Connected Component Clustering Based Text Detection with Structure Based Partition and Grouping
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: Extraction of text from natural scene images is a challenging problem because of its complex backgrounds and large variations of text patterns. In this paper, we presents an innovative scene text detection algorithm with the help of two machine learning classifiers: one for candidate generation and the other which filters out non text ones. And the enhancement technique followed by a text string detection with arbitrary orientations based on structure- based partition and grouping. To extracted the connected components (CCs) in images an algorithm us used ,popularly known as maximally stable extremal region algorithm. These extracted CCs are partitioned into clusters and generate candidate regions. However, the methods use AdaBoost classifier to training the samples and improve the text detection accuracy. The scale, skew, and color of each candidate can be estimated from CCs, and filtered the non text from the normalized images. To find the text string consists of two steps: A) Image partition to detect the text character candidates by using gradient magnitude of character components and B)Text character grouping to detect text strings by using structural analysis of text characters and then merges them into text string for example size of character,distance between neighboring characters.To improve efficiency and accuracy, our algorithms are carried out in multi-scales. The proposed system yield very high identification accuracy and take less time for detection as compared to the existing system.
Authors and Affiliations
Feby Ashraf , M-Tech student , Nurjahan V A
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Multicast Conventions
Ad-hoc networks have mass of applications; though, a dynamic problem regarding their security aspects must be answered in order to realize these applications. Validating the source and ensuring the integrity &nbs...
A Coalitional Game Approach for Packet Delivery in Mobile Adhoc Network
A coalitional game is residential to study the actions of the rational mobile nodes for supportive packet delivery. We consider the problem of supportive packet delivery to mobile nodes in a cross wireless mobile n...
Gender classification using face image and voice
Abstract: This paper is about gender classification using face image and voice of a speaker. The basic aim of the paper is to predict the gender of speaker through voice sample using Auto-correlation method and predict t...
Attack Determination and its Security Analysis for Personal Communication in VoIP Networks
Voice over Internet Protocol (VoIP) is a technology that enables one to make and receive calls through the Internet instead of using the traditional analog PSTN (Public Switched Telephone Network) lines.Gtalk and...
Framework of Security Mechanisms for Monitoring Adaptive Distributed Systems
Abstract: The distributed systems have a noteworthy role in today’s information technology, whether it is governmental or nongovernmental organizations. The major concern of today’s software industry is that dealing with...