You are on page 1of 27

VISVESVARAYA TECHNOLOGICAL UNIVERSITY

BELAGAVI-590014, KARNATAKA

MOBILE APPLICATION DEVELOPMENT LAB(18CSMP68)


MINI PROJECT REPORT ON
“TEXT RECOGNITION APPLICATION”
A dissertation work submitted in partial fulfillment of the requirement for the award of

the degree of

BACHELOR OF ENGINEERING
IN
COMPUTER SCIENCE & ENGINEERING

Submitted By
SANJANA M SHREYA C
(1EW20CS115) (1EW20CS122)

Under the guidance of


Prof. Dhanraj S
AND
Prof. Nalini B M
Assistant Professor,
Dept. of CSE

EAST WEST INSTITUTE OF TECHNOLOGY


DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

BENGALURU-560091, KARNATAKA.
2022-2023
East West Institute of Technology
(Affiliated to Visvesvaraya Technological University, Belagavi)

Bengaluru-91

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


VISION of the Institute
To be an Institute of Academic Excellence in Technical and Management Education on par
with global standards to meet changing needs of the Society.

MISSION of the Institute


M1: To impart quality technical education that nurtures the young minds by providing the best
of teaching learning process and state of the art infrastructure.

M2: To foster technological advancement through research.

M3: To inculcate holistic personality development through best practices.

M4: To implant ethical and social commitment that grooms the students to become responsible
citizens.

VISION of the Department


To be a Department of Excellence in Technical Education through Innovative Learning Approach
with Social Commitment in the field of Computer Science & Engineering.

MISSION of the Department


M1: To provide a conducive learning ambience to enhance problem solving skills, leadership
qualities and team spirit.

M2: To impart advanced technical knowledge through training programs for the holistic
development of students.

M3: To promote research, innovation and entrepreneur skills in the field of Computer Science and
Engineering.

M4: To inspire the students to become socially responsible technocrats.

Program Educational Objectives (PEOs)


After 3 or 4 years of the graduation the CSE graduates shall be able,
PEO1: To achieve sustainable growth as Computer Science Engineers in reputed organizations.

PEO2: To accomplish higher education and research with highest degree of professionalism and
integrity.

PEO3: To extend the services to mankind by exhibiting leadership qualities and ethical values.
EAST WEST INSTITUTE OF TECHNOLOGY
(Affiliated to Visvesvaraya Technological University, Belagavi I Recognized by Govt. of
Karnataka | Approved by AICTE, New Delhi)

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING

CERTIFICATE

This is to certify that the Mobile Application Development Lab(18CSMP68) mini project
work entitled “Text Recognition Application” presented by SANJANA M
(1EW20CS115) and SHREYA C(1EW20CS122) bonafide students of EAST WEST
INSTITUTE OF TECHNOLOGY, Bangalore in partial fulfilment for the award of
Bachelor of Engineering in Computer Science and Engineering of Visvesvaraya
Technological University, Belgaum during the year 2022- 2023. It is certified that all
corrections /suggestions indicated for Internal Assessment have been incorporated in the
report. The report has been approved as it satisfies the academic requirements in respect of
report prescribed for the said degree.

Signature of the Guide Signature of HOD

Prof. Dhanraj S
AND
Prof. Nalini B M Dr. Achyutha Prasad N
Asst. Professor, CSE H.O.D, Dept. of CSE

Name of external examiners Signature with date


1. 1.
2. 2.
DECLARATION

SANJANA M (1EW20CS115) and SHREYA C (1EW20CS122)


students of fifth semester Bachelor of Engineering in the Department of Computer Science and
Engineering of East West Institute of Technology, Bengaluru-560091, hereby declare that the Mobile
Application Development(18CSMP68) mini project entitled “TEXT ENCRYPTION AND
DECRYPTION” has been carried out by us under the guidance and supervision of Internal Guide Prof.
Dhanraj S AND Prof. NALINI B M ,Assistant Professor, Department of Computer Science and
Engineering, EWIT, Bengaluru submitted in the fulfillment of the requirements for the award of the degree
of Bachelor of Engineering of Computer Science and Engineering of Visvesvaraya Technological
University during the Academic year 2022-23.

