Systems and methods for digitized document image data spillage recovery

ABSTRACT

Systems and methods for digitized document image data spillage recovery are provided. One or more memories may be coupled to one or more processors, the one or more memories including instructions operable to be executed by the one or more processors. The one or more processors may be configured to capture an image; process the image through at least a first pass to generate a first contour; remove a preprinted bounding region of the first contour to retain text; generate one or more pixel blobs by applying one or more filters to smudge the text; identify the one or more pixel blobs that straddle one or more boundaries of the first contour; resize the first contour to enclose spillage of the one or more pixel blobs; overlay the text from the image within the resized contour; and apply pixel masking to the resized contour.

CROSS REFERENCE TO RELATED APPLICATION

The subject application is a Continuation of Ser. No. 16/151,900 filed Oct. 4, 2018, the contents of which is hereby incorporated by reference in its entirety.

FIELD OF THE DISCLOSURE

The present disclosure relates to systems and methods for digitized document image data spillage recovery.

BACKGROUND OF THE DISCLOSURE

Current solutions for optical character recognition processing of recovering data outside bounding boxes exhibit inaccuracy and are incomplete, thereby resulting in reduced quality of character recognition, increased processing time, and increased costs associated therewith. These and other drawbacks exist.

Accordingly, there is a need to accurately recover data spillage in a manner that efficiently uses system and other resources.

SUMMARY OF THE DISCLOSURE

In an exemplary embodiment, a data spillage recovery system may include one or more processors. The system may include one or more memories coupled to the one or more processors. The one or more memories may include instructions operable to be executed by the one or more processors. The one or more processors may be configured to capture an image. The one or more processors may be configured to process the image through at least a first pass to generate a first contour. The one or more processors may be configured to generate one or more pixel blobs by applying one or more filters to smudge the text. The one or more processors may be configured to identify the one or more pixel blobs that straddle one or more boundaries of the first contour. The one or more processors may be configured to resize the first contour to enclose spillage of the one or more pixel blobs. The one or more processors may be configured to overlay the text from the image within the resized contour. The one or more processors may be configured to apply pixel masking to the resized contour.

In an example embodiment, a method may include receiving, by one or more processors, a digitized document image. The method may include processing, by the one or more processors, the image through at least a first pass generate a first contour. The method may include preserving, by the one or more processors, text by removing a preprinted bounding box of the first contour. The method may include applying, by the one or more processors, one or more filters to smudge the text so as to generate one or more pixel blobs. The method may include evaluating, by the one or more processors, the one or more pixel blobs that straddle one or more boundaries of the contour. The method may include resizing, by the one or more processors, the first contour so as to enclose spillage of the one or more pixel blobs. The method may include overlaying, by the one or more processors, the text from the image within the resized contour. The method may include creating, by the one or more processors, a mask to remove data resulting from resizing the first contour. The method may include applying, by the one or more processors, the mask to the resized contour.

In an example embodiment, a data spillage recovery application may be configured to process a received image through at least a first pass to generate a first contour. The application may be configured to eliminate a preprinted bounding region of the first contour to preserve text. The application may be configured to produce one or more pixel blobs by applying one or more filters to smudge the text. The application may be configured to analyze the one or more pixel blobs that overlap one or more boundaries of the first contour. The application may be configured to adjust the first contour to enclose spillage of the one or more pixel blobs. The application may be configured to overlay the text from the image within the adjusted contour. The application may be configured to apply pixel masking to the adjusted contour.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 depicts a block diagram of a system configured to provide digitized document image data spillage recovery according to an example embodiment.

FIG. 2 depicts a flow diagram illustrating a method for digitized document image data spillage recovery according to an example embodiment.

FIG. 3 depicts a flow diagram illustrating a method of a first pass configured for contouring preprinted regions according to an example embodiment.

FIGS. 4A-4H depict diagrams illustrating digitized document image data spillage recovery according to an example embodiment.

DETAILED DESCRIPTION

According to the various embodiments of the present disclosure, systems and methods are provided for digitized document image data spillage recovery. In some examples, documents printed on preprinted forms spill outside of the bounding boxes identifying where the data should be. Contours around the preprinted bounding boxes may truncate data spillage outside of the preprinted boxes, resulting in data loss during optical character recognition (OCR) processing. As described herein, systems and methods ensure that data spillage outside of preprinted boxes and identifying contours is included in the contour by resizing it to only include spillage and not data that could be included by resizing the contour. In some examples, data spillage recovers how much data spills over into adjacent boxes.

