Browse > Article
http://dx.doi.org/10.3837/tiis.2019.12.015

Study on gesture recognition based on IIDTW algorithm  

Tian, Pei (School of information engineering, Communication University of China)
Chen, Guozhen (School of information engineering, Communication University of China)
Li, Nianfeng (School of information engineering, Communication University of China)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.12, 2019 , pp. 6063-6079 More about this Journal
Abstract
When the length of sampling data sequence is too large, the method of gesture recognition based on traditional Dynamic Time Warping (DTW) algorithm will lead to too long calculation time, and the accuracy of recognition result is not high.Support vector machine (SVM) has some shortcomings in precision, Edit Distance on Real Sequences(EDR) algorithm does not guarantee that noise suppression will not suppress effective data.A new method based on Improved Interpolation Dynamic Time Warping (IIDTW)algorithm is proposed to improve the efficiency of gesture recognition and the accuracy of gesture recognition. The results show that the computational efficiency of IIDTW algorithm is more than twice that of SVM-DTW algorithm, the error acceptance rate is FAR reduced by 0.01%, and the error rejection rate FRR is reduced by 0.5%.Gesture recognition based on IIDTW algorithm can achieve better recognition status. If it is applied to unlock mobile phone, it is expected to become a new generation of unlock mode.
Keywords
Gesture password; Android sensor; IIDTW algorithm; Authentication; Mobile phone unlock;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Yang Zhenghui, Li Duo, "The Design and Implementation of a Fingerprint Lock Based on AS602," Chinese Journal of Electron Devices, 39(02), 495-500, 2016.   DOI
2 Deng, L.Y., Dong Liang Lee, Yi-Jen Liu, "Face Recognition Lock," in Proc. of 2013 International Conference on IT Convergence and Security (ICITCS), 2013.
3 Rodolf Haraksim, Javier Gallbally, Laurent Beslay, "Fingerprint Growth Model for Mitigating the Ageing Effect on Children's Fingerprints Matching," Pattern Recognition, 88, 614-628, 2019.   DOI
4 Javad Khodadoust, Ali Mohammad Khodadoust, Xiong Li, Saru Kumari, "Design and Implementation of a Multibiometric System Based on Hand's Traits," Expert System with Applications, 97, 303-314, 2018.   DOI
5 Li Zhengxin, Zhang Fengming, Li Kewu, Zhang Xiaofeng, "Index Structure for Multivariate Time Series under DTW Distance Metric," Journal of Software, 25(03), 560-575, 2014.
6 Cheng Xueqi, Jin Xiaolong, Wang Yuanzhuo, Guo Jiafeng, Zhang Tieying, Li Guojie, "Survey on Big Data System and Analytic Technology," Journal of Software, 25(09), 1889-1908, 2014.
7 Li Nianfeng, "Research of The Gesture Authentication Method Based on Android and Its Realization," Beijing:School of Electronic Information Engineering, Communication University of China, 37-38, 2018.
8 Zhang Jinxue, Zhang Ming, Li Yuanyuan, "Quaternion - Based Attitude Control of Fixed-wing Micro Air Vehicle," Computer Measurement & Control, 20(07), 1851-1854, 2012.
9 Luo Tianhong, Ma Li, "Path Planning for Spider Biomimetic Robot Leg based on Cubic Polynomial Interpolation Function with Midpoints," Mechanical Drive, 41(07), 1-6, 2017.
10 Chen Yue, Ding Lingwei, Wu Hongxuan, Liu Guohai, Liu Hui, "Power Quality Signal Reconstruction of Backtracking-Based Self-Adaptive Matching Pursuit Method," Journal of Electronic Measurement and Instrumentation, 31(05), 731-738, 2017.
11 Li Jing, Song Jing, Long Pengcheng, Liu Hongfei, Jiang Ping, "Parallel Computing Method of Monte Carlo Criticality Calculation Based on Bi-directional Traversal," Nuclear Techniques, 38(06), 95-98, 2015.
12 Liu Shushu, Liu An, Liu Guanfeng, Li Zhixu, Zhao Lei, Zheng Kai, "A Privacy Preserving Framework for Efficient Computation of Trajectory Similarity," Journal of East China Normal University(Natural Science), 2015(05), 154-161+171, 2015.
13 Zhao Lei, Zhou Yimin, "A Gesture Recognition Based on Improved DTW-IMP Algorithm," Software Guide, 16(11), 12-15+21, 2017.
14 Lu Gang, Nie Xuyun, Qin Zhiguang, Hou Chuanyong, "Cryptanalysis of a Multivariate Public Key Cryptosystem," Journal of University of Electronic Science and Technology of China, 47(02), 242-246, 2018.
15 Li Qingwu, Ma Yunpeng, Zhou Yan, Zhou Liangji, "Method of Writer Identification Based on Curvature of Strokes," Journal of Chinese Information Processing, 30(05), 209-214, 2016.   DOI
16 Huang Yiming, Lei Hang, Zhou Rui, Sang Nan, "Activity and Holding Mode Recognition Using Multiple Sensors," Journal of University of Electronic Science and Technology of China, 46(02), 399-406, 2017.
17 Yan Lindong, "Combined with the "Eight Principles of Yong" Analysis the Rationality of the Regular Script Writing Action," China Academy of Art, 2017.
18 Xianjing MENG, Xiaoming XI, Gongping YANG, Yilong YIN, "Finger vein recognition based on deformation information," Science China(Information Sciences, 61(05), 156-170, 2018.