This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Document Image Binarization Based on Texture Features
May 1997 (vol. 19 no. 5)
pp. 540-544

Abstract—Binarization has been difficult for document images with poor contrast, strong noise, complex patterns, and/or variable modalities in gray-scale histograms. We developed a texture feature based thresholding algorithm to address this problem. Our algorithm consists of three steps: 1) Candidate thresholds are produced through iterative use of Otsu's algorithm; 2) Texture features associated with each candidate threshold are extracted from the run-length histogram of the accordingly binarized image; 3) The optimal threshold is selected so that desirable document texture features are preserved. Experiments with 9,000 machine printed address blocks from an unconstrained U.S. mail stream demonstrated that over 99.6 percent of the images were successfully binarized by the new thresholding method, appreciably better than those obtained by typical existing thresholding techniques. Also, a system run with 500 troublesome mail address blocks showed that an 8.1 percent higher character recognition rate was achieved with our algorithm as compared with Otsu's algorithm.

[1] F. Albregtsen, "Nonparametric Histogram Thresholding Methods—Error Versus Relative Object Area," Proc. Eighth Scandinavian Conf. Image Analysis, pp. 273-280,Tromso, Norway, 1993.
[2] E. Giuliano, O. Paitra, and L. Stringa, "Electronic Character Reading System," U.S. Patent 4,047,15, 1977.
[3] G. Johannsen and J. Bille, "A Threshold Selection Method Using Information Measures," Proc. Sixth Int'l Conf. Pattern Recognition, pp. 140-143,Munich, West Germany, 1982.
[4] J.N. Kapur, P.K. Sahoo, and A.K.C. Wong, "A New Method for Gray-Level Picture Thresholding Using the Entropy of the Histogram," Computer Vision, Graphics, and Image Processing, vol. 29, pp. 273-285, 1985.
[5] J. Kittler and J. Illingworth, "On Threshold Selection Using Clustering Criteria," IEEE Trans. Systems, Man, and Cybernetics, vol. 15, pp. 652-655, 1985.
[6] S.U. Lee and S.Y. Chung, "A Comparative Performance Study of Several Global Thresholding Techniques for Segmentation," Computer Vision, Graphics, and Image Processing, vol. 52, pp. 171-190, 1990.
[7] Y. Liu, Document Image Binarization Based on Texture Analysis. PhD thesis, Dept. of Elec. Computer Eng., SUNY/Buffalo, 1995.
[8] Y. Liu, R. Fenrich, and S.N. Srihari, "An Object Attribute Thresholding Algorithm for Document Image Binarization," Proc. Second Int'l Conf. Document Analysis and Recognition, pp. 278-281,Tsukuba Science City, Japan, 1993.
[9] D. Marr, Vision.San Francisco: W.H. Freeman, 1982.
[10] N. Otsu, "A Threshold Selection Method from Gray-Scale Histogram," IEEE Trans. Systems, Man, and Cybernetics, vol. 8, pp. 62-66, 1978.
[11] P.W. Palumbo, P. Swaminathan, and S.N. Srihari, "Document Image Binarization: Evaluation of Algorithms," Proc. SPIE, vol. 697, pp. 278-285, 1986.
[12] P.K. Sahoo, S. Soltani, and A.K.C. Wong, "A Survey of Thresholding Techniques," Computer Vision, Graphics, and Image Processing, vol. 41, pp. 233-260, 1988.
[13] O.D. Trier and A.K. Jain, "Goal-Directed Evaluation of Binarization Methods," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 17, pp. 1,191-1,201, 1995.
[14] W. Tsai, "Moment-Preserving Thresholding: A New Approach," Computer Vision, Graphics, and Image Processing, vol. 29, pp. 377-393, 1985.
[15] J.S. Weszka and A. Rosenfield, "Threshold Evaluation Techniques," IEEE Trans. Systems, Man, and Cybernetics, vol. 8, pp. 622-629, 1978.
[16] J.M. White and G.D. Rohrer, "Image Thresholding for Character Image Extraction and Other Applications Requiring Character Image Extraction," IBM J. Research and Development, vol. 27, pp. 400-411, 1983.

Index Terms:
Image processing, document images, thresholding, texture analysis.
Citation:
Ying Liu, Sargur N. Srihari, "Document Image Binarization Based on Texture Features," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, no. 5, pp. 540-544, May 1997, doi:10.1109/34.589217
Usage of this product signifies your acceptance of the Terms of Use.