Place:

Date:

SANJANA M (1EW20CS115)

SHREYA C (1EW20CS122)

i
ACKNOWLEDGMENT

The satisfaction and euphoria that accompany the successful completion of any task would
be incomplete without the mention of the people who made it possible, whose constant
guidance and encouragement crowned our effort with success.

We express our sincere gratitude to our principal Dr. K Channakeshavalu, Principal, East
West Institute of Technology, Bengaluru for his inspiration.

We wish to place on record our grateful thanks to Dr. Achyutha Prasad N, Professor and
Head of the Department, Computer Science and Engineering, East West Institute of
Technology, Bengaluru for providing encouragement and guidance.

We also thank our guide and are grateful to Prof. Dhanraj S AND Prof. Nalini B M,
Assistant Professor, Dept. of Computer Science and Engineering, for the timely
inspection and guiding us throughout the process.
We also thank the entire faculty, staff and non-staff members of Computer science and
Engineering Department, EWIT whose suggestions enabled us to surpass many of the
seemingly impossible hurdles.

SANJANA M(1EW20CS115)

SHREYA C(1EW20CS122)
ABSTRACT

Text recognition applications, also known as Optical Character Recognition (OCR) software,
are designed to convert printed or handwritten text into editable and searchable digital format.
These applications utilize advanced algorithms and machine learning techniques to analyze
images or scanned documents and extract text accurately.The abstract of a text recognition
application might highlight its key features, such as the ability to recognize multiple languages,
handle various font styles and sizes, and accurately extract text from complex documents. It
could also mention any specific industries or use cases the application targets, such as
document digitization, data entry automation, or archival purposes.

CONTENTS Page No
Chapter -1 Introduction 1

Chapter -2 System Analysis 2

Chapter -3 Software Requirement Specification

3.1 Existing System 3

3.2 Proposed System 4

3.3 Requirement Specification 4

Hardware and Software Requirement

Chapter -4 System Design 5

4.1 Architecture 5

4.2 DFD 6

4.3 ER Diagram 8

Chapter -5 Implementation 9

Chapter -6 Application Screenshots 16

Chapter -7 Test cases 19

Chapter -8 Conclusion 20

Chapter -9 Future Enhancements 21

Chapter -10 Bibliography 22


TEXT RECOGNITION

CHAPTER 1

INTRODUCTION

Accurate Text Extraction: Text recognition applications employ sophisticated algorithms to


accurately identify and extract text from complex sources, including different languages, fonts,
sizes, and orientations.
Document Layout Preservation: These applications strive to retain the original document's
layout and formatting during the conversion process, ensuring the extracted text maintains the
structure and integrity of the source document.

Language and Character Support: Many text recognition applications support multiple
languages and character sets, allowing them to handle diverse texts from different regions and
cultures.
Handwriting Recognition: Some advanced text recognition applications include handwriting
recognition capabilities, enabling them to convert handwritten text into editable digital content.

Image Pre-processing: Prior to text extraction, these applications often employ image pre-
processing techniques to enhance the quality of the source image, removing noise, adjusting
brightness and contrast, and improving overall readability.
Output Options: Text recognition applications provide various output options, such as
exporting the recognized text to popular file formats (e.g., TXT, PDF, DOCX), copying it to
the clipboard, or integrating it with other,software applications.

Text recognition applications, also known as Optical Character Recognition (OCR) software,
play a crucial role in
transforming printed or handwritten text into digital format. These applications leverage
advanced algorithms and artificial intelligence techniques to extract text from images, scanned
documents, or even live camera feeds.

The primary goal of a text recognition application is to convert physical text into editable and
searchable content, enabling users to easily manipulate, store, and analyze textual information.
Whether it's digitizing documents, automating data entry, or enhancing accessibility for
visually impaired individuals, text recognition applications offer a wide range of practical uses
across various industries.

