SlideShare a Scribd company logo
By,
Sharath Raj
175834311
II MSc Computer Science
Introduction
• An eye has a lot of communicative power. Eye contact
and gaze direction are central and very important
factors in human communication.
• The Computer mouse has gained high popularity as an
input device.
• The Eye Tracking System is a Human Computer
Interaction application where a person can control
the mouse pointer using his/her eyes.
• Useful for Paralyzed / Physically disabled people to
convey their messages to others.
• Eye Tracking is the process of
measuring where we look, also
known as our Point of Gaze.
• Eye Tracking is a technology that
puts you in control of your device by
using your eyes as you naturally
would.
• A device or computer equipped with
eye tracker knows what a user is
looking at. This makes it possible for
users to interact with computers
using their eyes.
How Human Eye Works?
 Light enters the eye through the cornea.
 From the cornea, the light passes through the pupil. The amount of
light passing through is regulated by the iris, or the colored part of
the eye.
 From there, the light then hits the lens, the transparent structure
inside the eye, which focuses light rays onto the retina.
 Finally, it reaches the retina, the light-sensitive nerve layer that lines
the back of the eye, where the image appears inverted.
 The optic nerve carries signals of light, dark, and colors to the area
of the brain, which assembles signals into images (our vision).
Eye Tracking Terminology
 Fixation – A single instance where the eye momentarily stops
 Saccade - The rapid eye movement from one fixation to the next
 Scan Path – A series of sequential fixations and saccades.
Goal of the System
• Hands – free Computing
• Facilitating the handicapped in using the Computer
• Controlling the mouse pointer through eye movement.
• Eye based Human – Computer interaction provides real Time Eye Tracking
and Eye - Gaze estimation.
• Image Acquisition: A web – cam is required to acquire images. System will
start with image acquisition using an integrated web-cam or USB web-cam.
• Image Pre-processing: Pre-processing the data is always helpful in
extracting useful information. Images acquired by web-cam must be
converted into appropriate formats required by different algorithm at next
stages.
• Eyes Features Detection: Necessary eye features are identified, Using HCT
for pupil detection and Template Matching Technique for eye corners
detection.
• Screen Mapping: Mapping the coordinates of the screen with the pupil
movements is done.
System Components and interactions of the project virtual mouse system.
• The software application is organized into two parts:
 The eye tracking engine part and mouse simulation part.
 The eye tracking engine part matches our software application with eye tracking
device to eye control mouse function.
MODULE DESCRIPTION
 Main Interface Module : It Sets and manages the startup dialogue.
 Mouse/Keyboard Engine Simulation Module : It create dynamic tool window, automatically
changes the size of the tool window according to the screen resolution, and decides whether to
display or obscure the toolbar.
 User Action Detection Module : The fixation function in this module is defined to calculate the
gaze time of the user and determine the mouse coordinates.
 Halt Module : It determines whether to stop eye tracking and enter the sleep mode and
determines whether to jump out of the sleep mode and restart the eye tracking.
 Mouse Function Module : It receives the view point of user from simulation engine and transfers
the coordinate to the fixation function within user action detection module.
Algorithm Description
• Eye Detection using Viola - Jones Algorithm
• Detecting Iris using Circular Hough Transform Algorithm
Viola – Jones Algorithm
 Computers cannot detect face very easily as humans.
 When an image is prompted to the computer, all that it sees is a matrix of numbers.
 A regular image is composed of thousands of pixels. Even a small 28 X 28 image is composed by
784 pixels.
 Each pixel can assume 255 values. So that’s 255784 possible values.
 Viola Jones algorithm extracts a much simpler representations of the image, and combine those
simple representations into more high – level representation in a hierarchical way.
STEPS INVOLVED IN VIOLA – JONES ALGORITHM
 Haar – like Feature Extraction
We have some primitive masks. Those masks are slide
over the image, and the sum of the values of the pixels
within the white side is subtracted from the black side.
The result is a feature that represents that region.
Circular Hough
Transform
Algorithm
 Now we detected the eyes using the viola – jones algorithm, the next
step is to detect the iris.
 For that we are going to look for the most circular object in the eye
region.
STEPS INVOLVED IN CIRCULAR HOUGH
TRANSFORM
• By using CHT, the circle parameters within a given image are
identified: the circle centre coordinates “a” and “b” and the
circle radius “r”, as represented in the circle equation:
• To improve precision we implement a pre-processing step:
– Segmentation threshold to cut image components such as
eyelashes and eyebrows and keep only the pupil contour.
• This is done using the dark pupil technique.
HARDWARE AND SOFTWARE REQUIREMENTS
• Operating System – Windows 7 or above, Linux, Mac OS
• Processor – 2Ghz or More
• RAM – 2GB
• Hard Disk – Minimum 120GB
• IR LED
• Web Camera
• OpenCV(Computer Vision)
• MATLAB
• Python IDLE
 The system combines both the mouse and keyboard functions, so that users can achieve
almost all of the inputs to the computer without traditional input equipment.
 The idea of eye control is of great use to not only the future of natural input but more
importantly the handicapped and disabled.
 The use of Standard Circular Hough Transformation in image processing module of the
implementation combined with the grid analysis approach is practically successful and has
high potential in future applications.
Future Works
 One can control home automation system.
 Can be used to find the persons interest in a product.
 One can control LCD in automobile with the movement of the eye.
 Can be used in medical industries while performing high end operations to control
the PC or its various operations.
 Can be used by astronauts in space to control various operations inside their suits.

