SlideShare uma empresa Scribd logo
1 de 18
Detecting Text in Natural Scenes with Stroke Width
Transform
Presented by,
POOJA G N
Overview
• Introduction
• Steps involved in text detection algorithm
• Edge map
• Stroke width transform
• Finding letter candidates
• Grouping letter candidates
• Strength and weakness of SWT
• Results
• Applications
• References
Introduction
• With the increasing use of digital image capturing devices,
content-based image analysis techniques are receiving intensive
attention in recent years.
• As indicative marks in natural scene images, text information
provides brief and significant clues for many image-based
applications.
• We present a image operator that seeks to find the value of
stroke width for each image pixel, and demonstrate its use on
the task of text detection in natural images.
Introduction(contd.,)
Current text detection approaches can be roughly classified into three groups:
 Region-based approaches
This attempt to use similarity criterions of text, such as color, size, stroke
width, edge and gradient information, to gather pixels.
 Texture based approaches
This utilize distinct textural properties of text regions to extract candidate
sub-windows and the final outputs are formed by merging these sub-windows.
 Hybrid approaches
This take advantages of both region-based approaches which can closely
cover text regions and texture-based approaches which can estimate
coarse text location in scenes.
Steps involved in text detection algorithm
1. Image(input)
2. Edge map
 Here we use Canny Edge detection algorithm.
 The Canny edge detector is an edge detection operator that uses
a multi-stage algorithm to detect a wide range of edges in images.
Input image Edge detected image
3. Stroke Width Transform
SWT is a local operator which calculates for each pixel the width of the most likely
stroke containing the pixel.
(a).
(b).
(c).
Figures shows the implementation of the SWT
where
(a) A typical stroke. The pixels of the stroke in
this example are darker than the background
pixels.
(b) p is a pixel on the boundary of the stroke.
Searching in the direction of the gradient at
p, leads to finding q, and the
corresponding pixel on the other side of the
stroke.
(c) Each pixel along the ray is assigned by the
minimum of its current value and the
found width of the stroke.
The rules to components are as follows:
• The variance of the stroke-width within a
component must not be too big.
• The aspect ratio of a component must be within a
small range of values, in order to reject long and
narrow components.
• Components whose size is too large or too small
will also be ignored.
4. Finding Letter Candidate
5. Grouping letter candidates into regions of text
• Grouping the pixels into letter candidates based on their stroke width.
• The grouping of the image will be done by using a Connected Component algorithm.
• The image partition creates a set of connected components from an input
image, including both text characters and unwanted noises.
• We perform structural analysis of text strings to distinguish connected
components representing text characters from those representing noises.
• Assuming that a text string has at least three characters in alignment, we
develop two methods to locate regions containing text strings: adjacent
character grouping and text line grouping.
Grouping letter candidates into regions of text(contd.,)
• Group closely positioned letter candidates into regions of text.
• Filters out many falsely-identified letter candidates, and improves the
reliability of the algorithm results.
The rules to pair the letters are as follows:
• Two letter candidates should have similar
stroke width.
• The distance between letters must not
exceed three times the width of the wider
one.
• Characters of the same word are expected
to have a similar color; therefore we
compare the average color of the candidates
for pairing.
Resultant Image at each step of the algorithm
Strengths of SWT
• The SW Detector can detect letters of different languages (English, Hebrew, Arabic etc.)
• The text can be of varying sizes.
• The text can be of different orientation, including curvy text.
• Even handwriting can be detected.
Weakness of SWT
• Appearance of noise.
• Foliage resembles letters.
• Does not handle round and curved letters.
• Small and close letters tend to be grouped together in the SW labeling phase and these
groups may be dismissed in the ‘finding letter candidates’ phase.
Results
Applications
 Mobile text recognition
 Content-based web image search
 Automatic geocoding
 Robotic navigation
 License plate reading
References
1) Gili Werner ”Text Detection in Natural Scene with Stroke Width Transform”. ICBV,
February, 2013.
2) B. Epshtein, E. Ofek, and Y. Wexler, “Detecting text in natural scenes with stroke
width transform,” in Computer Vision and Pattern Recognition(CVPR),Conference
on. IEEE, 2010.
3) Mr. Hemil A. Patel, Mrs. Kishori S. Shekokar, “Text Detection in Natural Scenes with
Stroke Width Transform”, [Patel, 3(11): November, 2014], ISSN: 2277-9655.
4) L. Neumann, J. Matas, “ A method for text localization and recognition in real-world
images”, ACCV, 2010.
Any queries?
Thank you

