Top Banner
Pattern Recognition Pergamon Press 1973.Vol. 5, lap.303-321. Printedin Great Britain Machine Recognition of Printed Chinese Characters Via Transformation Algorithms PAUL P. WANG and ROBERT C. SHIAU Department of Electrical Engineering, School of Engineering, Duke University, Durham, N. Carolina 27706, U.S.A. Abstract--This paper presents some novel results concerning the recognition of single-font printed Chinese characters via the transformation algorithms of Fourier, Hadaraard, and Rapid. The new design philosophy of a three-stage structure is believed to offer at least a suboptimal search strategy for recognizing printed Chinese characters with a dictionary of 7000-8000 characters. The transformation algorithms discussed in this paper will be used in the last two stages. Extensive experiments and simulations concerning feature extraction and noisy or abnormal pattern recognition have been carded out (the simulations have been restricted to a 63-character subset called "Radicals"). Comparison has been made of all three transforms according to their ability to recog- nize characters. Chinese ideographs Pattern recognition Optical character reader Classification Fourier transform Hadamard transform Rapid transform Topological property I. INTRODUCTION THE URGENT demand of machine translation of Chinese is easily recognized and has been well-documented.(1) The Indo-Chinese group of nations, with a population of about 850 million, is currently publishing about 3 billion words a year. Considerably less than l per cent of this vast output is being translated and republished in English, French or German. (2) Automatic translation is necessary because human translators cannot handle the volume and because it is extremely expensive to train highly skilled translators. It is impossible within the scope of this paper to discuss the difficulties involved in building a successful automatic translation machine. However, the value of utilizing a digital computer in handling Chinese characters is clear even for those applications with only a limited objective. Previous attempts have demonstrated that some systems already developed can be used in performing various tasks. (3-I~) For instance, the accumulated research efforts in Japan concerning similar problems have been neatly summarized in a special issue of the Journal of Fu~rrsu ts) which dealt with the matter of KANn infor- mation processing. But it is accurate to say that the progress in KANJI research does not necessarily apply to the problem of Chinese ideographs. The utilization of digital computers in processing Chinese characters is not the only problem of the hardware system-design. There are some very fundamental questions which must be answered before an optimal and successful system can be designed. For example, there is the problem of the analysis of the characters themselves in terms of structure, grammar (~2-1~) or topological properties. (9) It is rather surprising that even today there exists no good method of forming a lexicographical ordering of Chinese ideographs for a complete dictionary. This problem is closely related to the problem of * Supported by Duke University Research Council Regular Grant 453-3209-6032-22302. 303
19

Machine recognition of printed Chinese characters via transformation algorithms

Apr 22, 2023

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Machine recognition of printed Chinese characters via transformation algorithms

Pattern Recognition Pergamon Press 1973. Vol. 5, lap. 303-321. Printed in Great Britain

Machine Recognition of Printed Chinese Characters Via Transformation Algorithms

P A U L P. W A N G a n d R O B E R T C. S H I A U

Department of Electrical Engineering, School of Engineering, Duke University, Durham, N. Carolina 27706, U.S.A.

Abstract--This paper presents some novel results concerning the recognition of single-font printed Chinese characters via the transformation algorithms of Fourier, Hadaraard, and Rapid. The new design philosophy of a three-stage structure is believed to offer at least a suboptimal search strategy for recognizing printed Chinese characters with a dictionary of 7000-8000 characters. The transformation algorithms discussed in this paper will be used in the last two stages. Extensive experiments and simulations concerning feature extraction and noisy or abnormal pattern recognition have been carded out (the simulations have been restricted to a 63-character subset called "Radicals"). Comparison has been made of all three transforms according to their ability to recog- nize characters.

Chinese ideographs Pattern recognition Optical character reader Classification Fourier transform Hadamard transform Rapid transform Topological property

I. INTRODUCTION

THE URGENT demand of machine translation of Chinese is easily recognized and has been well-documented. (1) The Indo-Chinese group of nations, with a population of about 850 million, is currently publishing about 3 billion words a year. Considerably less than l per cent of this vast output is being translated and republished in English, French or German. (2) Automatic translation is necessary because human translators cannot handle the volume and because it is extremely expensive to train highly skilled translators. It is impossible within the scope of this paper to discuss the difficulties involved in building a successful automatic translation machine. However, the value of utilizing a digital computer in handling Chinese characters is clear even for those applications with only a limited objective. Previous attempts have demonstrated that some systems already developed can be used in performing various tasks. (3-I~) For instance, the accumulated research efforts in Japan concerning similar problems have been neatly summarized in a special issue of the Journal of Fu~rrsu ts) which dealt with the matter of KANn infor- mation processing. But it is accurate to say that the progress in KANJI research does not necessarily apply to the problem of Chinese ideographs.

The utilization of digital computers in processing Chinese characters is not the only problem of the hardware system-design. There are some very fundamental questions which must be answered before an optimal and successful system can be designed. For example, there is the problem of the analysis of the characters themselves in terms of structure, grammar (~2-1~) or topological properties. (9) It is rather surprising that even today there exists no good method of forming a lexicographical ordering of Chinese ideographs for a complete dictionary. This problem is closely related to the problem of

* Supported by Duke University Research Council Regular Grant 453-3209-6032-22302.

303

Page 2: Machine recognition of printed Chinese characters via transformation algorithms

304 PAUL P. WANO and ROBERT C. SHIAU

encoding and decoding Chinese characters, and there are some efforts already being undertaken in this direction. ~9"18-22~ So far, there are two quite distinct directions of research concerning the recognition of Chinese characters by use of digital computers. STALLINGS has used a computer to analyze and describe the Chinese characters ;~2~.z2~ the result of his research was a code for each character. CASEY and NAGY t24J take a somewhat different approach to solve the problem. They propose a two-stage masking process in which a "group mask" is used for the first stage and an "individual mask" for the second stage in recognizing single-font printed ideographs.

This paper proposes a novel three-stage recognition process in which the first stage is similar but entirely unrelated to the approach of STALLINGS, and in which the second and third stages solve the same problem proposed by CASEV and NAGY, ~24) but by means of a distinctly different approach.

The details of WANG'S three-stage recognition scheme, which is believed to offer at least suboptimality in terms of the necessary hardware implementation, search strategy and other considerations, can be found in Reference (9). This problem can and should be viewed as a multi-category application problem in which optimality in searching strategy becomes of paramount importance. BLEDSOE raises in his review an extremely relevant question concerning the design philosophy of the system of this nature, ~25~ " . . . Is the selection of two stages in recognition the best choice? Why not three or fifty?... "

The 63 subpatterns of Chinese characters chosen for our subject of investigation represent 63 standard radicals located on the left side of the character, If one adds the principal parts of the ideographs on the right, then the whole character is complete. The subset comprising the "left side radicals" can be identified if the character successfully passes the "completely vertical separability test" in the first stage of recognition. Hence, we are selecting a subset of the second stage for our experiment. We believe that a subset of 63 radicals (the average number of members in a second-stage subset) is sufficient to bring out the essential nature of this multiple-category problem.

II. RECOGNITION SYSTEM MODEL

The brief description of a general pattern-recognition system is shown in Fig. 1. It contains the following sub-systems:

• _1 I co o,ios S g n a s J : Feotures-j Classifier j orClasses

I , I °

FIG. 1. Basic diagram of a recognition machine.

