Thursday, April 4, 2019
Multitouch Gesture Generation and Recognition Techniques
Multi get hold of Gesture genesis and quotation TechniquesAbstract A huge number of drug abusers be using smart phones to communicate with apiece other. A smart phone user is exposed to various threats when they use their phone for communication. These threats can disorganization the operation of the smart phone, and transmit or modify user data rather than original 1. So applications must guarantee privacy and integrity of the information. Single touch bustling security is unable to take in efficient performance for unavowed data. Hence we be move towards multitouch mobile security for high security. In com effectuateing, multi-touch is authentication technology that enables a surface to recognize the presence of more than one touch points of extend to with the touch classify 2. By using multiple touch points to authenticate user for access confidential data in mobile phones. we ar presenting our study about biometric movements to authenticate user through with(pred icate) multitouch fingers breadth points for more security 1.Keywords Multitouch, biometric motility, authentication, security, smart phone figure-tracking, Android Operating system.IntroductionTodays IT admins face the troublesome undertaking of managing the unnumberable amounts of mobile devices that connect with enterprise ne 2rks a day for communication through network. Securing mobile devices has make out increasingly important now days as the numbers of the devices in operation and the uses to which they ar put have expanded in world wide. The problem is compounded within the enterprise as the current trend toward IT users or organizations is resulting in more and umteen more employee-owned devices connecting to the corporate internet. Authentication is a zilch but process in which the credentials provided are compared to those on file in a database of legal users information on a operating system. If the credentials match, the process is completed and the user is gr anted authorisation for access to the system. The permissions and folders came back outline to separately one the surroundings the user sees and also the method he bequeath move with it, as well as the amount of access and unlike rights comparable to(predicate) to the number of administer cupboard space and different services 1.The more often than not a computer authentication process is to use alphanumerical usernames or text based and passwords. This method has been shown to have somedisadvantages. For example, users tend to pick passwords that can be easily guessed and recognized by other hard to remember. To device this problem, some researchers have actual authentication techniques that use multitouch biometric communicate as passwords for authentication.Multi-touch, in a computing environment, is an interface technology that enables insert gestures on multiple points on the surface of a device. Although most generally use with touch screen devices on make itheld devi ces, such as smart phones and tablets, and other multi-touch has been used for other surfaces as well, including touch pads and whiteboards, tables and walls 2.In other words, multi-touch refers to the capability of a touch screen (or a touchpad) to recognize two or more points of contact on the surface simultaneously. The constant come aftering of the multiple points permits the portable interface to mark gestures, that modify advanced practicality similar to pinch-to-zoom, pinch. wherever gesture realization is much of deciphering human gestures via mathematical algorithms. Gestures go out originate from any bodily motion however normally originate from the face or hand and alternative human biometric gestures but the identification and recognition of posture, and human behaviours is additionally the topic of gesture recognition techniques.We used Equal Error station (EER) to measure accuracy. This is the rate at which False Acceptance Rate (FAR) and False Rejection Rate (FRR ). To find out whether using multiple gestures would improve the systems performance, we combined scores of 2 different gestures from the comparable user in the same order and evaluated the EER of the combined gestures asFAR=FRR= developing a Gesture Authentication TechniqueBiometric systems are an effective way to authenticate valid users generally based on the something they are property 2 in mobile authentication. The goal