SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
Mahvashakbari et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.375-380

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

Rotation and Scale Invariant Feature Extraction Using Complex
Zernike Moments Forfarsiand Arabic Handwriting Character
Mahvashakbari1, Maryam Khademi2
1
2

Department of ComputerScience, Science and Research Branch, Islamic Azad University, Saveh, Iran
Applied Mathematics Department, Islamic Azad University, South Tehran Branch, Tehran, Iran

Abstract
Analyzing Farsi and Arabic handwritten documents is one area in image processing whose target is to transform
picture documents into symbolic form. This transformation is conducted o make rapid and easy saving,
improvements, retrieval, reuse, searching and transferring documents. Analyzing documents is performed in five
stages: pre-processing, segmentation representation, recognition and post-processing. In this research, in first stage
the required pre-processing is performed to normalize the image. In recognition stage, zernik moments–based
method has been introduced to extract feature of Farsi and Arabic handwritten characters. Outputs of zernik
moments are put in systematic clustering to decide about characters. The obtained results show that feature
extraction using zernik moments is a suitable method that deals with few rotation-independent featuresand this leads
to reduce calculations and increase speed of recognition and stability against rotation. Size–independence is obtained
using difference and at least distance of image calculations, because of preprocessing stage which has been
performed in this algorithm is transfer-independent. Valid rank of zenik moments to extract features during
conducted test is 4 – 38. Cluster applying has led to reduce algorithm expenditure tplog(n) and this one advantage of
the suggested algorithm .
Keywords: Rotation and Scale Invariant Feature Extraction, zernik complex moments, Farsi and Arabic
handwritten characters.
have some necessary features such as recognition
capability,scaleinvarient, transfer and rotation, noise –
I.
Introduction
resistance, statistical independence and reliability.
An image is valued one thousand words is a
Generally, image descriptor is a set of numbers
quotation form Confucius, a Chinese philosopher in
obtained to describe image properties. Correctness and
2500 years ago. Todays, essence of this sentence is
accuracy of suitable retrieval needs an image descriptor
perceived completely. Visual data plays an important
that can retrieve similar images from a database
role in the society and this role will be increased and
significantly. Descriptors are often in a diagram form.
there will be intensive need to process these features in
Image
descriptors
should
satisfy
following
future. Pictures and images are applied in many
requirements:
application environments such as architecture and
• Descriptors should be complete as much as
drawing, journalism, advertisement, amusement,
possible to provide data items.
etc.How to search and retrieve considered images
• Descriptors should be provided and save briefly.
quickly against nature and rapid increment of images is
• Calculation of distance between descriptors should
a basic consideration that requires and image – retrieval
be simple.
system. Visual properties of images provide a
Optical
characters
recognition
(OCR)
description from their contents. Content–based image
techniques are performed for components of the
retrieval (CBIR) is considered as an efficient and
documents image which has been identified as the
promising tool to retrieve images and search in the
content by structural analysis techniques and transform
large image database. In recent years, CBIR has been
document image into a text which is editable by the
student and its meaning is an image retrieval process
computer.
from a set based on automatic feature extraction.
Applicable and effective properties of an image should

www.ijera.com

375 | P a g e
Mahvashakbari et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.375-380
Input image
post – processing

pre-processing
output text

segmentation

representation

www.ijera.com
recognition

Figure 1: block diagram of (OCR) system
It isn’t possible to perform recognition
methods of Latin texts directly to recognize Farsi texts.

Figure 2: Farsi handwritten character features
In the view of computer–aided processing
some Farsi and Arabic text features are as follows:
 In contract to Latin characters, Farsi and Arabic
texts are written from right to left.
 In Farsi and Arabic words some characters are
connected to their neighbor characters from one or
both sides and some characters are written
separately.
 Characters inside a word may cover each other. It
means the characters can’t be separated completely
by drawing vertical lines.
 Some characters have one to three points which
may be located above or under the character body.
 Characters that can be connected to their neighbor
character may be written as elongated.
Providing an acceptable method to extract size
and rotation invariant features is purpose of this study.
This method can be used in digital libraries, for reading
addresses, separating envelopes and postal packages
based on their addresses, reading car’s number plates in
traffic control cameras, transforming old paper
documents to digital texts to edit and search the content
rapidly, deleting or reducing typist role and therefore
increasing performance speed in organizations.

II.

Image descriptors

Applied image descriptors techniques are
divided in two groups:
Structural descriptors analyze character or
word image and generate a property vector between
high or low level of properties. On the other hand,
image inside patterns and their mathematical properties
can be expressed by mathematical descriptors as
numbers. Many techniques are applied to compress
images.
They try to present an image without explicit
pixels determination. Applying fractals is based on this
assumption that each image has redundancy degrees
and we can find a similarity between their components
www.ijera.com

and determine it[2]. Fourier transformation is based on
cosine and sinusoidal waves and analyzes image signals
to sinusoidal components in different frequencies. In
this condition image is presented in frequency space
instead of pixel space. By adding applied frequencies,
presented image accuracy in frequency space will be
increased. Therefore, information of one image can be
used to reconstruct the image by looking at different
parts of frequency. Wavelet transformation is in
alternative method for Fourier transformation. It
follows similar rules but created extra information in
addition to frequency which scales amounts.
Reason of this call is that wavelets are small
waves with non–zero area and gather in a central small
region; therefore, they provide more practical
description for generated data in this region [1].
Invariant moments are another group of base
transformations. Large range of different moments has
been developed which includes legendary, zernik and
sub–zernik moments. Final candidates are Zernike
moments. Comparative study about efficiency of
moments different forms were performed. It has been
shown that Zernike moments are preferable to
legendary moments because of their noise tolerance and
informational contents.[3]
In [8] Broumandnia and Shanbehzadeh used
Zernike moments, wavelets and artificial nervous
network to recognize Farsi characters independent of
rotation and size. The best efficiency with 50 features
of input nodes is 98.2%. Shan li and senior member in
[9] used Zernike moments to extract image features
independent of rotation and size by testing on data base
MPEG-7CE-2 test. In this study we have tried to use
both features Zernike moments phase and amplitude for
independence from size and rotation.
C.Singh, E.Walia and N.Mital in [10] use Zernike
moments to recognize grey level face and image of dual
characters based on the rotation – independent feature.
In this research database ORL has been used and face
recognition rate 96.5% and recognition rate of Roman
characters dual images 99.7% has been obtained.

III.

Zernike moments

Information of this section was obtained from
reference [4, 5, 6, 7].
Complex zernike moments are constructed
using a set of complex polynomialswhich form a
complete orthogonal basis set defined on the unit disc.
Vertical feature reduced redundancy and increases
accurate of image reconstruction from input moments
that leads to advantage for this case.
376 | P a g e
Mahvashakbari et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.375-380
To conduct moments first all coordinates in
the considered region are fitted and polar coordinates
will be used instead of Cartesian coordinates. I should
be determined whether image is put in unit disc or unit
disc covers the image. Farmer selection decreases

www.ijera.com

reconstruction accuracy because empty area in outside
of the image generates redundancy, whereas last
selection leads to clip out a piece of the image and it
may include some important image features. In figure
(3) these two methods have been shown.