Page 3: Machine recognition of printed Chinese characters via transformation algorithms

Machine recognition Of printed Chinese characters via transformation algorithms 305

(A) Receptor. The receptor accepts the physical character and then transduces it into a measurable matrix. For example, the IBM 1287 or 1288 t26~ divides a visual pattern into small elements and produces an M x N matrix over the binary field; the element becomes 1 or 0 depending upon whether it is black or white. Physically, the machine can be pro- grammed to scan in 0.125 in. intervals over a rectangular area of 4.25 in. × 6 in. Hence a matrix of the maximum dimension 34 x 48 can be achieved. Since this useful machine was not available for our research project, all 63 radicals, taken from a standard Chinese dictionary, ~27~ have been carefully transduced by hand; some sample radicals (27 out of 63) are presented in Fig. 2. Each radical, contained within a matrix of 32 × 16, represents a noiseless pattern.

(B) Preprocessor. The preprocessor is also called a "feature extractor." The con- ventional transformation techniques, such as the two-dimensional Fourier transform, the Hadamard transform, and the Rapid transform have been used with success in various circumstances in recognizing handwritten English letters or Arabic numerals. We shall use these techniques in recognizing Chinese characters.

In a sense, the preprocessor extracts a secondary pattern or feature vector from the measurement vector; we hope to obtain such a feature vector by using one of these trans- formations. The real question is how to extract a subset of "good features" from a larger set of 512 elements (32 x 16). We are proposing that the criterion of "goodness" be judged by its amplitude distribution and its frequency of appearance. As it turns out, this criterion of selection is best for the recognition of printed Chinese characters.

It is generally true that the increase of the number of features will improve the rate of recognition. However, it is also true that the complexity and size of the classifier will increase. Optimality, of course, is normally achieved by taking these trade-offs into con- sideration.

As the result of our findings, the best scheme is to choose features according to the ordering of their "standard deviations." The standard deviation reflects to a larger degree the width and uniformity of the frequency distribution of a potential feature candidate. We shall describe all these in detail in a later section, including the comparison of three transformations.

(C) Classifier. For a general pattern-recognition system, the classifier discriminates each pattern and assigns a category to it by some decision rule. The norm of "minimum- distance-to-mean" is a well known and popular classifier t28~ because it minimizes a con- ditional average loss for probabilistic patterns. The distance function or the norm is

N d(X,M) = IIX-MII -- (X-M)t (X-M) = ~ (x~-m~) 2 (1)

j = l

where X, N x 1, is the feature vector and M, also N x 1, is the mean feature vector (or, prototype feature vector, the transformed standard mask in our case) for the same category. However, the above norm is not entirely satisfactory.

SEBESTYEN ~3°~ modifies it by multiplying a weighting coefficient to each feature com- ponent, thereby improving the clustering:

N d~X, Mi) = ~ [wj(xj--mij)] 2, where i = 1, 2 . . . . . M. (2)

j = l

Page 4: Machine recognition of printed Chinese characters via transformation algorithms

306 PAUL P. WANG and ROBERT C. SmAU

, / j . ,lol,/lfl-itl-l-l-i-/,l'-]- . . . . . . . . . . . sl+t I J I'II l+ 'IBll I r If I I I " " " Iml '~ QI~I+ . I I I °1"1~" • I I I I I I I I I I I I I I I I I . I l l l i I I I I . I I I I I I I I I I I I 1 1 1 1 I I I I I Jol I l I I I I I [ +I ! I I I

: " 'I " " " I ' " I I I I I I I I i i i l I I I I

" ' - ' " " !l = " l i t l i

:1 L:- - tlil +" '"';= " " "l - - I I u l I I 1 I II I I I I .+ II ' " + +"' IIII t_~ II " I I +l I I I I I 1 ~I I I 4rl I I Jill ~I IIIII II +- I I

~] il IIII I 4 III III II I I ~I I iIllll , , , , i i i I I I fll II I ! I

qrll II IIII I lllll II +tl I III111

"~' ' ' fill " ' '"" " "~ ' +'" m~III II +If I IIIII II +.I J ! IIIIII ~II II I IIIl ,Ill I IIIII II ~ I I Iill

"" " Fill., "~ ' '"'* " ~' " ' "'"'

NIII I lllIi I~ ~ I I I I I I ILl.If

• a l l + + t , l + ' l . " i t l + ' . . ~ , + + . ~ P ~ , * ~ ,.~+el+.lel1,1iPltl~..l+,.l.m41~-i 4, aj++e+l . p p ~ , . . R ~ + ~ ' p + . " P III a l l IIIIII II I I =I I III III

+I Ill 11 Ill • I I Ill

~I I I I l, iI "l'l li Iii llllli 4; I I II I II I I i I I

• --- i 1 t ' ' - " -" * -,';' I i " :' - ' " " " i l E '-"

I ° 1 I ; ' ~ I . , , ~ n

I I.~ I I---, I , , i I IllIlll II

I - I II III II I IIIIII I! I II

.~II II I II NI I II I I +~II I I I l ~ II II [ II I

+W I i l II .~II II l

l~! I I I I I l [ I I +I I I I I I I I I q l l I I I I +~I I +ai<l I I I I I I .u l I I I I apI I -'JPI I I I I l l I l l ~ p I I I I I I ~I I ! b l I I I I I I I .bl I I I I " ' " ' " " " ! ~ I "' ' " ' .I~.I I f J ~ l l I I I I ~. I I I I III I ..~I ~I I [ I I I I s , l I I I I Id131 ~I I I I'~kl m,I I I I I I I I II,~.I ~ I I I IV

I I "~ . . . . . ++" :II lllllllIIl ,,

I I I l l l l l l l l I I I I + I I I I I I I f i i I I r f l l i l i l i l I I I

I I

; 1 1 I I I ' ~ ~ 1 1 llllllllIl .If iJliilll I

" l i l l l i ~ " . I 1

~ +-'1 " n i

f

. . ~ I I I I

Z ,~1 '

+ ~ I I 0

Page 5: Machine recognition of printed Chinese characters via transformation algorithms

J-l-l

-lJ

I t

t I

I I

t i

f i

I

J !

I [

! ,I

( (

( (

I [

( I

r't~|

L~ll

1 | |

r~'~

rT-T

-r~-

[i i

i i

1 i

1.~.

1 J

i. i

[ i

] ]

] i

| i

]7-i

L~I~

~

ITl~

r~l-r

~ -]

]

~

" T~

-T~

- ~-

~L~

_~LI

-~_]

i

i ~

7]

~-

....

i -

~ ~

l_

jl/ll

m ii1

Hi

11

1111

t ill

i

" I

O

~l~t

-ki-

iq-t

t-t-

t-~

-~

-i-H

t+tm

4:l~

~

7 ~

-~,~

-~-~

-,-,

,,,,

,,

° |..

I._.L

~_L~

_J

I I

I] I

I I

I I

! I~

!...t.

_.~.

,.~..~

.-~l

~_,~

411.

~,~,

kllli

.~,~

,~,~

ll,~,

'~l,.

i.~..

NII~

..,

,,~

~,~.

ali~

llii.~

.~,~

.~lli

..~,~

,"I

.

k,-I,.,

.J~

L t

i ~

I I

i I

| I~

.__~

1 l-H

-H-l-

i H

~ i

i i

i i

i~-

] "

~ ii

iL.~

]TTF

r-

I I-i

i

t I

I-[-

I-

i _.1

_.1 i

! !1

i

[li

i i

i1~

I1+t

-I,

III

~ '

- .

..

..

..

..

..

.

zl::l

::l"

-~

, -

~ ~-

~

-L] tl

l~

i

- ~-

17

~-11

-I

I !1

li

! I

i+l

~,

i-t ~

~-

""

' "

~ ~i

~ "~

'"'"

'""°

'"'

....

