Research Article  Open Access
Mohammad S. Khorsheed, "Recognizing Cursive Typewritten Text Using SegmentationFree System", The Scientific World Journal, vol. 2015, Article ID 818432, 7 pages, 2015. https://doi.org/10.1155/2015/818432
Recognizing Cursive Typewritten Text Using SegmentationFree System
Abstract
Feature extraction plays an important role in text recognition as it aims to capture essential characteristics of the text image. Feature extraction algorithms widely range between robust and hard to extract features and noise sensitive and easy to extract features. Among those feature types are statistical features which are derived from the statistical distribution of the image pixels. This paper presents a novel method for feature extraction where simple statistical features are extracted from a onepixel wide window that slides across the text line. The feature set is clustered in the feature space using vector quantization. The feature vector sequence is then injected to a classification engine for training and recognition purposes. The recognition system is applied to a data corpus which includes cursive Arabic text of more than 600 A4size sheets typewritten in multiple computergenerated fonts. The system performance is compared to a previously published system from the literature with a similar engine but a different feature set.
1. Introduction
Optical character recognition (OCR) is amongst the branches of pattern recognition where a computer program attempts to imitate the human ability to read printed text with human accuracy, but at a higher speed [1]. A number of factors are pushing toward text recognition: the easy use of electronic media, its growth at the expense of conventional media, and the necessity of converting the data from the conventional media to the new electronic media. The latter motivates the vast range of OCR applications which includes automatic mail routing [2], machine processing of forms [3], bank cheques [4], printed newspapers [5], and signature verification [6].
Most optical character recognition methods for Latin text assume that individual characters can be isolated. Although this is applicable and successful for those languages, this assumption cannot be applied reliably to cursive script, such as Arabic, where the shape of the character is context sensitive. Feature extraction tackles the obstacle of cursiveness of Arabic in twofold: the global approach and the analytical approach. While global approach treats the word as a whole, extracts features from the unsegmented word, and then compares those features to a model [7, 8], analytical approach decomposes the word into smaller units called glyphs [9]. Glyphs may or may not correspond to characters, although previous research has confirmed the difficulties in attempting to segment Arabic words into individual characters [10].
A feature measures certain attributes of a glyph and then combines those measurements into a vector. Those measurements capture essential characteristics of the glyph which eliminate variations of the same glyph across various fonts and preserve properties between two different glyphs. Features could be structural, statistical, or global transformation. Structural features concern with topological and geometrical characteristics of a glyph [11, 12]. These include strokes and bays in all directions, intersections of lines, endpoints, positions of strokes and dots relative to the baseline, loops, and zigzags [13–15]. From one side, structural features are difficult to extract; in contrast, they are capable of tolerating variations in writing styles and noise [16]. Statistical features may compute the density distribution of the glyph pixels [17] or count the segments of ones and zeros, the length of each of those segments, and the ratio of how the image pixels are distributed between image parts [18]. They can also have the form of image intensity function, moments which may be invariant to geometric transformations such as scaling, rotation, and translation [19, 20]. Statistical features are easier to compute than structural features; however, they are very sensitive to noise and style variation. Global transformation features transform the representation of the image pixels from the current status into a more compact form. This includes using Fourier Descriptors (FDs) to represent the character’s outer skeleton via a periodic function [21] transforming each word into a normalized polar image, then applying the twodimensional Fourier transform to the polar image [22] or representing the boundary pixels of the character using Freeman code [23, 24].
After transferring the glyph image into a sequence of feature vectors, the next step is to classify this sequence into one of predefined clusters. Various classification methods and techniques have been applied in recognizing Arabic alphanumerical and text. These include Template Matching [25], Euclidean Distance [26], Neural Networks [27], Fuzzy Logic [28], Genetic Algorithms [29], and Hidden Markov Models (HMMs) [30]. HMMs are statistical models which are widely and efficiently implemented among applications such as speech processing, online character recognition [31], and offline character recognition [32]. The HMM can tolerate variations in timevarying patterns by providing explicit representation for these patterns. There are a number of packages which enable researchers to implement HMMs to their environments. Among those packages is the HMM Tool Kit (HTK) [33].
This paper presents a novel algorithm to extract a feature set from a onepixel wide window that slides across the Arabic text line image from right to left. This feature set includes the segment length within each image column. The feature space is clustered using vector quantization (VQ) [34] in order to reduce the dimensionality of the problem from two dimensions to one dimension. This enables us to utilize one of the existing recognition engines; HTK.
