Soumya A1 and G Hemantha Kumar2
1
Dept. of Computer Science & Engg,
R V College of Engineering, Bangalore, India
[email protected]
2
Dept. of Studies in Computer Science,
University of Mysore, Mysore, India
[email protected]
ABSTRACT
Document Analysis and Recognition (DAR) aims to extract automatically the information in the
document and also addresses to human comprehension. The automatic processing of degraded
historical documents are applications of document image analysis field which is confronted with
many difficulties due to the storage condition and the complexity of the script. The main interest
of enhancement of historical documents is to remove undesirable statistics that appear in the
background and highlight the foreground, so as to enable automatic recognition of documents
with high accuracy. This paper addresses pre-processing and segmentation of ancient scripts,
as an initial step to automate the task of an epigraphist in reading and deciphering inscriptions.
Pre-processing involves, enhancement of degraded ancient document images which is achieved
through four different Spatial filtering methods for smoothing or sharpening namely Median,
Gaussian blur, Mean and Bilateral filter, with different mask sizes. This is followed by
binarization of the enhanced image to highlight the foreground information, using Otsu
thresholding algorithm. In the second phase Segmentation is carried out using Drop Fall and
WaterReservoir approaches, to obtain sampled characters, which can be used in later stages of
OCR. The system showed good results when tested on the nearly 150 samples of varying
degraded epigraphic images and works well giving better enhanced output for, 4x4 mask size
for Median filter, 2x2 mask size for Gaussian blur, 4x4 mask size for Mean and Bilateral filter.
The system can effectively sample characters from enhanced images, giving a segmentation rate
of 85%-90% for Drop Fall and 85%-90% for Water Reservoir techniques respectively.
KEYWORDS
Document Analysis, Preprocessing, Filters, Segmentation, Drop Fall Technique, Water
Reservoir Technique
1. INTRODUCTION
A generic Optical Character Recognition (OCR) system comprises of different stages like
preprocessing, segmentation, feature extraction and classification. Preprocessing is one of the
most interesting and challenging topics in DAR. Preprocessing of document involves converting
scanned images or photographed images of machine printed or handwritten text which may
David C. Wyld et al. (Eds) : ACITY, DPPR, VLSI, WiMNET, AIAA, CNDC - 2015
pp. 95–113, 2015. © CS & IT-CSCP 2015
DOI : 10.5121/csit.2015.51309
96
Computer Science & Information Technology (CS & IT)
include numbers, letters and symbols into system processable format. Segmentation is an
important assignment of any OCR system and it separates the image text documents into
lines,words and characters. Hence the accuracy of OCR system primarily depends on the
segmentation algorithm been used.
Segmentation of handwritten text of Indian languages is challenging when compared with Latin
based languages because of its structural complication and presence of compound characters.
This complexity increases further if were to recognize text of ancient Indian or non-Indian
epigraphical documents. The epigraphical records engraved on stones, rocks, pillars or on some
other writing material are non-linear in their shapes and non-uniform in their sizes.
Raw image of an epigraph contains unwanted symbols or marks, noise embedded and text
engraved with much skew.The spacing between characters and also between the lines and the
skew could complicate the process of translating the scripts. Some touching lines as well as
characters complicates the process of segmentation which is input for the recognition process in
the later stages. Hence the input document image of epigraphs is to be preprocessed for removal
of noise, skew detection and correction, followed by segmentation of characters [1].
Inspite of several positive works on OCR across the world, development of OCR tools in Indian
languages is still a challenging task. Character segmentation plays an important role in character
recognition since incorrectly segmented characters are susceptible to be recognized wrongly.
Hence the proposed work focuses on preprocessing and segmentation of ancient handwritten
documents. This is an initial step towards developing OCR for ancient scripts, which can be used
by archaeologists and historians for digitization and further exploration of ancient records.
This paper is organized as follows: Section 2 elaborates the related works in the field. The system
architecture is highlighted Section 3. The theory and related mathematical background of the
approaches in current system is discussed in Section 4. Methodology is given in Section 5.
Experimental results and performance analysis is covered in Section 6 and Section 7 provides
conclusion.
2. RELATED WORK
Researchers have worked on many approaches for preprocessing and segmentation of various
languages. In this section, some of the works are discussed.
The linear Unsharp Masking (USM) technique [2] is adopted to increase the pictorial presence of
an image by highlighting its regularity contents to improve the edge and detailed information in
it. Nevertheless this method is easy and gives good result for many applications. It has two
limitations, one it is tremendously sensitive to noise and other one is that it increases high
contrast areas much more than area that do not show high image dynamics. Therefore output
image suffers from unkind overshoot objects. Adaptive Unsharp Masking hires an adaptive filter
that controls the contribution of sharpening in the manner that contrast enhancement occurs in
high dense areas and less or no image sharpening occurs in soft areas. This algorithm is better
compared with several other methods available in linear unsharp masking filter technologies.
Binarization is the initial step for processing, with the fact of degradation of the source document,
whichever global or local thresholding approaches are chosen. The Otsu thresholding algorithm
Computer Science & Information Technology (CS & IT)
97
[3] using the histogram shape analysis, which is most widespread global binarization algorithm.
The thresholding of Otsu yields a promising performance when the histogram has twin modal
distribution. The global threshold is designated automatically by a discriminant standard.
Another method utilize image contrast defined as local image minimum and maximum when
compared with the image gradient process, the image contrast derived by the local maximum and
minimum process has a good property and it is more tolerant to the uneven illumination,
document degradation such as smudge [4]. This method is superior when handling document
images with difficult background variation. Finally, the ancient document image is binarized
based on the local thresholds that are derived from the detected high contrast image pixels when
the same is compared with previous method based on image contrast, the method uses the image
contrast to recognize the text stroke boundary and it can be used to produce high accurate
binarization results.
A common technique for scrubbing the degraded documents is modified iterative global
threshold algorithm [5]. A best approach in the separation of object information from foreground
is to compute a global threshold of intensity value based on which two clusters can be diverted. It
is an iteration approach which can handle many degraded conditions. In each iteration the
intermediate tones are shifted towards background there by providing efficient difference
between foreground and background. It is mostly useful for the documents having non-uniform
distribution of noises.
In order to make foreground inscriptions clearly visible from background, Histogram
normalization is used. The image obtained still may suffer from uneven background intensity
variation which in turn reduces the clarity of the foreground. Further processing of image is done
to get an image with better foreground information. As the intensity of the foreground pixels
differs from the intensity of background, this key factor is used to identify the foreground
characters. The main criteria is to find a threshold value which causes the image components to
lie in one of two levels L0, which is below the threshold value and L1, which is above the
threshold value. The pixels which are above the threshold value represent the nodes of a graph.
The nodes form the basis for representing the foreground. The nodes that are neighbors in the
sampling grid are joined by an edge [6].
This technique is used to reduce the number of pixels in the image by a factor of 4 or 8, which in
turn will decrease the number of pixels that has to be processed. The image is represented as a
graph by associating each pixel to a vertex of a graph and connecting the pixels that are neighbors
in the sampling grid by an edge. The gray value of the pixel is considered as an attribute of the
vertex. Since the image is of finite size so also the graph. Pixels represent the finite regions and
vertices represent the faces. The dual of this graph represents borders of the faces which are interpixel edges and vertices. Dual graph pyramids are constructed by adopting bottom-up approach.
Each level of pyramid represents an adjacency graph where vertices correspond to regions and
edges represent the relation between the regions [7].
The procedure of segmentation has huge importance in the handwritten script identification. Thus
an abundant study of research outcome in related segmentation field was surveyed. The algorithm
based on connected components [8], segmenting the document image into non-overlapping equiwidth vertical zones.
98
Computer Science & Information Technology (CS & IT)
A method is to decrease the noise level, which is existing in the distorted image is proposed in
[9]. The distorted image will be first binarized using the threshold, which is determined by the
Otsu’s method. Next for each pixel p(x, y) estimate the horizontal and vertical run length count.
If horizontal and vertical run length count is less than a specified threshold then it is assumed to
be noise and will be eliminated.
Gaussian kernel is a linear operation; convolution is used to find the common area between the
profile and the Gaussian kernel. The degree of shift in the Gaussian kernel during the convolution
process linearly varies with horizontal profile information. So this can be used to represent
randomness in the profile and provides a zero crossing smooth curve, when it is convolved with
the profile, represented by ‘C’. The peaks which are above zero are treated as the gaps between
the lines. Based on this information, the line segmentation is performed [10].
