SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 3, Issue 2 (August 2012), PP. 47-53


  Document Image Segmentation for Analyzing of Data in Raster
                           Image
                 Dr .P.Sengottuvelan1, Mr.R.Arulmurugan2, Mr.R.Lokeshkumar3
        1,2,3
                Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam, India



Abstract––This paper focuses on the needs of developing an automated Digital Library Management system .The purpose
is to automate the task of analyzing data containing in raster image documents for the purpose of intelligent information
retrieval in digital library. An efficient and computationally fast method for segmenting text and graphics part of
document images based on multi-scale wavelet analysis and statistical pattern recognition is presented. The extracted text
is further classified into Title, Author name, name of the publication etc and being stored in the database for further
Library related operations. We do not assume any a priori information regarding the font size, scanning resolution, type
of layout, etc. of the document in our segmentation scheme.

Keywords–––Document segmentation, daubechies wavelet, Multiscale wavelet analysis, priori Information, Fourier
transform.

                                                I.      INTRODUCTION
In Today’s world, automated processing and reading of documents has become an imperative need with efforts have been
made to store the documents in digitized form, but that requires an enormous storing space, even after compression using
modern techniques. Documents can be more effectively represented by separating the text and the graphics/image part and
storing the text as an ASCII (character) set and the graphics/image part as bit-maps. Document image segmentation plays an
important role because this facilitates efficient searching and storage of the text part in documents, required in large
databases. Consequently, several researchers have attempted different techniques to segment the text and graphics part in
document images [1]. Several useful techniques for text–graphics segmentation are given in, the most popular amongst these
being the top-down and bottom-up approaches[2]-[4].
The most common top-down techniques are run-length smoothing and projection profiles. Top-down approaches first split
the document into blocks, which are then identified and subdivided appropriately in terms of columns first and then into
paragraphs, text lines, and maybe also words[5]-[8]. Some assume these blocks to be only rectangular. The top-down
methods are not suitable for skewed texts, as these methods are restricted to rectangular blocks, whereas the bottom-up
methods are typically variants of the connected components which iteratively group together components of the same type
starting from the pixel level and form higher level descriptions of the printed regions of the document (words, text lines,
paragraphs etc.). The drawbacks with the connected components method is that it is sensitive to character size, scanning
resolution, inter-line, and inter-character spacing. A wavelet-based tool has been designed by them for distinguishing text
from non text regions and characterization of font sizes [8]. Some of the common difficulties that occur in documents are
given below:
          Differences in font size, column layout, orientation, and other textual attributes.
          Skewed documents and text regions with different orientations.
          Degraded documents due to improper scanning.
          Combinations of varying text and background gray levels.
          Text regions touching or overlapping with non-text regions.
          Irregular layout structures with non-convex or overlapping object boundaries.
          Multicolumn document with misaligned text lines and different languages.

Thus to develop a full fledged system all the above said difficulties should be overcome.

                                          II.         PROPOSED SYSTEM
In the system thus proposed a technique called document image segmentation is used where text such as Title, Author name,
name of the publication etc.. is being extracted from the image being scanned (front cover of the book) classified accordingly
and is being stored in the database for further Library related operations. Thus the proposed system avoids the need for
manual entry of the information in the database.




                                                              47
Document Image Segmentation for Analyzing of Data in Raster Image




                                                      Fig.1.Raster Image

A working principle of the proposed system
       The image is being scanned from book using a good quality scanner.
       The textual regions are being separated and classified accordingly.
       Then the segmented text is being stored in the database for further library related operations.

                                       III.          WAVELET THEORY
           The wavelet transforms has many unique features that had made it a popular method for the purpose of image
processing. The wavelet transform performs a high degree of decor relation between neighboring pixels and it also provides
a distinct localization of the image in the spatial as well as frequency domain. The transform also provides an elegant sub-
band framework in which both high and low frequency component of the image can be analyzed separately.

A. Wavelet transform vs. Fourier transform
1. Similarities
           The fast Fourier transform(FFT) and the discrete wavelet transform(DWT) are both linear operations that generate
a data structure that contains log2n segments of various lengths, usually filling and transforming it into a different a data
vector of length 2n.The mathematical properties of the matrices involved in the transforms are similar as well. The inverse
transform matrix for both FFT and DWT is the transpose of the original. As a result, both transforms can be viewed as a
rotation in function space to a different domain. For the FFT, this new domain contains basis functions that are sines and
cosines. For the wavelet transform, this new domain contains more complicated basis functions called wavelets, mother
wavelets, or analyzing wavelets.
           Both transforms have another similarity, the basis functions are localized in frequency, making mathematical tools
such as power spectra useful at picking out frequencies and calculating power distributions.

2. Dissimilarities
           The most interesting dissimilarity between these two kinds of transforms is that individual wavelet functions are
localized in space. Fourier sine and cosine functions are not. This localization feature, along with wavelet localization of
frequency, makes many functions and operators using wavelets sparse when transformed into the wavelet domain. This
sparseness, in turn, results in a number of useful applications such as data compression, detecting features in images, and
removing noise from time series.
           An advantage of wavelet transforms is that the width of the windows varies. In order to isolate signal
discontinuities, one would like to have some very short basis functions. At the same time in order to obtain detail frequency
analysis, one would like to have some very long basis functions. A way to achieve this is to have short high-frequency basis
functions and long low-frequency ones. Thus wavelet analysis provides immediate access to information that can be
obscured by other time frequency methods such as Fourier analysis.

B. Wavelet Transform Applied on Images
           To use the wavelet transform for image processing we must implement a 2D version of the analysis and synthesis
filter banks. In the 2D case, the 1D analysis filter bank is first applied to the columns of the image and then applied to rows.
If the image has N1 rows and N2 columns, then after applying the 1D analysis filter bank to each column we have two sub
band images, each having N1/2 rows and N2 columns; after applying the 1D analysis filter bank to each row of both of the
two sub band images, we have four sub band images, each having N1/2 rows and N2/2 columns. This is illustrated in the
diagram below. The 2D synthesis filter bank combines the four sub band images to obtain the original image of size N1 by
N2. This is shown in figure.2.




                                                              48
Document Image Segmentation for Analyzing of Data in Raster Image




                                Fig .1: Multi resolution wavelet decomposition of an image.

         The following figure.3 is the decomposition of an image into four frequency bands by using wavelet transform as
explained above.




