Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 283-288.

• Pattern Recognition & Image Processing • Previous Articles     Next Articles

CSI Gesture Recognition Method Based on LSTM

LIU Jia-hui, WANG Yu-jie, LEI Yi   

  1. (School of Computer Science and Information Engineering,Hefei University of Technology,Hefei 230001,China)
  • Online:2019-11-10 Published:2019-11-20

Abstract: Gesture recognition based on WiFi channel state information (CSI) has broad application prospects in human-computer interaction.At present,most methods require manual extraction of features,and the feature extraction process is cumbersome.It can only recognize gestures in a specific direction,which limits the range of people’s activities.To solve the above problems,this paper proposed a method based on Long Short-Term Memory (LSTM) training to design a CSI gesture recognition system based on LSTM.The system preprocesses the collected CSI data through such as abnormal point removal,optimal subcarrier selection and discrete wavelet variation denoising.The LSTM network trains the classification without manual extraction of gesture features.Finally,the recognition of four gestures is achieved,which are pushing,pulling,left swing and right swing in four different directions,and an average recognition accuracy of 82.75% is reached.This paper discussed the influence of the distance between sender and receiver and the size of the data set on the accuracy of gesture recognition,and compared the gestures in four directions by WiG and WiFinger.The results show that the proposed method has higher recognition effect.

Key words: Channel state information, Long short-term memory, Discrete wavelet transform, Gesture recognition, WiFi

CLC Number: 

