Automatic Extraction of Signatures from Bank Cheques and other Documents
|
|
|
- Audra Ellis
- 10 years ago
- Views:
Transcription
1 Automatic Extraction of Signatures from Bank Cheques and other Documents Vamsi Krishna Madasu *, Mohd. Hafizuddin Mohd. Yusof, M. Hanmandlu ß, Kurt Kubik * *Intelligent Real-Time Imaging and Sensing group, School of Information Technology and Electrical Engineering, University of Queensland, QLD 4072, Australia. {[email protected], [email protected] } Faculty of Information Technology, Multimedia University, Cyberjaya Selangor D.E., Malaysia. [email protected] ß Dept. of Electrical Engineering, I.I.T. Delhi, Hauz Khas, New Delhi ñ , India. [email protected] Abstract: An innovative approach for extracting signatures from bank cheque images and other documents is proposed based on the integration of the crop method with the sliding window technique. The idea is to estimate the approximate area in which the signature lies using the sliding window technique. In this approach, a window of adaptable height and width is moved over the image; one pixel at a time and the density of pixels within the window is calculated. This density is then used to find the entropy, which in turn helps fit the box that can segment the signature. The signatures thus extracted are then fed to a known fuzzy based off-line signature verification and forgery detection system. The proposed method has been applied with almost 100% success on several bank cheques from India, Malaysia and Australia. Signature extraction has also been shown on two typical types of documents which have varied and noisy backgrounds. Keywords: Bank cheque processing, Signature extraction, Sliding window method, Entropy 1 Introduction Automatic extraction of user entered components from bank cheques and other document forms has been the prime focus of researchers concerned with document analysis and recognition for the past one decade. Bank cheques and financial documents in paper format are still in enormous demand in spite of the overall rapid emergence of e-commerce and online banking. Fraud committed in cheques is also growing at an equally alarming rate with consequent loss [1]. The American Banker has projected that check fraud will grow by 25 percent annually in coming years. According to the American Bankers Association's (ABA) 1998 Check Fraud Survey, financial institutions alone incurred $512.3 million in check fraud losses. When losses to all businesses were factored in, that figure rose to more than $13 billion, according to a 1997 article in the St. Louis Business Journal. In this paper, we try to address the 591
2 problem of cheque fraud by trying to develop a new bank cheque processing system, which can be integrated with our earlier work on signature verification and forgery detection [2]. One of the most important tasks in automatic bank cheque processing is the extraction of handwritten signatures from bank cheques and then feeding them to an off-line signature verification system which tests the signature for authenticity. The extraction and recognition of handwritten information from a bank cheque pose a formidable task [3] which involves several subtasks such as extraction and recognition of signatures, courtesy amount, legal amount, payee and date (see Fig. 1). In one of the most pioneering works in this field, Djeziri et al. [4] tackled the problem of extracting handwritten information by means of an intuitive approach that is close to human visual perception, defining a topological criterion specific to handwritten lines which they termed as filiformity. They extracted several signatures from cheques with patterned backgrounds using this filiformity criterion. Bank s Name Check s Date Bank s Logo Payee s Name Courtesy Amount Legal Amount in text Signature Bank code and account number Fig.1. Different fields in a bank Cheque The nature of bank cheques is varied and complex and this makes the problem of automatic bank cheque processing very difficult [5]. The only way to extract signatures from bank cheques and other forms is to have some sort of prior information about the layout of the document [6,7]. In this paper, we have proposed a similar technique to approximate the area of segmentation before extracting the signatures from the region of interest. 592
3 2 System Overview The overall block diagram of our system is given in Figure 2. The first step is to scan the cheque or the form from which signature is to extracted and apply some preprocessing steps to remove the noise. The system then uses a priori knowledge about the document to determine the approximate area of interest. This is followed by the application of the sliding window technique in order to extract the signature or other user entered components. The following sections describe the individual stages of the system in more detail for the complete understanding of the system. Scanned Image Pre-processing Techniques Layout Analysis (Area Approximation) Sliding Window Technique Automatic Cropping of the Region of Interest Extraction of other fields such as Courtesy Amount, Date etc. Extraction of Signature Reference Database of Signatures Recognition and Analysis Signature Verification Fig.2. Block Diagram 3 Pre-processing Binarization is an important step in bank cheque processing. This involves removing the background and extracting useful information. For this task, we have used a B- Spline filter which employs a threshold value to segregate the background from the printed and handwritten information. 593
