SlideShare uma empresa Scribd logo
1 de 33
Technical seminar on
IMPROVED HAND TRACKING
        SYSTEM

       Presented by


      KISHOR M N
       Dept. of CSE



               2013/3/6   1
Outline
 Introduction
 Existing methods
 Proposed Hand Detection System
 Ada Boosting for real time Hand
  detection
 Foreground detection
 Hand Tracking Methodology
 Experimental Results

                 2013/3/6           2
Introduction
 Hand Postures are powerful means
  for communication among humans on
  communicating.
 Many applications are designed by
  using the motion of hand.
 The hand tracking is rather difficult
  because most of the backgrounds
  change across frames.


                  2013/3/6                3
Existing methods
1) Kolsch and turk proposed a method
   to
   detect a hand using image cues and
   probability distribution.

  Method used: Pyramid based
  kanade lucas tomasi feature
  tracking.

  Disadv: It cannot classify wooden
  object that are present in the
                   2013/3/6             4
Existing methods
2) Zhu,yang proposed a method in
 which each pixel in image is classified
 as either hand pixel or background
 pixel.

 Method used:Hand segmentation
 based on Bayes decision theory and
 Gaussian mixture model.

 Disadv: It cannot distinguish
 multitargets in an image and error rate
                   2013/3/6                5
Existing methods
3) Binh and Ejima applied skin color tracking
  for face detection to extract the hand
  region by separating hand from face.

 Method used: Skin color tracking and other
 models.

 Disadv: It cannot distinguish between skin
 region or some object with similar color or
 shape as the hand
                      2013/3/6                 6
Proposed system
 Local binary pattern (LBP) is one of
  the powerful features with low
  computation.
 Chen et al.’s work called Haar-like
  feature was adopted for hand
  detection.
 This paper proposed to combine the
  novel pixel-based hierarchical-feature
  for AdaBoosting (PBHFA), skin color
  detection, and codebook (CB)
  foreground detection model to locate a
  hand in real time.
                  2013/3/6             7
Proposed system




            2013/3/6   8
Proposed system




            2013/3/6   9
Proposed PBH Features
   AdaBoost is employed to select those
    few best features from a huge number
    of features.

   The PBH features can significantly
    reduce the training time for hand
    detection than normal features.



                     2013/3/6              10
Proposed PBH Features
Step 1) Given a training positive and negative
        samples Xi,Xj of size M × N.
Step 2) Process the samples with the
histogram equalization to reduce the
influence of         lighting effect.
Step 3) Calculate the average value Ti of
each sample Xi and use Ti as a threshold
for     binarizing the corresponding Xi to
yield a        binary image Bi.
Step 4) Given Bi, calculate the probability of
black          pixel occurrence at each
position (x, y)       and        obtain P(x, y).
                       2013/3/6                    11
Proposed PBH Features
Step 5) All possible features Fj in a M×N
             subwindow can be produced
 according to            the order table O(x,
 y).



Step 6) Finally, these features and the
 training           image Xi and Xj are fed
 into the AdaBoost              algorithm.
 Each PBH feature can be
 considered as a weak classifier.
                      2013/3/6                  12
Proposed PBH Features




            2013/3/6    13
AdaBoosting for Real-Time
Hand Detection
 Aim of boosting is to improve the
  classification performance of any
  given learning algorithm.
 This phase includes many
  classifiers;each weak classifier ht is
  made from a feature
  ft and threshold Øt


    where Pt denotes the polarity used for indicating the direction
    of the inequality.
                                2013/3/6                          14
AdaBoosting for Real-Time
Hand Detection
• A strong classifier can be obtained by
  combining the selected weak
classfiers
  from the AdaBoosting and which can
be
 recognized as follows




                    2013/3/6               15
Strong classifier




               2013/3/6   16
HSV Color Space
 A detected hand by the PBH-
  AdaBoost algorithm is further filtered
  by skin color to reduce false positive.
 HSV color model which is robust to
  lighting change is adopted for skin
  color localization.
 Advantages of this color model in skin
  color segmentation is that it allows
  users to intuitively specify the
  boundary of the hue and saturation.

                    2013/3/6                17
HSV Color Space
•The hue and saturation are set in
between
0° and 5° and 0.23 to 0.68, respectively,
as
specified in.




                   2013/3/6             18
Foreground Detection
 One of the popular method in foreground
  detection is the mixture of Gaussian(MoG).
   yet this method has some disadvantages
  they are overcome by CB model.
 Kim et al. [2] proposed the CB model for
  foreground detection.
 The concept of the CB is to train
  background pixel pixelwise over a period
  of time. Sample values at each pixel are
  clustered as a set of codewords. The
  combination of multiple codewords can
                     2013/3/6             19
Foreground
Detection




         2013/3/6   20
Foreground Detection
 To solve the “still object” problem, a
  “buffer” is employed to store the
  history of each tracking target. This
  buffer is updated frame by frame.
 If one target is detected and tracking,
  the value in buffer associates to the
  frame that is set as 1.



                    2013/3/6                21
Foreground Detection




           2013/3/6    22
Hand Tracking Methodology
 Hand tracking phase is the second
  step after hand detection.
 Referenced algorithms can be
  classified into below categories
    1) point tracking
    2) kernal tracking
    3) silhouette tracking
 Proposed method uses Euclidean
   disatnce to track hand.

                  2013/3/6            23
Hand Tracking Methodology
   Eucledian distance is calculated as
    follows



   dist1(x, y) < r1.




                        2013/3/6          24
Experimental Results
 In this paper, the public Sebastien
  Marcel’s hand posture database [3].
 including “A,” “B,” “C,” “Point,” “Five,”
  and “V”




                      2013/3/6                25
Experimental Results




         2013/3/6      26
Experimental Results




         2013/3/6      27
Experimental Results
    Hand tracking results




             2013/3/6       28
Experimental Results




         2013/3/6      29
Experimental Results

Pyramid
based KST
feature
tracking


Appearenc
e based
approach

Proposed
system




                    2013/3/6      30
Conclusion
 Hand tracking system was proposed by
  using the PBHFA, skin color segmentation,
  and CB model.
 The goal is to use PBH feature to reduce the
  required training time and further reduce the
  required computation in tracking phase.
 According to the experimental results, the
  above tasks were achieved, meanwhile the
  tracking accuracy was still maintained in
  high level as that of the Haar like feature.

                      2013/3/6                31
References
1)   M. Kolsch and M. Turk, “Fast 2D hand tracking
     with flocks of features and multi-cue integration,”
     in Proc. CVPRW, vol. 10. Jun. 2004, p. 158.
2)   K. Kim, T. H. Chalidabhongse, D. Harwood, and L.
     Davis, “Real-time foreground-background
     segmentation using codebook model,” Real- Time
     Imag., vol. 11, no. 3, pp. 172–185, Jun. 2005.
3)   Hand Posture Database [Online]. Available:
     http://www.idiap.ch/ resources/gestures
4)   Jing-Ming Guo, “Effective Hand Posture
     Recognition System with Hierarchical-Feature
     Adaboosting and Feature Reserving Average
     Mask”
                           2013/3/6                    32
THANK YOU



     2013/3/6   33

Mais conteúdo relacionado

Mais procurados

HOL, GDCT AND LDCT FOR PEDESTRIAN DETECTION
HOL, GDCT AND LDCT FOR PEDESTRIAN DETECTIONHOL, GDCT AND LDCT FOR PEDESTRIAN DETECTION
HOL, GDCT AND LDCT FOR PEDESTRIAN DETECTIONcsandit
 
A Framework for Curved Videotext Detection and Extraction
A Framework for Curved Videotext Detection and ExtractionA Framework for Curved Videotext Detection and Extraction
A Framework for Curved Videotext Detection and ExtractionIJERA Editor
 
VEHICLE RECOGNITION USING VIBE AND SVM
VEHICLE RECOGNITION USING VIBE AND SVM VEHICLE RECOGNITION USING VIBE AND SVM
VEHICLE RECOGNITION USING VIBE AND SVM cseij
 
Leader follower formation control of ground vehicles using camshift based gui...
Leader follower formation control of ground vehicles using camshift based gui...Leader follower formation control of ground vehicles using camshift based gui...
Leader follower formation control of ground vehicles using camshift based gui...ijma
 
Color Constancy For Improving Skin Detection
Color Constancy For Improving Skin DetectionColor Constancy For Improving Skin Detection
Color Constancy For Improving Skin DetectionCSCJournals
 
People counting in low density video sequences2
People counting in low density video sequences2People counting in low density video sequences2
People counting in low density video sequences2Ahmed Tememe
 
Strategy for Foreground Movement Identification Adaptive to Background Variat...
Strategy for Foreground Movement Identification Adaptive to Background Variat...Strategy for Foreground Movement Identification Adaptive to Background Variat...
Strategy for Foreground Movement Identification Adaptive to Background Variat...IJECEIAES
 
07 18sep 7983 10108-1-ed an edge edit ari
07 18sep 7983 10108-1-ed an edge edit ari07 18sep 7983 10108-1-ed an edge edit ari
07 18sep 7983 10108-1-ed an edge edit ariIAESIJEECS
 
Iris Localization - a Biometric Approach Referring Daugman's Algorithm
Iris Localization - a Biometric Approach Referring Daugman's AlgorithmIris Localization - a Biometric Approach Referring Daugman's Algorithm
Iris Localization - a Biometric Approach Referring Daugman's AlgorithmEditor IJCATR
 
Enhanced Spectral Reflectance Reconstruction Using Pseudo-Inverse Estimation ...
Enhanced Spectral Reflectance Reconstruction Using Pseudo-Inverse Estimation ...Enhanced Spectral Reflectance Reconstruction Using Pseudo-Inverse Estimation ...
Enhanced Spectral Reflectance Reconstruction Using Pseudo-Inverse Estimation ...CSCJournals
 
APPLYING R-SPATIOGRAM IN OBJECT TRACKING FOR OCCLUSION HANDLING
APPLYING R-SPATIOGRAM IN OBJECT TRACKING FOR OCCLUSION HANDLINGAPPLYING R-SPATIOGRAM IN OBJECT TRACKING FOR OCCLUSION HANDLING
APPLYING R-SPATIOGRAM IN OBJECT TRACKING FOR OCCLUSION HANDLINGsipij
 
OFFLINE SIGNATURE VERIFICATION USING SUPPORT LOCAL BINARY PATTERN
OFFLINE SIGNATURE VERIFICATION USING SUPPORT LOCAL BINARY PATTERNOFFLINE SIGNATURE VERIFICATION USING SUPPORT LOCAL BINARY PATTERN
OFFLINE SIGNATURE VERIFICATION USING SUPPORT LOCAL BINARY PATTERNijaia
 
HSV Brightness Factor Matching for Gesture Recognition System
HSV Brightness Factor Matching for Gesture Recognition SystemHSV Brightness Factor Matching for Gesture Recognition System
HSV Brightness Factor Matching for Gesture Recognition SystemCSCJournals
 
A Novel Learning Formulation in a unified Min-Max Framework for Computer Aide...
A Novel Learning Formulation in a unified Min-Max Framework for Computer Aide...A Novel Learning Formulation in a unified Min-Max Framework for Computer Aide...
A Novel Learning Formulation in a unified Min-Max Framework for Computer Aide...IOSR Journals
 
Further Improvements of CFA 3.0 by Combining Inpainting and Pansharpening Tec...
Further Improvements of CFA 3.0 by Combining Inpainting and Pansharpening Tec...Further Improvements of CFA 3.0 by Combining Inpainting and Pansharpening Tec...
Further Improvements of CFA 3.0 by Combining Inpainting and Pansharpening Tec...sipij
 

Mais procurados (16)

HOL, GDCT AND LDCT FOR PEDESTRIAN DETECTION
HOL, GDCT AND LDCT FOR PEDESTRIAN DETECTIONHOL, GDCT AND LDCT FOR PEDESTRIAN DETECTION
HOL, GDCT AND LDCT FOR PEDESTRIAN DETECTION
 
A Framework for Curved Videotext Detection and Extraction
A Framework for Curved Videotext Detection and ExtractionA Framework for Curved Videotext Detection and Extraction
A Framework for Curved Videotext Detection and Extraction
 
VEHICLE RECOGNITION USING VIBE AND SVM
VEHICLE RECOGNITION USING VIBE AND SVM VEHICLE RECOGNITION USING VIBE AND SVM
VEHICLE RECOGNITION USING VIBE AND SVM
 
Leader follower formation control of ground vehicles using camshift based gui...
Leader follower formation control of ground vehicles using camshift based gui...Leader follower formation control of ground vehicles using camshift based gui...
Leader follower formation control of ground vehicles using camshift based gui...
 