  • TP183
[1]NÚÑEZ J C,CABIDO R,PANTRIGO J J,et al.Convolutional Neural Networks and Long Short-TermMemory for skeleton-based human activity and hand gesture recognition[J].Pattern Recognition,2018,76:80-94.
[2]ZHANG J,LI W,OGUNBONA P O,et al.RGB-D-based action recognition datasets:a survey[J].Pattern Recognition,2016,60:86-105.
[3]Leap Motion.Leap Motion Controller[EB/OL].[2014-12-28].
[4]Point Grab.Virtual Touch [EB/OL].[2014-12-29].
[5]CHOI J J U,AE CHUN S,CHO J W.Smart Secure- Gov:mobile government security framework [C]∥Procee-dings of the 15th Annual International Conference on Digital Government Research.New York:ACM,2014:91-99.
[7]PU Q,GUPTA S,GOLLAKOTA S,et al.Whole-home gesture recognition using wireless signals[C]∥Proceedings of the 19th Annual International Conference on Mobile Computing and Networking.New York,USA,2013:27-3.
[8]SIGG S,BLANKE U,TROSTER G.The telepathic phone:Frict-ionless activity recognition from wifi-rssi[C]∥Procee-dings of the IEEE international conference on Pervasive Computing and Communications.Budapest:IEEE,2014:148-155.
[9]ABDELNASSER H,YOUSSEF M,HARRAS K A.Wigest:Aubiquitous wifi-based gesture recognition system [C]∥Proceedings of the 2015 IEEE Conference on Computer Communications.Hong Kong,China,2015:1472-1480.
[10]HE W,WU K,ZOU Y,et al.Wig:Wifi-based gest-ure recognition system[C]∥Proceedings of the 24th International Conference on Computer Communication and Networks.Las Vegas,USA,2015:1-7.
[11]LI H,YANG W,WANG J,et al.Wifinger:Talk to your smart devices with finger-grained gesture[C]∥Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing.New York,USA,2016:250-261.
[12]QIAN K,WU C S,ZHOU Z M,et al.Inferri-ng Motion Direction using Commodity Wi-Fi for Interactive Exergames[C]∥ACM SIGCHI Conference on Human Factors in Computing Systems(CHI).ACM,2017:6-11.
[13]HALPERIN D,HU W,SHETH A,et al.Tool release:ga-thering 802.11n traces with channel state infor-mation [J].ACM SIGCOMM Computer Comm-unication Review,2011,41(1):53-53.
[14]杨铮,刘云浩.Wi-Fi雷达:从 RSSI 到 CSI [J].中国计算机学会通讯,2014,10(11):55-60
[15]WANG W,LIU A.X,SHAHZAD M,et al.Understanding and modeling of wifi signal based human activity recognition[C]∥Proceedings of the 21st Annual International Conference on Mobile Computing and Networking.New York,USA,2015:65-76.
[16]WANG H,ZHANG D,MA J,et al.Human respiration det-ection with commodity wifi devices:Do user location and bodyorien-tation matter[C]∥Proceedings of the 2016 ACM InternationalJoint Conference on Pervasive and Ubiquitous Computing.New York,USA,2016:25-36.
[17]WU D,ZHANG D,XU C,et al.Widir:Walking direction estimation using wireless signals[C]∥Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing.New York,USA,2016:351-362.
[18]BREUNIG M M,KRIEGEL H P,NG R T,et al.LOF:identifying density-based local outliers[C]∥Proceedings of the ACM SIGMOD 2000 Int.Conf.on Management of Data.ACM,2000:93-104.
[19]CHOI J S,LEE W H,LEE J H,et al.Deep Learning Based NLOS Identification with Commodity WLAN Devices [J].IEEE Transactions on Vehicular Technology,2018,67:3295-3303.
[1] ZHAO Jia-qi, WANG Han-zheng, ZHOU Yong, ZHANG Di, ZHOU Zi-yuan. Remote Sensing Image Description Generation Method Based on Attention and Multi-scale Feature Enhancement [J]. Computer Science, 2021, 48(1): 190-196.
[2] ZHANG Yu-shuai, ZHAO Huan, LI Bo. Semantic Slot Filling Based on BERT and BiLSTM [J]. Computer Science, 2021, 48(1): 247-252.
[3] CUI Tong-tong, WANG Gui-ling, GAO Jing. Ship Trajectory Classification Method Based on 1DCNN-LSTM [J]. Computer Science, 2020, 47(9): 175-184.
[4] HU Peng-cheng, DIAO Li-li, YE Hua, YANG Yan-lan. DGA Domains Detection Based on Artificial and Depth Features [J]. Computer Science, 2020, 47(9): 311-317.
[5] LIU Xiao, YUAN Guan, ZHANG Yan-mei, YAN Qiu-yan, WANG Zhi-xiao. Hand Gesture Recognition Based on Self-adaptive Multi-classifiers Fusion [J]. Computer Science, 2020, 47(7): 103-110.
[6] YU Yi-lin, TIAN Hong-tao, GAO Jian-wei and WAN Huai-yu. Relation Extraction Method Combining Encyclopedia Knowledge and Sentence Semantic Features [J]. Computer Science, 2020, 47(6A): 40-44.
[7] BAO Zhen-shan, GUO Jun-nan, XIE Yuan and ZHANG Wen-bo. Model for Stock Price Trend Prediction Based on LSTM and GA [J]. Computer Science, 2020, 47(6A): 467-473.
[8] DIAO Li and WANG Ning. Research on Premium Income Forecast Based on X12-LSTM Model [J]. Computer Science, 2020, 47(6A): 512-516.
[9] JING Yu, QI Rui-hua, LIU Jian-xin, LIU Zhao-xia. Gesture Recognition Algorithm Based on Improved Multiscale Deep Convolutional Neural Network [J]. Computer Science, 2020, 47(6): 180-183.
[10] HUANG Hong-wei,LIU Yu-jiao,SHEN Zhuo-kai,ZHANG Shao-wei,CHEN Zhi-min,GAO Yang. End-to-end Track Association Based on Deep Learning Network Model [J]. Computer Science, 2020, 47(3): 200-205.
[11] LIU Yun,YIN Chuan-huan,HU Di,ZHAO Tian,LIANG Yu. Communication Satellite Fault Detection Based on Recurrent Neural Network [J]. Computer Science, 2020, 47(2): 227-232.
[12] WANG Ting, XIA Yang-yu-xin, CHEN Tie-ming. Short-term Trend Forecasting of Stocks Based on Multi-category Feature System [J]. Computer Science, 2020, 47(11A): 491-495.
[13] TIAN Chun-yuan, YU Jiang, CHANG Jun, WANG Yan-shun. NWI:CSI Based Non-line-of-sight Signal Recognition Method [J]. Computer Science, 2020, 47(11): 327-332.
[14] JIA Yu-fu, LI Ming-lei, LIU Wen-ping, HU Sheng-hong, JIANG Hong-bo. Group Perception Analysis Method Based on WiFi Dissimilarity [J]. Computer Science, 2020, 47(10): 63-68.
[15] WANG Qi-fa, WANG Zhong-qing, LI Shou-shan, ZHOU Guo-dong. Comment Sentiment Classification Using Cross-attention Mechanism and News Content [J]. Computer Science, 2020, 47(10): 222-227.
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .