Skip to main content

Advertisement

Log in

Application of AI-based real-time gesture recognition and embedded system in the design of english major teaching

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

With the continuous development of science and technology, people have begun to interact with computer equipment, and human–computer interaction has become more and more simple. The human–computer interaction page is very user-friendly, people can communicate with the machine naturally, and can send signals through touch or gestures. In the process of person-to-person communication, gestures are a very common method that can convey specific signals. If you want to use gestures to send signals in human–computer interaction, you need to use the knowledge of computer vision to pave the way for human–computer interaction. We can deploy a teaching platform on the network platform to guide the teaching of English, which has become one of the teaching methods in many schools. In our school's research, we have incorporated some multimedia teaching in the English classroom teaching, and use multimedia teaching to stimulate students' interest in learning and improve their learning efficiency. We have changed the traditional teaching mode, through the way of human–computer interaction, using people's body movements and gesture information to interact. We also use AI technology to obtain the feature value of the vector angle through the three-dimensional characteristics of people's bones, and propose a KNN rapid recognition method. When constructing the English teaching system, we used the popular SSH framework and the C/S structure to design, and then we used design patterns to realize the reusability of the software. Finally, we conducted performance tests and functional tests on the system. The results show that this system can assist English teaching and can meet the needs of teaching.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Reddy, H. M., & Raja, K. B. (2009). High capacity and security steganography using discrete wavelet transform. International Journal of Computer Science and Security IJCSS, 3(6), 462.

    Google Scholar 

  2. Nag, A., Biswas, S., Sarkar, D., & Sarkar, P. P. (2011). A novel technique for image steganography based on DWT and Huffman encoding. International Journal of Computer Science and Security IJCSS, 4(6), 497–610.

    Google Scholar 

  3. Latef, A. A. (2011). Color image steganography based on discrete wavelet and discrete cosine transforms. Ibn Al-Haitham Journal for Pure and Applied Science, 24(3), 296–302.

    Google Scholar 

  4. Dey, N., Roy, A.B., & Dey, S. (2012). A novel approach of color image hiding using RGB color planes and DWT. arXiv preprint arXiv:1208.0803.

  5. Jeon, G., Park, S. J., Fang, Y., Anisetti, M., Bellandi, V., Damiani, E., & Jeong, J. (2009). Specification of efficient block matching scheme for motion estimation in video compression. SPIE Optical Engineering, 48(12), 127005.

    Article  Google Scholar 

  6. Shejul, A. A., & Kulkarni, U. L. (2011). A secure skin tone based steganography using wavelet transform. International Journal of Computer Theory and Engineering, 3(1), 16.

    Article  Google Scholar 

  7. Kaur, G., & Kochhar, A. (2013). Transform domain analysis of image steganography. The International Journal of Science and Emerging Technologies Latest Trends, 6(1), 29–37.

    Google Scholar 

  8. Singh, A. K., Dave, M., & Mohan, A. (2014). Hybrid technique for robust and imperceptible dual watermarking using error correcting codes for application in telemedicine. IJESDF, 6(4), 285–305.

    Article  Google Scholar 

  9. Nagpal, S., Bhushan, S., & Mahajan, M. (2016). An enhanced digital image watermarking scheme for medical images using neural network, DWT and RSA. International Journal of Modern Education and Computer Science, 8(4), 46.

    Article  Google Scholar 

  10. Thakkar, F. N., & Srivastava, V. K. (2017). A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimedia Tools Applications, 76(3), 3669–3697.

    Article  Google Scholar 

  11. Kalita, M., Tuithung, T., & Majumder, S. (2019). A new steganography method using integer wavelet transform and least significant bit substitution. The Computer Journal, 62, 1639–1655.

    Article  MathSciNet  Google Scholar 

  12. Rathore, M. M., Paul, A., Ahmad, A., Anisetti, M., & Jeon, G. (2017). Hadoop-based intelligent care system (HICS): Analytical approach for big data in IoT. ACM Transactions on Internet Technology, 18(1), 1–24.

    Article  Google Scholar 

  13. Burt, P., & Adelson, E. (1983). The Laplacian pyramid as a compact image code. IEEE Transactions on Communications, 31(4), 532–540.

    Article  Google Scholar 

  14. Swain, G., Lenka, S.K. (2010). A hybrid approach to steganography embedding at darkest and brightest pixels. In 2010 International Conference on Communication and Computational Intelligence (INCOCCI), pp. 529–534. IEEE.

  15. Makbol, N. M., & Khoo, B. E. (2013). Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. AEU International Journal of Electronics and Communications, 67(2), 102–112.

    Article  Google Scholar 

  16. Zhang, Z., Wu, L., Gao, S., Sun, H., & Yan, Y. (2018). Robust reversible watermarking algorithm based on RIWT and compressed sensing. Arabian Journal for Science and Engineering, 43(2), 979–992.

    Article  Google Scholar 

  17. Ye, J., Ni, J., & Yi, Y. (2017). Deep learning hierarchical representations for image steganalysis. IEEE Transactions on Information Forensics and Security TIFS, 12(11), 2545–2557.

    Article  Google Scholar 

  18. Zhang, Y., Zhang, W., Chen, K., Liu, J., Liu, Y., Yu, N. (2018). Adversarial examples against deep neural network based steganalysis. In Proceedings of the 6th ACM workshop on information hiding and multimedia security, IH&MMSec'2018, pp. 67–72, Innsbruck, Austria.

  19. Goljan, M., Fridrich, J., Cogranne, R. (2014). Rich model for steganalysis of color images. In 2014 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 185–190. IEEE.

  20. Ye, J., Ni, J., & Yi, Y. (2017). Deep learning hierarchical representations for image steganalysis. IEEE Transactions on Information Forensics and Security, 12(11), 2545–2557.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tian Zhang.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, T. Application of AI-based real-time gesture recognition and embedded system in the design of english major teaching. Wireless Netw (2021). https://doi.org/10.1007/s11276-021-02693-0

Download citation

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11276-021-02693-0

Keywords

Navigation