of biometric identification is that the automatic deterrent of identity of a living person by proving over some distinctive gestures that solely he possesses in authentication method.Figure1 Multitouch behaviorThe biometric authentication system has two configurations enrollment phase and authentication phase. If in the raw user must first book his secret hand signs at the first enrollment phase to the system. The process is performing the hand signs at the users discreet choice with sufficient space for hand suit during registration phase.Gesture Taxonom y 11. Parallel All fingertips are moving in the same directionduring the gesture. For example, a bush swipe, during which all 5 fingers move from left to right the screen.2. Closed If all fingertips are moving inward toward the centralize of the hand. For example, a pinch gesture.3. Opened All fingertips are moving outward from the center of the hand. For example, a reverse pinch gesture.4. neb All fingertips are rotating around the center ofthe hand. For example, a dextrorotatory or counterclockwiserotation 1.Figure1 Single touchMatching Touch Sequences to Specific Fingers mysterious Markov representatives 3Hidden Markov Models (HMMs) are statistical models and simplest versions of dynamic Bayesian canworks, where the system being modelled is a Markov process with an unobserved state. It is a collection of finite states connected by transitions, much like Bayesian Networks. Each state has two probabilities a transition probability, and an make probability scattering. Paramet ers of the model are determined by instruct data 45.Figure2 Hidden Markov Modelshidden states, as well as N dimensional observable symbols.Figure3 Multitouch MovementThe conventional HMM is expressed as the following 4. HMM is the mathematical tool to model signals, objects that have the temporal structure and follow the Markov process. HMM can be described compactly as = (A, B, ) (Figure 4b) where,Figure 4 Conventional Hidden Markov ModelA = aij the state transition matrixaij=Pqt+1=sjqt=si,1iNaij=Pqt+1=sjqt=si,1iNB = bj (k) the observation symbol probability distributionbj(k)=POt=vkqt=sj,1jN,1kMbj(k)=POt=vkqt=sj,1jN,1kM = i the initial state distributioni=Pq1=sii=Pq1=siSet of states S = s1s2, , sNState at snip t qtSet of symbols V = v1, v2, , vM habituated the observation epoch OT1=O1O2OTO1T=O1O2OT and a model = (A,B,), how do we efficiently compute P(O ), i.e., the probability of the observation succession given the model.Now let us consider following two states prepare b ased on the input data sequences O, we calculate and adjust = = to maximize likelihood P(O )Recognizing based on =(A ,B , )=(A,B,) for each class, we can then assign the class in which the likelihood P(O ) is maximized.The observation symbol probability distribution POt = vk qt = sj can be discrete symbols or continuous variables. If the observations are different symbols.B(i,k)=P(Ot=kqt=si)B(i,k)=P(Ot=kqt=si)If the observations are vectors in RL, it is rough-cut to represent POt qt as a GaussianPOt=yqt=si=N(yi,i)POt=yqt=si=(yi,i)N(y,)=1(2)L/21/2exp12(y)T1(y)(y,)=1(2)L/21/2exp12(y)T1(y)A more flexible representation is a diverseness of M GaussiansPOt=yqt=si=m=1MP(Mt=mqt=si)--N(ym,i,m,i)POt=yqt=si=m=1MP(Mt=mqt=si)--(ym,i,m,i)where Mt is a hidden variable that specifies which mixture component to use and P(Mt=mqt=si) =C(i,m) is the conditional prior weight of each mixture component. In our approach, we both(prenominal) implement continuous and discrete produce variable distri bution for 1st and 2nd HMM stages respectively 36. propellant clock Warping dynamic Time Warping (DTW), introduced by Sakoe and Chiba in 1978, is an algorithm that compares two different sequences that may possibly vary in time. For example, if two video clips of different people walking a particular path were compared, the DTW algorithm would detect the similarities in the walking pattern, despite walking speed differences, accelerations or decelerations. 37Figure 4 Dynamic time warpingThe algorithm begins with a set of template streams, describing each gesture available in the system database. This results in high tally time, and hence, limitations in recognition speed. Additionally, the storing of many templates for each gesture results in costly space usage on a resource- constrain device.Consider a training set of N sequences fS1 S2 SNg, where each Sg represents sample of the same gesture class. Then, each sequence Sg represent by a set of feature vectors at each time t, Sg = fsg1 sgLgg for a certain gesture category, where Lg is the length in frames of sequence Sg. Let us assume that sequences are ordered according to their length, so that Lgt1 _ Lg _ Lg+1 8g 2 2 N , the median length sequence is _ S = SdN2 e. This sequence _ S is used as a reference and the rest of sequences are aligned with it using the classical Dynamic Time Warping with Euclidean distance 4, in order to avoid the temporal deformations of various samples from an equivalent gesture class. Therefore, once the alignment method, all sequences have lengthLdN2 e.We define the set of warped sequences as S = f S1 S2 SNg. Consider a training set of N sequences fS1 S2 SNg, where each Sg represents a sample of the same gesture class. Then, each sequence Sg composed by a set of feature vectors at each time t, Sg = fsg1 sgLgg for a certain gesture category, where Lg is the length in frames of sequence Sg. Let us consider that sequences are ordered according to their leng th, so that Lgt1 _ Lg _ Lg+1 8g 2 2 N1, the median length sequence is _ S =SdN2 e4.This sequence _ S is used as a reference, and the remaining of sequences are assigned with it using the classical Dynamic Time Warping with Euclidean distance 3, in order to remove the temporal deformations of different samples from the same gesture category. Hence, after the alignment process, all sequences have lengthLdN2 e. We define the set of warped sequences as S = f S1 S2 SNg 3.Input A gesture C=c1,..cn with corresponding GMM model =1,..m, its similarly wand value , and the testing seprate Q=q1,..qn, Cost Matrix M is defined,where N(x), x =(i,t) is the set of terzetto upper-left location of x in M.OutputWorking path of the dected gesture, if any.//Initializationfor i=1m dofor j=1 doM(i,j)=vendendfor j=1v doM(0,j)=0endfor t=0v dofor i=1m dox=(i,j)M(x)=D(qi,i)+min N()M()Endendif m(m,t)W=argmin N()M()ReturnEndend 4 unlifelike Neural NetworksArtificial Neural Networks (ANNs) are network s of weighted, directed graphs where the nodes are artificial neurons, and the directed edges are connections mingled with them. The most common ANN structure is the feed forward Multi-Layer Perceptron. Feed forward means that the signals only travels one way through the net 48.For input pattern p, the i-th input layer node holds xp,i.Net input to j-th node in hidden layerNow Output of j-th node in hidden layerThen Net input to k-th node in output layerFinally Output of k-th node in output layerNetwork error for pNeurons are arranged in layer wise, with the outputs of each neuron in the same layer being connected to the inputs of the neurons in that layer . Finally, the output layer neurons are assigned a value. Each output layer neuron show the particular class of gesture, and the record is assigned to however classs neuron has the highest value During training, the gesture class for each neuron in the output layer is known, and the nodes can be assigned the correct value.Critica l AnalysisA critical psychoanalysis based on the results achieved by is shown in this section. ANNs, HMMs, and DTW algorithms were implemented on a mobile phone, and measured in performance according to recognition speed, accuracy and time needed to train 3. Since Bayesian Networks are a super class of HMMs which have been tweaked towards gesture classification, they are not considered. Thus according to recognition, accuracy and training time we can say that DTW gives better performance as compare to HMM and ANN. These results are summarized below circuit board 1 Comparison between different algorithms 3No.Algorithm information SpeedAccuracyTraining Time1HMMs10.5ms95.25%Long2ANNs23ms90%Medium3DTW8ms95.25%No TrainingFinger TrackingFirstly we need adjust finger tracking parameters, thats why we need to activate the standardisation in the tab in on-screen display 59.a. Projection SignaturesProjection signatures are performed directly on the resulting threshold binary get wind of th e hand 5. The core process of this algorithm is consists of adding the binary pixels course of instruction by row along a diagonal (the vertical in this case). Previous knowledge of the hand angle is therefore required. A low-pass filter is applied on the signature (row sums) in order to reduce low frequency variations that create many local maxima and cause the problem of multiple verifyings (more than one detection per fingertip). The