DEPT OF CSE, 2022- 1


TEXT RECOGNITION

CHAPTER 2

SYSTEM ANALYSIS

System analysis is a project management technique and a phase of system


development life cycle that divides complex projects into smaller, more easily managed
segments or phases. Segmenting projects allows managers to verify the successful
completion of project phases before allocating resources to subsequent phases.

The purpose of the systems analysis phase is to understandthe requirement and


build a logical model of the new system. During the next phases, data modelling, process
modelling, and object modelling, we develop a logical model of business process that the
system must support.

The end product called as systems requirements document describes management


and user requirements, alternative plans and costs, and analysis your recommendation.
System engineering and analysis encompasses requirement gathering at the system level
with a small amount of top-level design and analysis. This process of analysing and
gathering requirements is known as software requirement specification (SRS).

The requirement gathering process intensifiedand focused specifically, on


software. The preliminary investigation, feasibility study and the detailed investigation
allows the system to comprehend the full scope of this project. Soon after testing,
implementation of the developed system is followed by training.

DEPT OF CSE, 2021- 2


TEXT RECOGNITION APPLICATION

CHAPTER 3

SOFTWARE REQUIREMENT SPECIFICATION

Software Requirement Specification (SRS) is a fundamental document, which forms


the foundation of the software development process. SRS not only lists the requirements
of a system but also has a description of its major features. These recommendations
extend the IEEE standards. The recommendations would form the basis for providing
clear visibility of the product to be developed serving as baseline for execution of a
contract between client and the developer.

A system requirement is one of the main steps involved in the development process. It
follows after a resource analysis phase that is the task to determine what a particular
software product does. The focus in this stage is one of the users of the system and not
the system solutions. The result ofthe requirement specification document States the
intention of the software, properties and constraints of the desired system.

SRS constitutes the agreement between clients and developers regarding the contents
of the software product that is going to be developed. SRS should accurately and
completely represent the system requirements as it makes a huge contribution to the
overall project plan.

3.1. Existing System


Designing an encryption/decryption system, amongst other things, requires decision
on the basic functionality of the software, and the choice of cryptographic algorithm to be
used. While the functionality supports the attractiveness of the system, the type of
cryptographic algorithm actually determines how much security the system would
actually provide. Hence, this forms the major component in the system design. Currently,
there are many available open-source and commercial encryption/decryption systems.
Madji and Lin (2007) developed a system that employs binary rotation of bits with XOR
logical operation. The application uses symmetric encryption key, which is generated
using random number generation and combination. Another use of symmetric encryption
key was by Abdelhalim, El-Mahallawy, Ayyad, and Elhennawy (2012). They designed
and implemented a Modified Tiny Encryption Algorithm (MTEA) for use in RFID
systems.

DEPT OF CSE, 2022- 3


TEXT RECOGNITION APPLICATION

3.2. Proposed System

Initially, algorithm starts with plain text. So, the plain text is act as input. Then the
plain text transmitted into cipher text using several fixed encryption process randomly. In
this method, the key generation process will be there. That means, the receiver must use
the key to access the message that the sender will send. Therefore, to convert any
plaintext into cipher text, we have to apply some fixed encryption process.

On the other hand, to convert any cipher text to plain text we have to apply some
fixed decryption process. So, our main focus of this proposed algorithm is to protect all
the information, that is being transmitted between sender and receiver without any data
lose and to protect this information from unauthorized source.

3.3. Requirement Specification :

Hardware Requirements

 Processor : Intel CORE i3

 RAM : 4 GB

 Disk Space : 180GB

Software Requirements

 Operating System : Windows 7 or above

 Coding Language : Java, XML

 IDE : Android Studio

DEPT OF CSE, 2022- 4


TEXT RECOGNITION APPLICATION

CHAPTER 4

System Design
4.1. Architecture

The type of architecture used in this application is single tier architecture. In this
type of architecture, the database is readily available on the application. Any request
made by the user doesn't require a network connection to perform the action on the
database.

Medication reminders help in decreasing medication dispensing errors and wrong


dosages. The Reminder system consists of two parts –setting Alarm and getting
notification.