Another method for segmentation is nearest neighbor algorithm [11] which is iterative in nature
scans the character from the top left portion of the image. When it reaches a first black pixel, then
the first symbol is identified through the connected component. If it is found to be the first
character of the script, then it will be placed as the first character of the new line used for placing
the character segmentation. The centroid of the character is calculated and stored in an array
separation the x and y coordinators. The document is again scanned from left top to locate the
next black pixel and hence the next character in the document. The centroid of the character also
computed. The distance between the centroid is computed using the distance formula. If the
distance is less than or equal to threshold value then the character is assume to lie on same line.
Otherwise the character is consider being the part of the next line and transferred to the next line
in the result part. This process is continued until all the characters are scanned and whole image
has been traversed. At the end of the iterative algorithm the separated lines are obtained from the
source. The individual character can also be obtained in this process itself.
Text line segmentation is necessary to detect all text regions in the document image. The
algorithm based on multiple histogram projections using morphological operators to extract
features of the image. Horizontal projection is performed on the text image, and then line
segments are identified by the peaks in the horizontal projection. Threshold applied to divide the
text image into segments. False lines are eliminated using other threshold. Vertical histogram
projections are used for the line segments and decomposed into words using threshold and further
decomposed to characters. This kind of approach provides best performance based on the
experimental results such as Detection rate DR (98%) and Recognition Accuracy RA (98%)
[12,13].
Contour tracing is a technique applied to digital images for extracting the boundary of any object.
This kind of system applies one of the recent contour tracing algorithms to separate character by
using the Theo Pavlidis’s algorithm [15]. It works with 4-connected patterns. The width of the
segmented components from this process is checked. If it is more than the criteria value of the
average width of the components, it will be processed in the next stage. This means there are
some touching characters that are not separated [14].
Tracing of Background Skeleton approach, is applied to separate some touching components to
segment touching characters, background skeleton is processed by using the Zhang-Suen thinning
algorithm. Then, contour tracing algorithm is applied to abstract the skeleton of the background.
Subsequently, the characters in each line will be sorted by checking the column position in order
Computer Science & Information Technology (CS & IT)
99
to determine the sequence of the characters. This is applied to practical data from ancient
documents [15, 16].
Enhanced stroke filter have shifted the attention to the skeletons of potential strokes. In this
manner, the task of distinguishing strokes from a complicated background is converted to the task
of comparing the difference between skeletons of potential strokes and those of disturbing
patches, both of which can be extracted from the resulting images of previous Stroke filters.
Skeleton constraints such as length and width constraints can be introduced into the method to
enhance stroke information [17].
For the segmentation of unconstrained handwritten connected numerals, Water Reservoir
technique is used. A reservoir location and size, touching position (top, middle or bottom) is
decided. Analyzing the reservoir boundary, touching position and topological structures of the
touching pattern, the best cutting point and then the cutting path for segmentation is generated
[18].
Segmented linked characters are critical preprocessing steps in character recognition applications.
Old drop fall algorithm has proved to be an efficient segmenting method due to its simplicity and
effectiveness. However it is subject to small convexes on the contour of characters. Xiujuan
Wang, Kangfeng Zheng, and Jun Guo presented Innertial Drop fall algorithm and big drop fall
algorithm to avoid this defect [19, 20, 21].
3. SYSTEM ARCHITECTURE
The system “Enhancement and Segmentation of Historical Records” designed, mainly consists of
the subcomponents - Preprocessing and Segmentation as shown in Figure 1. The input to the
system is ancient epigraphic documents of varying amount of degradation.
•
Image Enhancement : This sub system enhances the quality of the ancient document
images by reducing noise. This is carried out by providing four different filtering options
of various filter sizes.
•
Binarization: This sub-system converts RGB images to binary images using
thresholding technique known as Otsu algorithm.
•
Segmentation: This sub-system samples out characters from the ancient documents and
is achieved through Drop Fall and Water reservoir techniques.
100
Computer Science & Information Technology (CS & IT)
Figure 1. Enhancement and Segmentation System
4. REVIEW ON THE APPROACHES USED IN PROPOSED SYSTEM
The methods used in current system are described in this section:
Preprocessing stage of degraded ancient document images includes: enhancement and reduction
in noise, which is achieved through different filtering methods for smoothing or sharpening
namely Bilateral, Mean, Median, and Gaussian Blur Filters. These filters are provided with
different mask sizes and parameter values. This is followed by binarization of the enhanced
image to highlight the foreground information, using Otsu thresholding algorithm. Character
segmentation is performed based on Drop Fall and Water Reservoir concept.
4.1 Mean Filter
The mean filter is a sliding-window longitudinal filter that exchanges the center value in the
window with the average (mean) of all the pixel values in that window [22]. Let Sxy represent
the set of coordinates in a rectangular sub image window of size m x n, centered at point (x, y).
