SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013
DOI:10.5121/ijfcst.2013.3407 61
DEVNAGARI NUMERALS CLASSIFICATION AND
RECOGNITION USING AN INTEGRATED APPROACH
Kanika Bansal1
, Rajiv Kumar2
1
Student, SMCA, Thapar University, Patiala, Punjab, India.
knbs_ind@yahoo.com
2
Assistant Professor, SMCA, Thapar University, Patiala, Punjab, India.
rajiv.patiala@gmail.com
ABSTRACT
Character recognition has always been a challenging field for the researchers. There has been an
astounding progress in the development of the systems for character recognition. OCR performs the
recognition of the text in the scanned document image and converts it into editable form. The OCR process
can have several stages like preprocessing, segmentation, recognition and post processing. The recognition
generally, consists of feature extraction and classification. The choice of features and classification scheme
affects the performance of OCR largely. In this paper, a classification scheme is proposed for the
Devnagari numerals, which forms the basis for recognition. This approach integrates the structural
features and water reservoir analogy based feature to classify the Devnagari numeral. In order to classify a
single numeral, at most four checks are required. This increases the efficiency of the proposed scheme.
KEYWORDS
OCR, Devnagari Numerals, Feature Extraction, Classification.
1. INTRODUCTION
Character recognition is used as an umbrella term, which covers all types of machine recognition
of characters in various application domains. It is the processing of text based input patterns to
produce meaningful outputs with the help of a machine. The input may come from online devices
like tablets, stylus based devices or offline devices like scanners. Output may be a sequence of
symbols like ‘Y’, ‘E’ ,‘S’ or a date on cheque like ‘Nov 14, 2011’ or validation result of a
signature. This process can be used to translate articles, books and documents into electronic
format, to publish text on website, to process the cheques in banks, to sort letters and many more
applications. The image captured needs to pass through various stages which can be named as
preprocessing, segmentation, recognition and post processing as given by [1,2]. The various
stages of the character recognition process are shown in Figure 1 and are discussed here.
Figure 1. Stages of Character Recognition Process [3]
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013
62
Preprocessing Stage: The preprocessing stage includes all the functions required to produce the
cleaned up version of image acquired through scanner. It includes the processes like filtering,
binarization, thinning, smoothing.
Segmentation Stage: The segmentation stage refers to decomposing the document into
subcomponents. It deals with the separation of lines, words and characters according to the
application through usage of various segmentation strategies as in [4].
Recognition Stage: The recognition stage, which uses the various pattern recognition strategies,
assigns an unknown sample to a predefined class to identify the character according to the script
used.
Postprocessing Stage: The recognized characters are fed into the post processing stage, which
includes the usage of dictionary according to the script for purpose of spell check, grammar check
in order to enhance the rate of recognition.
Since this paper talks about the feature extraction and classification, it is discussed in the
following section.
2. FEATURE EXTRACTION AND CLASSIFICATION
The recognition consists of two stages namely, feature extraction and classification. The
recognition process assigns a character image to a predefined class by using a classification
algorithm based on the features extracted and the relationships among the features, as in [5].
Feature extraction is concerned with the identification of the defining attributes of the character
image. The selection of the features is a difficult task. As stated in [1], the features can be
classified into statistical features and structural features.
Statistical Features: It is a representation of a character image by statistical distribution of points.
They mainly include features like zoning, projection, profiles, crossings and distances.
Structural Features: They are based on topological and geometrical properties of the character.
They mainly include features like aspect ratio, cross points, loops, branch points, strokes and their
directions, horizontal curves at top or bottom etc.
The extraction of good features is the main key to recognize an unknown character accurately.
