectors. Our method of scene text
recognition from detected text regions is compatible with the application of mobile devices. Proposedsystem accurately extracts
text from natural scene image in presence of background interference.The demo system gives us details of algorithm design and
performance improvements of scene text extraction. It is ableto detect text region of text strings from cluttered and recognize
characters in the text regions.
Keywords: Scene text detection, scene text recognition, character descriptor, stroke configuration, text understanding,
text retrieval.
--------------------------------------------------------------------***-----------------------------------------------------------------
1. INTRODUCTION
Camera-based applications on mobile phones are increasing
rapidly. There can be valuable information in image.
However, extraction of text from scene image is problematic
due to factors such as variety of scale, orientation, font, style
of character and complex background with multiple colors.
Text Recognition in natural scene images is challenging
than recognizing text from scans of printed pages, faxes and
business cards. Modeling character structure is difficult due
to high variability of geometry and appearance of characters
natural image. To solve these problems text extraction is
divided in two activities[9]: text detection and text
recognition. Text detection localize region containing text
characters [4]. Text recognition distinguishes different
characters which are part of text word.
We have presented two schemes text recognition process
.First,a character recognizer to predict the category of a
character in an image patch. Second, binary classifier which
predicts existence of category. Two schemes of text
recognition are compatible with applications related to scene
text, which are text understanding and text retrieval. Text
understanding acquires text information from natural scene
to understand surrounding environment and objects, while
text retrieval matches some stated user query against a set of
free-text records.
First, we design a discriminative character descriptor by
combining several state-of-the-art feature detectors and
descriptors[6].We model character structure at each
character class by designing stroke configuration maps[5].
Our algorithm design is compatible with the application of
scene text extraction in smart mobile devices. An Android-
based demo system is developed to show the effectiveness
of our proposed method on scene text information extraction
from nearby objects.
2. RELATED WORK
In Scale Invariant Feature Transform (SIFT), feature
matching was adopted to recognize text characters in
different languages, and a voting and geometric verification
algorithm was presented to filter out false positive matches.
prior models of the appearance of each character, and prior
models of the likelihood of each character string. These
models can be learned using traditional vision techniques
and statistical language modeling techniques [2]. SIFT
reduces false positive rates by more than an order of
magnitude relative to the best Haar wavelet based detector .
Another source of information is found in the similarity and
dissimilarity between pairs of characters. Weinman and
Learned-Miller two characters which have nearly identical
appearance have different labels [8].Text recognition system
using above source of information have proved that two
characters which have nearly identical appearance have
different labels.
3. LAYOUT-BASED SCENE TEXT DETECTION
3.1Layout Analysis of Color Decomposition
Test strings on signage boards consist of characters in
uniform color and aligned arrangement. We can locate text
information by extracting pixels with similar colors. A
boundary clustering algorithm based on bigram color
uniformity in our previous work[3]
.Text boundaries on the
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 326
border of text and its attachment surface are described by
characteristic color-pairs, and we are able to extract text by
distinguishing boundaries of characters and strings from
those of background outliers based on color pairs. We then
model color difference by a vector of color pair, which is
obtained by cascading the RGB colors of text and
attachment surfaces. Each boundary can be described by a
color-pair, and we cluster the boundaries with similar color
pairs into the sample layer. The boundaries of text
characters are separated from those of background outliers.
3.2 Layout Analysis of Horizontal Alignment
In most scene images, text strings are usually composed of
characters with similar size and approximately horizontal
alignment. This method involves following steps. Here we
assume that length of signage and other text is enough to get
benefit from repeatability of words while decoding. Here
adjacent character grouping method is adopted from
previous work[4]
. For each connected component C we
search for its siblings in similar size and vertical locations.
When connected components C and C′ are grouped together
as sibling components, their sibling sets will be updated
according to their relative locations. When C is located on
the left of C′, C′ will be added into the right-sibling set of C,
which is simultaneously added into the left-sibling set of C′.
For connected component C, if several siblings are obtained
on its left and right, then we merge all these involved
siblings into a region. This region contains a fragment of
text string. To create sibling groups corresponding to
complete text strings, we repeat above method to calculate
all text string fragments in this color layer, and merge the
string fragments with intersections.
Table -1: Summary of the Previous Techniques
Title of Paper Author/
Authors
of
paper
Previous
Technique
Used
Scene text recognition
using similarity and
a lexicon
J. J. Weinman,
E. Learned-
Miller
Combined
Gabor-
based
appearance
model.
Real-time scene text
Localization And
recognition
L. Neumann ,
J. Matas
Based on
extremal region
Enforcing similarity
Constraintswith
integer
programming
D. L. Smith,
J. Feild,
Learned-
Miller
Based on SIFT
Document image
retrieval
ThroughWord shape
coding
S. Lu,
L. Li,
C. L.Tan
Model the inner
Character
structure
character recognition
in
scene images with
unsuper-
vised feature learning
A. Coates et
al.
extracted local
features of
character
patches
4. STRUCTURE-BASED SCENE TEXT
RECOGNITION
The text retrieval schemes to verify whether a piece of text
information exists in natural scene. In text retrieval, binary
classifier distinguishes character class from other classes or
background outliers. In text understanding character
recognition is a multi-class classification problem. For each
of the 62 character classes, we train a binary classifier to
distinguish a character class from the other classes or non-
text outliers. The specified character classes are defined as
queried characters. In text retrieval, to better model
character structure, we define stroke configuration for each
character class based on specific partitions of character
boundary and skeleton.
4.1 Character Descriptor
Four types of character descriptors are used to model
character structure .Harris detector to extract key points
from corners and junctions. MSER detector to extract key
points from stroke components. Dense detector extracts key
points uniformly. Random detector extracts present number
of key points in a random pattern. By cascading BOW and
GMM – based feature representations we get character
descriptor as shown in figure 1 below. In GMM model the
numbers and locations of key points from each patch should
be identical. Therefore, it is only applied to the key points
from DD and RD.
Four feature detectors are able to cover almost all
representative key points related to the character structure.
At each of the extracted key points, the HOG(Histogram of
Oriented Gradients) feature is calculated as an observed
feature vector x in feature space. Each character patch is
normalized into size 128 × 128, containing a complete
character. In the process of feature quantization, the Bag-of-
Words Model and Gaussian Mixture Model are employed to
aggregate the extracted features. BOW model represent the
frequency of word occurrence, but not their position. SIFT
and SURE are not employed in our method because their
performance on character recognition is low. Every