                   Fig.3: Decomposition of an image into four frequency bands by wavelet transforms

The continuous wavelet transform of a function is given as
Wf a (b)   f ( x)  a,b ( x)dx.
Applying wavelet transform for our sample image,

         In this paper we have taken a sample image (front cover of the book).we must use a good quality scanner such that
the scanned image is free from any noise or distortion. If so the noise is being eliminated by using suitable filtering
techniques. The scanned image can be in anyone of the formats like JPEG, BMP and Tiff. Here we have used JPEG format.
Image decomposition is achieved at many levels and many type of wavelets like harr, daubechies, coiflets, symlets etc can be
used. Here we have used daubechies wavelet for decomposing an image into various levels. The following figure illustrates
the wavelet transform applied on a sample image.

Level 1 Filter type: db1




Level 2 Filter type: db1




                                                             49
Document Image Segmentation for Analyzing of Data in Raster Image

C. Wavelet Scale–Space Features
           The feature-extraction scheme that we have used has a multi-channel filtering and a subsequent nonlinear stage
followed by a smoothing filter (both these constitute the local energy estimator) [8] [9].The objectives of the filtering and
that of the local energy estimator are to transform the edges between textures into detectable discontinuities.
           The filter bank, in essence, is a set of bandpass filters with frequency- and orientation-selective properties. In the
filtering stage, we make use of an eight-tap, four-band, orthogonal– and linear phase wavelet transform following to
decompose the textured images into M×M corresponding to different direction and scales [14]. The one-dimensional (1-D)
four-band wavelet filter impulse responses denoted by ψ r are given in Table I, and their corresponding transfer functions are
represented by H r for r =1,2..4. In this paper, we extend the decomposition to the 2-D case by successively applying the M -
band transform separably in the horizontal and vertical directions without downsampling (i.e., an overcomplete
representation). The size of the filter is an important factor. The filter length is increased with increased level of
decomposition. The sequences of low-pass and bandpass filters of increasing width corresponding to an increased level of
decomposition are expanded by inserting an appropriate number of zeros between taps of filters. So, if the filter length
becomes large, it is possible that it may bias the decomposition of the image. We have chosen an eight-tap filter for
suitability of the size of the image that we have considered in this study (i.e., 512×512)

                                   Table I - Coefficients for Eight-tap Four-band wavelet.
                        No.
                        of
                        Taps(
                                   1 (n)              2 (n)           3 (n)            4 (n)
                        n)
                           0        -0.067371764       -0.09419511       -0.09419511      -0.067371764
                           1         0.09419511        0.067371764      -0.067371764       -0.09419511
                           2         0.40580489         0.56737176       0.56737176        0.40580489
                           3         0.56737176         0.40580489       -0.40580489       -0.56737176
                           4         0.56737176        -0.40580489       -0.40580489       0.56737176
                           5         0.40580489        -0.56737176       0.56737176        -0.40580489
                           6         0.09419511       -0.067371764      0.067371764        0.09419511
                           7        -0.067371764        0.09419511       -0.09419511      0.067371764

          The objective of the filtering is to find out about the discontinuities that exist within the image. The spectral
response is strongest along the direction perpendicular to the edge of an image, while it decreases as the direction of the filter
approaches that of the edge [16]. Therefore we can perform edge detection by using 2-D filtering of the image as follows:
         Horizontal edges are detected by high-pass filtering on columns and low-pass filtering on rows.
         Vertical edges are detected by low-pass filtering on columns and high-pass filtering on rows.
         Diagonal edges are detected by high-pass filtering on columns and high-pass filtering on rows.
         Horizontal–diagonal edges are detected by high-pass filtering on columns and low-pass filtering on rows.
         Vertical–diagonal edges are detected by low-pass filtering on columns and high-pass filtering on rows.

         A typical edge-detection filter corresponding to a particular direction covers a certain region in the 2-D spatial-
frequency domain. Based on this concept, several wavelet-decomposition filters are designed which are given by the
summations ΣReg Hr, c, where Reg denotes the frequency sector of a certain direction and scale.




                                Fig.4: Frequency bands corresponding to decomposition filters.

The basic decomposition scheme followed in this paper is given in the following figure.5.

D. Local Energy Estimation
          The next step is to estimate the energy of the filter responses in a local region around each pixel. The local energy
estimate is utilized for the purpose of identifying areas in each channel where the band pass frequency components are
strong resulting in a high energy value and the areas where it is weak into a low energy value. Although energy is usually
defined in terms of a squaring nonlinearity, in a generalized energy function, however, other alternatives are also used.
          We have studied several nonlinear operators. These include the magnitude operation, average absolute deviation
and standard deviation calculated over small overlapping windows around each pixel. This nonlinear operator is
independent of any parameter, i.e., independent of the dynamic range of the input image and also of the filter amplification.




                                                               50
Document Image Segmentation for Analyzing of Data in Raster Image




                                            Fig.5: Basic decomposition scheme
The images resulting from these operations are the features denoted by   Feat hori , Featveri   etc. for i=1, 2, 3.as shown in
Fig.5




               Fig.6: (a) Test image with document skewed and text regions             (b) Segmented result.
                    with different orientations.

                                                            51
Document Image Segmentation for Analyzing of Data in Raster Image




          It is to be noted that all of our experiments were performed with no a priori knowledge about the input image. We
did not have any information about the font size or format of the text. While knowledge about these can definitely improve
the segmentation results, for this, we can make use of supervised segmentation.

                                           IV.            CONCLUSION
          We have segmented the text regions from the scanned image (Front cover of any image).The segmented text must
further be subjected to further analysis for identifying the characters that facilitates intelligent information retrieval that
could be used efficiently in our system. It is quite apparent that there is a need for digitization of documents for making it
easily accessible via computers and networks, but it is not absolutely necessary to align the document in raster direction.
           Thus the system overcomes the difficulties of the conventional bar code scanning wherein the user must manually
enter the details of every image that comes to the Cover design. This method of automation is more efficient and requires
less human labour. Thus an automated image information system is developed which minimizes manual interference
considerably saving time and money yet the system has its own difficulties like recognizing text with different font sizes and
styles may be quite difficult.

                                                     REFERENCES
[1].      S. N. Srihari, “Document image understanding,” Proc. IEEE Computer Society Fall Joint Computer Conf., pp. 87–
          96, Nov. 1986.
[2].      P. Chauvet, J. Lopez-Krahe, E. Taflin, and H. Maitre, “System for an intelligent office document analysis,
          recognition and description,” Signal Processing, vol. 32, no. 1–2, pp. 161–190, 1993.
[3].      F. M. wahl, K. Y. Wong, and R. G. Kasey, “Block segmentation and text extraction in mixed text/image
          documents,” Comput. Graph. Image Process, vol. 20, pp. 375–390, 1982.
[4].      F. Shih, S.-S. Chen, D. Hung, and P. Ng, “A document image segmentation, classification and recognition
          system,” in Proc. Int. Conf. Systems Integration, 1992, pp. 258–267.
[5].      O. Iwaki, H. Kida, and H. Arakawa, “A segmentation method based on office document hierarchical structure,” in
          Proc. Intl. Conf. Systems, Man and Cybernetics, 1987, pp. 375–390.
[6].      D. Wang and S. N. Srihari, “Classification of newspaper image blocks using texture analysis,” Compu. Vis.,
          Graph, Image Process, vol. 47, pp. 327–352, 1989.
[7].      G. Nagy, S. Seth, and M. Viswanathan, “A prototype document image analysis for technical journals,” Computer,
          vol. 25, no. 7, pp. 10–22, 1992.
[8].      Mausumi Acharyya and Malay K. Kundu, “ Document Image Segmentation Using Wavelet Scale–Space Features”
          IEEE transactions on circuits and systems for video technology, vol. 12, no. 12,December 2002.
[9].      M. Krishnamoorthy, G. Nagy, S. Seth, and M. Viswanathan, “Syntactic segmentation and labeling of digitized
          pages from technical journals,” IEEE Trans. Pattern Anal. Machine Intell., vol. 15, no. 7, pp. 737–747,1993.
[10].     G. Loum, P. Provent, J. Lemoine, and E. Petit, “A New method for texture classification based on wavelet
          transform,” in Proc. 3rd Int. Symp. Time-Frequency Time-Scale Analysis, June 1996, pp. 29–32.
[11].     S. G. Mallet, “A theory for multiresolution signal decomposition: The wavelet representation,” IEEE Trans.
          Pattern Anal. Machine Intel, vol. 11, July 1989.
[12].     O. Rioul and M. Vetterli, “Wavelets and signal processing,” IEEE Signal Processing Mag., vol. 8, pp. 14–38, Oct.
          1991.
[13].     O. Alkin and H. Caglar, “Design of efficient M-band coders with linear phase and perfect reconstruction
          properties,” IEEE Trans. Signal Processing, vol. 43, pp. 1579–1590, July 1995.
[14].     F. Y. Shih and S. Chen, “Adaptive document block segmentation and classification,” IEEE Trans. Syst., Man,
          Cybern. B, vol. 26, pp. 797–802, Oct. 1996.
[15].     M. Vetterli and J. Kovacevic, Wavelets and Subband Coding. Englewood Cliffs, NJ: Prentice-Hall, 1995, ch. 7.
[16].     D. Wang and S. N. Srihari, “Classification of newspaper image blocks using texture analysis,” Comput. Vis.,
          Graph, Image Process, vol. 47, pp. 327–352, 1989.
                                                             52
Document Image Segmentation for Analyzing of Data in Raster Image

[17].   Y. Meyer, Wavelets and Operators. Cambridge, U.K.: CambridgeUniv. Press, 1992.
[18].   O. J. Kwon and R. Chellappa, “Segmentation based image compression,”Opt. Eng., vol. 32, pp. 1581–1587, 1993.
[19].   M. Unser, “Texture classification and segmentation using wavelet frames,” IEEE Trans. Image Processing, vol. 4,
        pp. 1549–1560, Nov.1995.
[20].   A. Laine and J. Fan, “Frame representation for texture segmentation,”IEEE Trans. Image Processing, vol. 5, pp.
        771–779, May 1996.
[21].   T. Chang and C. C. J. Kuo, “Texture analysis and classification with tree-structured wavelet transform,” IEEE
        Trans. Image Processing, vol.2, pp. 42–44, Apr. 1993.




                                                         53

Contenu connexe

Tendances

DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...IOSR Journals
 
4 ijaems jun-2015-5-hybrid algorithmic approach for medical image compression...
4 ijaems jun-2015-5-hybrid algorithmic approach for medical image compression...4 ijaems jun-2015-5-hybrid algorithmic approach for medical image compression...
4 ijaems jun-2015-5-hybrid algorithmic approach for medical image compression...INFOGAIN PUBLICATION
 
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformContent Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformIOSR Journals
 
Review Paper on Image Processing Techniques
Review Paper on Image Processing TechniquesReview Paper on Image Processing Techniques
Review Paper on Image Processing TechniquesIJSRD
 
Color image analyses using four deferent transformations
Color image analyses using four deferent transformationsColor image analyses using four deferent transformations
Color image analyses using four deferent transformationsAlexander Decker
 
Color image compression based on spatial and magnitude signal decomposition
Color image compression based on spatial and magnitude signal decomposition Color image compression based on spatial and magnitude signal decomposition
Color image compression based on spatial and magnitude signal decomposition IJECEIAES
 
SULTHAN's - Data Structures
SULTHAN's - Data StructuresSULTHAN's - Data Structures
SULTHAN's - Data StructuresSULTHAN BASHA
 
A S URVEY ON D OCUMENT I MAGE A NALYSIS AND R ETRIEVAL S YSTEMS
A S URVEY ON  D OCUMENT  I MAGE  A NALYSIS AND  R ETRIEVAL  S YSTEMSA S URVEY ON  D OCUMENT  I MAGE  A NALYSIS AND  R ETRIEVAL  S YSTEMS
A S URVEY ON D OCUMENT I MAGE A NALYSIS AND R ETRIEVAL S YSTEMSIJCI JOURNAL
 
A broad ranging open access journal Fast and efficient online submission Expe...
A broad ranging open access journal Fast and efficient online submission Expe...A broad ranging open access journal Fast and efficient online submission Expe...
A broad ranging open access journal Fast and efficient online submission Expe...ijceronline
 
IMAGE TRANSFORMATION & DWT BASED IMAGE DECOMPOSITION FOR COVERT COMMUNICATION
IMAGE TRANSFORMATION & DWT BASED IMAGE DECOMPOSITION FOR COVERT COMMUNICATION IMAGE TRANSFORMATION & DWT BASED IMAGE DECOMPOSITION FOR COVERT COMMUNICATION
IMAGE TRANSFORMATION & DWT BASED IMAGE DECOMPOSITION FOR COVERT COMMUNICATION Editor Jacotech
 
Digital image processing
Digital image processingDigital image processing
Digital image processingVandana Verma
 
Paper id 21201419
Paper id 21201419Paper id 21201419
Paper id 21201419IJRAT
 
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...IJERA Editor
 
International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )ijsc
 

Tendances (16)

DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
 
4 ijaems jun-2015-5-hybrid algorithmic approach for medical image compression...
4 ijaems jun-2015-5-hybrid algorithmic approach for medical image compression...4 ijaems jun-2015-5-hybrid algorithmic approach for medical image compression...
4 ijaems jun-2015-5-hybrid algorithmic approach for medical image compression...
 
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet TransformContent Based Image Retrieval Using 2-D Discrete Wavelet Transform
Content Based Image Retrieval Using 2-D Discrete Wavelet Transform
 
Review Paper on Image Processing Techniques
Review Paper on Image Processing TechniquesReview Paper on Image Processing Techniques
Review Paper on Image Processing Techniques
 
Color image analyses using four deferent transformations
Color image analyses using four deferent transformationsColor image analyses using four deferent transformations
Color image analyses using four deferent transformations
 
Color image compression based on spatial and magnitude signal decomposition
Color image compression based on spatial and magnitude signal decomposition Color image compression based on spatial and magnitude signal decomposition
Color image compression based on spatial and magnitude signal decomposition
 
SULTHAN's - Data Structures
SULTHAN's - Data StructuresSULTHAN's - Data Structures
SULTHAN's - Data Structures
 
A S URVEY ON D OCUMENT I MAGE A NALYSIS AND R ETRIEVAL S YSTEMS
A S URVEY ON  D OCUMENT  I MAGE  A NALYSIS AND  R ETRIEVAL  S YSTEMSA S URVEY ON  D OCUMENT  I MAGE  A NALYSIS AND  R ETRIEVAL  S YSTEMS
A S URVEY ON D OCUMENT I MAGE A NALYSIS AND R ETRIEVAL S YSTEMS
 
A broad ranging open access journal Fast and efficient online submission Expe...
A broad ranging open access journal Fast and efficient online submission Expe...A broad ranging open access journal Fast and efficient online submission Expe...
A broad ranging open access journal Fast and efficient online submission Expe...
 
IMAGE TRANSFORMATION & DWT BASED IMAGE DECOMPOSITION FOR COVERT COMMUNICATION
IMAGE TRANSFORMATION & DWT BASED IMAGE DECOMPOSITION FOR COVERT COMMUNICATION IMAGE TRANSFORMATION & DWT BASED IMAGE DECOMPOSITION FOR COVERT COMMUNICATION
IMAGE TRANSFORMATION & DWT BASED IMAGE DECOMPOSITION FOR COVERT COMMUNICATION
 
Digital image processing
Digital image processingDigital image processing
Digital image processing
 
Paper id 21201419
Paper id 21201419Paper id 21201419
Paper id 21201419
 
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
 
International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )
 
Image mosaicing
Image mosaicingImage mosaicing
Image mosaicing
 
E1083237
E1083237E1083237
E1083237
 

En vedette

Lessons from various microinsurance schemes and key success factors
Lessons from various microinsurance schemes and key success factorsLessons from various microinsurance schemes and key success factors
Lessons from various microinsurance schemes and key success factorsGlobal Risk Forum GRFDavos
 
Trabajo 28 06-12 carlos anibal guzmán
Trabajo 28 06-12 carlos anibal guzmánTrabajo 28 06-12 carlos anibal guzmán
Trabajo 28 06-12 carlos anibal guzmánCANIGUZU
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Casamiento de cleopatra
Casamiento de cleopatraCasamiento de cleopatra
Casamiento de cleopatrabelenkuntz
 
Grant Thornton - Magazyn PLUS Podatki
Grant Thornton - Magazyn PLUS PodatkiGrant Thornton - Magazyn PLUS Podatki
Grant Thornton - Magazyn PLUS PodatkiGrant Thornton
 
Severe accidents of nuclear power plants in Europe: possible consequences and...
Severe accidents of nuclear power plants in Europe: possible consequences and...Severe accidents of nuclear power plants in Europe: possible consequences and...
Severe accidents of nuclear power plants in Europe: possible consequences and...Global Risk Forum GRFDavos
 
SS 30 Mentoring Program
SS 30 Mentoring ProgramSS 30 Mentoring Program
SS 30 Mentoring ProgramVinod Mehra
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
What is marketing and the marketing mix
What is marketing and the marketing mixWhat is marketing and the marketing mix
What is marketing and the marketing mixteacherhall
 
Recent and future developments in EU security research. From a counter-terror...
Recent and future developments in EU security research. From a counter-terror...Recent and future developments in EU security research. From a counter-terror...
Recent and future developments in EU security research. From a counter-terror...Global Risk Forum GRFDavos
 
Bmd 2 opdracht 1
Bmd 2 opdracht 1Bmd 2 opdracht 1
Bmd 2 opdracht 1Bloos6
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Freedom is singing the song of the sun in the rain.
Freedom is singing the song of the sun in the rain.Freedom is singing the song of the sun in the rain.
Freedom is singing the song of the sun in the rain.Rhea Myers
 
Proposal for a national earthquake insurance program for Greece
Proposal for a national earthquake insurance program for GreeceProposal for a national earthquake insurance program for Greece
Proposal for a national earthquake insurance program for GreeceGlobal Risk Forum GRFDavos
 
Jade和less 在WEB前端开发中的应用
Jade和less在WEB前端开发中的应用Jade和less在WEB前端开发中的应用
Jade和less 在WEB前端开发中的应用layerssss
 
Powerpoint class 2 historical avant garde debussy
Powerpoint class 2 historical avant garde debussyPowerpoint class 2 historical avant garde debussy
Powerpoint class 2 historical avant garde debussyrebakim
 
GT IBR 2012 - focus on Russia
GT IBR 2012 - focus on Russia GT IBR 2012 - focus on Russia
GT IBR 2012 - focus on Russia Grant Thornton
 
Pain nourishes courage. You can't be brave if you've only had wonderful thing...
Pain nourishes courage. You can't be brave if you've only had wonderful thing...Pain nourishes courage. You can't be brave if you've only had wonderful thing...
Pain nourishes courage. You can't be brave if you've only had wonderful thing...Rhea Myers
 
Grant Thornton - Facing an uncertain future: Government intervention threaten...
Grant Thornton - Facing an uncertain future: Government intervention threaten...Grant Thornton - Facing an uncertain future: Government intervention threaten...
Grant Thornton - Facing an uncertain future: Government intervention threaten...Grant Thornton
 

En vedette (20)

Horarios clase
Horarios claseHorarios clase
Horarios clase
 
Lessons from various microinsurance schemes and key success factors
Lessons from various microinsurance schemes and key success factorsLessons from various microinsurance schemes and key success factors
Lessons from various microinsurance schemes and key success factors
 
Trabajo 28 06-12 carlos anibal guzmán
Trabajo 28 06-12 carlos anibal guzmánTrabajo 28 06-12 carlos anibal guzmán
Trabajo 28 06-12 carlos anibal guzmán
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Casamiento de cleopatra
Casamiento de cleopatraCasamiento de cleopatra
Casamiento de cleopatra
 
Grant Thornton - Magazyn PLUS Podatki
Grant Thornton - Magazyn PLUS PodatkiGrant Thornton - Magazyn PLUS Podatki
Grant Thornton - Magazyn PLUS Podatki
 
Severe accidents of nuclear power plants in Europe: possible consequences and...
Severe accidents of nuclear power plants in Europe: possible consequences and...Severe accidents of nuclear power plants in Europe: possible consequences and...
Severe accidents of nuclear power plants in Europe: possible consequences and...
 
SS 30 Mentoring Program
SS 30 Mentoring ProgramSS 30 Mentoring Program
SS 30 Mentoring Program
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
What is marketing and the marketing mix
What is marketing and the marketing mixWhat is marketing and the marketing mix
What is marketing and the marketing mix
 
Recent and future developments in EU security research. From a counter-terror...
Recent and future developments in EU security research. From a counter-terror...Recent and future developments in EU security research. From a counter-terror...
Recent and future developments in EU security research. From a counter-terror...
 
Bmd 2 opdracht 1
Bmd 2 opdracht 1Bmd 2 opdracht 1
Bmd 2 opdracht 1
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Freedom is singing the song of the sun in the rain.
Freedom is singing the song of the sun in the rain.Freedom is singing the song of the sun in the rain.
Freedom is singing the song of the sun in the rain.
 
Proposal for a national earthquake insurance program for Greece
Proposal for a national earthquake insurance program for GreeceProposal for a national earthquake insurance program for Greece
Proposal for a national earthquake insurance program for Greece
 
Jade和less 在WEB前端开发中的应用
Jade和less在WEB前端开发中的应用Jade和less在WEB前端开发中的应用
Jade和less 在WEB前端开发中的应用
 
Powerpoint class 2 historical avant garde debussy
Powerpoint class 2 historical avant garde debussyPowerpoint class 2 historical avant garde debussy
Powerpoint class 2 historical avant garde debussy
 
GT IBR 2012 - focus on Russia
GT IBR 2012 - focus on Russia GT IBR 2012 - focus on Russia
GT IBR 2012 - focus on Russia
 
Pain nourishes courage. You can't be brave if you've only had wonderful thing...
Pain nourishes courage. You can't be brave if you've only had wonderful thing...Pain nourishes courage. You can't be brave if you've only had wonderful thing...
Pain nourishes courage. You can't be brave if you've only had wonderful thing...
 
Grant Thornton - Facing an uncertain future: Government intervention threaten...
Grant Thornton - Facing an uncertain future: Government intervention threaten...Grant Thornton - Facing an uncertain future: Government intervention threaten...
Grant Thornton - Facing an uncertain future: Government intervention threaten...
 

Similaire à IJERD (www.ijerd.com) International Journal of Engineering Research and Development IJERD : hard copy of journal, Call for Papers 2012, publishing of journal, journal of science and technology, research paper publishing, where to publish research paper,

Texture based feature extraction and object tracking
Texture based feature extraction and object trackingTexture based feature extraction and object tracking
Texture based feature extraction and object trackingPriyanka Goswami
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Annotated Bibliography On Multimedia Security
Annotated Bibliography On Multimedia SecurityAnnotated Bibliography On Multimedia Security
Annotated Bibliography On Multimedia SecurityBrenda Higgins
 
Feature Extraction and Feature Selection using Textual Analysis
Feature Extraction and Feature Selection using Textual AnalysisFeature Extraction and Feature Selection using Textual Analysis
Feature Extraction and Feature Selection using Textual Analysisvivatechijri
 
AVC based Compression of Compound Images Using Block Classification Scheme
AVC based Compression of Compound Images Using Block Classification SchemeAVC based Compression of Compound Images Using Block Classification Scheme
AVC based Compression of Compound Images Using Block Classification SchemeDR.P.S.JAGADEESH KUMAR
 
0 nidhi sethi_finalpaper--1-5
0 nidhi sethi_finalpaper--1-50 nidhi sethi_finalpaper--1-5
0 nidhi sethi_finalpaper--1-5Alexander Decker
 
Enhancement and Segmentation of Historical Records
Enhancement and Segmentation of Historical RecordsEnhancement and Segmentation of Historical Records
Enhancement and Segmentation of Historical Recordscsandit
 
Multi Wavelet for Image Retrival Based On Using Texture and Color Querys
Multi Wavelet for Image Retrival Based On Using Texture and  Color QuerysMulti Wavelet for Image Retrival Based On Using Texture and  Color Querys
Multi Wavelet for Image Retrival Based On Using Texture and Color QuerysIOSR Journals
 
Low Memory Low Complexity Image Compression Using HSSPIHT Encoder
Low Memory Low Complexity Image Compression Using HSSPIHT EncoderLow Memory Low Complexity Image Compression Using HSSPIHT Encoder
Low Memory Low Complexity Image Compression Using HSSPIHT EncoderIJERA Editor
 
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVALEFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVALsipij
 
Header Based Classification of Journals Using Document Image Segmentation and...
Header Based Classification of Journals Using Document Image Segmentation and...Header Based Classification of Journals Using Document Image Segmentation and...
Header Based Classification of Journals Using Document Image Segmentation and...CSCJournals
 
A Study of Image Compression Methods
A Study of Image Compression MethodsA Study of Image Compression Methods
A Study of Image Compression MethodsIOSR Journals
 
Binarization of Degraded Text documents and Palm Leaf Manuscripts
Binarization of Degraded Text documents and Palm Leaf ManuscriptsBinarization of Degraded Text documents and Palm Leaf Manuscripts
Binarization of Degraded Text documents and Palm Leaf ManuscriptsIRJET Journal
 
Comparison of various Image Registration Techniques with the Proposed Hybrid ...
Comparison of various Image Registration Techniques with the Proposed Hybrid ...Comparison of various Image Registration Techniques with the Proposed Hybrid ...
Comparison of various Image Registration Techniques with the Proposed Hybrid ...idescitation
 
Image compression techniques by using wavelet transform
Image compression techniques by using wavelet transformImage compression techniques by using wavelet transform
Image compression techniques by using wavelet transformAlexander Decker
 
A High Performance Modified SPIHT for Scalable Image Compression
A High Performance Modified SPIHT for Scalable Image CompressionA High Performance Modified SPIHT for Scalable Image Compression
A High Performance Modified SPIHT for Scalable Image CompressionCSCJournals
 

Similaire à IJERD (www.ijerd.com) International Journal of Engineering Research and Development IJERD : hard copy of journal, Call for Papers 2012, publishing of journal, journal of science and technology, research paper publishing, where to publish research paper, (20)

Texture based feature extraction and object tracking
Texture based feature extraction and object trackingTexture based feature extraction and object tracking
Texture based feature extraction and object tracking
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
D010332630
D010332630D010332630
D010332630
 
E1803012329
E1803012329E1803012329
E1803012329
 
Annotated Bibliography On Multimedia Security
Annotated Bibliography On Multimedia SecurityAnnotated Bibliography On Multimedia Security
Annotated Bibliography On Multimedia Security
 
Feature Extraction and Feature Selection using Textual Analysis
Feature Extraction and Feature Selection using Textual AnalysisFeature Extraction and Feature Selection using Textual Analysis
Feature Extraction and Feature Selection using Textual Analysis
 
AVC based Compression of Compound Images Using Block Classification Scheme
AVC based Compression of Compound Images Using Block Classification SchemeAVC based Compression of Compound Images Using Block Classification Scheme
AVC based Compression of Compound Images Using Block Classification Scheme
 
F045053236
F045053236F045053236
F045053236
 
0 nidhi sethi_finalpaper--1-5
0 nidhi sethi_finalpaper--1-50 nidhi sethi_finalpaper--1-5
0 nidhi sethi_finalpaper--1-5
 
Enhancement and Segmentation of Historical Records
Enhancement and Segmentation of Historical RecordsEnhancement and Segmentation of Historical Records
Enhancement and Segmentation of Historical Records
 
Multi Wavelet for Image Retrival Based On Using Texture and Color Querys
Multi Wavelet for Image Retrival Based On Using Texture and  Color QuerysMulti Wavelet for Image Retrival Based On Using Texture and  Color Querys
Multi Wavelet for Image Retrival Based On Using Texture and Color Querys
 
Low Memory Low Complexity Image Compression Using HSSPIHT Encoder
Low Memory Low Complexity Image Compression Using HSSPIHT EncoderLow Memory Low Complexity Image Compression Using HSSPIHT Encoder
Low Memory Low Complexity Image Compression Using HSSPIHT Encoder
 
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVALEFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
 
Ac03401600163.
Ac03401600163.Ac03401600163.
Ac03401600163.
 
Header Based Classification of Journals Using Document Image Segmentation and...
Header Based Classification of Journals Using Document Image Segmentation and...Header Based Classification of Journals Using Document Image Segmentation and...
Header Based Classification of Journals Using Document Image Segmentation and...
 
A Study of Image Compression Methods
A Study of Image Compression MethodsA Study of Image Compression Methods
A Study of Image Compression Methods
 
Binarization of Degraded Text documents and Palm Leaf Manuscripts
Binarization of Degraded Text documents and Palm Leaf ManuscriptsBinarization of Degraded Text documents and Palm Leaf Manuscripts
Binarization of Degraded Text documents and Palm Leaf Manuscripts
 
Comparison of various Image Registration Techniques with the Proposed Hybrid ...
Comparison of various Image Registration Techniques with the Proposed Hybrid ...Comparison of various Image Registration Techniques with the Proposed Hybrid ...
Comparison of various Image Registration Techniques with the Proposed Hybrid ...
 
Image compression techniques by using wavelet transform
Image compression techniques by using wavelet transformImage compression techniques by using wavelet transform
Image compression techniques by using wavelet transform
 
A High Performance Modified SPIHT for Scalable Image Compression
A High Performance Modified SPIHT for Scalable Image CompressionA High Performance Modified SPIHT for Scalable Image Compression
A High Performance Modified SPIHT for Scalable Image Compression
 

Plus de IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

Plus de IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Dernier

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Dernier (20)

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

IJERD (www.ijerd.com) International Journal of Engineering Research and Development IJERD : hard copy of journal, Call for Papers 2012, publishing of journal, journal of science and technology, research paper publishing, where to publish research paper,

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 3, Issue 2 (August 2012), PP. 47-53 Document Image Segmentation for Analyzing of Data in Raster Image Dr .P.Sengottuvelan1, Mr.R.Arulmurugan2, Mr.R.Lokeshkumar3 1,2,3 Department of Information Technology, Bannari Amman Institute of Technology, Sathyamangalam, India Abstract––This paper focuses on the needs of developing an automated Digital Library Management system .The purpose is to automate the task of analyzing data containing in raster image documents for the purpose of intelligent information retrieval in digital library. An efficient and computationally fast method for segmenting text and graphics part of document images based on multi-scale wavelet analysis and statistical pattern recognition is presented. The extracted text is further classified into Title, Author name, name of the publication etc and being stored in the database for further Library related operations. We do not assume any a priori information regarding the font size, scanning resolution, type of layout, etc. of the document in our segmentation scheme. Keywords–––Document segmentation, daubechies wavelet, Multiscale wavelet analysis, priori Information, Fourier transform. I. INTRODUCTION In Today’s world, automated processing and reading of documents has become an imperative need with efforts have been made to store the documents in digitized form, but that requires an enormous storing space, even after compression using modern techniques. Documents can be more effectively represented by separating the text and the graphics/image part and storing the text as an ASCII (character) set and the graphics/image part as bit-maps. Document image segmentation plays an important role because this facilitates efficient searching and storage of the text part in documents, required in large databases. Consequently, several researchers have attempted different techniques to segment the text and graphics part in document images [1]. Several useful techniques for text–graphics segmentation are given in, the most popular amongst these being the top-down and bottom-up approaches[2]-[4]. The most common top-down techniques are run-length smoothing and projection profiles. Top-down approaches first split the document into blocks, which are then identified and subdivided appropriately in terms of columns first and then into paragraphs, text lines, and maybe also words[5]-[8]. Some assume these blocks to be only rectangular. The top-down methods are not suitable for skewed texts, as these methods are restricted to rectangular blocks, whereas the bottom-up methods are typically variants of the connected components which iteratively group together components of the same type starting from the pixel level and form higher level descriptions of the printed regions of the document (words, text lines, paragraphs etc.). The drawbacks with the connected components method is that it is sensitive to character size, scanning resolution, inter-line, and inter-character spacing. A wavelet-based tool has been designed by them for distinguishing text from non text regions and characterization of font sizes [8]. Some of the common difficulties that occur in documents are given below:  Differences in font size, column layout, orientation, and other textual attributes.  Skewed documents and text regions with different orientations.  Degraded documents due to improper scanning.  Combinations of varying text and background gray levels.  Text regions touching or overlapping with non-text regions.  Irregular layout structures with non-convex or overlapping object boundaries.  Multicolumn document with misaligned text lines and different languages. Thus to develop a full fledged system all the above said difficulties should be overcome. II. PROPOSED SYSTEM In the system thus proposed a technique called document image segmentation is used where text such as Title, Author name, name of the publication etc.. is being extracted from the image being scanned (front cover of the book) classified accordingly and is being stored in the database for further Library related operations. Thus the proposed system avoids the need for manual entry of the information in the database. 47
  • 2. Document Image Segmentation for Analyzing of Data in Raster Image Fig.1.Raster Image A working principle of the proposed system  The image is being scanned from book using a good quality scanner.  The textual regions are being separated and classified accordingly.  Then the segmented text is being stored in the database for further library related operations. III. WAVELET THEORY The wavelet transforms has many unique features that had made it a popular method for the purpose of image processing. The wavelet transform performs a high degree of decor relation between neighboring pixels and it also provides a distinct localization of the image in the spatial as well as frequency domain. The transform also provides an elegant sub- band framework in which both high and low frequency component of the image can be analyzed separately. A. Wavelet transform vs. Fourier transform 1. Similarities The fast Fourier transform(FFT) and the discrete wavelet transform(DWT) are both linear operations that generate a data structure that contains log2n segments of various lengths, usually filling and transforming it into a different a data vector of length 2n.The mathematical properties of the matrices involved in the transforms are similar as well. The inverse transform matrix for both FFT and DWT is the transpose of the original. As a result, both transforms can be viewed as a rotation in function space to a different domain. For the FFT, this new domain contains basis functions that are sines and cosines. For the wavelet transform, this new domain contains more complicated basis functions called wavelets, mother wavelets, or analyzing wavelets. Both transforms have another similarity, the basis functions are localized in frequency, making mathematical tools such as power spectra useful at picking out frequencies and calculating power distributions. 2. Dissimilarities The most interesting dissimilarity between these two kinds of transforms is that individual wavelet functions are localized in space. Fourier sine and cosine functions are not. This localization feature, along with wavelet localization of frequency, makes many functions and operators using wavelets sparse when transformed into the wavelet domain. This sparseness, in turn, results in a number of useful applications such as data compression, detecting features in images, and removing noise from time series. An advantage of wavelet transforms is that the width of the windows varies. In order to isolate signal discontinuities, one would like to have some very short basis functions. At the same time in order to obtain detail frequency analysis, one would like to have some very long basis functions. A way to achieve this is to have short high-frequency basis functions and long low-frequency ones. Thus wavelet analysis provides immediate access to information that can be obscured by other time frequency methods such as Fourier analysis. B. Wavelet Transform Applied on Images To use the wavelet transform for image processing we must implement a 2D version of the analysis and synthesis filter banks. In the 2D case, the 1D analysis filter bank is first applied to the columns of the image and then applied to rows. If the image has N1 rows and N2 columns, then after applying the 1D analysis filter bank to each column we have two sub band images, each having N1/2 rows and N2 columns; after applying the 1D analysis filter bank to each row of both of the two sub band images, we have four sub band images, each having N1/2 rows and N2/2 columns. This is illustrated in the diagram below. The 2D synthesis filter bank combines the four sub band images to obtain the original image of size N1 by N2. This is shown in figure.2. 48
  • 3. Document Image Segmentation for Analyzing of Data in Raster Image Fig .1: Multi resolution wavelet decomposition of an image. The following figure.3 is the decomposition of an image into four frequency bands by using wavelet transform as explained above. Fig.3: Decomposition of an image into four frequency bands by wavelet transforms The continuous wavelet transform of a function is given as Wf a (b)   f ( x)  a,b ( x)dx. Applying wavelet transform for our sample image, In this paper we have taken a sample image (front cover of the book).we must use a good quality scanner such that the scanned image is free from any noise or distortion. If so the noise is being eliminated by using suitable filtering techniques. The scanned image can be in anyone of the formats like JPEG, BMP and Tiff. Here we have used JPEG format. Image decomposition is achieved at many levels and many type of wavelets like harr, daubechies, coiflets, symlets etc can be used. Here we have used daubechies wavelet for decomposing an image into various levels. The following figure illustrates the wavelet transform applied on a sample image. Level 1 Filter type: db1 Level 2 Filter type: db1 49
