Essay details:

  • Subject area(s): Engineering
  • Price: Free download
  • Published on: 7th September 2019
  • File format: Text
  • Number of pages: 2

Text preview of this essay:

This page is a preview - download the full version of this essay above.

UDP - Project Report


Data Protection Using Hand Gesture


Nikhil Marathe (131000107007)

Guided By

Mr.Maulik Chaudhari

Assistant Professor at CE Department,

Sigma Engineering College, Matar

A Project Report Submitted to

Gujarat Technological University

In Partial Fulfilment of the Requirements for the

 Degree of Bachelor of Engineering in

 Computer Engineering

Department of Computer Engineering

Sigma Engineering College

Matar - 392035, Gujarat-India

December -2016

Chapter No. Topic Name Page No.

1 Certificate 2

2 Compliance Certificate 3

3 Gtu Certificate 4

4 Plagiarism Certificate 5

5 Acknowledgement 7

6 Abstract 8

Chapter : 1 Introduction

1.1 Introduction 1

1.2 Aim & objectives of project 7

1.4 Brief literature review & PAS 8

1.5 Plan of project work 23

1.6 Software & Hardware Required 24

Chapter : 2 DESIGN

2.1 Canvas 26

Chapter:3 Implementation

3.1.1 Screenshots

3.1.2 Security 34

3.1.3 Requirements 34

3.1.4 Advantage 34

Chapter:4 Summary

4.1 Conclusion 36

4.2 Scope of future work 36

4.3 References 37



This is to certify that Nikhil Satish Marathe(131000107007), of class B.E. Computer Engineering (7th Semester) at Sigma Engineering College, Matar has been satisfactorily completed their project work on “DATA PROTECTION USING HAND GESTURE\" for the term ending in December 2016.


Place: Matar

Asst.Prof.Maulik Chaudhari Prof. AnkitDarji

Comp. Engg. Dept. Head of Department,

S.E.C., Matar. Comp. Engg. Dept.,

S.E.C., Matar.


Sigma Engineering College, Matar.

.Examiner(s): ------------------------------


This is to certify that IDP/UDP project work entitled “DATA PROTECTION USING HAND GESTURE” was carried out by Nikhil Satish Marathe (131000107007) at Sigma Engineering College, Matar (100). They have compiled to the comments given by the Internal Reviewer to my satisfaction.

We hereby certify that we are the sole authors of this UDP project report and that neither any part of this IDP/UDP project report nor the whole of the UDP Project report has been submitted for a degree by other student(s) to any other University or Institution.

We certify that, to the best of our knowledge, the current UDP Project report does not infringe upon anyone’s copyright nor violate any proprietary rights and that any ideas, techniques, quotations or any other material from the work of other people included in our UDP Project report, published or otherwise, are fully acknowledged in accordance with the standard referencing practices.


Place: Matar.

Team Guide

Nikhil Satish Marathe (131000107007) Asst.Prof.Maulik Chaudhari

Comp.  Engg.  Dept.,

SEC,  Matar.


We would like to acknowledge the contribution of certain distinguished people, without their support and guidance this project work would not have been completed.

We take this opportunity to express our sincere thanks and deep sense of gratitude to my project guide Mr. MAULIK CHAUDHARI, Assistant Professor of Computer Engineering in Sigma Engineering College, for his guidance and moral support during the course of preparation of this project report.  

We take this opportunity to thank all our friends and colleagues who started me out on the topic and provided extremely useful review feedback and for their all-time support and help in each and every aspect of the course of my project preparation. We are grateful to our Sigma Engineering College for providing me all required stuff and good working environment.

We would also like to thank GTU for giving us such an opportunity to use our theoretical knowledge to develop a practical and real-life application. We are exposed to industrial environment through this project. While developing project, we also got a chance to learn time management and team –work.

At the end, we thank everyone who has helped and supported us during entire development process of Data Protection Using Hand Gesture.   

Data Protection Using Hand Gesture

Submitted By

Nikhil Marathe

Supervised By

Mr.Maulik Chaudhari

Asst.Prof. Comp.  Engg.  Dept.

SEC,  Matar.