More Related Content

What's hot

Eye gaze technology
Eye gaze technologyEye gaze technology
Eye gaze technology
Ketan Hulaji
 
Eye Gaze Communication system
Eye Gaze Communication systemEye Gaze Communication system
Eye Gaze Communication system
MahimaKumari7
 
Eye mouse ppt
Eye mouse pptEye mouse ppt
Eye mouse pptbhavithd
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition systemNilu Desai
 
Eye mouse
Eye mouseEye mouse
Eye mouse
SUHAS BADAM
 
Eye gaze communication
Eye gaze communicationEye gaze communication
Eye gaze communication
PRADEEP Cheekatla
 
screen less display
screen less displayscreen less display
screen less display
mani akuthota
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
shyamalaramesh2
 
Iris ppt
Iris pptIris ppt
Iris ppt
Sri Harati K
 
eyegaze communication system
eyegaze communication system eyegaze communication system
eyegaze communication system
Manasa Reddy
 
Eye Tracking Technologies: VDC-Whitepaper
Eye Tracking Technologies: VDC-WhitepaperEye Tracking Technologies: VDC-Whitepaper
Eye Tracking Technologies: VDC-Whitepaper
Virtual Dimension Center (VDC) Fellbach
 
Eye Tracking & Design
Eye Tracking & DesignEye Tracking & Design
Eye Tracking & Design
Optimal Usability
 
Video object tracking with classification and recognition of objects
Video object tracking with classification and recognition of objectsVideo object tracking with classification and recognition of objects
Video object tracking with classification and recognition of objectsManish Khare
 
Gesture recognition
Gesture recognitionGesture recognition
Gesture recognition
PrachiWadekar
 
2021_03_26 "Eye-tracking techniques and methods in e-learning environments" -...
2021_03_26 "Eye-tracking techniques and methods in e-learning environments" -...2021_03_26 "Eye-tracking techniques and methods in e-learning environments" -...
2021_03_26 "Eye-tracking techniques and methods in e-learning environments" -...
eMadrid network
 
Artificial Eye PPT
Artificial Eye PPTArtificial Eye PPT
EYE GAZE COMMUNICATION by njn
EYE GAZE COMMUNICATION by njnEYE GAZE COMMUNICATION by njn
EYE GAZE COMMUNICATION by njn
Nijin Nijin
 
Screenlessdisplay
ScreenlessdisplayScreenlessdisplay
Screenlessdisplay
Meghana Desu
 
Eye tracking and its economic feasibility
Eye tracking and its economic feasibilityEye tracking and its economic feasibility
Eye tracking and its economic feasibility
Jeffrey Funk
 

What's hot (20)

Eye gaze technology
Eye gaze technologyEye gaze technology
Eye gaze technology
 
Eye Gaze Communication system
Eye Gaze Communication systemEye Gaze Communication system
Eye Gaze Communication system
 
Eye mouse ppt
Eye mouse pptEye mouse ppt
Eye mouse ppt
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition system
 
Eye mouse
Eye mouseEye mouse
Eye mouse
 
Eye gaze communication
Eye gaze communicationEye gaze communication
Eye gaze communication
 
Iris recognition
Iris recognition Iris recognition
Iris recognition
 
screen less display
screen less displayscreen less display
screen less display
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Iris ppt
Iris pptIris ppt
Iris ppt
 
eyegaze communication system
eyegaze communication system eyegaze communication system
eyegaze communication system
 
Eye Tracking Technologies: VDC-Whitepaper
Eye Tracking Technologies: VDC-WhitepaperEye Tracking Technologies: VDC-Whitepaper
Eye Tracking Technologies: VDC-Whitepaper
 
Eye Tracking & Design
Eye Tracking & DesignEye Tracking & Design
Eye Tracking & Design
 
Video object tracking with classification and recognition of objects
Video object tracking with classification and recognition of objectsVideo object tracking with classification and recognition of objects
Video object tracking with classification and recognition of objects
 
Gesture recognition
Gesture recognitionGesture recognition
Gesture recognition
 
2021_03_26 "Eye-tracking techniques and methods in e-learning environments" -...
2021_03_26 "Eye-tracking techniques and methods in e-learning environments" -...2021_03_26 "Eye-tracking techniques and methods in e-learning environments" -...
2021_03_26 "Eye-tracking techniques and methods in e-learning environments" -...
 
Artificial Eye PPT
Artificial Eye PPTArtificial Eye PPT
Artificial Eye PPT
 
EYE GAZE COMMUNICATION by njn
EYE GAZE COMMUNICATION by njnEYE GAZE COMMUNICATION by njn
EYE GAZE COMMUNICATION by njn
 
Screenlessdisplay
ScreenlessdisplayScreenlessdisplay
Screenlessdisplay
 
Eye tracking and its economic feasibility
Eye tracking and its economic feasibilityEye tracking and its economic feasibility
Eye tracking and its economic feasibility
 

Similar to Eye Tracking Based Human - Computer Interaction

Computer vision
Computer visionComputer vision
Computer vision
AnkitKamal6
 
A computer vision based virtual mouse
A computer vision based virtual mouseA computer vision based virtual mouse
A computer vision based virtual mouse
StudentRocks
 
Human computer interaction_ 23CSM1R19.pptx
Human computer interaction_ 23CSM1R19.pptxHuman computer interaction_ 23CSM1R19.pptx
Human computer interaction_ 23CSM1R19.pptx
sp23csm1r19
 
Computer architecture for vision system
Computer architecture for vision systemComputer architecture for vision system
Computer architecture for vision system
AkashPatil334
 
PRESENTATION FUTURE STUDIES (1).pptx
PRESENTATION FUTURE STUDIES (1).pptxPRESENTATION FUTURE STUDIES (1).pptx
PRESENTATION FUTURE STUDIES (1).pptx
TalhaJavid4
 
IRJET - Gesture Controlled Home Automation using CNN
IRJET -  	  Gesture Controlled Home Automation using CNNIRJET -  	  Gesture Controlled Home Automation using CNN
IRJET - Gesture Controlled Home Automation using CNN
IRJET Journal
 
virtual mouse using hand gesture.pptx
virtual mouse using hand gesture.pptxvirtual mouse using hand gesture.pptx
virtual mouse using hand gesture.pptx
sivaeswarreddy
 
Portfolio - Ramsundar K G
Portfolio - Ramsundar K GPortfolio - Ramsundar K G
Portfolio - Ramsundar K GRamsundar K G
 
Intelligent image processing
Intelligent image processingIntelligent image processing
Intelligent image processingAndrew Stewart
 
Cursor Movement with Eyeball
Cursor Movement with EyeballCursor Movement with Eyeball
Cursor Movement with Eyeball
IRJET Journal
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET Journal
 
Introduction to Computer Vision - Image formation
Introduction to Computer Vision -  Image formationIntroduction to Computer Vision -  Image formation
Introduction to Computer Vision - Image formation
KarpagaPriya10
 
Sign Language Recognition using Machine Learning
Sign Language Recognition using Machine LearningSign Language Recognition using Machine Learning
Sign Language Recognition using Machine Learning
IRJET Journal
 
doorsystem (2).pptx
doorsystem (2).pptxdoorsystem (2).pptx
doorsystem (2).pptx
DAshok2
 
pick and place robotic arm
pick and place robotic armpick and place robotic arm
pick and place robotic arm
ANJANA ANILKUMAR
 