Figure 3: Putting disc inside the image and putting the image inside the disc.
Low order moments provide basic information
about picture and high order moments provide more
information about their details. Although zernike
moment are rotation invariants, they are not characters
transfer and size invariants. Calculating formula for an
order (multinomial degree) zernik complex moment and
angular independence m is as follows:
𝑛+1 . .
.
𝐴 𝑛𝑚 =
𝐼 𝑥, 𝑦 𝑉𝑛𝑚 (𝜌, 𝜃)𝛿𝑥𝛿𝑦
𝜋
𝑥 𝑦
In which I(x, y) is pixel intensity function. Its
value for dual back and white images is 0 and 1,
respectively. Also in above formula, V is basic
function 𝜌 , 𝜃 are previous coordinates of 𝑥 and y and
following limitations exit:
 N≥o
 N ≥ |m|
 N - |m| is an even number
 X2 + y2 ≤ 1
Valid orders are obtained by testing differentn.
Note that 𝑉 is the complex conjugate of V.
Discrete form for equation (2) is obtained by
transforming integral to sum for all pixels.
𝑛+1
𝐴=
𝜋

𝑘<𝑚𝑎𝑥𝑋 𝑗 <𝑚𝑎𝑥𝑌
.
𝐼(𝑘, 𝑗)𝑉𝑛𝑚 𝜌, 𝜃
𝑘=0

Vnm (ρ, θ)= Rnm(ρ)eim θ
𝑛− 𝑚
2

𝑗 =0

−1 𝑠 𝑛 − 𝑠 ! 𝜌 𝑛−2𝑠
𝑛+ 𝑚
𝑛− 𝑚
− 𝑠 !
− 𝑠 !
𝑠=0 𝑠!
2
2
If we rotate image calculate moments we find
that value A for rotated image is the some pervious
transferring stage:
A'nm=Anm
It means |𝐴 𝑛𝑚 | = 𝐴 𝑛−𝑚 ; therefore, moment
sizes can be used as a rotation – invariant property for
image intensity function.
Another property is|𝐴 𝑛𝑚 | = 𝐴 𝑛−𝑚 , it means
𝑅 𝑛𝑚 𝜌 =

www.ijera.com

we can ignore moments with negative m values in
generating property vector.
An image has many points or pixels which are
considered as elements from image input matrix. In this
images with 200 * 200 pixels were used. Therefore,
there are 4096 inputs for one image. Using an input
with this large size makes clustering hard and volume
of calculation increases very much.
Zernik moments are used an alternative
method to present the image in smaller dimensions. In
mathematics, Zernike polynomials are a sequence of
polynomials that are orthogonalon unit disc and were
established by fritz zernik and play an important role in
image processing. Zernikepolynomials are either odd or
even. Even polynomial is defined as equation (6):
m
Zn r, θ = Rm r cos(mθ)
n
And old polynomial is calculated using equation (7):
m
Zn r , θ = Rm r sin(mθ)
n
In which n, m are non – negative integral
numbers and n ≥ m. θ is azimuthal angle and r is radial
distance (0 ≤ r ≤ 1). Radial polynomial Rm is defined as
n
equation (8):
Rm r
n
(n−m)/2
(−1)k
=
r n−2k
n+m
m
k=0
k!
− k !( n − − k !
2
2
(n –m) is an add number and these radial polynomial is
zero for add (n – m).
Radial multinomial can be written as equation (9):
Rm r
n
(n−m)/2

−1

k

n−k !
r n−2k
n−m
k! n = m 2 − k !
−k !
k=0
2
Vertical property of radial components is as equation
(10):
=

1

2n + 2 Rm r
n
0

2n + 2Rm′ r dr = δn,n′
n

It is some Dirac delta. Being vertical for δn and n′
angular part is as equations (11) – (13):
377 | P a g e
Mahvashakbari et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.375-380
3π

cos mθ sin m′ θ dθ = εm π δ m m′

2π
0

0
′

sin mθ sin m′ θ dθ = (−1)m+m π δ m

m′

,m

≠0
2π

cos mθ sin m′ θ dθ = 0

0

In which εm (sometimes is called neuman
factor) is 2 for m = 0 and is 1 for m≠ 0. Product of
radial and angular components shows that zernik
functions are orthogonal to both indexes when they are
integrated on unit disc:
∈m π
m′
m
zn r, θ zn′ r, θ d2 r =
δ ′. δ
2n + n n,n m,m′
Zernik moments are symmetric and their symmetry is
as reflection along x axis as equation (15):
m
m
Zn r, θ = (−1)m Zn (r, θ)
Symmetry to coordination center is also as equation
(16):
m
m
Zn r, θ = (−1)m Zn (r, θ + π)
Zernik
moments
are
defined
based
on
zernikpolynomials and are as equation (17):
n + 1 2π 1
Anm =
Vnm r, θ f r, θ r dr dθ
π
0
0
That n − m , m ≤ n, r ≤ 1 is an even number.
Zernikpolynomials Vnm (r,θ) is defined based on radial
functions:
Vnm r, θ = rnm re+jm θ

IV.

Suggested algorithm

To extract features, first image will be
normalized. In this research firs loaded image will be
transformed to a grey scale image(if the scanned

Figure
a) 200*200 pixel

characters image is colored)scanned images are 200 *
200 pixels. Next stages are as follow:
a) Histogram modulation: if the image is scanned,
contrast of the considered image will be low. To
improve light intensity distribution histogram
modulation will be applied.
b) Reversed zernik: to identify characters important
parts of the image are determined by black lines
and background is white. If standard intensity
function is applied instead of characters
descriptions with their lines it is obvious
principally where these characters don’t exist. It is
better to provide some kind of zernik moments
which show details of black color. Achieve this
intensity function will be reversed. In this case
white pixels are shown with 0 and 1 respectively.
Another advantage of this method is that black
pixels of the image are much less than white pixels.
In other words, basic function are called just for
non-zero intensity function, hence, calculations
will be reduced and take less time.
c) We perform two more works to prepare main body
image. First whole image redundant parts are
removed and only one window which includes
characters is remained. This remaining box is fitted
on the character main body completely. In next
stage remaining character body from previous
stage is put in a square image such that it is in
center of this body and in middle of new image.By
this work whole scanned characters are written in
the middle of image and in zernik calculation
which is not transfer-invariant calculation errors
and comparison mistakes will decrease.
In figure (4) all stages of image preparation are
shown for character "‫" ص‬

4: b) 200*200 pixel preparation for character " ‫ 46*46" ص‬pixel
Stages of image c) 200*200 pixel d) 24*9 pixel e)

To be size independent,color intensity
matrixes difference of the image is used. Experimental
image and training images are inputs of this program.
This process finds images with minimum difference.
Pre-processing stage output will be used as input for
zernik moments calculation. In training procedure the
clustering is used as retrogression. Inputs of these
clusters are zernik moments outputs. In experimental
stage pioneer search in clusters is performed.
www.ijera.com

www.ijera.com

V.

Clustering inputs and their analysis

After performing pre-processing stages the
feature vector is sent to calculation zernik
momentsorder is considered 4 – 38. Zernik moments
output are saved as retrograde clustering in a matrix. To
fill clusters we perform as follows: the matrix first
column corresponding clustering includes each image
indexes. Resultant features vector from zernik moments
378 | P a g e
Mahvashakbari et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.375-380
fills matrix second column. From third column to next
two neighbor lines mean in column k – 1 will be put in
column k such that each item in the column k – 1 only
one time has been involved in making average.
This process will continue until last column
just one non-zero item.The number of matrix lines is n
and equal training inputs number and number of matrix
column is log(n) + 1. Clustering in used because of low
expenses of O(logn) in recognition stage. The more
number of training inputs, the more recognition speed
and expenses in relation to inputs will decrease. In
experimental stage, clusters will be investigated as
pioneer and suitable case will be selected.

www.ijera.com

Generally, effective parameters in training stages are as
follows:
1. The more number of training patterns, the
more training accuracy.
2. Selection range for considered zernik moment
order is very effective in recognition accuracy
Various experiments have suggested that if this order
increases more than acertain limit (order 38)
recognition will not performed correctly.
An example for clustering performance for 16 raining
inputs has shown in figure (5):

Figure 5: An example for clustering performance for 16 raining inputs

VI.

Statistical analysis of research data and
suggested algorithm

In this section, results obtained from statistical
analysis by software SPSS is provided. “n” is zernik
moments order, elapstime in calculation time for zernik
moments and AOH is feature vector for zernik
moments. In table(1) as significant level shows value

related to “elapstime” and “AOH” have normal
distributions. Therefore, relation between "n" and these
two variant are states using person correlation
coefficient.
Based on information in table (2) relation
between two variants is significant and negative at 0.01
level i.e. by increasing “n”and “AOH” value decreases.

Tes ts normality
Table (1): of Normality test
a

Elapstime
AOH

Kolmogorov-Smirnov
Statistic
df
Sig.
.105
18
.200*
.200
18
.055

Statistic
.948
.838

Shapiro-Wilk
df
18
18

Sig.
.399
.006

*. This is a low er bound of the true significance.
a. Lilliefors Significance Correction

Results in table (3) show that there is a positive and significant correlation at 0.01 level. Therefore, we can claim
certainly that the more “n” increases, the more “Elapstime” will increase.
Cor relatio ns
Table (2): correlation between “n” and “AOH”
Spearman's rho n

A OH

**.

Correlation Coef f ic ient
Sig. (1-tailed)
N
Correlation Coef f ic ient
Sig. (1-tailed)
N

n
1.000
.
18
-.973**
.000
18

A OH
-.973**
.000
18
1.000
.
18

Correlation is s ignif icant at the 0.01 level (1-tailed).

Table (3): correlation between “n” and “Elapstime”
www.ijera.com

379 | P a g e
Mahvashakbari et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.375-380

www.ijera.com

Cor relations
Spearman's rho n

Elapstime

Correlation Coef f ic ient
Sig. (1-tailed)
N
Correlation Coef f ic ient
Sig. (1-tailed)
N

n
Elapstime
1.000
.998**
.
.000
18
18
.998**
1.000
.000
.
18
18

**. Correlation is s ignif icant at the 0.01 lev el (1-tailed).

VII.

Conclusion

Many tests are performed on the system and
generally increasing number of experimental database
several tens or several hundred folds can increase
characters recognition accuracy significantly. Because
of pre-processing stage processes algorithm is size, and
transfer – independent in addition to rotation –
independent.
During conducted tests, valid order for zernik moments
to extract feature is 4 – 38. Using clustering in last stage
will decrease algorithm expenses to log(n) .
Statistical analysis of result of the considered
algorithm performancesuggests that there is a
significant and positive correlation between “n” and
“Elapstime” at 0.01 level. Therefore, we can claim
certainly that the more “n” value increases, the more
“Elapstime” value will increase. There is a negative and
significant correlation between “n” and “AOH” at 0.01
level i.e. by increasing “n” value “AOH” value will
decrease.

VIII.

References

[2]

[3]

[4]

[5]

C.S. Wallace, “A Suggestion for a Fast
Multiplier”, IEEE Transaction on Electronic
Computers, (1964), Vol. EC-13 14-17.
L. Dadda, “Some Schemes for Parallel
Multipliers”, Alta Frequenza, (1965), Vol. 34
349-356.
Z.JMou, F. Jutand, “Overturned-Stairs Adder
Trees and Multiplier Design”,
IEEE
Transaction on Computers, (1992), Vol. 41
940-948.
S.Veeramachaneni, K.M. Krishna, L.Avinash,
S.R.Puppala,
M.B.
Srinivas,
“Novel
Architectures for High-Speed and Low-Power
3-2, 4-2 and 5-2 Compressors”, IEEE, 20th
International Conference on VLSI Design,
(2007), 324-329.
D.Baran, M.Aktan, V.G. Oklobdzija, “Energy
Efficient Implementation of Parallel CMOS
Multipliers with Improved Compressors”,
Proceedings
of
the
16th
ACM/IEEE

www.ijera.com

[7]

[1].

[2].

[3].

[4].

Future works

The authors suggest that togenerate a database with
suitable quality and apply more manuscripts with more
inclusion to develop this method and also this method
can be applied to identify word inside a text.
[1]

[6]

[5].

[6].

[7].
[8]

[9]

[10]

international
Symposium on Low-Power
Electronics and Design, (2010), 147 – 152.
A. Author, B. Author, BOOK TITLE,
Publisher, 1990.
http://www.nangate.com/, accessed November
17, 2011. ecognition،Academic Press، 1st
edition، January 15، 1999.
A. Mowlaei.Kt.Faez , a.Haghighat, Feature
Extraction with Wavelet Transform for
Recognition of Isolated Hamdwritten Farsi /
Arabic Characters and Numerals Digital Signal
Processing , pp. 923-926,2004.
D.Neary ,"Fractal methods in Image Analysis
and Coding", City University , School of
Electronic Engineering , 2000.
H.s.Kim, H.K. Lee," Invarianat Image
Watermark Using Zernik Moments," IEEE
Tramsactions On. Circuits And Systens For
video Technology ,Vol . 8,pp.766-773,2003.
S.O.BelkasimM.S"Efficient Algorithm For Fast
Computation of Zernike Moments",IEEE 39 th
Midwest symposium on Circuits and systems 3
,pp.1401-1404,1966.
A.Khotanzad ,Y.H.Hong," Invariant Image
Recognition by Zernik Moments," IEE Trans
.Pattern Analysis Machine Intelligence , Nr.5 ,
pp.489-497-1990.
I.R.Rabiner," A tutorial on hidden markov
models and selected applications in speech
recoghition", Reading in Speech Recognition ,
PP.267-296, 1990.
C.W Chong ,P.Raveendran , R.Mukandan.
Translation, 36 , S, 1765-1773 , 2003.
Broumandnia Ali , ShanbehzadehJamshid ,
Fast Zernike wavelet moments for Farsi
character recognition, Elsevier, accepted 16
May 2006,Image and Vision Computing 25
(2007) 717–726
Shan Li, Senior Member, " Complex Zernike
Moments Features for Shape-Based Image
Retrieval", IEEE, Moon-Chuen Lee, and ChiMan Pun
C. Singh, E. Walia, N. Mittal, "Rotation
invariant complex Zernike moments features
and their applications to human face and
character recognition", IET Computer Vision.
ISSN 1751-9632, April 2011.

380 | P a g e

Weitere ähnliche Inhalte

Was ist angesagt?

Recognition of basic kannada characters in scene images using euclidean dis
Recognition of basic kannada characters in scene images using euclidean disRecognition of basic kannada characters in scene images using euclidean dis
Recognition of basic kannada characters in scene images using euclidean dis
IAEME Publication
 
Scene Text Detection of Curved Text Using Gradiant Vector Flow Method
Scene Text Detection of Curved Text Using Gradiant Vector Flow MethodScene Text Detection of Curved Text Using Gradiant Vector Flow Method
Scene Text Detection of Curved Text Using Gradiant Vector Flow Method
IJTET Journal
 

Was ist angesagt? (20)

Text extraction from images
Text extraction from imagesText extraction from images
Text extraction from images
 
Texture features based text extraction from images using DWT and K-means clus...
Texture features based text extraction from images using DWT and K-means clus...Texture features based text extraction from images using DWT and K-means clus...
Texture features based text extraction from images using DWT and K-means clus...
 
Empirical Coding for Curvature Based Linear Representation in Image Retrieval...
Empirical Coding for Curvature Based Linear Representation in Image Retrieval...Empirical Coding for Curvature Based Linear Representation in Image Retrieval...
Empirical Coding for Curvature Based Linear Representation in Image Retrieval...
 
Recognition of basic kannada characters in scene images using euclidean dis
Recognition of basic kannada characters in scene images using euclidean disRecognition of basic kannada characters in scene images using euclidean dis
Recognition of basic kannada characters in scene images using euclidean dis
 
IRJET- Image based Information Retrieval
IRJET- Image based Information RetrievalIRJET- Image based Information Retrieval
IRJET- Image based Information Retrieval
 
50120130406021
5012013040602150120130406021
50120130406021
 
Scene Text Detection of Curved Text Using Gradiant Vector Flow Method
Scene Text Detection of Curved Text Using Gradiant Vector Flow MethodScene Text Detection of Curved Text Using Gradiant Vector Flow Method
Scene Text Detection of Curved Text Using Gradiant Vector Flow Method
 
TEXT DETECTION AND EXTRACTION FROM VIDEOS USING ANN BASED NETWORK
TEXT DETECTION AND EXTRACTION FROM VIDEOS USING ANN BASED NETWORKTEXT DETECTION AND EXTRACTION FROM VIDEOS USING ANN BASED NETWORK
TEXT DETECTION AND EXTRACTION FROM VIDEOS USING ANN BASED NETWORK
 
Content Based Image Retrieval Using Dominant Color and Texture Features
Content Based Image Retrieval Using Dominant Color and Texture FeaturesContent Based Image Retrieval Using Dominant Color and Texture Features
Content Based Image Retrieval Using Dominant Color and Texture Features
 
E1803012329
E1803012329E1803012329
E1803012329
 
IRJET- A Survey on MSER Based Scene Text Detection
IRJET-  	  A Survey on MSER Based Scene Text DetectionIRJET-  	  A Survey on MSER Based Scene Text Detection
IRJET- A Survey on MSER Based Scene Text Detection
 
Artificial Neural Network For Recognition Of Handwritten Devanagari Character
Artificial Neural Network For Recognition Of Handwritten Devanagari CharacterArtificial Neural Network For Recognition Of Handwritten Devanagari Character
Artificial Neural Network For Recognition Of Handwritten Devanagari Character
 
RECOGNITION OF HANDWRITTEN MEITEI MAYEK SCRIPT BASED ON TEXTURE FEATURE
RECOGNITION OF HANDWRITTEN MEITEI MAYEK SCRIPT BASED ON TEXTURE FEATURE RECOGNITION OF HANDWRITTEN MEITEI MAYEK SCRIPT BASED ON TEXTURE FEATURE
RECOGNITION OF HANDWRITTEN MEITEI MAYEK SCRIPT BASED ON TEXTURE FEATURE
 
A Comprehensive Study On Handwritten Character Recognition System
A Comprehensive Study On Handwritten Character Recognition SystemA Comprehensive Study On Handwritten Character Recognition System
A Comprehensive Study On Handwritten Character Recognition System
 
Text extraction From Digital image
Text extraction From Digital imageText extraction From Digital image
Text extraction From Digital image
 
Recognition Of Handwritten Meitei Mayek Script Based On Texture Feature
Recognition Of Handwritten Meitei Mayek Script Based On Texture FeatureRecognition Of Handwritten Meitei Mayek Script Based On Texture Feature
Recognition Of Handwritten Meitei Mayek Script Based On Texture Feature
 
IRJET- A Survey on Different Image Retrieval Techniques
IRJET- A Survey on Different Image Retrieval TechniquesIRJET- A Survey on Different Image Retrieval Techniques
IRJET- A Survey on Different Image Retrieval Techniques
 
An Efficient Segmentation Technique for Machine Printed Devanagiri Script: Bo...
An Efficient Segmentation Technique for Machine Printed Devanagiri Script: Bo...An Efficient Segmentation Technique for Machine Printed Devanagiri Script: Bo...
An Efficient Segmentation Technique for Machine Printed Devanagiri Script: Bo...
 
A Novel Method for De-warping in Persian document images captured by cameras
A Novel Method for De-warping in Persian document images captured by camerasA Novel Method for De-warping in Persian document images captured by cameras
A Novel Method for De-warping in Persian document images captured by cameras
 
A Novel Document Image Binarization For Optical Character Recognition
A Novel Document Image Binarization For Optical Character RecognitionA Novel Document Image Binarization For Optical Character Recognition
A Novel Document Image Binarization For Optical Character Recognition
 

Andere mochten auch

2015-DL-Queen's_Park_Flats-site
2015-DL-Queen's_Park_Flats-site2015-DL-Queen's_Park_Flats-site
2015-DL-Queen's_Park_Flats-site
David Greenfield
 
Fresh Produce Regulations in Canada
Fresh Produce Regulations in CanadaFresh Produce Regulations in Canada
Fresh Produce Regulations in Canada
Tribhuwan Anand
 
20130625101128670 copy
20130625101128670 copy20130625101128670 copy
20130625101128670 copy
JP MERLANO
 
Willem Steenkamp - Training - 2015
Willem Steenkamp - Training - 2015Willem Steenkamp - Training - 2015
Willem Steenkamp - Training - 2015
Willem steenkamp
 
NXA_Portfolio - mobile version
NXA_Portfolio - mobile versionNXA_Portfolio - mobile version
NXA_Portfolio - mobile version
Dwayne Mason
 
Second Life e Educacao
Second Life e EducacaoSecond Life e Educacao
Second Life e Educacao
João Lima
 

Andere mochten auch (20)

R4103111114
R4103111114R4103111114
R4103111114
 
E41033336
E41033336E41033336
E41033336
 
Ay4103315317
Ay4103315317Ay4103315317
Ay4103315317
 
Ap4103260265
Ap4103260265Ap4103260265
Ap4103260265
 
I41035057
I41035057I41035057
I41035057
 
At4103280291
At4103280291At4103280291
At4103280291
 
Ai4103203205
Ai4103203205Ai4103203205
Ai4103203205
 
D41032632
D41032632D41032632
D41032632
 
Programação e Mediação Sara Barriga
Programação e Mediação Sara BarrigaProgramação e Mediação Sara Barriga
Programação e Mediação Sara Barriga
 
SAU
SAUSAU
SAU
 
MIBS-brochure
MIBS-brochureMIBS-brochure
MIBS-brochure
 
2015-DL-Queen's_Park_Flats-site
2015-DL-Queen's_Park_Flats-site2015-DL-Queen's_Park_Flats-site
2015-DL-Queen's_Park_Flats-site
 
Fresh Produce Regulations in Canada
Fresh Produce Regulations in CanadaFresh Produce Regulations in Canada
Fresh Produce Regulations in Canada
 
Impacto RVCC
Impacto RVCCImpacto RVCC
Impacto RVCC
 
20130625101128670 copy
20130625101128670 copy20130625101128670 copy
20130625101128670 copy
 
Interaction Analysis Model - Gunawardena, Lowe e Anderson (1997)
Interaction Analysis Model -  Gunawardena, Lowe e Anderson (1997)Interaction Analysis Model -  Gunawardena, Lowe e Anderson (1997)
Interaction Analysis Model - Gunawardena, Lowe e Anderson (1997)
 
Willem Steenkamp - Training - 2015
Willem Steenkamp - Training - 2015Willem Steenkamp - Training - 2015
Willem Steenkamp - Training - 2015
 
Presentacion sobre INNOVACION - Uso de EVERNOTE - Arouxa - Dasso
Presentacion sobre INNOVACION - Uso de EVERNOTE - Arouxa - DassoPresentacion sobre INNOVACION - Uso de EVERNOTE - Arouxa - Dasso
Presentacion sobre INNOVACION - Uso de EVERNOTE - Arouxa - Dasso
 
NXA_Portfolio - mobile version
NXA_Portfolio - mobile versionNXA_Portfolio - mobile version
NXA_Portfolio - mobile version
 
Second Life e Educacao
Second Life e EducacaoSecond Life e Educacao
Second Life e Educacao
 

Ähnlich wie Bi4103375380

Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...
Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...
Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...
ijtsrd
 
Cc31331335
Cc31331335Cc31331335
Cc31331335
IJMER
 
Enhancement and Segmentation of Historical Records
Enhancement and Segmentation of Historical RecordsEnhancement and Segmentation of Historical Records
Enhancement and Segmentation of Historical Records
csandit
 

Ähnlich wie Bi4103375380 (20)

Classifier fusion method to recognize
Classifier fusion method to recognizeClassifier fusion method to recognize
Classifier fusion method to recognize
 
Comparison of various Image Registration Techniques with the Proposed Hybrid ...
Comparison of various Image Registration Techniques with the Proposed Hybrid ...Comparison of various Image Registration Techniques with the Proposed Hybrid ...
Comparison of various Image Registration Techniques with the Proposed Hybrid ...
 
Object Capturing In A Cluttered Scene By Using Point Feature Matching
Object Capturing In A Cluttered Scene By Using Point Feature MatchingObject Capturing In A Cluttered Scene By Using Point Feature Matching
Object Capturing In A Cluttered Scene By Using Point Feature Matching
 
Design of an Effective Method for Image Retrieval
Design of an Effective Method for Image RetrievalDesign of an Effective Method for Image Retrieval
Design of an Effective Method for Image Retrieval
 
Multi Wavelet for Image Retrival Based On Using Texture and Color Querys
Multi Wavelet for Image Retrival Based On Using Texture and  Color QuerysMulti Wavelet for Image Retrival Based On Using Texture and  Color Querys
Multi Wavelet for Image Retrival Based On Using Texture and Color Querys
 
A017240107
A017240107A017240107
A017240107
 
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
Query Image Searching With Integrated Textual and Visual Relevance Feedback f...
 
Currency recognition on mobile phones
Currency recognition on mobile phonesCurrency recognition on mobile phones
Currency recognition on mobile phones
 
A Study on Image Retrieval Features and Techniques with Various Combinations
A Study on Image Retrieval Features and Techniques with Various CombinationsA Study on Image Retrieval Features and Techniques with Various Combinations
A Study on Image Retrieval Features and Techniques with Various Combinations
 
Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...
Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...
Reconstructing the Path of the Object based on Time and Date OCR in Surveilla...
 
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
An Efficient Image Forensic Mechanism using Super Pixel by SIFT and LFP Algor...
 
Cc31331335
Cc31331335Cc31331335
Cc31331335
 
My2421322135
My2421322135My2421322135
My2421322135
 
Facial image retrieval on semantic features using adaptive mean genetic algor...
Facial image retrieval on semantic features using adaptive mean genetic algor...Facial image retrieval on semantic features using adaptive mean genetic algor...
Facial image retrieval on semantic features using adaptive mean genetic algor...
 
A Graph-based Web Image Annotation for Large Scale Image Retrieval
A Graph-based Web Image Annotation for Large Scale Image RetrievalA Graph-based Web Image Annotation for Large Scale Image Retrieval
A Graph-based Web Image Annotation for Large Scale Image Retrieval
 
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters
Face Recognition based on STWT and DTCWT using two dimensional Q-shift Filters
 
Text Extraction from Image Using GAMMA Correction Method.
Text Extraction from Image Using GAMMA Correction Method.Text Extraction from Image Using GAMMA Correction Method.
Text Extraction from Image Using GAMMA Correction Method.
 
Orientation Spectral Resolution Coding for Pattern Recognition
Orientation Spectral Resolution Coding for Pattern RecognitionOrientation Spectral Resolution Coding for Pattern Recognition
Orientation Spectral Resolution Coding for Pattern Recognition
 
Texture based feature extraction and object tracking
Texture based feature extraction and object trackingTexture based feature extraction and object tracking
Texture based feature extraction and object tracking
 
Enhancement and Segmentation of Historical Records
Enhancement and Segmentation of Historical RecordsEnhancement and Segmentation of Historical Records
Enhancement and Segmentation of Historical Records
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Bi4103375380

  • 1. Mahvashakbari et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.375-380 RESEARCH ARTICLE www.ijera.com OPEN ACCESS Rotation and Scale Invariant Feature Extraction Using Complex Zernike Moments Forfarsiand Arabic Handwriting Character Mahvashakbari1, Maryam Khademi2 1 2 Department of ComputerScience, Science and Research Branch, Islamic Azad University, Saveh, Iran Applied Mathematics Department, Islamic Azad University, South Tehran Branch, Tehran, Iran Abstract Analyzing Farsi and Arabic handwritten documents is one area in image processing whose target is to transform picture documents into symbolic form. This transformation is conducted o make rapid and easy saving, improvements, retrieval, reuse, searching and transferring documents. Analyzing documents is performed in five stages: pre-processing, segmentation representation, recognition and post-processing. In this research, in first stage the required pre-processing is performed to normalize the image. In recognition stage, zernik moments–based method has been introduced to extract feature of Farsi and Arabic handwritten characters. Outputs of zernik moments are put in systematic clustering to decide about characters. The obtained results show that feature extraction using zernik moments is a suitable method that deals with few rotation-independent featuresand this leads to reduce calculations and increase speed of recognition and stability against rotation. Size–independence is obtained using difference and at least distance of image calculations, because of preprocessing stage which has been performed in this algorithm is transfer-independent. Valid rank of zenik moments to extract features during conducted test is 4 – 38. Cluster applying has led to reduce algorithm expenditure tplog(n) and this one advantage of the suggested algorithm . Keywords: Rotation and Scale Invariant Feature Extraction, zernik complex moments, Farsi and Arabic handwritten characters. have some necessary features such as recognition capability,scaleinvarient, transfer and rotation, noise – I. Introduction resistance, statistical independence and reliability. An image is valued one thousand words is a Generally, image descriptor is a set of numbers quotation form Confucius, a Chinese philosopher in obtained to describe image properties. Correctness and 2500 years ago. Todays, essence of this sentence is accuracy of suitable retrieval needs an image descriptor perceived completely. Visual data plays an important that can retrieve similar images from a database role in the society and this role will be increased and significantly. Descriptors are often in a diagram form. there will be intensive need to process these features in Image descriptors should satisfy following future. Pictures and images are applied in many requirements: application environments such as architecture and • Descriptors should be complete as much as drawing, journalism, advertisement, amusement, possible to provide data items. etc.How to search and retrieve considered images • Descriptors should be provided and save briefly. quickly against nature and rapid increment of images is • Calculation of distance between descriptors should a basic consideration that requires and image – retrieval be simple. system. Visual properties of images provide a Optical characters recognition (OCR) description from their contents. Content–based image techniques are performed for components of the retrieval (CBIR) is considered as an efficient and documents image which has been identified as the promising tool to retrieve images and search in the content by structural analysis techniques and transform large image database. In recent years, CBIR has been document image into a text which is editable by the student and its meaning is an image retrieval process computer. from a set based on automatic feature extraction. Applicable and effective properties of an image should www.ijera.com 375 | P a g e
  • 2. Mahvashakbari et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.375-380 Input image post – processing pre-processing output text segmentation representation www.ijera.com recognition Figure 1: block diagram of (OCR) system It isn’t possible to perform recognition methods of Latin texts directly to recognize Farsi texts. Figure 2: Farsi handwritten character features In the view of computer–aided processing some Farsi and Arabic text features are as follows:  In contract to Latin characters, Farsi and Arabic texts are written from right to left.  In Farsi and Arabic words some characters are connected to their neighbor characters from one or both sides and some characters are written separately.  Characters inside a word may cover each other. It means the characters can’t be separated completely by drawing vertical lines.  Some characters have one to three points which may be located above or under the character body.  Characters that can be connected to their neighbor character may be written as elongated. Providing an acceptable method to extract size and rotation invariant features is purpose of this study. This method can be used in digital libraries, for reading addresses, separating envelopes and postal packages based on their addresses, reading car’s number plates in traffic control cameras, transforming old paper documents to digital texts to edit and search the content rapidly, deleting or reducing typist role and therefore increasing performance speed in organizations. II. Image descriptors Applied image descriptors techniques are divided in two groups: Structural descriptors analyze character or word image and generate a property vector between high or low level of properties. On the other hand, image inside patterns and their mathematical properties can be expressed by mathematical descriptors as numbers. Many techniques are applied to compress images. They try to present an image without explicit pixels determination. Applying fractals is based on this assumption that each image has redundancy degrees and we can find a similarity between their components www.ijera.com and determine it[2]. Fourier transformation is based on cosine and sinusoidal waves and analyzes image signals to sinusoidal components in different frequencies. In this condition image is presented in frequency space instead of pixel space. By adding applied frequencies, presented image accuracy in frequency space will be increased. Therefore, information of one image can be used to reconstruct the image by looking at different parts of frequency. Wavelet transformation is in alternative method for Fourier transformation. It follows similar rules but created extra information in addition to frequency which scales amounts. Reason of this call is that wavelets are small waves with non–zero area and gather in a central small region; therefore, they provide more practical description for generated data in this region [1]. Invariant moments are another group of base transformations. Large range of different moments has been developed which includes legendary, zernik and sub–zernik moments. Final candidates are Zernike moments. Comparative study about efficiency of moments different forms were performed. It has been shown that Zernike moments are preferable to legendary moments because of their noise tolerance and informational contents.[3] In [8] Broumandnia and Shanbehzadeh used Zernike moments, wavelets and artificial nervous network to recognize Farsi characters independent of rotation and size. The best efficiency with 50 features of input nodes is 98.2%. Shan li and senior member in [9] used Zernike moments to extract image features independent of rotation and size by testing on data base MPEG-7CE-2 test. In this study we have tried to use both features Zernike moments phase and amplitude for independence from size and rotation. C.Singh, E.Walia and N.Mital in [10] use Zernike moments to recognize grey level face and image of dual characters based on the rotation – independent feature. In this research database ORL has been used and face recognition rate 96.5% and recognition rate of Roman characters dual images 99.7% has been obtained. III. Zernike moments Information of this section was obtained from reference [4, 5, 6, 7]. Complex zernike moments are constructed using a set of complex polynomialswhich form a complete orthogonal basis set defined on the unit disc. Vertical feature reduced redundancy and increases accurate of image reconstruction from input moments that leads to advantage for this case. 376 | P a g e
  • 3. Mahvashakbari et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.375-380 To conduct moments first all coordinates in the considered region are fitted and polar coordinates will be used instead of Cartesian coordinates. I should be determined whether image is put in unit disc or unit disc covers the image. Farmer selection decreases www.ijera.com reconstruction accuracy because empty area in outside of the image generates redundancy, whereas last selection leads to clip out a piece of the image and it may include some important image features. In figure (3) these two methods have been shown. Figure 3: Putting disc inside the image and putting the image inside the disc. Low order moments provide basic information about picture and high order moments provide more information about their details. Although zernike moment are rotation invariants, they are not characters transfer and size invariants. Calculating formula for an order (multinomial degree) zernik complex moment and angular independence m is as follows: 𝑛+1 . . . 𝐴 𝑛𝑚 = 𝐼 𝑥, 𝑦 𝑉𝑛𝑚 (𝜌, 𝜃)𝛿𝑥𝛿𝑦 𝜋 𝑥 𝑦 In which I(x, y) is pixel intensity function. Its value for dual back and white images is 0 and 1, respectively. Also in above formula, V is basic function 𝜌 , 𝜃 are previous coordinates of 𝑥 and y and following limitations exit:  N≥o  N ≥ |m|  N - |m| is an even number  X2 + y2 ≤ 1 Valid orders are obtained by testing differentn. Note that 𝑉 is the complex conjugate of V. Discrete form for equation (2) is obtained by transforming integral to sum for all pixels. 𝑛+1 𝐴= 𝜋 𝑘<𝑚𝑎𝑥𝑋 𝑗 <𝑚𝑎𝑥𝑌 . 𝐼(𝑘, 𝑗)𝑉𝑛𝑚 𝜌, 𝜃 𝑘=0 Vnm (ρ, θ)= Rnm(ρ)eim θ 𝑛− 𝑚 2 𝑗 =0 −1 𝑠 𝑛 − 𝑠 ! 𝜌 𝑛−2𝑠 𝑛+ 𝑚 𝑛− 𝑚 − 𝑠 ! − 𝑠 ! 𝑠=0 𝑠! 2 2 If we rotate image calculate moments we find that value A for rotated image is the some pervious transferring stage: A'nm=Anm It means |𝐴 𝑛𝑚 | = 𝐴 𝑛−𝑚 ; therefore, moment sizes can be used as a rotation – invariant property for image intensity function. Another property is|𝐴 𝑛𝑚 | = 𝐴 𝑛−𝑚 , it means 𝑅 𝑛𝑚 𝜌 = www.ijera.com we can ignore moments with negative m values in generating property vector. An image has many points or pixels which are considered as elements from image input matrix. In this images with 200 * 200 pixels were used. Therefore, there are 4096 inputs for one image. Using an input with this large size makes clustering hard and volume of calculation increases very much. Zernik moments are used an alternative method to present the image in smaller dimensions. In mathematics, Zernike polynomials are a sequence of polynomials that are orthogonalon unit disc and were established by fritz zernik and play an important role in image processing. Zernikepolynomials are either odd or even. Even polynomial is defined as equation (6): m Zn r, θ = Rm r cos(mθ) n And old polynomial is calculated using equation (7): m Zn r , θ = Rm r sin(mθ) n In which n, m are non – negative integral numbers and n ≥ m. θ is azimuthal angle and r is radial distance (0 ≤ r ≤ 1). Radial polynomial Rm is defined as n equation (8): Rm r n (n−m)/2 (−1)k = r n−2k n+m m k=0 k! − k !( n − − k ! 2 2 (n –m) is an add number and these radial polynomial is zero for add (n – m). Radial multinomial can be written as equation (9): Rm r n (n−m)/2 −1 k n−k ! r n−2k n−m k! n = m 2 − k ! −k ! k=0 2 Vertical property of radial components is as equation (10): = 1 2n + 2 Rm r n 0 2n + 2Rm′ r dr = δn,n′ n It is some Dirac delta. Being vertical for δn and n′ angular part is as equations (11) – (13): 377 | P a g e
  • 4. Mahvashakbari et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.375-380 3π cos mθ sin m′ θ dθ = εm π δ m m′ 2π 0 0 ′ sin mθ sin m′ θ dθ = (−1)m+m π δ m m′ ,m ≠0 2π cos mθ sin m′ θ dθ = 0 0 In which εm (sometimes is called neuman factor) is 2 for m = 0 and is 1 for m≠ 0. Product of radial and angular components shows that zernik functions are orthogonal to both indexes when they are integrated on unit disc: ∈m π m′ m zn r, θ zn′ r, θ d2 r = δ ′. δ 2n + n n,n m,m′ Zernik moments are symmetric and their symmetry is as reflection along x axis as equation (15): m m Zn r, θ = (−1)m Zn (r, θ) Symmetry to coordination center is also as equation (16): m m Zn r, θ = (−1)m Zn (r, θ + π) Zernik moments are defined based on zernikpolynomials and are as equation (17): n + 1 2π 1 Anm = Vnm r, θ f r, θ r dr dθ π 0 0 That n − m , m ≤ n, r ≤ 1 is an even number. Zernikpolynomials Vnm (r,θ) is defined based on radial functions: Vnm r, θ = rnm re+jm θ IV. Suggested algorithm To extract features, first image will be normalized. In this research firs loaded image will be transformed to a grey scale image(if the scanned Figure a) 200*200 pixel characters image is colored)scanned images are 200 * 200 pixels. Next stages are as follow: a) Histogram modulation: if the image is scanned, contrast of the considered image will be low. To improve light intensity distribution histogram modulation will be applied. b) Reversed zernik: to identify characters important parts of the image are determined by black lines and background is white. If standard intensity function is applied instead of characters descriptions with their lines it is obvious principally where these characters don’t exist. It is better to provide some kind of zernik moments which show details of black color. Achieve this intensity function will be reversed. In this case white pixels are shown with 0 and 1 respectively. Another advantage of this method is that black pixels of the image are much less than white pixels. In other words, basic function are called just for non-zero intensity function, hence, calculations will be reduced and take less time. c) We perform two more works to prepare main body image. First whole image redundant parts are removed and only one window which includes characters is remained. This remaining box is fitted on the character main body completely. In next stage remaining character body from previous stage is put in a square image such that it is in center of this body and in middle of new image.By this work whole scanned characters are written in the middle of image and in zernik calculation which is not transfer-invariant calculation errors and comparison mistakes will decrease. In figure (4) all stages of image preparation are shown for character "‫" ص‬ 4: b) 200*200 pixel preparation for character " ‫ 46*46" ص‬pixel Stages of image c) 200*200 pixel d) 24*9 pixel e) To be size independent,color intensity matrixes difference of the image is used. Experimental image and training images are inputs of this program. This process finds images with minimum difference. Pre-processing stage output will be used as input for zernik moments calculation. In training procedure the clustering is used as retrogression. Inputs of these clusters are zernik moments outputs. In experimental stage pioneer search in clusters is performed. www.ijera.com www.ijera.com V. Clustering inputs and their analysis After performing pre-processing stages the feature vector is sent to calculation zernik momentsorder is considered 4 – 38. Zernik moments output are saved as retrograde clustering in a matrix. To fill clusters we perform as follows: the matrix first column corresponding clustering includes each image indexes. Resultant features vector from zernik moments 378 | P a g e
  • 5. Mahvashakbari et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.375-380 fills matrix second column. From third column to next two neighbor lines mean in column k – 1 will be put in column k such that each item in the column k – 1 only one time has been involved in making average. This process will continue until last column just one non-zero item.The number of matrix lines is n and equal training inputs number and number of matrix column is log(n) + 1. Clustering in used because of low expenses of O(logn) in recognition stage. The more number of training inputs, the more recognition speed and expenses in relation to inputs will decrease. In experimental stage, clusters will be investigated as pioneer and suitable case will be selected. www.ijera.com Generally, effective parameters in training stages are as follows: 1. The more number of training patterns, the more training accuracy. 2. Selection range for considered zernik moment order is very effective in recognition accuracy Various experiments have suggested that if this order increases more than acertain limit (order 38) recognition will not performed correctly. An example for clustering performance for 16 raining inputs has shown in figure (5): Figure 5: An example for clustering performance for 16 raining inputs VI. Statistical analysis of research data and suggested algorithm In this section, results obtained from statistical analysis by software SPSS is provided. “n” is zernik moments order, elapstime in calculation time for zernik moments and AOH is feature vector for zernik moments. In table(1) as significant level shows value related to “elapstime” and “AOH” have normal distributions. Therefore, relation between "n" and these two variant are states using person correlation coefficient. Based on information in table (2) relation between two variants is significant and negative at 0.01 level i.e. by increasing “n”and “AOH” value decreases. Tes ts normality Table (1): of Normality test a Elapstime AOH Kolmogorov-Smirnov Statistic df Sig. .105 18 .200* .200 18 .055 Statistic .948 .838 Shapiro-Wilk df 18 18 Sig. .399 .006 *. This is a low er bound of the true significance. a. Lilliefors Significance Correction Results in table (3) show that there is a positive and significant correlation at 0.01 level. Therefore, we can claim certainly that the more “n” increases, the more “Elapstime” will increase. Cor relatio ns Table (2): correlation between “n” and “AOH” Spearman's rho n A OH **. Correlation Coef f ic ient Sig. (1-tailed) N Correlation Coef f ic ient Sig. (1-tailed) N n 1.000 . 18 -.973** .000 18 A OH -.973** .000 18 1.000 . 18 Correlation is s ignif icant at the 0.01 level (1-tailed). Table (3): correlation between “n” and “Elapstime” www.ijera.com 379 | P a g e
  • 6. Mahvashakbari et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 1( Version 3), January 2014, pp.375-380 www.ijera.com Cor relations Spearman's rho n Elapstime Correlation Coef f ic ient Sig. (1-tailed) N Correlation Coef f ic ient Sig. (1-tailed) N n Elapstime 1.000 .998** . .000 18 18 .998** 1.000 .000 . 18 18 **. Correlation is s ignif icant at the 0.01 lev el (1-tailed). VII. Conclusion Many tests are performed on the system and generally increasing number of experimental database several tens or several hundred folds can increase characters recognition accuracy significantly. Because of pre-processing stage processes algorithm is size, and transfer – independent in addition to rotation – independent. During conducted tests, valid order for zernik moments to extract feature is 4 – 38. Using clustering in last stage will decrease algorithm expenses to log(n) . Statistical analysis of result of the considered algorithm performancesuggests that there is a significant and positive correlation between “n” and “Elapstime” at 0.01 level. Therefore, we can claim certainly that the more “n” value increases, the more “Elapstime” value will increase. There is a negative and significant correlation between “n” and “AOH” at 0.01 level i.e. by increasing “n” value “AOH” value will decrease. VIII. References [2] [3] [4] [5] C.S. Wallace, “A Suggestion for a Fast Multiplier”, IEEE Transaction on Electronic Computers, (1964), Vol. EC-13 14-17. L. Dadda, “Some Schemes for Parallel Multipliers”, Alta Frequenza, (1965), Vol. 34 349-356. Z.JMou, F. Jutand, “Overturned-Stairs Adder Trees and Multiplier Design”, IEEE Transaction on Computers, (1992), Vol. 41 940-948. S.Veeramachaneni, K.M. Krishna, L.Avinash, S.R.Puppala, M.B. Srinivas, “Novel Architectures for High-Speed and Low-Power 3-2, 4-2 and 5-2 Compressors”, IEEE, 20th International Conference on VLSI Design, (2007), 324-329. D.Baran, M.Aktan, V.G. Oklobdzija, “Energy Efficient Implementation of Parallel CMOS Multipliers with Improved Compressors”, Proceedings of the 16th ACM/IEEE www.ijera.com [7] [1]. [2]. [3]. [4]. Future works The authors suggest that togenerate a database with suitable quality and apply more manuscripts with more inclusion to develop this method and also this method can be applied to identify word inside a text. [1] [6] [5]. [6]. [7]. [8] [9] [10] international Symposium on Low-Power Electronics and Design, (2010), 147 – 152. A. Author, B. Author, BOOK TITLE, Publisher, 1990. http://www.nangate.com/, accessed November 17, 2011. ecognition،Academic Press، 1st edition، January 15، 1999. A. Mowlaei.Kt.Faez , a.Haghighat, Feature Extraction with Wavelet Transform for Recognition of Isolated Hamdwritten Farsi / Arabic Characters and Numerals Digital Signal Processing , pp. 923-926,2004. D.Neary ,"Fractal methods in Image Analysis and Coding", City University , School of Electronic Engineering , 2000. H.s.Kim, H.K. Lee," Invarianat Image Watermark Using Zernik Moments," IEEE Tramsactions On. Circuits And Systens For video Technology ,Vol . 8,pp.766-773,2003. S.O.BelkasimM.S"Efficient Algorithm For Fast Computation of Zernike Moments",IEEE 39 th Midwest symposium on Circuits and systems 3 ,pp.1401-1404,1966. A.Khotanzad ,Y.H.Hong," Invariant Image Recognition by Zernik Moments," IEE Trans .Pattern Analysis Machine Intelligence , Nr.5 , pp.489-497-1990. I.R.Rabiner," A tutorial on hidden markov models and selected applications in speech recoghition", Reading in Speech Recognition , PP.267-296, 1990. C.W Chong ,P.Raveendran , R.Mukandan. Translation, 36 , S, 1765-1773 , 2003. Broumandnia Ali , ShanbehzadehJamshid , Fast Zernike wavelet moments for Farsi character recognition, Elsevier, accepted 16 May 2006,Image and Vision Computing 25 (2007) 717–726 Shan Li, Senior Member, " Complex Zernike Moments Features for Shape-Based Image Retrieval", IEEE, Moon-Chuen Lee, and ChiMan Pun C. Singh, E. Walia, N. Mittal, "Rotation invariant complex Zernike moments features and their applications to human face and character recognition", IET Computer Vision. ISSN 1751-9632, April 2011. 380 | P a g e