Now-a-days there is a problem that our confidential data got easily access by the unauthorized user by hacking the person password ,so to more secure to our confidential data we will develop a system to protect data by an hand gesture of an authorized user. This system will give more protection or prevention to our data therefore the person will be stress free for his confidential data. Our system will only give access the confidential data by an authorized person. In this the hand gesture is particular stored in database and after that the authorized person makes the hand gesture &if that matches with the gesture stored in database then only it can access it.

It is a technique used by human to communicate and interact with machine naturally without any mechanical devices. Gesture recognition allows the computer to understand and bring the human ideas. Gesture recognition act as a bridge between machines and humans, which still limit the majority of input tokeyboard and mouse.. Hand gestures recognition provides a separate complementarymodality to bring ones ideas. Hand gesture is a method of non-verbal communication for humanbeings for its free hand expressions much more other than other parts. Hand gesture recognition has greaterefficient for human computer interaction system.



1.1 Theory of Background

This project deals with the Data Protection Using Hand Gesture. This project is very helpful toas company chairmen & high profile individual person.

The growing quality demand in the Engineering sector makes it necessary to exploit the whole potential of stored data efficiently but give more security or prevention to the storage data facility as it is confidential data which cannot be exploit.

In this sense, now-a-days there will be attackers in numerous number who is hacking our account and take all our confidential data of a person. So, to free from attacker and protect our data we used this data protection using hand gesture system as it will provide access to our data by matching with the patterns stored in database

So due to this the attacker get problematic to access the data which is confidential and because of this our data is secured.



Data Glove based approach make use of glove-typedevice which could detect hand position, movementand finger bending. In this approach user require towear a glove like device, which act as sensors thatcan sense the movements of hand(s) and fingers andpass the information to the computer. This approachcan easily provides exact coordinates the location ofpalm and finger’s, and hand configurations. The mainadvantage of data glove based approach is high

accuracy and fast reaction speed but this approachcan be quite expensive.


Color glove based approach represent aagreementbetween data glove based approach and vision basedapproach. Marked gloves or coloured markers aregloves that worn by the human hand with somecolors to direct the process of tracking the hand andlocating the palm and fingers. It can provide theability to extract geometric features necessary toform shape of hand. The disadvantages are similar todata glove based approaches.


In vision based approach user need not require towear anything. Instead the system requires camera(s),which are used to capture the images of hands forinteraction between human and computers. Visionbased approach is simple. In vision based handgesture recognition system there is no need to wear

anything, this technology use a bare hand to extractdata for recognition. With the help of vision basedtechnology user can directly interact with the systemIn vision based hand gesture recognition system, thehand movement is recorded by videocamera(s).Vision based technology deals with someimage characteristics such as texture and color foracquiring data needed for gesture analyze.

 Types are as follows,

(i) 3D hand model based approach

(ii) Appearance based approach


Three dimensional hand model based approachrepresent the 3D kinematic hand model and it try toestimate the hand parameters by comparison betweenthe input images and the possible 2D appearanceprojected by the 3D hand model. This approach isidea for realistic interactions in virtual environments.In contrast, 3D model based approaches can get thedepth information and are much morecomputationally expensive but can identify handgestures more effectively. 3D Model can be dividedinto volumetric and skeletal models. Volumetricmodels is the 3D visual appearance of human handand usually used in real time applications. The mainproblem in 3D model based technique is that it dealswith all the parameters of the hand which are hugedimensionality. Skeletal models in which it overcomevolumetric hand parameters problem by limiting theset of parameters to model the hand shape from 3Dstructure.


Appearance based approaches is also called as ViewBased. Approach, which model the hand using theintensity of 2D images and define the gestures as asequence of views. These models don’t use a spatialrepresentation of the body, because they derive theparameters directly from the images or videos using atemplate database. Some model are based on thedeformable 2D templates of the hands. Appearancebased approaches considered easier than 3D modelapproach, due to the easier extraction of features in2D image.


 Sign language recognition

 Robot control

 Graphic editor control

 Virtual environments

 Number recognition

 Television control

 3d modeling

1.2 Aims & Objective


 To provide security to our confidential data & preventing from attacker manipulation.


 Free from attacker manipulation

 Secured our confidential data

1.3problems specification

 Sensor not working properly

 Database connectivity

 Camera not working properly

1.4Brief literature review & PAS.


Research Name:

Human Computer Interaction using Hand Gesture

Abstract: Hand gesture is a very natural form of humaninteraction and can be used effectively in human computer interaction (HCI). This project involves the design and implementation of a HCI using a small hand-worn wireless

module with a 3-axis accelerometer as the motion sensor. Thesmall stand-alone unit contains an accelerometer and a wirelessZigbee transceiver with microcontroller. To minimizeintrusiveness to the user, the module is designed to be small(3cm by 4 cm). A time-delay neural network algorithm isdeveloped to analyze the time series data from the 3-axisaccelerometer. Power consumption is reduced by the non-continuoustransmission of data and the use of low-powercomponents, efficient algorithm and sleep mode betweensampling for the wireless module. A home control interfaceisdesigned so that the user can control home appliances bymoving through menus. The results demonstrate the feasibilityof controlling home appliances using hand gestures and wouldpresent an opportunity for a section of the aging populationand disabled people to lead a more independent life.

Advantage :  Help the aged people.

 Easy to use

Conclusion: This project demonstrated the feasibility of designing and

implementing hand gesture recognition devices using a

three-axis accelerometer, a small wireless transceiver

module as well as implementing an embedded neural

network in the device to make it standalone. The Home

Control Interface also demonstrates the feasibility of controlhome appliances using the hand gesture, and would presentan opportunity for a section of the aging population anddisabled people to lead a more independent life.

Research Paper 2


Abstract: Image processing has a very big potential to do virtually anything. But in real life,worse come to worst when the development of particular interest is not being done

properly. This project comes to the extent of development details on recognition systemby using state-of-the-art NI LabVIEW graphical programming software. The

complexness and configurable in so many way of today’s entertainment has brought usback to basic of safety. It is worthless to have a complete system that can do almost

anything but compromises human life. To cope up on par to today technologicalachievement, this project will try to bring sophisticated ways of using image processing

as a solution to deliver command in the other way. The hardware is being interfaced byusing Software Development Kit (SDK) from the supplier of the hardware, in this case isLogitech Inc. Proper data channeling between hardware and software ensure smooth

transaction that increase performance and capability. The method of backlighting is usedto give proper exposure to the subject so that the further processing and blob (binary

large object) analysis can be done on it. This system also used algorithm of severalprocessing technique that may or may not be the same output for each type of it. The

system is upgradeable to be connected by separate module. It will not be viable toimplement it today, but the ever falling prices of gadget plus a little bit of innovation into

infrared lighting, 0 lux night vision acquisition, refine image processing and fuzzy logicto keep the system trained, it will be everyday must.

Advantage :  You  can remove unwanted objects.

 Easily recognization is done.

Disadvantage :  It only works on image.

 Time consuming

Conclusion :

As early as in 1670, there’s an expertise for human eyes named optometrist tohelp its patient to have a better vision on their surrounding. The first one is Benjamin

Franklin that invented the first pair of bifocal glasses [1]. Benjamin’s intention is toimprove visibility and at that time not to aid people with sight problem like most people

today. That context is referring to human capability of seeing things, contributing to avery highly valuable gift. Thanks to the fine creation of god, we do have two eyes that isone of tool to predict and act verily according to the vision tells and guides.Just imagine how this world is if we are normal human being with healthy eyes,

then we lost the vision or capability of capturing images and color. Even with one eyes,we have difficulties of estimate the distance of an object. Then, we immediately lostcoordination and physical sense of everything around us. This situation best describe byhaving woman protect herself from strangers just by spraying chili aerosol to paralyze itsattacker vision for a moment.

Research Paper 3

                    Research Name:

Study on Various Techniques in Hand Gesture


Abstract: Hand Gesture recognition is a techniqueused by human to communicate and interact withmachine naturally without any mechanical devices.Gesture recognition allows the computer tounderstand and bring the human ideas. Gesturerecognition act as a bridge between machines and

humans, which still limit the majority of input to

keyboard and mouse. Gesture recognition in which it

recognize the expressions of motion by a human such

as hands, arms, face, head, and body. Hand gestures

recognition provides a separate complementary

modality to bring ones ideas. Hand gesture is a

method of non-verbal communication for human

beings for its free hand expressions much more other

than other parts. Hand gesture recognition has greater

efficient for human computer interaction system.

Advantage :  Good performance system with the complex background

 Sufficient reliable for recognition systems.

Disadvantage :  Irrelevant object might overlap with the hand

 Wrong object extraction appeared if the object

larger than the hand.

Conclusion :

In this survey paper, compare to Data glove based

approaches, Color glove based approaches, Vision

based approaches, Appearance based approaches, 3D Model Based Approaches, Contour based model.

Contour based model is more accurate. In contour

based model per-class accuracy for pixels located on

the hand contour and the per-class accuracy by using

the contour model. Compared with the results

provided by the pixel classification, there is a large

improvement in contour model based classification.

The average accuracy of hand parts classification is


Research Paper 4

Research Name:


Abstract: This paper presents an automatic algorithm for static hand

gesture recognition relying on both depth and intensity

information provided by a time-of-flight (ToF) camera. Thecombined depth and intensity information facilitates thesegmentation process, even in the presence of a clutteredbackground (2 misses out of 450 images). Gestureclassification is based on a decision tree using structuraldescriptions of partitioned contour segments. Classificationwas tested on 9 different gestures. The final meanrecognition rate is satisfactory, of about 93.3%.

Advantage :  Simple,fast easy to implement

 Apllied on real system

Disadvantage :  System limitation restrict the application

Conclusion :

An automatic method for static hand gesture recognition

using a ToF camera was presented. Hand segmentation is

straightforward using a region-constrained region growing

algorithm which considers both depth and intensity image

data. Gesture classification occurred with a decision tree

exploiting structural descriptions of partitioned segments.

The classification is in principal robust to contour

fragmentation and is translation invariant, which however

was not particularly exploited here. The original method

described in [11] offers to the classifier a very good

description of the contour structure which enables the

subsequent identification of the fingers. If more than 9

gesture classes were used, then the decision tree had to be

certainly more complex. However the recognition principledemonstrated here is certainly promising.

Research Paper 5

                    Research Name: Wireless Communication Glove Apparatus for Motion

Tracking, Gesture Recognition, Data Transmission, andReception in Extreme Environments

Abstract: Military personnel need better ways to communicate in hostile,noisy, silence-mandated, and/or extreme environments. Typing ona keyboard is difficult and impractical while wearingcomprehensive protective clothing. Wireless data gloves wereresearched and developed to transmit and receive ASCII code and

other signals as hand gestures. Two categories of glove prototypeswere constructed: gloves with and without a haptic-IO capability.All data gloves detect motion, such as gestures, using magneticsensors. Non-haptic gloves only transmit static and dynamicgestures. Haptic gloves have vibro-mechanical devices on thefingertips for feedback about transmitted signals and for covertsignal

reception. Many potential communications applications

include hazardous and covert military operations, space operations,fire fighting, mining, training, underwater use, and aids for thevisually and hearing impaired.

Advantage :  It could be applied on robot control

 No training is required

Disadvantage :  Performance recognition decrease when the distance is greater than 1.5 between the user and camera

Conclusion :

Military personnel need better ways to communicate in hostile, is especially true while wearing comprehensive protective clothing,such as Mission-Oriented Protective Posture (MOPP) gear or spacesuits. Even a simple task such as typing on a keyboard becomesunwieldy. This paper describes a novel method for data and gesture

communications called “data gloves.” These data gloves wereresearched and developed to transmit and receive ASCII code andother signals in the form of hand gestures.

1.4.1 Patent-1


Patent Number: US 20050114689A1

Application Number : 10/945,542

Applicant : Microsoft Corporation

Place: Redmond,WA(US)

Description : A source generates a medium key (KM) and a media secret table including a plurality of entries, each entry including (KM) encrypted by a public key (PU-PD) of a plurality of devices, obtains the medium ID of a medium there from, generates a content key (KD) for a piece of content, encrypts the content with (KD) to result in (KD(content)), encrypts (KD) with (KM) to result in (KM(KD)), generates a package for the content including (KD(content)), (KM(KD)), the medium ID, and a signature based on at least the medium ID and verifiable with (KM), and copies the generated package and the media secret table to the medium. Thus, a device with the medium and a private key (PR-PD) corresponding to an entry of the media secret table can access and render the content.

1.4.2 Patent-2


Patent Number: US5454043A

Application Number : US08099944

Applicant : Mitsubishi Electric Research Laboratories Inc

Place: Cambridge, MASS

Description : A low-level model-free dynamic and static hand gesture recognition system utilizes either a 1-D histogram of frequency of occurrence vs. spatial orientation angle for static gestures or a 2-D histogram of frequency of occurrence vs. space-time orientation for dynamic gestures. In each case the histogram constitutes the signature of the gesture which is used for gesture recognition. For moving gesture detection, a 3-D space-time orientation map is merged or converted into the 2-D space-time orientation histogram which graphs frequency of occurrence vs. both orientation and movement. It is against this representation or template that an incoming moving gesture is matched.

1.4.3 Patent-3

                   Title : Fraud prevention techniques

Patent Number: US 20100130172A1

Application Number : US12626066

Applicant : Ring Central Inc

Place: San Mateo, CA (US)

Description : System, apparatus, computer program products and methods for preventing fraud attacks (e.g., on a virtual PBX service provider) are disclosed. In some implementations, a set of fraud evaluation processes are performed, an overall fraud evaluation score is incremented as each of the set of fraud evaluation processes are performed and a step result is obtained. A user request (e.g., account activation) can be denied or accepted based on the overall fraud evaluation score. In some implementations, the set of fraud evaluation processes can include one or more of: an internal fraud evaluation process, a process for checking multiple trial accounts associated with a common account parameter, a process for geolocation verification of multiple account parameters, a process for device type verification for a contact phone number, a process for credit card verification, and a process for placing a contact number verification call

1.4.4 Patent-4

                  Title : Database security via data flow processing

Patent Number: US20110219035A1

Application Number : US12982795

Applicant : Crossbeam Systems Inc

Place: US

Description : An apparatus and method to distribute applications and services in and throughout a network and to secure the network includes the functionality of a switch with the ability to apply applications and services to received data according to respective subscriber profiles. Front-end processors, or Network Processor Modules (NPMs), receive and recognize data flows from subscribers, extract profile information for the respective subscribers, utilize flow scheduling techniques to forward the data to applications processors, or Flow Processor Modules (FPMs). The FPMs utilize resident applications to process data received from the NPMs. A Control Processor Module (CPM) facilitates applications processing and maintains connections to the NPMs, FPMs, local and remote storage devices, and a Management Server (MS) module that can monitor the health and maintenance of the various modules.

1.4.5 Patent-5

                   Title : Encryption based on touch gesture

Patent Number: US9165159B1

Application Number : US14152863

Applicant : Marvell International Ltd

Place: Hamilton (BM)

Description : Some of the embodiments of the present disclosure provide a method comprising receiving an input from a touch input device. The input corresponds to a gesture produced by a user swiping a pattern on a surface of the touch input device. The method further comprises decomposing the gesture into segments, using a look-up table to determine alphanumeric elements that correspond to each of the segments, and assembling the alphanumeric elements into an encryption password.

1.5 Plan of project work




Problem Summary

Feasibility Analysis

Requirement Determination

Requirement Analysis

Requirement Specification


1.6Software & Hardware Required


 ArcSoft

 Net Beans


 Quick Cam Pro 5000

 Celeron processor

 256MB of RAM






 Activities:-

In this process there are various activity are present such as:-

a) Enter password

b) Enter mobile number

c) Enter email id

d) Enter username

e) Verification code

 Environment :-

In this it provide us the scenario of the system like:-

a) Database problem

b) Attacker problem

c) Data security problem

d) Sensor problem

e) Connectivity problem

 Interaction:-

In this case it display who is interacting with whom like:-

a) Camera with database

b) User with camera

c) Sensor with camera

d) Camera with system

 Objects:-

It shows which are the object is present such as:-

a) Systems

b) Connectivity

c) Camera

d) Database

e) Pc

f) User

g) Sensor

 Users:-

In this case it shows us the user who can access to the system

a) Hardware developer

b) Customer

2.1.2. Empathy mapping canvas


 User:-

a) Hardware developer

b) Customer

 Stakeholders

a) Hardware developer

b) Technian

c) Organization

d) Government authority

 Activities:-

a) Hand recognization

b) Enter password

c) Sensor sensing

d) Enter email id

e) Camera capturing

f) Enter mobile no.

g) Hand recognization matching with database

2.1.3. Ideation canvas:-


 People:-

In this it include the involving of different person llike:-

a) Hardware developer

b) Organization

c) Customer

d) Technian

e) Government authority

 Activities:-

It include the various types of activites related to our system such as:-

a) To provide security

b) Gesture mapping with database stored gesture

c) Sensor sensing system

d) Camera recognization of hand gesture

 Situation/context/location:-

It involve the situation occurring for our system, also based on our context and finally it also depend on location for the system.

