Free Essay

Optical Character Recognition

In:

Submitted By shivamgupta
Words 2982
Pages 12
ISSN: 2277-3754
ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 7, January 2013

Recognition for Handwritten English Letters: A Review
Nisha Sharma, Tushar Patnaik, Bhupendra Kumar
Abstract -- Character recognition is one of the most interesting and challenging research areas in the field of Image processing. English character recognition has been extensively studied in the last half century. Nowadays different methodologies are in widespread use for character recognition. Document verification, digital library, reading bank deposit slips, reading postal addresses, extracting information from cheques, data entry, applications for credit cards, health insurance, loans, tax forms etc. are application areas of digital document processing. This paper gives an overview of research work carried out for recognition of hand written English letters. In Hand written text there is no constraint on the writing style. Hand written letters are difficult to recognize due to diverse human handwriting style, variation in angle, size and shape of letters. Various approaches of hand written character recognition are discussed here along with their performance. Fig 1.Major Steps of an OCR System Index Terms— Offline Hand written Character Recognition, Pre-Processing, Feature Extraction, Classification, Post Processing.

I. INTRODUCTION Optical Character Recognition (OCR) is one of the most fascinating and challenging areas of pattern recognition with various practical applications. It can contribute immensely to the advancement of an automation process and can improve the interface between man and machine. It is the mechanism to convert machine printed, hand printed or hand written document file into editable text format. Typically, there are two different categories of handwriting character recognition: off-line and on-line. In Online character recognition handwriting is captured using a special pen in conjunction with electronic surface. In Offline character recognition Input has been scanned from a surface such as sheet of paper and stored digitally. Offline character recognition include recognition of machine printed, hand printed and handwritten characters. The most difficult problem in the field of OCR is the recognition of unconstrained cursive handwriting. Place during the eighties. During nineties, a fresh interest developed with the rise of new needs. The existing tools for modeling are not yet sufficient with respect to performance due to many variations of human handwriting. The similarities in distinct character shapes, the overlaps, and interconnection of the neighboring characters further complicate the problem. This paper discusses various methodologies for recognition of hand written letters. Hand written character recognition system has major five stages, namely: Pre-processing, Segmentation, Feature Extraction, Classification and Post-processing as shown in Figure 1.

Section II of this paper discusses the need of pre-processing before the input is forwarded to input engine. Section III gives an overview of segmentation and various techniques which have been used in handwritten character segmentation. Section IV discusses the various methods of uniquely extracting the features of letters along with their performance. Section V discusses the classification of the characters along with post processing. Section VI gives the comparative study of various techniques applied and their result. Section VII and Section VIII discuss the future scope and the conclusion of overall paper respectively. II. PRE-PROCESSING Pre-Processing Can Be Defined As Cleaning The Document Image And Making It Appropriate For Input To The OCR Engine. Major Steps Under Pre-Processing Are:  Noise removal  Skew detection/correction  Binarization The Noise introduced by the optical scanning devices in the input leads to poor system performance. These imperfections must be removed prior to character recognition. Noise can be introduced in an image during image acquisition and transmission. Noise can be of different types as Gaussian noise, Gamma noise, Rayleigh noise, Exponential noise, Uniform noise, Salt and pepper noise, Periodic noise etc. Noise can be removed using Ideal filters, Butterworth filters and Gaussian filters. There is a possibility of rotation of image while scanning. Skew detection and correction is used to align the paper document with the coordinate system of scanner. Various skew detection techniques are projection profiles, connected components, Hough transform, clustering etc. In Binarization, colour or grey-scale image is converted into

318

ISSN: 2277-3754
ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 7, January 2013 binary image with the help of thresholding. Binary image can IV. FEATURE EXTRACTION be achieved using Adaptive thresholding, Global thresholding, Feature extraction is finding the set of parameters that variable thresholding, Ostu’s method etc. Morphological define the shape of a character precisely and uniquely. Feature operations are also used in pre-processing. Dilation and extraction [3] methods are classified into three major groups Erosion are the morphological operations that increase or as: decrease the image size. Erosion makes an object smaller by  Statistical features. eroding away the pixels from its edges. Every object pixel that  Global transformation and series expansion. is touching background pixels is changed into background  Geometric and topological features. pixel. However, dilation makes an object larger by adding Statistical features represent the image as statistical pixels around its edges. Every pixel that is touching an object distribution of points. Various methods which use statistical pixel is changed into object pixel. Other morphological features are Zoning, Crossings and Distances, Projections etc. operations are opening and closing. In global transformation and series expansion various III. SEGMENTATION Segmentation is needed since handwritten characters frequently interfere with one another. Common ways in which characters can interfere include: overlapping, touching, connected, and intersecting pairs etc. In order to separate text from graphs, images, line, text/graphics segmentation is required. The output should be an image consisting of text only. Character segmentation will separate each character from another. It is one of the main steps especially in cursive scripts where characters are connected together. The isolated characters obtained as a result of character segmentation are normalized to specific size for better accuracy. Features are extracted from the characters with the same size in order to provide data uniformity. Christopher E. Dunn and P. S. P. Wang [5] used a series of region finding, grouping, and splitting algorithms. Region finding will identify all the disjoint regions. The pixels are originally labeled On/Off where “on” signifies the data areas. Image is examined pixel by pixel until “on” value is found .Once found it is labeled with new region number and its neighbors are searched for additional “on” value. Search proceeds until no “on” value is found. The result is that all disjoint regions will be identified and all pixels in any region will be labeled with a unique number. Grouping deals with the characters which have separate parts or which are broken. A smallest bounding box is calculated that completely encloses another region. If for any two regions the bounding box of one region completely encloses another region, then the enclosed region is relabeled to the value of the enclosing region. Thus, the resulting region is composed of two disjoint sub-regions. This is helpful for connecting regions that have been separated due to noise .Splitting [5] deals with touching characters. Anshul Mehta [2] used Heuristic segmentation algorithm which scans the hand written words to identify the valid segmentation points between characters. The segmentation is based on locating the arcs between letters, common in handwritten cursive script. For this a histogram of vertical pixel density is examined which may indicate the location of possible segmentation points in the word. Other character segmentation approaches [4] are Thinning based method, Contour Fitting method, Robust Statistical technique, Hypothesis Verification, Shape Feature Vector method etc. techniques are Fourier transform, Gabor transform, Fourier Descriptor, wavelets, moments, Karhunen-Loeve expansion etc. In Geometric and topological features, the structural features like loops, curves, lines, T-point, cross, opening to the right, opening to the left etc. are used. The various categories are coding (freeman chain code), extracting and counting topological structures, graphs and trees. Geometric features are used along with fuzzy logic to recognize characters [7]. Adnan Amin [6] and Puttipong Mahasukhon [7] used structural information to extract features from a character like Breakpoints, Inflection Point, Cusp Point, Straight Line, Curve, Open or Close Loop etc. Breakpoint divides a path into sub paths. It has two possible conditionsInflection Point (change in curvature) and Cusp Point (sharp change in direction).Straight line has two points in sequence in a path. Open curve is as in letter “S”. Closed curve is as present in “a”. These segments are given as input to neural network classifier. Anshul Mehta [2] used Fourier descriptor for extracting unique feature from a character. Initially boundary is detected, then discrete Fourier coefficient a[k] and b[k] are calculated for 0< k < L-1. Where L is the total number of boundary points. Fourier descriptor [8] can be used with one new technique known as Border Transition technique (BTT).In it each character is partitioned into four equal quadrants. The scanning and calculation of black-to-white transition take place in both vertical and horizontal directions in each quadrant. The average transition of each direction (horizontal and vertical) in each of the four quadrants of the box surrounding the character will be calculated. Rafael M. O [1] used nine modified feature extraction techniques on a single database. Structural characteristics consist in extracting histograms and profiles and combining then into a single feature vector. In modified edge map an M X N image is thinned and scaled into a 25 X 25 matrix. The Sobel operators are used to extract four distinct edge maps: horizontal, vertical and two diagonals. These four maps and the original image are divided into 25 sub-images of 5 X 5 pixels each. The features are obtained calculating the percentage of black pixels in each sub-image (25 features per image). The features are combined to form a single feature vector containing 125 (25 X 5) features. Image Projections consists of extracting the radial and diagonal projections. To extract the radial projections, the image must

319

ISSN: 2277-3754
ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 7, January 2013 first be divided into four quadrants: top, bottom, right and left. generation and error detection/correction. Output string Radial projections are obtained by grouping pixels by its generation will reassemble the strings which have been radial distance to the center of the image in each quadrant separated in the process of segmentation whereas error separately. The diagonal projection is computed simply by detection/correction will correct errors with the help of grouping pixels by the two diagonal lines. The values of each dictionary. projection are normalized to a range [0-1] through the VI. COMPARISION TABLE division by the maximum value. The normalized features are The major steps of an OCR engine are feature extraction Concatenated in a single vector containing 128 features. In Multi Zoning an M x N character image is divided into several and classification. The various feature extraction techniques sub-images and the percentage of black pixels in each in combination with various classification techniques along Sub-image is used as feature. It is a statistical approach as with their result which have been used by the researchers are features are calculated based on the number of pixels used to discussed in Table I: represent an image. Other feature extraction algorithms used Table I are Concavities Measurement, MAT-based Gradient Author Feature Classification Result Directional features, Gradient Directional features, Median extraction Method Method Gradient features, Camastra 34D features[1]. V. CLASSIFICATION AND POST PROCESSING The classification is the process of identifying each character and assigning to it the correct character class. The classification techniques [9] can be categorized as:  Classical techniques.  Soft computing techniques. The various classical techniques are Template matching, Statistical techniques, Structural techniques. Whereas the various soft computing techniques are Neural networks, Fuzzy logic, Evolutionary computing techniques. Adnan Amin and W. H. Wilson [6] used Neural network for classification of characters with three layers namely Input layer, Output layer and Hidden layer. The geometric features extracted like dot, line, curve or loops are given as input to the input layer. Each component of the segmented representation is classified as a dot, line, curve, or loop. In each case, the characteristics of the component are determined: if a line, what are its orientation and its size relative to the character frame - short, medium or long. One input neuron is used to encode each of these possible choices (short/medium/long) and each of four possible orientations for a line. One input neuron is used to encode the characteristics of each component extracted by geometric feature extraction technique. Neuron has two modes of operations as training mode and testing mode. In the training mode, the neuron can be trained to fire (or not), for particular input patterns. In the testing mode, when a taught input pattern is detected at the input, its associated output becomes the current output. If the input pattern does not belong in the taught list of input patterns, the firing rule is used to determine whether to fire or not. Anshul Mehta, Manisha Srivastava [2] used three networks for the recognition of 26 lower case and 26 upper case letters as Multilayer Perception (MLP) [2,8], Radial Basis Function (RBF) and Support Vector Machine (SVM).Multilayer perception is a feed forward neural network with one or more layers between input and output layer. Radial basis function (RBF) networks typically have three layers: an input layer, a hidden layer with a non-linear RBF activation function and a linear output layer. Post-processing mainly consists of two tasks – output string
Anshul Gupta , Manisha Srivastava , Chitralekha Mahanta[2] Anshul Gupta , Manisha Srivastava , Chitralekha Mahanta[2] Puttipong Mahasukhon, Hossein Mousavinezhad, Jeong-Young Song[7] Rafael M. O. Cruz, George D. C. Cavalcanti and Tsang Ing Ren[1] Anshul Gupta , Manisha Srivastava , Chitralekha Mahanta[2] Yuk Ying Chung, Man to Wong [8] Fourier descriptor with magnitude SVM classifier 86.66%

Fourier descriptor with phase

SVM classifier

98.74%

Geometric features

Fuzzy theory

90%

Multi Zoning

MLP network

89.67%

Fourier descriptor with magnitude and phase Fourier descriptor and topological properties

SVM classifier

98.04%

MLP with back propagation

96%

VII. CONCLUSION The major approaches used in the field of handwritten character recognition during the last decade have been reviewed in this paper. Different pre-processing, segmentation, feature extraction, classification techniques are also discussed. Though, various methods for treating the problem of hand written English letters have developed in last two decades, still a lot of research is needed so that a viable software solution can be made available. The existing OCR for handwritten has very low accuracy. We need an efficient solution to solve this problem so that overall performance can be increased.

