skip to main content
10.1145/3507473.3507484acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicsedConference Proceedingsconference-collections
research-article

Research on Key Information Recognition System Based on Bayesian Classification

Authors Info & Claims
Published:13 February 2022Publication History

ABSTRACT

In order to improve the efficiency of image content retrieval, combined with computer vision technology, an intelligent key information detection and recognition system applied to images is proposed. The system is divided into four parts: positioning the text area, detecting key information, recognizing key information and broadcasting voice. Firstly, the image is preprocessed to obtain a clear binary image. Secondly, the dynamic line segmentation algorithm is used to obtain the candidate text areas of the image, and the non-text areas are filtered out with the revelatory rule. Then, the Bayesian classification algorithm is used to discriminate the candidate text region to obtain the key information. Finally, the image of key information is converted into editable text through Optical Character Recognition technology, and the text is converted into speech using text-to-speech conversion technology. The experimental results show that the recognition system of key information is simple and efficient, and the classification accuracy is good, which is suitable for image key information recognition.

References

  1. Zhong Y, Karu K, Jain A K, “Locating text in complex color images,” in Proceedings of the IEEE International Conference on Document Analysis and Recognition, Quebec, Montreal ,1995, vol. 1, pp. 146- 149.Google ScholarGoogle Scholar
  2. Cai Bo, Zhou Dongru, Hu Hongbin, “Research and implementation of subkey information detection and extraction in digital video,”J. Journal of Computer-Aided Design & Computer Graphics, vol. 15, no. 7, pp. 898-903, 2003.Google ScholarGoogle Scholar
  3. Li M, Wang C, “An adaptive text detection approach in images and video frames,”in Proceedings of the IEEE International Joint Conference on Neural Networks,Hong Kong, China,2008, vol. 1, pp. 72-77.Google ScholarGoogle Scholar
  4. Epshtein B, Ofek E, Wexler Y, “Detecting text in natural scenes with stroke width transform,”in Proceedings of the IEEE Computer Vision and Pattern Recognition, San Francisco, CA, USA, 2010, vol. 1, pp. 2963-2970.Google ScholarGoogle Scholar
  5. Neumann L, Matas J, “ A Method for Text Localization and Recognition in Real-World Images,” in Proceedings of the IEEE Computer Vision, Queenstown, New Zealand, 2010, vol. 1, pp. 770- 783.Google ScholarGoogle Scholar
  6. Liu Shuqin, “ Image feature extraction method and its application,” Ph.D. dissertation, Dept. Elect. Eng, Northwest Univ, Xi'an, Shaanxi ProvinceGoogle ScholarGoogle Scholar
  7. Vladimir Kozoderov,Timofei Kondranin,Egor Dmitriev,Vladimir Kamentsev, “Bayesian classifier applications of airborne hyperspectral imagery processing for forested areas,”J. Advances in Space Research,vol.55, no.11, pp. 2657-2667, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  8. Wang Chunfeng, Zhang Yonghong, “Bayesian network structure learning method based on unconstrained optimization and genetic algorithm,” J .Control and Decision, vol. 28, no. 4, pp. 618-622, 2013.Google ScholarGoogle Scholar
  9. Zhang Xinyu, “Bayesian Maximum Likelihood Estimation for Combination Forecasting,” J .Forecasting, no.5, pp. 48-68, 1998.Google ScholarGoogle Scholar
  10. Larrañaga P, Karshenas H, Bielza C, , “ A review on evolutionary algorithms in Bayesian network learning and inference tasks,”J. Information Sciences, vol. 233, no. 2, pp. 109-125, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Jiang Hongyi, Zhu Liping, Ou Zhangpeng, “ Text recognition of natural scene images based on MSER and Tesseract,” J. Computer Knowledge and Technology, vol. 13, no. 33, pp. 213-216, 2017.Google ScholarGoogle Scholar
  12. Bi Xiaojun, Jing Guangyu, Xu Xianfeng, “Speech synthesis of text files using TTS technology,” J. Automation Technology and Application, vol. 23, no. 9, pp. 49-51, 2004.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICSED '21: Proceedings of the 2021 3rd International Conference on Software Engineering and Development
    November 2021
    75 pages
    ISBN:9781450385213
    DOI:10.1145/3507473

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 13 February 2022

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)7
    • Downloads (Last 6 weeks)1

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format