The classification stage is the main decision making stage of an OCR system and uses the
features extracted in the previous stage to identify the text segment according to preset rules. The
classification stage identifies each input character image by considering the detected features. The
classification stage uses several techniques for achieving its objectives.
The authors found that most approaches used for the classification are based on the neural
networks and its adaptations. These techniques are computationally difficult and require good
amount of time to perform the training of the systems in order to provide good results. Moreover,
the accuracy of the recognition system depends on the quality of the training of the system. Thus,
an effort has been made by the authors to develop a simpler approach for the character
recognition process, which is discussed in the next section.
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013
63
3. PROPOSED CLASSIFICATION AND RECOGNITION SCHEME
The proposed scheme derives its basis from the concept and scheme described in [6]. The authors
have developed the scheme for the Gurmukhi characters, where the water reservoir principle and
features like number of components, presence of side bar or loop has been used to validate the
segment of the input character image. They have used a hybrid scheme for the segmentation of
the characters, which is used for the recognition in the proposed work. Since, the classification
scheme works based on the features extracted from the character image, the features used in the
proposed scheme are discussed first. The features used here are an integration of the statistical
and structural features described in section 2. These features are explained in the next section.
3.1. FEATURES
The features used by the scheme are presence of sidebar, presence of loop, presence of water
reservoir. The loop and sidebar fall under the structural category of features while the water
reservoir falls under the statistical category as it uses projection and profiles for its extraction.
Thus, the current scheme is an integrated approach towards classification, which leads to
recognition. The features used are discussed here:-
Presence of Loop
The presence of loop is very robust feature for classifying the characters. A closed loop is a
pattern made up of several strokes that are formed when the writing instrument returns to a
previous location while touching the writing surface continuously, giving a closed outline with a
“hole” in the center. For instance, the numerals and have a loop while and does
not have it.
Presence of Sidebar
The presence or absence of sidebar in the character is an important classification feature. The
longest vertical run of black pixels on the columns of a text image can be said to a sidebar. For
instance, the numeral has a sidebar, while and does not have it.
Presence of Water Reservoir
The presence of water reservoir and its type acts as a good classification feature. The water
reservoir principle is as follows. If water is poured from one side of a component, the cavity
regions of the component where water will be stored are considered as reservoirs. The top,
bottom, left, and right reservoir of numerals are illustrated in Figure 2.
Figure 2. Water Reservoirs in Numerals
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013
64
For instance, numerals and have left reservoir, and have a top reservoir, and
have a right reservoir.
Based on these features, the classification structure is developed. The structure initiates with the
checking of presence of reservoir in the character image. A character image can have more than
one reservoirs present in it. The combination of the features extracted in the previous step, is used
to classify an input image. The classification structure is as shown in Figure 3.
Figure 3. Classification Structure for Devnagari Numerals
Initially, the check for the presence of left reservoir is used to classify the characters into two sub
classes. Then, the other features like presence of loop, presence of sidebar, presence of top and
right reservoirs are used to classify them further. The check for presence of loop in the upper
quadrant of the character image is also used to distinguish between two similar characters 2 and 3.
The classification structure can be used to recognize the Devnagari numerals in an efficient
manner. The proposed algorithm for the recognition of the Devnagari numerals based on the
feature extraction and classification structure is stated in the following section.
In the proposed work, the Top, Left, Right, Loop, Upper and Sidebar are Boolean variables. The