Fig 4.1 One Tier Architecture

DEPT OF CSE, 2022- 5


TEXT RECOGNITION APPLICATION

4.2. Data Flow Diagrams (DFD’s)

DFD graphically representing the functions, or processes, which capture, manipulate,


store and distribute data between a system and its environment and between components
of a system. The visual representation makes it a good communication tool between User
and System designer. A structure of DFD allows starting from a broad overview and
expands it to a hierarchy of detailed diagrams. DFD has often been used due to the
following reasons: • Logical information flow of the system. • Determination Of physical
system construction requirements. • Simplicity of notation. • Establishment of manual and
automated systems requirements.

The following symbols are used in the Data Flow Diagram:

 This arrow diagram represents the flow of data in one direction.

 This arrow diagram represents the flow of data in bi-direction.

 This rectangular symbol represents the activity of the application.

 This circular symbol denotes the users / source of inputs to


the activity of theapplication.

 This symbol denotes the Database and Database Tables of the application.

DEPT OF CSE, 2022- 6


TEXT RECOGNITION APPLICATION

Dataflow Diagram:

CAPTURE TEXT
TEXT RECOGNITION RESULT

DATABASE

DEPT OF CSE, 2022- 7


TEXT RECOGNITION APPLICATION

4.3. E-R Diagram (Entity-Relationship Diagram)

SNAP
USER

TEXT
CAPTURED

TEXT
T
RECOGNISED
RESULT

Fig 4.3 E-R Diagram

DEPT OF CSE, 2022- 8


TEXT RECOGNITION APPLICATION

CHAPTER
5
IMPLEMENTATION OF CODE

5.1. XML
code:
<?xml version="1.0" encoding="utf-8"?>
<RelativeLayout xmlns:android="http://schemas.android.com/apk/res/android"
xmlns:app="http://schemas.android.com/apk/res-auto"
xmlns:tools="http://schemas.android.com/tools"
android:layout_width="match_parent"
android:layout_height="match_parent"
android:background="@color/black_shade"
tools:context=".MainActivity">

<ImageView
android:layout_width="200dp"
android:layout_height="200dp"
android:layout_centerHorizontal="true"
android:src="@drawable/img"
android:layout_marginTop="70dp"
android:id="@+id/idivlogo" />
<TextView
android:layout_width="match_parent"
android:layout_height="wrap_content"
android:layout_below="@+id/idivlogo"
android:layout_marginEnd="20dp"
android:layout_marginStart="20dp"
android:layout_marginTop="30dp"
android:layout_marginBottom="10dp"
android:id="@id/idTvHead"
android:text="Welcome to Text recognition app"
android:textAlignment="center"
android:gravity="center"

DEPT OF CSE, 2022- 9


TEXT RECOGNITION APPLICATION
android:layout_centerHorizontal="true"
android:textColor="@color/yellow"
android:textSize="24dp"
android:textStyle="bold"
/>

<Button
android:id="@+id/idbtncap"
android:layout_width="match_parent"
android:layout_height="wrap_content"
android:layout_below="@+id/idTvHead"
android:layout_marginStart="20dp"
android:layout_marginTop="30dp"
android:layout_marginEnd="20dp"
android:background="@drawable/button_back"
app:backgroundTint="@color/yellow"
android:text="Capture"
android:textAllCaps="false" />
</RelativeLayout>

DEPT OF CSE, 2022- 1


TEXT RECOGNITION APPLICATION

5.2. JAVA code:


package com.example.textrecognition;

import androidx.appcompat.app.AppCompatActivity;

import android.content.Intent;

import android.os.Bundle;

import android.view.View;

import android.widget.Button;

public class MainActivity extends AppCompatActivity {

private Button capturebtn;

@Override

protected void onCreate(Bundle savedInstanceState) {

super.onCreate(savedInstanceState);

setContentView(R.layout.activity_main);

capturebtn=findViewById(R.id.idbtncap);

capturebtn.setOnClickListener(new
View.OnClickListener() {

@Override

public void onClick(View v) {

Intent i =new
Intent(MainActivity.this,scannerActivity.class);
startActivity(i);

});

DEPT OF CSE, 2022- 1


TEXT RECOGNITION APPLICATION

CHAPTER 6
Application Screenshot
[Grab your reader’s attention with a great quote from the document or use this space to
emphasize a key point. To place this text box anywhere on the page, just drag it.]