Color Constancy For Improving Skin Detection
Color Constancy For Improving Skin DetectionColor Constancy For Improving Skin Detection
Color Constancy For Improving Skin Detection
 
People counting in low density video sequences2
People counting in low density video sequences2People counting in low density video sequences2
People counting in low density video sequences2
 
Strategy for Foreground Movement Identification Adaptive to Background Variat...
Strategy for Foreground Movement Identification Adaptive to Background Variat...Strategy for Foreground Movement Identification Adaptive to Background Variat...
Strategy for Foreground Movement Identification Adaptive to Background Variat...
 
07 18sep 7983 10108-1-ed an edge edit ari
07 18sep 7983 10108-1-ed an edge edit ari07 18sep 7983 10108-1-ed an edge edit ari
07 18sep 7983 10108-1-ed an edge edit ari
 
Iris Localization - a Biometric Approach Referring Daugman's Algorithm
Iris Localization - a Biometric Approach Referring Daugman's AlgorithmIris Localization - a Biometric Approach Referring Daugman's Algorithm
Iris Localization - a Biometric Approach Referring Daugman's Algorithm
 
Enhanced Spectral Reflectance Reconstruction Using Pseudo-Inverse Estimation ...
Enhanced Spectral Reflectance Reconstruction Using Pseudo-Inverse Estimation ...Enhanced Spectral Reflectance Reconstruction Using Pseudo-Inverse Estimation ...
Enhanced Spectral Reflectance Reconstruction Using Pseudo-Inverse Estimation ...
 
APPLYING R-SPATIOGRAM IN OBJECT TRACKING FOR OCCLUSION HANDLING
APPLYING R-SPATIOGRAM IN OBJECT TRACKING FOR OCCLUSION HANDLINGAPPLYING R-SPATIOGRAM IN OBJECT TRACKING FOR OCCLUSION HANDLING
APPLYING R-SPATIOGRAM IN OBJECT TRACKING FOR OCCLUSION HANDLING
 
Objects Clustering of Movie Using Graph Mining Technique
Objects Clustering of Movie Using Graph Mining TechniqueObjects Clustering of Movie Using Graph Mining Technique
Objects Clustering of Movie Using Graph Mining Technique
 
OFFLINE SIGNATURE VERIFICATION USING SUPPORT LOCAL BINARY PATTERN
OFFLINE SIGNATURE VERIFICATION USING SUPPORT LOCAL BINARY PATTERNOFFLINE SIGNATURE VERIFICATION USING SUPPORT LOCAL BINARY PATTERN
OFFLINE SIGNATURE VERIFICATION USING SUPPORT LOCAL BINARY PATTERN
 
HSV Brightness Factor Matching for Gesture Recognition System
HSV Brightness Factor Matching for Gesture Recognition SystemHSV Brightness Factor Matching for Gesture Recognition System
HSV Brightness Factor Matching for Gesture Recognition System
 
A Novel Learning Formulation in a unified Min-Max Framework for Computer Aide...
A Novel Learning Formulation in a unified Min-Max Framework for Computer Aide...A Novel Learning Formulation in a unified Min-Max Framework for Computer Aide...
A Novel Learning Formulation in a unified Min-Max Framework for Computer Aide...
 
Further Improvements of CFA 3.0 by Combining Inpainting and Pansharpening Tec...
Further Improvements of CFA 3.0 by Combining Inpainting and Pansharpening Tec...Further Improvements of CFA 3.0 by Combining Inpainting and Pansharpening Tec...
Further Improvements of CFA 3.0 by Combining Inpainting and Pansharpening Tec...
 

Semelhante a Improved hand tracking system

Implementation of Object Tracking for Real Time Video
Implementation of Object Tracking for Real Time VideoImplementation of Object Tracking for Real Time Video
Implementation of Object Tracking for Real Time VideoIDES Editor
 
Gesture Recognition Review: A Survey of Various Gesture Recognition Algorithms
Gesture Recognition Review: A Survey of Various Gesture Recognition AlgorithmsGesture Recognition Review: A Survey of Various Gesture Recognition Algorithms
Gesture Recognition Review: A Survey of Various Gesture Recognition AlgorithmsIJRES Journal
 
To identify the person using gait knn based approach
To identify the person using gait   knn based approachTo identify the person using gait   knn based approach
To identify the person using gait knn based approacheSAT Journals
 
OBJECT DETECTION FOR SERVICE ROBOT USING RANGE AND COLOR FEATURES OF AN IMAGE
OBJECT DETECTION FOR SERVICE ROBOT USING RANGE AND COLOR FEATURES OF AN IMAGEOBJECT DETECTION FOR SERVICE ROBOT USING RANGE AND COLOR FEATURES OF AN IMAGE
OBJECT DETECTION FOR SERVICE ROBOT USING RANGE AND COLOR FEATURES OF AN IMAGEIJCSEA Journal
 
Object Detection for Service Robot Using Range and Color Features of an Image
Object Detection for Service Robot Using Range and Color Features of an ImageObject Detection for Service Robot Using Range and Color Features of an Image
Object Detection for Service Robot Using Range and Color Features of an ImageIJCSEA Journal
 
Object detection for service robot using range and color features of an image
Object detection for service robot using range and color features of an imageObject detection for service robot using range and color features of an image
Object detection for service robot using range and color features of an imageIJCSEA Journal
 
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...ijcsit
 
On comprehensive analysis of learning algorithms on pedestrian detection usin...
On comprehensive analysis of learning algorithms on pedestrian detection usin...On comprehensive analysis of learning algorithms on pedestrian detection usin...
On comprehensive analysis of learning algorithms on pedestrian detection usin...UniversitasGadjahMada
 
A Hybrid Architecture for Tracking People in Real-Time Using a Video Surveill...
A Hybrid Architecture for Tracking People in Real-Time Using a Video Surveill...A Hybrid Architecture for Tracking People in Real-Time Using a Video Surveill...
A Hybrid Architecture for Tracking People in Real-Time Using a Video Surveill...sipij
 
Hand gesture recognition using support vector machine
Hand gesture recognition using support vector machineHand gesture recognition using support vector machine
Hand gesture recognition using support vector machinetheijes
 
HOL, GDCT AND LDCT FOR PEDESTRIAN DETECTION
HOL, GDCT AND LDCT FOR PEDESTRIAN DETECTIONHOL, GDCT AND LDCT FOR PEDESTRIAN DETECTION
HOL, GDCT AND LDCT FOR PEDESTRIAN DETECTIONcscpconf
 
Breast Mass Segmentation Using a Semi-automatic Procedure Based on Fuzzy C-me...
Breast Mass Segmentation Using a Semi-automatic Procedure Based on Fuzzy C-me...Breast Mass Segmentation Using a Semi-automatic Procedure Based on Fuzzy C-me...
Breast Mass Segmentation Using a Semi-automatic Procedure Based on Fuzzy C-me...TELKOMNIKA JOURNAL
 
Top Cited Articles in Signal & Image Processing 2021-2022
Top Cited Articles in Signal & Image Processing 2021-2022Top Cited Articles in Signal & Image Processing 2021-2022
Top Cited Articles in Signal & Image Processing 2021-2022sipij
 
Offline Character Recognition Using Monte Carlo Method and Neural Network
Offline Character Recognition Using Monte Carlo Method and Neural NetworkOffline Character Recognition Using Monte Carlo Method and Neural Network
Offline Character Recognition Using Monte Carlo Method and Neural Networkijaia
 
A Review Paper on Real-Time Hand Motion Capture
A Review Paper on Real-Time Hand Motion CaptureA Review Paper on Real-Time Hand Motion Capture
A Review Paper on Real-Time Hand Motion CaptureIRJET Journal
 
Schematic model for analyzing mobility and detection of multiple
Schematic model for analyzing mobility and detection of multipleSchematic model for analyzing mobility and detection of multiple
Schematic model for analyzing mobility and detection of multipleIAEME Publication
 
IRJET- Detection of Breast Asymmetry by Active Contour Segmentation Techn...
IRJET-  	  Detection of Breast Asymmetry by Active Contour Segmentation Techn...IRJET-  	  Detection of Breast Asymmetry by Active Contour Segmentation Techn...
IRJET- Detection of Breast Asymmetry by Active Contour Segmentation Techn...IRJET Journal
 

Semelhante a Improved hand tracking system (20)

Implementation of Object Tracking for Real Time Video
Implementation of Object Tracking for Real Time VideoImplementation of Object Tracking for Real Time Video
Implementation of Object Tracking for Real Time Video
 
Gesture Recognition Review: A Survey of Various Gesture Recognition Algorithms
Gesture Recognition Review: A Survey of Various Gesture Recognition AlgorithmsGesture Recognition Review: A Survey of Various Gesture Recognition Algorithms
Gesture Recognition Review: A Survey of Various Gesture Recognition Algorithms
 
To identify the person using gait knn based approach
To identify the person using gait   knn based approachTo identify the person using gait   knn based approach
To identify the person using gait knn based approach
 
OBJECT DETECTION FOR SERVICE ROBOT USING RANGE AND COLOR FEATURES OF AN IMAGE
OBJECT DETECTION FOR SERVICE ROBOT USING RANGE AND COLOR FEATURES OF AN IMAGEOBJECT DETECTION FOR SERVICE ROBOT USING RANGE AND COLOR FEATURES OF AN IMAGE
OBJECT DETECTION FOR SERVICE ROBOT USING RANGE AND COLOR FEATURES OF AN IMAGE
 
Object Detection for Service Robot Using Range and Color Features of an Image
Object Detection for Service Robot Using Range and Color Features of an ImageObject Detection for Service Robot Using Range and Color Features of an Image
Object Detection for Service Robot Using Range and Color Features of an Image
 
Object detection for service robot using range and color features of an image
Object detection for service robot using range and color features of an imageObject detection for service robot using range and color features of an image
Object detection for service robot using range and color features of an image
 
D05222528
D05222528D05222528
D05222528
 
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...
SEGMENTATION OF MAGNETIC RESONANCE BRAIN TUMOR USING INTEGRATED FUZZY K-MEANS...
 
On comprehensive analysis of learning algorithms on pedestrian detection usin...
On comprehensive analysis of learning algorithms on pedestrian detection usin...On comprehensive analysis of learning algorithms on pedestrian detection usin...
On comprehensive analysis of learning algorithms on pedestrian detection usin...
 
A Hybrid Architecture for Tracking People in Real-Time Using a Video Surveill...
A Hybrid Architecture for Tracking People in Real-Time Using a Video Surveill...A Hybrid Architecture for Tracking People in Real-Time Using a Video Surveill...
A Hybrid Architecture for Tracking People in Real-Time Using a Video Surveill...
 
Breast boundary detection in mammogram using entropy
Breast boundary detection in mammogram using entropyBreast boundary detection in mammogram using entropy
Breast boundary detection in mammogram using entropy
 
528 439-449
528 439-449528 439-449
528 439-449
 
Hand gesture recognition using support vector machine
Hand gesture recognition using support vector machineHand gesture recognition using support vector machine
Hand gesture recognition using support vector machine
 
HOL, GDCT AND LDCT FOR PEDESTRIAN DETECTION
HOL, GDCT AND LDCT FOR PEDESTRIAN DETECTIONHOL, GDCT AND LDCT FOR PEDESTRIAN DETECTION
HOL, GDCT AND LDCT FOR PEDESTRIAN DETECTION
 
Breast Mass Segmentation Using a Semi-automatic Procedure Based on Fuzzy C-me...
Breast Mass Segmentation Using a Semi-automatic Procedure Based on Fuzzy C-me...Breast Mass Segmentation Using a Semi-automatic Procedure Based on Fuzzy C-me...
Breast Mass Segmentation Using a Semi-automatic Procedure Based on Fuzzy C-me...
 
Top Cited Articles in Signal & Image Processing 2021-2022
Top Cited Articles in Signal & Image Processing 2021-2022Top Cited Articles in Signal & Image Processing 2021-2022
Top Cited Articles in Signal & Image Processing 2021-2022
 
Offline Character Recognition Using Monte Carlo Method and Neural Network
Offline Character Recognition Using Monte Carlo Method and Neural NetworkOffline Character Recognition Using Monte Carlo Method and Neural Network
Offline Character Recognition Using Monte Carlo Method and Neural Network
 
A Review Paper on Real-Time Hand Motion Capture
A Review Paper on Real-Time Hand Motion CaptureA Review Paper on Real-Time Hand Motion Capture
A Review Paper on Real-Time Hand Motion Capture
 
Schematic model for analyzing mobility and detection of multiple
Schematic model for analyzing mobility and detection of multipleSchematic model for analyzing mobility and detection of multiple
Schematic model for analyzing mobility and detection of multiple
 
IRJET- Detection of Breast Asymmetry by Active Contour Segmentation Techn...
IRJET-  	  Detection of Breast Asymmetry by Active Contour Segmentation Techn...IRJET-  	  Detection of Breast Asymmetry by Active Contour Segmentation Techn...
IRJET- Detection of Breast Asymmetry by Active Contour Segmentation Techn...
 

Último

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney
 

Último (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
 

Improved hand tracking system

  • 1. Technical seminar on IMPROVED HAND TRACKING SYSTEM Presented by KISHOR M N Dept. of CSE 2013/3/6 1
  • 2. Outline  Introduction  Existing methods  Proposed Hand Detection System  Ada Boosting for real time Hand detection  Foreground detection  Hand Tracking Methodology  Experimental Results 2013/3/6 2
  • 3. Introduction  Hand Postures are powerful means for communication among humans on communicating.  Many applications are designed by using the motion of hand.  The hand tracking is rather difficult because most of the backgrounds change across frames. 2013/3/6 3
  • 4. Existing methods 1) Kolsch and turk proposed a method to detect a hand using image cues and probability distribution. Method used: Pyramid based kanade lucas tomasi feature tracking. Disadv: It cannot classify wooden object that are present in the 2013/3/6 4
  • 5. Existing methods 2) Zhu,yang proposed a method in which each pixel in image is classified as either hand pixel or background pixel. Method used:Hand segmentation based on Bayes decision theory and Gaussian mixture model. Disadv: It cannot distinguish multitargets in an image and error rate 2013/3/6 5
  • 6. Existing methods 3) Binh and Ejima applied skin color tracking for face detection to extract the hand region by separating hand from face. Method used: Skin color tracking and other models. Disadv: It cannot distinguish between skin region or some object with similar color or shape as the hand 2013/3/6 6
  • 7. Proposed system  Local binary pattern (LBP) is one of the powerful features with low computation.  Chen et al.’s work called Haar-like feature was adopted for hand detection.  This paper proposed to combine the novel pixel-based hierarchical-feature for AdaBoosting (PBHFA), skin color detection, and codebook (CB) foreground detection model to locate a hand in real time. 2013/3/6 7
  • 8. Proposed system 2013/3/6 8
  • 9. Proposed system 2013/3/6 9
  • 10. Proposed PBH Features  AdaBoost is employed to select those few best features from a huge number of features.  The PBH features can significantly reduce the training time for hand detection than normal features. 2013/3/6 10
  • 11. Proposed PBH Features Step 1) Given a training positive and negative samples Xi,Xj of size M × N. Step 2) Process the samples with the histogram equalization to reduce the influence of lighting effect. Step 3) Calculate the average value Ti of each sample Xi and use Ti as a threshold for binarizing the corresponding Xi to yield a binary image Bi. Step 4) Given Bi, calculate the probability of black pixel occurrence at each position (x, y) and obtain P(x, y). 2013/3/6 11
  • 12. Proposed PBH Features Step 5) All possible features Fj in a M×N subwindow can be produced according to the order table O(x, y). Step 6) Finally, these features and the training image Xi and Xj are fed into the AdaBoost algorithm. Each PBH feature can be considered as a weak classifier. 2013/3/6 12
  • 13. Proposed PBH Features 2013/3/6 13
  • 14. AdaBoosting for Real-Time Hand Detection  Aim of boosting is to improve the classification performance of any given learning algorithm.  This phase includes many classifiers;each weak classifier ht is made from a feature ft and threshold Øt where Pt denotes the polarity used for indicating the direction of the inequality. 2013/3/6 14
  • 15. AdaBoosting for Real-Time Hand Detection • A strong classifier can be obtained by combining the selected weak classfiers from the AdaBoosting and which can be recognized as follows 2013/3/6 15
  • 16. Strong classifier 2013/3/6 16
  • 17. HSV Color Space  A detected hand by the PBH- AdaBoost algorithm is further filtered by skin color to reduce false positive.  HSV color model which is robust to lighting change is adopted for skin color localization.  Advantages of this color model in skin color segmentation is that it allows users to intuitively specify the boundary of the hue and saturation. 2013/3/6 17
  • 18. HSV Color Space •The hue and saturation are set in between 0° and 5° and 0.23 to 0.68, respectively, as specified in. 2013/3/6 18
  • 19. Foreground Detection  One of the popular method in foreground detection is the mixture of Gaussian(MoG). yet this method has some disadvantages they are overcome by CB model.  Kim et al. [2] proposed the CB model for foreground detection.  The concept of the CB is to train background pixel pixelwise over a period of time. Sample values at each pixel are clustered as a set of codewords. The combination of multiple codewords can 2013/3/6 19
  • 20. Foreground Detection 2013/3/6 20
  • 21. Foreground Detection  To solve the “still object” problem, a “buffer” is employed to store the history of each tracking target. This buffer is updated frame by frame.  If one target is detected and tracking, the value in buffer associates to the frame that is set as 1. 2013/3/6 21
  • 22. Foreground Detection 2013/3/6 22
  • 23. Hand Tracking Methodology  Hand tracking phase is the second step after hand detection.  Referenced algorithms can be classified into below categories 1) point tracking 2) kernal tracking 3) silhouette tracking  Proposed method uses Euclidean disatnce to track hand. 2013/3/6 23
  • 24. Hand Tracking Methodology  Eucledian distance is calculated as follows  dist1(x, y) < r1. 2013/3/6 24
  • 25. Experimental Results  In this paper, the public Sebastien Marcel’s hand posture database [3].  including “A,” “B,” “C,” “Point,” “Five,” and “V” 2013/3/6 25
  • 26. Experimental Results 2013/3/6 26
  • 27. Experimental Results 2013/3/6 27
  • 28. Experimental Results Hand tracking results 2013/3/6 28
  • 29. Experimental Results 2013/3/6 29
  • 30. Experimental Results Pyramid based KST feature tracking Appearenc e based approach Proposed system 2013/3/6 30
  • 31. Conclusion  Hand tracking system was proposed by using the PBHFA, skin color segmentation, and CB model.  The goal is to use PBH feature to reduce the required training time and further reduce the required computation in tracking phase.  According to the experimental results, the above tasks were achieved, meanwhile the tracking accuracy was still maintained in high level as that of the Haar like feature. 2013/3/6 31
  • 32. References 1) M. Kolsch and M. Turk, “Fast 2D hand tracking with flocks of features and multi-cue integration,” in Proc. CVPRW, vol. 10. Jun. 2004, p. 158. 2) K. Kim, T. H. Chalidabhongse, D. Harwood, and L. Davis, “Real-time foreground-background segmentation using codebook model,” Real- Time Imag., vol. 11, no. 3, pp. 172–185, Jun. 2005. 3) Hand Posture Database [Online]. Available: http://www.idiap.ch/ resources/gestures 4) Jing-Ming Guo, “Effective Hand Posture Recognition System with Hierarchical-Feature Adaboosting and Feature Reserving Average Mask” 2013/3/6 32
  • 33. THANK YOU 2013/3/6 33