4 The guidelines on which the user has to fill in are present all over the cheque. The guideline or base line removal is the next important pre-processing step. Since we are interested in specific fields on the cheque, by segmenting these fields we can do away with the guidelines. Thus we do not resort to any processing for their removal. There are other pre-processing steps as slant removal of the document and enhancement of noisy images which are applied to specific examples in case the need arises. 4 Extraction procedure This is the most important module in the entire system. To perform this procedure, the text image should have been pre-processing as explained in the earlier section. Only then, signature segmentation can be achieved as all the noise and other extraneous features have been phased out. Approximation area (130,35,200,55) Fig.3. Approximation area This method can be used to locate a box in cheques. In this, a sliding window is created to move horizontally from left to right on the approximation area (refer Fig.4). The width of the window is fixed to a certain number of pixels and the height of the pixel will be set according to the height of the approximation area. As the sliding window moves by one pixel at a time, the density of the pixels within the current window is calculated. This density is used to calculate the entropy as follows: where P a ) is the pixel density ( j E = P a )log P( a ) (1) ( j j 594
5 The entropy is a better choice than density because it introduces larger range of values leading to easier and more accurate segmentation. The left and right borders of a box are determined by the two maximum values of pixel entropy. To get the top and bottom borders of the box, we run the sliding window vertically from top to bottom of the approximation area of the box by repeating the process of horizontal sliding as shown in Fig Width of sliding window is 2 pixels wide 20 Horizontal sliding window 20 is the highest density therefore this window will mark the left border of the box. Fig.4. Sliding Window Concept 4.1 Crop Method The crop method as shown in figure 5 is applied on the defined approximation area in a cheque. Its objective is to locate a rectangular box around an object of interest and remove other objects outside this area. If the signature is the object of interest in the cheque, this could be easily done. The crop method works by moving four vectors from four different directions (namely up, right, bottom and left) towards the object of interest. This procedure is illustrated as below: Vector Vector Vector Vector Fig.5. The crop method 595
6 For each vector, it will stop moving when it finds a point (black pixel) in its direction. Each vector will mark the border of each side of the rectangular box (i.e. Vector top marks the top border of the rectangle, vector right marks the right border, vector bottom marks the bottom border and vector left marks the left border.) Implementation on the signature The original cheque image can be in colour or grayscale. The scanned image must be converted to binary format with the help of any thinning algorithm. We have used the modified SPTA as outlined in [2]. One the approximation area of the signature for a particular check is defined, the crop method is then applied to the approximation area. The cropped image contains only the signature ready to be fed to an offline signature verification system Implementation on the courtesy amount box In this case, the approximation area of the courtesy amount box is calculated from a virgin model of the cheque and this information is pre-defined to the system. The width of sliding window is set to two or three pixels depending on the thickness of the box. For a thicker box, we will use a size of three. Sliding window is applied to the approximation area. Then we will remove two pixels from each border of the box to remove the box lines to get only the content of the box, i.e., the courtesy amount itself. Fig.6. The extracted courtesy amount box We will then apply the sliding window method again to the resulting image (with box removed). But this time we do the segmentation based on the minimum entropy of the window, because this value represents the gap between characters / digits. The segmented characters will be fed to the fuzzy system for recognition and verification. 5 Experimental Results The present system for extracting signatures from bank cheques and other different kinds of forms has been implemented on a Pentium III personal computer under the Windows environment. The entire code has been written in Visual Basic. The images were scanned using a HP Scanjet with 600 dpi resolution. It took less than a minute to extract a signature from a bank cheque, once the area approximation has been done on the first model of the cheque. Our system has achieved a total accurate extraction rate of 99.26% on a database of 211 images. The extraction rates of signatures from different types of documents are 596
