SlideShare a Scribd company logo
1 of 5
Download to read offline
ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012



     Text-Image Separation in Document Images Using
             Boundary/Perimeter Detection
                                           Priti P. Rege1, Chanchal A. Chandrakar2,
                                               College of Engineering,, Pune, India.
                                                   Email: 1 ppr.extc@coep.ac.in
                                                   2
                                                     chanch.chandra@gmail.com


Abstract—Document analysis plays an important role in office            three main categories: top-down, bottom-up and hybrid
automation, especially in intelligent signal processing. The            techniques [1]. Many bottom-up Approaches are used for
proposed system consists of two modules: block segmentation             page segmentation and block identification [5], [11].Yuan, Tan
and block identification. In this approach, first a document is         [2] designed method that makes use of edge information to
segmented into several non-overlapping blocks by utilizing a            extract textual blocks from gray scale document images. It
novel recursive segmentation technique, and then extracts
                                                                        aims at detecting only textual regions on heavy noise infected
the features embedded in each segmented block are extracted.
Two kinds of features, connected components and image
                                                                        newspaper images and separate them from graphical regions.
boundary/perimeter features are extracted. The features are                 The White Tiles Approach [3] described new approaches
verified to be effective in characterizing document blocks.             to page segmentation and classification. In this method,
Last, the identification module to determine the identity of
                                                                        once the white tiles of each region have been gathered
the considered block is developed. Wide verities of documents
are used to verify the feasibility of this approach.
                                                                        together and their total area is estimated, and regions are
                                                                        classified as text or images. George Nagy, Mukkai
Index Terms— OCR, Segmantation, Connected components                    Krishnamoorthy [4] have proposed two complementary
                                                                        methods for characterizing the spatial structure of digitized
                         I. INTRODUCTION                                technical documents and labeling various logical components
                                                                        without using optical character recognition. Projection profile
    Document image layout analysis is a crucial step in many            method [6], [13] is used for separating the text and images,
applications related to document images, like text extraction           which is only suitable for Devanagari Documents (Hindi
using optical character recognition (OCR), reflowing                    document).
documents, and layout-based document retrieval. Layout
analysis is the process of identifying layout structures by                 The main disadvantage of this method is that the irregular
analyzing page images. Layout structures can be physical                shaped images with non-rectangular shaped text blocks may
(text, graphics, pictures,) or logical (titles, paragraphs,             result in loss of some text. They can be dealt with by adapting
captions, headings . . .). The identification of physical layout        algorithms available for Roman script. Kuo-Chin Fan, Chi-
structures is called physical or geometric layout analysis,             Hwa Liu, Yuan-Kai Wang [15] have implemented a feature-
while assigning different logical roles to the detected regions         based document analysis system which utilizes domain
is termed as logical layout analysis.                                   knowledge to segment and classify mixed text/graphics/image
    The purpose of document-image analysis is to transform              documents. This method is only suitable for pure text or image
the information contained on a digitized document image into            document, i.e. a document which has only text region or image
an equivalent symbolic representation. Text parts are the main          region. This method is good for text-image identification not
information carriers in most applications. For that purpose, it         for extraction.
is necessary to locate text objects within the image, recognize             The Constrained Run-Length Algorithm (CRLA) [16] is a
them, and extract the hidden information. The documents                 well-known technique for page segmentation. The algorithm
may contain, besides text, graphics and images that overlap.            is very efficient for partitioning documents with Manhattan
Since text lines are not always horizontally aligned, finding           layouts but not suited to deal with complex layout pages,
text parts and locating characters, words, and lines are not            e.g. irregular graphics embedded in a text paragraph. Its main
trivial tasks. Due to the tremendous reduction in the storage           drawback is the use of only local information during the
space of the processed results, it is advantageous to                   smearing stage, which may lead to erroneous linkage of text
reproduce, transmit, and store the document in the processed            and graphics. Kuo-Chin Fan, Liang-Shen Wang, Yuan-Kai
form. The extracted regions can then be processed by a                  Wang [17] proposed an intelligent document analysis system
subsequent step according to their types, e.g. OCR for text             to achieve the document segmentation and identification
regions and compression for graphics and halftone                       goal. The proposed system consists of two modules: block
images.Up to now several strategies have been tried to solve            segmentation and block identification. Two kinds of features,
the problem of segmentation. Techniques for page                        connectivity histogram and multi resolution features are
segmentation and layout analysis are broadly divided in to              extracted.

© 2012 ACEEE                                                       10
DOI: 01.IJSIP.03.01.70
ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012


                       II. METHODOLOGYI

A. DOCUMENT SEGMENTATION
    The main aim of document segmentation is to segment a
document into several separate blocks with each block
representing one type of medium.The method we adopted in
segmenting documents is a combination of run-length
smearing algorithm and boundary perimeter detection
procedure. It first performs the smearing operation in both
the horizontal and vertical directions to generate blocks. Due
to the selection of an improper threshold in the run-length
smearing process, an intact paragraph might be segmented
into several consecutive horizontal stripes with each stripe
representing one horizontal text line. The stripe merging                      Figure2. Image after horizontal run length smearing
procedure is thus devised to merge those text stripes that                  Document image is usually captured as colored image
belong to the same paragraph. The merit is that it generates            (RGB) and we convert it into Gray level image. image. Hence,
an intact text block instead of several smaller text stripes. By        a binarization procedure converting a gray-level image into a
this way, it not only saves storage space but also reduces              binary image is necessary. OTSU Document image is usually
the burden in performing optical character recognition.                 captured as colored image (RGB) and we convert it into Gray
                                                                        level image. Thresholding is utilized to accomplish the
B. PRE-PROCESSING
                                                                        conversion task. Figure 1, shows the original and binarized
    Preprocessing of document images is the way of using                image.
mature image processing techniques to improve the quality
of images. Its purpose is to enhance and extract useful                 C. BLOCK EXTRACTION
information of images for later processing purposes. Two                     With the pre-processing being done, a binarized image is
preprocessing tasks, thresholding and noise removal, are                then obtained. In this binarized image, each meaningful block
performed here.                                                         which can be easily recognized by human beings is composed
                                                                        of pixels. RLSA is an operation to connect two nonadjacent
                                                                        runs into one merged run if the distance between these two
                                                                        runs is smaller than a threshold.
                                                                        It is assumed that white pixels are represented by 0 and black
                                                                        pixels by 1. If the number of 0 between l’s is less than or equal
                                                                        to a constant C, then 0 is replaced by 1. In other words, two
                                                                        runs having distance smaller than the threshold C will be
                                                                        merged into one run. Example
                                                                        Before smearing:
                                                                        1111111000001111111100011
                                                                        After smearing:
                                                                        1111111000001111111111111
                                                                        The result generated by the smearing operation is several l-
                                                                        runs in each horizontal row.
                                                                             Two constants CHT (Constant Horizontal threshold
                                                                        value) and CVT (Constant Vertical threshold value) are needed
                                                                        due to the processing of RLSA in two directions. CHT
                                                                        selected as half of CVT. Figure 2 and 3 illustrate the operation
                                                                        of RLSA in two directions i.e. horizontal and vertical directions.
                                                                        The results generated by horizontal and vertical smearing
                                                                        operations are then combined by logical AND operation to
                                                                        produce the meaningful blocks. In other words, a pixel in the
                                                                        resulting image is black if the pixels at the same position of
                                                                        both vertical and horizontal Run-length smearing images are
                                                                        black. Though run length smearing can combine related pixels
                                                                        into meaningful blocks, there are still some small blocks which
                                                                        should be further combined. We repeatedly apply run length
        Figure1. Original color image and Binarized image.
                                                                        smearing with increased runlengths to the output of AND
                                                                        operation to merge these blochs. An image illustrating the
                                                                        result generated by RLSA is shown in Figure 4.

© 2012 ACEEE                                                       11
DOI: 01.IJSIP.03.01.70
ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012


D. BOUNDARY/PERIMETER DETECTION
    Since we have obtained meaningful blocks, the next step
is to find the outside boundary of smearing blocks. Outside
boundary is defined as the white pixels surrounding the
extracted boundary of a block. The traditional edge detection
methods are not adequate for detecting this kind of boundary.
For example, if traditional edge detection methods are
operated on a one-pixel-width line block open contour will be
generated.

                                                                                    Figure6. Four possible search Direction.
                                                                           We use 4-connectivity as well as 8-connectivity for bound-
                                                                       ary extraction. It is observed that 4-connectivity gives batter
                                                                       results. Figure 6 shows the four possible search directions. A
                                                                       pixel is considered to be a part of the perimeter, if it is nonzero
                                                                       and it is connected to at least one nonzero value.
                                                                           Connectivity can also be defined in a more general way
                                                                       for any dimension by using connectivity for a 3-by-3 matrix
                                                                       of 0’s and 1’s. The 1-valued elements define neighborhood
                                                                       locations relative to the center element of connectivity. Note
                                                                       that connectivity must be symmetric about its center ele-
                                                                       ment. Figure 7 shows the image after boundary detection.
        Figure3. Image after vertical run length smearing              E. CONNECTED COMPONENT AND AREA COMPUTATION
                                                                           After detection of boundary from the image, we find the
                                                                       connected component. Then, with the help of connected
                                                                       component we compute the area of closed loop. From Figure
                                                                       6 it is clear that the text which is converted into uniform
                                                                       stripes has uniform area. When we compare the area of the
                                                                       closed loop (stripes which form by run length smearing) with
                                                                       open loop area then, it fills Zero in smaller area. Figure 7
                                                                       shows the smaller area which is filled with zero or black pixel.




           Figure4. Final Result of Run length smearing.




                                                                                   Figure7. Image after Boundary Detection.
                                                                       To find the connected component the algorithm uses the
                                                                       following general procedure:
                                                                       1. Scan all image pixels, assigning preliminary labels to nonzero
  Figure5.Image after reapplying horizontal run length smearing        pixels and recording label equivalences in a union-find table.
                                                                       2. Resolve the equivalence classes using the union-find
                                                                       algorithm.
                                                                       3. Relabel the pixels based on the resolved equivalence
                                                                       classes.

© 2012 ACEEE                                                      12
DOI: 01.IJSIP.03.01.70
ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012


F. IMAGE-TEXT SEPARATION                                                                          CONCLUSIONS
    The text areas are thus filled with zero or black pixel. By               Choice of the segmentation is very important step in the
ORing the Original binary image with image so obtained entire            separation of newspaper and magazine document images.
text is separated from the original images. This is shown in             This choice is based on the quality of the input image, the
Figure 9. After separation of text, we XOR the image in Figure           required output quality and speed of processing. Run length
9 with the image in Figure 3, to separated image/graphics                smearing algorithm using boundary detection techniques are
from the original binary document. If some big text size is still        found to have good performance for the images having good
associated with separated image then we repeat the run length            separation between the text and the images pixels. Run length
smearing operation for the document image. The separated                 smearing algorithm and recursive segmentation technique
image is shown in Figure 10. Results for two more samples                are adopted in the segmentation stage to extract non-
are given in Figure 11 and Figure 12. Text and image parts are           overlapping blocks embedded in the document.
clearly separated.                                                           The Enhanced CRLA has been chosen to build a number
                                                                         of document processing systems because of its advantages
                                                                         compared with other page segmentation techniques. For
                                                                         example, although the texture- analysis-based approaches
                                                                         are powerful to handle various page layouts, they are
                                                                         commonly time-consuming because of the pixel-level
                                                                         classification.
                                                                             The methods based on connected component analysis
                                                                         may have problems to extract large headline characters and
                                                                         thus they suit to deal with documents of certain character
                                                                         size. However, the original CRLA can only treat Manhattan
                                                                         page format; the present work extends its capability to cover
                                                                         both Manhattan and non-Manhattan layout and thus
                                                                         expands its application domain significantly. But the range
           Figure8. Smaller Area filled with Zero smearing               of mean length of horizontal black runs (MBRL) and White-
                                                                         black transition count per unit width (MTC) in CRLA is not
                                                                         suitable for all type of document images.
                                                                             To improve the performance of these techniques our
                                                                         method is implemented and it works well in case of all type of
                                                                         document images and works on text in several languages i.e.
                                                                         Hindi, English, Bangla, Telugu, Chinese. This method is
                                                                         language independent method. If we see Projection profile
                                                                         method [1], [13] it is only applicable for Devanagari Document
                                                                         images. It needs that the layout of newspaper document image
                                                                         is very specific. Otherwise it will not separate the text-image
                                                                         region. Run length smearing using stripe merging method is
                                                                         only suitable when stripes formed during rum length smearing
                                                                         are perfect rectangle.
      Figure9. Text Extracted from given Document smearing.                  In our text-image separation system using boundary
                                                                         detection, there is no need of skew correction. Without skew
                                                                         correction it can work properly. Also, there is no requirement
                                                                         of labeling different sizes of text and images in the given
                                                                         documents. It can easily separate the text and image from
                                                                         document image. The method can be used recursively if the
                                                                         separated image contains some residue text. This system
                                                                         provides a good platform for implementing segmentation
                                                                         techniques suitable for developing real time processing
                                                                         techniques and processing large databases of newspaper
                                                                         and magazine document images.