Mais conteúdo relacionado

Mais procurados

Optical Character Recognition (OCR)
Optical Character Recognition (OCR)Optical Character Recognition (OCR)
Optical Character Recognition (OCR)Vidyut Singhania
 
Optical Character Recognition (OCR) based Retrieval
Optical Character Recognition (OCR) based RetrievalOptical Character Recognition (OCR) based Retrieval
Optical Character Recognition (OCR) based RetrievalBiniam Asnake
 
Region based segmentation
Region based segmentationRegion based segmentation
Region based segmentationramya marichamy
 
Digit recognition
Digit recognitionDigit recognition
Digit recognitionbtandale
 
Image to text Converter
Image to text ConverterImage to text Converter
Image to text ConverterDhiraj Raj
 
Edge Detection and Segmentation
Edge Detection and SegmentationEdge Detection and Segmentation
Edge Detection and SegmentationA B Shinde
 
Gabor Filtering for Fingerprint Image Enhancement
Gabor Filtering for Fingerprint Image EnhancementGabor Filtering for Fingerprint Image Enhancement
Gabor Filtering for Fingerprint Image EnhancementAnkit Nayan
 
Chapter 8 image compression
Chapter 8 image compressionChapter 8 image compression
Chapter 8 image compressionasodariyabhavesh
 
Scale Invariant Feature Transform
Scale Invariant Feature TransformScale Invariant Feature Transform
Scale Invariant Feature Transformkislayabhi
 
Computer vision basics
Computer vision basicsComputer vision basics
Computer vision basicsShilpa Sharma
 
Digital Image Processing_ ch2 enhancement spatial-domain
Digital Image Processing_ ch2 enhancement spatial-domainDigital Image Processing_ ch2 enhancement spatial-domain
Digital Image Processing_ ch2 enhancement spatial-domainMalik obeisat
 
ImageProcessing10-Segmentation(Thresholding) (1).ppt
ImageProcessing10-Segmentation(Thresholding) (1).pptImageProcessing10-Segmentation(Thresholding) (1).ppt
ImageProcessing10-Segmentation(Thresholding) (1).pptVikramBarapatre2
 
Image feature extraction
Image feature extractionImage feature extraction
Image feature extractionRushin Shah
 
A Brief History of Object Detection / Tommi Kerola
A Brief History of Object Detection / Tommi KerolaA Brief History of Object Detection / Tommi Kerola
A Brief History of Object Detection / Tommi KerolaPreferred Networks
 

Mais procurados (20)

Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Optical Character Recognition (OCR)
Optical Character Recognition (OCR)Optical Character Recognition (OCR)
Optical Character Recognition (OCR)
 
Object Recognition
Object RecognitionObject Recognition
Object Recognition
 
Optical Character Recognition (OCR) based Retrieval
Optical Character Recognition (OCR) based RetrievalOptical Character Recognition (OCR) based Retrieval
Optical Character Recognition (OCR) based Retrieval
 
Region based segmentation
Region based segmentationRegion based segmentation
Region based segmentation
 
Digit recognition
Digit recognitionDigit recognition
Digit recognition
 
Image to text Converter
Image to text ConverterImage to text Converter
Image to text Converter
 
Edge Detection and Segmentation
Edge Detection and SegmentationEdge Detection and Segmentation
Edge Detection and Segmentation
 
Gabor Filtering for Fingerprint Image Enhancement
Gabor Filtering for Fingerprint Image EnhancementGabor Filtering for Fingerprint Image Enhancement
Gabor Filtering for Fingerprint Image Enhancement
 
Chapter 8 image compression
Chapter 8 image compressionChapter 8 image compression
Chapter 8 image compression
 
Support vector machine-SVM's
Support vector machine-SVM'sSupport vector machine-SVM's
Support vector machine-SVM's
 
Scale Invariant Feature Transform
Scale Invariant Feature TransformScale Invariant Feature Transform
Scale Invariant Feature Transform
 
Computer vision basics
Computer vision basicsComputer vision basics
Computer vision basics
 
Digital Image Processing_ ch2 enhancement spatial-domain
Digital Image Processing_ ch2 enhancement spatial-domainDigital Image Processing_ ch2 enhancement spatial-domain
Digital Image Processing_ ch2 enhancement spatial-domain
 
ImageProcessing10-Segmentation(Thresholding) (1).ppt
ImageProcessing10-Segmentation(Thresholding) (1).pptImageProcessing10-Segmentation(Thresholding) (1).ppt
ImageProcessing10-Segmentation(Thresholding) (1).ppt
 
Image enhancement
Image enhancementImage enhancement
Image enhancement
 
Feature scaling
Feature scalingFeature scaling
Feature scaling
 
Image feature extraction
Image feature extractionImage feature extraction
Image feature extraction
 
A Brief History of Object Detection / Tommi Kerola
A Brief History of Object Detection / Tommi KerolaA Brief History of Object Detection / Tommi Kerola
A Brief History of Object Detection / Tommi Kerola
 
Deep Learning for Computer Vision: Data Augmentation (UPC 2016)
Deep Learning for Computer Vision: Data Augmentation (UPC 2016)Deep Learning for Computer Vision: Data Augmentation (UPC 2016)
Deep Learning for Computer Vision: Data Augmentation (UPC 2016)
 

Semelhante a Detecting text from natural images with Stroke Width Transform

IRJET- A Survey on MSER Based Scene Text Detection
IRJET-  	  A Survey on MSER Based Scene Text DetectionIRJET-  	  A Survey on MSER Based Scene Text Detection
IRJET- A Survey on MSER Based Scene Text DetectionIRJET Journal
 
Text Extraction System by Eliminating Non-Text Regions
Text Extraction System by Eliminating Non-Text RegionsText Extraction System by Eliminating Non-Text Regions
Text Extraction System by Eliminating Non-Text RegionsIJCSIS Research Publications
 
IRJET- Devnagari Text Detection
IRJET- Devnagari Text DetectionIRJET- Devnagari Text Detection
IRJET- Devnagari Text DetectionIRJET Journal
 
Detection and Localization of Text Information in Video Frames
Detection and Localization of Text Information in Video FramesDetection and Localization of Text Information in Video Frames
Detection and Localization of Text Information in Video FramesIOSR Journals
 
Enhanced characterness for text detection in the wild
Enhanced characterness for text detection in the wildEnhanced characterness for text detection in the wild
Enhanced characterness for text detection in the wildPrerana Mukherjee
 
Scene text recognition in mobile applications by character descriptor and str...
Scene text recognition in mobile applications by character descriptor and str...Scene text recognition in mobile applications by character descriptor and str...
Scene text recognition in mobile applications by character descriptor and str...eSAT Journals
 
AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR RE...
AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR RE...AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR RE...
AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR RE...ijcsa
 
Enhancement and Segmentation of Historical Records
Enhancement and Segmentation of Historical RecordsEnhancement and Segmentation of Historical Records
Enhancement and Segmentation of Historical Recordscsandit
 
Representation and recognition of handwirten digits using deformable templates
Representation and recognition of handwirten digits using deformable templatesRepresentation and recognition of handwirten digits using deformable templates
Representation and recognition of handwirten digits using deformable templatesAhmed Abd-Elwasaa
 
Pattern_Recognition_via_Character_Recogn.pptx
Pattern_Recognition_via_Character_Recogn.pptxPattern_Recognition_via_Character_Recogn.pptx
Pattern_Recognition_via_Character_Recogn.pptxEngRSMY2
 
Text Extraction of Colour Images using Mathematical Morphology & HAAR Transform
Text Extraction of Colour Images using Mathematical Morphology & HAAR TransformText Extraction of Colour Images using Mathematical Morphology & HAAR Transform
Text Extraction of Colour Images using Mathematical Morphology & HAAR TransformIOSR Journals
 
COHESIVE MULTI-ORIENTED TEXT DETECTION AND RECOGNITION STRUCTURE IN NATURAL S...
COHESIVE MULTI-ORIENTED TEXT DETECTION AND RECOGNITION STRUCTURE IN NATURAL S...COHESIVE MULTI-ORIENTED TEXT DETECTION AND RECOGNITION STRUCTURE IN NATURAL S...
COHESIVE MULTI-ORIENTED TEXT DETECTION AND RECOGNITION STRUCTURE IN NATURAL S...ijdpsjournal
 
COHESIVE MULTI-ORIENTED TEXT DETECTION AND RECOGNITION STRUCTURE IN NATURAL S...
COHESIVE MULTI-ORIENTED TEXT DETECTION AND RECOGNITION STRUCTURE IN NATURAL S...COHESIVE MULTI-ORIENTED TEXT DETECTION AND RECOGNITION STRUCTURE IN NATURAL S...
COHESIVE MULTI-ORIENTED TEXT DETECTION AND RECOGNITION STRUCTURE IN NATURAL S...ijdpsjournal
 
Design and implementation of optical character recognition using template mat...
Design and implementation of optical character recognition using template mat...Design and implementation of optical character recognition using template mat...
Design and implementation of optical character recognition using template mat...eSAT Journals
 

Semelhante a Detecting text from natural images with Stroke Width Transform (20)

F045053236
F045053236F045053236
F045053236
 
IRJET- A Survey on MSER Based Scene Text Detection
IRJET-  	  A Survey on MSER Based Scene Text DetectionIRJET-  	  A Survey on MSER Based Scene Text Detection
IRJET- A Survey on MSER Based Scene Text Detection
 
Das09112008
Das09112008Das09112008
Das09112008
 
Text Extraction System by Eliminating Non-Text Regions
Text Extraction System by Eliminating Non-Text RegionsText Extraction System by Eliminating Non-Text Regions
Text Extraction System by Eliminating Non-Text Regions
 
IRJET- Devnagari Text Detection
IRJET- Devnagari Text DetectionIRJET- Devnagari Text Detection
IRJET- Devnagari Text Detection
 
LSDI 2.pptx
LSDI 2.pptxLSDI 2.pptx
LSDI 2.pptx
 
40120140501009
4012014050100940120140501009
40120140501009
 
Detection and Localization of Text Information in Video Frames
Detection and Localization of Text Information in Video FramesDetection and Localization of Text Information in Video Frames
Detection and Localization of Text Information in Video Frames
 
Enhanced characterness for text detection in the wild
Enhanced characterness for text detection in the wildEnhanced characterness for text detection in the wild
Enhanced characterness for text detection in the wild
 
Scene text recognition in mobile applications by character descriptor and str...
Scene text recognition in mobile applications by character descriptor and str...Scene text recognition in mobile applications by character descriptor and str...
Scene text recognition in mobile applications by character descriptor and str...
 
AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR RE...
AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR RE...AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR RE...
AN ENHANCED EDGE ADAPTIVE STEGANOGRAPHY APPROACH USING THRESHOLD VALUE FOR RE...
 
Enhancement and Segmentation of Historical Records
Enhancement and Segmentation of Historical RecordsEnhancement and Segmentation of Historical Records
Enhancement and Segmentation of Historical Records
 
Representation and recognition of handwirten digits using deformable templates
Representation and recognition of handwirten digits using deformable templatesRepresentation and recognition of handwirten digits using deformable templates
Representation and recognition of handwirten digits using deformable templates
 
Pattern_Recognition_via_Character_Recogn.pptx
Pattern_Recognition_via_Character_Recogn.pptxPattern_Recognition_via_Character_Recogn.pptx
Pattern_Recognition_via_Character_Recogn.pptx
 
Text Extraction of Colour Images using Mathematical Morphology & HAAR Transform
Text Extraction of Colour Images using Mathematical Morphology & HAAR TransformText Extraction of Colour Images using Mathematical Morphology & HAAR Transform
Text Extraction of Colour Images using Mathematical Morphology & HAAR Transform
 
industrial engg
industrial enggindustrial engg
industrial engg
 
C04741319
C04741319C04741319
C04741319
 
COHESIVE MULTI-ORIENTED TEXT DETECTION AND RECOGNITION STRUCTURE IN NATURAL S...
COHESIVE MULTI-ORIENTED TEXT DETECTION AND RECOGNITION STRUCTURE IN NATURAL S...COHESIVE MULTI-ORIENTED TEXT DETECTION AND RECOGNITION STRUCTURE IN NATURAL S...
COHESIVE MULTI-ORIENTED TEXT DETECTION AND RECOGNITION STRUCTURE IN NATURAL S...
 
COHESIVE MULTI-ORIENTED TEXT DETECTION AND RECOGNITION STRUCTURE IN NATURAL S...
COHESIVE MULTI-ORIENTED TEXT DETECTION AND RECOGNITION STRUCTURE IN NATURAL S...COHESIVE MULTI-ORIENTED TEXT DETECTION AND RECOGNITION STRUCTURE IN NATURAL S...
COHESIVE MULTI-ORIENTED TEXT DETECTION AND RECOGNITION STRUCTURE IN NATURAL S...
 
