A Review on Adaptive Approach for Degraded Document Binarization
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 5
Abstract
This paper deals with an adaptive approach for binarization and enhancement of degraded documents. considerate the text from badly degraded document image is very difficult job due to high variations between the background and the foreground text of different document images. Alot of algorithms have previously been proposed for improving the thresholding of degraded document images. Not any of the algorithm can solve all types of problems, but a few of the algorithms are better than others for particular situation. There are various methodologies to improve the clarity of degraded documents such as:- Sauvola, Gato, Ni-black, Otsu etc. To remove degradations from documents like :- spoilt background, smudge, holes, gaps, irregular illumination and so on.
Authors and Affiliations
Shivani Goyal*1
Deficiency and Secure the Attack Superficies to Your Organization Localization Main DNS SERVER
The Domain Name System (DNS) numeric instead of IP address and other Organizations for network of communication of difficult to remember to use Fully Qualified Domain Name (FQDNs) and using identification of host...
Design and Fabrication of Remote Controlled Multi-Axis Operation theatre BED
The idea of this paper targets severely injured patients who have to be operated upon immediately. In critical cases, the patient is advised not to be moved frequently; but moving him from the stretcher to the ope...
Evaluating the Effects of Additives on Drilling Fluid Characteristics
Drilling fluid plays a vital role in hole cleaning, suspension of cuttings, prevent caving, and ensure the tightness of the well wall. Moreover, they also help in cooling and lubricating the drilling tool, transfe...
An Audit of Server Hardening in Multi-Tenantarchitecture System in Cloud Computing
In cloud computing, multi-tenancy is the architecture in which hardware and software can be shared with multiple users (tenant). In existing system, there is no protection on the operating system level when corpor...
Research on Analysis of Different Image Steganography Techniques
Steganography means the process of thrashing information by embedding messages within other. Information can be in the form of text, audio, video. There are several approaches for the categorization of Steganogra...