Exemplary embodiments of digitized document image data spillage recovery include and are not limited to one or more sections, portions or regions, such as an earnings section or deduction section of a paystub, or different preprinted boxes on IRS tax forms. Other examples may comprise government forms, business forms, or any document, form, image, paper, or other publication used for any purpose.

FIG. 1 illustrates a system 100 configured to provide digitized document image data spillage recovery according to an example of the present disclosure. As further discussed below, system 100 may include client device 105, network 115, server 120, and database 125. Although FIG. 1 illustrates single instances of the components, system 100 may include any number of components, including one or more processors.

As shown in FIG. 1, client device 105, or end node 105, may be a network-enabled computer. As referred to herein, a network-enabled computer may include, but is not limited to: e.g., a computer device, or communications device including, e.g., a server, a network appliance, a personal computer, a workstation, a mobile device, a phone, a handheld PC, a personal digital assistant, a thin client, a fat client, an Internet browser, or other device. Client device 105 also may be a mobile device; for example, a mobile device may be a smart phone, a laptop computer, a tablet computer, a wearable device, and/or any other like mobile device or portable computing device.

In various examples according to the present disclosure, client device 105 of system 100 may execute one or more applications 110, such as software applications, that enable, for example, network communications with one or more components of system 100 and transmit and/or receive data. In some examples, an application 110 may be installed on client device 105, such as a mobile device. Application 110 may include instructions to perform digitized document image data spillage recovery as described herein. In some examples, application 110 may include instructions to determine whether or not to perform a portion of digitized document image data spillage recovery on client device 105 and/or transmit, via one or more networks 115, the digitized document image to another system, such as a remote database, server, or third party system. Client device 105 may be in communication with one or more servers 120 via one or more networks 115, and may operate as a respective front-end to back-end pair with server 120. Client device 105 may transmit, for example from a mobile device application 110 executing on client device 105, one or more requests to server 120. The one or more requests may be associated with retrieving data from server 120. Server 120 may receive the one or more requests from client device 105. Based on the one or more requests from client device 105, server 120 may be configured to retrieve the requested data from one or more databases 125. Based on receipt of the requested data from one or more databases 125, server 120 may be configured to transmit the received data to client device 105, the received data being responsive to one or more requests.

Data associated with the digitized document image may be received, captured, or otherwise obtained through a variety of processes. In some examples, a digitized document image may be received from one or more computing devices, including but not limited to, scanners, sensors, cameras, mobile devices, and the like and/or any combination thereof. In some examples, the image may comprise a .gif, .bmp, .tiff, .png, .jpeg file format or the like. In some examples, the digitized document image may be received from local storage. In some examples, digitized document image may be received from a cloud. For example, cloud computing may comprise an Internet connection between the systems that are operating in the cloud. The cloud may comprise a plurality of systems such that one or more shared resources, such as processing, peripherals, software, data, servers, and the like are provided to any system of the cloud so as to allow access and distribution of services and/or data between the systems of the cloud.

Server 120 may include one or more processors, which are coupled to memory. Server 120 may be configured as a central system, server or platform to control and call various data at different times to execute a plurality of workflow actions. Server 120 may be configured to connect to database 125. Server 120 may be connected to at least one client device 105.

Network 115 may be one or more of a wireless network, a wired network or any combination of wireless network and wired network, and may be configured to connect client device 105 to server 120. For example, network 115 may include one or more of a fiber optics network, a passive optical network, a cable network, an Internet network, a satellite network, a wireless LAN, a Global System for Mobile Communication (GSM), a Personal Communication Service (PCS), a Personal Area Network (PAN), Wireless Application Protocol (WAP), Multimedia Messaging Service (MMS), Enhanced Messaging Service (EMS), Short Message Service (SMS), Time Division Multiplexing (TDM) based systems, Code Division Multiple Access (CDMA) based systems, D-AMPS, Wi-Fi, Fixed Wireless Data, IEEE 802.11b, 802.15.1, 802.11n and 802.11g, Bluetooth network, or any other wired or wireless network for transmitting and receiving a data signal.

In addition, network 115 may include, without limitation, telephone lines, fiber optics, IEEE Ethernet 802.3, a wireless network, a wide area network (WAN), a wireless personal area network (WPAN), a local area network (LAN), a body area network (BAN), a global network such as the Internet, a cellular network, or any combination thereof. Network 115 may utilize one or more protocols of one or more network elements to which they are communicatively coupled. Network 115 may translate to or from other protocols to one or more protocols of network devices. Although network 115 is depicted as a single network, it should be appreciated that according to one or more examples, network 115 may comprise a plurality of interconnected networks, such as, for example, the Internet, a service provider's network, a cable television network, corporate networks, such as credit card association networks, and home networks.