Mainprojpresentation 150617092611-lva1-app6892
Mainprojpresentation 150617092611-lva1-app6892Mainprojpresentation 150617092611-lva1-app6892
Mainprojpresentation 150617092611-lva1-app6892
ANJANA ANILKUMAR
 
APPLICATIONS OF MACHINE VISION
APPLICATIONS OF MACHINE VISIONAPPLICATIONS OF MACHINE VISION
APPLICATIONS OF MACHINE VISION
anil badiger
 
Visual pattern recognition in robotics
Visual pattern recognition in roboticsVisual pattern recognition in robotics
Visual pattern recognition in robotics
IAEME Publication
 
PC Control with Eye Movement for Specially Abled.pptx
PC Control with Eye Movement for Specially Abled.pptxPC Control with Eye Movement for Specially Abled.pptx
PC Control with Eye Movement for Specially Abled.pptx
manralanany
 
IRJET- Igaze-Eye Gaze Direction Evaluation to Operate a Virtual Keyboard for ...
IRJET- Igaze-Eye Gaze Direction Evaluation to Operate a Virtual Keyboard for ...IRJET- Igaze-Eye Gaze Direction Evaluation to Operate a Virtual Keyboard for ...
IRJET- Igaze-Eye Gaze Direction Evaluation to Operate a Virtual Keyboard for ...
IRJET Journal
 

Similar to Eye Tracking Based Human - Computer Interaction (20)

Computer vision
Computer visionComputer vision
Computer vision
 
A computer vision based virtual mouse
A computer vision based virtual mouseA computer vision based virtual mouse
A computer vision based virtual mouse
 
Human computer interaction_ 23CSM1R19.pptx
Human computer interaction_ 23CSM1R19.pptxHuman computer interaction_ 23CSM1R19.pptx
Human computer interaction_ 23CSM1R19.pptx
 
Computer architecture for vision system
Computer architecture for vision systemComputer architecture for vision system
Computer architecture for vision system
 
PRESENTATION FUTURE STUDIES (1).pptx
PRESENTATION FUTURE STUDIES (1).pptxPRESENTATION FUTURE STUDIES (1).pptx
PRESENTATION FUTURE STUDIES (1).pptx
 
IRJET - Gesture Controlled Home Automation using CNN
IRJET -  	  Gesture Controlled Home Automation using CNNIRJET -  	  Gesture Controlled Home Automation using CNN
IRJET - Gesture Controlled Home Automation using CNN
 
virtual mouse using hand gesture.pptx
virtual mouse using hand gesture.pptxvirtual mouse using hand gesture.pptx
virtual mouse using hand gesture.pptx
 
Portfolio - Ramsundar K G
Portfolio - Ramsundar K GPortfolio - Ramsundar K G
Portfolio - Ramsundar K G
 
Intelligent image processing
Intelligent image processingIntelligent image processing
Intelligent image processing
 
Cursor Movement with Eyeball
Cursor Movement with EyeballCursor Movement with Eyeball
Cursor Movement with Eyeball
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
 
Introduction to Computer Vision - Image formation
Introduction to Computer Vision -  Image formationIntroduction to Computer Vision -  Image formation
Introduction to Computer Vision - Image formation
 
Sign Language Recognition using Machine Learning
Sign Language Recognition using Machine LearningSign Language Recognition using Machine Learning
Sign Language Recognition using Machine Learning
 
doorsystem (2).pptx
doorsystem (2).pptxdoorsystem (2).pptx
doorsystem (2).pptx
 
pick and place robotic arm
pick and place robotic armpick and place robotic arm
pick and place robotic arm
 
Mainprojpresentation 150617092611-lva1-app6892
Mainprojpresentation 150617092611-lva1-app6892Mainprojpresentation 150617092611-lva1-app6892
Mainprojpresentation 150617092611-lva1-app6892
 
APPLICATIONS OF MACHINE VISION
APPLICATIONS OF MACHINE VISIONAPPLICATIONS OF MACHINE VISION
APPLICATIONS OF MACHINE VISION
 
Visual pattern recognition in robotics
Visual pattern recognition in roboticsVisual pattern recognition in robotics
Visual pattern recognition in robotics
 
PC Control with Eye Movement for Specially Abled.pptx
PC Control with Eye Movement for Specially Abled.pptxPC Control with Eye Movement for Specially Abled.pptx
PC Control with Eye Movement for Specially Abled.pptx
 
IRJET- Igaze-Eye Gaze Direction Evaluation to Operate a Virtual Keyboard for ...
IRJET- Igaze-Eye Gaze Direction Evaluation to Operate a Virtual Keyboard for ...IRJET- Igaze-Eye Gaze Direction Evaluation to Operate a Virtual Keyboard for ...
IRJET- Igaze-Eye Gaze Direction Evaluation to Operate a Virtual Keyboard for ...
 

More from Sharath Raj

Computer Graphics Project Report on Sinking Ship using OpenGL
Computer Graphics Project Report on Sinking Ship using OpenGL Computer Graphics Project Report on Sinking Ship using OpenGL
Computer Graphics Project Report on Sinking Ship using OpenGL
Sharath Raj
 
Computer Graphics Project on Sinking Ship using OpenGL
Computer Graphics Project on Sinking Ship using OpenGLComputer Graphics Project on Sinking Ship using OpenGL
Computer Graphics Project on Sinking Ship using OpenGL
Sharath Raj
 
Basic Computer Knowledge in Kannada
Basic Computer Knowledge in KannadaBasic Computer Knowledge in Kannada
Basic Computer Knowledge in Kannada
Sharath Raj
 
Substance abuse and addiction
Substance abuse and addictionSubstance abuse and addiction
Substance abuse and addiction
Sharath Raj
 
Digital data storage in DNA
Digital data storage in DNADigital data storage in DNA
Digital data storage in DNA
Sharath Raj
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
Sharath Raj
 
Final Year Project BCA Presentation on Pic-O-Stica
Final Year Project BCA Presentation on Pic-O-SticaFinal Year Project BCA Presentation on Pic-O-Stica
Final Year Project BCA Presentation on Pic-O-Stica
Sharath Raj
 
Artificial inteligence
Artificial inteligenceArtificial inteligence
Artificial inteligence
Sharath Raj
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 

More from Sharath Raj (9)

Computer Graphics Project Report on Sinking Ship using OpenGL
Computer Graphics Project Report on Sinking Ship using OpenGL Computer Graphics Project Report on Sinking Ship using OpenGL
Computer Graphics Project Report on Sinking Ship using OpenGL
 
Computer Graphics Project on Sinking Ship using OpenGL
Computer Graphics Project on Sinking Ship using OpenGLComputer Graphics Project on Sinking Ship using OpenGL
Computer Graphics Project on Sinking Ship using OpenGL
 
Basic Computer Knowledge in Kannada
Basic Computer Knowledge in KannadaBasic Computer Knowledge in Kannada
Basic Computer Knowledge in Kannada
 
Substance abuse and addiction
Substance abuse and addictionSubstance abuse and addiction
Substance abuse and addiction
 
Digital data storage in DNA
Digital data storage in DNADigital data storage in DNA
Digital data storage in DNA
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Final Year Project BCA Presentation on Pic-O-Stica
Final Year Project BCA Presentation on Pic-O-SticaFinal Year Project BCA Presentation on Pic-O-Stica
Final Year Project BCA Presentation on Pic-O-Stica
 
Artificial inteligence
Artificial inteligenceArtificial inteligence
Artificial inteligence
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 

Recently uploaded

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 

Recently uploaded (20)

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 

Eye Tracking Based Human - Computer Interaction

  • 2. Introduction • An eye has a lot of communicative power. Eye contact and gaze direction are central and very important factors in human communication. • The Computer mouse has gained high popularity as an input device. • The Eye Tracking System is a Human Computer Interaction application where a person can control the mouse pointer using his/her eyes. • Useful for Paralyzed / Physically disabled people to convey their messages to others.
  • 3. • Eye Tracking is the process of measuring where we look, also known as our Point of Gaze. • Eye Tracking is a technology that puts you in control of your device by using your eyes as you naturally would. • A device or computer equipped with eye tracker knows what a user is looking at. This makes it possible for users to interact with computers using their eyes.
  • 4. How Human Eye Works?  Light enters the eye through the cornea.  From the cornea, the light passes through the pupil. The amount of light passing through is regulated by the iris, or the colored part of the eye.  From there, the light then hits the lens, the transparent structure inside the eye, which focuses light rays onto the retina.  Finally, it reaches the retina, the light-sensitive nerve layer that lines the back of the eye, where the image appears inverted.  The optic nerve carries signals of light, dark, and colors to the area of the brain, which assembles signals into images (our vision).
  • 5. Eye Tracking Terminology  Fixation – A single instance where the eye momentarily stops  Saccade - The rapid eye movement from one fixation to the next  Scan Path – A series of sequential fixations and saccades.
  • 6. Goal of the System • Hands – free Computing • Facilitating the handicapped in using the Computer • Controlling the mouse pointer through eye movement. • Eye based Human – Computer interaction provides real Time Eye Tracking and Eye - Gaze estimation.
  • 7. • Image Acquisition: A web – cam is required to acquire images. System will start with image acquisition using an integrated web-cam or USB web-cam. • Image Pre-processing: Pre-processing the data is always helpful in extracting useful information. Images acquired by web-cam must be converted into appropriate formats required by different algorithm at next stages. • Eyes Features Detection: Necessary eye features are identified, Using HCT for pupil detection and Template Matching Technique for eye corners detection. • Screen Mapping: Mapping the coordinates of the screen with the pupil movements is done.
  • 8.
  • 9. System Components and interactions of the project virtual mouse system. • The software application is organized into two parts:  The eye tracking engine part and mouse simulation part.  The eye tracking engine part matches our software application with eye tracking device to eye control mouse function.
  • 10. MODULE DESCRIPTION  Main Interface Module : It Sets and manages the startup dialogue.  Mouse/Keyboard Engine Simulation Module : It create dynamic tool window, automatically changes the size of the tool window according to the screen resolution, and decides whether to display or obscure the toolbar.  User Action Detection Module : The fixation function in this module is defined to calculate the gaze time of the user and determine the mouse coordinates.  Halt Module : It determines whether to stop eye tracking and enter the sleep mode and determines whether to jump out of the sleep mode and restart the eye tracking.  Mouse Function Module : It receives the view point of user from simulation engine and transfers the coordinate to the fixation function within user action detection module.
  • 11. Algorithm Description • Eye Detection using Viola - Jones Algorithm • Detecting Iris using Circular Hough Transform Algorithm
  • 12. Viola – Jones Algorithm  Computers cannot detect face very easily as humans.  When an image is prompted to the computer, all that it sees is a matrix of numbers.  A regular image is composed of thousands of pixels. Even a small 28 X 28 image is composed by 784 pixels.  Each pixel can assume 255 values. So that’s 255784 possible values.  Viola Jones algorithm extracts a much simpler representations of the image, and combine those simple representations into more high – level representation in a hierarchical way.
  • 13. STEPS INVOLVED IN VIOLA – JONES ALGORITHM  Haar – like Feature Extraction We have some primitive masks. Those masks are slide over the image, and the sum of the values of the pixels within the white side is subtracted from the black side. The result is a feature that represents that region.
  • 14. Circular Hough Transform Algorithm  Now we detected the eyes using the viola – jones algorithm, the next step is to detect the iris.  For that we are going to look for the most circular object in the eye region.
  • 15. STEPS INVOLVED IN CIRCULAR HOUGH TRANSFORM • By using CHT, the circle parameters within a given image are identified: the circle centre coordinates “a” and “b” and the circle radius “r”, as represented in the circle equation: • To improve precision we implement a pre-processing step: – Segmentation threshold to cut image components such as eyelashes and eyebrows and keep only the pupil contour. • This is done using the dark pupil technique.
  • 16. HARDWARE AND SOFTWARE REQUIREMENTS • Operating System – Windows 7 or above, Linux, Mac OS • Processor – 2Ghz or More • RAM – 2GB • Hard Disk – Minimum 120GB • IR LED • Web Camera • OpenCV(Computer Vision) • MATLAB • Python IDLE
  • 17.  The system combines both the mouse and keyboard functions, so that users can achieve almost all of the inputs to the computer without traditional input equipment.  The idea of eye control is of great use to not only the future of natural input but more importantly the handicapped and disabled.  The use of Standard Circular Hough Transformation in image processing module of the implementation combined with the grid analysis approach is practically successful and has high potential in future applications.
  • 18. Future Works  One can control home automation system.  Can be used to find the persons interest in a product.  One can control LCD in automobile with the movement of the eye.  Can be used in medical industries while performing high end operations to control the PC or its various operations.  Can be used by astronauts in space to control various operations inside their suits.