7 summarized in Table 1. The system failed to completely extract only one signature from a bank cheque. This was due to the fact that the person who had signed the cheque had not done so in the stipulated area and hence the system could not correctly approximate the area to be segmented. Table 1. Overall results Type of Document Number Correct Extraction (%) Partial/No Extraction (%) Bank Cheques Tutor Forms Donation Receipts In the following sections, we describe in detail two typical types of extraction problems to which we have successfully applied sliding window technique. These experiments have been conducted in order to show the easy adaptability and robustness of our system. The first involved extraction of signatures of a tutor from student assessment forms collected over a period of three months. The second example, which we describe in more detail, has used fuzzy enhancement technique in its pre-processing stage as the document was highly corrupted in nature. Our method can also be applied to several different forms to extract not only signatures but other user entered components provided the approximate area of interest is pre-specified. 5.1 Example I: Signature extraction from a practical exam form In this experiment, around 130 practical assessment forms were collected from the students of an Electrical Engineering lab course over a period of 13 weeks (duration of a normal academic semester) at the University of Queensland. The aim was to automatically extract the tutor signature from the form and check for its authenticity. The form is a complicated document with a number of boxes and fields marked for entering data. The region of interest, in this case, the box containing the tutor signature was approximated and the information so obtained was used for extracting the signatures. The complete process is as show in the following figure. 597
8 Fig.7. Procedure showing the extraction of tutor signatures 598
9 5.2 Example II: Signature extraction from the carbon copies of receipts In addition to extracting signatures from bank cheques and tutor forms, we have attempted a more challenging task of extracting signatures from the scanned images of carbon copies of donation receipts of Heritage Building Society. The receipts were signed over a period of more than three years and the carbon copies of these documents were hazy and not clear in content. In order to remove the high noise content posed by the damaged documents and also to improve the appearance of the signatures to be extracted before applying the sliding window technique, we have applied a fuzzy enhancement method [8] which enhances the overall quality of the documents. The signatures which are extracted using this technique are perfectly suitable for supplying to any off-line signature verification system. Figure 8 shows the original noisy document before enhancement is done and the enhanced signature which is then extracted. Fig.8. Fuzzy enhancement of signatures before approximation is done 599
10 5 Conclusions The first and foremost step towards developing a complete bank cheque and form processing system is to automatically extract the handwritten signatures and other user entered information from the document. Although, this sounds simple but is quite difficult due to the problem posed by varied backgrounds and the intermixing of machine printed and handwritten information. The only way to tackle this problem is to seek some priori information about the location of the signature and other important fields of interest. This paper is a step in that direction as it presents an automatic signature extraction system based on a priori information of the layout of the document. The proposed sliding window is able to extract signatures from any type of documents, as was shown on two examples. In further work, we plan to integrate this system with signature verification so that the whole process of bank cheque authentication is automated. References 1. Holland, T., G., Checks and Balances. Security Management. 43 (1999) Hanmandlu, M., Yusof, M., H., M., Madasu, V., K., Off-line signature verification and forgery detection system based on structural parameters. Pattern Recognition. Submitted for review. 3. Suen, C.Y., Xu, Q., Lam, L., Automatic recognition of handwritten data on cheques ñ Fact or Fiction? Pattern Recognition Letters. 20 (1999) Djeziri, S., Nouboud, F., Plamondon, R., Extraction of signatures from check background based on a filiformity criterion. IEEE Transactions on Image Processing. 7 (1998) Dimuaro, G., Impedovo, S., Pirlo, G., Salzo, A., Automatic Bankcheck Processing: A New Engineered System. International Journal of Pattern Recognition and Artificial Intelligence. 11 (1997) Liu, K., Suen, C.Y., Cheriet, M., Said, J.N., Nadal, C., Tang, Y., Y., Automatic Extraction of Baselines and Data from Check Images. International Journal of Pattern Recognition and Artificial Intelligence. 11 (1997) Okada, M., Shridhar, M., Extraction of User Entered Components from a Personal Bankcheck using Morphological Subtraction. International Journal of Pattern Recognition and Artificial Intelligence. 11 (1997) Vijayaprasad, P., Elsid, A.G., Hanmandlu, M., Enhancement of Fingerprint Image ñ A Fuzzy Approach. International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2003). Accepted for presentation. 600
ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan
Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification
Signature Region of Interest using Auto cropping
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 1 Signature Region of Interest using Auto cropping Bassam Al-Mahadeen 1, Mokhled S. AlTarawneh 2 and Islam H. AlTarawneh 2 1 Math. And Computer Department,
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,
Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.