....

.

+-,

+ 1

:

t ]

I i

1 i

~ 3"7

_1

Page 6: Machine recognition of printed Chinese characters via transformation algorithms

308 PAUL P. W ~ O and ROBERT C. SHIAU

~i_J -'. ,p ' - , , - - ~.-.m" i , s , r ~ ~ .e t ~ . . ~ r~ , •

: : II m i l k l I i l l F ) j n ., )imFlmllln

.,.,ii, : )~ITm,ml) "

i mmnmmmm mmmmmmm mn ,( ~ , mm mmm

mmmmmmmmmummmmmn .~_j_ ~ i mmmu mimmm ) I '-j I mnm~m • • m

' ' - i iz ,! ) ) '

.fF )( I ) k

-i~ -L- i ) : H - :

: ' i i i i i

.J-l- : : i [ i i f ~H

: : ' ,FI l I I I I iiiii I , , ;

mm m

FIG. 2. The subset o f 63 radicals used in the computer s imulat ion experiments.

Page 7: Machine recognition of printed Chinese characters via transformation algorithms

Machine recognition of printed Chinese characters via transformation algorithms 309

For example, we may choose wj to be inversely proportional to the standard deviation of the ensemble along the jth feature coordinate, i.e. wj = 1/trj.

(D) Memory. The memory unit learns the a priori knowledge of each category before the machine can be used to make any decision. Asymptotically, the sample mean turns out to be the "best" statistic if the number of samples is large enough. For our experiments, simulated on IBM 360/75, the sample mean of each pattern is assumed to be the same as those radicals duplicated from the Chinese dictionary.

III. TRANSFORMATION ALGORITHMS

We shall discuss in this section only some peculiar characteristics of these algorithms which are relevant to our recognition system. Well-known facts about these transforms will not be duplicated here.

(A) Two-dimensional Fourier transform. The Fourier transform has a long history of application in solving pattern-recognition and image-processing problems. The general procedure is to look at the magnitude spectrum of the measurement vector and then choose as the features in an n-dimensional Euclidean space the strong amplitude of those frequency components. One of the most attractive properties of the transform is its ability to recog- nize the position-shifted patterns since it observes the magnitude spectrum and ignores the phase. It is well-recognized that the precision of center-location is a problem for the scanner, and it is anticipated that it will also be a problem for identifying printed Chinese characters.

(B) Hadamard transform. This technique should be more acceptable in high-speed processing since the arithmetic computation involves only addition and subtraction. The major drawback of application of this technique in pattern recognition is that its per- formance depends too heavily upon the position of the pattern.

(C) Rapid transform. The operations of the Rapid transform are the same as those of the Hadamard transform except for the absolute value operation, which may be credited with the elimination of the previously mentioned position-shifting problemJ 29~ The R-transform possess all the advantages of both the F-transform and the H-transform, but it also has disadvantages when applied to the problem of recognizing printed Chinese characters. Assuming that the pattern is represented as a one-dimensional N x 1 vector, then the R-transform requires log2 N layers, as many as the F-transform (Fig. 3). However, the processing of each layer requires only N x 4 addition, as opposed to the F-transform's N x 4 multiplications (equivalent to 400 N additions). Hence the ratio of computer time is approximately 100/log2 N. For 21 ~ 21° components, it is possible to save 100-10 times the computation cost by employing the R-transform. The R-transform also possesses the very attractive property of being invariant with respect to the slight rotation of the pattern.

IV. COMPUTER SIMULATIONS AND PERFORMANCE EVALUATIONS

The subsets of 63 printed Chinese radicals (Fig. 2) are quantized by punching 0s and ls on data cards. The programs, written in FORTRAN-IV, encode each radical in a 32 x 16 binary array and are then executed in the IBM 360/75 computer. Assuming that all the

Page 8: Machine recognition of printed Chinese characters via transformation algorithms

1st Loyer 2nd Layer

310 PAUL P. WA,'qO and ROBERT C. SHIAU

FIG. 3. Tree-graph of Rapid transform for 4 input variables.

possible decision errors are weighted equally, the overall performance of the recognition system is appraised by the percentage of correct recognitions. The procedure for the major computer-simulation experiments can be described as follows:

Step I. The average characteristics of each radical are obtained through a learning process.

Step II. The simulated realistic pattern is generated by adding the noise (which is generated by a two-dimensional random-noise generator) to the "average radical" ob- tained from Step I.

Step III. Each scanned radical is transformed into frequency domain (feature space with the same dimension as the original pattern space) through F-, H- and R-Transfor- mations.

Step I V. The "good" features are selected from among the much larger set of potential candidates in the feature space.

Step V. The system classifies each pattern, using the minimum-distance-to-mean criterion.

Step VI. The percentage of correct recognitions is evaluated.

Following is a presentation of some specific details about the experiment itself. In Step II we generated realistic radical patterns such as the one shown in Fig. 4. Assuming that M~ is the learned average character from Step I or the prototype pattern of the ith radical, and that N is the additive noise (a function of two-dimensional coordinates ob- tained through a random-number generator), then the simulated realistic character is

Page 9: Machine recognition of printed Chinese characters via transformation algorithms

Machine recognition of printed Chinese characters via transformation algorithms 311

o000000000000000 0000000 0 & o 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o 0 0 0 0 ° 0 0:***°°°°°°00° I I I I : I ° , 0 ° I I : : I : ~

--O--~O-O"~O-O-O-O-O'O-~'~O-O-Oo000000000000000 -O-O-O'O~O-Og'O:O'O'O-O-O-O-O000 0 0 0 0 0 0 0 0 0 0 --0-0-0-0~0-0-000-00-~00000~1111110000 0 0 0 0 0 0 1 1 0 ~ O- O 0 0 0 1 t l l l l l l l O 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0

- - ~ - O ~ O I I ' O - O - O 0 - O - I - L - O " O ' O " - 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 - - - O ' O ' O - O - ~ - I - O - O ' O 0 - O - l l - O 0 0 - O 0 0 ° l l O 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 1 0 0 0 0 0 0 0 1 1 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 1 0 0 0

- " " ' ~ - - ~ - 0 - 1 - 1 - 0 - 0 - 0 - ~ 0 - ~ 1 - ~ 0 " 0 - - 0 " 0 " 0 - 0 0 " 0 0 - 0 0 0-0 0 0 0-0 0 ~ - - 0 ~ - 0 - 0 - 1 - - 1 - 0 - 0 0 0-0 ~ 1-0 0 O- O 0 0 0 1 1 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 O 0 0 0 1 1 0 0 0 0 0 l O 0 0 0 0 0 0 1 1 0 0 0 0 0 1 1 0 0 0 O 0 0 0 0 0 0 0 0 O O 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 1 0 0 0

- - 0 - - 0 - 0 " 0 - | ' | - 0 0 - 0 - 0 - 0 1 " 1 " 0 0 " 0 " 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 - - 0 - 0 0 - 0 - | - 1 - 0 0 - 0 " 0 " 0 I O 0 0 0 0 0 0 1 1 1 1 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 1 1 1 0 0 0

- -~ -O-O-O-I - I - -O 'O0- -O-O- ' I -Z- 'O-O-~ - U ' O - O 0 " O 0 - O 0"0 ~ - - 0 - 0 - 0 " - 0 - 1 - 1 " - 0 - 0 0 0 0 - 1 - 1 . 0 0 - 0 0 0 0 1 1 0 0 0 0 0 1 1 0 o o o o , ~ o o o o o , , o o ° ° o o o o o o o , o ° o o o L oooo , o : x ~

o o o o ~ , o o o o o , l o o o _~O°oo o o * : ~ X ~ o o o -o-°.o, ,0 0 1 1 0 - - ~ 0 ~ - ' 0 " 0 " 1 - 1 - 0 - 0 - 0 " 0 0 - 1 - 0 0 " 0 -

o o o o I I o o o o o I 1 o o o o o,o~OO 0 0 ° 0 ~ ~ 0ooo, ,ooooo, ,o ,~ o o o o ~ , 0 o o o o ~ , o o o ° ~ o o ~ ° o o o o o o o o o - o , o o , m o o , ~ X

- " " ~ - 0 - 0 - 0 - 1 - 1 - 1 - | - I - | ~ 1 - 1 - 1 - - 0 - 0 " 0 - " 0 0 - - 0 - 0 0 " 0 " 1 " I - | - | - 1 ~ 1 - 1 1 0 0 0 - oooo**ooooo**ooo o oooo ooooooooo o _ o , , o o o o o : : : : : o 0 0 0 o 0 o o o o 0 o o 0 o o o o 0 o o 0 o 0 0 0 0 o o 0 0 ~ o 0 0 0 ~ 0 0 o o

.... o o ~ o - o - o ' o " o - u - o ~ - o - ~ o - o o 0 0 - o 0 - 0 o 0 o 0 - 0 o o - - o - O - O ~ - o - o - o - o - o ~ - o o o 0 - o - o - 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o O o

- - - o - o - o - - o ~ - o - 0 - o - o ~ . o - o - - o - - o ~ - o - o - o o o o o o o o o o o o o-o o - ~ - - o - o o - - o - o - o - o - o - o o-o o-o o o o - o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o

- - o o o o o o o-o o o ~ o 'o o-o o " o 0 - o 0 0 0 o o o 0 o.o o o 0 - o - - ~ - o ~ - o - o - o - o - - o - o - o - - o - o o o - o - o - o o o o o o ~ o o o o o o o o o o o o o o o o o o o o o 0 o o o o o o o o o o o o o o o o o O o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o

Proto~pe Pattern Gaussi~ Noise Realistic Pattern

FIG. 4. Generating a realistic ~ d i ~ l ~ t ~ m .

Mi ~ N (the binary operator ~ will be defined later). Physically, the noise represents an improper printing process or the situation in which the machine noise in the recognition system distorts the pattern. We further assume that the noise for each cell is a Gaussian- distributed continuous gray level, independent of the two-dimensional coordinates. However, the Gaussian-distributed noise N(0, cr 2) is quantized by a "well" function, as shown in Fig. 5. If the noise for a specific cell (i, j) has a gray level greater than "1" or "black," it will be quantized into "1". In other words, every cell will eventually be classified either "1" or "0". We can conclude, therefore that the binary operation ~ mentioned above i m p l i e s : 0 ~ 0 = 0 , 0 ~ l = l , l ~ 0 = l , a n d l ~ l = 1.

We chose three transformation algorithms for Step III and were curious as to what each algorithm could do for this problem. The technique of F-transform is well known and has been widely applied. The FFT subroutine devised by Cooley and Tukey of M.I.T. was used in the simulation. The computer programs were written* forIBM 360/75, based upon the existing algorithms of the Hadamard transform (31) and the Rapid transform. (29) We have shown in Fig. 6 a sample of only the R-transform printout, as the other two transforms assume the similar format.

In Step IV, the task was to reduce the dimensionality of the feature space. The criterion of the feature selection has been described briefly in Section II. The histogram of the first 9 features obtained via Rapid transform with a sample size of 63 is presented in Fig. 7. Because the symmetrical property of the data set appeared in the frequency domain, we have narrowed the choice for features to 128 (16 x 8). The standard deviations for F-, H- and R-transforms are also presented in Tables 1-3 respectively. Eight "good features,"

* As this presentation is rather abbreviated, the interested reader may write to Dr. Wang at Duke University for further information.

Page 10: Machine recognition of printed Chinese characters via transformation algorithms

312 PAUL P. WANO and ROBERT C. SHIAU

, , p ( A )

Black Level Block Level

i ' l I | I I I I I :'o

!

: %%

le,, ~ ~ ,.., . , . . ,B =0 .36 - " ' " " " " " " ' ~A

- I '1 (Amp l i t u t t e of Noise)

L , - -Wh i te L e v e l - ~

FIG. 5. Quantizing the continuous Oaussian gray level into two levels.

selected according to the larger ordering of the numerical values and the uniformity dis- tribution in the histograms, are circled in Tables 1-'3.

This criterion is certainly not the only one that we have explored. The performance of several others did not meet our expectations, but we do want to mention specifically two methods which are believed to be at least principally sound in comparison with the "standard deviations scheme."