     Figure10. Image Extracted from given Document Image


© 2012 ACEEE                                                        13
DOI: 01.IJSIP.03.01.70
ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012


                           REFERENCES                                    [9] V Chew Lim Tan, Zheng Zhang, “Text block segmentation using
[1] Swapnil Khedekar Vemulapati Ramanaprasad Srirangaraj Setlur,         pyramid structure”, Proceedings of SPIE, 4307, 297, 2000
“Text - Image Separation in Devanagari Documents”, Proceedings           [10] R. M. K. Sinha, Veena Bansal, “On Devanagari Document
of the Seventh International Conference on Document Analysis             Processing”, IEEE International Conference on System Man, and
and Recognition (ICDAR’03), 2003                                         Cybernetics, 22-25 October 1995.
[2] Q. Yuan, C.L. Tan, “Text Extraction from Gray Scale Document         [11] P. Mitchell, H. Yan, “Newspaper document analysis featuring
Images Using Edge Information”. Proceedings of the International         connected line segmentation”, Proceedings of International
Conference on Document Analysis and Recognition, ICDAR’01,               Conference on on Document Analysis and Recognition, ICDAR’01,
Seattle, USA, pp. 302-306 September 10- 13, 2001                         Seattle, USA, 2001.
[3] A. Antonacopoulos and R T Ritchings “Segmentation and                [12] T. Perroud, K. Sobottka, and H. Bunke, “Text extraction from
Classification of Document Images”, The Institution of Electrical        color documents clustering approaches in three and four
Engineers, U.K. 1995                                                     Dimensions”, Sixth International Conference on Document Analysis
[4] G. Nagy, S. Seth, “Hierarchical Representation of Optically          and Recognition (ICDAR’01), pp 937-941, September 10-13, 2001.
Scanned Documents”. Proceedings of 7th Intl. Conf. on Pattern            [13] Abdel Wahab Zramdini and Rolf Ingold, “Optical font
Recognition, Montreal, Canada, pp. 347-349, 1984.                        recognition from projection profiles”, Proceedings of Electronic
[5] Kyong-Ho Lee, Student Yoon-Chul Choy, and Sung-Bae Cho, “            Publishing. Vol. 6(3), pp.249–260, September, 1993.
Geometric Structure Analysis of Document Images: A Knowledge-            [14] Dimitrios Drivas and Adnan Amin, “Page Segmentation and
Based Approach”, IEEE transactions on Pattern Analysis and               Classification Utilizing Bottom-Up Approach”, IEEE International
Machine Intelligence, Vol. 22, No. 11, November 2000.                    Conference on multimedia and expo, Taipei, Taiwan, June 1995.
[6] Jean Duong, Hubert Emptoz, “Features for Printed Document            [15] Kuo-Chin Fan, Chi-Hwa Liu, Yuan-Kai Wang, “Segmentation
Image Analysis”, IEEE Transaction on Document Image Analysis             and classification of mixed text/graphics/image documents”, Pattern
Vol. 02, No. 17 November 2002.                                           Recognition Letters, Elsevier, pp. 1201-1209, December 1994.
[7] Nikoluos G. Bourbakis, “A Methodology of Separating Images           [16] Hung-Ming Sun, “Enhanced Constrained Run-Length
from Text Using an OCR Approach”, Binghamton University,                 Algorithm for Complex Layout Document Processing”, International
Center for Intelligent Systems, Binghamton, NY 13902.                    Journal of Applied Science and Engineering pp. 297-309, 2006.
[8] Karl Tombre, Salvatore Tabbone, Loïc Pélissier, Bart Lamiroy,        [17] Kuo-Chin Fan, Liang-Shen Wang, Yuan-Kai Wang , “Page
and Philippe, “Text/Graphics Separation Revisited” Proceedings           segmentation and identification for intelligent signal processing”,
of the 5th International Workshop on Document Analysis Systems,          Signal Processing, Elsevier, pp. 329-346, 1995.
2002.




© 2012 ACEEE                                                        14
DOI: 01.IJSIP.03.01.70

More Related Content

What's hot

Zernike moment of invariants for effective image retrieval using gaussian fil...
Zernike moment of invariants for effective image retrieval using gaussian fil...Zernike moment of invariants for effective image retrieval using gaussian fil...
Zernike moment of invariants for effective image retrieval using gaussian fil...IAEME Publication
 
Automatic dominant region segmentation for natural images
Automatic dominant region segmentation for natural imagesAutomatic dominant region segmentation for natural images
Automatic dominant region segmentation for natural imagescsandit
 
3.[18 30]graph cut based local binary patterns for content based image retrieval
3.[18 30]graph cut based local binary patterns for content based image retrieval3.[18 30]graph cut based local binary patterns for content based image retrieval
3.[18 30]graph cut based local binary patterns for content based image retrievalAlexander Decker
 
Speeded-up and Compact Visual Codebook for Object Recognition
Speeded-up and Compact Visual Codebook for Object RecognitionSpeeded-up and Compact Visual Codebook for Object Recognition
Speeded-up and Compact Visual Codebook for Object RecognitionCSCJournals
 
3.[18 30]graph cut based local binary patterns for content based image retrieval
3.[18 30]graph cut based local binary patterns for content based image retrieval3.[18 30]graph cut based local binary patterns for content based image retrieval
3.[18 30]graph cut based local binary patterns for content based image retrievalAlexander Decker
 
11.framework of smart mobile rfid networks
11.framework of smart mobile rfid networks11.framework of smart mobile rfid networks
11.framework of smart mobile rfid networksAlexander Decker
 
11.graph cut based local binary patterns for content based image retrieval
11.graph cut based local binary patterns for content based image retrieval11.graph cut based local binary patterns for content based image retrieval
11.graph cut based local binary patterns for content based image retrievalAlexander Decker
 
3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networksAlexander Decker
 
Feature integration for image information retrieval using image mining techni...
Feature integration for image information retrieval using image mining techni...Feature integration for image information retrieval using image mining techni...
Feature integration for image information retrieval using image mining techni...iaemedu
 
A Novel Document Image Binarization For Optical Character Recognition
A Novel Document Image Binarization For Optical Character RecognitionA Novel Document Image Binarization For Optical Character Recognition
A Novel Document Image Binarization For Optical Character RecognitionEditor IJCATR
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
Evaluation of Texture in CBIR
Evaluation of Texture in CBIREvaluation of Texture in CBIR
Evaluation of Texture in CBIRZahra Mansoori
 
A Review of Optical Character Recognition System for Recognition of Printed Text
A Review of Optical Character Recognition System for Recognition of Printed TextA Review of Optical Character Recognition System for Recognition of Printed Text
A Review of Optical Character Recognition System for Recognition of Printed Textiosrjce
 
Content-based Image Retrieval Using The knowledge of Color, Texture in Binary...
Content-based Image Retrieval Using The knowledge of Color, Texture in Binary...Content-based Image Retrieval Using The knowledge of Color, Texture in Binary...
Content-based Image Retrieval Using The knowledge of Color, Texture in Binary...Zahra Mansoori
 
Dc31472476
Dc31472476Dc31472476
Dc31472476IJMER
 

What's hot (17)

Zernike moment of invariants for effective image retrieval using gaussian fil...
Zernike moment of invariants for effective image retrieval using gaussian fil...Zernike moment of invariants for effective image retrieval using gaussian fil...
Zernike moment of invariants for effective image retrieval using gaussian fil...
 
Automatic dominant region segmentation for natural images
Automatic dominant region segmentation for natural imagesAutomatic dominant region segmentation for natural images
Automatic dominant region segmentation for natural images
 
3.[18 30]graph cut based local binary patterns for content based image retrieval
3.[18 30]graph cut based local binary patterns for content based image retrieval3.[18 30]graph cut based local binary patterns for content based image retrieval
3.[18 30]graph cut based local binary patterns for content based image retrieval
 
Texture Classification
Texture ClassificationTexture Classification
Texture Classification
 
Speeded-up and Compact Visual Codebook for Object Recognition
Speeded-up and Compact Visual Codebook for Object RecognitionSpeeded-up and Compact Visual Codebook for Object Recognition
Speeded-up and Compact Visual Codebook for Object Recognition
 
3.[18 30]graph cut based local binary patterns for content based image retrieval
3.[18 30]graph cut based local binary patterns for content based image retrieval3.[18 30]graph cut based local binary patterns for content based image retrieval
3.[18 30]graph cut based local binary patterns for content based image retrieval
 
11.framework of smart mobile rfid networks
11.framework of smart mobile rfid networks11.framework of smart mobile rfid networks
11.framework of smart mobile rfid networks
 
11.graph cut based local binary patterns for content based image retrieval
11.graph cut based local binary patterns for content based image retrieval11.graph cut based local binary patterns for content based image retrieval
11.graph cut based local binary patterns for content based image retrieval
 
3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks3.[13 21]framework of smart mobile rfid networks
3.[13 21]framework of smart mobile rfid networks
 
Feature integration for image information retrieval using image mining techni...
Feature integration for image information retrieval using image mining techni...Feature integration for image information retrieval using image mining techni...
Feature integration for image information retrieval using image mining techni...
 
A Novel Document Image Binarization For Optical Character Recognition
A Novel Document Image Binarization For Optical Character RecognitionA Novel Document Image Binarization For Optical Character Recognition
A Novel Document Image Binarization For Optical Character Recognition
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Evaluation of Texture in CBIR
Evaluation of Texture in CBIREvaluation of Texture in CBIR
Evaluation of Texture in CBIR
 
A Review of Optical Character Recognition System for Recognition of Printed Text
A Review of Optical Character Recognition System for Recognition of Printed TextA Review of Optical Character Recognition System for Recognition of Printed Text
A Review of Optical Character Recognition System for Recognition of Printed Text
 
Content-based Image Retrieval Using The knowledge of Color, Texture in Binary...
Content-based Image Retrieval Using The knowledge of Color, Texture in Binary...Content-based Image Retrieval Using The knowledge of Color, Texture in Binary...
Content-based Image Retrieval Using The knowledge of Color, Texture in Binary...
 
Dc31472476
Dc31472476Dc31472476
Dc31472476
 
Sub1547
Sub1547Sub1547
Sub1547
 

Viewers also liked

Scene Text Detection on Images using Cellular Automata
Scene Text Detection on Images using Cellular AutomataScene Text Detection on Images using Cellular Automata
Scene Text Detection on Images using Cellular AutomataKonstantinos Zagoris
 
Self-Directing Text Detection and Removal from Images with Smoothing
Self-Directing Text Detection and Removal from Images with SmoothingSelf-Directing Text Detection and Removal from Images with Smoothing
Self-Directing Text Detection and Removal from Images with SmoothingPriyanka Wagh
 
Text extraction From Digital image
Text extraction From Digital imageText extraction From Digital image
Text extraction From Digital imageKaushik Godhani
 
Python in Computer Vision
Python in Computer VisionPython in Computer Vision
Python in Computer VisionBrian Thorne
 
Introduction to python for Beginners
Introduction to python for Beginners Introduction to python for Beginners
Introduction to python for Beginners Sujith Kumar
 
Python 101: Python for Absolute Beginners (PyTexas 2014)
Python 101: Python for Absolute Beginners (PyTexas 2014)Python 101: Python for Absolute Beginners (PyTexas 2014)
Python 101: Python for Absolute Beginners (PyTexas 2014)Paige Bailey
 
Deep Learning in Computer Vision
Deep Learning in Computer VisionDeep Learning in Computer Vision
Deep Learning in Computer VisionSungjoon Choi
 

Viewers also liked (7)

Scene Text Detection on Images using Cellular Automata
Scene Text Detection on Images using Cellular AutomataScene Text Detection on Images using Cellular Automata
Scene Text Detection on Images using Cellular Automata
 
Self-Directing Text Detection and Removal from Images with Smoothing
Self-Directing Text Detection and Removal from Images with SmoothingSelf-Directing Text Detection and Removal from Images with Smoothing
Self-Directing Text Detection and Removal from Images with Smoothing
 
Text extraction From Digital image
Text extraction From Digital imageText extraction From Digital image
Text extraction From Digital image
 
Python in Computer Vision
Python in Computer VisionPython in Computer Vision
Python in Computer Vision
 
Introduction to python for Beginners
Introduction to python for Beginners Introduction to python for Beginners
Introduction to python for Beginners
 
Python 101: Python for Absolute Beginners (PyTexas 2014)
Python 101: Python for Absolute Beginners (PyTexas 2014)Python 101: Python for Absolute Beginners (PyTexas 2014)
Python 101: Python for Absolute Beginners (PyTexas 2014)
 
Deep Learning in Computer Vision
Deep Learning in Computer VisionDeep Learning in Computer Vision
Deep Learning in Computer Vision
 

Similar to Text-Image Separation in Document Images Using Boundary/Perimeter Detection

Layout Based Information Retrieval from Document Images
Layout Based Information Retrieval from Document ImagesLayout Based Information Retrieval from Document Images
Layout Based Information Retrieval from Document ImagesIOSR Journals
 
Header Based Classification of Journals Using Document Image Segmentation and...
Header Based Classification of Journals Using Document Image Segmentation and...Header Based Classification of Journals Using Document Image Segmentation and...
Header Based Classification of Journals Using Document Image Segmentation and...CSCJournals
 
A Survey of Image Processing and Identification Techniques
A Survey of Image Processing and Identification TechniquesA Survey of Image Processing and Identification Techniques
A Survey of Image Processing and Identification Techniquesvivatechijri
 
Feature Extraction and Feature Selection using Textual Analysis
Feature Extraction and Feature Selection using Textual AnalysisFeature Extraction and Feature Selection using Textual Analysis
Feature Extraction and Feature Selection using Textual Analysisvivatechijri
 
Texture based feature extraction and object tracking
Texture based feature extraction and object trackingTexture based feature extraction and object tracking
Texture based feature extraction and object trackingPriyanka Goswami
 
Script Identification for printed document images at text-line level using DC...
Script Identification for printed document images at text-line level using DC...Script Identification for printed document images at text-line level using DC...
Script Identification for printed document images at text-line level using DC...IOSR Journals
 
Enhancement and Segmentation of Historical Records
Enhancement and Segmentation of Historical RecordsEnhancement and Segmentation of Historical Records
Enhancement and Segmentation of Historical Recordscsandit
 
Cc31331335
Cc31331335Cc31331335
Cc31331335IJMER
 
Text Extraction System by Eliminating Non-Text Regions
Text Extraction System by Eliminating Non-Text RegionsText Extraction System by Eliminating Non-Text Regions
Text Extraction System by Eliminating Non-Text RegionsIJCSIS Research Publications
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
 
Optical Character Recognition from Text Image
Optical Character Recognition from Text ImageOptical Character Recognition from Text Image
Optical Character Recognition from Text ImageEditor IJCATR
 
A Run Length Smoothing-Based Algorithm for Non-Manhattan Document Segmentation
A Run Length Smoothing-Based Algorithm for Non-Manhattan Document SegmentationA Run Length Smoothing-Based Algorithm for Non-Manhattan Document Segmentation
A Run Length Smoothing-Based Algorithm for Non-Manhattan Document SegmentationUniversity of Bari (Italy)
 
International journal of_software_engine
International journal of_software_engineInternational journal of_software_engine
International journal of_software_engineronan messi
 
SIGNIFICANCE OF DIMENSIONALITY REDUCTION IN IMAGE PROCESSING
SIGNIFICANCE OF DIMENSIONALITY REDUCTION IN IMAGE PROCESSING SIGNIFICANCE OF DIMENSIONALITY REDUCTION IN IMAGE PROCESSING
SIGNIFICANCE OF DIMENSIONALITY REDUCTION IN IMAGE PROCESSING sipij
 
AVC based Compression of Compound Images Using Block Classification Scheme
AVC based Compression of Compound Images Using Block Classification SchemeAVC based Compression of Compound Images Using Block Classification Scheme
AVC based Compression of Compound Images Using Block Classification SchemeDR.P.S.JAGADEESH KUMAR
 
An effective approach to offline arabic handwriting recognition
An effective approach to offline arabic handwriting recognitionAn effective approach to offline arabic handwriting recognition
An effective approach to offline arabic handwriting recognitionijaia
 
A Texture Based Methodology for Text Region Extraction from Low Resolution Na...
A Texture Based Methodology for Text Region Extraction from Low Resolution Na...A Texture Based Methodology for Text Region Extraction from Low Resolution Na...
A Texture Based Methodology for Text Region Extraction from Low Resolution Na...CSCJournals
 

Similar to Text-Image Separation in Document Images Using Boundary/Perimeter Detection (20)

Layout Based Information Retrieval from Document Images
Layout Based Information Retrieval from Document ImagesLayout Based Information Retrieval from Document Images
Layout Based Information Retrieval from Document Images
 
Header Based Classification of Journals Using Document Image Segmentation and...
Header Based Classification of Journals Using Document Image Segmentation and...Header Based Classification of Journals Using Document Image Segmentation and...
Header Based Classification of Journals Using Document Image Segmentation and...
 
A Survey of Image Processing and Identification Techniques
A Survey of Image Processing and Identification TechniquesA Survey of Image Processing and Identification Techniques
A Survey of Image Processing and Identification Techniques
 
Feature Extraction and Feature Selection using Textual Analysis
Feature Extraction and Feature Selection using Textual AnalysisFeature Extraction and Feature Selection using Textual Analysis
Feature Extraction and Feature Selection using Textual Analysis
 
Texture based feature extraction and object tracking
Texture based feature extraction and object trackingTexture based feature extraction and object tracking
Texture based feature extraction and object tracking
 
Script Identification for printed document images at text-line level using DC...
Script Identification for printed document images at text-line level using DC...Script Identification for printed document images at text-line level using DC...
Script Identification for printed document images at text-line level using DC...
 
F045053236
F045053236F045053236
F045053236
 
Enhancement and Segmentation of Historical Records
Enhancement and Segmentation of Historical RecordsEnhancement and Segmentation of Historical Records
Enhancement and Segmentation of Historical Records
 
Cc31331335
Cc31331335Cc31331335
Cc31331335
 
Text Extraction System by Eliminating Non-Text Regions
Text Extraction System by Eliminating Non-Text RegionsText Extraction System by Eliminating Non-Text Regions
Text Extraction System by Eliminating Non-Text Regions
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
Optical Character Recognition from Text Image
Optical Character Recognition from Text ImageOptical Character Recognition from Text Image
Optical Character Recognition from Text Image
 
A Run Length Smoothing-Based Algorithm for Non-Manhattan Document Segmentation
A Run Length Smoothing-Based Algorithm for Non-Manhattan Document SegmentationA Run Length Smoothing-Based Algorithm for Non-Manhattan Document Segmentation
A Run Length Smoothing-Based Algorithm for Non-Manhattan Document Segmentation
 
C04741319
C04741319C04741319
C04741319
 
E017322833
E017322833E017322833
E017322833
 
International journal of_software_engine
International journal of_software_engineInternational journal of_software_engine
International journal of_software_engine
 
SIGNIFICANCE OF DIMENSIONALITY REDUCTION IN IMAGE PROCESSING
SIGNIFICANCE OF DIMENSIONALITY REDUCTION IN IMAGE PROCESSING SIGNIFICANCE OF DIMENSIONALITY REDUCTION IN IMAGE PROCESSING
SIGNIFICANCE OF DIMENSIONALITY REDUCTION IN IMAGE PROCESSING
 
AVC based Compression of Compound Images Using Block Classification Scheme
AVC based Compression of Compound Images Using Block Classification SchemeAVC based Compression of Compound Images Using Block Classification Scheme
AVC based Compression of Compound Images Using Block Classification Scheme
 
An effective approach to offline arabic handwriting recognition
An effective approach to offline arabic handwriting recognitionAn effective approach to offline arabic handwriting recognition
An effective approach to offline arabic handwriting recognition
 
A Texture Based Methodology for Text Region Extraction from Low Resolution Na...
A Texture Based Methodology for Text Region Extraction from Low Resolution Na...A Texture Based Methodology for Text Region Extraction from Low Resolution Na...
A Texture Based Methodology for Text Region Extraction from Low Resolution Na...
 

More from IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

More from IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

Text-Image Separation in Document Images Using Boundary/Perimeter Detection

  • 1. ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012 Text-Image Separation in Document Images Using Boundary/Perimeter Detection Priti P. Rege1, Chanchal A. Chandrakar2, College of Engineering,, Pune, India. Email: 1 ppr.extc@coep.ac.in 2 chanch.chandra@gmail.com Abstract—Document analysis plays an important role in office three main categories: top-down, bottom-up and hybrid automation, especially in intelligent signal processing. The techniques [1]. Many bottom-up Approaches are used for proposed system consists of two modules: block segmentation page segmentation and block identification [5], [11].Yuan, Tan and block identification. In this approach, first a document is [2] designed method that makes use of edge information to segmented into several non-overlapping blocks by utilizing a extract textual blocks from gray scale document images. It novel recursive segmentation technique, and then extracts aims at detecting only textual regions on heavy noise infected the features embedded in each segmented block are extracted. Two kinds of features, connected components and image newspaper images and separate them from graphical regions. boundary/perimeter features are extracted. The features are The White Tiles Approach [3] described new approaches verified to be effective in characterizing document blocks. to page segmentation and classification. In this method, Last, the identification module to determine the identity of once the white tiles of each region have been gathered the considered block is developed. Wide verities of documents are used to verify the feasibility of this approach. together and their total area is estimated, and regions are classified as text or images. George Nagy, Mukkai Index Terms— OCR, Segmantation, Connected components Krishnamoorthy [4] have proposed two complementary methods for characterizing the spatial structure of digitized I. INTRODUCTION technical documents and labeling various logical components without using optical character recognition. Projection profile Document image layout analysis is a crucial step in many method [6], [13] is used for separating the text and images, applications related to document images, like text extraction which is only suitable for Devanagari Documents (Hindi using optical character recognition (OCR), reflowing document). documents, and layout-based document retrieval. Layout analysis is the process of identifying layout structures by The main disadvantage of this method is that the irregular analyzing page images. Layout structures can be physical shaped images with non-rectangular shaped text blocks may (text, graphics, pictures,) or logical (titles, paragraphs, result in loss of some text. They can be dealt with by adapting captions, headings . . .). The identification of physical layout algorithms available for Roman script. Kuo-Chin Fan, Chi- structures is called physical or geometric layout analysis, Hwa Liu, Yuan-Kai Wang [15] have implemented a feature- while assigning different logical roles to the detected regions based document analysis system which utilizes domain is termed as logical layout analysis. knowledge to segment and classify mixed text/graphics/image The purpose of document-image analysis is to transform documents. This method is only suitable for pure text or image the information contained on a digitized document image into document, i.e. a document which has only text region or image an equivalent symbolic representation. Text parts are the main region. This method is good for text-image identification not information carriers in most applications. For that purpose, it for extraction. is necessary to locate text objects within the image, recognize The Constrained Run-Length Algorithm (CRLA) [16] is a them, and extract the hidden information. The documents well-known technique for page segmentation. The algorithm may contain, besides text, graphics and images that overlap. is very efficient for partitioning documents with Manhattan Since text lines are not always horizontally aligned, finding layouts but not suited to deal with complex layout pages, text parts and locating characters, words, and lines are not e.g. irregular graphics embedded in a text paragraph. Its main trivial tasks. Due to the tremendous reduction in the storage drawback is the use of only local information during the space of the processed results, it is advantageous to smearing stage, which may lead to erroneous linkage of text reproduce, transmit, and store the document in the processed and graphics. Kuo-Chin Fan, Liang-Shen Wang, Yuan-Kai form. The extracted regions can then be processed by a Wang [17] proposed an intelligent document analysis system subsequent step according to their types, e.g. OCR for text to achieve the document segmentation and identification regions and compression for graphics and halftone goal. The proposed system consists of two modules: block images.Up to now several strategies have been tried to solve segmentation and block identification. Two kinds of features, the problem of segmentation. Techniques for page connectivity histogram and multi resolution features are segmentation and layout analysis are broadly divided in to extracted. © 2012 ACEEE 10 DOI: 01.IJSIP.03.01.70
  • 2. ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012 II. METHODOLOGYI A. DOCUMENT SEGMENTATION The main aim of document segmentation is to segment a document into several separate blocks with each block representing one type of medium.The method we adopted in segmenting documents is a combination of run-length smearing algorithm and boundary perimeter detection procedure. It first performs the smearing operation in both the horizontal and vertical directions to generate blocks. Due to the selection of an improper threshold in the run-length smearing process, an intact paragraph might be segmented into several consecutive horizontal stripes with each stripe representing one horizontal text line. The stripe merging Figure2. Image after horizontal run length smearing procedure is thus devised to merge those text stripes that Document image is usually captured as colored image belong to the same paragraph. The merit is that it generates (RGB) and we convert it into Gray level image. image. Hence, an intact text block instead of several smaller text stripes. By a binarization procedure converting a gray-level image into a this way, it not only saves storage space but also reduces binary image is necessary. OTSU Document image is usually the burden in performing optical character recognition. captured as colored image (RGB) and we convert it into Gray level image. Thresholding is utilized to accomplish the B. PRE-PROCESSING conversion task. Figure 1, shows the original and binarized Preprocessing of document images is the way of using image. mature image processing techniques to improve the quality of images. Its purpose is to enhance and extract useful C. BLOCK EXTRACTION information of images for later processing purposes. Two With the pre-processing being done, a binarized image is preprocessing tasks, thresholding and noise removal, are then obtained. In this binarized image, each meaningful block performed here. which can be easily recognized by human beings is composed of pixels. RLSA is an operation to connect two nonadjacent runs into one merged run if the distance between these two runs is smaller than a threshold. It is assumed that white pixels are represented by 0 and black pixels by 1. If the number of 0 between l’s is less than or equal to a constant C, then 0 is replaced by 1. In other words, two runs having distance smaller than the threshold C will be merged into one run. Example Before smearing: 1111111000001111111100011 After smearing: 1111111000001111111111111 The result generated by the smearing operation is several l- runs in each horizontal row. Two constants CHT (Constant Horizontal threshold value) and CVT (Constant Vertical threshold value) are needed due to the processing of RLSA in two directions. CHT selected as half of CVT. Figure 2 and 3 illustrate the operation of RLSA in two directions i.e. horizontal and vertical directions. The results generated by horizontal and vertical smearing operations are then combined by logical AND operation to produce the meaningful blocks. In other words, a pixel in the resulting image is black if the pixels at the same position of both vertical and horizontal Run-length smearing images are black. Though run length smearing can combine related pixels into meaningful blocks, there are still some small blocks which should be further combined. We repeatedly apply run length Figure1. Original color image and Binarized image. smearing with increased runlengths to the output of AND operation to merge these blochs. An image illustrating the result generated by RLSA is shown in Figure 4. © 2012 ACEEE 11 DOI: 01.IJSIP.03.01.70
  • 3. ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012 D. BOUNDARY/PERIMETER DETECTION Since we have obtained meaningful blocks, the next step is to find the outside boundary of smearing blocks. Outside boundary is defined as the white pixels surrounding the extracted boundary of a block. The traditional edge detection methods are not adequate for detecting this kind of boundary. For example, if traditional edge detection methods are operated on a one-pixel-width line block open contour will be generated. Figure6. Four possible search Direction. We use 4-connectivity as well as 8-connectivity for bound- ary extraction. It is observed that 4-connectivity gives batter results. Figure 6 shows the four possible search directions. A pixel is considered to be a part of the perimeter, if it is nonzero and it is connected to at least one nonzero value. Connectivity can also be defined in a more general way for any dimension by using connectivity for a 3-by-3 matrix of 0’s and 1’s. The 1-valued elements define neighborhood locations relative to the center element of connectivity. Note that connectivity must be symmetric about its center ele- ment. Figure 7 shows the image after boundary detection. Figure3. Image after vertical run length smearing E. CONNECTED COMPONENT AND AREA COMPUTATION After detection of boundary from the image, we find the connected component. Then, with the help of connected component we compute the area of closed loop. From Figure 6 it is clear that the text which is converted into uniform stripes has uniform area. When we compare the area of the closed loop (stripes which form by run length smearing) with open loop area then, it fills Zero in smaller area. Figure 7 shows the smaller area which is filled with zero or black pixel. Figure4. Final Result of Run length smearing. Figure7. Image after Boundary Detection. To find the connected component the algorithm uses the following general procedure: 1. Scan all image pixels, assigning preliminary labels to nonzero Figure5.Image after reapplying horizontal run length smearing pixels and recording label equivalences in a union-find table. 2. Resolve the equivalence classes using the union-find algorithm. 3. Relabel the pixels based on the resolved equivalence classes. © 2012 ACEEE 12 DOI: 01.IJSIP.03.01.70
  • 4. ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012 F. IMAGE-TEXT SEPARATION CONCLUSIONS The text areas are thus filled with zero or black pixel. By Choice of the segmentation is very important step in the ORing the Original binary image with image so obtained entire separation of newspaper and magazine document images. text is separated from the original images. This is shown in This choice is based on the quality of the input image, the Figure 9. After separation of text, we XOR the image in Figure required output quality and speed of processing. Run length 9 with the image in Figure 3, to separated image/graphics smearing algorithm using boundary detection techniques are from the original binary document. If some big text size is still found to have good performance for the images having good associated with separated image then we repeat the run length separation between the text and the images pixels. Run length smearing operation for the document image. The separated smearing algorithm and recursive segmentation technique image is shown in Figure 10. Results for two more samples are adopted in the segmentation stage to extract non- are given in Figure 11 and Figure 12. Text and image parts are overlapping blocks embedded in the document. clearly separated. The Enhanced CRLA has been chosen to build a number of document processing systems because of its advantages compared with other page segmentation techniques. For example, although the texture- analysis-based approaches are powerful to handle various page layouts, they are commonly time-consuming because of the pixel-level classification. The methods based on connected component analysis may have problems to extract large headline characters and thus they suit to deal with documents of certain character size. However, the original CRLA can only treat Manhattan page format; the present work extends its capability to cover both Manhattan and non-Manhattan layout and thus expands its application domain significantly. But the range Figure8. Smaller Area filled with Zero smearing of mean length of horizontal black runs (MBRL) and White- black transition count per unit width (MTC) in CRLA is not suitable for all type of document images. To improve the performance of these techniques our method is implemented and it works well in case of all type of document images and works on text in several languages i.e. Hindi, English, Bangla, Telugu, Chinese. This method is language independent method. If we see Projection profile method [1], [13] it is only applicable for Devanagari Document images. It needs that the layout of newspaper document image is very specific. Otherwise it will not separate the text-image region. Run length smearing using stripe merging method is only suitable when stripes formed during rum length smearing are perfect rectangle. Figure9. Text Extracted from given Document smearing. In our text-image separation system using boundary detection, there is no need of skew correction. Without skew correction it can work properly. Also, there is no requirement of labeling different sizes of text and images in the given documents. It can easily separate the text and image from document image. The method can be used recursively if the separated image contains some residue text. This system provides a good platform for implementing segmentation techniques suitable for developing real time processing techniques and processing large databases of newspaper and magazine document images. Figure10. Image Extracted from given Document Image © 2012 ACEEE 13 DOI: 01.IJSIP.03.01.70
  • 5. ACEEE Int. J. on Signal & Image Processing, Vol. 03, No. 01, Jan 2012 REFERENCES [9] V Chew Lim Tan, Zheng Zhang, “Text block segmentation using [1] Swapnil Khedekar Vemulapati Ramanaprasad Srirangaraj Setlur, pyramid structure”, Proceedings of SPIE, 4307, 297, 2000 “Text - Image Separation in Devanagari Documents”, Proceedings [10] R. M. K. Sinha, Veena Bansal, “On Devanagari Document of the Seventh International Conference on Document Analysis Processing”, IEEE International Conference on System Man, and and Recognition (ICDAR’03), 2003 Cybernetics, 22-25 October 1995. [2] Q. Yuan, C.L. Tan, “Text Extraction from Gray Scale Document [11] P. Mitchell, H. Yan, “Newspaper document analysis featuring Images Using Edge Information”. Proceedings of the International connected line segmentation”, Proceedings of International Conference on Document Analysis and Recognition, ICDAR’01, Conference on on Document Analysis and Recognition, ICDAR’01, Seattle, USA, pp. 302-306 September 10- 13, 2001 Seattle, USA, 2001. [3] A. Antonacopoulos and R T Ritchings “Segmentation and [12] T. Perroud, K. Sobottka, and H. Bunke, “Text extraction from Classification of Document Images”, The Institution of Electrical color documents clustering approaches in three and four Engineers, U.K. 1995 Dimensions”, Sixth International Conference on Document Analysis [4] G. Nagy, S. Seth, “Hierarchical Representation of Optically and Recognition (ICDAR’01), pp 937-941, September 10-13, 2001. Scanned Documents”. Proceedings of 7th Intl. Conf. on Pattern [13] Abdel Wahab Zramdini and Rolf Ingold, “Optical font Recognition, Montreal, Canada, pp. 347-349, 1984. recognition from projection profiles”, Proceedings of Electronic [5] Kyong-Ho Lee, Student Yoon-Chul Choy, and Sung-Bae Cho, “ Publishing. Vol. 6(3), pp.249–260, September, 1993. Geometric Structure Analysis of Document Images: A Knowledge- [14] Dimitrios Drivas and Adnan Amin, “Page Segmentation and Based Approach”, IEEE transactions on Pattern Analysis and Classification Utilizing Bottom-Up Approach”, IEEE International Machine Intelligence, Vol. 22, No. 11, November 2000. Conference on multimedia and expo, Taipei, Taiwan, June 1995. [6] Jean Duong, Hubert Emptoz, “Features for Printed Document [15] Kuo-Chin Fan, Chi-Hwa Liu, Yuan-Kai Wang, “Segmentation Image Analysis”, IEEE Transaction on Document Image Analysis and classification of mixed text/graphics/image documents”, Pattern Vol. 02, No. 17 November 2002. Recognition Letters, Elsevier, pp. 1201-1209, December 1994. [7] Nikoluos G. Bourbakis, “A Methodology of Separating Images [16] Hung-Ming Sun, “Enhanced Constrained Run-Length from Text Using an OCR Approach”, Binghamton University, Algorithm for Complex Layout Document Processing”, International Center for Intelligent Systems, Binghamton, NY 13902. Journal of Applied Science and Engineering pp. 297-309, 2006. [8] Karl Tombre, Salvatore Tabbone, Loïc Pélissier, Bart Lamiroy, [17] Kuo-Chin Fan, Liang-Shen Wang, Yuan-Kai Wang , “Page and Philippe, “Text/Graphics Separation Revisited” Proceedings segmentation and identification for intelligent signal processing”, of the 5th International Workshop on Document Analysis Systems, Signal Processing, Elsevier, pp. 329-346, 1995. 2002. © 2012 ACEEE 14 DOI: 01.IJSIP.03.01.70