Abstract
With the continuous development of science and technology, people have begun to interact with computer equipment, and human–computer interaction has become more and more simple. The human–computer interaction page is very user-friendly, people can communicate with the machine naturally, and can send signals through touch or gestures. In the process of person-to-person communication, gestures are a very common method that can convey specific signals. If you want to use gestures to send signals in human–computer interaction, you need to use the knowledge of computer vision to pave the way for human–computer interaction. We can deploy a teaching platform on the network platform to guide the teaching of English, which has become one of the teaching methods in many schools. In our school's research, we have incorporated some multimedia teaching in the English classroom teaching, and use multimedia teaching to stimulate students' interest in learning and improve their learning efficiency. We have changed the traditional teaching mode, through the way of human–computer interaction, using people's body movements and gesture information to interact. We also use AI technology to obtain the feature value of the vector angle through the three-dimensional characteristics of people's bones, and propose a KNN rapid recognition method. When constructing the English teaching system, we used the popular SSH framework and the C/S structure to design, and then we used design patterns to realize the reusability of the software. Finally, we conducted performance tests and functional tests on the system. The results show that this system can assist English teaching and can meet the needs of teaching.
Similar content being viewed by others
References
Reddy, H. M., & Raja, K. B. (2009). High capacity and security steganography using discrete wavelet transform. International Journal of Computer Science and Security IJCSS, 3(6), 462.
Nag, A., Biswas, S., Sarkar, D., & Sarkar, P. P. (2011). A novel technique for image steganography based on DWT and Huffman encoding. International Journal of Computer Science and Security IJCSS, 4(6), 497–610.
Latef, A. A. (2011). Color image steganography based on discrete wavelet and discrete cosine transforms. Ibn Al-Haitham Journal for Pure and Applied Science, 24(3), 296–302.
Dey, N., Roy, A.B., & Dey, S. (2012). A novel approach of color image hiding using RGB color planes and DWT. arXiv preprint arXiv:1208.0803.
Jeon, G., Park, S. J., Fang, Y., Anisetti, M., Bellandi, V., Damiani, E., & Jeong, J. (2009). Specification of efficient block matching scheme for motion estimation in video compression. SPIE Optical Engineering, 48(12), 127005.
Shejul, A. A., & Kulkarni, U. L. (2011). A secure skin tone based steganography using wavelet transform. International Journal of Computer Theory and Engineering, 3(1), 16.
Kaur, G., & Kochhar, A. (2013). Transform domain analysis of image steganography. The International Journal of Science and Emerging Technologies Latest Trends, 6(1), 29–37.
Singh, A. K., Dave, M., & Mohan, A. (2014). Hybrid technique for robust and imperceptible dual watermarking using error correcting codes for application in telemedicine. IJESDF, 6(4), 285–305.
Nagpal, S., Bhushan, S., & Mahajan, M. (2016). An enhanced digital image watermarking scheme for medical images using neural network, DWT and RSA. International Journal of Modern Education and Computer Science, 8(4), 46.
Thakkar, F. N., & Srivastava, V. K. (2017). A blind medical image watermarking: DWT-SVD based robust and secure approach for telemedicine applications. Multimedia Tools Applications, 76(3), 3669–3697.
Kalita, M., Tuithung, T., & Majumder, S. (2019). A new steganography method using integer wavelet transform and least significant bit substitution. The Computer Journal, 62, 1639–1655.
Rathore, M. M., Paul, A., Ahmad, A., Anisetti, M., & Jeon, G. (2017). Hadoop-based intelligent care system (HICS): Analytical approach for big data in IoT. ACM Transactions on Internet Technology, 18(1), 1–24.
Burt, P., & Adelson, E. (1983). The Laplacian pyramid as a compact image code. IEEE Transactions on Communications, 31(4), 532–540.
Swain, G., Lenka, S.K. (2010). A hybrid approach to steganography embedding at darkest and brightest pixels. In 2010 International Conference on Communication and Computational Intelligence (INCOCCI), pp. 529–534. IEEE.
Makbol, N. M., & Khoo, B. E. (2013). Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition. AEU International Journal of Electronics and Communications, 67(2), 102–112.
Zhang, Z., Wu, L., Gao, S., Sun, H., & Yan, Y. (2018). Robust reversible watermarking algorithm based on RIWT and compressed sensing. Arabian Journal for Science and Engineering, 43(2), 979–992.
Ye, J., Ni, J., & Yi, Y. (2017). Deep learning hierarchical representations for image steganalysis. IEEE Transactions on Information Forensics and Security TIFS, 12(11), 2545–2557.
Zhang, Y., Zhang, W., Chen, K., Liu, J., Liu, Y., Yu, N. (2018). Adversarial examples against deep neural network based steganalysis. In Proceedings of the 6th ACM workshop on information hiding and multimedia security, IH&MMSec'2018, pp. 67–72, Innsbruck, Austria.
Goljan, M., Fridrich, J., Cogranne, R. (2014). Rich model for steganalysis of color images. In 2014 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 185–190. IEEE.
Ye, J., Ni, J., & Yi, Y. (2017). Deep learning hierarchical representations for image steganalysis. IEEE Transactions on Information Forensics and Security, 12(11), 2545–2557.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Zhang, T. Application of AI-based real-time gesture recognition and embedded system in the design of english major teaching. Wireless Netw (2021). https://doi.org/10.1007/s11276-021-02693-0
Accepted:
Published:
DOI: https://doi.org/10.1007/s11276-021-02693-0