Approach using CNN for Recognition of Devanagari Handwritten Content

Authors

  • Subhash Rathod Associate Professor, Marathwada Mitra Mandal’s Institute of Technology, Pune
  • Mangesh D. Salunke Associate Professor, Marathwada Mitra Mandal’s Institute of Technology, Pune
  • Manisha Bhende Professor, Dr. D.Y. Patil Vidyapeeth, Pune, Dr. D.Y. Patil School of Science & Technology, Tathwade, Pune
  • Meghna Yashwante Associate Professor, Marathwada Mitra Mandal’s Institute of Technology, Pune
  • Uma B. Karanje Assistant Professor,Marathwada Mitra Mandal’s Institute of Technology, Pune
  • Yogesh B. Dongare Marathwada Mitra Mandal’s Institute of Technology, Pune
  • Vaibhav D. Rewaskar Assistant Professor, Marathwada Mitra Mandal’s Institute of Technology, Pune

Keywords:

Devanagari, Handwritten text recognition, CNN, Deep learning, Image recognition

Abstract

This document discusses the use of Convolutional Neural Networks (CNN) for Devanagari Handwritten Text Recognition (DHTR) tasks. DHTR is a complex task due to the variability and diversity of handwritten characters in the Devanagari script. CNNs are a type of deep learning algorithm that can automatically learn features from images and are widely used in image recognition tasks. This paper presents a CNN-based approach for DHTR the proposed method has shown out performed on a popular dataset commonly used for evaluating image recognition systems. The proposed approach involves a preprocessing step to normalize and segment the input images, followed by a CNN architecture that consists of several convolutional layers and fully connected layers. The network is trained using a large dataset of labeled Devanagari characters. The results show that the proposed approach achieves high accuracy in recognizing Devanagari characters, and can be applied to real-world applications such as document digitization and text-to-speech conversion.

Downloads

Download data is not yet available.

References

K. Malhotra, Y. Kumar, and P. Bhattacherjee, "A CNN-based approach for Devanagari HCR," Journal of Advanced CS and App. vol. 8, no. 6, pp. 303-309, 2017.

S. Mittal, S. Kumar, and S. Bhatia’s, Paper “Devanagari script recognition using deep CNN," International Journal of Computer Applications, vol. 156, no. 4, pp. 28-34, 2017.

N. Aggarwal, S. Kumar, and A. Jain, "A review on Devanagari Handwritten Character Recognition using Deep Learning," International Journal of Computer Science and Information Security, vol. 16, no. 3, pp. 80-88, 2018.

A. Kumar and A. Kumar, "Devanagari Handwritten Character Recognition using Convolutional Neural Networks," in Proceedings of the International Conference on Computing, Communication and Automation, 2016, pp. 480-485.

S. Phadikar and In P.Roy's article "A Complete Review of Handwritten Devanagari Character Recognition Methods," published in International Journal of Machine Learning and Computing, vol.3, no. 1, pp. 9-14, 2013.

Joshi, D., Saini, P., & Sharma, D. (2021). A Comprehensive Study on Devanagari Handwritten Character Recognition. International Journal of Recent Technology and Engineering, 9(1), 5311-5316.

Prasad, S., & Subramanian, K. (2017). Devanagari HCR Using CNN. International paper of Computer software and Applications, 176(4), 22-26.

Kumar, S., & Gupta, S. K. (2019). DL based Handwritten Devanagari Character Recognition. International Journal of Computer software and applications, 182(17), 1-6.

Singh, N., & Vyas, S. (2019). HDCR using CNN. Journal of Research in CSE and Information Technology, 5(1), 453-458.

Bajaj, N., Singh, N., & Garg, R. (2021). Handwritten Devanagari Character Recognition using Convolutional Neural Network with Augmented Dataset. International Journal of Artificial Intelligence and Machine Learning, 13(1), 58-66.

Kumar, P. (2021). A Proposed Methodology to Mitigate the Ransomware Attack. In Recent Trends in Intensive Computing (pp. 16-21). IOS Press.

Salunke, M., Kabra, R., & Kumar, A. (2015). Layered architecture for DoS attack detection system by combined approach of Naive Bayes and Improved K-means Clustering Algorithm. International Research Journal of Engineering And Technology, 2(3), 372-377.

Salunke, M. D., & Kabra, R. (2014). Denial-of-service attack detection. International Journal of Innovative Research in Advanced Engineering, 1(11), 16-20.

Salunke, M. D., Kumbharkar, P. B., & Kumar, S. (2020). Proposed Methodology to Prevent a Ransomware Attack. International Journal of Recent Technology and Engineering (IJRTE), 9(1), 2723-2725.

Salunke M. D., Dr. Kumbharkar P. B., Dr. Yogesh Kumar Sharma. (2020). A Proposed Methodology to Detect a Ransomware Attack using Deception Technique. International Journal of Advanced Science and Technology, 29(3), 10532 -. Retrieved from http://sersc.org/journals/index.php/IJAST/article/view/27134

Telshinge, M. P. R., & Salunke, M. M. D. Un-Compromised Credibility: Social Media based Multi-Class Hate Speech Classification for Text: A Review.

Deshpande, P., Joshi, P., Madekar, D., Pawar, P., & Salunke, M. (2020). A Survey On: Classification of Twitter data Using Sentiment Analysis. Asian Journal For Convergence In Technology (AJCT) ISSN -2350-1146, 5(3), 34-37. Retrieved from https://asianssr.org/index.php/ajct/article/view/911

Rathod, S. ., Salunke, M. D. ., Yashwante , M. ., Bhende , M. ., Rangari, S. R. ., & Rewaskar, V. D. . (2023). Ensuring Optimized Storage with Data Confidentiality and Privacy-Preserving for Secure Data Sharing Model Over Cloud. International Journal of Intelligent Systems and Applications in Engineering, 11(3), 35–44. Retrieved from https://www.ijisae.org/index.php/IJISAE/article/view/3140

Rathod, S. G., Salunke, M. D., Jadhav, H. B., Ajalkar, D. A., Banurao, D., & Satre, D. B. Role Based Secure Data Access Control for Cost Optimized Cloud Storage Using Data Fragmentation While Maintaining Data Confidentiality. computing, 4(5), 38.

Sonawane, P., Kardile, A., Lagad, K., Pati, V., & Salunke, M. D. (2021). A Survey on Machine Learning Approach for Classification of Breast Cancer. INTERNATIONAL JOURNAL, 5(12).

Deshapnde, P., Joshi, P., Pawar, P., Madekar, D., & Salunke, M. D. (2019). A Survey On: Sentiment Analysis framework of Twitter data Using Classification. Asian Journal For Convergence In Technology (AJCT) ISSN-2350-1146, 5(3), 118-122.

Rathod, S., Khobragade, R. N., Thakare, V. M., Walse, K. H., & Pawar, S. (2022, September). Model for Efficient Data Storage on Public Cloud. In 2022 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS) (pp. 1-5). IEEE.

S. Rathod, R. N. Khobragade, V. M. Thakare, K. H. Walse and S. Pawar, "Lightweight Auditable Secure Cloud Storage With Privacy Enabled Data Storage Optimization," 2022 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS), Pune, India, 2022, pp. 1-6, doi: 10.1109/ICBDS53701.2022.9935980.

Rathod, S., Bagal, P., Gujar, R., Hannure, A., & Waghulde, D. (2021). Smart Helmet for Detection of Unsafe Events in Mining Industy Based on IoT (No. 5799). EasyChair.

Pawar, M. S., & Rathod, S. (2020). Text summarization using cosine similarity and clustering approach. Int J Curr Eng Technol, 8, 669-673.

Rathod, S., Khobragade, R. N., Thakare, V. M., Walse, K. H., & Pawar, S. (2022, September). Model for Efficient Data Storage on Public Cloud. In 2022 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS) (pp. 1-5). IEEE.

Rathod, S. G. (2022). Security for Shared Data Over Public Cloud for Maintaining Privacy. Mathematical Statistician and Engineering Applications, 71(4), 7167-7173.

Rana, P. ., Sharma, V. ., & Kumar Gupta, P. . (2023). Lung Disease Classification using Dense Alex Net Framework with Contrast Normalisation and Five-Fold Geometric Transformation. International Journal on Recent and Innovation Trends in Computing and Communication, 11(2), 94–105. https://doi.org/10.17762/ijritcc.v11i2.6133

María, K., Järvinen, M., Dijk, A. van, Huber, K., & Weber, S. Machine Learning Approaches for Curriculum Design in Engineering Education. Kuwait Journal of Machine Learning, 1(1). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/111

Mehraj, H., Jayadevappa, D., Haleem, S. L. A., Parveen, R., Madduri, A., Ayyagari, M. R., & Dhabliya, D. (2021). Protection motivation theory using multi-factor authentication for providing security over social networking sites. Pattern Recognition Letters, 152, 218-224. doi:10.1016/j.patrec.2021.10.002

Downloads

Published

16.07.2023

How to Cite

Rathod, S. ., Salunke, M. D. ., Bhende, M. ., Yashwante, M. ., Karanje, U. B. ., Dongare, Y. B. ., & Rewaskar, V. D. . (2023). Approach using CNN for Recognition of Devanagari Handwritten Content. International Journal of Intelligent Systems and Applications in Engineering, 11(3), 998–1004. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3354

Issue

Section

Research Article

Most read articles by the same author(s)