International Journal of Computer Application and Engineering Technology Volume 3-Issue2, Apr 2014.Pp. 188-192 www.ijcaet.net OFFLINE SIGNATURE VERIFICATION SYSTEM -A REVIEW Pooja Department of Computer
Poker Vision: Playing Cards and Chips Identification based on Image Processing
Poker Vision: Playing Cards and Chips Identification based on Image Processing Paulo Martins 1, Luís Paulo Reis 2, and Luís Teófilo 2 1 DEEC Electrical Engineering Department 2 LIACC Artificial Intelligence
Analecta Vol. 8, No. 2 ISSN 2064-7964
EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,
DEVNAGARI DOCUMENT SEGMENTATION USING HISTOGRAM APPROACH
DEVNAGARI DOCUMENT SEGMENTATION USING HISTOGRAM APPROACH Vikas J Dongre 1 Vijay H Mankar 2 Department of Electronics & Telecommunication, Government Polytechnic, Nagpur, India 1 [email protected]; 2
STATIC SIGNATURE RECOGNITION SYSTEM FOR USER AUTHENTICATION BASED TWO LEVEL COG, HOUGH TRANSFORM AND NEURAL NETWORK
Volume 6, Issue 3, pp: 335343 IJESET STATIC SIGNATURE RECOGNITION SYSTEM FOR USER AUTHENTICATION BASED TWO LEVEL COG, HOUGH TRANSFORM AND NEURAL NETWORK Dipti Verma 1, Sipi Dubey 2 1 Department of Computer
3)Skilled Forgery: It is represented by suitable imitation of genuine signature mode.it is also called Well-Versed Forgery[4].
Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Technique
Signature verification using Kolmogorov-Smirnov. statistic
Signature verification using Kolmogorov-Smirnov statistic Harish Srinivasan, Sargur N.Srihari and Matthew J Beal University at Buffalo, the State University of New York, Buffalo USA {srihari,hs32}@cedar.buffalo.edu,[email protected]
Handwritten Signature Verification using Neural Network
Handwritten Signature Verification using Neural Network Ashwini Pansare Assistant Professor in Computer Engineering Department, Mumbai University, India Shalini Bhatia Associate Professor in Computer Engineering
ESE498. Intruder Detection System
0 Washington University in St. Louis School of Engineering and Applied Science Electrical and Systems Engineering Department ESE498 Intruder Detection System By Allen Chiang, Jonathan Chu, Siwei Su Supervisor
SIGNATURE VERIFICATION
SIGNATURE VERIFICATION Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia Computer engineering Department, MPSTME, NMIMS University
DIAGONAL BASED FEATURE EXTRACTION FOR HANDWRITTEN ALPHABETS RECOGNITION SYSTEM USING NEURAL NETWORK
DIAGONAL BASED FEATURE EXTRACTION FOR HANDWRITTEN ALPHABETS RECOGNITION SYSTEM USING NEURAL NETWORK J.Pradeep 1, E.Srinivasan 2 and S.Himavathi 3 1,2 Department of ECE, Pondicherry College Engineering,
International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
Visual Structure Analysis of Flow Charts in Patent Images
Visual Structure Analysis of Flow Charts in Patent Images Roland Mörzinger, René Schuster, András Horti, and Georg Thallinger JOANNEUM RESEARCH Forschungsgesellschaft mbh DIGITAL - Institute for Information
Biometric Authentication using Online Signature
University of Trento Department of Mathematics Outline Introduction An example of authentication scheme Performance analysis and possible improvements Outline Introduction An example of authentication
A Dynamic Approach to Extract Texts and Captions from Videos
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
An Algorithm for Classification of Five Types of Defects on Bare Printed Circuit Board
IJCSES International Journal of Computer Sciences and Engineering Systems, Vol. 5, No. 3, July 2011 CSES International 2011 ISSN 0973-4406 An Algorithm for Classification of Five Types of Defects on Bare
Face detection is a process of localizing and extracting the face region from the
Chapter 4 FACE NORMALIZATION 4.1 INTRODUCTION Face detection is a process of localizing and extracting the face region from the background. The detected face varies in rotation, brightness, size, etc.