In various examples, network 115 may be configured to provide data communication between a client device 105 and server 120 and between the client devices 105. For example, data may be communicated between client devices 105 and server 120 through the Internet or other network, and data may be communicated directly between client devices 105 and/or one or more databases 125 without passing through server 120. Accordingly, network 115 may be one or more of the Internet, Near Field Communication (NFC), Radio Frequency Identification (RFID), Bluetooth, Wi-Fi, and/or the like. Client devices 105 may be same or different devices.

System 100 may be configured to process the digitized document image if it is received in a skewed manner. For example, system 100 may be configured to process skew adjustment or morphage of the digitized document image for data spillage recovery. In some examples, skew adjustment or morphage may comprise adjusting or orienting the image such that the image is transformed and aligned to account for skew. For example, the image may be provided at an angle and thus skew correction is utilized to accurately adjust the image. System 100 may be configured to subject the digitized document image for preprocessing for contouring through one or more filters. For example, the image may be preprocessed by an Otsu threshold filter, a despeckle filter, and/or a grayscale filter. In some examples, the Otsu threshold filter may be configured to adjust one or more of brightness and contrast to improve readability of the digitized document image. In some examples, the despeckle filter may be configured to remove speckles, such as noise, from the digitized document image such that one or more pixels are whited out so it no longer remains a part of the image.

In some examples, system 100 may be configured to process skew adjustment or morphage of the image, which may comprise processing edge detection to the digitized document image so as to determine linearity of the content of the document based on vertical and horizontal edges. For example, if the edges are not parallel or perpendicular to the edges of the image boundary, system 100 may be configured to determine how many degrees the content should be rotated so as to sufficiently align the parallel or perpendicular edges to the image boundary edges. In the case where an image is tilted at an angle at the time of capture, a four point affine transformation algorithm may be applied by system 100 to correct it.

System 100 may be configured to preprocess the digitized document image through at least a first pass to generate a first contour. In some examples, the first pass by system 100 may be configured for contouring one or more portions, such as one or more preprinted boxes. The first pass may include canny edge detection to identify one or more shapes in the image. Image contouring may comprise creating one or more geometric point arrays around the canny edge detection shapes. The geometric point arrays may be collected to create one or more bounding boxes. For example, canny edge detection may return one or more coordinate pairs, such as one or more (x,y) coordinate points. By receiving one or more (x,y) coordinate points, a vector may be created so as to generate one or more bounding boxes. In some examples, the one or more portions may comprise of rectangular-shaped preprinted boxes. The one or more portions may comprise oval regions, circular regions, square regions, polynomial regions, and checked box regions. In some examples, if the one or more portions are not rectangular-shaped, system 100 may be configured to convert the one or more portions to rectangular-shaped dimensions so as to continue processing of the digitized document image.

The terms “smudge” or “smudged,” as used herein, refer to any blurring, blocking, bolding, fattening, thickening, or combining of text into an interconnected or indistinct form. The term “blob” as used herein refers to an indeterminate shape, including without limitation a smudged image of one or more characters. The term “spillage” as used herein, refers to any character, text, image, or portion thereof that extends beyond a specified area, field, or range. In some examples, “bounding box” may be interchangeably used with “bounding region.”

System 100 may be configured to remove a preprinted bounding region of the first contour to retain text. In some examples, one or more filters, such as line removal digital image filters, may be configured to remove a preprinted bounding region so only text is retained. The line removal digital image filters may be configured to remove horizontal and vertical lines. Accordingly, this process eliminates the preprinted bounding region of a clip of the image.

System 100 may use one or more filters, such as dilation and erosion digital image filters, which may be configured to smudge the text (after removal of the lines) into one or more large blobs of pixels. In some examples, the dilation filter may be configured to enlarge objects, and brighten a given region of text within an image by, for example adding pixels, (so white pixels become more white) and the erosion filter may be configured to shrink objects, and make the region of text in white smaller, for example removing pixels, (so remove white pixels where there are already white pixels, such that shapes get thinner, edges may be trimmed). For example, the dilation filter may only be used to smudge the text together into one or more pixel blobs. This also connects pixels of text that straddles lines that were previously removed and pixels composing the straddling text. In some examples, closing may be performed such that dilation filtering precedes erosion filtering. For example, erosion may comprise a post-process data spillage operation that may be configured to remove one or more undesirable artifacts, for example, one or more remaining line segments that “strike out” straddling text.

