• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Lü Zhiguo, Li Yan, Xu Xin. Research on Fast 3D Hand Motion Tracking System[J]. Journal of Computer Research and Development, 2012, 49(7): 1398-1407.
Citation: Lü Zhiguo, Li Yan, Xu Xin. Research on Fast 3D Hand Motion Tracking System[J]. Journal of Computer Research and Development, 2012, 49(7): 1398-1407.

Research on Fast 3D Hand Motion Tracking System

More Information
  • Published Date: July 14, 2012
  • 3D hand tracking is one of the major research topics in the field of human-computer interaction. We present a novel model-based hand tracking method in this paper, which embeds hierarchical optimization method into the particle-filter-based tracking frames to improve the efficiency of particles sampling from the hidden state space. Firstly, the low dimension hidden state space is introduced to approximately describe the hand configuration state in the original high dimension configuration space, and the dynamic hand model in the hidden state space is presented according to the physiological constraints of hand motion. Secondly, to obtain more efficient particles during tracking, hierarchical genetic optimization method is regarded as the importance sampling function to modify the sampling algorithm of particle-filter. Experiments demonstrate that our approach can have fast tracking performance even under the clutter background when hand part self-occlusion exists.
  • Related Articles

    [1]Li Yang, Ma Ziqiang, Lin Jingqiang, Meng Lingjia, Li Bingyu, Miao Li, Gao Fei. Survey of Transient Execution Attacks[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440167
    [2]Zhang Weijuan, Bai Lu, Ling Yuqing, Lan Xiao, Jia Xiaoqi. Cache Side-Channel Attacks and Defenses[J]. Journal of Computer Research and Development, 2023, 60(1): 206-222. DOI: 10.7544/issn1000-1239.202110774
    [3]Shen Yijie, Li Liangcheng, Liu Ziwei, Liu Tiantian, Luo Hao, Shen Ting, Lin Feng, Ren Kui. Stealthy Attack Towards Speaker Recognition Based on One-“Audio Pixel” Perturbation[J]. Journal of Computer Research and Development, 2021, 58(11): 2350-2363. DOI: 10.7544/issn1000-1239.2021.20210632
    [4]Yang Zheng, Yin Qilei, Li Haoran, Miao Yuanli, Yuan Dong, Wang Qian, Shen Chao, Li Qi. Study of Wechat Sybil Detection[J]. Journal of Computer Research and Development, 2021, 58(11): 2319-2332. DOI: 10.7544/issn1000-1239.2021.20210461
    [5]Zhang Li, Wu Wenling, Zhang Lei, Zheng Yafei. Key-Recovery Attack on Reduced-Round AES-128 Using the Exchange-Equivalence[J]. Journal of Computer Research and Development, 2021, 58(10): 2213-2221. DOI: 10.7544/issn1000-1239.2021.20210549
    [6]Li Qiang, Li Zhoujun, Zhou Changbin, Yu Jie. Sybil Group Attack Detection in Kad Network[J]. Journal of Computer Research and Development, 2014, 51(7): 1614-1623.
    [7]Zhao Xinjie, Wang Tao, Guo Shize, Liu Huiying. Cache Attacks on Block Ciphers[J]. Journal of Computer Research and Development, 2012, 49(3): 453-468.
    [8]Zhao Xinjie, Wang Tao, Guo Shize, Liu Huiying. Cache Attacks on Block Ciphers[J]. Journal of Computer Research and Development, 2012, 49(3): 453-468.
    [9]Chen Haikun, Shi Shengfei, and Li Jianzhong. A Key Management Scheme Based on Variable Transmission Range in Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2008, 45(1): 165-171.
    [10]Zhang Haixia, Su Purui, and Feng Dengguo. A Network Security Analysis Model Based on the Increase in Attack Ability[J]. Journal of Computer Research and Development, 2007, 44(12): 2012-2019.

Catalog

    Article views (800) PDF downloads (562) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return