The arithmetic mean filtering process computes the average value of the corrupted image g(x, y)
in that area defined by Sxy. The restored image value at any point (x, y) is merely the arithmetic
mean calculated using the pixel in that region, indicated in Equation 1.
,
=
, ∈
,
(1)
This operation can be applied using a convolution mask in which all coefficients have value
1/mn. Mean Filters smoothes local variations in an image and as a result of blurring, noise is
reduced.
4.2 Median Filter
In image processing, neighborhood averaging is the best method to perform the noise reduction,
whereas the method can overturn isolated out of range noise, however the adverse effect is that it
also distorts sudden changes such as sharp edges. The median filter can suppress the noise
without damaging the sharp edges. In median filtering, all the pixel values are first sorted into
numerical order and then replaced with the middle pixel value [22].
Computer Science & Information Technology (CS & IT)
101
Let y be a pixel location and w a neighborhood centered on location (m, n) in the image, therefore
median filter is given by Equation 2,
y [m, n]=median{x[ i ,j], ( i , j) belongs to w}
(2)
Subsequently the pixel y [m, n] represents the location of the pixel y, m and n represents the x
and y co-ordinates of pixel y. w represents the neighborhood pixels surrounding the pixel position
at (m, n), (i, j) belongs to the same neighborhood centered on (m, n). Hence the median method
will take the median of all the pixels within the range of (i, j) represented by x [i, j].
4.3 Gaussian blur Filter
A Gaussian blur or Gaussian smoothing involves blurring an image by Gaussian function and
used to decrease image noise and image details. Gaussian smoothing is used as a preprocessing
stage in computer vision algorithms in order to enhance image structures at different scales. The
2- dimension Gaussian function is given by Equation 3.
G x, y < −
e
!"
(3)
where x is the distance from the origin (Horizontal axis), y is the distance from the origin
(vertical axis), and
is the standard deviation of the Gaussian distribution. The standard
deviation of the Gaussian determines the amount of smoothing [22].
4.4 Bilateral Filter
Bilateral filter [23] is a non linear filter in spatial domain, which does averaging without
smoothing the edges. The bilateral filter inputs a weighted sum of the pixels in a local
neighborhood; the weights depend on both the spatial distance and the intensity distance.
Essentially the bilateral filter has weights as a product of two Gaussian filter weights, one of
which corresponds to average intensity in a spatial domain, and second weight corresponds to the
intensity difference. Hence no smoothing occurs, when one of the weights is close to 0, which
means the product becomes insignificant around the region where intensity changes swiftly,
which represents usually the sharp edges. As a result, the bilateral filter preserves sharp edges
[28]. Pixel location x, bilateral filter output is given in Equation 4
#$ =
%
(∈. )
&
||( )||
*+
− &
|, (
, ) |
*-
#
(4)
There parameters controlling the fall-off of weights in spatial and intensity domains, respectively.
And are inputs and output images respectively are spatial neighborhood of pixel I(x), and C can
be given as
/=
(∈. )
&
||( )||
*+
− &
|, (
, ) |
*-
(5)
4.5 Otsu’s Method of Binarization
Binarization is the method of converting a grey scale image to a binary image by using threshold
selection procedures to categorize the pixels of an image into either one of the two classes.
Binarization of the image using Otsu method [23] is used to automatically accomplish histogram
shape-based image thresholding or the decrease of a gray level image to a binary image. This
algorithm adopts that the image as thresholded contains two classes of pixels, then calculates the
102
Computer Science & Information Technology (CS & IT)
optimum threshold separating those two classes so that their combined spread (intra-class
variance) is minimal.
In an Otsu's method weighted sum of variances of the two classes is given by:
01 (t) = 2 (t) 0 (t) + 2 (t) 0 (t)
(6)
Weights 23 are the probabilities of the two classes separated by a threshold t and 03 variances
of these classes. The class probability is
04 (t) = 0 − 01 (t) = 2 (t) = 2 (t)2 (t) [µ (t) - µ
The class probability 2
]
(7)
is calculated from the histogram as t:
2 (t) =
86
7
(8)
7 : 7 ] ∕2
(9)
While the class mean µ (t) is:
µ (t) = 9
86
the value at the center of the ith histogram bin. Also can calculate < on the
where x(i) is 2
right-hand side of the histogram for bins greater than t.