System 100 may be configured to identify the one or more blobs of pixels that straddle, spill, extend, fall out or otherwise exceed a boundary line of preprinted bounding region of the first contour. In some examples, contouring is performed on the blob of pixels so as to identify complete areas of text. This may be used to help locate text for data spillage that is desired for retaining. The resulting contour around the smudged text may be used to encapsulate the pixels composing the text. In some examples, the one or more straddled pixel blobs are based on one or more coordinates associated with a threshold. For example, text may spill over one or more segments of a bounding box, thereby straddling it. The one or more segments may comprise top, bottom, right, and left line segments of the bounding box. Using the bottom left coordinates and bottom right coordinates of a bottom line of the bounding box the text straddles where the x coordinate may represent horizontal in a positive direction from left to right, and the y coordinate may represent vertical in a positive direction from top to bottom. The y value of the topmost pixels comprising the straddling text is less than (above) the y value of the bottom line the text straddles, and correspondingly, the y value of the bottommost pixels comprising the straddling text is greater than (below) the y value of the bottom line the text straddles. Accordingly, this relationship may qualify the text as a data spillage.

In one example, system 100 may be configured to process a first function for straddling text with reference to a bottom line of the bounding box, where Y_(t) may represent the y value of the topmost pixels of straddling text, Y_(b) may represent the y value of the bottommost pixels of straddling text, and Y_(b) may represent the y value of the bottom line: Straddling text(true/false)=(Y _(t) <Y _(l) && Y _(l) <Y _(b))

Similarly, system 100 may be configured to process the first function for top, left, and right line segments comprising the bounding box contour with the line in between the corresponding pixel end points (e.g. top, left and right) of the text. In some examples, a second function, which may be similar to the first function, may be processed by system 100 directed to text that touches one or more line segments but does not straddle it.

System 100 may be configured to resize the first contour to enclose spillage of the one or more blobs of pixels. In some examples, coordinates of the original contour may be compared for determining a sufficient resize. For example, as long one edge, such as a left edge of smudge, is less than a left edge of preprinted bounding region, this may determine whether it is a candidate for data spillage. Straddling may thus be indicated by a top portion of the blob as being above the line, and a bottom portion of the blob as being below the line.

System 100 may be configured to overlay the text from the image within the resized contour. In some examples, a logical AND is applied between to determine which data belongs with the new contour, and which does not. For example, coordinates of smudges, such as a y coordinate of the lowest portion of the text within the preprinted bounding region may be adjusted for a new contour to be created. The resized contour may be based on the outermost pixels of text spillage and a new clip may be produced by copying pixels within the resized contour to a new image that comprises the size of the contour. In effect, the original contour is discarded.

System 100 may be configured to apply pixel masking to the resized contour. In some examples, a pixel mask is created in relation to the original contour with the smudged contours. Accordingly, pixel masking results in removal of one or more white pixels. Application of the pixel mask allows determination of which data belongs with the new contour and which does not. In one example, one or more white pixels may be removed, and all black pixels that match will remain black. For example, one or more white pixels in the pixel mask may represent data that does not belong with the new contour.

System 100 may be configured to process removal of one or more artifacts via ligature processing. In some examples, one or more artifacts may include one or more of lines, marks, holes, spaces or dashes or other like representations appearing in the image. For example, a resulting contour, after applying pixel masking, may illustrate encapsulated data spillage. Artifact, such as line artifact, may be removed by ligature processing. Ligature processing may be used by downstream processing scans to check for one or more word sized contours created based on one or more bounding boxes about the size of printed text height and the approximate width of two or more characters. The word sized contour may be scanned from one direction to another, such as from left to right, identifying one or more pinch points between connected characters, in which case the one or more pinch points may be whited out to produce a separation of characters. Thus, system 100 may be configured to perform one or more conditional checks of the resized contour. In some examples, the one or more conditional checks of the resized contour may be performed via a machine learning model.

FIG. 2 illustrates a method 200 for providing digitized document image data spillage recovery according to an example of the present disclosure. As explained below, method 200 may reference same or similar components of system 100. For example, as described herein, client device may be similar to client device 105 as described above with respect to FIG. 1. Exemplary embodiments of digitized document image data spillage recovery include and are not limited to one or more sections, portions or regions, such as an earnings section or deduction section of a paystub, or different preprinted boxes on IRS tax forms. Other examples may comprise government forms, business forms, or any document, form, image, paper, or other publication used for any purpose.

