Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 283-288.

• Pattern Recognition & Image Processing • Previous Articles     Next Articles

CSI Gesture Recognition Method Based on LSTM

LIU Jia-hui, WANG Yu-jie, LEI Yi   

  1. (School of Computer Science and Information Engineering,Hefei University of Technology,Hefei 230001,China)
  • Online:2019-11-10 Published:2019-11-20

Abstract: Gesture recognition based on WiFi channel state information (CSI) has broad application prospects in human-computer interaction.At present,most methods require manual extraction of features,and the feature extraction process is cumbersome.It can only recognize gestures in a specific direction,which limits the range of people’s activities.To solve the above problems,this paper proposed a method based on Long Short-Term Memory (LSTM) training to design a CSI gesture recognition system based on LSTM.The system preprocesses the collected CSI data through such as abnormal point removal,optimal subcarrier selection and discrete wavelet variation denoising.The LSTM network trains the classification without manual extraction of gesture features.Finally,the recognition of four gestures is achieved,which are pushing,pulling,left swing and right swing in four different directions,and an average recognition accuracy of 82.75% is reached.This paper discussed the influence of the distance between sender and receiver and the size of the data set on the accuracy of gesture recognition,and compared the gestures in four directions by WiG and WiFinger.The results show that the proposed method has higher recognition effect.

Key words: Channel state information, Discrete wavelet transform, Gesture recognition, Long short-term memory, WiFi

CLC Number: 

