Many computing applications such as computer games, multimedia applications, or the like use controls to allow users to manipulate game characters or other aspects of an application. Conventionally, such controls are input using, for example, controllers, remotes, keyboards, mice, or the like. Unfortunately, such controls can be difficult to learn, thus creating a barrier between a user and such games and applications. Furthermore, such controls may be different than actual game actions or other application actions for which the controls are used. For example, a game control that causes a game character to swing a baseball bat may not correspond to an actual motion of swinging the baseball bat. Recently, cameras have been used to allow users to manipulate game characters or other aspects of an application without the need for conventional handheld game controllers. Further, such cameras have enabled representation of users to be displayed within a game or other application. Such computing systems have often relied on skeletal tracking (ST) techniques to detect motion or other user behaviors as well as to produce representations of users for display. However, while useful for detecting and displaying representations of users in certain situations, ST techniques have proven to be unreliable for detecting and displaying representations of users in other situations. For example, ST techniques are typically unreliable for detecting and displaying representations of a user where the user is laying or sitting on or near the floor.
Embodiments described herein are for use where depth images are used to detect and display representations of a user and/or to detect user behaviors. More specifically, certain embodiments described herein can be used to detect holes in a subset of pixels of a depth image that has been specified as corresponding to a user, and to fill such detected holes. Such holes may result from a portion of the user occluding another portion of the user when a capture device (e.g., a camera) is used to obtain the depth image. Such embodiments can involve identifying horizontal and vertical spans of pixels (within the subset of pixels specified as corresponding to the user) that are potentially part of a hole, and then analyzing pixels adjacent to such spans to determine whether such adjacent pixels are also to be identified as potentially being part of a hole. Spans that are adjacent to one another can be grouped together into islands of pixels that potentially correspond to holes, and then each island is analyzed and classified as either being a hole or not being a hole. Hole filling is then performed to fill any identified holes, so that results of the hole filling are available when a depth image is used to display a representation of the user.
Additionally, embodiments described herein can be used to produce a low resolution version of a subset of pixels that has been specified as corresponding to a user, so that when a representation of the user is displayed, the image respects the shape of the user and does not smooth distinct body parts of the user, yet is not a mirror image of the user. The producing of such a low resolution version of the subset of pixels that has been specified as corresponding to a user can be performed prior to, after, or completely independent of the above mentioned hole detection and hole filling embodiments, depending upon implementation.
Further, embodiments described herein can be used to identify pixels (within a subset of pixels specified as corresponding to the user) that likely correspond to a floor supporting the user. This enables the removal of the pixels, identified as likely corresponding to the floor, from the subset of pixels specified as corresponding to the user. Such floor detection and removal techniques can be performed prior to, after, or completely independent of, the above mentioned hole detection and hole filling embodiments and/or the above mentioned producing of a low resolution version of the subset of pixels that has been specified as corresponding to a user.
Certain embodiments described herein can be used to adjust a depth image to reduce a sensitivity of the depth image to tilt of a capture device used to obtain the depth image. Such adjusting can include obtaining an up-vector associated with the capture device used to obtain the depth image. Pixels in the depth image are transformed from depth image space to three-dimensional (3D) camera space to produce a 3D representation of the depth image which includes a subset of pixels specified as corresponding to the user. The up-vector is then used to transform the subset of pixels specified as corresponding to the user to a plane having a specified attitude. Thereafter, the 3D representation of the depth image can be transformed from the 3D camera space back to the depth image space.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter. Furthermore, the claimed subject matter is not limited to implementations that solve any or all disadvantages noted in any part of this disclosure.
Embodiments described herein can be used to detect holes in a subset of pixels of a depth image that has been specified as corresponding to a user, and to fill such detected holes. Additionally, embodiments described herein can be used to produce a low resolution version of a subset of pixels that has been specified as corresponding to a user, so that when a representation of the user is displayed, the image respects the shape of the user, yet is not a mirror image of the user. Further, embodiments described herein can be used to identify pixels, of a subset of pixels specified as corresponding to the user, that likely correspond to a floor supporting the user. This enables the removal of the pixels, identified as likely corresponding to the floor, from the subset of pixels specified as corresponding to the user. Additional embodiments described herein can be used to adjust a depth image to reduce a sensitivity of the depth image to tilt of a capture device used to obtain the depth image. Before describing additional details of such embodiments, exemplary systems with which such embodiments can be used will be described.
The computing system 112 may be a computer, a gaming system or console, or the like. According to an example embodiment, the computing system 112 may include hardware components and/or software components such that computing system 112 may be used to execute applications such as gaming applications, non-gaming applications, or the like. In one embodiment, computing system 112 may include a processor such as a standardized processor, a specialized processor, a microprocessor, or the like that may execute instructions stored on a processor readable storage device for performing the processes described herein.
The capture device 120 may be, for example, a camera that may be used to visually monitor one or more users, such as the user 118, such that gestures and/or movements performed by the one or more users may be captured, analyzed, and tracked to perform one or more controls or actions within the application and/or animate an avatar or on-screen character, as will be described in more detail below.
According to one embodiment, the tracking system 100 may be connected to an audiovisual device 116 such as a television, a monitor, a high-definition television (HDTV), or the like that may provide game or application visuals and/or audio to a user such as the user 118. For example, the computing system 112 may include a video adapter such as a graphics card and/or an audio adapter such as a sound card that may provide audiovisual signals associated with the game application, non-game application, or the like. The audiovisual device 116 may receive the audiovisual signals from the computing system 112 and may then output the game or application visuals and/or audio associated with the audiovisual signals to the user 118. According to one embodiment, the audiovisual device 16 may be connected to the computing system 112 via, for example, an S-Video cable, a coaxial cable, an HDMI cable, a DVI cable, a VGA cable, component video cable, or the like.