  • 4. Document Image Segmentation for Analyzing of Data in Raster Image C. Wavelet Scale–Space Features The feature-extraction scheme that we have used has a multi-channel filtering and a subsequent nonlinear stage followed by a smoothing filter (both these constitute the local energy estimator) [8] [9].The objectives of the filtering and that of the local energy estimator are to transform the edges between textures into detectable discontinuities. The filter bank, in essence, is a set of bandpass filters with frequency- and orientation-selective properties. In the filtering stage, we make use of an eight-tap, four-band, orthogonal– and linear phase wavelet transform following to decompose the textured images into M×M corresponding to different direction and scales [14]. The one-dimensional (1-D) four-band wavelet filter impulse responses denoted by ψ r are given in Table I, and their corresponding transfer functions are represented by H r for r =1,2..4. In this paper, we extend the decomposition to the 2-D case by successively applying the M - band transform separably in the horizontal and vertical directions without downsampling (i.e., an overcomplete representation). The size of the filter is an important factor. The filter length is increased with increased level of decomposition. The sequences of low-pass and bandpass filters of increasing width corresponding to an increased level of decomposition are expanded by inserting an appropriate number of zeros between taps of filters. So, if the filter length becomes large, it is possible that it may bias the decomposition of the image. We have chosen an eight-tap filter for suitability of the size of the image that we have considered in this study (i.e., 512×512) Table I - Coefficients for Eight-tap Four-band wavelet. No. of Taps( 1 (n) 2 (n) 3 (n) 4 (n) n) 0 -0.067371764 -0.09419511 -0.09419511 -0.067371764 1 0.09419511 0.067371764 -0.067371764 -0.09419511 2 0.40580489 0.56737176 0.56737176 0.40580489 3 0.56737176 0.40580489 -0.40580489 -0.56737176 4 0.56737176 -0.40580489 -0.40580489 0.56737176 5 0.40580489 -0.56737176 0.56737176 -0.40580489 6 0.09419511 -0.067371764 0.067371764 0.09419511 7 -0.067371764 0.09419511 -0.09419511 0.067371764 The objective of the filtering is to find out about the discontinuities that exist within the image. The spectral response is strongest along the direction perpendicular to the edge of an image, while it decreases as the direction of the filter approaches that of the edge [16]. Therefore we can perform edge detection by using 2-D filtering of the image as follows:  Horizontal edges are detected by high-pass filtering on columns and low-pass filtering on rows.  Vertical edges are detected by low-pass filtering on columns and high-pass filtering on rows.  Diagonal edges are detected by high-pass filtering on columns and high-pass filtering on rows.  Horizontal–diagonal edges are detected by high-pass filtering on columns and low-pass filtering on rows.  Vertical–diagonal edges are detected by low-pass filtering on columns and high-pass filtering on rows. A typical edge-detection filter corresponding to a particular direction covers a certain region in the 2-D spatial- frequency domain. Based on this concept, several wavelet-decomposition filters are designed which are given by the summations ΣReg Hr, c, where Reg denotes the frequency sector of a certain direction and scale. Fig.4: Frequency bands corresponding to decomposition filters. The basic decomposition scheme followed in this paper is given in the following figure.5. D. Local Energy Estimation The next step is to estimate the energy of the filter responses in a local region around each pixel. The local energy estimate is utilized for the purpose of identifying areas in each channel where the band pass frequency components are strong resulting in a high energy value and the areas where it is weak into a low energy value. Although energy is usually defined in terms of a squaring nonlinearity, in a generalized energy function, however, other alternatives are also used. We have studied several nonlinear operators. These include the magnitude operation, average absolute deviation and standard deviation calculated over small overlapping windows around each pixel. This nonlinear operator is independent of any parameter, i.e., independent of the dynamic range of the input image and also of the filter amplification. 50
  • 5. Document Image Segmentation for Analyzing of Data in Raster Image Fig.5: Basic decomposition scheme The images resulting from these operations are the features denoted by Feat hori , Featveri etc. for i=1, 2, 3.as shown in Fig.5 Fig.6: (a) Test image with document skewed and text regions (b) Segmented result. with different orientations. 51
  • 6. Document Image Segmentation for Analyzing of Data in Raster Image It is to be noted that all of our experiments were performed with no a priori knowledge about the input image. We did not have any information about the font size or format of the text. While knowledge about these can definitely improve the segmentation results, for this, we can make use of supervised segmentation. IV. CONCLUSION We have segmented the text regions from the scanned image (Front cover of any image).The segmented text must further be subjected to further analysis for identifying the characters that facilitates intelligent information retrieval that could be used efficiently in our system. It is quite apparent that there is a need for digitization of documents for making it easily accessible via computers and networks, but it is not absolutely necessary to align the document in raster direction. Thus the system overcomes the difficulties of the conventional bar code scanning wherein the user must manually enter the details of every image that comes to the Cover design. This method of automation is more efficient and requires less human labour. Thus an automated image information system is developed which minimizes manual interference considerably saving time and money yet the system has its own difficulties like recognizing text with different font sizes and styles may be quite difficult. REFERENCES [1]. S. N. Srihari, “Document image understanding,” Proc. IEEE Computer Society Fall Joint Computer Conf., pp. 87– 96, Nov. 1986. [2]. P. Chauvet, J. Lopez-Krahe, E. Taflin, and H. Maitre, “System for an intelligent office document analysis, recognition and description,” Signal Processing, vol. 32, no. 1–2, pp. 161–190, 1993. [3]. F. M. wahl, K. Y. Wong, and R. G. Kasey, “Block segmentation and text extraction in mixed text/image documents,” Comput. Graph. Image Process, vol. 20, pp. 375–390, 1982. [4]. F. Shih, S.-S. Chen, D. Hung, and P. Ng, “A document image segmentation, classification and recognition system,” in Proc. Int. Conf. Systems Integration, 1992, pp. 258–267. [5]. O. Iwaki, H. Kida, and H. Arakawa, “A segmentation method based on office document hierarchical structure,” in Proc. Intl. Conf. Systems, Man and Cybernetics, 1987, pp. 375–390. [6]. D. Wang and S. N. Srihari, “Classification of newspaper image blocks using texture analysis,” Compu. Vis., Graph, Image Process, vol. 47, pp. 327–352, 1989. [7]. G. Nagy, S. Seth, and M. Viswanathan, “A prototype document image analysis for technical journals,” Computer, vol. 25, no. 7, pp. 10–22, 1992. [8]. Mausumi Acharyya and Malay K. Kundu, “ Document Image Segmentation Using Wavelet Scale–Space Features” IEEE transactions on circuits and systems for video technology, vol. 12, no. 12,December 2002. [9]. M. Krishnamoorthy, G. Nagy, S. Seth, and M. Viswanathan, “Syntactic segmentation and labeling of digitized pages from technical journals,” IEEE Trans. Pattern Anal. Machine Intell., vol. 15, no. 7, pp. 737–747,1993. [10]. G. Loum, P. Provent, J. Lemoine, and E. Petit, “A New method for texture classification based on wavelet transform,” in Proc. 3rd Int. Symp. Time-Frequency Time-Scale Analysis, June 1996, pp. 29–32. [11]. S. G. Mallet, “A theory for multiresolution signal decomposition: The wavelet representation,” IEEE Trans. Pattern Anal. Machine Intel, vol. 11, July 1989. [12]. O. Rioul and M. Vetterli, “Wavelets and signal processing,” IEEE Signal Processing Mag., vol. 8, pp. 14–38, Oct. 1991. [13]. O. Alkin and H. Caglar, “Design of efficient M-band coders with linear phase and perfect reconstruction properties,” IEEE Trans. Signal Processing, vol. 43, pp. 1579–1590, July 1995. [14]. F. Y. Shih and S. Chen, “Adaptive document block segmentation and classification,” IEEE Trans. Syst., Man, Cybern. B, vol. 26, pp. 797–802, Oct. 1996. [15]. M. Vetterli and J. Kovacevic, Wavelets and Subband Coding. Englewood Cliffs, NJ: Prentice-Hall, 1995, ch. 7. [16]. D. Wang and S. N. Srihari, “Classification of newspaper image blocks using texture analysis,” Comput. Vis., Graph, Image Process, vol. 47, pp. 327–352, 1989. 52
  • 7. Document Image Segmentation for Analyzing of Data in Raster Image [17]. Y. Meyer, Wavelets and Operators. Cambridge, U.K.: CambridgeUniv. Press, 1992. [18]. O. J. Kwon and R. Chellappa, “Segmentation based image compression,”Opt. Eng., vol. 32, pp. 1581–1587, 1993. [19]. M. Unser, “Texture classification and segmentation using wavelet frames,” IEEE Trans. Image Processing, vol. 4, pp. 1549–1560, Nov.1995. [20]. A. Laine and J. Fan, “Frame representation for texture segmentation,”IEEE Trans. Image Processing, vol. 5, pp. 771–779, May 1996. [21]. T. Chang and C. C. J. Kuo, “Texture analysis and classification with tree-structured wavelet transform,” IEEE Trans. Image Processing, vol.2, pp. 42–44, Apr. 1993. 53