skip to main content
Skip header Section
Optical character recognitionJanuary 1999
Publisher:
  • John Wiley & Sons, Inc.
  • 605 Third Ave. New York, NY
  • United States
Published:01 January 1999
Pages:
536
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. Mandal A, Agarwal S, Malhotra N, Sridhara G, Ray A and Swarup D Improving IT Support by Enhancing Incident Management Process with Multi-modal Analysis Service-Oriented Computing, (431-446)
  2. Schneegass C, Kosch T, Schmidt A and Hussmann H Investigating the Potential of EEG for Implicit Detection of Unknown Words for Foreign Language Learning Human-Computer Interaction – INTERACT 2019, (293-313)
  3. Lee Y, Wang X, Lee K, Liao X, Wang X, Li T and Mi X Understanding iOS-based crowdturfing through hidden UI analysis Proceedings of the 28th USENIX Conference on Security Symposium, (765-781)
  4. Chen Y, Xing L, Qin Y, Liao X, Wang X, Chen K and Zou W Devils in the guidance Proceedings of the 28th USENIX Conference on Security Symposium, (747-764)
  5. Zhao D, Xing Z, Chen C, Xia X and Li G ActionNet Proceedings of the 41st International Conference on Software Engineering, (350-361)
  6. Xiao X, Wang X, Cao Z, Wang H and Gao P IconIntent Proceedings of the 41st International Conference on Software Engineering, (257-268)
  7. ACM
    Chen K, Li T, Kim H, Culler D and Katz R MARVEL Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems, (292-304)
  8. Ramesh B and Xiang C (2017). Unseen object categorization using multiple visual cues, Neurocomputing, 230:C, (88-99), Online publication date: 22-Mar-2017.
  9. ACM
    Sonowal G and Kuppusamy K MASPHID Proceedings of the International Conference on Informatics and Analytics, (1-6)
  10. Nagy G (2016). Disruptive developments in document recognition, Pattern Recognition Letters, 79:C, (106-112), Online publication date: 1-Aug-2016.
  11. ACM
    Valente J and Cárdenas A Using Visual Challenges to Verify the Integrity of Security Cameras Proceedings of the 31st Annual Computer Security Applications Conference, (141-150)
  12. Caluori U and Simon K (2015). DETEXTIVE optical character recognition with pattern matching on-the-fly, Pattern Recognition, 48:3, (827-836), Online publication date: 1-Mar-2015.
  13. Song D, Wang D and Chen X Discovering Geometric Theorems from Scanned and Photographed Images of Diagrams Revised Selected Papers of the 10th International Workshop on Automated Deduction in Geometry - Volume 9201, (149-165)
  14. Kacalak W and Majewski M Effective handwriting recognition system using geometrical character analysis algorithms Proceedings of the 19th international conference on Neural Information Processing - Volume Part IV, (248-255)
  15. Chen K, Chen F and Hou T (2012). A Low-cost Reader for Automatically Collecting Vital Signs in Hospitals, Journal of Medical Systems, 36:4, (2599-2607), Online publication date: 1-Aug-2012.
  16. Kumar A and Ré C (2011). Probabilistic management of OCR data using an RDBMS, Proceedings of the VLDB Endowment, 5:4, (322-333), Online publication date: 1-Dec-2011.
  17. Zeki A, Zakaria M and Liong C (2011). Segmentation of Arabic Characters, International Journal of Technology Diffusion, 2:4, (48-82), Online publication date: 1-Oct-2011.
  18. Aviv A, Gibson K, Mossop E, Blaze M and Smith J Smudge attacks on smartphone touch screens Proceedings of the 4th USENIX conference on Offensive technologies, (1-7)
  19. Zambanini S, Kampel M and Schlapke M On the use of computer vision for numismatic research Proceedings of the 9th International conference on Virtual Reality, Archaeology and Cultural Heritage, (17-24)
  20. Abandah G, Younis K and Khedher M Handwritten Arabic character recognition using multiple classifiers based on letter form Proceedings of the Fifth IASTED International Conference on Signal Processing, Pattern Recognition and Applications, (128-133)
  21. Aburas A and Rehiel S Accurate tool based on JPEG image compression for Arabic handwritten character shape recognition Proceedings of the 26th IASTED International Conference on Artificial Intelligence and Applications, (240-244)
  22. Loh W, Park Y and Yoon Y Fast recognition of asian characters based on database methodologies Proceedings of the 24th British national conference on Databases, (37-48)
  23. Savas B and Eldén L (2007). Handwritten digit classification using higher order singular value decomposition, Pattern Recognition, 40:3, (993-1003), Online publication date: 1-Mar-2007.
  24. Maschotta R, Boymann S and Hoppe U (2007). Comparison of feature-list cross-correlation algorithms with common cross-correlation algorithms, EURASIP Journal on Advances in Signal Processing, 2007:1, (52-52), Online publication date: 1-Jan-2007.
  25. Ristić D and Gräser A (2006). Performance measure as feedback variable in image processing, EURASIP Journal on Advances in Signal Processing, 2006, (208-208), Online publication date: 1-Jan-2006.
  26. Ringlstetter C, Schulz K, Mihov S and Louka K The Same is Not The same - Post Correction of Alphabet Confusion Erros in Mixed-Alphabet OCR Recognation Proceedings of the Eighth International Conference on Document Analysis and Recognition, (406-410)
  27. ACM
    Sun J, Hotta Y, Katsuyama Y and Naoi S Low resolution character recognition by dual eigenspace and synthetic degraded patterns Proceedings of the 1st ACM workshop on Hardcopy document processing, (15-22)
  28. Valveny E and López A Numeral recognition for quality control of surgical sachets Proceedings of the Seventh International Conference on Document Analysis and Recognition - Volume 1
  29. Bunke H Recognition of Cursive Roman Handwriting - Past, Present and Future Proceedings of the Seventh International Conference on Document Analysis and Recognition - Volume 1
  30. Plamondon R and Srihari S (2000). On-Line and Off-Line Handwriting Recognition, IEEE Transactions on Pattern Analysis and Machine Intelligence, 22:1, (63-84), Online publication date: 1-Jan-2000.
Contributors
  • Ricoh Co., Ltd.

Recommendations

Reviews

Robert Goldberg

In this comprehensive text on optical character recognition (OCR), the authors blend the theoretical with the practical, the breadth of survey with the depth of analysis, and the algorithmic approach with the mathematical. As such, the book will be of interest to anyone interested in OCR, regardless of perspective. Since the book involves theorem proving and integral calculus, the reader should understand that it is not a trivial introduction to the subject. Yet, because of its thorough treatment of the topics discussed, the reader is not left alone in the development of one equation from the previous ones. It is certainly a text for someone interested in the cutting edge of the technology. It does, at times, favor a signal processing perspective in presenting the material. The book consists of 13 chapters, three appendices, and extensive references for each chapter. It begins with an introduction to the problems involved in OCR and presents simplified approaches that one might conceive of to solve them. These approaches do not work well in practice. A main reason for this is that the data are usually noisy, an issue that is dealt with in the next chapter. A related issue is that templates of characters generally assume a certain typography, while documents (especially handwritten ones) may shift to other fonts and point sizes. Chapter 3, therefore, covers normalization, presenting four different models of normalization (Iijima, Amari, linear, and nonlinear). Assuming that the issues of noise and scale have been dealt with, the OCR program will need to appropriately segment the relevant portions of the image that contain the actual text scanned in. This is discussed in chapter 4, and a series of experiments are presented that test various nonadaptive thresholding methods. Once the characters have been isolated from the background of the document, preprocessing steps are usually employed in order to simplify the subsequent matching phase. The most standard of these steps is thinning the character to its skeleton. Chapter 5 introduces this concept, based on connectivity, and discusses the Hilditch, Pavlidis, and graph approaches. Other suggested preprocessing steps are discussed in chapter 6, where morphological techniques are defined. Whereas the first half of the book deals more with preparing the image and segmented character data, the second half addresses topological representations of the features in a given character and matching of the structures obtained from the image to those stored in a character database. Chapter 7 presents feature extraction based on linear methods. The mathematics necessary to understand this chapter is involved; it is based on functional analysis, invariant features using Zernike moments, Fourier expansions and descriptors, and Karhunen-Loeve expansions. Chapter 8 continues the discussion of feature extraction, based on structural methods. These methods include convex decomposition, stream-following, polygonal approximations, split and merge, contour following, and corner detection methods. Once the different features of a given character have been extracted from the image, chapters 9 and 10 deal with assembling all of this information into one shape descriptor. Chapter 9 accomplishes this with an algebraic approach, and chapter 10 integrates the clear background that a character rests on with the general description of the strokes used to form the actual character. Together, these form a more unified description of shape. Chapters 11 through 13 describe numerous matching techniques for comparing the shape obtained with the shapes in a database. The three appendices provide some extra information about some of the details in the main text and discuss data sets for the experiments considered. The book is extensive and comprehensive, and is worthwhile reading for researchers interested in optical character recognition. It could also serve as a text for a graduate special topics course in OCR.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.