• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Guo Kangde, Zhang Mingmin, Sun Chao, Li Yang, Tang Xing. 3D Fingertip Tracking Algorithm Based on Computer Vision[J]. Journal of Computer Research and Development, 2010, 47(6): 1013-1019.
Citation: Guo Kangde, Zhang Mingmin, Sun Chao, Li Yang, Tang Xing. 3D Fingertip Tracking Algorithm Based on Computer Vision[J]. Journal of Computer Research and Development, 2010, 47(6): 1013-1019.

3D Fingertip Tracking Algorithm Based on Computer Vision

More Information
  • Published Date: June 14, 2010
  • Realtime human-computer interaction(HCI) based on hand gestures plays an important role in both theory and application of virtual reality. Since the 3D position of fingertip can be tracked and located through stereovision technology with two cameras, the real-time interaction between fingertip and 3D objects in virtual world can be achieved. The proposed method in this paper can be widely used to implement 3D interaction for augmented reality based video games. In this paper, an improved BGS algorithm, which combines threshold decision with GMM, is presented to identify the hand region. The method can get hand region in different lighting conditions, and avoid the interference of cast shadow of hand. The fingertip can be determined with contour Kvector and distance between the hand region center and the candidate fingertip position. Compared with the general fingertip algorithms, the algorithm presented can get fingertips in unfriendly hand foreground segmentation. After calibrating two cameras, the authors get origin position in world coordinate relative to marker center, then 3D position of fingertip can be reconstructed by camera parameters and the fingertip positions in two images taken by the two cameras. Finally, Kalman filter is employed in 3D space to smooth the fingertip trajectory and predict the range of fingertips. Experimental result shows the efficiency of the algorithm.
  • Related Articles

    [1]Li Song, Cao Wenqi, Hao Xiaohong, Zhang Liping, Hao Zhongxiao. Collective Spatial Keyword Query Based on Time-Distance Constrained and Cost Aware[J]. Journal of Computer Research and Development, 2025, 62(3): 808-819. DOI: 10.7544/issn1000-1239.202330815
    [2]Wei Junyu, Zhang Guangyan, Chen Junchao. Data-Pattern-Aware Low-Cost Cloud Log Storage Systems[J]. Journal of Computer Research and Development, 2023, 60(11): 2442-2452. DOI: 10.7544/issn1000-1239.202330178
    [3]Lu Min, Huang Yalou, Xie Maoqiang, Wang Yang, Liu Jie, Liao Zhen. Cost-Sensitive Listwise Ranking Approach[J]. Journal of Computer Research and Development, 2012, 49(8): 1738-1746.
    [4]Wang Weizheng, Kuang Jishun, You Zhiqiang, Liu Peng. A Low-Power and Low-Cost BIST Scheme Based on Capture in Turn of Sub-Scan Chains[J]. Journal of Computer Research and Development, 2012, 49(4): 864-872.
    [5]Xiao Fangxiong, Huang Zhiqiu, Cao Zining, Yuan Min, and Zhang Junhua. Describing and Cost Analyzing of Web Services Composition Using PPA[J]. Journal of Computer Research and Development, 2009, 46(5): 832-840.
    [6]Zhao Jia, Han Jun, Zeng Xiaoyang, and Han Lin. A Two-Dimensional Parity-Based Concurrent Error Detection Method for AES Against Differential Fault Attack and Its VLSI Implementation[J]. Journal of Computer Research and Development, 2009, 46(4): 593-601.
    [7]Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi. A DPA and HO-DPA Resistant Implementation of AES[J]. Journal of Computer Research and Development, 2009, 46(3): 377-383.
    [8]Liu Zhenglin, Han Yu, Zou Xuecheng, and ChenYicheng. Power Analysis Attacks Against AES Based on Maximal Bias Signal[J]. Journal of Computer Research and Development, 2009, 46(3): 370-376.
    [9]He Xiaoyang and Wang Yasha. Model-Based Methods for Software Cost Estimation[J]. Journal of Computer Research and Development, 2006, 43(5): 777-783.
    [10]Wu Min, Zeng Xiaoyang, Han Jun, Ma Yongxin, Wu Yongyi, and Zhang Guoquan. A Low Cost RSA Chip Design Based on CRT[J]. Journal of Computer Research and Development, 2006, 43(4): 639-645.

Catalog

    Article views (830) PDF downloads (560) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return