Design and implementation of optical character recognition using template mat...
Design and implementation of optical character recognition using template mat...Design and implementation of optical character recognition using template mat...
Design and implementation of optical character recognition using template mat...
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Último (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Detecting text from natural images with Stroke Width Transform

  • 1. Detecting Text in Natural Scenes with Stroke Width Transform Presented by, POOJA G N
  • 2. Overview • Introduction • Steps involved in text detection algorithm • Edge map • Stroke width transform • Finding letter candidates • Grouping letter candidates • Strength and weakness of SWT • Results • Applications • References
  • 3. Introduction • With the increasing use of digital image capturing devices, content-based image analysis techniques are receiving intensive attention in recent years. • As indicative marks in natural scene images, text information provides brief and significant clues for many image-based applications. • We present a image operator that seeks to find the value of stroke width for each image pixel, and demonstrate its use on the task of text detection in natural images.
  • 4. Introduction(contd.,) Current text detection approaches can be roughly classified into three groups:  Region-based approaches This attempt to use similarity criterions of text, such as color, size, stroke width, edge and gradient information, to gather pixels.  Texture based approaches This utilize distinct textural properties of text regions to extract candidate sub-windows and the final outputs are formed by merging these sub-windows.  Hybrid approaches This take advantages of both region-based approaches which can closely cover text regions and texture-based approaches which can estimate coarse text location in scenes.
  • 5. Steps involved in text detection algorithm
  • 7. 2. Edge map  Here we use Canny Edge detection algorithm.  The Canny edge detector is an edge detection operator that uses a multi-stage algorithm to detect a wide range of edges in images. Input image Edge detected image
  • 8. 3. Stroke Width Transform SWT is a local operator which calculates for each pixel the width of the most likely stroke containing the pixel. (a). (b). (c). Figures shows the implementation of the SWT where (a) A typical stroke. The pixels of the stroke in this example are darker than the background pixels. (b) p is a pixel on the boundary of the stroke. Searching in the direction of the gradient at p, leads to finding q, and the corresponding pixel on the other side of the stroke. (c) Each pixel along the ray is assigned by the minimum of its current value and the found width of the stroke.
  • 9. The rules to components are as follows: • The variance of the stroke-width within a component must not be too big. • The aspect ratio of a component must be within a small range of values, in order to reject long and narrow components. • Components whose size is too large or too small will also be ignored. 4. Finding Letter Candidate
  • 10. 5. Grouping letter candidates into regions of text • Grouping the pixels into letter candidates based on their stroke width. • The grouping of the image will be done by using a Connected Component algorithm. • The image partition creates a set of connected components from an input image, including both text characters and unwanted noises. • We perform structural analysis of text strings to distinguish connected components representing text characters from those representing noises. • Assuming that a text string has at least three characters in alignment, we develop two methods to locate regions containing text strings: adjacent character grouping and text line grouping.
  • 11. Grouping letter candidates into regions of text(contd.,) • Group closely positioned letter candidates into regions of text. • Filters out many falsely-identified letter candidates, and improves the reliability of the algorithm results. The rules to pair the letters are as follows: • Two letter candidates should have similar stroke width. • The distance between letters must not exceed three times the width of the wider one. • Characters of the same word are expected to have a similar color; therefore we compare the average color of the candidates for pairing.
  • 12. Resultant Image at each step of the algorithm
  • 13. Strengths of SWT • The SW Detector can detect letters of different languages (English, Hebrew, Arabic etc.) • The text can be of varying sizes. • The text can be of different orientation, including curvy text. • Even handwriting can be detected. Weakness of SWT • Appearance of noise. • Foliage resembles letters. • Does not handle round and curved letters. • Small and close letters tend to be grouped together in the SW labeling phase and these groups may be dismissed in the ‘finding letter candidates’ phase.
  • 15. Applications  Mobile text recognition  Content-based web image search  Automatic geocoding  Robotic navigation  License plate reading
  • 16. References 1) Gili Werner ”Text Detection in Natural Scene with Stroke Width Transform”. ICBV, February, 2013. 2) B. Epshtein, E. Ofek, and Y. Wexler, “Detecting text in natural scenes with stroke width transform,” in Computer Vision and Pattern Recognition(CVPR),Conference on. IEEE, 2010. 3) Mr. Hemil A. Patel, Mrs. Kishori S. Shekokar, “Text Detection in Natural Scenes with Stroke Width Transform”, [Patel, 3(11): November, 2014], ISSN: 2277-9655. 4) L. Neumann, J. Matas, “ A method for text localization and recognition in real-world images”, ACCV, 2010.