320

ISSN: 2277-3754
ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 7, January 2013 AUTHOR’S PROFILE VIII. FUTURE RESEARCH From 1950’s OCR is an active area of research. Many techniques for recognition of Offline English Handwritten Characters have been suggested. But still an efficient OCR for the recognition of hand written letters does not exist. Few steps have been taken for Hand written and Hand printed (which is a constrained hand writing) English letter recognition. Various challenges are identified which may provide more lively interest to the researchers. These challenges are: difficulty to identify the diverse human writing styles, different angles of letters, different shapes and size of letter, pure input quality, low accuracy rate in recognition etc. Hence, a lot of research work is to be done to solve these problems. REFERENCES
[1] Rafael M. O. Cruz, George D. C. Cavalcanti and Tsang Ing Ren “An Ensemble Classifier For Offline Cursive Character Recognition Using Multiple Feature Extraction Techniques” IEEE 2010. [2] Anshul Mehta, Manisha Srivastava, Chitralekha Mahanta “Offline handwritten character recognition using neural network” IEEE 2011 International conference on computer applications and Industrial Electronics. [3] Oivind Due Trier,Anil K Jain and Torfinn Text “feature extraction methods for character recognition- a survey” 1996 [4] Jayashree R Prashad, Dr. U V kulkarni “Trends in handwriting recognition” IEEE 2010, Tthird international conference on emerging trends in engineering and technology. [5] Christopher E. Dunn and P. S. P. Wang “Character Segmentation techniques for handwritten text-A Survey” IEEE 1992. [6] Adnan Amin and W. H. Wilson “Hand-Printed Character Recognition System Using Artificial Neural Networks” IEEE 1993. [7] Puttipong Mahasukhon, Hossein Mousavinezhad, Jeong-Young Song “Hand-Printed English Character Recognition based on Fuzzy Theory”IEEE 2012 [8] Yuk Ying Chung, Man to Wong “handwritten character recognition by Fourier descriptors and neural network” IEEE 1997, Speech and Image Technologies for computing and telecommunication. [9] Shabana Mehfuz, Gauri katiyar “Intelligent Systems for Off-Line Handwritten Character Recognition: A Review” International Journal of Emerging Technology and Advanced Engineering 2012. [10] Nafiz Arica and Fatos T. Yarman-Vural “An Overview of Character Recognition Focused on Off-Line Handwriting.”IEEE 2001. [11] Sameer singh, Adnan Amin “Neural network recognition and analysis of hand printed letters. IEEE 1998.
Scripts”.

Ms. .Nisha Sharma received her B.Tech. Degree from Punjab Technical University .Currently she is pursuing her M.Tech in computer science from Centre for development of advance computing (CDAC), Noida. Her interest area is Image processing, Algorithms, and Database Management Systems.

Mr. Tushar Patnaik (Sr. Lecturer/Sr. Project Engineer) joined CDAC in 1998. He has eleven years of teaching experience. His interest areas are Computer Graphics, Multimedia and Database Management System and Pattern Recognition. At present he is leading the consortium based project “Development of Robust Document Image Understanding System for Documents in Indian

Mr. Bhupendra Kumar (Senior Technical Officer) joined CDAC in 2005, he received his M.Tech. degree from IIIT Allahabad with the specialization in wireless communication and computing. His interest areas are Advanced Image processing, pattern recognition, computer network, wireless network, MANETs. Currently he is involved in project “Development of Robust Document Image Understanding System for Documents in Indian Scripts”.

321

Similar Documents

Free Essay

Ocr Matlab

...DIGITAL IMAGE PROCESSING Optical Character Recognition (OCR) using binary image processing with MATLAB Abstract- Nowadays, Optical Recognition is becoming a very important tool in several fields: medicine, physics, cosmology, traffic (plate numbers), etc. We can also use this to recognize character for example to digitalize a book. We will talk about this last topic in this report: Optical Character Recognition (OCR). I. INTRODUCTION Once we have the b&w image we can start the segmentation process. To do that we can use the function “bwconncomp”. This function returns us a struct from where we can obtain the characters because it gives us all the connected components. Thus, we can use it to get all the character even if they have 2 or 3 objects. This function returns us the pixels of the connected components (characters) but we have to figure out from those, the coordinates of the character in the original matrix (row and columns). To do this, we will obtain the centroid of every connected component and from it and using the first and last pixel detected of the connect component, we can figure out the exact coordinates of the image. The idea is as follows: Firstly, we can to convert the number that the function returns us to a column and a row. We can do this using the total rows of the original image. Once we have the first and last pixel detected of the connect component in (row, column) we can figure out directly the x-coordinates of the character in the image. Then using...

