Wednesday, June 5, 2019
Multitouch Gesture Generation and Recognition Techniques
Multi satisfy Gesture Generation and recognition TechniquesAbstract A huge number of users argon utilise smart phones to communicate with apiece other. A smart phone user is exposed to various threats when they use their phone for communication. These threats shadow disorganization the operation of the smart phone, and transmit or diversify user data rather than original 1. So applications must guarantee privacy and integrity of the information. Single fulfil mobile security is unable to check efficient doing for secluded data. Hence we are moving towards multitouch mobile security for high security. In computing, multi-touch is authentication technology that enables a surface to disclose the presence of more than one touch points of contact with the touch hide 2. By using multiple touch points to authenticate user for access confidential data in mobile phones. we are presenting our study about biometric communicates to authenticate user through multitouch dactyl points for more security 1.Keywords Multitouch, biometric question, authentication, security, smart phone Finger-tracking, humanoid Operating system.IntroductionTodays IT admins face the troublesome task of managing the unnumberable amounts of mobile devices that connect with enterprise networks a day for communication through network. Securing mobile devices has bend increasingly important now days as the numbers of the devices in operation and the uses to which they are put have expanded in world wide. The business is compounded within the enterprise as the ongoing trend toward IT users or organizations is resulting in more and some(prenominal) more employee-owned devices connecting to the corporate internet. Authentication is a zippo but process in which the security provided are compared to those on file in a database of valid users information on a operating system. If the credentials match, the process is completed and the user is granted authorization for access to the system . The permissions and folders came back outline for each one the surroundings the user sees and also the method he pull up stakes move with it, as well as the amount of access and different rights comparable to the number of allotted cupboard space and different services 1.The in general a computer authentication process is to use alphanumerical usernames or text based and passwords. This method has been shown to have somedisadvantages. For example, users tend to pick passwords that can be easily guessed and recognized by other hard to remember. To device this problem, some researchers havedeveloped authentication techniques that use multitouch biometric gesture as passwords for authentication.Multi-touch, in a computing environment, is an interface technology that enables input gestures on multiple points on the surface of a device. Although most generally used with touch screen devices on handheld devices, such as smart phones and tablets, and other multi-touch has been used fo r other surfaces as well, including touch pads and whiteboards, tables and walls 2.In other words, multi-touch refers to the capability of a touch screen (or a touchpad) to recognize two or more points of contact on the surface simultaneously. The constant following of the multiple points permits the portable interface to know gestures, that modify advanced practicality similar to pinch-to-zoom, pinch. wherever gesture realization is much of deciphering human gestures via mathematical algorithmic programs. Gestures will originate from any bodily motion barely normally originate from the face or hand and alternative human biometric gestures but the identification and recognition of posture, and human behaviours is additionally the topic of gesture recognition techniques.We used Equal Error Rate (EER) to measure accuracy. This is the rate at which False Acceptance Rate (FAR) and False Rejection Rate (FRR). To find out whether using multiple gestures would improve the systems perfor mance, we combined scores of 2 different gestures from the same user in the same order and evaluated the EER of the combined gestures asFAR=FRR= develop a Gesture Authentication TechniqueBiometric systems are an effective way to authenticate valid users generally based on the something they are property 2 in mobile authentication. The goal of biometric identification is that the automatic verification of identity of a living person by proving over some distinctive gestures that solely he possesses in authentication method.Figure1 Multitouch behaviorThe biometric authentication system has two phases enrollment phase and authentication phase. If new user must first record his secret hand signs at the first enrollment phase to the system. The process is performing the hand signs at the users discreet choice with sufficient space for hand effort during registration phase.Gesture Taxonomy 11. Parallel All fingertips are moving in the same directionduring the gesture. For example, a bush swipe, during which all 5 fingers move from left wing to right the screen.2. Closed If all fingertips are moving inward toward the core of the hand. For example, a pinch gesture.3. Opened All fingertips are moving outward from the center of the hand. For example, a reverse pinch gesture.4. Circular All fingertips are rotating around the center ofthe hand. For example, a clockwise or counterclockwiserotation 1.Figure1 Single touchMatching Touch Sequences to Specific FingersHidden Markov Models 3Hidden Markov Models (HMMs) are statistical forges and simplest versions of dynamic Bayesian Networks, where the system being modelled is a Markov process with an unobserved state. It is a collection of finite states connected by transitions, much like Bayesian Networks. Each state has two probabilities a transition probability, and an turnout