As shown in
In the example depicted in
Other movements by the user 118 may also be interpreted as other controls or actions and/or used to animate the player avatar (which can also be referred to as a user avatar), such as controls to bob, weave, shuffle, block, jab, or throw a variety of different power punches. Furthermore, some movements may be interpreted as controls that may correspond to actions other than controlling the player avatar 140. For example, in one embodiment, the player (which can also be referred to as a user) may use movements to end, pause, or save a game, select a level, view high scores, communicate with a friend, etc. According to another embodiment, the player may use movements to select the game or other application from a main user interface. Thus, in example embodiments, a full range of motion of the user 118 may be available, used, and analyzed in any suitable manner to interact with an application.
In example embodiments, the human target such as the user 118 may have an object. In such embodiments, the user of an electronic game may be holding the object such that the motions of the player and the object may be used to adjust and/or control parameters of the game. For example, the motion of a player holding a racket may be tracked and utilized for controlling an on-screen racket in an electronic sports game. In another example embodiment, the motion of a player holding an object may be tracked and utilized for controlling an on-screen weapon in an electronic combat game. Objects not held by the user can also be tracked, such as objects thrown, pushed or rolled by the user (or a different user) as well as self propelled objects. In addition to boxing, other games can also be implemented.
According to other example embodiments, the tracking system 100 may further be used to interpret target movements as operating system and/or application controls that are outside the realm of games. For example, virtually any controllable aspect of an operating system and/or application may be controlled by movements of the target such as the user 118.
As shown in
As shown in
According to another example embodiment, time-of-flight analysis may be used to indirectly determine a physical distance from the capture device 120 to a particular location on the targets or objects by analyzing the intensity of the reflected beam of light over time via various techniques including, for example, shuttered light pulse imaging.
In another example embodiment, the capture device 120 may use a structured light to capture depth information. In such an analysis, patterned light (i.e., light displayed as a known pattern such as grid pattern, a stripe pattern, or different pattern) may be projected onto the scene via, for example, the IR light component 224. Upon striking the surface of one or more targets or objects in the scene, the pattern may become deformed in response. Such a deformation of the pattern may be captured by, for example, the 3-D camera 226 and/or the RGB camera 28 and may then be analyzed to determine a physical distance from the capture device to a particular location on the targets or objects. In some implementations, the IR Light component 224 is displaced from the cameras 226 and 228 so triangulation can be used to determined distance from cameras 226 and 228. In some implementations, the capture device 120 will include a dedicated IR sensor to sense the IR light.
According to another embodiment, the capture device 120 may include two or more physically separated cameras that may view a scene from different angles to obtain visual stereo data that may be resolved to generate depth information. Other types of depth image sensors can also be used to create a depth image.
The capture device 120 may further include a microphone 130. The microphone 130 may include a transducer or sensor that may receive and convert sound into an electrical signal. According to one embodiment, the microphone 130 may be used to reduce feedback between the capture device 120 and the computing system 112 in the target recognition, analysis, and tracking system 100. Additionally, the microphone 30 may be used to receive audio signals that may also be provided by the user to control applications such as game applications, non-game applications, or the like that may be executed by the computing system 112.
In an example embodiment, the capture device 120 may further include a processor 232 that may be in operative communication with the image camera component 222. The processor 232 may include a standardized processor, a specialized processor, a microprocessor, or the like that may execute instructions including, for example, instructions for receiving a depth image, generating the appropriate data format (e.g., frame) and transmitting the data to computing system 112.
The capture device 120 may further include a memory component 234 that may store the instructions that may be executed by the processor 232, images or frames of images captured by the 3-D camera and/or RGB camera, or any other suitable information, images, or the like. According to an example embodiment, the memory component 234 may include random access memory (RAM), read only memory (ROM), cache, Flash memory, a hard disk, or any other suitable storage component. As shown in
As shown in
Computing system 112 includes gestures library 240, structure data 242, depth image processing and object reporting module 244 and application 246. Depth image processing and object reporting module 244 uses the depth images to track positions and/or motion of objects, such as the user and other objects. To assist in the tracking of the objects, depth image processing and object reporting module 244 uses gestures library 240 and structure data 242.
Structure data 242 includes structural information about objects that may be tracked. For example, a skeletal model of a human may be stored to help understand movements of the user and recognize body parts. Structural information about inanimate objects may also be stored to help recognize those objects and help understand movement.
Gestures library 240 may include a collection of gesture filters, each comprising information concerning a gesture that may be performed by the skeletal model (as the user moves). The data captured by the cameras 226, 228 and the capture device 120 in the form of the skeletal model and movements associated with it may be compared to the gesture filters in the gesture library 240 to identify when a user (as represented by the skeletal model) has performed one or more gestures. Those gestures may be associated with various controls of an application. Thus, the computing system 112 may use the gestures library 240 to interpret movements of the skeletal model and to control application 246 based on the movements. As such, gestures library may be used by depth image processing and object reporting module 244 and application 246.
Application 246 can be a video game, productivity application, etc. In one embodiment, depth image processing and object reporting module 244 will report to application 246 an identification of each object detected and the location of the object for each frame. Application 246 will use that information to update the position or movement of an avatar or other images in the display.
Still referring to
A graphics processing unit (GPU) 308 and a video encoder/video codec 314 form a video processing pipeline for high speed and high resolution graphics processing. Data is carried from the GPU 308 to the video encoder/video codec 314 via a bus. The video processing pipeline outputs data to an A/V (audio/video) port 340 for transmission to a television or other display. A memory controller 310 is connected to the GPU 308 to facilitate processor access to various types of memory 312, such as, but not limited to, a RAM (Random Access Memory).
The multimedia console 300 includes an I/O controller 320, a system management controller 322, an audio processing unit 323, a network interface 324, a first USB host controller 326, a second USB controller 328 and a front panel I/O subassembly 330 that are preferably implemented on a module 318. The USB controllers 326 and 328 serve as hosts for peripheral controllers 342(1)-342(2), a wireless adapter 348, and an external memory device 346 (e.g., flash memory, external CD/DVD ROM drive, removable media, etc.). The network interface 324 and/or wireless adapter 348 provide access to a network (e.g., the Internet, home network, etc.) and may be any of a wide variety of various wired or wireless adapter components including an Ethernet card, a modem, a Bluetooth module, a cable modem, and the like.