4.6 Drop Fall Algorithm for Segmentation
Drop fall algorithm [24] with respect to the principle that an equally ideal cut between two
touched characters can be created, if one has to role a hypothetical marble off the top of the first
character and create the cut where the marble falls. The important things to be addressed for this
implementation are where to drop the marble from because it is important if the algorithm starts
at the wrong place. The marble can simply roll down the left side of the first digit or the right side
of the second digit and, hence, it would be completely unsuccessful. The best approach to start
drop falling process is possible to the point at which two characters are touched. In this process
the pixels are scanned row by row until a black boundry pixel with adjacent black boundry pixel
to the right of it is identified, where as the two pixels are separated by white space. This pixel is
used as a point to start the drop fall as shown in Figure 2.
Figure 2. Identification of Initial Pixel Positions
Computer Science & Information Technology (CS & IT)
103
The direction that the algorithm will move is according to the current pixel position and its
surroundings as shown in Figure 3.
Figure 3. The Principle of Drop Fall algorithm
4.7 Water Reservoir Algorithm
The larger space generated by touching characters is analyzed with the help of water reservoir
concept. The working principle of water reservoir method is illustrated in Figure 4. When water
is poured from top (bottom) of a component, the regions of the component where water will be
stored are considered as top (bottom) reservoir. Top (bottom) reservoir is the reservoir obtained
when water is poured from top (bottom). The white spaces are found in the regions in the
bounding box of the components where water can be stored. These regions are called water
reservoirs. The reservoirs obtained in this procedure are not considered for further processing.
Those reservoirs whose heights are greater than a threshold value T1 are considered for further
processing.
Figure 4. Reservoirs formed from water flow from top and bottom is shown for (a) top (b) middle and (c)
bottom touching numerals. The top Reservoirs are marked by Dots and bottom reservoirs are marked by
small line segments
104
Computer Science & Information Technology (CS & IT)
When two characters touch each other, they create a space (reservoir) between the characters.
This space is very important for segmentation because,
a) As cutting points are concentrated around the base of the reservoir, and hence, decreases the
search area.
b) The cutting points lie on base of the reservoir.
c) The space attributes (center of gravity and height) aid to go near the best touching position.
If water is poured from top (bottom) of large space created by touching (Water reservoir) Base of
the reservoir connected numeral then water will be stored in this large space. This water stored
area is named “Water Reservoir” [25]. Figure 5 illustrates the same.
Figure 5. Examples of touching numeral and Space created by the touching
Figure 6 depicts the detection of touching position recognition. The largest reservoir of the
component whose center of gravity lies in vm region is found. This reservoir is known as the best
reservoir for touching. The base-line (lowermost row of the reservoir) of the best reservoir is then
identified. The best reservoir and its base-line are shown and to find this touching position in the
components, morphological thinning operation is applied to touching components for further
processing. For feature points extraction the touching position is renowned. The leftmost and
rightmost points of the base-line of considered reservoirs are the feature points. These points are
initial feature points. With this initial feature points the best feature point (which gets maximum
confidence value) is chosen for segmentation. To calculate confidence value (CV) following
features are considered. Euclidean distance of feature points from the center of gravity of the
touching component.
Figure 6. Feature Detection Approach.
Computer Science & Information Technology (CS & IT)
105
5. PROPOSED SYSTEM AND METHODOLOGY
5.1 DFD of the Preprocessing and Segmentation System
The Data Flow Diagram(DFD) of the current system is shown in Figure 7. This work is carried
out in two phases. In the first phase - Preprocessing, the degraded ancient document image is
taken as input and it is converted to grayscale. Then the smoothing or sharpening filters, namely
Median filter, Gaussian filter, Mean filter, Bilateral filter of different mask sizes are applied to
reduce the amount of noise and thus enhances the image. Next, the enhanced image is binarized
using Ostu algorithm to differentiate background and foreground of ancient document.
In the second phase Segmentation is carried out using Drop Fall algorithm and Water Reservoir
algorithm, to obtain sampled characters, which can be used later stages of OCR.
Figure 7. DFD of the Preprocessing and Segmentation Phases
5.2 Methodology
The functionality of the phases – Preprocessing and Segmentation in detail is covered in this
section. The ancient input image is first converted to grayscale image. The image is enhanced and
noise is reduced by applying four different filters with mask size of 2x2 and 4x4. Next, The
enhanced image is converted to binary image. Lastly the characters in the document are sampled
out using Drop Fall and Water Reservoir approaches.
106
Computer Science & Information Technology (CS & IT)
5.2.1 Preprocessing
Image Enhancement
Input: Degraded Gray Scale image
Functionality: Enhances epigraphic image of medium-level degradation using
spatial filters namely Median, Gaussian blur, Mean, Bilateral filter on the input
image.
Output: The enhanced image with reduced noise.
Algorithm for Enhancement using Median filter
[Step 1]: Read the gray image.
[Step 2]: Compute y [m, n] = median{x [i, j], (i, j) belongs to w}
y be a pixel position, w represent a neighborhood centered around location (m, n) in the
image.
[Step 3]: Apply the Median filter designed over the entire input image to obtain
enhanced image.
Algorithm for Enhancement using Gaussian blur filter
[Step 1]: Read the gray image.
!"
[Step 2]: Compute& G x, y < −
e–
x is the distance from the origin (Horizontal axis), y is the distance from the origin
(vertical axis), is the standard deviation of the Gaussian distribution.
[Step 3]: Apply the Gaussian filter designed over the entire input image to obtain
enhanced image.
Algorithm for Enhancement using Mean filter
[Step 1]: Read the gray image.
[Step 2]: Compute > , < −
,
, ?
Sxy represent the set of coordinates in a rectangular subimage window of size m X n,
centered at point (x, y).
[Step 3]: Apply the Mean Filter designed over the entire input image to obtain
enhanced image.
Algorithm for Enhancement using Bilateral filter
[Step 1]: Read gray image.
[Step 2]: Compute / =
[Step 3]: Compute #$ = %
(∈. )
(∈. )
&
&
||( )||
|, ( , ) |
− &
*+
*||( )||
|, ( , ) |
− &
*+
*-
#
[Step 4]: Apply the Bilateral Filter designed over the entire input image to obtain
enhanced image.
Binarization
Input: Enhanced Image
Functionality: The enhanced images are converted to binary image consisting of
ones and zeroes.
Computer Science & Information Technology (CS & IT)
107
Output: Binarized image
Algorithm for Binarization
[Step 1]: Compute histogram and probabilities of each intensity level
[Step 2]: Initialize initial 23 0 and µ 3 (0)
[Step 3]: Compute through all possible thresholds t=1. Maximum intensity
Revise 23 and µ 3 ; Compute 04 (t)
[Step 4]: Desired threshold corresponds to the maximum 04 (t)
[Step 5]: Compute two maxima (and two corresponding thresholds). 04 (t)
[Step 6]: Compute greater max and 04 (t) is the greater or equal maximum
[Step 7]: Compute required threshold threshold1+threshold2/2
5.2.2 Segmentation
The segmentation of the document image is carried out at the character level using Drop Fall and
Water Reservoir Approaches.
Input: Binary epigraph image
Functionality: The binarized image is segmented to characters
Output: Segmented characters of the input epigraph.
Drop fall algorithm
Drop falling algorithm forms segmentation path by rolling in between two touching
characters and displays the segmented characters.
[Step 1]: Input the binary image
[Step 2]: Find the Height and Width of the touched characters
[Step 3]: Apply Breadth First Search (BFS) algorithm to find the touched characters
[Step 4]: If found start the Drop fall, the drop falling algorithm it will always move
downwards, crossways down-wards, to the right, or two the left.
[Step 5]: Make the slice where marble parks. Thus Segmentation path for connected
components is found
Water Reservoir Algorithm
[Step 1]: Find the size of the characters to find touched characters.
[Step 2]: The positions and sizes of the reservoirs are analyzed and a reservoir is detected
where touching is made, the initial feature points for segmentation are noted.
[Step 3]: The best feature points are noted from the initial feature points.
[Step 4]: Based on touching position, close loop positions and morphological structure of
touching region the cutting path is produced.
6. EXPERIMENTAL RESULTS, ANALYSIS AND DISCUSSION
6.1 Experimental Results
The system developed is tested on nearly 150 ancient epigraphic images and the results are found
to be satisfactory. The sample experimental results are depicted in following figures. Figure 8
shows the input ancient historical record, which is analysed for different spatial filtering
techniques.
108
Computer Science & Information Technology (CS & IT)
Figure 8. Input Image selected for Pre-processing
Figure 9 shows the results of color to gray scale conversion, when carried out on the image
shown in Fig 8.
