Real-Time Static Devnagri Sign Language Translation using Histogram
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 4
Abstract
Sign language is nowadays widely used in hearing impaired people as communication media. It has different applications in many domains like HCI (Human Computer Interaction), Robot Control, Security, Gaming, Computer Vision, etc. Devnagri Sign Language Translation System using histogram matching algorithm is proposed in this paper; for recognizing Devnagri Sign Language (DSL) alphabets, the steps of algorithm are Image capturing, Image Pre-processing, Hand region extraction, Feature extraction and histogram matching. Image is captured in RGB color space using 8 Mega Pixel I-ball web camera mounted on top of the laptop. In image pre-processing morphological operation like blurring, noise removing is done. In region extraction stage, hand region is extracted and then edge detection is done using canny edge operator. The third stage is feature extraction; in this the histogram of cropped image is taken. The histogram obtained in this stage is compared with the histogram of image in the training dataset and similarity factor is calculated. Perfect match is obtained for highest similarity factor. In this paper hand gestures for Devnagri Sign Language (DSL) which includes 13 vowels (“swars”) and 33 consonants (“Vyanjan”) are taken. The result mainly depends upon illumination conditions and background texture and by considering all these possibilities our hand gesture recognition system gives up to 87.82% accuracy.
Authors and Affiliations
Jayshree R. Pansare, , Kirti S. Rampurkar , Pritam L. Mahamane , Reshma J. Baravkar , Sneha V. Lanjewar,
Review of Unmanned Aircraft System (UAS)
Unmanned Aircraft Systems (UAS) is an emerging technology with a tremendous potential to revolutionize warfare and to enable new civilian applications. It is integral part of future urban civil and military applications....
A Secured Data Transmission using Genetic based Encryption Techniques over Wireless Networks
The speedy development in wireless networks entails the defending data while transmitting in the network. To employ cryptographic algorithm is difficult view in wireless networks. Biometric features such as face, v...
IP Spoofing Attack Detection using Route Based Information
IP spoofing is almost always used in one of the most difficult attack to defend against – Denial of Service (DoS) attack. DOS attack is evolving due to proliferation of diverse network application. Researchers have...
Detection of traditional and new types of Malware using Host-based detection scheme
In this paper, we have discussed many traditional and new types of worms including c-worms also-worms stands for camouflaging worms because of its nature of self propagating and hiding nature. An active worm refers to a...
lant Recognition through Leaf Features Mapping
There are thousands of plants around us and they are useful in many ways, but in day today life we are so busy that we can’t even recognize few important ones e.g. everyone loves mango, lemon is a well known fruits...