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
A colour Code Algorithm for Signature Recognition
Electronic Letters on Computer Vision and Image Analysis 6(1):1-12, 2007 A colour Code Algorithm for Signature Recognition Vinayak Balkrishana Kulkarni Department of Electronics Engineering. Finolex Academy
Research on Chinese financial invoice recognition technology
Pattern Recognition Letters 24 (2003) 489 497 www.elsevier.com/locate/patrec Research on Chinese financial invoice recognition technology Delie Ming a,b, *, Jian Liu b, Jinwen Tian b a State Key Laboratory
High-Performance Signature Recognition Method using SVM
High-Performance Signature Recognition Method using SVM Saeid Fazli Research Institute of Modern Biological Techniques University of Zanjan Shima Pouyan Electrical Engineering Department University of
Multimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
Automatic License Plate Recognition using Python and OpenCV
Automatic License Plate Recognition using Python and OpenCV K.M. Sajjad Department of Computer Science and Engineering M.E.S. College of Engineering, Kuttippuram, Kerala [email protected] Abstract Automatic
Palmprint Recognition. By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap
Palmprint Recognition By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap Palm print Palm Patterns are utilized in many applications: 1. To correlate palm patterns with medical disorders, e.g. genetic
Degree Certificate Authentication using QR Code and Smartphone
Degree Certificate Authentication using and Smartphone Ankit Singhal M.Tech Computer Science Faculty of Science, Dayalbagh Educational Institute, Dayalbagh, Agra, U.P, India R.S Pavithr Assistant Professor
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. [email protected]
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
Document Image Retrieval using Signatures as Queries
Document Image Retrieval using Signatures as Queries Sargur N. Srihari, Shravya Shetty, Siyuan Chen, Harish Srinivasan, Chen Huang CEDAR, University at Buffalo(SUNY) Amherst, New York 14228 Gady Agam and
Strategic White Paper
Strategic White Paper Increase Security Through Signature Verification Technology Takeaway Understand the benefits of automatic signature verification Learn about the types of automatic signature verification
Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras
Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras W3A.5 Douglas Chai and Florian Hock Visual Information Processing Research Group School of Engineering and Mathematics Edith
Image Authentication Scheme using Digital Signature and Digital Watermarking
www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for
RFID and Camera-based Hybrid Approach to Track Vehicle within Campus
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore RFID and Camera-based Hybrid Approach to Track Vehicle within
How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode
A Method of Caption Detection in News Video
3rd International Conference on Multimedia Technology(ICMT 3) A Method of Caption Detection in News Video He HUANG, Ping SHI Abstract. News video is one of the most important media for people to get information.
An Energy-Based Vehicle Tracking System using Principal Component Analysis and Unsupervised ART Network
Proceedings of the 8th WSEAS Int. Conf. on ARTIFICIAL INTELLIGENCE, KNOWLEDGE ENGINEERING & DATA BASES (AIKED '9) ISSN: 179-519 435 ISBN: 978-96-474-51-2 An Energy-Based Vehicle Tracking System using Principal
How To Filter Spam Image From A Picture By Color Or Color
Image Content-Based Email Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, email has become one of the main methods of communication among
A Lightweight and Effective Music Score Recognition on Mobile Phone
J Inf Process Syst, http://dx.doi.org/.3745/jips ISSN 1976-913X (Print) ISSN 92-5X (Electronic) A Lightweight and Effective Music Score Recognition on Mobile Phone Tam Nguyen* and Gueesang Lee** Abstract
Intelligent Database Monitoring System using ARM9 with QR Code
Intelligent Database Monitoring System using ARM9 with QR Code Jyoshi Niklesh 1, Dhruva R. Rinku 2 Department of Electronics and Communication CVR College of Engineering, JNTU Hyderabad Hyderabad, India
PageX: An Integrated Document Processing and Management Software for Digital Libraries
PageX: An Integrated Document Processing and Management Software for Digital Libraries Hanchuan Peng, Zheru Chi, Wanchi Siu, and David Dagan Feng Department of Electronic & Information Engineering The
Galaxy Morphological Classification
Galaxy Morphological Classification Jordan Duprey and James Kolano Abstract To solve the issue of galaxy morphological classification according to a classification scheme modelled off of the Hubble Sequence,
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Khatmode Ranjit P 1, Kulkarni Ramchandra V 2, Ghodke Bharat S 3, Prof. P. P. Chitte 4, Prof. Anap S. D 5 1 Student
Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management
Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management Paper Jean-Louis Amat Abstract One of the main issues of operators