Numeral is an integer variable to store the result. The algorithm runs on a character image.
The proposed algorithm is:-
Set Left as true if left reservoir is present in the character image
Set Right as true if right reservoir is present in the character image
Set Top as true if top reservoir is present in the character image
Set Sidebar as true if sidebar is present in the character image
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013
65
Set Loop as true if loop is present in the character image and Set Upper as true if loop is present
in the upper quadrant of the character image
If Left is true
If Sidebar is true
If Top is true
Set Numeral as 5
Else
Set Numeral as 1
End If
Else
If Top is true
Set Numeral as 4
Else
If Loop is true and Upper is true
Set Numeral as 2
Else
Set Numeral as 3
End If
End If
End If
Else
If Right is true
If Sidebar is true
Set Numeral as 8
Else
If Loop is true
Set Numeral as 6
Else
Set Numeral as 9
End If
End If
Else
If Top is true
Set Numeral as 7
Else
Set Numeral as 0
End If
End If
End If
The proposed algorithm is implemented by the authors and the results obtained are discussed in
the following section.
4. RESULTS
The proposed algorithm for the classification and recognition of the Devnagari numerals is
implemented by the authors and it is applied to several documents. The documents are referred as
Doc1, Doc2, Doc3, Doc4, and Doc5 as shown in Table 1. The results are satisfying and
summarized here:-
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013
66
Table 1. Recognition Results for Handwritten Devnagari Numerals
Document Numerals
Present
Numerals
Recognized
Accuracy
(%)
Doc1 10 10 100
Doc2 60 58 96.67
Doc3 20 20 100
Doc4 30 29 96.67
Doc5 25 24 96
5. CONCLUSION
The Devnagari numeral recognition has application in various fields like reading details like
postal zip code, employee code, passport number and processing of forms and bank cheques.
These application demands an efficient scheme for the numeral recognition. The recognition
scheme is composed of feature extraction and classification. The features used in the scheme are
simple and easy to compute. The characters are initially classified on the presence of left reservoir
into 2 sub classes. Further, the features presence of sidebar, presence of loop, presence of top and
right reservoirs classifies the characters. The classification structure developed has a height of 4.
Hence, in order to classify a numeral, at most 4 checks are needed. This reduces the efforts
required to recognize the character, thereby, making it a simpler and easy task. Since, there is
some inaccurate recognition, which can be attributed to the reason that some input images were
not well formed. Hence, recognition results can be improvised if appropriate preprocessing is
applied to the document image.
REFERENCES
[1] N. Arica and F. Yarman-Vural, (2001) “An Overview of Character Recognition focused on Off-line
Handwriting,” IEEE Transactions on Systems, Man, and Cybernetics, vol. 31, no. 2, pp. 216-233.
[2] A. Senior and A. Robinson, (1998) “An Off-line Cursive Handwriting Recognition System,” IEEE
Transactions on Pattern Analysis and Machine Intelligence, vol. 20, no. 3, pp. 309-312.
[3] R. Kumar and A. Dhiman, (2010) “Challenges in Segmentation of Text in Handwritten Gurmukhi
Script,” in Proceedings of the International Conference on Recent Trends in Business Administration
and Information Processing, CCIS 70, Springer-Verlag Berlin Heidelberg, pp. 388-392.
[4] R. Casey and E. Lecolinet (1996) “A Survey of Methods and Strategies in Character Segmentation,”
IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 18, no. 7, pp. 690-706.
[5] G. S. Lehal and C. Singh (1999) “Feature Extraction and Classification for OCR of Gurmukhi Script,”
Vivek, vol. 12, no. 2, pp. 2-12.
[6] A. Kaur, R. Kumar and A. Singh (2010) “A Hybrid Approach to Classify Gurmukhi Script
Characters,” International Journal of Recent Trends in Engineering and Technology, vol. 3, no. 2, pp.
103-105.
AUTHORS
Rajiv Kumar obtained his Ph.D. from the University College of Engineering, Punjabi University, Patiala,
Punjab, India. At present, he is the Assistant Professor in the School of Mathematics and Computer
Applications, Thapar University, Patiala. He has published several articles in international journals and
conferences.
Kanika Bansal obtained her B.Tech. (CSE) from Guru Gobind Singh Indraprastha University, Delhi, India
and currently, pursuing her M.Tech. from Thapar University, Patiala, Punjab, India. She is currently
working in the document image processing area.

