期刊文献+

基于HMM与D-S证据理论的手势身份认证方法 被引量:1

Gesture Authentication Method Based on HMM and D-S Evidence Theory
下载PDF
导出
摘要 文章针对智能手机用户个人隐私及信息面临的安全问题,提出了一种基于HMM和D-S证据理论的手势身份认证方法。首先通过智能手机触摸屏传感器采集手势运动轨迹的原始数据并进行预处理,提取手势特征序列作为HMM的观察序列,建立合法用户手势模型;然后将测试手势特征序列与手势模型进行匹配计算获取初步判断结果 ;最后采用D-S证据理论组合规则得到融合后的概率分配函数进行最终的认证决策。仿真实验表明,文中方法与其他方法相比可有效提高手势身份认证的精度。 Aiming at the security problems of smart phone users' privacy and information, a gesture recognition identity authentication method based on HMM and D-S evidence theory is adopted. Firstly, the original data of the gesture trajectory is collected by the touch screen sensor of the smart phone, the gesture feature sequence is preprocessed and extracted as the observation sequence of the HMM, and a legal user gesture model is established. Secondly, the preliminary judgment result is obtained by matching the test gesture feature sequence and the gesture model, and then use D-S evidence theory combination rules to get the fusion probability distribution function for the final certification decision. Simulation results show that compared with other methods, this method can effectively improve the accuracy of gesture recognition authentication.
作者 孙子文 李富 SUN Ziwen;LI Fu(School of lnternet of Things Engineering,Jiangnan University,Wuxi Jiangsu 214122,China;Engineering Research Center of lnternet of Things Technology Applications,Ministry of Education,Wuxi Jiangsu 214122,China)
出处 《信息网络安全》 CSCD 北大核心 2018年第10期17-23,共7页 Netinfo Security
基金 国家自然科学基金[61373126] 中央高校基本科研业务费专项资金[JUSRP51510]
关键词 手势识别 身份认证 HMNI D—S证据理论 手机传感器 gesture recognition identity authentication HMM D-S evidence theory mobile sensor
  • 相关文献

参考文献3

二级参考文献53

  • 1Solanki K, Sarkar A, Manjunath B S. YASS: Yet another steganographic scheme that resists blind steganalysis[C]. Lecture Notes in Computer Science. Berlin: Springer, 2007, 4567: 16-31.
  • 2Sarkar A, Solanki K, Manjunath B S. Further study on YASS: Steganography based on randomized embedding to resist blind steganalysis[C]. Proc of SPIE-IS&T Electronic Imaging, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X. San Jose: SPIE Press, 2008, 6819-681917:1-11.
  • 3Kharrazi M, Sencar H, Memon N. Improving steganalysis by fusion techniques: A case study with image steganalysis[C]. Proc of SPIE. San Jose: SPIE Press, 2006: 123-137.
  • 4Andrew D K. A fusion of maximum likelihood and structural steganalysis[C]. Lecture Notes in Computer Science. Berlin: Springer, 2007, 4567: 204-219.
  • 5Benjamin M R, Gilbert L E Sos S A. Multi-class classifi-cation averaging fusion for detecting steganography[C]. Proc of IEEE Int Conf on System of Systems Engineering. Washington DC: IEEE, 2007: 1-5.
  • 6Rodriguez B, Peterson G, Bauer K. Fusion of steganalysis systems using Bayesian model averaging[C]. IFIP Int Federation for Information Processing. Boston: Springer, 2008: 345-355.
  • 7Dong J, Chen X C, Guo L, et al. Fusion based blind image steganalysis by boosting feature selection[C]. LectureNotes in Computer Science. Berlin: Springer, 2008, 5041: 87-98.
  • 8Sun Z W, Hui M M, Guan C. Steganalysis based on co-occurrence matrix of differential image[C]. Proc of IIHMSP 2008. Harbin, 2008: 15-17.
  • 9Rocha A, Goldenstein S, Scheirer W, et al. The unseen challenge data sets[C]. IEEE Computer Society Conf on Computer Vision and Pattern Recognition Workshops. Washington DC: IEEE Computer Society, 2008: 1-8.
  • 10Chang C C, Lin C J. LIBSVM: A library for Support Vector Machines[EB/OL]. [2008-09-10]. http://www.csie. ntu.edu.tw/cjlin/libsvm.

共引文献24

同被引文献14

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部