Recognition Method for Handwritten Digits Based on Improved Chain Code Histogram Feature
3rd International Conference on Multimedia Technology ICMT 2013) Recognition Method for Handwritten Digits Based on Improved Chain Code Histogram Feature Qian You, Xichang Wang, Huaying Zhang, Zhen Sun
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
AN ALGORITHM TO GROUP DEFECTS ON PRINTED CIRCUIT BOARD FOR AUTOMATED VISUAL INSPECTION
AN ALGORITHM TO GROUP DEFECTS ON PRINTED CIRCUIT BOARD FOR AUTOMATED VISUAL INSPECTION NOOR KHAFIFAH KHALID, ZUWAIRIE IBRAHIM, and MOHAMAD SHUKRI ZAINAL ABIDIN Faculty of Electrical Engineering, Centre
Biometric Authentication using Online Signatures
Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu [email protected], [email protected] http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,
Document Image Processing - A Review
Document Image Processing - A Review Shazia Akram Research Scholar University of Kashmir (India) Dr. Mehraj-Ud-Din Dar Director, IT & SS University of Kashmir (India) Aasia Quyoum Research Scholar University
Signature Segmentation and Recognition from Scanned Documents
Signature Segmentation and Recognition from Scanned Documents Ranju Mandal, Partha Pratim Roy, Umapada Pal and Michael Blumenstein School of Information and Communication Technology, Griffith University,
Signature Segmentation from Machine Printed Documents using Conditional Random Field
2011 International Conference on Document Analysis and Recognition Signature Segmentation from Machine Printed Documents using Conditional Random Field Ranju Mandal Computer Vision and Pattern Recognition
Tracking and Recognition in Sports Videos
Tracking and Recognition in Sports Videos Mustafa Teke a, Masoud Sattari b a Graduate School of Informatics, Middle East Technical University, Ankara, Turkey [email protected] b Department of Computer
Introduction to Pattern Recognition
Introduction to Pattern Recognition Selim Aksoy Department of Computer Engineering Bilkent University [email protected] CS 551, Spring 2009 CS 551, Spring 2009 c 2009, Selim Aksoy (Bilkent University)
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD P.N.Ganorkar 1, Kalyani Pendke 2 1 Mtech, 4 th Sem, Rajiv Gandhi College of Engineering and Research, R.T.M.N.U Nagpur (Maharashtra),
SOURCE SCANNER IDENTIFICATION FOR SCANNED DOCUMENTS. Nitin Khanna and Edward J. Delp
SOURCE SCANNER IDENTIFICATION FOR SCANNED DOCUMENTS Nitin Khanna and Edward J. Delp Video and Image Processing Laboratory School of Electrical and Computer Engineering Purdue University West Lafayette,
Tracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object
An Active Head Tracking System for Distance Education and Videoconferencing Applications
An Active Head Tracking System for Distance Education and Videoconferencing Applications Sami Huttunen and Janne Heikkilä Machine Vision Group Infotech Oulu and Department of Electrical and Information
FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
Saving Mobile Battery Over Cloud Using Image Processing
Saving Mobile Battery Over Cloud Using Image Processing Khandekar Dipendra J. Student PDEA S College of Engineering,Manjari (BK) Pune Maharasthra Phadatare Dnyanesh J. Student PDEA S College of Engineering,Manjari
A Study of Automatic License Plate Recognition Algorithms and Techniques
A Study of Automatic License Plate Recognition Algorithms and Techniques Nima Asadi Intelligent Embedded Systems Mälardalen University Västerås, Sweden [email protected] ABSTRACT One of the most
Introduction. Chapter 1
1 Chapter 1 Introduction Robotics and automation have undergone an outstanding development in the manufacturing industry over the last decades owing to the increasing demand for higher levels of productivity
Object Tracking System Using Approximate Median Filter, Kalman Filter and Dynamic Template Matching
I.J. Intelligent Systems and Applications, 2014, 05, 83-89 Published Online April 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijisa.2014.05.09 Object Tracking System Using Approximate Median
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Bharath K M, Rohit C V Student of B.E Electronics and Communication Coorg Institute of Technology,
Image Processing Based Automatic Visual Inspection System for PCBs
IOSR Journal of Engineering (IOSRJEN) ISSN: 2250-3021 Volume 2, Issue 6 (June 2012), PP 1451-1455 www.iosrjen.org Image Processing Based Automatic Visual Inspection System for PCBs Sanveer Singh 1, Manu
Template-based Eye and Mouth Detection for 3D Video Conferencing
Template-based Eye and Mouth Detection for 3D Video Conferencing Jürgen Rurainsky and Peter Eisert Fraunhofer Institute for Telecommunications - Heinrich-Hertz-Institute, Image Processing Department, Einsteinufer
Mouse Control using a Web Camera based on Colour Detection
Mouse Control using a Web Camera based on Colour Detection Abhik Banerjee 1, Abhirup Ghosh 2, Koustuvmoni Bharadwaj 3, Hemanta Saikia 4 1, 2, 3, 4 Department of Electronics & Communication Engineering,
Automatic Detection of PCB Defects
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 6 November 2014 ISSN (online): 2349-6010 Automatic Detection of PCB Defects Ashish Singh PG Student Vimal H.
Using Real Time Computer Vision Algorithms in Automatic Attendance Management Systems
Using Real Time Computer Vision Algorithms in Automatic Attendance Management Systems Visar Shehu 1, Agni Dika 2 Contemporary Sciences and Technologies - South East European University, Macedonia 1 Contemporary
COMPARISON OF OBJECT BASED AND PIXEL BASED CLASSIFICATION OF HIGH RESOLUTION SATELLITE IMAGES USING ARTIFICIAL NEURAL NETWORKS
COMPARISON OF OBJECT BASED AND PIXEL BASED CLASSIFICATION OF HIGH RESOLUTION SATELLITE IMAGES USING ARTIFICIAL NEURAL NETWORKS B.K. Mohan and S. N. Ladha Centre for Studies in Resources Engineering IIT
NextStar with Ribbon Scanning The Film Conversion Approach of the 21 st Century
NextStar with Ribbon Scanning The Film Conversion Approach of the 21 st Century By Kurt Breish CTO, nextscan Inc. Abstract An innovative film conversion processing approach, called Ribbon Scanning, is
Efficient on-line Signature Verification System
International Journal of Engineering & Technology IJET-IJENS Vol:10 No:04 42 Efficient on-line Signature Verification System Dr. S.A Daramola 1 and Prof. T.S Ibiyemi 2 1 Department of Electrical and Information
SVM Based License Plate Recognition System
SVM Based License Plate Recognition System Kumar Parasuraman, Member IEEE and Subin P.S Abstract In this paper, we review the use of support vector machine concept in license plate recognition. Support
PCB DETECTION AND CLASSIFICATION USING DIGITAL IMAGEPROCESSING
PCB DETECTION AND CLASSIFICATION USING DIGITAL IMAGEPROCESSING 1 Shashikumar Vishwakarma, 2 SahilTikke, 3 Chinmay Manurkar, 4 Ankit Thanekar 1,2,3,4 Electronics and Telecommunication (B.E), KJSIEIT, (India)
AUTOMATED ATTENDANCE CAPTURE AND TRACKING SYSTEM
Journal of Engineering Science and Technology EURECA 2014 Special Issue January (2015) 45-59 School of Engineering, Taylor s University AUTOMATED ATTENDANCE CAPTURE AND TRACKING SYSTEM EU TSUN CHIN*, WEI
Banking Applications. Locate, extract classify data from payments, forms and handwritten documents. A2iA Toolkits Discussed Within
Banking Applications Locate, extract classify data from payments, forms and handwritten documents Award-winning and driven by research and development, A2iA, Artificial Intelligence and Image Analysis,
2 Signature-Based Retrieval of Scanned Documents Using Conditional Random Fields
2 Signature-Based Retrieval of Scanned Documents Using Conditional Random Fields Harish Srinivasan and Sargur Srihari Summary. In searching a large repository of scanned documents, a task of interest is
Real Time Target Tracking with Pan Tilt Zoom Camera
2009 Digital Image Computing: Techniques and Applications Real Time Target Tracking with Pan Tilt Zoom Camera Pankaj Kumar, Anthony Dick School of Computer Science The University of Adelaide Adelaide,
Developing a Feature-based System for Automated Machining Feature Recognition (ISO 10303 AP 224) of Prismatic Components
Developing a Feature-based System for Automated Machining Feature Recognition (ISO 10303 AP 224) of Prismatic Components Chen Wong Keong 1, a, Yusri Yusof 2,b 1 Department of Mechanical Engineering, Polytechnic
Circle Object Recognition Based on Monocular Vision for Home Security Robot
Journal of Applied Science and Engineering, Vol. 16, No. 3, pp. 261 268 (2013) DOI: 10.6180/jase.2013.16.3.05 Circle Object Recognition Based on Monocular Vision for Home Security Robot Shih-An Li, Ching-Chang
REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING
REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING Ms.PALLAVI CHOUDEKAR Ajay Kumar Garg Engineering College, Department of electrical and electronics Ms.SAYANTI BANERJEE Ajay Kumar Garg Engineering
Indoor Surveillance System Using Android Platform
Indoor Surveillance System Using Android Platform 1 Mandar Bhamare, 2 Sushil Dubey, 3 Praharsh Fulzele, 4 Rupali Deshmukh, 5 Dr. Shashi Dugad 1,2,3,4,5 Department of Computer Engineering, Fr. Conceicao
Using Lexical Similarity in Handwritten Word Recognition
Using Lexical Similarity in Handwritten Word Recognition Jaehwa Park and Venu Govindaraju Center of Excellence for Document Analysis and Recognition (CEDAR) Department of Computer Science and Engineering
Hybrid Lossless Compression Method For Binary Images
M.F. TALU AND İ. TÜRKOĞLU/ IU-JEEE Vol. 11(2), (2011), 1399-1405 Hybrid Lossless Compression Method For Binary Images M. Fatih TALU, İbrahim TÜRKOĞLU Inonu University, Dept. of Computer Engineering, Engineering
Real Time Multiple License Plates Localization and Distortion Normalization for Moving Vehicles
Real Time Multiple License Plates Localization and Distortion Normalization for Moving Vehicles Chen-Chung Liu, Chih-Chin Chang Department of Electronic Engineering, Department of Electronic Engineering,
So you say you want something printed...
So you say you want something printed... Well, that s great! You ve come to the right place. Whether you re having us design and edit your work, or you fancy yourself a designer and plan to hand over your
The Visual Internet of Things System Based on Depth Camera
The Visual Internet of Things System Based on Depth Camera Xucong Zhang 1, Xiaoyun Wang and Yingmin Jia Abstract The Visual Internet of Things is an important part of information technology. It is proposed
An Efficient Geometric feature based License Plate Localization and Stop Line Violation Detection System
An Efficient Geometric feature based License Plate Localization and Stop Line Violation Detection System Waing, Dr.Nyein Aye Abstract Stop line violation causes in myanmar when the back wheel of the car
Blog Post Extraction Using Title Finding
Blog Post Extraction Using Title Finding Linhai Song 1, 2, Xueqi Cheng 1, Yan Guo 1, Bo Wu 1, 2, Yu Wang 1, 2 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing 2 Graduate School
International Journal of Advancements in Research & Technology, Volume 2, Issue 5, M ay-2013 331 ISSN 2278-7763
International Journal of Advancements in Research & Technology, Volume 2, Issue 5, M ay-2013 331 An Integrated Real-Time Vision Based Home Security System Qusay Idrees Sarhan Department of Computer Sciences,
III. SEGMENTATION. A. Origin Segmentation
2012 International Conference on Frontiers in Handwriting Recognition Handwritten English Word Recognition based on Convolutional Neural Networks Aiquan Yuan, Gang Bai, Po Yang, Yanni Guo, Xinting Zhao
Document scanning. Done right. TM
Document scanning. Done right. TM Document scanning. Done right. When it comes to document scanning, ibml understands the importance of getting things right the first time. Combining hardware, software
Enhanced Bar Code Engine
Enhanced Bar Code Engine Introduction Access to the Kofax Standard bar code recognition engine is provided through ImageControls-based applications and ISIS-based applications. In addition to the standard
Morphological segmentation of histology cell images
Morphological segmentation of histology cell images A.Nedzved, S.Ablameyko, I.Pitas Institute of Engineering Cybernetics of the National Academy of Sciences Surganova, 6, 00 Minsk, Belarus E-mail [email protected]