character patch is normalized into size 128 × 128 containing
complete character. In both models, character patch is
mapped into characteristic histogram as feature
representation.
4.1.1 BOW Model
BOW model is applied to key points from all four feature
detectors. This model is computationally efficient and
resistant to intra-class variations. First, k-means clustering is
performed on HOG features extracted from training patches.
Then feature coding and pooling are performed to map all
HOG features from a character patch into a histogram of
visual words. We adopt soft-assignment coding and average
pooling schemes in the experiments.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 327
4.1.2 Gaussian Mixture Model
The s-th(1 ≤ s≤K)center is used as initial means μs of the s-
th Gaussian in GMM. Then the initial weights ws and co-
variances σsare calculated from the means. Next, an EM
algorithm is used to obtain maximum likelihood estimate of
the three parameters, weights, means, and co-variances of all
the Gaussian mixture distributions. A likelihood vector from
all Gaussians is represented by Eq. (1).
μ σ
μ σ
σ σ
Where x denotes a HOG-based feature vector at a key point,
Pxdenotes the likelihood vector of feature vector x, and
ps(x|μs,σs) denotes the probability value of x at the s-th
Gaussian. For likelihood Vectors (Px,Py), where
GMM- based feature representation by histogram of binary
comparisons, as Eq. (2).
P(s)
= 1 ; if wsps(x|μs,σs) ≥ if wsps(y|μs,σs) , and
P(s)
= 0 ; if wsps(y|μs,σs) > if wsps(x|μs,σs)
4.2 Character Stroke Configuration
In previously proposed method [7] stroke width consistency
is used to detect scene text in complex background and
achieve outstanding performance. Stroke is region bounded
by two parallel boundary segments. Their orientation is
regarded as stroke orientation and the distance between
them is regarded as stroke width.The stroke configuration is
estimated by synthesized characters generated from
computer software. Character boundary and character
skeleton are obtained by applying discrete contour evolution
(DCE) [10]
and skeleton pruning on the basis of DCE [11]
. The
accuracy of the skeleton position and stability of skeletons is
guaranteed in this pruning method.DCE and skeleton
pruning are invariant to deformation and scaling.
We estimate the stroke width and orientation on sample
points of character boundary. N points are sampled evenly
from the polygon character boundary, with the polygon
vertices reserved. In our experiment, we set N = 128. The
number of points to be sampled on each side of the polygon
boundary is proportional to its length. Secondly, stroke is
contiguous part of an image that forms a band of a
nearlyconstant width. We take b and its two neighboring
sample points to fit a line when they are approximately
collinear or else a quadratic curve. Then the slope or tangent
direction at b is used as stroke orientation as shown in figure
2 below. Characters are connected strokes with orientation.
Thirdly, we calculate the skeleton-based stroke maps.
At each boundary sample point, values of stroke width and
orientation are compared with its neighboring points.
Constituency of stroke width and orientation consistency 3
and π/8 respectively. Construct stroke section if sample
points satisfy stroke related features. If not construct
junction. These parameters are compatible with the
synthesized character patches with size 128 × 128. While
the other sample points, around the intersections of
neighboring strokes or the ends of strokes, compose junction
sections of a character boundary.
4.2.1 Stroke Alignment Method
The basic structure of a character class can be described by
the mean value of all stroke configurations from character
samples of the class. Here, we estimate a mean value of
stroke configuration so that it is able to handle various fonts,
styles and sizes. Eq. (3) gives an objective function of stroke
alignment.
(3)
D=distance b/w stroke configuration of samples.
A=mean value of stroke configurations
Ti = Transformations applied on strokes of i-th stroke
configuration.
g(Ti)=Amplitude of transformation.
Fig -2: Stroke Orientations and stroke width denoted by red
line and red double arrows resp.,bnis approximately collinear
,while bm fits a quadratic curve with neighboring point
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 328
Fig -2: Flowchart of our proposed character descriptor
5. RESULTS AND DISCUSSIONS
Table -2: Accuracy rates of scene character recognition
inicdar-2003 dataset, compared with previously published
results
ICDAR – 2003 Dataset AR
Ours
HOG+NN
SYNTH+FERNS
NATIVE+FERNS
0.628
0.515
0.520
0.640
Table -2: Accuracy Rates (AR) and False Positive Rates
(FPR) of queried character classificationin the three datasets
Dataset AR FPR
Chars74K 0.726 0.078
Sign 0.868 0.075
ICDAR-2003 0.536 0.180
6. COMPARISON OF RESULTS
The experimental results in first Table show that our
proposed descriptor outperforms the SYNTH+FERNS with
AR 0.52 and comparable with NATIVE+FERNS having AR
of 0.64.A character classifier is trained for each character
class by using Chars74K samples, which is then evaluated
over the three datasets to obtain the results. As shown in
second table a character classifier is trained for each
character class by using Chars74K samples, which is then
evaluated over the three datasets to obtain the results.
7. CONCLUSION
It detects text regions from natural scene image/video, and
recognizes text information from the detected text regions.
Text understanding and text retrieval are respectively
proposed to extract text information from surrounding
environment. Character descriptor is effective to extract
representative and discriminative text features for both
recognition schemes. To model text character structure for
text retrieval scheme, we have designed a novel feature
representation, stroke configuration map, based on boundary
and skeleton. Quantitative experimental results demonstrate
that proposed method of scene text recognition outperforms
most existing methods.
REFERENCES
[1]. Chucai Yi, “Scene Text Recognition in Mobile
Applications by Character Descriptor and Structure
Configuration,”IEEE Trans. Image Process., vol. 23, no. 7,
July 2014, pp.2972 - 2982.
[2]. D. L. Smith, J. Feild, and E. Learned-Miller, “Enforcing
similarity constraints with integer programming for better
scene text recognition,” in Proc. IEEE Conf. Comput. Vis.
Pattern Recognit., Jun. 2011,pp. 73–80.
[3]. C. Yi and Y. Tian, “Localizing text in scene images by
boundary clustering, stroke segmentation, and string
fragment classification,” IEEE Trans. Image Process., vol.
21, no. 9, pp. 4256–4268, Sep. 2012.
[4]. C. Yi and Y. Tian, “Text string detection from natural
scenes by structure-based partition and grouping,” IEEE
Trans. Image Process., vol. 20, no. 9, pp. 2594–2605, Sep.
2011.
[5]. N. and B. Triggs, “Histograms of oriented gradients for
human detection,” in Proc. IEEEConf. Comput. Vis. Pattern
Recognit., Jun. 2005, pp. 886–893.
[6]. P. Viola and M. J. Jones, “Robust real-time face
detection,” Int. J.Comput. Vis., vol. 57, no. 2, pp. 137–154,
2004.
[7]. B. Epshtein, E. Ofek, and Y. Wexler, “Detecting text in
natural scenes with stroke width transform,” in Proc. CVPR,
Jun. 2010, pp. 2963–2970.
[8]. J. J. Weinman, E. Learned-Miller, and A. R. Hanson,
“Scene text recognition using similarity and a lexicon with
sparse belief propagation,”IEEETrans. Pattern Anal. Mach.
Intell., vol. 31, no. 10, pp. 1733–1746, Oct. 2009.
[9]. J. Zhang and R. Kasturi, “Extraction of text objects in
video documents: Recent progress,” in Proc. 8th IAPR Int.
Workshop DAS, Sep. 2008, pp. 5–17.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 329
[10]. L. J. Latecki and R. Lakamper, “Convexity rule for
shape decomposition based on discrete contour evolution,”
Comput.Vis. Image Understand., vol. 73, no. 3, pp. 441–
454, 1999.
[11]. X. Bai, L. J. Latecki, and W.-Y. Liu, “Skeleton
pruning by contourpartitioning with discrete curve
evolution,” IEEE Trans. Pattern Anal.Mach. Intell., vol. 29,
no. 3, pp. 449–462, Mar. 2007.
BIOGRAPHIES
Sathish Kumar Penchala, Assistant Professor in Computer
Engineering at Dr. D.Y.Patil SOET, Lohegaon, Pune-47.
Pallavi S. Umap, is a Final year Post
Graduate student,pursuing her degree
Master of Engineering degree in
ComputerNetworks at Dr. D.Y.Patil
SOET., Lohegaon, Pune-47.