6.1 HOME PAGE 6.2 INPUT PAGE

DEPT OF CSE, 2022- 1


TEXT RECOGNITION APPLICATION

6.4 IMAGE SCANNED 6.5 TEXT RECOGNISED

DEPT OF CSE, 2022- 1


TEXT RECOGNITION APPLICATION

DEPT OF CSE, 2022- 1


TEXT RECOGNITION

Chapter 7
Test Cases

Sl No Test Cases Expected Actual Output Valid/Invalid


Output
1 Basic text recognition A clear, high Accurate extraction Valid
resolution image of the text from the
with printed text. image.
2 Complex fonts and style Images containing The application Valid
text in different should accurately
fonts,size and recognised and
styles. perserve the various
font styles and
sizes.
3 Handwritten text recognition Images containing The application Partially Valid
handwritten text in should accurately
different styles and recognise and
handwriting quality. convert the
handwritten text
into digital format.
4 Multi-language support Images with text in The application Invalid
different languages should accurately
other than english. recognise,convert
and extract the text
from image with
various languages.
5 Noisy or low-quality images Images with low The application Invalid
resolution,poor should apply
lighting or high appropriateimage
level of noise. preprocessing
techniques to
ehance the quality
of the image .

DEPT OF CSE, 2021- 1


TEXT ENCRYPTION AND DECRYPTION

CONCLUSION

Overall, text recognition applications have revolutionized the way we handle and interact with
textual content, opening up new possibilities for digitization, automation, and information
management in our increasingly digital world.

Text recognition applications find wide-ranging applications across different industries. They
are used for document digitization, automating data entry tasks, enhancing accessibility for
visually impaired individuals, enabling language translation, and facilitating information
extraction and analysis. These applications not only save time and reduce errors associated
with manual tasks but also improve efficiency,accessibility, and data management.

With continuous advancements in technology, text recognition applications are expected to


further improve in terms of accuracy, speed, and language support. They will continue to play
a vital role in transforming physical text into digital information, contributing to increased
productivity, accessibility, and effective utilization of textual data.
Overall, text recognition applications have revolutionized the way we handle and interact with
textual content, opening up new possibilities for digitization, automation, and information
management in our increasingly digital world.

DEPT OF CSE, 2022- 1


TEXT ENCRYPTION AND DECRYPTION

FUTURE ENHANCEMENT

The software application is developed in such a way that application can be enhanced
with further requirements without any much change in the system flow. The additional
modules can be implemented to the same applications without disturbing the existing
modules.

A number of enhancements can be added to the existing software application like,

 Improved Recognition Accuracy:Enhancements to the underlying algorithms and machine


learning models can lead to higher accuracy in text recognition.

 Multi-Language Support: Adding support for a broader range of languages can make the
application more versatile and useful for users
worldwide.

 Handwriting Recognition: Integrating handwriting recognition capabilities into the


application can enable users to extract and convert handwritten text into digital format.

 Intelligent Text Formatting:Incorporating intelligent algorithms to recognize and preserve


the original text formatting, such as headings, bullet points, and tables, can help maintain
the visual structure of the extracted text.

 Advanced Image Pre-processing:Enhancing the image pre-processing capabilities can


improve the application's ability to handle images with varying quality, lighting
conditions, and noise levels.

DEPT OF CSE, 2022- 1


TEXT ENCRYPTION AND DECRYPTION

BIBLIOGRAPHY

 Reference Books:

 Cracking Codes With Java

 Hybrid Encryption Algorithm Based on AES&RC5 to Improve Data Security

 Websites

 www.tutorialspoint.com

 A free online learning platform for learning programming language.


www.stackoverflow.com
 A free online help portal for software developers.

 Youtube Channels

 Programming Knowledge : https://youtube.com/c/CodeWithHarry

DEPT OF CSE, 2022- 1

You might also like