At block 205, an image may be received by one or more processors (similar to one or more processors as described above with respect to FIG. 1). In some examples, the image may comprise a digitized document image. In some examples, data associated with the image may be received, captured, or otherwise obtained through a variety of processes. In some examples, the image may be received from one or more computing devices, including but not limited to, scanners, sensors, cameras, mobile devices, and the like and/or any combination thereof. In some examples, the image may comprise a .gif, .bmp, .tiff, .png, .jpeg file format or the like. In some examples, the image may be received from local storage. In some examples, the image may be received from a cloud. For example, cloud computing may comprise an Internet connection between the systems that are operating in the cloud. The cloud may comprise a plurality of systems such that one or more shared resources, such as processing, peripherals, software, data, servers, and the like are provided to any system of the cloud so as to allow access and distribution of services and/or data between the systems of the cloud. In some examples, processing, by the one or more processors, skew adjustment or morphage of the digitized document image for data spillage recovery may be optionally performed. In some examples, skew adjustment or morphage may comprise adjusting or orienting the image such that the image is transformed and aligned to account for skew. For example, the image may be provided at an angle and thus skew correction is utilized to accurately adjust the image. For example, skew adjustment or morphage of the digitized document image may comprise utilizing, by the one or more processors, edge detection to the digitized document image so as to determine linearity of the content of the document based on vertical and horizontal edges. For example, if the edges are not parallel or perpendicular to the edge of the image boundary, one or more processors may be configured to determine how many degrees the content should be rotated so as to sufficiently align the parallel or perpendicular edges to the edges of the image boundary. Where an image is tilted at an angle at the time of capture, one or more processors may be configured to correct it via one or more algorithms, such as a four point affine transformation algorithm.

At block 210, the image may be processed, by the one or more processors, through at least a first to generate a first contour. In some examples, preprocessing of the image may include application of one or more filters. For example, the image may be preprocessed by an Otsu threshold filter, a despeckle filter, and/or a grayscale filter. In some examples, the Otsu threshold filter may be configured to adjust one or more of brightness and contrast to improve readability of the digitized document image. In some examples, the despeckle filter may be configured to remove speckles, such as noise, from the digitized document image such that one or more pixels are whited out so it no longer remains a part of the image. Further details of the first pass is described in FIG. 3. As explained below with reference to FIG. 3, it is understood that preprinted boxes must be identified prior to identifying text that straddles them.

At block 215, text may be preserved, by the one or more processors, by removing a preprinted bounding box of the first contour. For example, lines of the preprinted bounding box may be removed such that only text of the clip is preserved. In some examples, the line removal digital image filters are configured to remove horizontal and vertical lines. Accordingly, this process eliminates the preprinted bounding box.

At block 220, one or more filters may be applied, by the one or more processors, to smudge the text so as to generate one or more pixel blobs. For example, filters, such as dilation and erosion digital image filters, are applied to the clip and configured to smudge the text (after the lines have been removed and only the text remains) into one or more large blobs of pixels. In some examples, the dilation filter may be configured to enlarge objects, and brighten a given region of text within an image by, for example adding pixels, (so white pixels become more white) and the erosion filter may be configured to shrink objects, and make the region of text in white smaller, for example removing pixels, (so remove white pixels where there are already white pixels, such that shapes get thinner, edges may be trimmed). For example, the dilation filter may only be used to smudge the text together into one or more blobs of pixels. This also connects pixels of text that straddles lines that were previously removed and pixels composing the straddling text. In some examples, closing may be performed such that dilation filtering precedes erosion filtering. For example, erosion may comprise a post-process data spillage operation that may be configured to remove one or more undesirable artifacts, for example, one or more remaining line segments that “strike out” straddling text. For example, a black blob may indicate where the text originally was located.

At block 225, the one or more pixel blobs may be evaluated, by the one or more processors, that straddle one or more boundaries of the contour.

At block 230, the first contour may be resized, by the one or more processors, so as to enclose spillage of the one or more pixel blobs. Contouring is performed on the blob of pixels so as to identify complete areas of text. This may be used to help locate text for data spillage that is desired for retaining. The resulting contours around the smudged text may be used to encapsulate the pixels composing the text. In some examples, the one or more straddled pixel blobs are based on one or more coordinates associated with a threshold. For example, text may spill over one or more segments of a bounding box, thereby straddling it. The one or more segments may comprise top, bottom, right, and left line segments of the bounding box. Using the bottom left coordinates and bottom right coordinates of a bottom line of the bounding box the text straddles where the x coordinate may represent horizontal in a positive direction from left to right, and the y coordinate may represent vertical in a positive direction from top to bottom. The y value of the topmost pixels comprising the straddling text is less than (above) the y value of the bottom line the text straddles, and correspondingly, the y value of the bottommost pixels comprising the straddling text is greater than (below) the y value of the bottom line the text straddles. Accordingly, this relationship may qualify the text as a data spillage.

In one example, the one or more processors may be configured to process a first function for straddling text with reference to a bottom line of the bounding box, Y_(t) may represent the y value of the topmost pixels of straddling text, Y_(b) may represent the y value of the bottommost pixels of straddling text, and Y_(l) may represent the y value of the bottom line: Straddling text(true/false)=(Y _(t) <Y _(l) && Y _(l) <Y _(b))

Similarly, the one or more processors may be configured to process the first function for top, left, and right line segments comprising the bounding box contour with the line in between the corresponding pixel end points (e.g. top, left and right) of the text. In some examples, a second function, which may be similar to the first function, may be processed by the one or more processors directed to text that touches one or more line segments but does not straddle it.

At block 235, the text from the image may be overlayed, by the one or more processors, within the resized contour. For example, an outline, such as a thin black outline around text may represent one of the resulting contours from text smudging overlayed on the clip. Other contours, represented by think black outlines, may also qualify for data spillage. For example, once the text has been smudged together into blobs of pixels, canny edge detection may result in an outline that represents location of the smudged text.

At block 240, a mask may be created, by the one or more processors, to remove data resulting from resizing the first contour. For example, the mask may comprise a pixel mask which results in removal of one or more white pixels.

At block 245, the mask may be applied, by the one or more processors, to the resized contour. Application of the pixel mask allows determination of which data belongs with the new contour and which does not. In one example, one or more white pixels may be removed, and all black pixels that match will remain black. For example, one or more white pixels in the pixel mask may represent data that does not belong with the new contour.

In some examples, method 200 may comprise artifact removal which may be conducted, by the one or more processors, via ligature processing, including removing line artifacts appearing through the text. In some examples, one or more artifacts may include one or more of lines, marks, holes, spaces or dashes or other like representations appearing in the image. For example, a resulting contour, after applying pixel masking, may illustrate encapsulated data spillage. Artifact, such as line artifact, may be removed by ligature processing. Ligature processing may be used by downstream processing scans to check for one or more word sized contours created based on one or more bounding boxes about the size of printed text height and the approximate width of two or more characters. The word sized contour may be scanned from one direction to another, such as from left to right, identifying one or more pinch points between connected characters, in which case the one or more pinch points may be whited out to produce a separation of characters.

At block 250, thus, one or more conditional checks of resized contour may be performed by the one or more processors. In some examples, the one or more conditional checks of the resized contour may be performed via a machine learning model.

FIG. 3 illustrates a method 300 of a first pass for contouring preprinted boxes. As explained below, method 300 may reference same or similar components of system 100. For example, as described herein, one or more processors may be similar to the one or more processors as described above with respect to FIG. 1.

In some examples, the first pass by the one or more processors may be configured for contouring one or more portions, such as one or more preprinted boxes. The first pass may include canny edge detection 310 to identify one or more shapes in the image. Image contouring may comprise creating one or more geometric point arrays 315 around the canny edge detection shapes. The geometric point arrays may be collected to create one or more bounding boxes 320. For example, canny edge detection may return one or more coordinate pairs, such as one or more (x,y) coordinate points. By receiving one or more (x,y) coordinate points, a vector may be created so as to generate one or more bounding boxes. In some examples, the one or more portions may comprise of rectangular-shaped preprinted boxes. The one or more portions may comprise oval regions, circular regions, square regions, polynomial regions, and checked box regions. In some examples, if the one or more portions are not rectangular-shaped, the one or more processors may be configured to convert the one or more portions to rectangular-shaped dimensions so as to continue processing of the digitized document image. Thus, the first pass is configured for contouring one or more preprinted boxes 325.

FIGS. 4A-4H depict diagrams illustrating digitized document image data spillage recovery according to an example embodiment. As explained below, FIGS. 4A-4H may reference same or similar components of system 100. For example, as described herein, one or more processors may be similar to the one or more processors as described above with respect to FIG. 1. Exemplary embodiments of digitized document image data spillage recovery include and are not limited to one or more sections, portions or regions, such as an earnings section or deduction section of a paystub, or different preprinted boxes on IRS tax forms. Other examples may comprise government forms, business forms, or any document, form, image, paper, or other publication used for any purpose.

As shown in FIG. 4A, a portion or clip 400 of a received or captured digitized document image illustrates a data spillage problem. As observed in FIG. 4A, “JESSICA SARAH JONES” 405 straddles preprinted bounding box 410 since portions of this text 405 spill, extend, fall out or otherwise exceed a boundary line of preprinted bounding box 410. For example, text 405 may spill over one or more segments of bounding box 410, thereby straddling it. The one or more segments may comprise top 402, bottom 402, right 406, and left 408 line segments of bounding box 410. Using the bottom left coordinates and bottom right coordinates of a bottom line of the bounding box 410 the text 405 straddles where the x coordinate may represent horizontal in a positive direction from left to right, and the y coordinate may represent vertical in a positive direction from top to bottom. The y value of the topmost pixels comprising the straddling text 405 is less than (above) the y value of the bottom line 404 the text straddles 405, and correspondingly, the y value of the bottommost pixels comprising the straddling text 405 is greater than (below) the y value of the bottom line 404 the text straddles 405. Accordingly, this relationship may qualify the text 405 as a data spillage.

In one example, one or more processors may be configured to process a first function for straddling text with reference to a bottom line 404 of the bounding box 410, where Y_(t) may represent the y value of the topmost pixels 401 of straddling text 405, Y_(b) may represent the y value of the bottommost pixels 403 of straddling text 405, and Y_(l) may represent the y value of the bottom line 404. Straddling text(true/false)=(Y _(t) <Y _(l) && Y _(l) <Y _(b))

Similarly, one or more processors may be configured to process the first function for top 402, right 406, and left 408 line segments comprising the bounding box contour with the line in between the corresponding pixel end points (e.g. top 402, right 406, and left 408) of the text. In some examples, a second function, which may be similar to the first function, may be processed by one or more processors directed to text that touches one or more line segments but does not straddle it.

As shown in FIG. 4B, one or more filters, such as line removal digital image filters, are configured to remove the preprinted boxes so only text remains on clip 400. For example, as observed in FIG. 4B in comparison with FIG. 4A, lines from clip 400 have been removed such that only text of clip 400 is retained. In some examples, the line removal digital image filters are configured to remove horizontal and vertical lines. In this example, removal of the lines incurs white space 415 appearing through “JESSICA SARAH JONES,” which is accounted and explained in further detail with respect to FIG. 4G. Accordingly, this process eliminates the preprinted bounding box 410 previously shown in FIG. 4A.

As shown in FIG. 4C, filters, such as dilation and erosion digital image filters, are applied to clip 400 and configured to smudge the text (as illustrated in FIG. 4B where the lines have been removed and only the text remains) into one or more large blobs of pixels 420. For example, a black blob 420 may indicate where the text originally was located.

As shown in FIG. 4D, contouring is performed on the blob of pixels 420 so as to identify complete areas of text. This may be used to help locate text for data spillage that is desired for retaining. The resulting contours 425 around the smudged text may be used to encapsulate the pixels composing the text.

As shown in FIG. 4E, the original contour is represented by the bolder black lines. The thin black outline 430 around the text “TRANSFEREE'S NAME (TYPED) JONES SARAH” represents one of the resulting contours from text smudging overlayed on clip 400. As observed in FIG. 4E, other contours 435, 440 that may qualify for data spillage include “BOBBY D JESSICA” and “JR OR JONES.” For example, once the text has been smudged together into blobs of pixels 420 (as illustrated in FIG. 4C), canny edge detection may result in an outline that represents location of the smudged text.

As shown in FIG. 4F, a pixel mask is created in relation to the original contour with the smudged contours previously depicted in FIG. 4E. Accordingly, clip 400 illustrates that the pixel mask results in removal of one or more white pixels. Application of the pixel mask allows determination of which data belongs with the new contour and which does not. In one example, “CITY” “ST.” and “ZIP CODE” 445 are white pixels that are removed, and all black pixels that match will stay black.

As shown in FIG. 4G, clip 400 illustrates the resulting contour, post pixel masking applied in FIG. 4F, encapsulating data spillage. Artifact, such as line artifact 450, that appears through “JESSICA SARAH JONES” may be removed by ligature processing. For example, in FIG. 4G, line 450 may be removed after ligature processing and illustrates the contents of the resized contour after data spillage and masking have been applied.

As shown in FIG. 4H, clip 400 illustrates a comparison 455 of the original contour without application of the processes described herein.

It is further noted that the systems and methods described herein may be tangibly embodied in one of more physical media, such as, but not limited to, a compact disc (CD), a digital versatile disc (DVD), a floppy disk, a hard drive, read only memory (ROM), random access memory (RAM), as well as other physical media capable of data storage. For example, data storage may include random access memory (RAM) and read only memory (ROM), which may be configured to access and store data and information and computer program instructions. Data storage may also include storage media or other suitable type of memory (e.g., such as, for example, RAM, ROM, programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM), magnetic disks, optical disks, floppy disks, hard disks, removable cartridges, flash drives, any type of tangible and non-transitory storage medium), where the files that comprise an operating system, application programs including, for example, web browser application, email application and/or other applications, and data files may be stored. The data storage of the network-enabled computer systems may include electronic information, files, and documents stored in various ways, including, for example, a flat file, indexed file, hierarchical database, relational database, such as a database created and maintained with software from, for example, Oracle® Corporation, Microsoft® Excel file, Microsoft® Access file, a solid state storage device, which may include a flash array, a hybrid array, or a server-side product, enterprise storage, which may include online or cloud storage, or any other storage mechanism. Moreover, the figures illustrate various components (e.g., servers, computers, processors, etc.) separately. The functions described as being performed at various components may be performed at other components, and the various components may be combined or separated. Other modifications also may be made.