Figure 9. The result of Gray Scale Conversion
Figure 10(a) and 10(b) shows the results after Median filtering, for the mask size of 2x2 and 4x4
respectively. The median filter is an effective method that can suppress isolated noise without
blurring sharp edges.
Figure 10(a). The result of Median filtering for Mask size 2x2
Figure 10(b). The result of Median Filter for Mask size 4x4
Figure 11(a) and 11(b) shows the results of Gaussian blur filtering for the mask size of 2x2 and
4x4. The Gaussian blur method is used to blur the sharpen image so that a less edge highlighted
image is produced.
Figure 11(a). The result of Gaussian Blur Filtering for Mask size 2x2
Computer Science & Information Technology (CS & IT)
109
Figure 11(b). The result of Gaussian blur Filtering for Mask size 4x4
Figure 12 shows the results of Mean filtering for the mask size of 4x4. The Mean filter is a
simple filter that replaces the center value in the window with the mean of all the pixel values in
that window.
Figure 12. The result of Mean Filtering for Mask size 4x4
Figure 13 shows the results of bilateral filtering.
Figure 13. The result of Bilateral Filtering
Figure 14 shows the result of binarization, in which the enhanced image is converted to binary
image.
Figure 14. The results of Binarization
Figure 15 and Figure 16 represents the result of Segmentation of Characters using Drop Fall
algorithm and Water Reservoir algorithm respectively.
110
Computer Science & Information Technology (CS & IT)
Figure 15. The result of Segmented Characters using Drop Fall algorithm
Figure 16. The result of Segmented Characters using Water Reservoir algorithm
6.2 Performance Analysis
The dataset includes 150 samples of medium degraded images for preprocessing and
segmentation. The performance of the 2 phases is discussed below:
Computer Science & Information Technology (CS & IT)
111
6.2.1 Filtering Techniques
This system is tested on 150 samples of medium degraded images, using four spatial filtering
techniques of varying mask sizes. The enhancement was found to be appreciable for the mask
size 4x4 for Median filter when the mask size is high then the output image will appear clear with
sharp edges. The mask size of 2x2 for Gaussian blurs results in blurred image. The mask size of
4x4 for Mean filter typically smoothens local variations in an image and noise is reduced as a
result of blurring. Bilateral filter sharpens the edges. The smoothing Gaussian filter will result in
good accuracy if the edge of the input image is very thick, where as in case of sharpening
Bilateral filter gives better output for the medium degraded images.
6.2.2 Segmentation
The system showed good results when tested on 150 varying degraded images, giving
segmentation rate of 85%-90% for Drop Fall algorithm, 85%-90% for Water Reservoir
algorithm.
Figure 17 . Segmentation Rate of Drop fall and Water Reservoir techniques
7. CONCLUSION
The system showed good results when tested on the 150 samples of varying degraded epigraphs.
It provides better enhanced output on applying filters of appropriate mask size - 4x4 mask size
for Median filter, 2x2 mask size for Gaussian blur, 4x4 mask size for Mean and Bilateral filter.
Segmentation is carried out using Drop Fall and Water Reservoir algorithms and system can
efficiently segment characters from ancient document images. System segments the compound
characters correctly when connectivity present. Few cases where in connectivity is absent,
compound character is segmented separately. Segmentation rate of 85%-90% for Drop fall
algorithm and 85%-90% for Water Reservoir algorithm is achieved.
112
Computer Science & Information Technology (CS & IT)
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
Tanzila Saba, Ghazali Sulong & Amjad Rehman, “A survey on Methods and Strategies on Touched
Characters Segmentation”, International Journal of Research and Reviews in Computer Science
(IJRRCS), Vol.1, No.2, June 2010.
M. Trentacoste et al. “Unsharp Masking, Counter shading and Halos: Enhancements or Artifacts”,
2012, The Euro graphics Association and Blackwell publishing Ltd. 2012.
Maya R. Gupta, National P. Jacobson, Eric K. Garcia, “Binarization and Image Preprocessing for
searching Historical Documents”, University of Washington, Seattle, Washington 98195, April
2006.
Bolan Su, Shijian Lu, Chew Lim Tan, “Binarization of Historical Document images Using the local
Maximum and Minimum”, pp.9-11, June 2010.
N. Venkata Rao, A.V.Srinivasa Rao, S Balaji and L. Pratap Reddy, “Cleaning of Ancient Document
Images Using Modified Iterative Global Threshold” ,IJCSI international Journal of Computer Science
Issues, Vol.8.Issue 6, No 2, pp. ISSN (online):1694-0814, November 2011.
Dr. B.P.Mallikarjunaswamy, Karunakara K, “Graph Based Approach for Background and
Segmentation of the Image”, Vol 02, pp.ISSN: 2230-8563, June 2011.
Mamatha H.R and Srikanta Murthy K, “Morphological Operations and Projection Profiles based
Segmentation of handwritten Kannada Document”, International Journal of Applied Information
System (IJAIS)-ISSN: 2249-0868 Foundation of computer Science FCS, New York, USA Vol 4N0.5, pp. 13-19, October 2012.
Das, Reddy, Govardhan, Saikrishna, ”Segmentation of Overlapping text lines, Characters in printed
Telugu text document images”, International Journal of Engineering science and technology,
Vol.2(11), pp.6606-6610, 2010.
Karthik S, Mamatha H.R, Srikanta Murth y K, “An Approach based on Run Length Count for
denoising the Kannada Characters”, Internatinal journal of Computer applications, Vol 50-No.18,
pp.0975-8887, July 2012.
N. Anupama, Ch. Rupa & Prof. E. Sreenivasa Reddy, “Character Segmentation for Telugu Image
Document using Multiple Histogram Projections”, Global Journal of Computer Science and
Technology Graphics & Vision, Vol 13, 2013.
Srinivasa Rao A.V, segmentation of ancient Telugu Text Documents, published online in MECS ,I.J.
Image, “Graphics and Signal Processing”, pp.8-14 Published Online July 2012.
Partha Pratim Roy, Umapada Pal, Josep Llados, Mathieu Delalandre, ”Multi-oriented and Mutisized
Touching Character Segmentation using Dynamic programming”, 10th international conference on
Document analysis and Recognition, DOI 10.1109/ICDAR.124 IEEE 2009.
Indu Sreedevi, Rishi Pandey, N. Jayanthi, Geetanjali Bhola, Santanu Chaudhury2, “NGFICA Based
Digitization of Historic Inscription Images, ISRN Signal Processing”, Vol 3, 2013.
Pavlidis, T. “Algorithms for Graphics and Image Processing”, Computer Science Press, Rockville,
Maryland, 2009.
Zhang, T. Y. and Suen, C. Y. “A Fast parallel algorithm for thinning digital patterns.
Communication. ACM”, Vol 3, No 27, pp 236-239, 2009.
B Gangamma,Srikanta Murthy K,Arun Vikas Singh, ”Restoration of Degraded Historical Document
Image”, Journal of Emerging Trends in computing and Information Science, Vol 3, No 5, May 2012.
Xiaoqing Lu, Zhi Tang, Yan Liu, Liangcai. “Stroke –based character segmentation of low –quality
images on ancient Chinese tablet”, 12th International conference on document Analysis and
recognition, 2013.
U. Pal, A. Belaid and Ch. Choisy “Touching numeral segmentation using water reservoir concept”,
Pattern Recognition Letters, Vol.24, pp. 262-272, 2003.
S.Khan.“Character Segmentation Heurisrtics for Check Amount Verification “Master Thesis,
Massachusetts Institute of Technology, 1998.
X.Wang, K. Zheng and J.Guo. “Inertial and Big Drop Fall Algorithm”, International Journal of
information Technology, vol.12, No.4, 2006.
Computer Science & Information Technology (CS & IT)
113
[21] Parminder Singh and Harjinder Singh, “ A Comparison of High Pass Spatial Filters using
Measurements and Automation”, Int. J. IJERT, Vol 1, May 2012.
[22] Mamatha H.R, Sonali Madireddi, Srikanta Murthy K, “Performance Analysis of various filters for
De-noising of Handwritten Kannada Documents”, International Journal of Computer Applications
(0975 – 888) Volume 48– No.12, June 2012.
[23] Messaoud, I.B, et.al. “Region Based Local Binarization approach for Handwritten Ancient
Documents, “in Int. Conf. Front. Handwrit recognit. Bari, pp.633-638, 2012.
[24] Srinivasa Rao A V, D R Sandeep, V B Sandeep,S Dhanam Jaya “Segmentation of Touching Hand
written Telugu Characters by using Drop Fall Algorithm, International Journal of Computers &
Technology, Volume 3 No. 2, OCT, 2012.
[25] Praveen kumar. C, Kiran. Y. C, “ Kannada Handwritten Character Segmentation using Water
Reservoir Method” , International Journal of Systems, Algorithms & Application 2012.