期刊文献+

手势识别身份认证的连续隐马尔可夫模型 被引量:5

Continuous Hidden Markov Model for Hand Gesture Recognition
下载PDF
导出
摘要 针对智能手机存储隐私信息所面临的安全问题,采用一种基于连续隐马尔科夫模型的手势识别身份认证方法.首先由手机触摸屏传感器采集手指滑动的原始手势特征序列,并通过大小归一化及平滑去噪预处理;接着提取手势运动轨迹的三个基本特征序列与三个隐含的特征序列;最后采用概率统计的方法,使用连续隐马尔科夫模型建立用户手势模型,用于测试比较特征序列以判断用户身份的合法性.仿真实验结果表明,与动态时间规整算法和支持向量机算法相比,方法具有较低的错误拒绝率和错误接受率,能明显提高身份认证的准确性. Aiming at the security problem of storing privacy information in smart phone, a method of hand gesture recognition based on continuous Hidden Markov Model is proposed. Firstly, the original gesture sequence of the finger sliding is collected by the touch- screen sensor of the mobile phone,and the gesture sequence will be preprocessed by using normalization and smoothing. Then the fea- tures, which are three basic feature sequences of the hand movement trajectory and three hidden feature sequences, will be extracted from the preprocessed sequence. Finally, a statistical method that is continuous Hidden Markov Model is adopted to establish the user gesture model, which will be extracted to test the feature sequence to determine the legitimacy of the user's identity. The simulation re- sults show that the proposed method has lower error rejection rate and false acceptance rate than that of the Dynamic Time Warping al- gorithm and Support Vector Machine algorithm, and can significantly improve the accuracy of identity authentication.
作者 李富 孙子文
出处 《小型微型计算机系统》 CSCD 北大核心 2018年第3期474-477,共4页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61373126)资助 中央高校基本科研业务费专项基金项目(JUSRP51510)资助
关键词 手势识别 身份认证 连续隐马尔可夫模型 手机传感器 gesture recognition identity authentication continuous hidden markov model mobile phone sensor
  • 相关文献

参考文献4

二级参考文献27

  • 1李进,张方国,王燕鸣.两个高效的基于分级身份的签名方案[J].电子学报,2007,35(1):150-152. 被引量:13
  • 2薛召军,李佳,明东,万柏坤.基于支持向量机的步态识别新方法[J].天津大学学报,2007,40(1):78-82. 被引量:15
  • 3胡帅.复杂场景下步态识别技术研究[D].哈尔滨:哈尔滨工程大学,2012.
  • 4WIENGARTEN F,HUMPHREYS P,McKITTRICK A,et al.Investigating the impact of e-business applications on supply chain collaboration in the German automotive industry[J].International Journal of Operation and Production Management,2013,33(1):25-48.
  • 5TANVI P,SONAL G,KUMAR S M.Token based authentication using mobile phone[C]//CSNT 2011:Proceedings of the 2011 International Conference on Communication Systems and Network Technologies.Piscataway:IEEE,2011:85-88.
  • 6De LUCA A,HANG A,BRUDY F,et al.Touch me once and I know it's you!:implicit authentication based on touch screen patterns[C]//CHI'12:Proceedings of the 2012 SIGCHI Conference on Human Factors in Computing Systems.New York:ACM,2012:987-996.
  • 7NANDINI C,RAVIKUMAR C N.Multi-biometrics approach for facial recognition[C]//CIMA 2007:Proceedings of the 2007 International Conference on Computational Intelligence and Multi-Media Applications.Piscataway:IEEE,2007,2:417-422.
  • 8TAN J,LAI J-H,WANG C-D,et al.A stroke shape and structure based approach for off-line Chinese handwriting identification[J].International Journal of Intelligent Systems and Applications,2011,3(2):1-8.
  • 9CHOWHAN S S,SHINDE G N.Iris biometrics recognition application in security management[C]//CISP 2008:Proceedings of the 2008 Congress on Image and Signal Processing.Piscataway:IEEE,2008,1:661-665.
  • 10GAFUROV D,HELKALA K,S?NDROL T.Biometric gait authentication using accelerometer sensor[J].Journal of Computers,2006,1(7):51-59.

共引文献19

同被引文献30

引证文献5

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部