More Related Content

What's hot

TEXT PLAGIARISM CHECKER USING FRIENDSHIP GRAPHS
TEXT PLAGIARISM CHECKER USING FRIENDSHIP GRAPHSTEXT PLAGIARISM CHECKER USING FRIENDSHIP GRAPHS
TEXT PLAGIARISM CHECKER USING FRIENDSHIP GRAPHS
ijcsit
 
Mixed Language Based Offline Handwritten Character Recognition Using First St...
Mixed Language Based Offline Handwritten Character Recognition Using First St...Mixed Language Based Offline Handwritten Character Recognition Using First St...
Mixed Language Based Offline Handwritten Character Recognition Using First St...
CSCJournals
 
Texture features based text extraction from images using DWT and K-means clus...
Texture features based text extraction from images using DWT and K-means clus...Texture features based text extraction from images using DWT and K-means clus...
Texture features based text extraction from images using DWT and K-means clus...
Divya Gera
 
L1803058388
L1803058388L1803058388
L1803058388
IOSR Journals
 
A simple text ine segmentation method for handwritten documents1
A simple text ine segmentation method for handwritten documents1A simple text ine segmentation method for handwritten documents1
A simple text ine segmentation method for handwritten documents1
Prasad Babu
 
ONLINE BANGLA HANDWRITTEN COMPOUND WORD RECOGNITION BASED ON SEGMENTATION
ONLINE BANGLA HANDWRITTEN COMPOUND WORD RECOGNITION BASED ON SEGMENTATIONONLINE BANGLA HANDWRITTEN COMPOUND WORD RECOGNITION BASED ON SEGMENTATION
ONLINE BANGLA HANDWRITTEN COMPOUND WORD RECOGNITION BASED ON SEGMENTATION
cscpconf
 
Text Detection and Recognition: A Review
Text Detection and Recognition: A ReviewText Detection and Recognition: A Review
Text Detection and Recognition: A Review
IRJET Journal
 
AUTOMATIC TRAINING DATA SYNTHESIS FOR HANDWRITING RECOGNITION USING THE STRUC...
AUTOMATIC TRAINING DATA SYNTHESIS FOR HANDWRITING RECOGNITION USING THE STRUC...AUTOMATIC TRAINING DATA SYNTHESIS FOR HANDWRITING RECOGNITION USING THE STRUC...
AUTOMATIC TRAINING DATA SYNTHESIS FOR HANDWRITING RECOGNITION USING THE STRUC...
ijaia
 
A COMPARATIVE STUDY OF ROOT-BASED AND STEM-BASED APPROACHES FOR MEASURING THE...
A COMPARATIVE STUDY OF ROOT-BASED AND STEM-BASED APPROACHES FOR MEASURING THE...A COMPARATIVE STUDY OF ROOT-BASED AND STEM-BASED APPROACHES FOR MEASURING THE...
A COMPARATIVE STUDY OF ROOT-BASED AND STEM-BASED APPROACHES FOR MEASURING THE...
acijjournal
 
DEVNAGARI DOCUMENT SEGMENTATION USING HISTOGRAM APPROACH
DEVNAGARI DOCUMENT SEGMENTATION USING HISTOGRAM APPROACHDEVNAGARI DOCUMENT SEGMENTATION USING HISTOGRAM APPROACH
DEVNAGARI DOCUMENT SEGMENTATION USING HISTOGRAM APPROACH
ijcseit
 
DETERMINING CUSTOMER SATISFACTION IN-ECOMMERCE
DETERMINING CUSTOMER SATISFACTION IN-ECOMMERCEDETERMINING CUSTOMER SATISFACTION IN-ECOMMERCE
DETERMINING CUSTOMER SATISFACTION IN-ECOMMERCE
AbdurrahimDerric
 
AUTOMATIC FACE NAMING BY LEARNING DISCRIMINATIVE AFFINITY MATRICES FROM WEAKL...
AUTOMATIC FACE NAMING BY LEARNING DISCRIMINATIVE AFFINITY MATRICES FROM WEAKL...AUTOMATIC FACE NAMING BY LEARNING DISCRIMINATIVE AFFINITY MATRICES FROM WEAKL...
AUTOMATIC FACE NAMING BY LEARNING DISCRIMINATIVE AFFINITY MATRICES FROM WEAKL...
Nexgen Technology
 
Anatomical Survey Based Feature Vector for Text Pattern Detection
Anatomical Survey Based Feature Vector for Text Pattern DetectionAnatomical Survey Based Feature Vector for Text Pattern Detection
Anatomical Survey Based Feature Vector for Text Pattern Detection
IJEACS
 
Automatic face naming by learning discriminative affinity matrices from weakl...
Automatic face naming by learning discriminative affinity matrices from weakl...Automatic face naming by learning discriminative affinity matrices from weakl...
Automatic face naming by learning discriminative affinity matrices from weakl...
Raja Ram
 
Automatic face naming by learning discriminative affinity matrices from weakl...
Automatic face naming by learning discriminative affinity matrices from weakl...Automatic face naming by learning discriminative affinity matrices from weakl...
Automatic face naming by learning discriminative affinity matrices from weakl...
Shakas Technologies
 
Automatic face naming by learning discriminative
Automatic face naming by learning discriminativeAutomatic face naming by learning discriminative
Automatic face naming by learning discriminative
jpstudcorner
 
A case study in computer
A case study in computerA case study in computer
A case study in computer
csandit
 
IRJET- Short-Text Semantic Similarity using Glove Word Embedding
IRJET- Short-Text Semantic Similarity using Glove Word EmbeddingIRJET- Short-Text Semantic Similarity using Glove Word Embedding
IRJET- Short-Text Semantic Similarity using Glove Word Embedding
IRJET Journal
 
Online Hand Written Character Recognition
Online Hand Written Character RecognitionOnline Hand Written Character Recognition
Online Hand Written Character Recognition
IOSR Journals
 
Text independent speaker identification system using average pitch and forman...
Text independent speaker identification system using average pitch and forman...Text independent speaker identification system using average pitch and forman...
Text independent speaker identification system using average pitch and forman...
ijitjournal
 

What's hot (20)

TEXT PLAGIARISM CHECKER USING FRIENDSHIP GRAPHS
TEXT PLAGIARISM CHECKER USING FRIENDSHIP GRAPHSTEXT PLAGIARISM CHECKER USING FRIENDSHIP GRAPHS
TEXT PLAGIARISM CHECKER USING FRIENDSHIP GRAPHS
 
Mixed Language Based Offline Handwritten Character Recognition Using First St...
Mixed Language Based Offline Handwritten Character Recognition Using First St...Mixed Language Based Offline Handwritten Character Recognition Using First St...
Mixed Language Based Offline Handwritten Character Recognition Using First St...
 
Texture features based text extraction from images using DWT and K-means clus...
Texture features based text extraction from images using DWT and K-means clus...Texture features based text extraction from images using DWT and K-means clus...
Texture features based text extraction from images using DWT and K-means clus...
 
L1803058388
L1803058388L1803058388
L1803058388
 
A simple text ine segmentation method for handwritten documents1
A simple text ine segmentation method for handwritten documents1A simple text ine segmentation method for handwritten documents1
A simple text ine segmentation method for handwritten documents1
 
ONLINE BANGLA HANDWRITTEN COMPOUND WORD RECOGNITION BASED ON SEGMENTATION
ONLINE BANGLA HANDWRITTEN COMPOUND WORD RECOGNITION BASED ON SEGMENTATIONONLINE BANGLA HANDWRITTEN COMPOUND WORD RECOGNITION BASED ON SEGMENTATION
ONLINE BANGLA HANDWRITTEN COMPOUND WORD RECOGNITION BASED ON SEGMENTATION
 
Text Detection and Recognition: A Review
Text Detection and Recognition: A ReviewText Detection and Recognition: A Review
Text Detection and Recognition: A Review
 
AUTOMATIC TRAINING DATA SYNTHESIS FOR HANDWRITING RECOGNITION USING THE STRUC...
AUTOMATIC TRAINING DATA SYNTHESIS FOR HANDWRITING RECOGNITION USING THE STRUC...AUTOMATIC TRAINING DATA SYNTHESIS FOR HANDWRITING RECOGNITION USING THE STRUC...
AUTOMATIC TRAINING DATA SYNTHESIS FOR HANDWRITING RECOGNITION USING THE STRUC...
 
A COMPARATIVE STUDY OF ROOT-BASED AND STEM-BASED APPROACHES FOR MEASURING THE...
A COMPARATIVE STUDY OF ROOT-BASED AND STEM-BASED APPROACHES FOR MEASURING THE...A COMPARATIVE STUDY OF ROOT-BASED AND STEM-BASED APPROACHES FOR MEASURING THE...
A COMPARATIVE STUDY OF ROOT-BASED AND STEM-BASED APPROACHES FOR MEASURING THE...
 
DEVNAGARI DOCUMENT SEGMENTATION USING HISTOGRAM APPROACH
DEVNAGARI DOCUMENT SEGMENTATION USING HISTOGRAM APPROACHDEVNAGARI DOCUMENT SEGMENTATION USING HISTOGRAM APPROACH
DEVNAGARI DOCUMENT SEGMENTATION USING HISTOGRAM APPROACH
 
DETERMINING CUSTOMER SATISFACTION IN-ECOMMERCE
DETERMINING CUSTOMER SATISFACTION IN-ECOMMERCEDETERMINING CUSTOMER SATISFACTION IN-ECOMMERCE
DETERMINING CUSTOMER SATISFACTION IN-ECOMMERCE
 
AUTOMATIC FACE NAMING BY LEARNING DISCRIMINATIVE AFFINITY MATRICES FROM WEAKL...
AUTOMATIC FACE NAMING BY LEARNING DISCRIMINATIVE AFFINITY MATRICES FROM WEAKL...AUTOMATIC FACE NAMING BY LEARNING DISCRIMINATIVE AFFINITY MATRICES FROM WEAKL...
AUTOMATIC FACE NAMING BY LEARNING DISCRIMINATIVE AFFINITY MATRICES FROM WEAKL...
 
Anatomical Survey Based Feature Vector for Text Pattern Detection
Anatomical Survey Based Feature Vector for Text Pattern DetectionAnatomical Survey Based Feature Vector for Text Pattern Detection
Anatomical Survey Based Feature Vector for Text Pattern Detection
 
Automatic face naming by learning discriminative affinity matrices from weakl...
Automatic face naming by learning discriminative affinity matrices from weakl...Automatic face naming by learning discriminative affinity matrices from weakl...
Automatic face naming by learning discriminative affinity matrices from weakl...
 
Automatic face naming by learning discriminative affinity matrices from weakl...
Automatic face naming by learning discriminative affinity matrices from weakl...Automatic face naming by learning discriminative affinity matrices from weakl...
Automatic face naming by learning discriminative affinity matrices from weakl...
 
Automatic face naming by learning discriminative
Automatic face naming by learning discriminativeAutomatic face naming by learning discriminative
Automatic face naming by learning discriminative
 
A case study in computer
A case study in computerA case study in computer
A case study in computer
 
IRJET- Short-Text Semantic Similarity using Glove Word Embedding
IRJET- Short-Text Semantic Similarity using Glove Word EmbeddingIRJET- Short-Text Semantic Similarity using Glove Word Embedding
IRJET- Short-Text Semantic Similarity using Glove Word Embedding
 
Online Hand Written Character Recognition
Online Hand Written Character RecognitionOnline Hand Written Character Recognition
Online Hand Written Character Recognition
 
Text independent speaker identification system using average pitch and forman...
Text independent speaker identification system using average pitch and forman...Text independent speaker identification system using average pitch and forman...
Text independent speaker identification system using average pitch and forman...
 

Viewers also liked

Measurement and model validation of specific heat of xanthan gum using joules...
Measurement and model validation of specific heat of xanthan gum using joules...Measurement and model validation of specific heat of xanthan gum using joules...
Measurement and model validation of specific heat of xanthan gum using joules...
eSAT Journals
 
Effects of filtering on ber performance of an ofdm system
Effects of filtering on ber performance of an ofdm systemEffects of filtering on ber performance of an ofdm system
Effects of filtering on ber performance of an ofdm system
eSAT Journals
 
Trust management in p2 p systems
Trust management in p2 p systemsTrust management in p2 p systems
Trust management in p2 p systems
eSAT Journals
 
Computational model to design circular runner conduit for plastic injection m...
Computational model to design circular runner conduit for plastic injection m...Computational model to design circular runner conduit for plastic injection m...
Computational model to design circular runner conduit for plastic injection m...
eSAT Journals
 
Enhancement of power quality in a
Enhancement of power quality in a Enhancement of power quality in a
Enhancement of power quality in a
eSAT Journals
 
Wireless lan intrusion detection by using statistical timing approach
Wireless lan intrusion detection by using statistical timing approachWireless lan intrusion detection by using statistical timing approach
Wireless lan intrusion detection by using statistical timing approach
eSAT Journals
 
Evaluation on different approaches of cyclic association rules
Evaluation on different approaches of cyclic association rulesEvaluation on different approaches of cyclic association rules
Evaluation on different approaches of cyclic association rules
eSAT Journals
 
Bounds on inverse domination in squares of graphs
Bounds on inverse domination in squares of graphsBounds on inverse domination in squares of graphs
Bounds on inverse domination in squares of graphs
eSAT Journals
 
Design and analysis of different digital communication systems and determinat...
Design and analysis of different digital communication systems and determinat...Design and analysis of different digital communication systems and determinat...
Design and analysis of different digital communication systems and determinat...
eSAT Journals
 
An efficient approach to query reformulation in web search
An efficient approach to query reformulation in web searchAn efficient approach to query reformulation in web search
An efficient approach to query reformulation in web search
eSAT Journals
 
Causes of delay in indian transportation infrastructure projects
Causes of delay in indian transportation infrastructure projectsCauses of delay in indian transportation infrastructure projects
Causes of delay in indian transportation infrastructure projects
eSAT Journals
 
A low cost short range wireless embedded system for multiple parameter control
A low cost short range wireless embedded system for multiple parameter controlA low cost short range wireless embedded system for multiple parameter control
A low cost short range wireless embedded system for multiple parameter control
eSAT Journals
 
Position characterization of electro pneumatic closed loop control valve
Position characterization of electro pneumatic closed loop control valvePosition characterization of electro pneumatic closed loop control valve
Position characterization of electro pneumatic closed loop control valve
eSAT Journals
 
Study and comparison of emission characteristics of n butanol diesel blend i...
Study and comparison of emission characteristics of n butanol  diesel blend i...Study and comparison of emission characteristics of n butanol  diesel blend i...
Study and comparison of emission characteristics of n butanol diesel blend i...
eSAT Journals
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
eSAT Journals
 
The measurement model for outsourcing worker performance by middle and big cl...
The measurement model for outsourcing worker performance by middle and big cl...The measurement model for outsourcing worker performance by middle and big cl...
The measurement model for outsourcing worker performance by middle and big cl...
eSAT Journals
 
Selection of optimal air pollution control strategies
Selection of optimal air pollution control strategiesSelection of optimal air pollution control strategies
Selection of optimal air pollution control strategies
eSAT Journals
 
Performance analysis of new proposed window for the improvement of snr & ...
Performance analysis of new proposed window for the improvement of snr & ...Performance analysis of new proposed window for the improvement of snr & ...
Performance analysis of new proposed window for the improvement of snr & ...
eSAT Journals
 
Co axial fed microstrip rectangular patch antenna design for bluetooth applic...
Co axial fed microstrip rectangular patch antenna design for bluetooth applic...Co axial fed microstrip rectangular patch antenna design for bluetooth applic...
Co axial fed microstrip rectangular patch antenna design for bluetooth applic...
eSAT Journals
 

Viewers also liked (19)

Measurement and model validation of specific heat of xanthan gum using joules...
Measurement and model validation of specific heat of xanthan gum using joules...Measurement and model validation of specific heat of xanthan gum using joules...
Measurement and model validation of specific heat of xanthan gum using joules...
 
Effects of filtering on ber performance of an ofdm system
Effects of filtering on ber performance of an ofdm systemEffects of filtering on ber performance of an ofdm system
Effects of filtering on ber performance of an ofdm system
 
Trust management in p2 p systems
Trust management in p2 p systemsTrust management in p2 p systems
Trust management in p2 p systems
 
Computational model to design circular runner conduit for plastic injection m...
Computational model to design circular runner conduit for plastic injection m...Computational model to design circular runner conduit for plastic injection m...
Computational model to design circular runner conduit for plastic injection m...
 
Enhancement of power quality in a
Enhancement of power quality in a Enhancement of power quality in a
Enhancement of power quality in a
 
Wireless lan intrusion detection by using statistical timing approach
Wireless lan intrusion detection by using statistical timing approachWireless lan intrusion detection by using statistical timing approach
Wireless lan intrusion detection by using statistical timing approach
 
Evaluation on different approaches of cyclic association rules
Evaluation on different approaches of cyclic association rulesEvaluation on different approaches of cyclic association rules
Evaluation on different approaches of cyclic association rules
 
Bounds on inverse domination in squares of graphs
Bounds on inverse domination in squares of graphsBounds on inverse domination in squares of graphs
Bounds on inverse domination in squares of graphs
 
Design and analysis of different digital communication systems and determinat...
Design and analysis of different digital communication systems and determinat...Design and analysis of different digital communication systems and determinat...
Design and analysis of different digital communication systems and determinat...
 
An efficient approach to query reformulation in web search
An efficient approach to query reformulation in web searchAn efficient approach to query reformulation in web search
An efficient approach to query reformulation in web search
 
Causes of delay in indian transportation infrastructure projects
Causes of delay in indian transportation infrastructure projectsCauses of delay in indian transportation infrastructure projects
Causes of delay in indian transportation infrastructure projects
 
A low cost short range wireless embedded system for multiple parameter control
A low cost short range wireless embedded system for multiple parameter controlA low cost short range wireless embedded system for multiple parameter control
A low cost short range wireless embedded system for multiple parameter control
 
Position characterization of electro pneumatic closed loop control valve
Position characterization of electro pneumatic closed loop control valvePosition characterization of electro pneumatic closed loop control valve
Position characterization of electro pneumatic closed loop control valve
 
Study and comparison of emission characteristics of n butanol diesel blend i...
Study and comparison of emission characteristics of n butanol  diesel blend i...Study and comparison of emission characteristics of n butanol  diesel blend i...
Study and comparison of emission characteristics of n butanol diesel blend i...
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
 
The measurement model for outsourcing worker performance by middle and big cl...
The measurement model for outsourcing worker performance by middle and big cl...The measurement model for outsourcing worker performance by middle and big cl...
The measurement model for outsourcing worker performance by middle and big cl...
 
Selection of optimal air pollution control strategies
Selection of optimal air pollution control strategiesSelection of optimal air pollution control strategies
Selection of optimal air pollution control strategies
 
Performance analysis of new proposed window for the improvement of snr & ...
Performance analysis of new proposed window for the improvement of snr & ...Performance analysis of new proposed window for the improvement of snr & ...
Performance analysis of new proposed window for the improvement of snr & ...
 
Co axial fed microstrip rectangular patch antenna design for bluetooth applic...
Co axial fed microstrip rectangular patch antenna design for bluetooth applic...Co axial fed microstrip rectangular patch antenna design for bluetooth applic...
Co axial fed microstrip rectangular patch antenna design for bluetooth applic...
 

Similar to Scene text recognition in mobile applications by character descriptor and structure configuration

Text detection and recognition from natural scenes
Text detection and recognition from natural scenesText detection and recognition from natural scenes
Text detection and recognition from natural scenes
hemanthmcqueen
 
Text Extraction System by Eliminating Non-Text Regions
Text Extraction System by Eliminating Non-Text RegionsText Extraction System by Eliminating Non-Text Regions
Text Extraction System by Eliminating Non-Text Regions
IJCSIS Research Publications
 
C04741319
C04741319C04741319
C04741319
IOSR-JEN
 
ROBUST TEXT DETECTION AND EXTRACTION IN NATURAL SCENE IMAGES USING CONDITIONA...
ROBUST TEXT DETECTION AND EXTRACTION IN NATURAL SCENE IMAGES USING CONDITIONA...ROBUST TEXT DETECTION AND EXTRACTION IN NATURAL SCENE IMAGES USING CONDITIONA...
ROBUST TEXT DETECTION AND EXTRACTION IN NATURAL SCENE IMAGES USING CONDITIONA...
ijiert bestjournal
 
Text Extraction of Colour Images using Mathematical Morphology & HAAR Transform
Text Extraction of Colour Images using Mathematical Morphology & HAAR TransformText Extraction of Colour Images using Mathematical Morphology & HAAR Transform
Text Extraction of Colour Images using Mathematical Morphology & HAAR Transform
IOSR Journals
 
Dimensionality Reduction and Feature Selection Methods for Script Identificat...
Dimensionality Reduction and Feature Selection Methods for Script Identificat...Dimensionality Reduction and Feature Selection Methods for Script Identificat...
Dimensionality Reduction and Feature Selection Methods for Script Identificat...
ITIIIndustries
 
Isolated Kannada Character Recognition using Chain Code Features
Isolated Kannada Character Recognition using Chain Code FeaturesIsolated Kannada Character Recognition using Chain Code Features
Isolated Kannada Character Recognition using Chain Code Features
International Journal of Science and Research (IJSR)
 
Dominating set based arbitrary oriented bilingual scene text localization
Dominating set based arbitrary oriented bilingual scene text  localizationDominating set based arbitrary oriented bilingual scene text  localization
Dominating set based arbitrary oriented bilingual scene text localization
IJECEIAES
 
Design and implementation of optical character recognition using template mat...
Design and implementation of optical character recognition using template mat...Design and implementation of optical character recognition using template mat...
Design and implementation of optical character recognition using template mat...
eSAT Journals
 
50120130406021
5012013040602150120130406021
50120130406021
IAEME Publication
 
IRJET- Devnagari Text Detection
IRJET- Devnagari Text DetectionIRJET- Devnagari Text Detection
IRJET- Devnagari Text Detection
IRJET Journal
 
Customized mask region based convolutional neural networks for un-uniformed ...
Customized mask region based convolutional neural networks  for un-uniformed ...Customized mask region based convolutional neural networks  for un-uniformed ...
Customized mask region based convolutional neural networks for un-uniformed ...
IJECEIAES
 
SCENE TEXT RECOGNITION IN MOBILE APPLICATION BY CHARACTER DESCRIPTOR AND STRU...
SCENE TEXT RECOGNITION IN MOBILE APPLICATION BY CHARACTER DESCRIPTOR AND STRU...SCENE TEXT RECOGNITION IN MOBILE APPLICATION BY CHARACTER DESCRIPTOR AND STRU...
SCENE TEXT RECOGNITION IN MOBILE APPLICATION BY CHARACTER DESCRIPTOR AND STRU...
Cheriyan K M
 
Optical Character Recognition from Text Image
Optical Character Recognition from Text ImageOptical Character Recognition from Text Image
Optical Character Recognition from Text Image
Editor IJCATR
 
Cc31331335
Cc31331335Cc31331335
Cc31331335
IJMER
 
K2 Algorithm-based Text Detection with An Adaptive Classifier Threshold
K2 Algorithm-based Text Detection with An Adaptive Classifier ThresholdK2 Algorithm-based Text Detection with An Adaptive Classifier Threshold
K2 Algorithm-based Text Detection with An Adaptive Classifier Threshold
CSCJournals
 
40120140501009
4012014050100940120140501009
40120140501009
IAEME Publication
 
Degraded character recognition from old Kannada documents
Degraded character recognition from old Kannada documentsDegraded character recognition from old Kannada documents
Degraded character recognition from old Kannada documents
IJECEIAES
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
A SURVEY ON SIMILARITY MEASURES IN TEXT MINING
A SURVEY ON SIMILARITY MEASURES IN TEXT MINING A SURVEY ON SIMILARITY MEASURES IN TEXT MINING
A SURVEY ON SIMILARITY MEASURES IN TEXT MINING
mlaij
 

Similar to Scene text recognition in mobile applications by character descriptor and structure configuration (20)

Text detection and recognition from natural scenes
Text detection and recognition from natural scenesText detection and recognition from natural scenes
Text detection and recognition from natural scenes
 
Text Extraction System by Eliminating Non-Text Regions
Text Extraction System by Eliminating Non-Text RegionsText Extraction System by Eliminating Non-Text Regions
Text Extraction System by Eliminating Non-Text Regions
 
C04741319
C04741319C04741319
C04741319
 
ROBUST TEXT DETECTION AND EXTRACTION IN NATURAL SCENE IMAGES USING CONDITIONA...
ROBUST TEXT DETECTION AND EXTRACTION IN NATURAL SCENE IMAGES USING CONDITIONA...ROBUST TEXT DETECTION AND EXTRACTION IN NATURAL SCENE IMAGES USING CONDITIONA...
ROBUST TEXT DETECTION AND EXTRACTION IN NATURAL SCENE IMAGES USING CONDITIONA...
 
Text Extraction of Colour Images using Mathematical Morphology & HAAR Transform
Text Extraction of Colour Images using Mathematical Morphology & HAAR TransformText Extraction of Colour Images using Mathematical Morphology & HAAR Transform
Text Extraction of Colour Images using Mathematical Morphology & HAAR Transform
 
Dimensionality Reduction and Feature Selection Methods for Script Identificat...
Dimensionality Reduction and Feature Selection Methods for Script Identificat...Dimensionality Reduction and Feature Selection Methods for Script Identificat...
Dimensionality Reduction and Feature Selection Methods for Script Identificat...
 
Isolated Kannada Character Recognition using Chain Code Features
Isolated Kannada Character Recognition using Chain Code FeaturesIsolated Kannada Character Recognition using Chain Code Features
Isolated Kannada Character Recognition using Chain Code Features
 
Dominating set based arbitrary oriented bilingual scene text localization
Dominating set based arbitrary oriented bilingual scene text  localizationDominating set based arbitrary oriented bilingual scene text  localization
Dominating set based arbitrary oriented bilingual scene text localization
 
Design and implementation of optical character recognition using template mat...
Design and implementation of optical character recognition using template mat...Design and implementation of optical character recognition using template mat...
Design and implementation of optical character recognition using template mat...
 
50120130406021
5012013040602150120130406021
50120130406021
 
IRJET- Devnagari Text Detection
IRJET- Devnagari Text DetectionIRJET- Devnagari Text Detection
IRJET- Devnagari Text Detection
 
Customized mask region based convolutional neural networks for un-uniformed ...
Customized mask region based convolutional neural networks  for un-uniformed ...Customized mask region based convolutional neural networks  for un-uniformed ...
Customized mask region based convolutional neural networks for un-uniformed ...
 
SCENE TEXT RECOGNITION IN MOBILE APPLICATION BY CHARACTER DESCRIPTOR AND STRU...
SCENE TEXT RECOGNITION IN MOBILE APPLICATION BY CHARACTER DESCRIPTOR AND STRU...SCENE TEXT RECOGNITION IN MOBILE APPLICATION BY CHARACTER DESCRIPTOR AND STRU...
SCENE TEXT RECOGNITION IN MOBILE APPLICATION BY CHARACTER DESCRIPTOR AND STRU...
 
Optical Character Recognition from Text Image
Optical Character Recognition from Text ImageOptical Character Recognition from Text Image
Optical Character Recognition from Text Image
 
Cc31331335
Cc31331335Cc31331335
Cc31331335
 
K2 Algorithm-based Text Detection with An Adaptive Classifier Threshold
K2 Algorithm-based Text Detection with An Adaptive Classifier ThresholdK2 Algorithm-based Text Detection with An Adaptive Classifier Threshold
K2 Algorithm-based Text Detection with An Adaptive Classifier Threshold
 
40120140501009
4012014050100940120140501009
40120140501009
 
Degraded character recognition from old Kannada documents
Degraded character recognition from old Kannada documentsDegraded character recognition from old Kannada documents
Degraded character recognition from old Kannada documents
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
A SURVEY ON SIMILARITY MEASURES IN TEXT MINING
A SURVEY ON SIMILARITY MEASURES IN TEXT MINING A SURVEY ON SIMILARITY MEASURES IN TEXT MINING
A SURVEY ON SIMILARITY MEASURES IN TEXT MINING
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
eSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
eSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
eSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
eSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
eSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
eSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
eSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
eSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
eSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
eSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
eSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
eSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
awadeshbabu
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
PuktoonEngr
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
nooriasukmaningtyas
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
RadiNasr
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
Ratnakar Mikkili
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 

Recently uploaded (20)

ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt2. Operations Strategy in a Global Environment.ppt
2. Operations Strategy in a Global Environment.ppt
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdfIron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
Iron and Steel Technology Roadmap - Towards more sustainable steelmaking.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 

Scene text recognition in mobile applications by character descriptor and structure configuration

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 325 SCENE TEXT RECOGNITION IN MOBILE APPLICATIONS BY CHARACTER DESCRIPTOR AND STRUCTURE CONFIGURATION Sathish Kumar Penchala1 , Pallavi S.Umap2 1 Assistant Professor, Dept. of Computer Engineering, Dr. D.Y.Patil SOET., Lohegaon, Pune-47, Maharashtra, India 2 ME 2nd year, Dept. of Computer Engineering, Dr.D.Y.Patil SOET., Lohegaon, Pune-47, Maharashtra India Abstract Camera-based scene images usually have complex background filled with non-text objects in multiple shapes and colors. The existing system is sensitive to font scale changes and background interference. The main focusof this system is on two character recognition methods. In text detection, previously proposed algorithms are used to search for regions of text strings. Proposed system uses character descriptor which is effective to extract representative and discriminative text features for both recognition schemes. The local features descriptor HOG is compatible with all above key point detectors. Our method of scene text recognition from detected text regions is compatible with the application of mobile devices. Proposedsystem accurately extracts text from natural scene image in presence of background interference.The demo system gives us details of algorithm design and performance improvements of scene text extraction. It is ableto detect text region of text strings from cluttered and recognize characters in the text regions. Keywords: Scene text detection, scene text recognition, character descriptor, stroke configuration, text understanding, text retrieval. --------------------------------------------------------------------***----------------------------------------------------------------- 1. INTRODUCTION Camera-based applications on mobile phones are increasing rapidly. There can be valuable information in image. However, extraction of text from scene image is problematic due to factors such as variety of scale, orientation, font, style of character and complex background with multiple colors. Text Recognition in natural scene images is challenging than recognizing text from scans of printed pages, faxes and business cards. Modeling character structure is difficult due to high variability of geometry and appearance of characters natural image. To solve these problems text extraction is divided in two activities[9]: text detection and text recognition. Text detection localize region containing text characters [4]. Text recognition distinguishes different characters which are part of text word. We have presented two schemes text recognition process .First,a character recognizer to predict the category of a character in an image patch. Second, binary classifier which predicts existence of category. Two schemes of text recognition are compatible with applications related to scene text, which are text understanding and text retrieval. Text understanding acquires text information from natural scene to understand surrounding environment and objects, while text retrieval matches some stated user query against a set of free-text records. First, we design a discriminative character descriptor by combining several state-of-the-art feature detectors and descriptors[6].We model character structure at each character class by designing stroke configuration maps[5]. Our algorithm design is compatible with the application of scene text extraction in smart mobile devices. An Android- based demo system is developed to show the effectiveness of our proposed method on scene text information extraction from nearby objects. 2. RELATED WORK In Scale Invariant Feature Transform (SIFT), feature matching was adopted to recognize text characters in different languages, and a voting and geometric verification algorithm was presented to filter out false positive matches. prior models of the appearance of each character, and prior models of the likelihood of each character string. These models can be learned using traditional vision techniques and statistical language modeling techniques [2]. SIFT reduces false positive rates by more than an order of magnitude relative to the best Haar wavelet based detector . Another source of information is found in the similarity and dissimilarity between pairs of characters. Weinman and Learned-Miller two characters which have nearly identical appearance have different labels [8].Text recognition system using above source of information have proved that two characters which have nearly identical appearance have different labels. 3. LAYOUT-BASED SCENE TEXT DETECTION 3.1Layout Analysis of Color Decomposition Test strings on signage boards consist of characters in uniform color and aligned arrangement. We can locate text information by extracting pixels with similar colors. A boundary clustering algorithm based on bigram color uniformity in our previous work[3] .Text boundaries on the
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 326 border of text and its attachment surface are described by characteristic color-pairs, and we are able to extract text by distinguishing boundaries of characters and strings from those of background outliers based on color pairs. We then model color difference by a vector of color pair, which is obtained by cascading the RGB colors of text and attachment surfaces. Each boundary can be described by a color-pair, and we cluster the boundaries with similar color pairs into the sample layer. The boundaries of text characters are separated from those of background outliers. 3.2 Layout Analysis of Horizontal Alignment In most scene images, text strings are usually composed of characters with similar size and approximately horizontal alignment. This method involves following steps. Here we assume that length of signage and other text is enough to get benefit from repeatability of words while decoding. Here adjacent character grouping method is adopted from previous work[4] . For each connected component C we search for its siblings in similar size and vertical locations. When connected components C and C′ are grouped together as sibling components, their sibling sets will be updated according to their relative locations. When C is located on the left of C′, C′ will be added into the right-sibling set of C, which is simultaneously added into the left-sibling set of C′. For connected component C, if several siblings are obtained on its left and right, then we merge all these involved siblings into a region. This region contains a fragment of text string. To create sibling groups corresponding to complete text strings, we repeat above method to calculate all text string fragments in this color layer, and merge the string fragments with intersections. Table -1: Summary of the Previous Techniques Title of Paper Author/ Authors of paper Previous Technique Used Scene text recognition using similarity and a lexicon J. J. Weinman, E. Learned- Miller Combined Gabor- based appearance model. Real-time scene text Localization And recognition L. Neumann , J. Matas Based on extremal region Enforcing similarity Constraintswith integer programming D. L. Smith, J. Feild, Learned- Miller Based on SIFT Document image retrieval ThroughWord shape coding S. Lu, L. Li, C. L.Tan Model the inner Character structure character recognition in scene images with unsuper- vised feature learning A. Coates et al. extracted local features of character patches 4. STRUCTURE-BASED SCENE TEXT RECOGNITION The text retrieval schemes to verify whether a piece of text information exists in natural scene. In text retrieval, binary classifier distinguishes character class from other classes or background outliers. In text understanding character recognition is a multi-class classification problem. For each of the 62 character classes, we train a binary classifier to distinguish a character class from the other classes or non- text outliers. The specified character classes are defined as queried characters. In text retrieval, to better model character structure, we define stroke configuration for each character class based on specific partitions of character boundary and skeleton. 4.1 Character Descriptor Four types of character descriptors are used to model character structure .Harris detector to extract key points from corners and junctions. MSER detector to extract key points from stroke components. Dense detector extracts key points uniformly. Random detector extracts present number of key points in a random pattern. By cascading BOW and GMM – based feature representations we get character descriptor as shown in figure 1 below. In GMM model the numbers and locations of key points from each patch should be identical. Therefore, it is only applied to the key points from DD and RD. Four feature detectors are able to cover almost all representative key points related to the character structure. At each of the extracted key points, the HOG(Histogram of Oriented Gradients) feature is calculated as an observed feature vector x in feature space. Each character patch is normalized into size 128 × 128, containing a complete character. In the process of feature quantization, the Bag-of- Words Model and Gaussian Mixture Model are employed to aggregate the extracted features. BOW model represent the frequency of word occurrence, but not their position. SIFT and SURE are not employed in our method because their performance on character recognition is low. Every character patch is normalized into size 128 × 128 containing complete character. In both models, character patch is mapped into characteristic histogram as feature representation. 4.1.1 BOW Model BOW model is applied to key points from all four feature detectors. This model is computationally efficient and resistant to intra-class variations. First, k-means clustering is performed on HOG features extracted from training patches. Then feature coding and pooling are performed to map all HOG features from a character patch into a histogram of visual words. We adopt soft-assignment coding and average pooling schemes in the experiments.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 327 4.1.2 Gaussian Mixture Model The s-th(1 ≤ s≤K)center is used as initial means μs of the s- th Gaussian in GMM. Then the initial weights ws and co- variances σsare calculated from the means. Next, an EM algorithm is used to obtain maximum likelihood estimate of the three parameters, weights, means, and co-variances of all the Gaussian mixture distributions. A likelihood vector from all Gaussians is represented by Eq. (1). μ σ μ σ σ σ Where x denotes a HOG-based feature vector at a key point, Pxdenotes the likelihood vector of feature vector x, and ps(x|μs,σs) denotes the probability value of x at the s-th Gaussian. For likelihood Vectors (Px,Py), where GMM- based feature representation by histogram of binary comparisons, as Eq. (2). P(s) = 1 ; if wsps(x|μs,σs) ≥ if wsps(y|μs,σs) , and P(s) = 0 ; if wsps(y|μs,σs) > if wsps(x|μs,σs) 4.2 Character Stroke Configuration In previously proposed method [7] stroke width consistency is used to detect scene text in complex background and achieve outstanding performance. Stroke is region bounded by two parallel boundary segments. Their orientation is regarded as stroke orientation and the distance between them is regarded as stroke width.The stroke configuration is estimated by synthesized characters generated from computer software. Character boundary and character skeleton are obtained by applying discrete contour evolution (DCE) [10] and skeleton pruning on the basis of DCE [11] . The accuracy of the skeleton position and stability of skeletons is guaranteed in this pruning method.DCE and skeleton pruning are invariant to deformation and scaling. We estimate the stroke width and orientation on sample points of character boundary. N points are sampled evenly from the polygon character boundary, with the polygon vertices reserved. In our experiment, we set N = 128. The number of points to be sampled on each side of the polygon boundary is proportional to its length. Secondly, stroke is contiguous part of an image that forms a band of a nearlyconstant width. We take b and its two neighboring sample points to fit a line when they are approximately collinear or else a quadratic curve. Then the slope or tangent direction at b is used as stroke orientation as shown in figure 2 below. Characters are connected strokes with orientation. Thirdly, we calculate the skeleton-based stroke maps. At each boundary sample point, values of stroke width and orientation are compared with its neighboring points. Constituency of stroke width and orientation consistency 3 and π/8 respectively. Construct stroke section if sample points satisfy stroke related features. If not construct junction. These parameters are compatible with the synthesized character patches with size 128 × 128. While the other sample points, around the intersections of neighboring strokes or the ends of strokes, compose junction sections of a character boundary. 4.2.1 Stroke Alignment Method The basic structure of a character class can be described by the mean value of all stroke configurations from character samples of the class. Here, we estimate a mean value of stroke configuration so that it is able to handle various fonts, styles and sizes. Eq. (3) gives an objective function of stroke alignment. (3) D=distance b/w stroke configuration of samples. A=mean value of stroke configurations Ti = Transformations applied on strokes of i-th stroke configuration. g(Ti)=Amplitude of transformation. Fig -2: Stroke Orientations and stroke width denoted by red line and red double arrows resp.,bnis approximately collinear ,while bm fits a quadratic curve with neighboring point
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 328 Fig -2: Flowchart of our proposed character descriptor 5. RESULTS AND DISCUSSIONS Table -2: Accuracy rates of scene character recognition inicdar-2003 dataset, compared with previously published results ICDAR – 2003 Dataset AR Ours HOG+NN SYNTH+FERNS NATIVE+FERNS 0.628 0.515 0.520 0.640 Table -2: Accuracy Rates (AR) and False Positive Rates (FPR) of queried character classificationin the three datasets Dataset AR FPR Chars74K 0.726 0.078 Sign 0.868 0.075 ICDAR-2003 0.536 0.180 6. COMPARISON OF RESULTS The experimental results in first Table show that our proposed descriptor outperforms the SYNTH+FERNS with AR 0.52 and comparable with NATIVE+FERNS having AR of 0.64.A character classifier is trained for each character class by using Chars74K samples, which is then evaluated over the three datasets to obtain the results. As shown in second table a character classifier is trained for each character class by using Chars74K samples, which is then evaluated over the three datasets to obtain the results. 7. CONCLUSION It detects text regions from natural scene image/video, and recognizes text information from the detected text regions. Text understanding and text retrieval are respectively proposed to extract text information from surrounding environment. Character descriptor is effective to extract representative and discriminative text features for both recognition schemes. To model text character structure for text retrieval scheme, we have designed a novel feature representation, stroke configuration map, based on boundary and skeleton. Quantitative experimental results demonstrate that proposed method of scene text recognition outperforms most existing methods. REFERENCES [1]. Chucai Yi, “Scene Text Recognition in Mobile Applications by Character Descriptor and Structure Configuration,”IEEE Trans. Image Process., vol. 23, no. 7, July 2014, pp.2972 - 2982. [2]. D. L. Smith, J. Feild, and E. Learned-Miller, “Enforcing similarity constraints with integer programming for better scene text recognition,” in Proc. IEEE Conf. Comput. Vis. Pattern Recognit., Jun. 2011,pp. 73–80. [3]. C. Yi and Y. Tian, “Localizing text in scene images by boundary clustering, stroke segmentation, and string fragment classification,” IEEE Trans. Image Process., vol. 21, no. 9, pp. 4256–4268, Sep. 2012. [4]. C. Yi and Y. Tian, “Text string detection from natural scenes by structure-based partition and grouping,” IEEE Trans. Image Process., vol. 20, no. 9, pp. 2594–2605, Sep. 2011. [5]. N. and B. Triggs, “Histograms of oriented gradients for human detection,” in Proc. IEEEConf. Comput. Vis. Pattern Recognit., Jun. 2005, pp. 886–893. [6]. P. Viola and M. J. Jones, “Robust real-time face detection,” Int. J.Comput. Vis., vol. 57, no. 2, pp. 137–154, 2004. [7]. B. Epshtein, E. Ofek, and Y. Wexler, “Detecting text in natural scenes with stroke width transform,” in Proc. CVPR, Jun. 2010, pp. 2963–2970. [8]. J. J. Weinman, E. Learned-Miller, and A. R. Hanson, “Scene text recognition using similarity and a lexicon with sparse belief propagation,”IEEETrans. Pattern Anal. Mach. Intell., vol. 31, no. 10, pp. 1733–1746, Oct. 2009. [9]. J. Zhang and R. Kasturi, “Extraction of text objects in video documents: Recent progress,” in Proc. 8th IAPR Int. Workshop DAS, Sep. 2008, pp. 5–17.
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 02 | Feb-2015, Available @ http://www.ijret.org 329 [10]. L. J. Latecki and R. Lakamper, “Convexity rule for shape decomposition based on discrete contour evolution,” Comput.Vis. Image Understand., vol. 73, no. 3, pp. 441– 454, 1999. [11]. X. Bai, L. J. Latecki, and W.-Y. Liu, “Skeleton pruning by contourpartitioning with discrete curve evolution,” IEEE Trans. Pattern Anal.Mach. Intell., vol. 29, no. 3, pp. 449–462, Mar. 2007. BIOGRAPHIES Sathish Kumar Penchala, Assistant Professor in Computer Engineering at Dr. D.Y.Patil SOET, Lohegaon, Pune-47. Pallavi S. Umap, is a Final year Post Graduate student,pursuing her degree Master of Engineering degree in ComputerNetworks at Dr. D.Y.Patil SOET., Lohegaon, Pune-47.