System memory 343 is provided to store application data that is loaded during the boot process. A media drive 344 is provided and may comprise a DVD/CD drive, Blu-Ray drive, hard disk drive, or other removable media drive, etc. The media drive 344 may be internal or external to the multimedia console 300. Application data may be accessed via the media drive 344 for execution, playback, etc. by the multimedia console 300. The media drive 344 is connected to the I/O controller 320 via a bus, such as a Serial ATA bus or other high speed connection (e.g., IEEE 1394).
The system management controller 322 provides a variety of service functions related to assuring availability of the multimedia console 300. The audio processing unit 323 and an audio codec 332 form a corresponding audio processing pipeline with high fidelity and stereo processing. Audio data is carried between the audio processing unit 323 and the audio codec 332 via a communication link. The audio processing pipeline outputs data to the A/V port 340 for reproduction by an external audio player or device having audio capabilities.
The front panel I/O subassembly 330 supports the functionality of the power button. 350 and the eject button 352, as well as any LEDs (light emitting diodes) or other indicators exposed on the outer surface of the multimedia console 300. A system power supply module 336 provides power to the components of the multimedia console 300. A fan 338 cools the circuitry within the multimedia console 300.
The CPU 301, GPU 308, memory controller 310, and various other components within the multimedia console 300 are interconnected via one or more buses, including serial and parallel buses, a memory bus, a peripheral bus, and a processor or local bus using any of a variety of bus architectures. By way of example, such architectures can include a Peripheral Component Interconnects (PCI) bus, PCI-Express bus, etc.
When the multimedia console 300 is powered ON, application data may be loaded from the system memory 343 into memory 312 and/or caches 302, 304 and executed on the CPU 301. The application may present a graphical user interface that provides a consistent user experience when navigating to different media types available on the multimedia console 300. In operation, applications and/or other media contained within the media drive 344 may be launched or played from the media drive 344 to provide additional functionalities to the multimedia console 300.
The multimedia console 300 may be operated as a standalone system by simply connecting the system to a television or other display. In this standalone mode, the multimedia console 300 allows one or more users to interact with the system, watch movies, or listen to music. However, with the integration of broadband connectivity made available through the network interface 324 or the wireless adapter 348, the multimedia console 300 may further be operated as a participant in a larger network community.
When the multimedia console 300 is powered ON, a set amount of hardware resources are reserved for system use by the multimedia console operating system. These resources may include a reservation of memory (e.g., 16 MB), CPU and GPU cycles (e.g., 5%), networking bandwidth (e.g., 8 kbs), etc. Because these resources are reserved at system boot time, the reserved resources do not exist from the application's view.
In particular, the memory reservation preferably is large enough to contain the launch kernel, concurrent system applications and drivers. The CPU reservation is preferably constant such that if the reserved CPU usage is not used by the system applications, an idle thread will consume any unused cycles.
With regard to the GPU reservation, lightweight messages generated by the system applications (e.g., popups) are displayed by using a GPU interrupt to schedule code to render popup into an overlay. The amount of memory used for an overlay depends on the overlay area size and the overlay preferably scales with screen resolution. Where a full user interface is used by the concurrent system application, it is preferable to use a resolution independent of application resolution. A scaler may be used to set this resolution such that the need to change frequency and cause a TV resynch is eliminated.
After the multimedia console 300 boots and system resources are reserved, concurrent system applications execute to provide system functionalities. The system functionalities are encapsulated in a set of system applications that execute within the reserved system resources described above. The operating system kernel identifies threads that are system application threads versus gaming application threads. The system applications are preferably scheduled to run on the CPU 301 at predetermined times and intervals in order to provide a consistent system resource view to the application. The scheduling is to minimize cache disruption for the gaming application running on the console.
When a concurrent system application requires audio, audio processing is scheduled asynchronously to the gaming application due to time sensitivity. A multimedia console application manager (described below) controls the gaming application audio level (e.g., mute, attenuate) when system applications are active.
Input devices (e.g., controllers 342(1) and 342(2)) are shared by gaming applications and system applications. The input devices are not reserved resources, but are to be switched between system applications and the gaming application such that each will have a focus of the device. The application manager preferably controls the switching of input stream, without knowledge the gaming application's knowledge and a driver maintains state information regarding focus switches. The cameras 226, 228 and capture device 120 may define additional input devices for the console 300 via USB controller 326 or other interface.
Computing system 420 comprises a computer 441, which typically includes a variety of computer readable media. Computer readable media can be any available media that can be accessed by computer 441 and includes both volatile and nonvolatile media, removable and non-removable media. The system memory 422 includes computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) 423 and random access memory (RAM) 460. A basic input/output system 424 (BIOS), containing the basic routines that help to transfer information between elements within computer 441, such as during start-up, is typically stored in ROM 423. RAM 460 typically contains data and/or program modules that are immediately accessible to and/or presently being operated on by processing unit 459. By way of example, and not limitation,
The computer 441 may also include other removable/non-removable, volatile/nonvolatile computer storage media. By way of example only,
The drives and their associated computer storage media discussed above and illustrated in
The computer 441 may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 446. The remote computer 446 may be a personal computer, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to the computer 441, although only a memory storage device 447 has been illustrated in
When used in a LAN networking environment, the computer 441 is connected to the LAN 445 through a network interface 437. When used in a WAN networking environment, the computer 441 typically includes a modem 450 or other means for establishing communications over the WAN 449, such as the Internet. The modem 450, which may be internal or external, may be connected to the system bus 421 via the user input interface 436, or other appropriate mechanism. In a networked environment, program modules depicted relative to the computer 441, or portions thereof, may be stored in the remote memory storage device. By way of example, and not limitation,
As explained above, the capture device 120 provides RGB images (also known as color images) and depth images to the computing system 112. The depth image may be a plurality of observed pixels where each observed pixel has an observed depth value. For example, the depth image may include a two-dimensional (2-D) pixel area of the captured scene where each pixel in the 2-D pixel area may have a depth value such as a length or distance in, for example, centimeters, millimeters, or the like of an object in the captured scene from the capture device.
