1 Iterative Multimodel Subimage Binarization for Handwritten Character Segmentation Author: Amer Dawoud and Mohamed S. Kamel Source: IEEE TRANSACTIONS.

Slides:



Advertisements
Similar presentations
Applications of one-class classification
Advertisements

QR Code Recognition Based On Image Processing
Word Spotting DTW.
1 Adjustable prediction-based reversible data hiding Authors: Chin-Feng Lee and Hsing-Ling Chen Source: Digital Signal Processing, Vol. 22, No. 6, pp.
A High Performance Multi-layer Reversible Data Hiding Scheme Using Two-Step Embedding Authors: Jinxiang Wang Jiangqun Ni Jinwei Pan.
電腦視覺 Computer and Robot Vision I Chapter2: Binary Machine Vision: Thresholding and Segmentation Instructor: Shih-Shinh Huang 1.
Source: Signal Processing, Vol. 89, Issue 6, June 2009, Pages Author: Piyu Tsai, Yu-Chen Hu, and Hsui-Lien Yeh Speaker: Hon-Hang Chang Date:
Steganography of Reversible Data Hiding Producer: Chia-Chen Lin Speaker: Paul 2013/06/26.
IEEE TCSVT 2011 Wonjun Kim Chanho Jung Changick Kim
Natural and Seamless Image Composition Wenxian Yang, Jianmin Zheng, Jianfei Cai, Senior Member, IEEE, Susanto Rahardja, Senior Member, IEEE, and Chang.
Efficient Moving Object Segmentation Algorithm Using Background Registration Technique Shao-Yi Chien, Shyh-Yih Ma, and Liang-Gee Chen, Fellow, IEEE Hsin-Hua.
Handwritten Thai Character Recognition Using Fourier Descriptors and Robust C-Prototype Olarik Surinta Supot Nitsuwat.
FEATURE EXTRACTION FOR JAVA CHARACTER RECOGNITION Rudy Adipranata, Liliana, Meiliana Indrawijaya, Gregorius Satia Budhi Informatics Department, Petra Christian.
Xiaojiang Ling CSE 668, Animate Vision Principles for 3D Image Sequences CSE Department, SUNY Buffalo
New Segmentation Methods Advisor : 丁建均 Jian-Jiun Ding Presenter : 蔡佳豪 Chia-Hao Tsai Date: Digital Image and Signal Processing Lab Graduate Institute.
1 Lossless DNA Microarray Image Compression Source: Thirty-Seventh Asilomar Conference on Signals, Systems and Computers, Vol. 2, Nov. 2003, pp
IMAGE COMPRESSION USING BTC Presented By: Akash Agrawal Guided By: Prof.R.Welekar.
Huijuan Yang, Alex C. Kot, IEEE Fellow IEEE Transactions on Multimedia, Vol. 9, No. 3, Apr Multimedia Security Final Project R 葉容瑜 R
1 Hiding Data in Images by Simple LSB Substitution Source: Pattern Recognition, Vol. 37, pp , 2004 Authors: Chi-Kwong Chan and L.M. Cheng Speaker:
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
COMPARISON OF IMAGE ANALYSIS FOR THAI HANDWRITTEN CHARACTER RECOGNITION Olarik Surinta, chatklaw Jareanpon Department of Management Information System.
Binarization of gray-scale hologram Fan Jiang Fall 2006.
On the Use of Standards for Microarray Lossless Image Compression Author :Armando J. Pinho*, Antonio R. C.Paiva, and Antonio J. R. Neves Source :IEEE TRANSACTIONS.
指導老師 : 蔡亮宙 報告者 : 黃柏愷 A new method of vehicle license plate location under complex scenes.
A New Fingertip Detection and Tracking Algorithm and Its Application on Writing-in-the-air System The th International Congress on Image and Signal.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
Adjustable prediction-based reversible data hiding Source: Authors: Reporter: Date: Digital Signal Processing, Vol. 22, No. 6, pp , 2012 Chin-Feng.
Optimization of Line Segmentation Techniques for Thai Handwritten Document Olarik Surinta Mahasarakham University Thailand.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
NTIT IMD 1 Speaker: Ching-Hao Lai( 賴璟皓 ) Author: Hongliang Bai, Junmin Zhu and Changping Liu Source: Proceedings of IEEE on Intelligent Transportation.
Zhongyan Liang, Sanyuan Zhang Under review for Journal of Zhejiang University Science C (Computers & Electronics) Publisher: Springer A Credible Tilt License.
Blind image data hiding based on self reference Source : Pattern Recognition Letters, Vol. 25, Aug. 2004, pp Authors: Yulin Wang and Alan Pearmain.
A Recognition Method of Restricted Hand Shapes in Still Image and Moving Image Hand Shapes in Still Image and Moving Image as a Man-Machine Interface Speaker.
Scene Text Extraction Using Focus of Mobile Camera Egyul Kim, SeongHun Lee, JinHyung Kim Artificial Intelligence & Pattern Recognition Lab, KAIST, Korea.
1 Reversible visible watermarking and lossless recovery of original images Source: IEEE transactions on circuits and systems for video technology, vol.
1 A Statistical Matching Method in Wavelet Domain for Handwritten Character Recognition Presented by Te-Wei Chiang July, 2005.
Shadow Detection in Remotely Sensed Images Based on Self-Adaptive Feature Selection Jiahang Liu, Tao Fang, and Deren Li IEEE TRANSACTIONS ON GEOSCIENCE.
Optical Character Recognition
Guided By: Presented By: Mr. Soumen Bag Kuldeep kumar A
Source: Pattern Recognition, 37(5), P , 2004
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
Image Retrieval Based on Regions of Interest
Face recognition using improved local texture pattern
Lossy Compression of DNA Microarray Images
Advisor: Chin-Chen Chang1, 2
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
Reversible Data Hiding in JPEG Images using Ordered Embedding
Centrality Bias Measure for High Density QR Code Module Recognition
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Source : Signal Processing Image Communication Vol. 66, pp , Aug 2018
Source: Pattern Recognition Vol. 38, May, 2005, pp
Reversible Data Hiding
Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL
Color Image Retrieval based on Primitives of Color Moments
Speaker: YI-JIA HUANG Date: 2011/12/08 Authors: C. N
A Data-Hiding Technique with Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
A new chaotic algorithm for image encryption
Data hiding method using image interpolation
Source: Pattern Recognition Letters 29 (2008)
Visual Recognition of American Sign Language Using Hidden Markov Models 문현구 문현구.
A Data-Hiding Technique With Authentication, Integration, and Confidentiality for Electronic Patient Records Chao, Hui-Mei, Hsu, Chin-Ming, and Miaou,
Source: IEEE Transactions on Circuits and Systems,
Using Association Rules as Texture features
Source: IEEE Access. (2019/05/13). DOI: /ACCESS
A Fast No Search Fractal Image Coding Method
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Source : Digital Signal Processing. Vol. 73, pp , Feb
Source: Pattern Recognition Letters, VOL. 27, Issue 13, October 2006
Color Image Retrieval based on Primitives of Color Moments
Adopting secret sharing for reversible data hiding in encrypted images
Presentation transcript:

1 Iterative Multimodel Subimage Binarization for Handwritten Character Segmentation Author: Amer Dawoud and Mohamed S. Kamel Source: IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 13, NO. 9, SEPTEMBER 2004, pp Speaker: Ching-Hao Lai( 賴璟皓 ) Date: 2004/10/13

2 Outline Introduction Iterative Multimodel Binarization Algorithm Feature Extraction Setting Rejection Criteria Selecting Subimages Optimal Thresholds Experimental Results Conclusion

3 Introduction(1/3) Existing binarization methods: Global binarization method Local binarization method A document image is divided into subimages: Image(1) Image(2) … Image(M). To find an optimal threshold for each subimage that would eliminate background noise.

4 Introduction(2/3)

5

6 Introduction(3/3) The proposed method uses multimodels to iteratively arrive at the optimal threshold for each subimage. Based on gray-level and stroke-run

7 ITERATIVE MULTIMODEL BINARIZATION ALGORITHM The subimages are then binarized at a sequence of candidate thresholds CT i, where CT 1 is the lowest possible threshold in gray-scale histogram. The difference between two successive CTs was chosen to be eight gray-levels, which we found to be satisfactory.

8 Feature Extraction When CTi failed to eliminate the background noise in Image (x). We want to infer such failure by comparing features of the binarized Image (x) with those of the other subimages. Features: Gray-Level Features Stroke-run Features

9 Gray-Level Feature

10 Gray-Level Feature

11 Stroke-Run Feature Stroke-Run historgram: K={1,2,…,M}, 4200 images, the longest run is 5 pixels Unit-Run:

12 Setting Rejection Criteria Stroke-Width feature: GRC: gray-level rejection criterion, SRC: stroke rejection criterion

13 Flowchart

14

15 Comparison result

16 Comparison result

17 Conclusions When applied to a set of images that represent wide range of background complexity and noise levels, the multimodel algorithm succeeded in eliminating the background, and in preserving the handwritten characters. As a result, higher recognition rate and lower substitution, insertion, and deletion error rates were achieved.