More Related Content

What's hot

A&D - Object Oriented Design using UML
A&D - Object Oriented Design using UMLA&D - Object Oriented Design using UML
A&D - Object Oriented Design using UML
vinay arora
 

What's hot (18)

An effective approach to offline arabic handwriting recognition
An effective approach to offline arabic handwriting recognitionAn effective approach to offline arabic handwriting recognition
An effective approach to offline arabic handwriting recognition
 
Distributed Graphical User Interfaces to Class Diagram: Reverse Engineering A...
Distributed Graphical User Interfaces to Class Diagram: Reverse Engineering A...Distributed Graphical User Interfaces to Class Diagram: Reverse Engineering A...
Distributed Graphical User Interfaces to Class Diagram: Reverse Engineering A...
 
Header Based Classification of Journals Using Document Image Segmentation and...
Header Based Classification of Journals Using Document Image Segmentation and...Header Based Classification of Journals Using Document Image Segmentation and...
Header Based Classification of Journals Using Document Image Segmentation and...
 
Co4201605611
Co4201605611Co4201605611
Co4201605611
 
A&D - Object Oriented Design using UML
A&D - Object Oriented Design using UMLA&D - Object Oriented Design using UML
A&D - Object Oriented Design using UML
 
class diagram
class diagramclass diagram
class diagram
 
Introduction to image processing and pattern recognition
Introduction to image processing and pattern recognitionIntroduction to image processing and pattern recognition
Introduction to image processing and pattern recognition
 
Collaboration Diagram
Collaboration DiagramCollaboration Diagram
Collaboration Diagram
 
Multimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture FeaturesMultimodal Biometrics at Feature Level Fusion using Texture Features
Multimodal Biometrics at Feature Level Fusion using Texture Features
 
Module 3 Object Oriented Data Models Object Oriented notations
Module 3  Object Oriented Data Models Object Oriented notationsModule 3  Object Oriented Data Models Object Oriented notations
Module 3 Object Oriented Data Models Object Oriented notations
 
FREEMAN CODE BASED ONLINE HANDWRITTEN CHARACTER RECOGNITION FOR MALAYALAM USI...
FREEMAN CODE BASED ONLINE HANDWRITTEN CHARACTER RECOGNITION FOR MALAYALAM USI...FREEMAN CODE BASED ONLINE HANDWRITTEN CHARACTER RECOGNITION FOR MALAYALAM USI...
FREEMAN CODE BASED ONLINE HANDWRITTEN CHARACTER RECOGNITION FOR MALAYALAM USI...
 
CS8592 Object Oriented Analysis & Design - UNIT II
CS8592 Object Oriented Analysis & Design - UNIT IICS8592 Object Oriented Analysis & Design - UNIT II
CS8592 Object Oriented Analysis & Design - UNIT II
 
An efficient feature selection in
An efficient feature selection inAn efficient feature selection in
An efficient feature selection in
 
K2 Algorithm-based Text Detection with An Adaptive Classifier Threshold
K2 Algorithm-based Text Detection with An Adaptive Classifier ThresholdK2 Algorithm-based Text Detection with An Adaptive Classifier Threshold
K2 Algorithm-based Text Detection with An Adaptive Classifier Threshold
 
Object Oriented Analysis (Coad-Yourdon)
Object Oriented Analysis (Coad-Yourdon)Object Oriented Analysis (Coad-Yourdon)
Object Oriented Analysis (Coad-Yourdon)
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
 
unified modelling language(UML) diagrams
unified modelling language(UML) diagramsunified modelling language(UML) diagrams
unified modelling language(UML) diagrams
 
S TRUCTURAL F EATURES F OR R ECOGNITION O F H AND W RITTEN K ANNADA C ...
S TRUCTURAL  F EATURES  F OR  R ECOGNITION O F  H AND  W RITTEN  K ANNADA  C ...S TRUCTURAL  F EATURES  F OR  R ECOGNITION O F  H AND  W RITTEN  K ANNADA  C ...
S TRUCTURAL F EATURES F OR R ECOGNITION O F H AND W RITTEN K ANNADA C ...
 

Similar to DEVNAGARI NUMERALS CLASSIFICATION AND RECOGNITION USING AN INTEGRATED APPROACH

Isolated Kannada Character Recognition using Chain Code Features
Isolated Kannada Character Recognition using Chain Code FeaturesIsolated Kannada Character Recognition using Chain Code Features
Isolated Kannada Character Recognition using Chain Code Features
International Journal of Science and Research (IJSR)
 

Similar to DEVNAGARI NUMERALS CLASSIFICATION AND RECOGNITION USING AN INTEGRATED APPROACH (20)

A017240107
A017240107A017240107
A017240107
 
I017256165
I017256165I017256165
I017256165
 
L017248388
L017248388L017248388
L017248388
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...
 
Offline Character Recognition Using Monte Carlo Method and Neural Network
Offline Character Recognition Using Monte Carlo Method and Neural NetworkOffline Character Recognition Using Monte Carlo Method and Neural Network
Offline Character Recognition Using Monte Carlo Method and Neural Network
 
Feature Extraction and Feature Selection using Textual Analysis
Feature Extraction and Feature Selection using Textual AnalysisFeature Extraction and Feature Selection using Textual Analysis
Feature Extraction and Feature Selection using Textual Analysis
 
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
 
An exhaustive font and size invariant classification scheme for ocr of devana...
An exhaustive font and size invariant classification scheme for ocr of devana...An exhaustive font and size invariant classification scheme for ocr of devana...
An exhaustive font and size invariant classification scheme for ocr of devana...
 
Pattern Recognition of Japanese Alphabet Katakana Using Airy Zeta Function
Pattern Recognition of Japanese Alphabet Katakana Using Airy Zeta FunctionPattern Recognition of Japanese Alphabet Katakana Using Airy Zeta Function
Pattern Recognition of Japanese Alphabet Katakana Using Airy Zeta Function
 
Isolated Kannada Character Recognition using Chain Code Features
Isolated Kannada Character Recognition using Chain Code FeaturesIsolated Kannada Character Recognition using Chain Code Features
Isolated Kannada Character Recognition using Chain Code Features
 
Object Capturing In A Cluttered Scene By Using Point Feature Matching
Object Capturing In A Cluttered Scene By Using Point Feature MatchingObject Capturing In A Cluttered Scene By Using Point Feature Matching
Object Capturing In A Cluttered Scene By Using Point Feature Matching
 
C031202014018
C031202014018C031202014018
C031202014018
 
IRJET- Optical Character Recognition using Image Processing
IRJET-  	  Optical Character Recognition using Image ProcessingIRJET-  	  Optical Character Recognition using Image Processing
IRJET- Optical Character Recognition using Image Processing
 
journal paper publication
journal paper publicationjournal paper publication
journal paper publication
 
Character Recognition (Devanagari Script)
Character Recognition (Devanagari Script)Character Recognition (Devanagari Script)
Character Recognition (Devanagari Script)
 
K-ALGORITHM: A MODIFIED TECHNIQUE FOR NOISE REMOVAL IN HANDWRITTEN DOCUMENTS
K-ALGORITHM: A MODIFIED TECHNIQUE FOR NOISE REMOVAL IN HANDWRITTEN DOCUMENTSK-ALGORITHM: A MODIFIED TECHNIQUE FOR NOISE REMOVAL IN HANDWRITTEN DOCUMENTS
K-ALGORITHM: A MODIFIED TECHNIQUE FOR NOISE REMOVAL IN HANDWRITTEN DOCUMENTS
 
K-ALGORITHM: A MODIFIED TECHNIQUE FOR NOISE REMOVAL IN HANDWRITTEN DOCUMENTS
K-ALGORITHM: A MODIFIED TECHNIQUE FOR NOISE REMOVAL IN HANDWRITTEN DOCUMENTSK-ALGORITHM: A MODIFIED TECHNIQUE FOR NOISE REMOVAL IN HANDWRITTEN DOCUMENTS
K-ALGORITHM: A MODIFIED TECHNIQUE FOR NOISE REMOVAL IN HANDWRITTEN DOCUMENTS
 
Performance Evaluation Of Ontology And Fuzzybase Cbir
Performance Evaluation Of Ontology And Fuzzybase CbirPerformance Evaluation Of Ontology And Fuzzybase Cbir
Performance Evaluation Of Ontology And Fuzzybase Cbir
 
PERFORMANCE EVALUATION OF ONTOLOGY AND FUZZYBASE CBIR
PERFORMANCE EVALUATION OF ONTOLOGY AND FUZZYBASE CBIRPERFORMANCE EVALUATION OF ONTOLOGY AND FUZZYBASE CBIR
PERFORMANCE EVALUATION OF ONTOLOGY AND FUZZYBASE CBIR
 
Journal Publishers
Journal PublishersJournal Publishers
Journal Publishers
 

More from ijfcstjournal

ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ijfcstjournal
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
ijfcstjournal
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
ijfcstjournal
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
ijfcstjournal
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
ijfcstjournal
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
ijfcstjournal
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
ijfcstjournal
 

More from ijfcstjournal (20)

ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
 
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGA SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
 
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESA COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
 
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
 
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGAN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
 
EAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYEAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITY
 
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSEDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
 
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMCOMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
 
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSPSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
 
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
 
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
 
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSAGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
 
International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 

DEVNAGARI NUMERALS CLASSIFICATION AND RECOGNITION USING AN INTEGRATED APPROACH

  • 1. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013 DOI:10.5121/ijfcst.2013.3407 61 DEVNAGARI NUMERALS CLASSIFICATION AND RECOGNITION USING AN INTEGRATED APPROACH Kanika Bansal1 , Rajiv Kumar2 1 Student, SMCA, Thapar University, Patiala, Punjab, India. knbs_ind@yahoo.com 2 Assistant Professor, SMCA, Thapar University, Patiala, Punjab, India. rajiv.patiala@gmail.com ABSTRACT Character recognition has always been a challenging field for the researchers. There has been an astounding progress in the development of the systems for character recognition. OCR performs the recognition of the text in the scanned document image and converts it into editable form. The OCR process can have several stages like preprocessing, segmentation, recognition and post processing. The recognition generally, consists of feature extraction and classification. The choice of features and classification scheme affects the performance of OCR largely. In this paper, a classification scheme is proposed for the Devnagari numerals, which forms the basis for recognition. This approach integrates the structural features and water reservoir analogy based feature to classify the Devnagari numeral. In order to classify a single numeral, at most four checks are required. This increases the efficiency of the proposed scheme. KEYWORDS OCR, Devnagari Numerals, Feature Extraction, Classification. 1. INTRODUCTION Character recognition is used as an umbrella term, which covers all types of machine recognition of characters in various application domains. It is the processing of text based input patterns to produce meaningful outputs with the help of a machine. The input may come from online devices like tablets, stylus based devices or offline devices like scanners. Output may be a sequence of symbols like ‘Y’, ‘E’ ,‘S’ or a date on cheque like ‘Nov 14, 2011’ or validation result of a signature. This process can be used to translate articles, books and documents into electronic format, to publish text on website, to process the cheques in banks, to sort letters and many more applications. The image captured needs to pass through various stages which can be named as preprocessing, segmentation, recognition and post processing as given by [1,2]. The various stages of the character recognition process are shown in Figure 1 and are discussed here. Figure 1. Stages of Character Recognition Process [3]
  • 2. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013 62 Preprocessing Stage: The preprocessing stage includes all the functions required to produce the cleaned up version of image acquired through scanner. It includes the processes like filtering, binarization, thinning, smoothing. Segmentation Stage: The segmentation stage refers to decomposing the document into subcomponents. It deals with the separation of lines, words and characters according to the application through usage of various segmentation strategies as in [4]. Recognition Stage: The recognition stage, which uses the various pattern recognition strategies, assigns an unknown sample to a predefined class to identify the character according to the script used. Postprocessing Stage: The recognized characters are fed into the post processing stage, which includes the usage of dictionary according to the script for purpose of spell check, grammar check in order to enhance the rate of recognition. Since this paper talks about the feature extraction and classification, it is discussed in the following section. 2. FEATURE EXTRACTION AND CLASSIFICATION The recognition consists of two stages namely, feature extraction and classification. The recognition process assigns a character image to a predefined class by using a classification algorithm based on the features extracted and the relationships among the features, as in [5]. Feature extraction is concerned with the identification of the defining attributes of the character image. The selection of the features is a difficult task. As stated in [1], the features can be classified into statistical features and structural features. Statistical Features: It is a representation of a character image by statistical distribution of points. They mainly include features like zoning, projection, profiles, crossings and distances. Structural Features: They are based on topological and geometrical properties of the character. They mainly include features like aspect ratio, cross points, loops, branch points, strokes and their directions, horizontal curves at top or bottom etc. The extraction of good features is the main key to recognize an unknown character accurately. The classification stage is the main decision making stage of an OCR system and uses the features extracted in the previous stage to identify the text segment according to preset rules. The classification stage identifies each input character image by considering the detected features. The classification stage uses several techniques for achieving its objectives. The authors found that most approaches used for the classification are based on the neural networks and its adaptations. These techniques are computationally difficult and require good amount of time to perform the training of the systems in order to provide good results. Moreover, the accuracy of the recognition system depends on the quality of the training of the system. Thus, an effort has been made by the authors to develop a simpler approach for the character recognition process, which is discussed in the next section.
  • 3. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013 63 3. PROPOSED CLASSIFICATION AND RECOGNITION SCHEME The proposed scheme derives its basis from the concept and scheme described in [6]. The authors have developed the scheme for the Gurmukhi characters, where the water reservoir principle and features like number of components, presence of side bar or loop has been used to validate the segment of the input character image. They have used a hybrid scheme for the segmentation of the characters, which is used for the recognition in the proposed work. Since, the classification scheme works based on the features extracted from the character image, the features used in the proposed scheme are discussed first. The features used here are an integration of the statistical and structural features described in section 2. These features are explained in the next section. 3.1. FEATURES The features used by the scheme are presence of sidebar, presence of loop, presence of water reservoir. The loop and sidebar fall under the structural category of features while the water reservoir falls under the statistical category as it uses projection and profiles for its extraction. Thus, the current scheme is an integrated approach towards classification, which leads to recognition. The features used are discussed here:- Presence of Loop The presence of loop is very robust feature for classifying the characters. A closed loop is a pattern made up of several strokes that are formed when the writing instrument returns to a previous location while touching the writing surface continuously, giving a closed outline with a “hole” in the center. For instance, the numerals and have a loop while and does not have it. Presence of Sidebar The presence or absence of sidebar in the character is an important classification feature. The longest vertical run of black pixels on the columns of a text image can be said to a sidebar. For instance, the numeral has a sidebar, while and does not have it. Presence of Water Reservoir The presence of water reservoir and its type acts as a good classification feature. The water reservoir principle is as follows. If water is poured from one side of a component, the cavity regions of the component where water will be stored are considered as reservoirs. The top, bottom, left, and right reservoir of numerals are illustrated in Figure 2. Figure 2. Water Reservoirs in Numerals
  • 4. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013 64 For instance, numerals and have left reservoir, and have a top reservoir, and have a right reservoir. Based on these features, the classification structure is developed. The structure initiates with the checking of presence of reservoir in the character image. A character image can have more than one reservoirs present in it. The combination of the features extracted in the previous step, is used to classify an input image. The classification structure is as shown in Figure 3. Figure 3. Classification Structure for Devnagari Numerals Initially, the check for the presence of left reservoir is used to classify the characters into two sub classes. Then, the other features like presence of loop, presence of sidebar, presence of top and right reservoirs are used to classify them further. The check for presence of loop in the upper quadrant of the character image is also used to distinguish between two similar characters 2 and 3. The classification structure can be used to recognize the Devnagari numerals in an efficient manner. The proposed algorithm for the recognition of the Devnagari numerals based on the feature extraction and classification structure is stated in the following section. In the proposed work, the Top, Left, Right, Loop, Upper and Sidebar are Boolean variables. The Numeral is an integer variable to store the result. The algorithm runs on a character image. The proposed algorithm is:- Set Left as true if left reservoir is present in the character image Set Right as true if right reservoir is present in the character image Set Top as true if top reservoir is present in the character image Set Sidebar as true if sidebar is present in the character image
  • 5. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013 65 Set Loop as true if loop is present in the character image and Set Upper as true if loop is present in the upper quadrant of the character image If Left is true If Sidebar is true If Top is true Set Numeral as 5 Else Set Numeral as 1 End If Else If Top is true Set Numeral as 4 Else If Loop is true and Upper is true Set Numeral as 2 Else Set Numeral as 3 End If End If End If Else If Right is true If Sidebar is true Set Numeral as 8 Else If Loop is true Set Numeral as 6 Else Set Numeral as 9 End If End If Else If Top is true Set Numeral as 7 Else Set Numeral as 0 End If End If End If The proposed algorithm is implemented by the authors and the results obtained are discussed in the following section. 4. RESULTS The proposed algorithm for the classification and recognition of the Devnagari numerals is implemented by the authors and it is applied to several documents. The documents are referred as Doc1, Doc2, Doc3, Doc4, and Doc5 as shown in Table 1. The results are satisfying and summarized here:-
  • 6. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.4, July 2013 66 Table 1. Recognition Results for Handwritten Devnagari Numerals Document Numerals Present Numerals Recognized Accuracy (%) Doc1 10 10 100 Doc2 60 58 96.67 Doc3 20 20 100 Doc4 30 29 96.67 Doc5 25 24 96 5. CONCLUSION The Devnagari numeral recognition has application in various fields like reading details like postal zip code, employee code, passport number and processing of forms and bank cheques. These application demands an efficient scheme for the numeral recognition. The recognition scheme is composed of feature extraction and classification. The features used in the scheme are simple and easy to compute. The characters are initially classified on the presence of left reservoir into 2 sub classes. Further, the features presence of sidebar, presence of loop, presence of top and right reservoirs classifies the characters. The classification structure developed has a height of 4. Hence, in order to classify a numeral, at most 4 checks are needed. This reduces the efforts required to recognize the character, thereby, making it a simpler and easy task. Since, there is some inaccurate recognition, which can be attributed to the reason that some input images were not well formed. Hence, recognition results can be improvised if appropriate preprocessing is applied to the document image. REFERENCES [1] N. Arica and F. Yarman-Vural, (2001) “An Overview of Character Recognition focused on Off-line Handwriting,” IEEE Transactions on Systems, Man, and Cybernetics, vol. 31, no. 2, pp. 216-233. [2] A. Senior and A. Robinson, (1998) “An Off-line Cursive Handwriting Recognition System,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 20, no. 3, pp. 309-312. [3] R. Kumar and A. Dhiman, (2010) “Challenges in Segmentation of Text in Handwritten Gurmukhi Script,” in Proceedings of the International Conference on Recent Trends in Business Administration and Information Processing, CCIS 70, Springer-Verlag Berlin Heidelberg, pp. 388-392. [4] R. Casey and E. Lecolinet (1996) “A Survey of Methods and Strategies in Character Segmentation,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 18, no. 7, pp. 690-706. [5] G. S. Lehal and C. Singh (1999) “Feature Extraction and Classification for OCR of Gurmukhi Script,” Vivek, vol. 12, no. 2, pp. 2-12. [6] A. Kaur, R. Kumar and A. Singh (2010) “A Hybrid Approach to Classify Gurmukhi Script Characters,” International Journal of Recent Trends in Engineering and Technology, vol. 3, no. 2, pp. 103-105. AUTHORS Rajiv Kumar obtained his Ph.D. from the University College of Engineering, Punjabi University, Patiala, Punjab, India. At present, he is the Assistant Professor in the School of Mathematics and Computer Applications, Thapar University, Patiala. He has published several articles in international journals and conferences. Kanika Bansal obtained her B.Tech. (CSE) from Guru Gobind Singh Indraprastha University, Delhi, India and currently, pursuing her M.Tech. from Thapar University, Patiala, Punjab, India. She is currently working in the document image processing area.