Skip to main content

A Real Time Dactylology Based Feature Extractrion for Selective Image Encryption and Artificial Neural Network

  • Chapter
  • First Online:
Book cover Image Feature Detectors and Descriptors

Abstract

Dactylology or Finger Spelling is popularly known as sign speech, is a kind of gesture based language used by the deaf and dumb people to communicate with themselves or with other people in and around them. In many ways FingerSpelling provides a connection between the sign and oral language. Dactylology can also be used for secret communication or can be used by the security personnel to communicate secretly with their counterpart. In the proposed work a two phase encryption technique has been proposed wherein the first phase a ‘Gesture Key’, generated from Indian Sign Language in real time has been used for encrypting the Region of Interests (ROIs) and in the second phase a session key has been used to encrypt the partially encrypted image further. The experimental results show that the scheme provides significant security improvement without compromising the image quality. The speed of encryption and decryption process is quite good. The Performance of the proposed scheme is compared with the few other popular encryption methods to establish the relevance of the work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Padden, C.: How the alphabet came to be used in a sign language. Sign Language Studies. 4.1. Gallaudet University Press (2003)

    Google Scholar 

  2. Zeshan, U.: Indo-Pakistani sign language grammar: a typological outline. Sign Lang. Stud. 3(3), 157–212 (2003)

    Google Scholar 

  3. Gurjal, P., Kunnur, K.: Real time hand gesture recognition using SIFT. Int. J. Electr. Eng. 2(3), 19–33 (2012)

    Google Scholar 

  4. Ghotkar, S.A., Khatal, R., Khupase, S., Asati, S., Hadap, M.: Hand gesture recognition for indian sign language. In: Proceedings of the IEEE International Conference on Computer Communication and Informatics, pp. 1–4 (2012)

    Google Scholar 

  5. Rajam, P.S., Balakrishnan, G.: Real time Indian sign language recognition system to aid deaf and dumb people. In: Proceedings of the 13th International Conference on Communication Technology (ICCT), pp. 737–742 (2011)

    Google Scholar 

  6. Nandy, A., Prasad, J.S., Chakraborty, P., Nandi, G.C., Mondal, S.: Classification of Indian Sign Language in real time. Int. J. Comput. Eng. Inf. Technol. (IJCEIT) 10(15), 52–57 (2010)

    Google Scholar 

  7. Nandy, A., Prasad, J.S., Mondal, S., Chakraborty, P. & Nandi, G.C.: Recognition of isolated Indian sign language gesture in real time. In: Proceedings of BAIP, Springer LNCS-CCIS, vol. 70, pp. 102–107 (2010)

    Google Scholar 

  8. Rekha, J., Bhattacharya, J., Majumder, S.: Shape, texture and local movement hand gesture features for Indian sign language recognition. In: Proceedings of the 3rd International Conference on Trendz in Information Sciences and Computing (TISC) IEEE, pp. 30–35 (2011)

    Google Scholar 

  9. Geetha, M., Manjusha, U.C.: A vision based recognition of Indian sign language alphabets and numerals using B-spline approximation. Int. J. Comput. Sci. Eng. 4(3), 406–415 (2012)

    Google Scholar 

  10. Correa-Tome, F.E., Sanchez-Yanez, R.E.: Fast similarity metric for real-time template-matching applications. J. Real-Time Image Process. 1–9 (2013)

    Google Scholar 

  11. Ishii, I., Chida, T., Gu, Q., Takaki, T.: 500-fps face tracking system. J. Real-Time Image Process. 8(4), 379–388 (2013)

    Article  Google Scholar 

  12. Badrinath, G.S., Gupta, P., Mehrotra, H.: Score level fusion of voting strategy of geometric hashing and SURF for an efficient palmprint-based identification. J. Real-Time Image Process. 8(3), 265–284 (2013)

    Google Scholar 

  13. Dardas, N.H., Georganas, N.D.: Real-time hand gesture detection and recognition using bag-of-features and support vector machine techniques. IEEE Trans. Instr. Meas. 60(11), 3592–3607 (2011)

    Article  Google Scholar 

  14. Faudzi, A.A.M., Ali, M.H.K., Azman, M.A., Ismail, Z.H.: Real-time hand gestures system for mobile robots control. In: International Symposium on Robotics and Intelligent Sensors, vol. 41, pp. 798–804 (2012)

    Google Scholar 

  15. Ohn-Bar, E., Trivedi, M.M.: Hand gesture recognition in real time for automotive interfaces: a multimodal vision-based approach and evaluations. IEEE Trans. Intell. Transp. Syst. 99, 1–10 (2014)

    Google Scholar 

  16. Yang, C., Wang, S.: Transforming LSB substitution for image-based steganography in matching algorithm. J. Inf. Sci. Eng. 26, 1199–1212 (2010)

    Google Scholar 

  17. Rahouma, K.H.: A block cipher technique for security of data and computer networks. In: Proceedings of the IEEE Internet Workshop (IWS’99), pp. 25–31 (1999)

    Google Scholar 

  18. Belmeguenaï, A., Derouiche, N., Khaled, M.: Image encryption using stream cipher algorithm with nonlinear filtering function. Int. J. Adv. Comput. Sci. Appl. 3(9), 150–156 (2012)

    Google Scholar 

  19. Bhattacharya, T., Bhattacharya, T.K., Bhadra Chaudhuri, S.R.: A session based bit level cipher technique using helical and columnar transpositions. In: Proceedings of the National Conference on Cryptography and Network Security, pp. 87–91 (2009)

    Google Scholar 

  20. Mandal, J.K., Dutta, S.: A 256-bit recursive pair parity encoder for encryption. In: Proceedings of the Association for the Advancement of Modelling and Simulation Techniques in Enterprises (AMSE, France), vol. 1, pp. 1–14 (2004)

    Google Scholar 

  21. Bhattacharya, T., Bhattacharya, T.K., Bhadra Chaudhuri, S.R.: A general bit level data encryption technique using helical and session based columnar transpositions. In: Proceedings of the IEEE International Advance Computing Conference, pp. 364–368 (2009)

    Google Scholar 

  22. Kirishima, T., Sato, K., Chihara, K : Real-time gesture recognition by learning and selective control of visual interest points. IEEE Trans. Pattern Anal. Machine Intell. 27(3), 351–364 (2005)

    Google Scholar 

  23. Lee, L.K., An, S.Y., Oh, S.Y.: Robust fingertip extraction with improved skin color segmentation for finger gesture recognition in human-robot interaction. In: Proceedings of the Evolutionary Computation (CEC) IEEE Congress on Computational Intelligence, pp 1–7 (2012)

    Google Scholar 

  24. Wu, Y., Huang, T.: Hand modeling analysis and recognition for vision-based human computer interaction. IEEE Signal Process. Mag. Spec. Issue Immers. Interact. Technol. 18(3), 51–60 (2001)

    Google Scholar 

  25. Min, B.-W., Yoon, H.-S., Soh, J., Ohashi, T., Jima, T.: Visual recognition of static/dynamic gesture: gesture-driven editing system. J. Vis. Lang. Comput. 10(3), 291–309 (1999)

    Google Scholar 

  26. Jain, A.K., Mao, J., Mohiuddin, K.M.: Artificial neural networks: a tutorial. IEEE J. Comput. Special Issue: Neural Comput. 29(3), 31–44 (1996)

    Google Scholar 

  27. Kohonen, T.: Self-organizing maps. Springer Series in Information Sciences, vol. 30. Springer, Berlin (1995)

    Google Scholar 

  28. Ali Shah, S.A., Asar, A.Ul., Shaukat, S.F.: Neural network solution for secure interactive voice response. World Appl. Sci. J. 6(9), 1264–1269 (2009)

    Google Scholar 

  29. Lamar, M.V., Bhuiyan, S., Iwata, A.: Hand alphabet recognition using morphological PCA and neural networks. In: Proceedings of the International Joint Conference on Neural Network IEEE, vol. 4, pp. 2839–2844 (1999)

    Google Scholar 

  30. Yewale, S.K., Bharne, P.K.: Hand gesture recognition using different algorithms based on artificial neural network. In: Proceedings of the Emerging Trends in Networks and Computer Communications (ETNCC) IEEE. pp. 287–292 (2011)

    Google Scholar 

  31. Ibraheem, N.A., Khan, R.Z.: Vision based gesture recognition using neural networks approaches: a review. Int. J. Hum. Comput. Interact. (IJHCI) 3(1), 1–14 (2012)

    Google Scholar 

  32. Yu, C., Wang, X., Huang, H., Shen, J., Wu, K.: Vision-based hand gesture recognition using combinational features. In: Proceedings of the IEEE Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 543–546 (2010)

    Google Scholar 

  33. Zhang, X., Chen, X., Li, Y., Lantz, V., Wang, K., Yang, J.: A framework for hand gesture recognition based on accelerometer and EMG sensors. IEEE Trans. Systems, Man Cybern- Part A: Syst. Hum. 41(6), 1064–1076 (2012)

    Google Scholar 

  34. Bhattacharya, T., Hore, S., Mukherjee, A., Bhadra-Chaudhuri, S.R.: A novel highly secured session based data encryption technique using robust fingerprint based authentication. In: Proceedings of the (LNCS, Springer), pp. 422–431 (2010)

    Google Scholar 

  35. Bay, H., Ess, A., Tuytelaars, T., Gool, L.V.: SURF: speeded-up robust features. Comput. Vis. Image Underst. (CVIU) 110(3), 346–359 (2008)

    Google Scholar 

  36. Tamer, S., Assaleh, K.: Arabic sign language recognition in user independent mode. In: Proceedings of the IEEE International Conference on Intelligent and Advanced Systems, pp. 597–600 (2007)

    Google Scholar 

  37. Azzaz, M.S., Tanougast, C., Sadoudi, S., Dandache, A.: Robust chaotic key stream generator for real- time images encryption. J. Real-Time Image Process. 8(3), 297–306 (2013)

    Google Scholar 

  38. Jolfaei, A., Mirghadri, A.: Survey: image encryption using Salsa20. Int. J. Comput. Sci. Issues 7(5), 213–220 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sirshendu Hore .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Hore, S., Bhattacharya, T., Dey, N., Hassanien, A.E., Banerjee, A., Bhadra Chaudhuri, S.R. (2016). A Real Time Dactylology Based Feature Extractrion for Selective Image Encryption and Artificial Neural Network. In: Awad, A., Hassaballah, M. (eds) Image Feature Detectors and Descriptors . Studies in Computational Intelligence, vol 630. Springer, Cham. https://doi.org/10.1007/978-3-319-28854-3_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-28854-3_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-28852-9

  • Online ISBN: 978-3-319-28854-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics