Printed Telugu Numeral Recognition based on Structural, Skeleton and Water Reservoir Features
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 10, Issue 7
Abstract
Selection of feature extraction method is most important factor in achieving high recognition performance in automatic numeral recognition systems In this paper, a new proposed system for Telugu printed numeral characters recognition using number of contours, skeleton feature, water reservoir features, and ratio of length of Top line to bottom line of the image. Printed Telugu numerals are scan converted to binary images and extract the features irrespective of size of the image. The proposed method is applied with success to a database of 3150 printed multi-font printed Telugu numerals The recognition accuracy is achieved 100%. The experimental results obtained are encouraging and comparable with other methods found in literature survey. The novelty of the proposed method is free from size normalization and without classification method.
Authors and Affiliations
Y V V Satyanarayana, U. Ravi Babu, S Maruthu Permal
Rearranging the pixel using Log-Cumulant Parameter Estimator and Healing of Restoration Technique
Using second-kind statistics technique noise reduction is not mile stone in the field of image processing, the log-cumulant estimator is proposed for pixel parameter estimation of the log-normal distribution in medical i...
Sparsity based Single Object Tracking
Object tracking has importance in various video processing applications like video surveillance, perceptual user interface driver assistance, tracking etc. This paper deals with a new tracking technique that combines the...
EFFICIENT DESIGN OF STORAGE AND RETRIEVAL METHODS
The paper demonstrates the viability of a number of storage techniques such as hashing using multilingual texts. The empirical studies of hashing techniques based on multilingual provide researchers with insight informat...
Providing Security in Data Aggregation using RSA algorithm
The RSA algorithm proposed by Rivest, Adi Shamir and Leonard Adleman is cryptography technique. The current problem with wireless sensor network is how to protect the security of the sensor data. RSA algoritm is used a...
Identifying Network Anomalies Using Clustering Technique in Weblog Data
In this paper we present an approach for identifying networkanomalies by visualizing network flow data which is stored inweblogs. Various clustering techniques can be used to identifydifferent anomalies in the network. H...