five maxima thereby obtained correspond to the position of the five fingers.b. Geometric PropertiesThe second algorithm is based on the geometric properties and, as shown on line 3 of figure 5, uses a contour image of the hand on which a reference point is set. This point can be determined either by finding the pump of mass of the contour (barycenter or centroid) or by fixing a point on the articulatio radiocarpea 6.Figure 5 Hand MovementEuclidean distances from that point to every contour point are then computed, with the five resulting maxima assumed to correspond to the finger ends 5. The minima can be used to determine the intersections between fingers (finger valleys). The geometric algorithm also required filtering in order to reduce the problem of multiple positives. c. Circular Hough TransformThe neb Hough transform is applied on the contour image of the hand but could as well be performed on an edge image with complex background if no elements of the image abut the circular shape of the fingertip radius. This can be done efficiently for finger ends by eliminating points that are effect outside the contour image. The inconvenient is that the set of discard points contains a mix of finger valleys and false positive that cannot be sorted easily 5.d. Color MarkersWhile the three previous algorithms rely only on the hand characteristics to find and track the fingers, the marker algorithm tracks modify markers attached to the main joints of the fingers. Each color is tracked individually using colour segmentation an d filtering 5.This permits the identification of the different hand segments. The marker colour should therefore be easy to track and should not affect the threshold, edge or contour image of the hand. Respecting these constraints makes it possible to apply all algorithms to the same video images and therefore to compare each algorithm arcdegree of accuracy and precision with respect to the markers 5.ComparisonsPropertiesProjection SignatureGeometric PropertiesCircular Hough TransformColor MakersLocates fingers trusty bullyGoodGoodLocates fingertipsPoorNormalNormalGoodLocates finger ends and valleysPoorGoodGoodGoodWork with complex backgroundPoorGoodNormalGood clearcutnessGoodGoodGoodGoodAccuracyPoorGoodGoodGood put over 2 Comparison between different techniques 5All the presented algorithms have succeeded, in various degrees, in discover each finger. The projection signatures algorithm can only roughly identify a finger, but the circular Hough transform and geometric properties algorithms can find both finger intersections and finger end points, it is important to tune that in the case where finger are folded, the end points dont correspond to the fingertips 5.ConclusionWe have plot three prominent strategies that comprehensively characterize the signal acknowledgment that should be possible on advanced mobile phones Artificial Neural Networks, Dynamic Time Warping and Hidden Markov Models were optimized, and tested on resource constrained devices (in this instance, cellular phones), and compared against each other in terms of accuracy, and computational performance. ANNs proved to have the slowest computation performance due to the large size of the neural network. HMMs performed better, but the DTW algorithm proved to be the fastest, with comparable recognition accuracy. DTWs also did not require training, as is the case with HMMs and ANNs.References1 Kalyani Devidas Deshmane Android Software based Multi-touch Gestures Recognition for Secure Biometric M odality2 Memon, K. Isbister, N. Sae-Bae, N. and K. Ahmed, Multitouch gesture based authentication, IEEE Trans. Inf. Forensics Security, vol. 9, no. 4, pp. 568-582, Apr. 20143 Methods for Multi-touch Gesture RecognitionDaniel Wood4 http//journals.sagepub.com/doi/ affluent/10.5772/502045 Finger Tracking Methods Using EyesWeb Anne-Marie Burns1 and Barbara Mazzarino26https//www.cse.buffalo.edu/jcorso/t/CSE555/files/lecture_hmm.pdf7DWT Probability-based Dynamic Time Warping and Bag-of-Visual -and-Depth-Words for Human Gesture Recognition8https//en.wikipedia.org/wiki/Artificial_neural_network9http//whatis.techtarget.com/definition/gesture-recognitionProf. RamdasPandurang Bagawade,Miss Pournima Akash Chavan, BE ComputerPursuing degree in PESs College of Engineering Phaltan.Miss Kajal Kantilal Jadhav,BE ComputerPursuing degree in PESs College of Engineering Phaltan
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.