0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 87. 3. 33. 33. 63. 3. 33. 3,3. 51. 33. 3. 3. 33. 27. 3. 3. 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 15, 3. 3. 3. 9. 3. 3. 3. 15. 3. 3. 3. 3. 9. 3. 3. 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 , 0 . 0 . 0 . 0 . 23. 3. 3. 3. 9. 3. 3. 3. 19. 3. 3. 3. 9. 3. 3. 3. 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 15. 3. 1. 1. 1. 3. 1. 1. 15. 1. 3. 3. 5. 1. 3. 3. 0 . 0 . 0 . 0 . 1 . 1 . 1 . 1 . 1 . 1 . 1 . 1 , 1 . 0 . 0 . 0 . 23. 3. 3. 3. 9. 3. 3. 3. 19. 3. 3. 3. 9. 3. 3. 3. 0 . 0 . 0 . 0 . 1 . 1 . 0 . 0 . 0 . 0 . 0 . 1 , 1 . 0 . 0 . 0 . 15. 3. 1. 1. 1. 3. 1. 1. 15. 1. 3. 3. 5. 1. 3. 3. 0 . 0 . 0 . 0 . 1 . 1 . 0 . 0 . 0 . 0 . 0 . 1 , 1 . 0 . 0 . 0 . 23. 3. 3. 3. 9. 3. 3. 3. 19. 3. 3. 3. 9. 3. 3. 3. 0 . 0 . 0 . 0 . 1 . 1 . 0 . 0 . 0 . 0 . 0 . 1 . 1 . 0 . 0 . 0 . 15. 3. 1. 1. 1. 3. 1. 1. 15. 1. 3. 3. 5. 1. 3. 3. 0 . 0 . 0 . 0 . 1 . 1 . 0 . 0 . 0 . 0 . 0 . 1 . 1 . 0 . 0 . 0 . 13. 1. 3. 3. 5. 1. 3, 3. 9. 3. 1. 1. 3. 3. 1. 1. 0 . 0 . 0 . 0 . 1 . 1 . 0 . 0 . 0 . 0 . 0 . 1 . 1 . 0 . 0 . 0 . 5. 1. 1. 1. 3. 1. 1. 1. 5. 1. 1. 1. 1. 1. 1. 1. 0 . 0 . 0 . 0 . 1 . 1 . 0 . 0 . 0 . 0 . 0 . 1 . 1 . 0 . 0 . 0 . 13. 1. 3. 3. 5. 1. 3, 3. 9. 3. 1. 1. 3. 3. 1. 1. 0 . 0 . 0 . 0 . 1 . 1 . 0 . 0 . 0 . 0 . 0 . 1 . 1 . 0 . 0 . 0 . 5. 1. 1. 1. 3. 1. 1, 1. 5. 1. 1. 1. 1. 1. 1. 1. 0 . 0 . 0 . 0 . 1 . 1 . 1 . 1 . 1 . 1 . 1 . 1 . 1 . 0 . 0 . 0 . 13. 1. 3. 3. 5. 1. 3. 3. 9. 3. 1. 1. 3. 3. 1. 1. 0 . 0 . 0 . 0 . 1 . 1 . 0 . 0 . 0 . 0 . 0 . 1 . 1 . 0 . 0 . 0 . 5. 1. 1. 1. 3. 1. 1, 1. 5. 1. 1. 1. 1. 1. 1. 1. 0 . 0 . 0 . 0 . 1 . 1 . 0 . 0 . 0 . 0 . 0 . 1 . 1 . 0 . 0 . 0 . R '1' 13. 1. 3. 3. 5. 1. 3. 3. 9. 3. 1. 1. 3. 3. 1. 1. 0 . 0 . 0 . 0 . 1 . 1 . 0 . 0 . 0 . 0 . 0 . 1 . 1 . 0 . 0 . 0 . " " ~ 5. 1. 1. 1. 3. 1. 1. 1. 5. 1. 1. 1. 1. 1. 1. 1. 0 . 0 . 0 . 0 . 1 . 1 . 0 . 0 . 0 . 0 . 0 . 1 . 1 . 0 . 0 . 0 . - 61. 1. 27. 27. 53. 1. 27. 27. 33. 27. 1. 1. 27. 25, 1. 1, 0 . 0 . 0 . 0 . 1 . 1 . 0 . 0 . 0 . 0 . 0 . 1 . 1 . 0 . 0 . 0 . 5. 1. 1. 1. 3. 1. 1. 1. 5. 1. 1. 1. 1. 3, 1. 1. 0 . 0 . 0 . 0 . 1 . 1 . 0 . 0 . 0 . 0 . 0 . 1 . 1 . 0 . 0 . 0 . 3. 1. 1. 1. 3. 1. 1, 1. 1. 1. 1. 1. 3. 1, 1. 1. 0 . 0 . 0 . 0 . 1 . 1 . 1 . 1 . 1 . 1 , 1 . 1 . 1 . 0 . 0 . 0 . 7. 3. 3. 3. 11. 1. 5. 5. 5. 5. 1. 1. 7. 5. 1. 1. 0 . 0 . 0 . 0 . 1 . 1 . 0 . 0 . 0 . 0 , 0 . 1 . z . 0 . 0 . 0 , z. 3. 1. z. 3. ] . z . 1. z. z. ] . 1. 3. z, 1. z. 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 7. 3. 3. 3. 11. 1. 5. 5. 5. 5. 1. 1. 7. 5, .l. 1. 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 , 0 . 0 . 0 . 0 . 0 . 0 . 1. 3. 1. 1. 3. 1. 1. 1. 1. 1. 1. 1. 3. 1, 1. 1. 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 , 0 . 0 . 0 . 0 . 0 . 0 . z3. z. 3. 3. 5. ].. 3. 3. 9. 3. 1. 1. 3. 3. z. z. 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 5. z. z. z. 3. z. 1. z. 5. z. z. z. z. z. z. z . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 13. Z. 3. 3. 5. Z. 3. 3. 9. 3. Z. 1. 3. 3. 1. 1. 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 , 0 . 0 . 0 . 0 . 0 . 0 . 5. ].. ].. 1. 3. z. z. 1. 5. ] . z. z. 1. z. ] . z. 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 , 0 . 0 . 0 . 0 , 0 . 0 . z3. z. 3. 3. 5. z. 3. 3. 9. 3. z. z . 3. 3. z . x . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 5. 1. 1. 1. 3. 1. 1. 1. 5. 1. 1. 1. 1. 1. 1. 1. 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . ] 3 . Z. 3. 3. 5. ] . 3. 3. 9. 3. Z. 1. 3. 3. Z. Z. 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . S . Z . Z. 1. 3. Z. Z. Z. S. 1. 1. Z. Z. Z. Z. Z.

FIG. 6. An example of the computer print-out for the Rapid transformation.

Page 11: Machine recognition of printed Chinese characters via transformation algorithms

Machine recognition of printed Chinese characters via transformation algorithms 3 1 3

30

2 0 R(O,O) R(OJ) R(O,2)

Ld 1 0 o o ----- ' ' , , , z 5 0 t 0 0 5 ~o 15 2 o 4 0 6 0 I..iJ I T

2 0 R(I ,O) R(1,1 ) R(1,2)

~) 0 ' 1""1 I [ I I I I I Z 5 0 1 0 0 5 10 15 2 0 4O 6O I..d D

2 0 R(2,0) R(2,1) R(2,21

10

0 rl I 1 ' . . . .

5 0 400 5 10 15 2 0 4 0 6 0

N U M E R I C A L V A L U E S OF T H E F E A T U R E S

FIG. 7. Histogram of the first 9 features obtained via Rapid transform.

The "standard deviation scheme" may be classified as one member of the family of techniques called "principle component analysis," because the decision is based on fewer but more relevant features. A quite distinct method, designated as the "least correlation scheme," was suggested to the authors by Professor Woodbury. Referring to Table 3, one observes that the R(0, 0) component yields the maximum tr. Hence, R(0, 0) is chosen as the first feature for the classifier. However, the second feature is selected according to the least coefficient of correlation between R(0, 0) and the other 127 candidates. Computa- tion results of Table 4 indicate that R(10, 6) is the component least correlated to R(0, 0). The third feature is then chosen according to the following criterion.

Third Feature = min{Irul + Ir2il- Irurzil} (3) i

where the data for r~i and r2i are available from Tables 4 and 5. For this problem, the answer is R(1, 5). It is believed this method is the best among known techniques.

Surprisingly, the performance of the recognition system fell considerably (see Fig. 8). As a result, another heuristic scheme, believed to have an expected performance somewhere

TABLE 1. STANDARD DEVIATIONS OF 128 POTENTIAL FEATURES VIA F-TRANSFORMATION

F 0 1 2 3 4 5 6 7

o 6 . ,

, . , 3 .24 .43.3.80 2 . 3 0

2 6.53 5.40 5.85 5.67 5.74 3.92 2.55 2.00

3 4.84 4.95 5.15 5.00 3.98 2.96 2.37 1.67

15 : : : : : ; : : i

Page 12: Machine recognition of printed Chinese characters via transformation algorithms

314 PAUL P. WANG and R O ~ T C. Sh'mU

TABLE 2. STANDARD DEVIATIONS OF ] 28 POTENTIAL FEATURI~ VIA H*TRANSFORMIATION

H 0 1 2 3 4 5 6 7

o 360 11.45

1 ~ 3.76 3.03 3.14 3.43 4.26 4.87 3.83

2 ~ 2.80 4.61 5.33 4.4 4.63 6.25 3.75

3 13.43 2.60 5.76 4.53 4.91 4.90 7.14 3.66

15 : : : : : : : :

TABLE 3. STANDARD DEVIATIONS OF 128 POTENTIAL FEATURES VIA R-TRANSFORMATION

R 0 1 2 3 4 5 6 7

0 2~____~ i3.19 ~ 6 . 0 8 ~ 3 . 7 2 ~ 5.64

1 ( ~ 1 . 4 4 2.09 1.55 3.11 1.28 1.83 1.17 m

2 ~ '~- '~1.91 3.82 2.15 3.05 1.63 2.32 1.35

3 8.52 1.11 1.16 1.22 2.10 1.00 1.41 0.90

4 < ~ 2 . 1 9 3.40 1.97 4.46 1.70 2.46 1.45

5 5.67 1.08 1.65 1.03 1.80 1.16 1.23 0.82

6 5.54 1.55 1.76 1.12 2.18 1.16 1.51 1.06

7 4.86 0.86 1.17 0.69 1.40 0.83 0.88 0.58

8 ~ 2.37 4.54 2.16 6.09 2.22 3.71 1.70

9 5.46 1.44 1.56 1.1.4 2.21 1.05 1.53 0.86

I15 : : " : : : " : : I :

TABLE 4. COEFFICIENTS OF CORRELATION BETWEEN R(0, 0) AND THE OTHER HARMONICS

R(0 1 2 3 4 5 6 7)

0 i~i.000~-0.3975 0.3297 -0.0882 0.2910 -0o1517 0.1313 0.0325

1 0.6065 -0.1339 0.1417 0.0171 0.3374 ~ 0.0137 0.0305 i

2 0.4819 0.0762 0.0068 -0.1617 0.0912 -0.1472 -0.2616 -0.1897

3 0.4171 0.1134 -0.1020 -0.0301 0.4402 -0.0778 0.0478 -0.0265

4 0.4117 -0.3617 0.27001-0.1677 0.1034 -0.1456 0.1119 -0.0564 , h I

5 0.3095 -0.0634 0.18221-0.0158 0.0110 -0.0265 0.1975 0.1076

6 0.2024 -0.0353 0.1087 -0.1413 -0.0219 -0.20241-0.1674 -0.1204

7 0.1901-0.0467 0.2640 0.1488 0.0821-0.x501 0.1718, 0.0608

e 0 . 4 0 0 3 - 0 . 0 6 1 0 o . o e 4 e - 0 . 0 8 1 7 - 0 . 0 0 8 7 - 0 . 2 5 2 4 0 . 1 5 6 3 - 0 . 0 3 1 7

9 0.4579 0.0348 0.2871 0.0188 0.1500-0.1022 0.0964 0.0510

10 0.2180 -0 .0535 0.0801 i -0 .0866 -0 .1366 - 0 . 2 3 0 3 ~ -0 .2762

ii 0.2413 -0.0724 0.0985 -0.0945 0.0481 -0.1400 0.1393 -0.0746

15 : : : : : : : :

Page 13: Machine recognition of printed Chinese characters via transformation algorithms

Machine recognition of printed Chinese characters via transformation algorithms 315

TABLES. CoE~IC1ENTSOFCORRELATION BEWEN R(I0,6)ANDTHEOTHER HARMONI~

R(0 1 2 3 4 5 6 7~

0 - 0 . 0 0 4 9 0.0123 0.1218 0 .0948 -0 .2539 0.~048 - 0 . 1 5 6 2 0.0147

i - 0 . 0 7 5 4 0.1075 0 .2311 0.0818 - 0 . 1 4 5 8 0.0071 - 0 . 1 1 6 1 0.0388

2 - 0 . 2 3 5 3 0.1536 - 0 . 0 6 5 5 - 0 . 0 7 1 8 - 0 . 0 7 9 7 0.1102 - 0 . 1 1 1 9 - 0 . 1 3 1 2

3 - 0 , 2 5 8 4 0.2787 0,0189 0.0072. - 0 , 1 3 8 7 0.1817 - 0 , 0 0 3 5 -0 .0921

4 0.1071 - 0 , 0 3 5 0 0 .0483 0,1207 - 0 , 0 2 2 2 0,0470 -0 ,0900 0.2842

5 - 0 , 0 8 1 5 - 0 . 3 1 5 6 0.1881 0 ,1723 0.0073 0.0268 0.2038 0,1412

6 - 0 , 0 9 1 7 0,0541 0.0216 - 0 , 2 1 ~ 9 0.1558 -0 ,0167 0.2519 0.1986

7 - 0 . 1 0 9 3 - 0 . 1 2 8 1 - 0 , 0 2 0 7 - 0 . 1 0 6 3 0.1683 0.0681 - 0 . 1 4 0 8 - 0 . 0 7 5 4

8 0 ,1534 0.1093 0 ,2005 0,2398 0,2032 - 0 , 0 3 4 2 0,4092 0,1295

9 0,0640 0,2180 0,0844 -0 .0158 - 0 . 0 6 7 3 0,2551 0.0868 0,0193

10 -0 ,0071 0.2030 0 ,2169 0,0241 - 0 , 0 0 3 3 0.1138 1,0000 0.1728

11 0.1264 - 0 , 0 3 8 ~ - 0 , 3 1 7 4 - 0 , 1 2 6 4 0 ,1406 0,1217 0,3680 0,1526

12 - 0 . 0 2 9 3 0,0315 0 ,0095 0 .1564 0,1342 - 0 , 0 0 0 8 -0.111~ 0.1594

13 - 0 . 0 7 0 4 0.0180 0.0307 - 0 . 0 8 0 2 0.2171 0.1062 -0 .0921 "0 .0045

14 0 .1518 0.0511 0,2888 0 ,0995 0 ,1253 - 0 , 0 5 3 5 0,2542 0.0097

15 0.0544 - 0 , 0 0 8 0 0.0919 0 ,0278 - 0 , 2 2 4 8 0,0566 0,2379 0,0301

1 C X ~ i i i i ! ! I I I

Z 0 r-- B ¢

~) 7C

LU 6 C E

~i 5C

~ 4C -

a Star.lard Deviation Method 2C ~ Ir~ovation Method

o Correlation Method 1C

i I I I I I 4 5 6 7 8 9

NUMBER OF FEATURES

FIG. 8. Comparison of the recognition rate with the number of features.

Page 14: Machine recognition of printed Chinese characters via transformation algorithms

316 PAUL P. WANG and ROBERT C. SHIAU

between the two methods mentioned above, was tried out by the authors. In short, we defined the "innovation of information" contained in the ith feature as follows

e / = ~ri(1 -lrlil) (4)

where r~is the coefficient of the correlation between R(0, 0) and the ith harmonic. Hence, the second feature is decided by ~ - ~ ~- ~ where the third feature is determined by IV laAi~ Oi l ,

Max{ei = tri(1 - I r t i I -Ir2i I + Irlir2il) }. i

Our findings indicate that the performance of the "Innovation Scheme" falls somewhere between those shown in Fig. 8.

We return to the discussion of the major simulation program in Step V. Distance function between the testing feature vector x = [xt, x2 . . . . . Xs] and the ith standard mask M~ = [m,, mi2 . . . . . mis ] is programmed by normalizing thejth feature coordinate with a~.

A portion (21) of the distances computed for the 63 character subset is presented in Table 6. As expected, this tabulation is constructed with standard masks against the noisy patterns.

TABLE 6. DISTANCE MATRIX BETVVEEN THE NOISY AND THE NOISELESS RADICALS

NOiSy Radicals

2~5 2784 2~4 37e 3.0--0 3.13 2.42 2.29 3.05 2.37 3.67 2.16 3.33 2.07 3.24 2.93 3.20 x.6s 3.45 2.13

12.96~5.28 3.35 2.97 2.90 4.17 3.00 1.19 4.09 3.57 3.36 4.75 5.70 3.90 2.51 2.03 2.27 3.94 3.70 3.65

12.90 5.31~2.90 s.so 4.64 4.13 3.73 4.61 3.65 3.10 5.20 2.30 2.73 3.s0 4.76 4..5 9.04 2.11 4.86 2.92

~.11.03 2.82 2 . 0 9 ( i ~ 2 . 9 1 2.12 2.63 1.62 2.25 2.00 1.42 2.92 3.19 3.61 2.24 2.22 2.26 2.27 1.77 2.80 1.63 ~"13.17 2 .31 5 .25 2 . 4 8 ~ 1 . 3 7 2 .62 1 .74 1 ,95 2.8B 2 ,34 1 .03 4 .91 5 .09 2.25 0 .74 0 .97 0 .73 3 .60 1 .60 3.06 J,~12.62 2.73 4 ,75 2 .13 1 . 3 9 Q 1 , 6 9 1.67 2,2B 1.92 1.92 1.72 4 .34 4.69 1 .91 1.38 1.66 1.27 2.94 1.23 2.22 ~,12 14 3 7 6 3 9 6 1 9 2 2 5 1 1 . 4 7 0 1 . 9 9 3 0 , 1 . ,5 1 4 9 2 3 4 3 3 5 3 5 3 1 2 0 2.21 2 6 , 2 9 0 2 0 5 ~ 2 9 1 1 5 ~11.68 2.43 3.69 1.08 1.82 1.56 2 . 1 6 @ 1 . 6 4 2.25 1.10 1.66 3 .4 . 3.71 1.43 z.z2 1 .2 . 1.48 2.17 1.40 1.93

~ ~ t 2 . 6 5 ( ~ ) 5 . 0 5 2.89 2.32 2.43 3.65 2 . 3 s ~ 1 . 7 2 3.03 2.63 4.47 5.22 3.26 2.23 1.35 1.71 3.59 3.06 1.44 .~ ~ )2 .09 3.68 3.13 1.32 2 . 9 , 1 . , 6 1.64 2.06 3 . 0 7 ~ ~ .2 , 2.98 3 . , 3.79 1.90 2.51 2.72 2 . , 1.74 2.35 1.17

~11.62 3.12 3.17Cir~:)2 .30 1.59 1.52 0.86 2.31 1 . 5 6 0 2 . 0 7 3.04 3.2o 0.98 ~.65 1.99 2.o6 1.51 1.70 1.12 ~13.22 2.69 5.22 2.49 0.41 1.62 ~.51 1.60 2.19 2 . 9 , 2 . 2 6 ~ 4 . , 4 . , 1 1 . 9 , 0.65 1.23 1.16 3.57 ~.36 3.04 ~12.01 4.72 2.62 3.08 4.95 4.10 3.50 3.41 3.84 3.85 3.12 4 . 5 9 ~ 2 . 0 4 3.32 4.33 4 . , 4.55 1.87 4.12 2 .5 ,

12.88 5.53 2.46 3.o3 4.95 4.39 3.33 3.28 4.61 3.77 2.67 4.37 1 . 9 5 ~ 2.85 4.3o 4 . , 4.87 2.19 3.94 2.67 , t 1 . 4 3 3.26 3 . , 1.13 2.51 1.96 1.61 o.92 2.36 2.12 0 . , 2.10 2.63 2 . 6 9 ~ 1 . . 7 2.21 2.36 1.44 1.75 1.23 ~i2.95 2.19 4.86 2.11 0.89 1.43 2.66 1.39 1.76 2.84 2.08 1.18 4.57 4.80 2.1200.95 0.60 3.30 1.77 3.88

~13.06 1.07 5.32 2.B6 1.61 2.18 3.49 2.15 1.03 3.57 2.91 2.04 4.94 5.40 3.04 1.70GI.23 3.83 2.68 3.53 ~13.02 1.77 5.14 2.45 1.19 1.31 2.89 1.97 1.64 2.91 2.49 1.79 4.79 5.29 2.64 1.19 1.09~3.52 2.13 3.07

~10,96 3.58 2.18 1.45 3 .66 2 .67 2 .39 2.11 2.83 2.28 1.64 3 .45 1 .74 2 .67 2 .21 3 .00 3 .09 3 . 1 7 G 3 . 0 0 1.20 ~12.42 2.95 4.59 2.01 1.39 0.72 1.29 1.59 2.33 1.95 1.66 1.41 4.02 4.22 1.41 1.28 1.73 1.49 2.70~1.97

~Ii.47 3.53 2.98 1.18 2.93 1.76 1.29 1.B1 2.81 1.09 1.04 2.81 2.77 3.23 1.54 2.40 2.86 2.60 1.16 3.09~

The important simulation results are shown in Figs. 9-14; they are all plotted as the percentage of correct recognitions vs the number of features. The standard deviation o has been used as a running parameter throughout these figures. It is important to note here that the noise level a does not necessarily stand for the net noise added to the deter- ministic character pattern. Assuming that the pattern X is a sample of multivariate and normally distributed density with mean vector M and covariance matrix . . I , then the "noise level or" is defined as ~r = (~r.7, 1 +o~" 1)- t where the additive noise N(0, a.I) is also

Page 15: Machine recognition of printed Chinese characters via transformation algorithms

Machine recognition of printed Chinese characters via transformation algorithms 317

TABLE 7. COMPARISON OF THREEKINDS OF TRANSFORMS

P r o p e r t i e s F . F . T . H . T . R . T .

normal patterns recognition second the best third

shifting position independent dependent independent

rotated pattern dependent dependent independent

ability to combat noise second the best third

learning time (see.) 15 0.8 1.0

per character

recognition time (sec.) 1.5 0.08 0.i

per character

Gaussian distributed. The performance of the recognition machine via F-, H- and R- transforms is shown in Figs. 9, 10 and 11 respectively. We may conclude that the most influential factor is the noise level a. With a very low noise level (a = 0.26), 3 features are more than enough to do a nearly perfect job for all transforms, while the F-transform requires only two. Under normal operation, the performance of the H-transform is the best (Fig. 12) and it has the best mobility for combatting noise (as indicated in Figs. 9-11 when a is very large). However, this is not necessarily true under the quasi-abnormal or unusual situations such as shifted patterns or shifted and rotated patterns. In the case of shifted patterns, the H-transform is nearly useless, whereas the performance of the other two transforms remains essentially intact, as indicated in Fig. 13. If one uses the testing

O• 8 0 0.36 0

O. :'8 7 0 0 . ~

0.3( ) ~ B O "

5O 0.40

| 0 1 2 3 4 5 6 7 8 9

N U M B E R OF FEATURES

FIG. 9. Performance of the classifier via F-transform.

Page 16: Machine recognition of printed Chinese characters via transformation algorithms

318 PAUL P. WANG and Roamer C. SHIAU

~, - 8 0

0 . 3 4

-

o ~ ~° , , ~ . ~ -

hi 3 0 . 2 8 -

2 0 6 -

1 n

I I I I I I I I I 0 1 2 3 4 5 6 7 8 9

N U M B E R OF" F E A T U R E S

FIG. 10. Performance of the classifier via H-transform.

patterns which are both shifted and rotated with a small angle, only the R-transform survives. Hence, one may conclude by investigation of the curves shown in Fig. 14 that the R-transform is the best algorithm to use in an uncertain situation. The above discussions are summarized in Table 7 for the purpose of comparison.

~ 6 0 O.38

" °

0 1 2 3 4 5 6 7 8 9 N U M B E R O F F E A T U R E S

FIG. I I. Performance of the classifier via R-transform.

Page 17: Machine recognition of printed Chinese characters via transformation algorithms

Machine recognition of printed Chinese characters via transformation algorithms 319

(n I00

z o 90 F-

w 7 0 Ix

~ 5 0

u. 4 o 0 w ~ 3 0

z 2o

0 I o 1 2 5 4 5 6 7 8 9

N U M B E R O F F E A T U R E S

FIG. 12. Comparison of three methods with noisy character patterns.

V. CONCLUDING REMARKS

This paper intends to answer some of the questions concerning the design of a recog- nition machine capable of handling a dictionary of 7000-8000 different printed Chinese ideographs. These questions, however, will not be completely settled until the system be- comes a commercial reality. The task is by no means an easy one. To ease already mounting

l O O I , ~ - (n I

w 701- a-

60- w

~ 5 0 - - 8 [, 4 0

0 R T I:1

3 0 F F T ~ --

H T 0 Z 2 0 [d (3 E 1 0 UJ Q.

1 2 3 4 5 6 "7 8 9 N U M B E R O F F E A T U R E S

FIG. 13. Comparison of three methods with shifted patterns.

Page 18: Machine recognition of printed Chinese characters via transformation algorithms

320 PAUL P. WANG and Ronm~l" C. SHL~U

1OO I I I I I I I I

~ : ~ -

i B°

~- 6O

8 ~ 4o

W 3 0 ~ F F T z

cr 0 .3 2O

0 . . . . . I I 2 3 4 5 6 7 8 9

N U M B E R OF" F E A T U R E S

FIG. 14. C o m p a r l s o r l o f t h ree m e t h o d s w i t h sh i f t ed a n d r o t a t e d pat t¢r r ls .

doubts for a commercially profitable system, we call to the attention of interested workers in the field the importance of having some kind of standardized fonts or, perhaps 2 or 3 standard fonts at most; these must be universallyadopted if the Chinese characters are to be read by the digital computer, or in the realization of the even more ambitious goal of an entirely automatic recognition and machine-translation system. The selection of the small subset of 63 radical characters used in this experiment is primarily based on the pro- posed three-stage hierarchy structure with the understanding that the second and third stages can be implemented if the experiments in this paper turn out to be successful. The key to achieving recognition is the transformation algorithms of Fourier, Hadamard, and Rapid. The feature extractor is to compress the useful information in a compact set, and we have discovered that when the size of the feature set is small enough, the system should present no difficulty in hardware implementation. We also disclose that the R- transform is perhaps the most attractive technique among the three, not only because of its ability to handle the shifted and rotated pattern, but because it requires minimal time to process the algorithm. Under normal conditions the R-transform is the least efficient of the three.

There are still many questions in this general area of research which call for answers, some of which are extremely fundamental in nature. For example, finding the optimal scheme for dividing a complete Chinese dictionary into distinct subgroup characters which share some common characteristics is also an optimal multiple-category searching problem.

Acknowledgements--The au thors wish to thank Professor MAx WOODnURY for suggesting the "least correlated features extraction scheme," and Mrs. JULIA WAN(; for her many hours o f effort in preparing the samples o f printed Chinese characters.

Page 19: Machine recognition of printed Chinese characters via transformation algorithms

Machine recognition of printed Chinese characters via transformation algorithms 321

REFERENCES

1. Survey of the need for language translation. Planning Research Corp., IBM Survey Rept. RC-634 (I 2 March 1962).

2. G. W. KING and H. W. CHANGE, Machine translation of Chinese, Scienr. Am. 124-136 (June 1963). 3. J. H. LIU, Real time Chinese hand writing recognition machine. MS. thesis. M.I.T. (1966). 4. H. C. TAO, On a Chinese computer alphabet for automatic machine processing, MS. thesis. Dept. of

Computer Science, U.N.C. at Chapel Hill (1966). 5. S. K. CHANG, A method for the structural analysis of two dimensional mathematical expressions, hformorion

Sci. 2, 253-272 (1970). 6. G. F. GRONER, J. F. HEAFNER, and T. W. ROBINWN. On-line computer classification of hand-printed Chinese

characters as a translation aid, IEEE Trans. E/PC. Computers EC& 856860 (Dec. 1966). 7. F. F. Let. A Chinese typesetting machine, Quarterly Progress Report, Research Laboratory of Electronics.

M.I.T. pp. 69-71 (April 1953). 8. ‘FUJITSU, A special issue of Kanji Information Processing, 21, No. 7 (1970). 9. P. P. WANG, The topological analysis and classification of printed Chinese characters. Technical Report.

Dept. of Elec. Engrg., Duke University (1972). IO. S. H. CAU)WELL, The Sinotypca machine for the composition of Chinese from a keyboard, J. Franklin

Insr. 267.471-502 (19S9). 1 I. S. Kuaor~, T. HONMA. and T. TSUCHIYA, Chinese character printer with electrostatic recording, l/X!?

Trans. Elecrron Devices ED19 (4), 569-579 (1972). 12. B. KIRK RANKM, III, W. A. SILLARS, and R. W. HSU. On the pictorial structure of Chinese characters, NBS

Technical Note 254, Jan. 4 (1965). 13. B. K. RANKIN, SIEGEL, MCCLELLAND and TAN, A grammar for component combination in Chinese

characters, NBS Technical Note 296 (1966). 14. B. K. RANKIN, A linguistic study of the formation of Chinese characters, Ph.D. Thesis, University of Penn-

sylvania ( 1965). 15. B. K. RANKIN and TAN, Component combination and frame-embedding in Chinese character grammars,

NBS Technical Note 492 (Feb. 1970). 16. E. I. BURKAIXT, A procedure for decomposing Chinese-Japanese ideographs, Ph.D. Thesis, University of

Pennsylvania (1968). 17. T. SAKAI, M. NAGAO, and H. TERAI, A description of Chinese characters using sub-patterns, Information

Processing in J4pM 10, IO-14 (1970). 18. T.-Y. KIANG, A new design scheme of Chinese character encoding and decoding system, Engineering Journal

No. 13, National Taiwan Univ. (May 1969). 19. T.-Y. KIANG. A compatible Chinese character encoding system, Proceedings of the Fourth Annual Princeton

Conference. pp. 41&420 (I 970). 20. T.-Y. KIANG, A new index system for Chinese language, J. Elec. Engng 1, 1-I I (1970). 21. W. STALLINGS, Computer description and recognition of printed Chinese characters, Proceedings, Spring

Joint Computer Confereocc. pp. 1015-1025 (1972). 22. W. STALLINGS. Recognition of printed Chinese characters by automatic pattern analysis, J. Computer

Graphics Image Processing 1 (I), 47-65 (March 1972). 23. W. T. YANG and C. P. WV, On pattern recognition, Engineering Journal, No. 13, National Taiwan University,

(May 1%9). 24. R. CASEY and G. NAGY, Recognition of printed Chinese characters, IEEE Truns. Elec. Compurers ECl5,

91-101 (1966). 25. W. W. BLED~OE, Review of Casey and Nagy’s paper, R66-65. IEEE Trans. Elec. Computers ECIS, 839 (1966). 26. Optical Characrers Recognition und rhe Yeurs Ahead, p. 297 (Feb. 1947), The Business Press, Elmhurst,

Illinois (1969). 27. #;R.kLjib)&f.-m.i)&;yf~~. $1 (Feb. 1947). 28. N. 1. NI-N. burning Machines. p. 57. McGraw-Hill, New York (1965). 29. H. RE~TB~ECK and T. P. BRODY, A transformation with invariance under cyclic permutation for applications

in pattern recognition, Inform&on ond Conrrol15. 130-354 (1969). 30. G. s. SEBESTYEN, Decision-making process in patterns recognition, ACM Monograph, Macmillan, New

York (1962). 3 I. H. C. ANDREWS. Computer Techniques in Image Processing. pp. 120-123. Academic Press, New York (1970).