Words: 1132 - Pages: 5

Free Essay

Integrated Case Study

...and different between Magnetic Ink Character Recognition (MICR) and Optical Character Recognition (OCR) : MICR and OCR are technologies increasingly being used in businesses these days. While OCR is Optical Character recognition. OCR is the recognition of printed or written text characters by a computer. It is the application software that allows a computer to recognize printed or written characters, e.g. letters, numbers, punctuation marks, and pictograms using an optical scanner for input. OCR is being used by libraries to digitize and preserve their holdings. MICR stands for Magnetic Ink Character recognition. It used primarily by the banking industry to facilitate the processing of cheques. The human readable characters are printed on documents using a magnetic ink. It stands for Magnetic Ink Character Recognition. Though these techniques have similarities and specific uses that differentiate between these two technologies. MICR MICR or My-ker as it is popularly known as is used in the banking industry in many countries of the world to ensure authenticity of a check or a demand draft using simple and inexpensive machines. The bottom line on these MICR checks is printed using a special magnetic ink. It is this ink that allows the information written on the check to be authenticated through machines. This facilitates processing of a huge number of checks in a single day which is otherwise very tedious. MICR typeface has only 14 characters in it including 0-9 and four special...

Words: 358 - Pages: 2

Premium Essay

Accuracy of Data Input

...keys. Thus, little training is required for users to become familiar with keyboards" Or an OMR or optical mark recognition. · Telephone survey Touch-tone (keypad) input. Also considered a keyboard by the text, so the cite still applies here for reasoning. Or voice recognition is best because a voice input device can be programmed to distinguish answers spoken into the receiver allowing it to all be completed by computers. · Bank checks scanning devices that recognizes bar codes are called MICR (Magnetic Ink Character Recognition) a magnetic scanning input device. This system reads the numbers at the bottom of the checks and will mechanically make modifications to the correct accounts. A MICR input system will magnetize the information at the bottom of the check for simple interpretation. Or The best input for bank checks would be MICR (Magnetic Ink Character Recognition) a magnetic scanning input device. Because banks have to deal with large volume of checks they need a system that can read checks fast. This system reads the numbers at the bottom of the checks and will automatically make adjustments to the proper accounts. Retail tags bar code scanner. This is called an optical scanning input device. By using a bar code scanner manual input of numbers into a keypad is not necessary. · Long documents Scanner , OSR(Optical character recognition) · Convenience and quality of output...

Words: 863 - Pages: 4

Free Essay

A Survey of Ocr Applications

...Bhasin Abstract—Optical Character Recognition or OCR is the electronic translation of handwritten, typewritten or printed text into machine translated images. It is widely used to recognize and search text from electronic documents or to publish the text on a website. The paper presents a survey of applications of OCR in different fields and further presents the experimentation for three important applications such as Captcha, Institutional Repository and Optical Music Character Recognition. We make use of an enhanced image segmentation algorithm based on histogram equalization using genetic algorithms for optical character recognition. The paper will act as a good literature survey for researchers starting to work in the field of optical character recognition. Index Terms— Genetic algorithm, bimodal images, Captcha, institutional repositories and digital libraries, optical music recognition, optical character recognition. I. INTRODUCTION Highlight in 1950’s [1], applied throughout the spectrum of industries resulting into revolutionizing the document management process. Optical Character Recognition or OCR has enabled scanned documents to become more than just image files, turning into fully searchable documents with text content recognized by computers. Optical Character Recognition extracts the relevant information and automatically enters it into electronic database instead of the conventional way of manually retyping the text. Optical Character Recognition is a vast field...

Words: 3379 - Pages: 14

Free Essay

Report

...Computer systems computer systems Assignment 1 - Topic: scanners Date: Student name: Student number: Tutor name: Tutorial time: Abstract This report investigates the current state of scanner technology and examines the predicted future advancements of scanners. A brief history of the scanner and its operation is initially outlined. The discussion then focuses on the advantages and limitations of the five main types of scanners in common use today: drum, flatbed, sheet-fed, slide, and hand held scanners. The performance of these scanners is examined in relation to four main criteria: resolution, bit-depth, dynamic range and software. It is concluded that further technological advances in these four areas as well as the deployment of new sensor technology will continue to improve the quality of scanned images. It is also suggested that specialised scanners will increasingly be incorporated into other types of technology such as digital cameras. Table of contents Abstract i 1.0 Introduction 1 2.0 How scanners work 2 3.0 Types of scanners 2 3.1 Drum scanners 2 3.2 Flatbed scanners 2 3.3 Sheet-fed scanners 2 3.4 Slide scanners 3 3.5 Hand held scanners 3 4.0 Scanner specifications 3 4.1 Resolution 3 4.2 Bit-depth 4 4.3 Dynamic range 4 4.4 Software 4 5.0 Future developments 5 6.0 Conclusion 5 7.0 Reference list 5 Appendicies 6 Appendix 1 Image Sensor Scanner 8 Appendix 2 Frequently Used References 9 Appendix 2.1 Scanner Tips 10 Appendix...

Words: 2631 - Pages: 11

Free Essay

Sample Report

...------------------------------------------------- Sample report Click on the highlighted text to see the comments. Computer systems computer systems Assignment 1 - Topic: scanners Date:  Student name:  Student number:  Tutor name:  Tutorial time: Abstract This report investigates the current state of scanner technology and examines the predicted future advancements of scanners. A brief history of the scanner and its operation is initially outlined. The discussion then focuses on the advantages and limitations of the five main types of scanners in common use today: drum, flatbed, sheet-fed, slide, and hand held scanners. The performance of these scanners is examined in relation to four main criteria: resolution, bit-depth, dynamic range and software. It is concluded that further technological advances in these four areas as well as the deployment of new sensor technology will continue to improve the quality of scanned images. It is also suggested that specialised scanners will increasingly be incorporated into other types of technology such as digital cameras. Table of contents | Abstract | i | 1.0 | Introduction | 1 | 2.0 | How scanners work | 2 | 3.0 | Types of scanners | 2 | | 3.1 | Drum scanners | 2 | | 3.2 | Flatbed scanners | 2 | | 3.3 | Sheet-fed scanners | 2 | | 3.4 | Slide scanners | 3 | | 3.5 | Hand held scanners | 3 | 4.0 | Scanner specifications | 3 | | 4.1 | Resolution | 3 | | 4.2 | Bit-depth | 4 | | 4.3 | Dynamic range...

Words: 2638 - Pages: 11

Free Essay

Computer Information

...questionnaire would be a keyboard for its accuracy therefore, avoiding ineligible handwriting and also questionnaires consist of basic characters, mostly letters and numbers. For phone surveys two methods can be employed, a voice recognition device or/and keypad which allows the surveyor to use a recording with this device allowing for less use of man labor, making it far more cost effective, accurate and faster. The voice recognition software stores the information directly into a computer hard disk. This approach assures accuracy by eliminating the potential for human recording errors. Translation errors may occur however, if the voice recognition software is not adjusted for the speech of the interviewees. When using this method of data input we should always keep in mind that some people only respond to live operators. As for bank checks the most accurate method is the MICR, Magnetic Ink Character Recognition, developed by the bank industry. “Data is placed on the bottom of a check or other form using a special magnetic ink. Data printed with this ink using a special character set can be read by both people and computers” (Stair, R. & Reynolds, W.G., 2006, p.37). For retail tags it would be the barcode scanner uses a laser to read the barcode label accurately. Long documents should be inputted into a computer using OCR, Optical Character Recognition, which scan handwriting and typed documents converting them into digital data. Output is another important part in computer information...

Words: 715 - Pages: 3

Free Essay

3d Animation Captcha

...A CAPTCHA Implementation Based on 3D Animation Abstract—In order to distinguish between human users and computer programs, CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart) mechanism is widely applied in websites such as accounts application website. While the major implementation of CAPTCHA method—2D still image verification code based on OCR technology is threatened by developing artificial intelligence and image recognition technologies. In this paper, we propose a new approach to implement CAPTCHA mechanism based on 3D Animation, utilizing the weakness of computer vision, which make it robust to computer attacks and convenient for users to recognize, and implemented this method to generate a 3D animation verification code. Keywords-CAPTCHA;VerificationCode;Moving Three-dimensional Animation I. Figure 1. objects; INTRODUCTION Internet is crucial to each respect of life all over the globe nowadays, through which we could retrieve and exchange information freely and efficiently. Given the fundamental relation between internet and people’ s life, vast malicious computer programs attack websites for profits, such as auto application for some mails’ accounts to send junk e-mails, etc. CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart) system emerges to solve this problem by identifying end-users of internet whether a real person or an automated computer program[1][2][3]...

Words: 3406 - Pages: 14

Premium Essay

Data Capture

... Lecturer: Deepak Gautam Email: gautamd@wolverhamptoncollege.ac.uk Room: 120, Wulfrun Campus Telephone: 01902 821133 Overview of Data Capture The process of collecting data in a form suitable for use in an information system is termed data capture. For example, before an electricity board can charge a customer for the use of electricity, the customer’s meter must be read and recorded, or captured, on a suitable form. The data must then be transferred into the computer system by means of an input device appropriate to the method of data capture. Sometimes the data capture form is directly readable by an input device, as, for example, in the case of mark sensitive forms which can be read by optical mark readers (OMRs). On other occasions, the data on the form must be first transferred to a suitable medium by a data entry person using a key-to-storage device. Sometimes the data to be captured is pre-recorded on an item to be sold, as with bar codes, so that a data recording form is not required at all, but in many instances, some sort of data capture form is required. The design of such forms is of great importance, since the clearer and more concise the form, the less chance there is of inaccurate data being recorded. Frequently it is necessary to use questionnaires or observation sheets to collect data for statistical purposes, and again the quality of the design of these data capture forms is of great importance. System...

Words: 2378 - Pages: 10

Free Essay

Latest Trends on I/O Device

...NT1110: LATEST TRENDS ON INPUT/OUTPUT DEVICE MODULE 2 Input/output is generally known as I/O in the IT field. Input/output device is the communication between an information system and another. Input serves as sending data into the computer’s CPU, while output devices send data outwards to the users. It provides man to machine communication. Some input devices could be highlighted as follows: * Keyboard: Originated from typewriter. Keyboard is the most common and very popular input device which helps in inputting data to the computer. It serves as the gateway of control for the computer and also allow the user to manipulate and dictate tasks---ranging from surfing the Internet to writing documents. Keyboard also allows to input letters, numbers, and other symbols into a computer that often function as commands. The layout of the keyboard is like that of traditional typewriter, although there are some additional keys provided for performing additional functions. There are two types of keyboard, which are the QWERTY and Dvora layouts. Keyboards are also of two sizes 84 keys or 101/102 keys, but now keyboards with 104 keys or 108 keys are also available for Windows and Internet. Keyboard is used in the input phase of a computer-based information system. * Mouse: Mouse is most popular pointing device. It is a very famous cursor-control device having a small palm size box with...

Words: 1650 - Pages: 7

Premium Essay

Hamlet

...Google is proud to partner with libraries to digitize public domain materials and make them widely accessible. Public domain books belong to the public and we are merely their custodians. Nevertheless, this work is expensive, so in order to keep providing this resource, we have taken steps to prevent abuse by commercial parties, including placing technical restrictions on automated querying. We also ask that you: + Make non-commercial use of the files We designed Google Book Search for use by individuals, and we request that you use these files for personal, non-commercial purposes. + Refrain from automated querying Do not send automated queries of any sort to Google’s system: If you are conducting research on machine translation, optical character recognition or other areas where access to a large amount of text is helpful, please contact us. We encourage the use of public domain materials for these purposes and may be able to help. + Maintain attribution The Google “watermark” you see on each file is essential for informing people about this project and helping them find...

Words: 497 - Pages: 2

Free Essay

Feature Selection Using a Neuro-Genetic Approach for Arabic Text Recognition

...Arabic Text Recognition M. Amara1 and K. Zidi2 Laboratoire de recherche Stratégies d’Optimisation et Informatique intelligentE SOIE ISG Tunis, 41, Rue de la Liberté, Cité Bouchoucha 2000 Le Bardo, Tunis -TUNISIE 1. amara1marwa@gmail.com Université de Gafsa, Tunisie 2. kamel_zidi@yahoo.fr Keywords : Feature selection, Genetic algorithm, PML, AOCR. 1 Introduction There are a wide variety of measurable characteristics in images. And we usually think that each feature is important to distinguish one form from another. Researchers in this domain confirmed that the number of primitives increases; the performance of a recognition system becomes poor and the computation time increases [1]. Consequently, a feature selection process is needed to resolve such a problem. Researchers categorized feature selection methods into three groups; heuristic methods, complete methods and random methods. Random method of research is rather new in its use of methods for selecting primitive compared to the other two categories heuristic and complete. Genetic algorithms (GA) are recently received considerable attention regarding their potential as an optimization technique based on the mechanism of natural selection. The features selection using GA has been used in various research areas such as camera calibration [2], verification of signatures [3], medical diagnosis [4], face recognition [5] and recognizing numbers [1]. We intend here to develop an Arabic optical character recognition system...

Words: 945 - Pages: 4

Free Essay

Environmental Analysis

...Running Header: Environmental Analysis Environmental Analysis D University of Phoenix Forces Influencing Business in the 21st Century/MBA501 Dictaphone Corporation, the healthcare division of Nuance Communications, provides speech-driven clinical documentation systems. Dictaphone offers products and services designed to achieve two goals: to drive productivity and cost savings in medical transcription and patient information management, and to extract, structure, and use the rich clinical data embedded in patient narrative reports. Dictaphone’s solutions reduce operating costs by decreasing transcription expense, improving patient care via complete documentation and faster results delivery, and raising clinician satisfaction by making EMR systems easier to use and reducing time spent on documentation (Nuance Communications, n.d.). Industry classification The North American Industries Classification System (Naics) code for Dictaphone is 541512. Code 541512 encompasses businesses the plan and design computer systems that integrate computer hardware, software, and communication technologies, even though such establishments may provide customer software as an integral part of their services (covered under code 541511) (U.S. Census Bureau, 2007). Macroeconomic Variables There are numerous macroeconomic variables that can affect a business such as Gross Domestic Product (GDP), inflation, trade, interest rates, and unemployment. GDP is defined as...

Words: 717 - Pages: 3

Free Essay

Proposal for Online Résumés and Possible Upgrade to Electronic Résumés

...To: Kristine Smith (Human Resources Manager) From: Joyce Holt (IT Manager) Date: June 1, 2014 Subject: Proposal for Online Résumés and possible upgrade to Electronic Résumés Kristine as per your memo to me about the mounts of paperwork your department wade through and the frustration you employee face reading the many résumés. This letter is to proposal a solution to the amount of paperwork in the hiring process at Memorial Hospital. The problem is the many résumés your department must store, and the employee must read to find the most qualify applicants for the position. I present a two part solution to this problem the first part of the solution, which is a quick fix the will help with the amount of paperwork your employees must read. Online Résumés: a résumé an individual submit to online résumé databanks, such as www.AMNhealthcare.com, www.rxrecruiters.com, or www.recruitersonline.com. Online résumés databanks are a temporary fix to this problem offering the needed qualify applicants for a specific job decreasing the number of résumés your employees must read to find the right persons for the position. Websites that host job boards and resume banks are in the business of making information about available jobs and job searchers accessible with relative ease and little cost (Brencic, 2014). In this regard, the websites’ potential to improve the workings of the labor market is considerable (Brencic, 2014); the websites can shorten the time that it takes to end the search...

Words: 1067 - Pages: 5

Premium Essay

Scanning Documents Into Pdf Files

...select a document preset or Custom Scan. You’ll be prompted after each page is scanned. To scan another page, select Scan More Pages, and click OK. When you’re finished, click Scan Is Complete, and click OK. 2. Optimize a scanned PDF file. Sometimes scanned PDF files contain more data than you need. To optimize a scanned PDF file, removing unnecessary data and reducing the file size, choose View > Tools > Document Processing, then choose Optimize Scanned PDF from the Tools Pane. Select the options that make sense for your document, and click OK. Tip: Confused about the optimization options? They’re described in detail in Acrobat Help. 3. Make text in the scanned PDF file searchable. Unless you selected an OCR (optical character recognition) option when you scanned, the document is originally an image of a page. To make the text searchable, Check the box for "Make Searchable...

Words: 519 - Pages: 3