3-Dimensional Personal Identification and Its Applications Based on Kinect

碩士 === 東海大學 === 資訊工程學系 === 103 === With the fast development of the man-machine interface technology, human movement captured by sensing devices attached to the human body in the past has gradually captured through cameras nowadays. Different from traditional cameras or charge-coupled device (CCD) c...

Full description

Bibliographic Details
Main Authors: Ssu-Ying Lin, 林思縈
Other Authors: Chu-Hsing Lin
Format: Others
Language:zh-TW
Published: 2015
Online Access:http://ndltd.ncl.edu.tw/handle/97387200216573646363
Description
Summary:碩士 === 東海大學 === 資訊工程學系 === 103 === With the fast development of the man-machine interface technology, human movement captured by sensing devices attached to the human body in the past has gradually captured through cameras nowadays. Different from traditional cameras or charge-coupled device (CCD) cameras, the Kinect motion sensing device, first released in 2010, receives information of the three-dimensional stereoscopic environment addition to the two-dimensional image array. It contains not only traditional color information but also depth information, and has been gradually widely applied in digital education, medical applications, 3D animation and other areas. Motion capture devices were expensive in the past, most of them adopted general video cameras to capture human motion. Due to the lack of depth information on the video screen, human movements were often determined only by two-dimensional body posture information. Also, due to security concern motion detection machines are not suitable for public places. This study uses the Kinect motion sensing device with the official Kinect Software Development Kit for human movement identification. Combined with three-dimensional information for security identification, motions of human fingers are further detected to control computers and implement a variety of functions. Since three-dimensional information of any individual human body cannot be easily replicated, the proposed method attains system security protection and is promised for a variety of applications in the future.