In the preceding specification, various embodiments have been described with references to the accompanying drawings. It will, however, be evident that various modifications and changes may be made thereto, and additional embodiments may be implemented, without departing from the broader scope of the invention as set forth in the claims that follow. The specification and drawings are accordingly to be regarded as an illustrative rather than restrictive sense. 

I claim:
 1. A data spillage recovery system comprising: at least one processor; and at least one memory coupled to the at least one processor, the at least one memory including instructions operable to be executed by the at least one processor, the at least one processor configured to: preprocess an image; subject the image through a first pass to generate a first contour; remove a first portion of the first contour to retain text; apply one or more filters to smudge the text so as to generate one or more pixel blobs; identify the one or more pixel blobs that exceed one or more boundary lines of the first contour; resize the first contour to enclose spillage of the one or more pixel blobs; overlay the text from the image within the resized contour; and perform one or more conditional checks of the resized contour.
 2. The data spillage recovery system of claim 1, wherein the first pass comprises contouring the first portion based on edge detection.
 3. The data spillage recovery system of claim 1, wherein removal of the first portion comprises removal of one or more horizontal and vertical lines.
 4. The data spillage recovery system of claim 1, wherein the at least one processor is further configured to remove one or more artifacts via ligature processing.
 5. The data spillage recovery system of claim 4, further comprising determine, by the at least one processor, one or more pinch points between connected characters from one or more word sized contours.
 6. The data spillage recovery system of claim 1, wherein the one or more pixel blobs that exceed the one or more boundary lines are based on one or more coordinates associated with a threshold.
 7. The data spillage recovery system of claim 1, wherein the preprocessed image is subject to at least one selected from the group of an Otsu filter, a despeckle filter, and a grayscale filter.
 8. The data spillage recovery system of claim 1, wherein pixel masking comprises removal of one or more pixels from the resized contour.
 9. The data spillage recovery system of claim 1, wherein the at least one processor is configured to process at least one selected from the group of skew adjustment and morphage of the image.
 10. The data spillage recovery system of claim 1, wherein the first portion comprises one or more shaped preprinted portions.
 11. A method of recovering data spillage comprising: preprocess an image; subjecting the image through a first pass to generate a first contour; retain text by removing a preprinted portion of the first contour; applying one or more filters to smudge the text so as to generate one or more pixel blobs; identifying the one or more pixel blobs that exceed one or more boundary lines of the first contour; resizing the first contour so as to enclose spillage of the one or more pixel blobs; overlaying the text from the image within the resized contour; removing data resulting from resizing the first contour; and performing one or more conditional checks of the resized contour.
 12. The method of recovering data spillage of claim 11, wherein the first pass comprises contouring the preprinted portion based on edge detection.
 13. The method of recovering data spillage of claim 11, wherein removing the preprinted portion comprises removing one or more horizontal and vertical lines.
 14. The method of recovering data spillage of claim 11, wherein the preprinted portion comprises at least one selected from the group of oval regions, circular regions, square regions, polynomial regions, and checked box regions.
 15. The method of recovering data spillage of claim 11, wherein identifying the one or more pixel blobs that exceed one or more boundary lines of the first contour is based on a threshold associated with a reference line of the first contour.
 16. The method of recovering data spillage of claim 11, wherein resizing comprises adjusting the first contour to a bottom portion of the text.
 17. The method of recovering data spillage of claim 11, further comprising removing one or more artifacts via ligature processing.
 18. The method of recovering data spillage of claim 17, further comprising determining one or more pinch points between connected characters from one or more word sized contours.
 19. The method of recovering data spillage of claim 11, further comprising preprocessing the image wherein the preprocessed image is subject to at least one selected from the group of an Otsu filter, a despeckle filter, and a grayscale filter.
 20. A data spillage recovery application, the application configured to: subject a preprocessed image through a first pass to generate a first contour; eliminate a first region of the first contour to retain text; apply one or more filters to smudge the text so as to produce one or more pixel blobs; identify the one or more pixel blobs that overlap one or more boundary lines of the first contour; resize the first contour to enclose spillage of the one or more pixel blobs; overlay the text from the image within the resized contour; and perform one or more conditional checks of the resized contour. 