Character Recognition Based on Euclidean Distance Calculation Over Predictive and Centroid Coordinates
S. Ponmaniraj1, Sanjay Sharma2, R. Vijay3, Gokul Rajan. V4

1S. Ponmaniraj*, Asst. Professor, School of Computing Science and Engineering, Galgotias University, Greater Noida.
2Sanjay Sharma, Asst. Professor, School of Computing Science and Engineering, Galgotias University, Greater Noida.
3R. Vijay, Asst. Professor, School of Computing Science and Engineering, Galgotias University, Greater Noida.
4Gokul Rajan V, Asst. Professor, School of Computing Science and Engineering, Galgotias University, Greater Noida. 

Manuscript received on March 30, 2020. | Revised Manuscript received on April 05, 2020. | Manuscript published on April 30, 2020. | PP: 1412-1416 | Volume-9 Issue-4, April 2020. | Retrieval Number: D8733049420/2020©BEIESP | DOI: 10.35940/ijeat.D8733.049420
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Now a day people are living with internet technology but those technologies brings many problems to the people through many hacking techniques. Image spam is the one among them. In the earlier stages, hackers used to annoy targeted victims with their fabricated text called spam text. Hackers are passing their bogus information on many ways such as advertising, spam emails, buttons, query distributions etc. From which spam emails are very specific to attack and they are filtered by text based filter. Then attackers nurtured their attacks on new way i.e., spreading spam mails by images. Those images are non related content to the concerned users on their corresponding mails or any web pages. Because of those spam images, text based filter couldn’t identify spam texts. On the basis of an image’s features, Attackers used to embed their spam text or mischief coded links into some of the attracted images. To identify spam contents from an image, security functions of a system must be able to recognize the characters imbedding on any images. This research paper is going to present views on image spam, Data mining approaches for dataset analysis, proposed optical character recognizer model and implementation of character recognition from images using Euclidean distance values.
Keywords: Centroid coordinates, Euclidean distance, Glyptic art, Image analysis, Image spam, Optical Character Recognizer, Pattern recognition, Spam analysis.