a) Sensor not working

b) Database connectivity

c) Camera not working

d) Hiding security attacker manipulation

e) Military application

f) company

2.1.4. Product Development:-

 Purpose:-

It provide us for what purpose we are making our project:-

a) to provide more security

b) to free from attacker manipulation

 people:-

It includes the number of people belonging to our system:-

a) Hardware Developer

b) Customer

 product experience:-

It state that what will be the experience of our system:-

a) it is easy to access our data

b) it provide security to data

 product function:-

It includes the what are the project function for our system:-

a) attacker manipulation

b) highly security

 product feature:-

It include what are the features in our system:-

a) camera recognization of hand gesture

b) secured data ass only access by authorized person

c) sensor technology

 components:-

It include what are the components required in our systems:-

a) sensor

b) pc

c) camera

d) Netbeans

e) MSVisio

f) My Sql

 customer revalidation:-

It gives the feedback for our project:-

a) movements of angle changes every time

b) backup of protection data should be there

 reject,redesign,retain:-

a) block of pixels should be display

b) eyes retina capturing or password should be there.

2.1.5:-BMC CANVAS:-

• Key Partners

1. Users

2. Web Service Provider\\Manager

  It is the network of suppliers and partners that make my model works.

• Key Activities

1. Provide Security

2. Gesture Movement

3. Camera Capturing Gesture

These are the main activities that make my model work

• Key Resources

1. Computer/Laptop

2. Internet

3. Web Camera

These are main resources, by the help of which my system is able to work on it.

• Value Proposition

1. Highly Secure Data

2. Quick &Efficient services

3. Easy to use

4. Platform independent

It is the clear description which increased the value of my systems for the customer.

• Customer Relationship

1. Self-services

2. Automated

It provide us the description about the relationship with the customer.

• Channels

1. Online Mode

It act as a mode for reaching to its destination and provide service to them.

• Cost Structure

1. Web Hosting

2. Developer

3. Web Camera

It describe whatever cost required to make our systems.

• Revenue Streams

1. Usage Fees

It is the generating and collecting income mechanisms.

• Customer Segments

1. General People

It is the people who all are attached with our systems.





2.Login Page:-

3.Password Recovery:-

3.Registration Page:-

3.1.4. Security:-

 Security is of main purposed while carrying out this Data protection using hand gesture. This system has being implemented proper security measures such as creating secure space between customer and attacker, due to which attacker cannot attack in our systems.

Proper access rights control is been implemented, So the system will provide the secure

Environment to each user and admin with the systems.

3.1.5. Requirement:-

 Whenever we does the movement of our hand for gesturing then the angle will be the different at each time so we have to do to make a block of pixels so it prevent to change the angle of our movement.

 In case of any failure in the hardware or sometimes we got the injury in our hand and due to this it cannot detect our hand properly so in that case there should be bacup password should be provided.

3.1.6. Advantage:-

 It  provide highly security

 It is easy to access our data

 It prevents from attacker

 It is also use for hiding our confidential data



4.1   Conclusion

The growing quality demand for security of our data is very necessary in this world. The data is not only our personal information but it also include data which is more personal or confidential which can be access only to our authorized person.

In this sense, it gives more benefits as per the security purpose of our data and also gives free from the attacker manipulation.

4.2 Scope of future work

 It  provide highly security

 It prevents from attacker

 It is also use for hiding our confidential data

4.3 References

[1].Oprisescu, Serban, ChristophRasche, and Bochao Su. \"Automatic static hand gesture          recognition using tof cameras.\" Signal Processing Conference (EUSIPCO), 2012 Proceedings of the 20th European.IEEE, 2012.

[2].Pu, Qifan, et al. \"Whole-home gesture recognition using wireless signals.\"Proceedings of the 19th annual international conference on Mobile computing &networking.ACM, 2013.

...(download the rest of the essay above)

About this essay:

This essay was submitted to us by a student in order to help you with your studies.

If you use part of this page in your own work, you need to provide a citation, as follows:

Essay Sauce, . Available from:< > [Accessed 31.05.20].