2. The Proposed Algorithm
Activities conducted within the OCR system include acquiring the document image, preprocessing it, and then decomposing it into text line images, clustering the feature space into classes using VQ, coupling the discrete representation of the features with the corresponding ground truth to estimate the character model parameters. During recognition, an input line image is transferred into a feature vector sequence, clustered into a sequence of discrete symbols. This sequence is then injected into the recognition engine which outputs a stream of characters matching the text line.
The text line image is fed to the system as a twodimensional binary array. Feature extraction applies a set of statistical measures to the line image which results in a sequence of twodimensional feature vectors. Those feature vectors are computed as a function of a sliding onepixel wide window scanning the line image from right to left. A set of simple features is extracted from pixels falling within that window. This feature set represents the RunLength Encoding (RLE) of the pixel column [35]. RLE is a quick and simple algorithm to compress data. This algorithm is supported by various bitmap file formats such as PCX, BMP, and TIFF. For each repeating string of characters, the algorithm stores the character value and computes the frequency of that character within the string. The algorithm refers to these two figures as the run value and the run length. The efficiency of the algorithm to compress data highly depends on the nature of image under consideration.
Figure 1 illustrates the implementation of RLE algorithm to a gray image. RLE extracts the runs of data for each segment within each column. The algorithm finds the intensity value for a pixel, the run value, and counts the number of pixels with the same value in that segment, run count. The new representation of the image using RLE may not be friendly to be utilized to train and test a recognition system. In contrast, a binary image has less pixel complexity as there are only two run values, one or zero, and therefore a more concise representation for the image. In this paper, a document image represents the binary image of one A4size page where white is the background and black is the foreground. This document image is mostly white and hence is efficiently encoded due to the large amount of contiguous data that has the same run value.
The document binary image is runlength encoded in a sequential process which processes the image data as a onedimensional stream, rather than a twodimensional map of data. This implies that the algorithm starts from the top right corner of the image, traverses the first column, and transfers each segment into a single number which represents the run count of ones or zeroes. This process iterates to all consequent columns. Figure 2 illustrates the implementation of the proposed algorithm to a small portion of a word image. Figure 2(b) shows a portion of a word image in Figure 2(a). Each column in the text line image is transferred into a sequence of discrete numbers where each number represents the run count of a segment of zeroes or ones as shown in Figure 2(c). There is no certain order for the segment sequence in a given column as this depends on whether the first pixel of that column is zero or one. Figure 3 shows two columns with two different pixel combinations. The two columns have the same segment sequence and run counts. To remedy this, we assume that the first pixel in the column is zero and we count the run length accordingly. If the first pixel in the column is one then we assign zero value to the first segment. This presents consistency among all columns which is essential to clear confusion between those columns with similar segment sequences. Applying this to the columns shown in Figure 3, the first column has the same segment sequence where the second column (b) alters its segment sequence into the following: 0, 1, 3, 3, 1, 2. Though the problem of similarity is resolved now, different segment sequence sizes appear clearly here. The next section will resolve this challenge.
(a)
(b)
(c)
3. Implementation and Recognition Results
3.1. The Arabic Corpus
The proposed algorithm is implemented to a corpus that includes more than 600 A4size pages of Arabic text. The content was typewritten in six different computergenerated fonts. These fonts are Tahoma, Simplified Arabic, Traditional Arabic, Andalus, Naskh, and Thuluth; see Figure 4. They cover different complexity scales ranging from Tahoma which is a simple font with no overlap or ligature to Thuluth which is very rich with challenges: overlaps, ligatures, and decorative curves. The corpus includes 15000 text line images of 116743 words and 596931 letters, not including spaces. It has line heights which are proportional to the font type and size. The line image height varies from 35 pixels to 95 pixels with different number of segments per column. Various approaches were applied to produce uniform feature vectors. Khorsheed [7] resized all line images to a single height of 60 pixels. This allows the feature extraction to produce consistent feature vectors.
(a) Tahoma font
(b) Simplified Arabic
(c) Traditional Arabic
(d) Andalus
(e) Naskh
(f) Thuluth
In this paper, we tackle this variation differently. We aim to calculate the optimal size of the feature vector or in other words the optimal number of segments per column. This is related to a number of transitions from zero (background) to one (foreground) and vice versa. Table 1 shows numbers of transitions per column, number of columns with this transition number, and the accumulative percentage. More than 99% of the 16,287,440 columns in the corpus have six transitions at most. This means that those columns have seven runs/segments or less. Therefore, we decide to transfer each column in the line image into a sevendimensional feature vector. Each item within that feature vector represents the runlength of the foreground or background pixels. All other transitions beyond the first six transitions from the top are discarded. The proposed algorithm produces feature vectors 3 to 5 times more than the algorithm presented in [7]. In that algorithm, the sliding window was vertically divided into cells where each cell includes 3 × 3 or 5 × 5 pixels. Three features were extracted from each cell: the intensity, the intensity of horizontal derivative, and the intensity of vertical derivative. Vertical and horizontal overlaps between cells increase the amount of features generated from an individual line image though increase the processing time. Figure 5 illustrates the outputs of the proposed algorithm and [7] from a small portion of a text line binary image. The proposed algorithm produces 6 feature vectors, one from each column. Khorsheed [7] first slid a 3 × 3 window vertically with zero overlap which generated three cells. Those three cells were combined together to form one feature vector. The sliding window then shifted two pixels to the left which resulted in one pixel horizontal overlap. The algorithm finally produced only two feature vectors from the given binary image portion. The difference in the size of the feature vectors extracted using the two algorithms will impact training the recognition engine as we shall see next section. Both algorithms implemented VQ to map continuous density vectors to discrete simple symbols. A vector quantizer depends on a socalled codebook which defines a set of clusters each of which is represented by the mean value of all feature vectors belonging to that cluster. Each incoming feature vector is then matched with each cluster and assigned the index corresponding to the cluster which has the minimum difference value or in another words is closest.

3.2. The Recognition Engine
This is based on the hidden Markov model toolkit (HTK) [33]. HTK is a portable toolkit for building and manipulating hidden Markov models. Most of HTK functionality is built as C code libraries which facilitates writing scripts to execute HTK tools. The HTK tools have three phases: data preparation, training, and recognition tools. We hardcode the data preparation tools to acquire the document image, preprocess it, and then decompose it into text line images as the text line is chosen here as the unit for training and recognition purposes. The Ccode also performs RLE feature extraction before converting the final result into HTK format. Data preparation tools are also responsible for mapping the output of feature extraction against predefined codebook vectors and replaced with the symbol representing the nearest codebook vector. This step transfers the text line image into a sequence of discrete symbols. It takes as input a set of feature vectors, clusters them, and uses the centroid of each cluster to define the clusters with the codebook.
The data preparation tool builds a linear structured codebook in an iterative process. Initially, there is only one cluster with a mean value of all training vectors. In each following iteration, if the total distance between the cluster members and the mean is more than a predefined threshold, the mean is then perturbed to give two means and the vectors within that cluster are rearranged according to which mean is nearest to them. This continues until the codebook size reaches the required number of clusters.
HTK recognition tool decodes the observation sequence and outputs the associated state sequence. It requires a network to describe the transition probabilities from one character model to another. Each model represents various shapes of one character in the alphabet. In this paper, we have implemented two character model schemes: monomodels and trimodels. A monomodel is contextindependent where each character in the alphabet is represented by a distinct HMM. Each character in the word is separated from its preceding and succeeding neighbors. Monomodels are easy to train, as the total number of models is relatively small, and simple to label, as each label represents one character. In contrast, a trimodel is contextdependent where each model consists of a combination of three letters: the recognized letter and its preceding and succeeding neighbors in the context.
Table 2 shows the system performance of four different experiments all executed using 1024 codebook size. Two of those experiments were performed using part of the training dataset as a test dataset. This illustrates the system capability to learn, meaning apparent relationships in the training data can be identified. The other two experiments were performed using independent test dataset of the training dataset. This assesses if the relationships previously identified can be held in general.

As shown in Figure 5, the proposed algorithm produces feature vectors 3 to 5 times more than [7]. This enables fine tuning the recognition engine parameters more accurately as illustrated in Table 3. The more states a model has the more data it needs to reestimate its parameters. This is also essential for trimodels as there are around 9400 models each has its own set of parameters. Table 3 shows a huge drop in the recognition rate for [7] when the number of states per model is 16. This is due to the lack of adequate number of feature vectors to tune the recognition engine parameters. In contrast, the proposed algorithm does not suffer from this problem as shown in the same table.

Table 4 shows the system performance for each of the six fonts in the corpus using two feature extraction methods: the proposed algorithm and [7]. As illustrated, the proposed algorithm outperforms [7] at all fonts thanks to the overwhelming number of feature vectors extracted from the line images which enable the recognition engine, using the proposed algorithm, to grasp the fine variations from various fonts and writing styles.