probability distribution. Parameters of the model are determined by training data 45.Figure2 Hidden Markov Modelshidden states, as well as N dimens ional observable symbols.Figure3 Multitouch MovementThe received HMM is expressed as the following 4. HMM is the mathematical tool to model signals, objects that have the temporal structure and follow the Markov process. HMM can be described compactly as = (A, B, ) (Figure 4b) where,Figure 4 Conventional Hidden Markov ModelA = aij the state transition matrixaij=Pqt+1=sjqt=si,1iNaij=Pqt+1=sjqt=si,1iNB = bj (k) the observation symbol probability distributionbj(k)=POt=vkqt=sj,1jN,1kMbj(k)=POt=vkqt=sj,1jN,1kM = i the initial state distributioni=Pq1=sii=Pq1=siSet of states S = s1s2, , sNState at time t qtSet of symbols V = v1, v2, , vM stipulation the observation era OT1=O1O2OTO1T=O1O2OT and a model = (A,B,), how do we efficiently compute P(O ), i.e., the probability of the observation sequence given the model.Now let us exact following two states prepare based on the input data sequences O, we calculate and adjust = = to maximize likelihood P(O )Recognizing based on =(A ,B , )= (A,B,) for each class, we can then assign the class in which the likelihood P(O ) is maximized.The observation symbol probability distribution POt = vk qt = sj can be discrete symbols or free burning variables. If the observations are different symbols.B(i,k)=P(Ot=kqt=si)B(i,k)=P(Ot=kqt=si)If the observations are vectors in RL, it is common to represent POt qt as a GaussianPOt=yqt=si=N(yi,i)POt=yqt=si=(yi,i)N(y,)=1(2)L/21/2exp12(y)T1(y)(y,)=1(2)L/21/2exp12(y)T1(y)A more flexible representation is a mixture of M GaussiansPOt=yqt=si=m=1MP(Mt=mqt=si)--N(ym,i,m,i)POt=yqt=si=m=1MP(Mt=mqt=si)--(ym,i,m,i)where Mt is a hidden variable that specifies which mixture component to use and P(Mt=mqt=si) =C(i,m) is the conditional prior weight of each mixture component. In our approach, we both(prenominal) implement continuous and discrete output variable distribution for 1st and 2nd HMM stages respectively 36. propellent date distortDynamic Time Warping (DTW), introduced by Sakoe and Chiba in 1978, is an algorithm that compares two different sequences that may possibly vary in time. For example, if two scene clips of different people walking a particular path were compared, the DTW algorithm would detect the similarities in the walking pattern, despite walking speed differences, accelerations or decelerations. 37Figure 4 Dynamic time warpThe algorithm begins with a set of template streams, describing each gesture available in the system database. This results in high computation time, and hence, limitations in recognition speed. Additionally, the storing of many templates for each gesture results in costly space usage on a resource- confine device.Consider a training set of N sequences fS1 S2 SNg, where each Sg represents standard of the same gesture class. Then, each sequence Sg composed by a set of feature vectors at each time t, Sg = fsg1 sgLgg for a certain gesture category, where Lg is the distance in frames of sequence Sg. Let us assume that sequence s are ordered according to their length, so that Lgt1 _ Lg _ Lg+1 8g 2 2 N , the median length sequence is _ S = SdN2 e. This sequence _ S is used as a reference and the rest of sequences are aligned with it using the classical Dynamic Time Warping with Euclidean distance 4, in order to avoid the temporal deformations of various samples from an equivalent gesture class. Therefore, once the alignment method, all sequences have lengthLdN2 e.We define the set of warped sequences as S = f S1 S2 SNg. Consider a training set of N sequences fS1 S2 SNg, where each Sg represents a sample of the same gesture class. Then, each sequence Sg composed by a set of feature vectors at each time t, Sg = fsg1 sgLgg for a certain gesture category, where Lg is the length in frames of sequence Sg. Let us consider that sequences are ordered according to their length, so that Lgt1 _ Lg _ Lg+1 8g 2 2 N1, the median length sequence is _ S =SdN2 e4.This sequence _ S is used as a reference, and the remaining of sequences are assigned with it using the classical Dynamic Time Warping with Euclidean distance 3, in order to remove the temporal deformations of different samples from the same gesture category. Hence, after the alignment process, all sequences have lengthLdN2 e. We define the set of warped sequences as S = f S1 S2 SNg 3.Input A gesture C=c1,..cn with corresponding GMM model =1,..m, its similarly doorsill value , and the testing seprate Q=q1,..qn, Cost Matrix M is defined,where N(x), x =(i,t) is the set of three upper-left location of x in M.OutputWorking path of the dected gesture, if any.//Initializationfor i=1m dofor j=1 doM(i,j)=vendendfor j=1v doM(0,j)=0endfor t=0v dofor i=1m dox=(i,j)M(x)=D(qi,i)+min N()M()Endendif m(m,t)W=argmin N()M()ReturnEndend 4 false Neural NetworksArtificial Neural Networks (ANNs) are networks of weighted, directed graphs where the nodes are artificial nerve cells, and the directed edges are connections between them. The mo st common ANN structure is the feed forth Multi-Layer Perceptron. Feed forward means that the signals single travels one way through the net 48.For input pattern p, the i-th input bed node holds xp,i.Net input to j-th node in hidden shapeNow Output of j-th node in hidden layerThen Net input to k-th node in output layerFinally Output of k-th node in output layerNetwork error for pNeurons are arranged in layer wise, with the outputs of each neuron in the same layer being connected to the inputs of the neurons in that layer . Finally, the output layer neurons are assigned a value. Each output layer neuron show the particular class of gesture, and the record is assigned to however classs neuron has the highest value During training, the gesture class for each neuron in the output layer is known, and the nodes can be assigned the correct value.Critical AnalysisA critical analysis based on the results achieved by is shown in this section. ANNs, HMMs, and DTW algorithms were implemented on a mobile phone, and measured in performance according to recognition speed, accuracy and time needed to train 3. Since Bayesian Networks are a super class of HMMs which have been tweaked towards gesture classification, they are not considered. Thus according to recognition, accuracy and training time we can say that DTW gives better performance as compare to HMM and ANN. These results are summarized below delay 1 Comparison between different algorithms 3No.AlgorithmRecognition SpeedAccuracyTraining Time1HMMs10.5ms95.25%Long2ANNs23ms90%Medium3DTW8ms95.25%No TrainingFinger TrackingFirstly we need adjust finger tracking parameters, thats why we need to activate the calibration in the tab in on-screen display 59.a. Projection SignaturesProjection signatures are performed directly on the resulting threshold binary image of the hand 5. The core process of this algorithm is consists of adding the binary pixels row by row along a diagonal (the vertical in this case). Previous knowledge of the hand angle is therefore required. A low-pass filter is applied on the signature (row sums) in order to reduce low oftenness variations that create many local maxima and cause the problem of multiple peremptorys (more than one detection per fingertip). The five maxima thereby obtained correspond to the position of the five fingers.b. Geometric PropertiesThe gage algorithm is based on the geometric properties and, as shown on line 3 of figure 5, uses a contour image of the hand on which a reference point is set. This point can be determined either by finding the centre of mass of the contour (barycenter or centroid) or by fixing a point on the wrist 6.Figure 5 Hand MovementEuclidean distances from that point to every contour point are then computed, with the five resulting maxima assumed to correspond to the finger ends 5. The minima can be used to determine the intersections between fingers (finger valleys). The geometric algorithm also required filtering in order to reduce the problem of multiple positives. c. Circular Hough TransformThe circular Hough transform is applied on the contour image of the hand but could as well be performed on an edge image with complex priming coat if no elements of the image exhibit the circular shape of the fingertip radius. This can be make efficiently for finger ends by eliminating points that are found outside the contour image. The inconvenient is that the set of discard points contains a mix of finger valleys and false positive that cannot be sorted easily 5.d. Color MarkersWhile the three previous algorithms rely only on the hand characteristics to find and track the fingers, the marker algorithm tracks color markers attached to the main joints of the fingers. Each color is tracked individually using colour segmentation and filtering 5.This permits the identification of the different hand segments. The marker color should therefore be easy to track and should not affect the threshold, edge or contour image of the hand. Respecting these constraints makes it possible to apply all algorithms to the same video images and therefore to compare each algorithm degree of accuracy and precision with respect to the markers 5.ComparisonsPropertiesProjection SignatureGeometric PropertiesCircular Hough TransformColor MakersLocates fingers heavyGoodGoodGoodLocates fingertipsPoorNormalNormalGoodLocates finger ends and valleysPoorGoodGoodGoodWork with complex backgroundPoorGoodNormalGoodPrecisionGoodGoodGoodGoodAccuracyPoorGoodGoodGoodTable 2 Comparison between different techniques 5All the presented algorithms have succeeded, in various degrees, in detecting each finger. The projection signatures algorithm can only roughly identify a finger, but the circular Hough transform and geometric properties algorithms can find both finger intersections and finger end points, it is important to greenback that in the case where finger are folded, the end points dont correspond to the fingertips 5.ConclusionWe hav e plot three prominent strategies that comprehensively characterize the signal reference work that should be possible on advanced mobile phones Artificial Neural Networks, Dynamic Time Warping and Hidden Markov Models were optimized, and tested on resource constrained devices (in this instance, cellular phones), and compared against each other in terms of accuracy, and computational performance. ANNs proved to have the slowest computation performance due to the large size of the unquiet network. HMMs performed better, but the DTW algorithm proved to be the fastest, with comparable recognition accuracy. DTWs also did not require training, as is the case with HMMs and ANNs.References1 Kalyani Devidas Deshmane Android Software based Multi-touch Gestures Recognition for Secure Biometric Modality2 Memon, K. Isbister, N. Sae-Bae, N. and K. Ahmed, Multitouch gesture based authentication, IEEE Trans. Inf. Forensics Security, vol. 9, no. 4, pp. 568-582, Apr. 20143 Methods for Multi-touch Ge sture RecognitionDaniel Wood4 http//journals.sagepub.com/doi/full/10.5772/502045 Finger Tracking Methods Using EyesWeb Anne-Marie Burns1 and Barbara Mazzarino26https//www.cse.buffalo.edu/jcorso/t/CSE555/files/lecture_hmm.pdf7DWT Probability-based Dynamic Time Warping and Bag-of-Visual -and-Depth-Words for Human Gesture Recognition8https//en.wikipedia.org/wiki/Artificial_neural_network9http//whatis.techtarget.com/definition/gesture-recognitionProf. RamdasPandurang Bagawade,Miss Pournima Akash Chavan, BE ComputerPursuing degree in PESs College of Engineering Phaltan.Miss Kajal Kantilal Jadhav,BE ComputerPursuing degree in PESs College of Engineering Phaltan
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment