Automatic Contact Importer from Business Cards for Android
نویسندگان
چکیده
This report describes the development of a standalone business card reader for Android smartphones. We use image processing techniques to preprocess the card’s image, which might have been taken from a difficult perspective, unfavorable lighting conditions, or partial occlusions. The text in the preprocessed image is then extracted using optical character recognition (OCR) and parsed to isolate the name, phone number, and email address of the contact to be automatically imported in the user’s address book. The app comprises of a single Java class linked with Tesseract and OpenCV libraries. The preprocessing is performed in C++ and called using Java Native Interface (JNI) provided by Android. The system was tested with business cards of varying appearances in a wide range of backgrounds and occlusions by the user holding it in his/her hand. Our standalone Android app performs well in these test scenarios.
منابع مشابه
Relaying EMV Contactless Transactions using Off-The-Shelf Android Devices
Dutch banks introduced contactless payments in April 2014, and have been promoting the use of contactless cards since then. Contactless payments are based on the EMV specification, the worldwide standard for contact and contactless transactions. EMV Contact is a well-researched field and many vulnerabilities have been found. Although EMV Contactless is newer and less researched, a few vulnerabi...
متن کاملImplementing Optical Character Recognition on the Android Operating System for Business Cards
This report presents an algorithm for accurate recognition of text on a business card, given an Android mobile phone camera image of the card in varying environmental conditions. First a MATLAB implementaton of the algorithm is described where the main objective is to optimize the image for input to the Tesseract OCR (optical character recognition) engine. Then a simplified reduced-complexity i...
متن کاملSecurity of the OSGi platform
In the last few years we have seen how increasing computational power of electronic devices triggers the functionality growth of the software that runs on them. The natural consequence is that modern software is no longer single-pieced, it becomes, instead, the composition of autonomous components that run on the shared platform. The examples of such platforms are web browsers (such as Google C...
متن کاملNew product adoption and sales performance from the importer perspective
a r t i c l e i n f o Keywords: New product adoption Exporter–importer relationship Technology–environment–organization framework International marketing From an international business setting, this paper investigates how importers determine new product adoptions and how exporters diffuse new products to offshore markets through importers. Using the technology–environment–or-ganization framewor...
متن کاملPerformance Evaluation of Primitives for Privacy-Enhancing Cryptography on Current Smart-Cards and Smart-Phones
The paper deals with the implementation and benchmarking of cryptographic primitives on contemporary smart-cards and smartphones. The goal of the paper is to analyze the demands of today’s common theoretical cryptographic constructions used in privacy-enhancing schemes and to find out whether they can be practically implemented on off-the-shelf hardware. We evaluate the performance of all major...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013