4. Conclusions
This paper presented a novel approach to extract features from the text line images. The proposed algorithm is a segmentationfree and uses runlength encoding (RLE). The performance of the proposed approach was assessed using a corpus including cursive Arabic text typewritten in various computergenerated fonts and a recognition engine based on Hidden Markov Models Tool Kit (HTK). The system was capable of learning complex ligatures and overlaps. Finally, a comparison was conducted between the proposed algorithm and another algorithm which extracted intensity features. The abundance of RLE feature vectors compared to the intensity feature vectors enables the proposed algorithm to accurately finetune the recognition engine parameters and hence improve the overall system performance.
Conflict of Interests
The author declares that there is no conflict of interests regarding the publication of this paper.
References
 V. K. Govindan and A. P. Shivaprasad, “Character recognition—a review,” Pattern Recognition, vol. 23, no. 7, pp. 671–683, 1990. View at: Publisher Site  Google Scholar
 A. Downton, R. W. Tregidgo, and C. G. Leedham, “Recognition of handwritten British postal addresses,” in From Pixels to Features III: Frontiers in Handwriting Recognition, S. Impedovo and J. Simon, Eds., pp. 129–144, Elsevier, 1992. View at: Google Scholar
 C. Cracknell, A. C. Downton, and L. Du, “An objectoriented form description language and approach to handwritten form processing,” in Proceedings of the 4th International Conference on Document Analysis and Recognition (ICDAR '97), vol. 1, pp. 180–184, Ulm, Germany, August 1997. View at: Publisher Site  Google Scholar
 D. Guillevic and C. Y. Suen, “Recognition of legal amounts on bank cheques,” Pattern Analysis and Applications, vol. 1, no. 1, pp. 28–41, 1998. View at: Publisher Site  Google Scholar
 A. Amin and W. Mansoor, “Recognition of printed Arabic text using neural networks,” in Proceedings of the 4th International Conference on Document Analysis and Recognition (ICDAR '79), pp. 612–615, Ulm, Germany, August 1997. View at: Google Scholar
 E. A. Fadhel and P. Bhattacharyya, “Application of a steerable wavelet transform using neural network for signature verification,” Pattern Analysis and Applications, vol. 2, no. 2, pp. 184–195, 1999. View at: Publisher Site  Google Scholar
 M. S. Khorsheed, “Offline recognition of omnifont Arabic text using the HMM ToolKit (HTK),” Pattern Recognition Letters, vol. 28, no. 12, pp. 1563–1571, 2007. View at: Publisher Site  Google Scholar
 J. H. AlKhateeb, J. Ren, J. Jiang, and S. Ipson, “A machine learning approach for classifying offline handwritten Arabic words,” in Proceedings of the International Conference on CyberWorlds (CW '09), pp. 219–223, Bradford, UK, September 2009. View at: Publisher Site  Google Scholar
 M. Albakoor, K. Saeed, and F. Sukkar, “Intelligent system for arabic character recognition,” in Proceedings of the World Congress on Nature & Biologically Inspired Computing (NABIC '09), pp. 982–987, Coimbatore, India, December 2009. View at: Publisher Site  Google Scholar
 M. S. Khorsheed, “Offline Arabic character recognition—a review,” Pattern Analysis and Applications, vol. 5, no. 1, pp. 31–45, 2002. View at: Publisher Site  Google Scholar  MathSciNet
 J. Parker, Algorithms for Image Processing and Computer Vision, John Wiley & Sons, 1997.
 J. Simon, “Offline cursive word recognition,” Proceedings of the IEEE, vol. 80, no. 7, pp. 1150–1161, 1992. View at: Publisher Site  Google Scholar
 H. Goraine and M. Usher, “Printed arabic text recognition,” in Proceedings of the 4th International Conference and Exhibition on MultiLingual Computing, Cambridge, UK, 1994. View at: Google Scholar
 M. S. Khorsheed and W. F. Clocksin, “Structural features of cursive Arabic script,” in Proceedings of the 10th British Machine Vision Conference (BMVC '99), vol. 2, pp. 422–431, Nottingham, UK, September 1999. View at: Google Scholar
 A. Amin, “Recognition of printed arabic text using machine learning,” in International Society for Optical Engineers: Document Recognition V, vol. 3305 of Proceedings of SPIE, pp. 63–70, 1998. View at: Google Scholar
 A. Benouareth, A. Ennaji, and M. Sellami, “Semicontinuous HMMs with explicit state duration for unconstrained Arabic word modeling and recognition,” Pattern Recognition Letters, vol. 29, no. 12, pp. 1742–1752, 2008. View at: Publisher Site  Google Scholar
 I. Bazzi, R. Schwartz, and J. Makhoul, “An omnifont openvocabulary OCR system for English and Arabic,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 21, no. 6, pp. 495–504, 1999. View at: Publisher Site  Google Scholar
 M. Fehri and M. Ahmed, “An optical font recognising method for arabic texts,” in Proceedings of the 6th International Conference and Exhibition on MultiLingual Computing, pp. 5.15.1–5.15.7, Cambridge, UK, 1998. View at: Google Scholar
 M. Hu, “Visual pattern recognition by moment invariants,” IRE Transactions on Information Theory, vol. 8, no. 2, pp. 179–187, 1962. View at: Publisher Site  Google Scholar
 F. ElKhaly and M. A. SidAhmed, “Machine recognition of optically captured machine printed arabic text,” Pattern Recognition, vol. 23, no. 11, pp. 1207–1214, 1990. View at: Publisher Site  Google Scholar
 S. A. Mahmoud, “Arabic character recognition using fourier descriptors and character contour encoding,” Pattern Recognition, vol. 27, no. 6, pp. 815–824, 1994. View at: Publisher Site  Google Scholar
 M. S. Khorsheed and W. F. Clocksin, “Multifont arabic word recognition using spectral features,” in Proceedings of the 15th International Conference on Pattern Recognition (ICPR '00), vol. 4, pp. 543–546, Barcelona, Spain, 2000. View at: Google Scholar
 H. Freeman, “On the encoding of arbitrary geometric configurations,” IRE Transactions on Electronic Computers, vol. 10, no. 2, pp. 260–268, 1961. View at: Publisher Site  Google Scholar
 A. Amin and J. F. Mari, “Machine recognition and correction of printed Arabic text,” IEEE Transactions on Systems, Man and Cybernetics, vol. 19, no. 5, pp. 1300–1305, 1989. View at: Publisher Site  Google Scholar
 Z. Osman, L. Hamandi, R. Zantout, and F. N. Sibai, “Automatic processing of arabic text,” in Proceedings of the International Conference on Innovations in Information Technology (IIT '09), pp. 140–144, December 2009. View at: Publisher Site  Google Scholar
 Y. M. Alginahi and A. A. Siddiqi, “A proposed hybrid OCR system for Arabic and Indian numerical postal codes,” in Proceedings of the International Conference on Computer Technology and Development (ICCTD '09), pp. 400–404, November 2009. View at: Publisher Site  Google Scholar
 K. N. Mutter, M. Z. M. Jafri, and A. A. Aziz, “Real time object detection using Hopfield neural network for Arabic printed letter recognition,” in Proceedings of the 10th International Conference on Information Sciences, Signal Processing and Their Applications (ISSPA '10), pp. 770–773, Kuala Lumpur, Malaysia, May 2010. View at: Publisher Site  Google Scholar
 L. Baccour and A. M. Alimi, “A comparison of some intuitionistic fuzzy similarity measures applied to handwritten Arabic sentences recognition,” in Proceedings of the IEEE International Conference on Fuzzy Systems (FUZZIEEE '09), pp. 1389–1392, Jeju Island, Republic of korea, August 2009. View at: Publisher Site  Google Scholar
 H. Aljuaid, D. Mohamad, and M. Sarfraz, “Arabic handwriting recognition using projection profile and genetic approach,” in Proceedings of the 5th International Conference on Signal Image Technology and Internet Based Systems (SITIS '09), pp. 118–125, December 2009. View at: Publisher Site  Google Scholar
 L. Rabiner and B.H. Juang, Fundamentals of Speech Recognition, Prentice Hall, 1993.
 F. Biadsy, J. ElSana, and N. Habash, “Online Arabic handwriting recognition using hidden Markov models,” in Proceedings of the 10th International Workshop on Frontiers of Handwriting and Recognition, 2006. View at: Google Scholar
 J. H. Alkhateeb, J. Ren, J. Jiang, and H. AlMuhtaseb, “Offline handwritten Arabic cursive text recognition using Hidden Markov Models and reranking,” Pattern Recognition Letters, vol. 32, no. 8, pp. 1081–1088, 2011. View at: Publisher Site  Google Scholar
 S. Young, G. Evermann, M. J. F. Gales et al., The HTK Book, Cambridge University Engineering Department, Cambridge, UK, 2001.
 R. M. Gray, “Vector quantization,” IEEE Acoustics, Speech and Signal Processing Magazine, vol. 1, no. 2, pp. 4–29, 1984. View at: Google Scholar
 M. S. Khorsheed, H. K. AlOmari, K. M. Alfaifi, and K. M. Alhazmi, “System and Methods for Arabic Text Recognition Based on Effective Arabic Text Feature Extraction,” United States Patent 8111911, 2012. View at: Google Scholar
Copyright
Copyright © 2015 Mohammad S. Khorsheed. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.