  • TP183
[1]NÚÑEZ J C,CABIDO R,PANTRIGO J J,et al.Convolutional Neural Networks and Long Short-TermMemory for skeleton-based human activity and hand gesture recognition[J].Pattern Recognition,2018,76:80-94.
[2]ZHANG J,LI W,OGUNBONA P O,et al.RGB-D-based action recognition datasets:a survey[J].Pattern Recognition,2016,60:86-105.
[3]Leap Motion.Leap Motion Controller[EB/OL].[2014-12-28].https://www.leapmotion.com.
[4]Point Grab.Virtual Touch [EB/OL].[2014-12-29].http://www.pointgrab.com
[5]CHOI J J U,AE CHUN S,CHO J W.Smart Secure- Gov:mobile government security framework [C]∥Procee-dings of the 15th Annual International Conference on Digital Government Research.New York:ACM,2014:91-99.
[6]鲁勇,吕绍和,王晓东,等.基于WiFi信号的人体行为感知技术研究综述[J].计算机学报,2017,53(9):170-183.
[7]PU Q,GUPTA S,GOLLAKOTA S,et al.Whole-home gesture recognition using wireless signals[C]∥Proceedings of the 19th Annual International Conference on Mobile Computing and Networking.New York,USA,2013:27-3.
[8]SIGG S,BLANKE U,TROSTER G.The telepathic phone:Frict-ionless activity recognition from wifi-rssi[C]∥Procee-dings of the IEEE international conference on Pervasive Computing and Communications.Budapest:IEEE,2014:148-155.
[9]ABDELNASSER H,YOUSSEF M,HARRAS K A.Wigest:Aubiquitous wifi-based gesture recognition system [C]∥Proceedings of the 2015 IEEE Conference on Computer Communications.Hong Kong,China,2015:1472-1480.
[10]HE W,WU K,ZOU Y,et al.Wig:Wifi-based gest-ure recognition system[C]∥Proceedings of the 24th International Conference on Computer Communication and Networks.Las Vegas,USA,2015:1-7.
[11]LI H,YANG W,WANG J,et al.Wifinger:Talk to your smart devices with finger-grained gesture[C]∥Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing.New York,USA,2016:250-261.
[12]QIAN K,WU C S,ZHOU Z M,et al.Inferri-ng Motion Direction using Commodity Wi-Fi for Interactive Exergames[C]∥ACM SIGCHI Conference on Human Factors in Computing Systems(CHI).ACM,2017:6-11.
[13]HALPERIN D,HU W,SHETH A,et al.Tool release:ga-thering 802.11n traces with channel state infor-mation [J].ACM SIGCOMM Computer Comm-unication Review,2011,41(1):53-53.
[14]杨铮,刘云浩.Wi-Fi雷达:从 RSSI 到 CSI [J].中国计算机学会通讯,2014,10(11):55-60
[15]WANG W,LIU A.X,SHAHZAD M,et al.Understanding and modeling of wifi signal based human activity recognition[C]∥Proceedings of the 21st Annual International Conference on Mobile Computing and Networking.New York,USA,2015:65-76.
[16]WANG H,ZHANG D,MA J,et al.Human respiration det-ection with commodity wifi devices:Do user location and bodyorien-tation matter[C]∥Proceedings of the 2016 ACM InternationalJoint Conference on Pervasive and Ubiquitous Computing.New York,USA,2016:25-36.
[17]WU D,ZHANG D,XU C,et al.Widir:Walking direction estimation using wireless signals[C]∥Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing.New York,USA,2016:351-362.
[18]BREUNIG M M,KRIEGEL H P,NG R T,et al.LOF:identifying density-based local outliers[C]∥Proceedings of the ACM SIGMOD 2000 Int.Conf.on Management of Data.ACM,2000:93-104.
[19]CHOI J S,LEE W H,LEE J H,et al.Deep Learning Based NLOS Identification with Commodity WLAN Devices [J].IEEE Transactions on Vehicular Technology,2018,67:3295-3303.
[1] WANG Xin-tong, WANG Xuan, SUN Zhi-xin. Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network [J]. Computer Science, 2022, 49(8): 314-322.
[2] KANG Yan, XU Yu-long, KOU Yong-qi, XIE Si-yu, YANG Xue-kun, LI Hao. Drug-Drug Interaction Prediction Based on Transformer and LSTM [J]. Computer Science, 2022, 49(6A): 17-21.
[3] SUN Jie-qi, LI Ya-feng, ZHANG Wen-bo, LIU Peng-hui. Dual-field Feature Fusion Deep Convolutional Neural Network Based on Discrete Wavelet Transformation [J]. Computer Science, 2022, 49(6A): 434-440.
[4] WANG Fei, HUANG Tao, YANG Ye. Study on Machine Learning Algorithms for Life Prediction of IGBT Devices Based on Stacking Multi-model Fusion [J]. Computer Science, 2022, 49(6A): 784-789.
[5] LAI Teng-fei, ZHOU Hai-yang, YU Fei-hong. Real-time Extend Depth of Field Algorithm for Video Processing [J]. Computer Science, 2022, 49(6A): 314-318.
[6] ZHOU Chu-lin, CHEN Jing-dong, HUANG Fan. WiFi-PDR Fusion Indoor Positioning Technology Based on Unscented Particle Filter [J]. Computer Science, 2022, 49(6A): 606-611.
[7] QING Chao-jin, DU Yan-hong, YE Qing, YANG Na, ZHANG Min-tao. Enhanced ELM-based Superimposed CSI Feedback Method with CSI Estimation Errors [J]. Computer Science, 2022, 49(6A): 632-638.
[8] WANG Shan, XU Chu-yi, SHI Chun-xiang, ZHANG Ying. Study on Cloud Classification Method of Satellite Cloud Images Based on CNN-LSTM [J]. Computer Science, 2022, 49(6A): 675-679.
[9] PAN Zhi-hao, ZENG Bi, LIAO Wen-xiong, WEI Peng-fei, WEN Song. Interactive Attention Graph Convolutional Networks for Aspect-based Sentiment Classification [J]. Computer Science, 2022, 49(3): 294-300.
[10] WANG Chi, CHANG Jun. CSI Cross-domain Gesture Recognition Method Based on 3D Convolutional Neural Network [J]. Computer Science, 2021, 48(8): 322-327.
[11] LIU Liang, PU Hao-yang. Real-time LSTM-based Multi-dimensional Features Gesture Recognition [J]. Computer Science, 2021, 48(8): 328-333.
[12] YOU Ling, GUAN Zhang-jun. Low-complexity Subcarrier Allocation Algorithm for Underwater OFDM Acoustic CommunicationSystems [J]. Computer Science, 2021, 48(6A): 387-391.
[13] LIU Meng-yang, WU Li-juan, LIANG Hui, DUAN Xu-lei, LIU Shang-qing, GAO Yi-bo. A Kind of High-precision LSTM-FC Atmospheric Contaminant Concentrations Forecasting Model [J]. Computer Science, 2021, 48(6A): 184-189.
[14] WANG Ying-ying, CHANG Jun, WU Hao, ZHOU Xiang, PENG Yu. Intrusion Detection Method Based on WiFi-CSI [J]. Computer Science, 2021, 48(6): 343-348.
[15] DING Ling, XIANG Yang. Chinese Event Detection with Hierarchical and Multi-granularity Semantic Fusion [J]. Computer Science, 2021, 48(5): 202-208.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!