A Review of Optical Character Recognition System forRecognition of Printed Text
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: As we move ahead in technology advancements, from simple data processing, to intelligentcomputing, one area of research undergoing advancement, is the system of reading text characters on an image.Optical Character Recognition (OCR) system is used for converting text characters on images into computereditable text characters. It includes steps such as Image acquisition, pre-processing of the image, segmentationof lines and characters, recognition of characters, and finally application. The image acquisition stepdetermines the method for obtaining the image. Pre- processing of image includes enhancement of the image tomake it suitable for recognition. Segmentation is the extraction of the character part of the image. Recognitionis the comparison of the sample image with the template image. This paper focuses on the OCR system andincludes information regarding the various operations that may be performed on the image for the recognitionof characters
Authors and Affiliations
Rajas Kiran Jambekar
Analysis of blood samples for counting leukemia cells using Support vector machine and nearest neighbour
Abstract: analysis of blood samples for counting leukemia cells is discussed in this paper. support vector machine and nearest neighbour concept is presented in this paper. The identification of blood disorders,...
Educational Process Mining-Different Perspectives
Process mining methods have in recent years enabled the development of more sophisticated Process models which represent and detect a broader range of student behaviors than was previously possible. This pa...
Implementation of Network Security in Mobile AD-HOC Networks using Multilevel Encryption Techniques
When we are sending a secret information fromsource to destination over a wireless network, safe and secure transmission is a critical issue. An ad-hoc network is a set of wireless nodes and any type of central control o...
An Attack-resistant Watermark Resynchronization Scheme using LDFT and BSP
Abstract: Image watermarking is a method that embeds a watermark in the digital image by making small changes in the host data. In watermarking applications, the robustness of the watermark to the common signal processin...
Improving Data Storage Security in Cloud Computing UsingElliptic Curve Cryptography
Abstract: Companies tends towards more availability, less cost, managed risk, agility- all of which areproviding by cloud computing. The cloud computing is a way to deliver IT services on demand and pay perusage, and it...