As mentioned above, skeletal tracking (ST) techniques are often used to detect and produce a representation of a user for display, as well as to detect user behaviors. However, while useful for detecting and displaying representations of users in certain situations, ST techniques have proven to be unreliable for detecting and displaying representations of users in other situations. For example, ST techniques are typically unreliable for detecting and displaying representations of a user where the user is laying or sitting on or near the floor. Certain embodiments described herein rely on depth images to detect and display representations of a user and/or to detect user behaviors. Accordingly, before discussing such embodiments in additional detail, it would first be useful to provide additional details of depth images.
In one embodiment, the depth image may be colorized or grayscale such that different colors or shades of the pixels of the depth image correspond to and/or visually depict different distances of the targets from the capture device 120. Upon receiving the image, one or more high-variance and/or noisy depth values may be removed and/or smoothed from the depth image; portions of missing and/or removed depth information may be filled in and/or reconstructed; and/or any other suitable processing may be performed on the received depth image.
The high level flow diagram of
Referring to
The depth image and information obtained at step 702 can specify, for each of the subset of pixels corresponding to the user, a pixel location and a pixel depth. As mentioned above, in the discussion of
Steps 704-710, which are discussed in further detail below, are used to identify holes (within the subset of pixels within the depth image correspond to a user) so that such holes can be filled at step 712. As will be described below, certain steps are used to identify pixels that are potentially part of a hole, while another step classifies groups of pixels (identified as potentially being part of a hole) as either a hole or not a hole. Pixels that are identified as potentially being part of a hole, but are not actually part of a hole, can be referred to as false positives. Pixels that are not identified as potentially being part of a hole, but are actually part of a hole, can be referred to as false negatives. As will be appreciated from the following discussion, embodiments described herein can be used to reduce both false positives and false negatives.
At step 704, one or more spans of pixels are identified, within the subset of pixels specified as corresponding to the user, that are potentially part of a hole. Such holes often result from a portion of the user occluding another portion of the user when a capture device (e.g., 120) was used to obtain the depth image. Each identified span can be either a horizontal span, or a vertical span. In accordance with an embodiment, each horizontal span has a vertical height of one pixel, and a horizontal width of at least a predetermined number of pixels (e.g., 5 pixels). In accordance with an embodiment, each vertical span has a vertical height of at least a predetermined number of pixels (e.g., 5 pixels) and a horizontal width of one pixel. As will be appreciated from the discussion below, identification of such spans are useful for identifying boundaries of potential holes within the subset of pixels specified as corresponding to the user. Additional details of step 704, according to an embodiment, are described below with reference to
Between steps 704 and 706, spans that are likely mislabeled as potentially being part of a hole may identified and reclassified as not potentially being part of a hole. For example, in an embodiment, any span that exceeds a predetermine width or a predetermined length can be reclassified as no longer being identified as potentially being part of a hole. For example, it may be heuristically determined that a user represented in a depth image will likely be represented by a certain number of pixels in height, and a certain number of pixels in width. If an identified span has a height that is greater than the expected height of the user, that span can be reclassified as no longer being identified as potentially being part of a hole. Similarly, if an identified span has a width that is greater than the expected width of the user, that span can be reclassified as no longer being identified as potentially being part of a hole. Additionally, or alternatively, where information is available regarding which pixels likely correspond to which parts of the user's body, spans that are within or close to body parts that heuristically have been found to be frequently mislabeled as holes, can be reclassified as no longer being identified as potentially being part of a hole. Information regarding which pixels likely correspond to which body parts can be obtained from structure data (e.g., 242), but is not limited thereto. For a more specific example, pixels that correspond to lower-limbs oriented toward the capture device have been found to be often mislabeled as holes. In certain embodiments, if it is determined than identified span is part of the user's lower limbs, that span can be reclassified as no longer being identified as potentially being part of a hole.
At step 706, span adjacent pixels are analyzed to determine whether one or more span. adjacent pixels are also to be identified as potentially being part of a hole in the subset of pixels specified as corresponding to the user. A span adjacent pixel, as the terms is used herein, refers to a pixel that is adjacent to at least one of the horizontal or vertical spans identified at step 704. This step is used to identify pixels that are potentially part of a hole but were not identified at step 704. Accordingly, this step is used to reduce potential false negatives. In other words, this step is used to identify pixels that should be identified as potentially being part of a hole, but were not included in one of the spans identified at step 704. Additional details of step 706, according to an embodiment, are described below with reference to
At step 708, pixels that are adjacent to one another and have been identified as potentially being part of a hole (in the subset of pixels specified as corresponding to the user) are grouped together into islands of pixels that potentially correspond to one or more holes (in the subset of pixels specified as corresponding to the user). Step 708 can be performed, e.g., using a flood fill algorithm (also known as a seed fill), but is not limited thereto. In certain embodiments, each pixel that is considered part of a common island is assigned a common island value. For example, all pixels considered part of a first island can be assigned an island value of 1, and all pixels considered part of a second island can be assigned an island value of 2 , and so on.
At step 710, each of the identified island of pixels (in the subset of pixels specified as corresponding to the user) are classified as either being a hole or not being a hole. Accordingly, this step is used to remove any false positives that may have remained following the earlier performed steps. Additional details of step 710, according to an embodiment, are described below with reference to
At step 712, hole filling (also known as image completion or image inpainting) is separately performed on each island of pixels classified as being a hole. Various different types of hole filling can be performed. In certain embodiments, scattered data interpolation is used to perform the hole filling. This can include, for example, for each individual island of pixels classified as being a hole, concurrently solving the Laplacian on each pixel of the island, and treating pixels identified as boundary points as being the boundary problem for the solution. More specifically, a sparse system of equations can be built based on the pixels of an island classified as a hole, setting the Laplacian of the non-boundary points to zero, and the boundary points to themselves. Using a Gauss-Seidel solver with successive over-relaxation (e.g., 1.75), reliable hole filling can be achieved after multiple iterations. Alternatively, a Jacobi solver can be used in place of the Gauss-Seidel solver to parallelize equation solving. In another embodiment, a radial basis function (RBF) can be used to perform the hole filling. Other types of scattered data interpolation techniques can alternatively be used for hole filling. Further, alternative types of hole filling techniques can be used besides scatter data interpolation based techniques.
At step 714, information indicative of the results of the hole filling are stored (e.g., in memory 312 or 422). For example, such information can be stored as an array of depth values that is separate from, but for use with, the depth image obtained at step 712. Alternatively, the depth image can be modified so that the depth value for each pixel identified as being part of a hole is replaced with the corresponding depth value resulting from the hole filling. Either way, the results of the hole filling process are available for use when displaying a representation of the user, as indicated at step 716. Before displaying such a representation of the user, the depth values in the depth image can be converted from depth image space to camera space using known transformation techniques. For example, by knowing the geometric optics of the capture device (e.g., 120) used to obtain the depth image (or a higher resolution version thereof), the camera space position for each pixel in a depth image, along with all of the filled depth values for the holes, can be computed. Numerical differentiation can then be used to estimate each pixel's normal, and thus, an orientation of a surface. In accordance with specific embodiments, in order to reduce jitter in the representation of the user (included in a displayed image), camera space positions corresponding to a frame are temporarily stored so that the camera space positions corresponding to a frame can be compared to the positions corresponding to the immediately preceding frame. Each pixel's position can then be compared to its position in the immediately preceding frame to determine whether a distance there-between (i.e., a change in position) exceeds a specified threshold. If the threshold is not exceeded, when a representation of the user is displayed, the position of that pixel in the displayed representation of the user is not changed relative to the preceding frame. If the threshold is exceeded, then the position of the pixel in the displayed representation of the user is changed relative to the preceding frame. By only changing positions of a pixel in a displayed representation of a user when its change in position exceeds the specified threshold, jitter (e.g., resulting from noise associated with the capture device used to obtain the depth image) in the displayed representation of the user is reduced.
Additional details of specific steps discussed above with reference to
Referring to
Conventional image filtering (like a blur), typically specifies the weight as being a function of distance between the input pixel and the neighbor pixels, i.e., (with input location and neighbor location abbreviated to i and n), as expressed below:
weight(i, n)=spatialweight(i, n)=e−distance(i,n)
The above is effectively a Gaussian filter.
In accordance specific embodiments, a trilateral down-sampling approach is used when replacing a block of pixels (in the original version of the depth image) with a weighted sum of a selected one of the pixels' (of the block of pixels) neighboring pixels, wherein the trilateral, down-sampling uses three weighting factors to produce the weighted sum. These three weighting factors include a spatial weighting factor indicative of a distance between the pixel and a neighboring pixel, a depth weighting factor indicative of whether a difference between a depth value of the pixel and a depth value of a neighboring pixel is less than a threshold, and a segmentation weighting factor indicative of whether a neighboring pixel is within the subset of pixels specified as corresponding to the user. The three weighting factors can be expresses as three separate functions, including:
The spatialweight is used to filter (e.g., smoothen) the image. The depthweight ensures the smoothening does not cross boundaries where the depth in the image changes dramatically. For example, consider a user with their arm stretched in front of them. The depth corresponding to a pixel on the hand would differ dramatically from a pixel on the chest. To preserve the edge between the hand and the chest, filtering should not cross that boundary between the hand and the chest. The segmentationweight ensures that smoothening does not cross the boundary between the user and the background scene. Without the segmentationweight; the user's depth values may blend into a background environment at the edges of the user.
Additionally, for each lower resolution pixel, information indicative of the coverage of the lower resolution pixel can be determined and stored, wherein the information indicative of the coverage of the lower resolution pixel is indicative of the percentage of the high-resolution pixels (corresponding to the lower-resolution pixel) that were specified as corresponding to the user.
The first low resolution subset of pixels that correspond to the user, which is produced at step 804, can occasionally include spurious pixels that are mistakenly specified as corresponding to the user. To remove these spurious pixels, a morphological open can be performed on the first low resolution subset of pixels that correspond to the user, as indicated at step 806. To preserve an accurate silhouette of the player, a second low resolution subset. of pixels that correspond to the user is produced, at step 808, by including (in the second low resolution subset of pixels that correspond to the user) pixels that are in both the original version of the subset of pixels that correspond to the user and in the first low resolution subset of pixels that correspond to the use. For example, step 808 can be performed by using a binary AND operation to mask results of the morphological open with the original version of the subset of pixels that correspond to the user.
This second low resolution subset of pixels that correspond to the user can be the subset within which spans are identified at step 704. Alternatively, the second low resolution subset of pixels can be further filtered using a trilateral filtering approach similar to the one described above with reference to step 804 (but without performing any further resolution reduction) and the resulting low resolution subset of pixels that correspond to the user can be the subset within which spans are identified at step 704. It is also possible that alternative types of down-sampling can be performed at or prior to step 702, or that no down-sampling at all be used. In other words, in certain embodiments, the depth image obtained at step 702 need not have been reduced in resolution, and thus, the steps described with reference to
In specific embodiments, to identify the vertical spans of pixels that are potentially part of a hole, the subset of pixels specified as corresponding to the user can be analyzed column-by-column to identify any two consecutive pixels whereby the second pixel was closer to the first pixel by a value greater than depth discontinuity threshold. This can be stored as a potential start point of a span, and any subsequent start points can replace the previous. Since there is no need to fill multiple layers, there is no need to store a history of start points. A potential end point of a span can be identified by identifying two consecutive pixels whereby the second pixel was farther than the first by greater than the same threshold, with any subsequent end points replacing the previous. The pixels between the start and end points of a span are identified as potentially being part of a hole. Additionally, for each pair of consecutive pixels (identified as having depth values that exceeded the depth discontinuity threshold), the “farther” of the two pixels is identified as a boundary of a potential hole (and thus, can also be referred to as a potential hole boundary). To identify the horizontal spans of pixels that are potentially part of a hole (and to identify further potential hole boundaries), a similar process to the just described process for identifying vertical spans is performed, except that there is a row-by-row (rather than column-by-column) analysis of the subset pixels specified as corresponding to the user.
Referring back to
As explained above, a segmentation process (e.g., performed by the depth image segmentation module 252) can be used to specify which subset of pixels correspond to a user. However, it is sometimes the case that pixels corresponding to a portion of a floor, supporting the user, will mistakenly also be specified as corresponding to the user. This can cause problems when attempting to detect user motion or other user behaviors based on depth images, or when attempting to display images including a representation of the user. To avoid or reduce such problems, the floor removal method described with reference to
In order to perform the floor removal method, pixels of a depth image are transformed from depth image space to three-dimensional (3D) camera space, to produce a 3D representation of the depth image, as indicated at step 1302 in
Still referring to
A capture device (e.g., 120) that is used to obtain depth images may be tilted relative to the floor upon which a user is standing or otherwise supporting themselves. Thus, depth images obtained using such a capture device may vary in dependence on the tilt of the capture device. However, it is desirable that detecting of user behaviors and displaying images including representations of a user based on depth images are not dependent on the tilt of the capture device. Accordingly, it would be useful to account for the capture device's tilt. This can be accomplished by transforming pixels of a depth image from depth image space to three-dimensional (3D) camera space, to produce a 3D representation of the depth image which includes a subset of pixels specified as corresponding to the user. Additionally, an up vector can be obtained from a sensor (e.g., an accelerometer) or in some other manner and used to generate a new projection direction. Each pixel can then be reprojected to another plane that is at a fixed attitude to the ground. The pixels can then be transformed from 3D camera space back to depth image space, with the resulting depth image having less sensitivity to camera tilt.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims. It is intended that the scope of the technology be defined by the claims appended hereto.
This application is a Continuation of U.S. patent application Ser. No. 13/801,966, filed Mar. 13, 2013, which is incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
4627620 | Yang | Dec 1986 | A |
4630910 | Ross et al. | Dec 1986 | A |
4645458 | Williams | Feb 1987 | A |
4695953 | Blair et al. | Sep 1987 | A |
4702475 | Elstein et al. | Oct 1987 | A |
4711543 | Blair et al. | Dec 1987 | A |
4751642 | Silva et al. | Jun 1988 | A |
4796997 | Svetkoff et al. | Jan 1989 | A |
4809065 | Harris et al. | Feb 1989 | A |
4817950 | Goo | Apr 1989 | A |
4843568 | Krueger et al. | Jun 1989 | A |
4893183 | Nayar | Jan 1990 | A |
4901362 | Terzian | Feb 1990 | A |
4925189 | Braeunig | May 1990 | A |
5101444 | Wilson et al. | Mar 1992 | A |
5148154 | MacKay et al. | Sep 1992 | A |
5184295 | Mann | Feb 1993 | A |
5229754 | Aoki et al. | Jul 1993 | A |
5229756 | Kosugi et al. | Jul 1993 | A |
5239463 | Blair et al. | Aug 1993 | A |
5239464 | Blair et al. | Aug 1993 | A |
5288078 | Capper et al. | Feb 1994 | A |
5295491 | Gevins | Mar 1994 | A |
5320538 | Baum | Jun 1994 | A |
5347306 | Nitta | Sep 1994 | A |
5385519 | Hsu et al. | Jan 1995 | A |
5405152 | Katanics et al. | Apr 1995 | A |
5417210 | Funda et al. | May 1995 | A |
5423554 | Davis | Jun 1995 | A |
5454043 | Freeman | Sep 1995 | A |
5469740 | French et al. | Nov 1995 | A |
5495576 | Ritchey | Feb 1996 | A |
5516105 | Eisenbrey et al. | May 1996 | A |
5524637 | Erickson et al | Jun 1996 | A |
5534917 | MacDougall | Jul 1996 | A |
5563988 | Maes et al. | Oct 1996 | A |
5577981 | Jarvik | Nov 1996 | A |
5580249 | Jacobsen et al. | Dec 1996 | A |
5594469 | Freeman et al. | Jan 1997 | A |
5597309 | Riess | Jan 1997 | A |
5616078 | Oh | Apr 1997 | A |
5617312 | Iura et al. | Apr 1997 | A |
5638300 | Johnson | Jun 1997 | A |
5641288 | Zaenglein | Jun 1997 | A |
5682196 | Freeman | Oct 1997 | A |
5682229 | Wangler | Oct 1997 | A |
5690582 | Ulrich et al. | Nov 1997 | A |
5703367 | Hashimoto et al. | Dec 1997 | A |
5704837 | Iwasaki et al. | Jan 1998 | A |
5715834 | Bergamasco et al. | Feb 1998 | A |
5875108 | Hoffberg et al. | Feb 1999 | A |
5877803 | Wee et al. | Mar 1999 | A |
5913727 | Ahdoot | Jun 1999 | A |
5933125 | Fernie | Aug 1999 | A |
5980256 | Carmein | Nov 1999 | A |
5989157 | Walton | Nov 1999 | A |
5995649 | Marugame | Nov 1999 | A |
6005548 | Latypov et al. | Dec 1999 | A |
6009210 | Kang | Dec 1999 | A |
6054991 | Crane et al. | Apr 2000 | A |
6066075 | Poulton | May 2000 | A |
6072494 | Nguyen | Jun 2000 | A |
6073489 | French et al. | Jun 2000 | A |
6077201 | Cheng et al. | Jun 2000 | A |
6098458 | French et al. | Aug 2000 | A |
6100896 | Strohecker et al. | Aug 2000 | A |
6101289 | Kellner | Aug 2000 | A |
6128003 | Smith et al. | Oct 2000 | A |
6130677 | Kunz | Oct 2000 | A |
6141463 | Covell et al. | Oct 2000 | A |
6147678 | Kumar et al. | Nov 2000 | A |
6152856 | Studor et al. | Nov 2000 | A |
6159100 | Smith | Dec 2000 | A |
6173066 | Peurach et al. | Jan 2001 | B1 |
6181343 | Lyons | Jan 2001 | B1 |
6188777 | Darrell et al. | Feb 2001 | B1 |
6215890 | Matsuo et al. | Apr 2001 | B1 |
6215898 | Woodfill et al. | Apr 2001 | B1 |
6226396 | Marugame | May 2001 | B1 |
6229913 | Nayar et al. | May 2001 | B1 |
6256033 | Nguyen | Jul 2001 | B1 |
6256400 | Takata et al. | Jul 2001 | B1 |
6283860 | Lyons et al. | Sep 2001 | B1 |
6289112 | Jain et al. | Sep 2001 | B1 |
6299308 | Voronka et al. | Oct 2001 | B1 |
6308565 | French et al. | Oct 2001 | B1 |
6316934 | Amorai-Moriya et al. | Nov 2001 | B1 |
6363160 | Bradski et al. | Mar 2002 | B1 |
6384819 | Hunter | May 2002 | B1 |
6411744 | Edwards | Jun 2002 | B1 |
6430997 | French et al. | Aug 2002 | B1 |
6476834 | Doval et al. | Nov 2002 | B1 |
6496598 | Harman | Dec 2002 | B1 |
6503195 | Keller et al. | Jan 2003 | B1 |
6539931 | Trajkovic et al. | Apr 2003 | B2 |
6570555 | Prevost et al. | May 2003 | B1 |
6633294 | Rosenthal et al. | Oct 2003 | B1 |
6640202 | Dietz et al. | Oct 2003 | B1 |
6661918 | Gordon et al. | Dec 2003 | B1 |
6681031 | Cohen et al. | Jan 2004 | B2 |
6714665 | Hanna et al. | Mar 2004 | B1 |
6731799 | Sun et al. | May 2004 | B1 |
6738066 | Nguyen | May 2004 | B1 |
6765726 | French et al. | Jul 2004 | B2 |
6788809 | Grzeszczuk et al. | Sep 2004 | B1 |
6801637 | Voronka et al. | Oct 2004 | B2 |
6873723 | Aucsmith et al. | Mar 2005 | B1 |
6876496 | French et al. | Apr 2005 | B2 |
6937742 | Roberts et al. | Aug 2005 | B2 |
6950534 | Cohen et al. | Sep 2005 | B2 |
7003134 | Covell et al. | Feb 2006 | B1 |
7036094 | Cohen et al. | Apr 2006 | B1 |
7038855 | French et al. | May 2006 | B2 |
7039676 | Day et al. | May 2006 | B1 |
7042440 | Pryor et al. | May 2006 | B2 |
7050606 | Paul et al. | May 2006 | B2 |
7058204 | Hildreth et al. | Jun 2006 | B2 |
7060957 | Lange et al. | Jun 2006 | B2 |
7113918 | Ahmad et al. | Sep 2006 | B1 |
7121946 | Paul et al. | Oct 2006 | B2 |
7170492 | Bell | Jan 2007 | B2 |
7184048 | Hunter | Feb 2007 | B2 |
7202898 | Braun et al. | Apr 2007 | B1 |
7222078 | Abelow | May 2007 | B2 |
7227526 | Hildreth et al. | Jun 2007 | B2 |
7257237 | Luck et al. | Aug 2007 | B1 |
7259747 | Bell | Aug 2007 | B2 |
7308112 | Fujimura et al. | Dec 2007 | B2 |
7317836 | Fujimura et al. | Jan 2008 | B2 |
7348963 | Bell | Mar 2008 | B2 |
7359121 | French et al. | Apr 2008 | B2 |
7367887 | Watabe et al. | May 2008 | B2 |
7379563 | Shamaie | May 2008 | B2 |
7379566 | Hildreth | May 2008 | B2 |
7389591 | Jaiswal et al. | Jun 2008 | B2 |
7412077 | Li et al. | Aug 2008 | B2 |
7421093 | Hildreth et al. | Sep 2008 | B2 |
7430312 | Gu | Sep 2008 | B2 |
7436496 | Kawahito | Oct 2008 | B2 |
7450736 | Yang et al. | Nov 2008 | B2 |
7452275 | Kuraishi | Nov 2008 | B2 |
7460690 | Cohen et al. | Dec 2008 | B2 |
7489812 | Fox et al. | Feb 2009 | B2 |
7536032 | Bell | May 2009 | B2 |
7555142 | Hildreth et al. | Jun 2009 | B2 |
7560701 | Oggier et al. | Jul 2009 | B2 |
7570805 | Gu | Aug 2009 | B2 |
7574020 | Shamaie | Aug 2009 | B2 |
7576727 | Bell | Aug 2009 | B2 |
7590262 | Fujimura et al. | Sep 2009 | B2 |
7593552 | Higaki et al. | Sep 2009 | B2 |
7598942 | Underkoffler et al. | Oct 2009 | B2 |
7607509 | Schmiz et al. | Oct 2009 | B2 |
7620202 | Fujimura et al. | Nov 2009 | B2 |
7668340 | Cohen et al. | Feb 2010 | B2 |
7680298 | Roberts et al. | Mar 2010 | B2 |
7683954 | Ichikawa et al. | Mar 2010 | B2 |
7684592 | Paul et al. | Mar 2010 | B2 |
7701439 | Hillis et al. | Apr 2010 | B2 |
7702130 | Im et al. | Apr 2010 | B2 |
7704135 | Harrison, Jr. | Apr 2010 | B2 |
7710391 | Bell et al. | May 2010 | B2 |
7729530 | Antonov et al. | Jun 2010 | B2 |
7746345 | Hunter | Jun 2010 | B2 |
7760182 | Ahmad et al. | Jul 2010 | B2 |
7809167 | Bell | Oct 2010 | B2 |
7834846 | Bell | Nov 2010 | B1 |
7852262 | Namineni et al. | Dec 2010 | B2 |
RE42256 | Edwards | Mar 2011 | E |
7898522 | Hildreth et al. | Mar 2011 | B2 |
8035612 | Bell et al. | Oct 2011 | B2 |
8035614 | Bell et al. | Oct 2011 | B2 |
8035624 | Bell et al. | Oct 2011 | B2 |
8072470 | Marks | Dec 2011 | B2 |
8284258 | Cetin et al. | Oct 2012 | B1 |
8340432 | Mathe et al. | Dec 2012 | B2 |
9031282 | Park | May 2015 | B2 |
20080026838 | Dunstan et al. | Jan 2008 | A1 |
20090265671 | Sachs et al. | Oct 2009 | A1 |
20090298650 | Kutliroff | Dec 2009 | A1 |
20100197390 | Craig | Aug 2010 | A1 |
20110069870 | Marais | Mar 2011 | A1 |
20110069888 | Lim | Mar 2011 | A1 |
20110090311 | Fang et al. | Apr 2011 | A1 |
20110110585 | Kang | May 2011 | A1 |
20110249190 | Nguyen | Oct 2011 | A1 |
20110292036 | Sali | Dec 2011 | A1 |
20110293137 | Gurman | Dec 2011 | A1 |
20120056982 | Katz et al. | Mar 2012 | A1 |
20120159290 | Pulsipher et al. | Jun 2012 | A1 |
20120214594 | Kirovski et al. | Aug 2012 | A1 |
20120242789 | Cheng et al. | Sep 2012 | A1 |
20120306904 | Francois et al. | Dec 2012 | A1 |
20120307010 | Evertt et al. | Dec 2012 | A1 |
20120308140 | Ambrus et al. | Dec 2012 | A1 |
20120309532 | Ambrus et al. | Dec 2012 | A1 |
20120326976 | Markovic et al. | Dec 2012 | A1 |
20130100125 | Zhang et al. | Apr 2013 | A1 |
20130101170 | Park | Apr 2013 | A1 |
20130135298 | Isogai et al. | May 2013 | A1 |
Number | Date | Country |
---|---|---|
101254344 | Jun 2010 | CN |
102272778 | Dec 2011 | CN |
0583061 | Feb 1994 | EP |
08044490 | Feb 1996 | JP |
9310708 | Jun 1993 | WO |
9717598 | May 1997 | WO |
9944698 | Sep 1999 | WO |
2010144074 | Dec 2010 | WO |
Entry |
---|
Communication of Intent to Grant dated Mar. 2, 2016 in European Patent Application No. 14719548.1 filed Mar. 10, 2014. |
Response to Communication under Rule 71(3) EPC dated Jun. 30, 2016 in European Patent Application No. 14719548.1 filed Mar. 10, 2014. |
Brunner, Simon, “Using Microsoft Kinect Sensor to Perform Commands on Virtual Objects”, Published on: Oct. 2, 2012, Available at: https://diuf.unifr.ch/main/diva/sites/diuf.unifr.ch.main.diva/files/Thesis%20paper.pdf. |
Brubaker, Marcus A., “Physical Models of Human Motion for Estimation and Scene Analysis”, In PhD. Thesis Submitted in Conformity with the Requirements for the Degree of Doctor of Philosophy, Graduate Department of Computer Science, University of Toronto, Jan. 5, 2012, 169 pages. |
Gonzalez, et al., “Estimation of the Center of Mass with Kinect and Wii Balance Board”, In Proceedings of IEEE/RSJ International Conference on Intelligent Robot and Systems, Oct. 7, 2012, 6 pages. |
Sinthanayothin, et al., “Skeleton Tracking using Kinect Sensor & Displaying in 3D Virtual Scene”, In International Journal of Advancements in Computing Technology, vol. 4, Issue 11, Jun. 2012, 11 pages. |
Camplani, et al., “Efficient Spatio-Temporal Hole Filling Strategy for Kinect Depth Maps”, In Proceedings of Three-Dimensional Image Processing & Applications II, Feb. 9, 2012, 10 pages. |
Gaidon, et al., “A Time Series Kernel for Action Recognition”, In Proceedings of the British Machine Vision Conference, Sep. 2011, 11 pages. |
Lien, et al., “Skeleton-Based Data Compression for Multi-Camera Tele-Immersion System”, In Advances in Visual Computing, Third International Symposium, Nov. 26, 2007, 10 pages. |
Ye, et al., “Accurate 3D Pose Estimation from a Single Depth Image”, In IEEE International Conference on Computer Vision, Nov. 6, 2011, 8 pages. |
Obdrzalek, et al., “Accuracy and Robustness of Kinect Pose Estimation in the Context of Coaching of Elderly Population”, In Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Aug. 28, 2012, 6 pages. |
Manasrah, Ahmad Adli, “Human Motion Tracking for Assisting Balance Training and Control of a Humanoid Robot”, In PhD. Thesis Submitted in Partial Fulfilment of the Requirements for the Degree of Master of Science in Mechanical Engineering, Department of Mechanical Engineering, University of South Florida, Jan. 1, 2012, 82 pages. |
Strauss, Ben, “Kinect Can ‘Sort of’ Handle Players Lying Down”, Published on: Jul. 14, 2010, Available at: http://www.industrygamers.com/news/kinect-can-sort-of-handle-players-lying-down/. |
Brubaker, Marcus, “Physics-Based Priors for Human Pose Tracking”, In a Thesis Submitted in Conformity with the Requirements for the Degree of Master of Science, Graduate Department of Computer Science, University of Toronto, Mar. 11, 2013, 89 pages. |
Poulios, Nikolaos, “Sensor Based Physical Interaction for Embodied Playful Learning Games”, In Master Thesis Project, Jul. 2012, 81 pages. |
Yu, et al., “Automatic Human Body Tracking and Modeling from Monocular Video Sequences”, In IEEE International Conference on Acoustics, Speech and Signal Processing, Apr. 15, 2007, 4 pages. |
Isenberg, et al., “Stylizing Silhouettes at Interactive Rates: From Silhouette Edges to Silhouette Strokes”, In Journal of Computer Graphics Forum, vol. 21, Issue 3, Sep. 2002, 10 pages. |
“1 Kinect Depth Inpainting and Filtering”, Retrieved on: Dec. 3, 2013, Available at: http://www.radfordparker.com/papers/kinectinpainting.pdf. |
Raskar, et al., “Image Precision Silhouette Edges”, In Proceedings of the Symposium on Interactive 3D Graphics, Apr. 26, 1999, 7 pages. |
Catto, et al., “Iterative Dynamics with Temporal Coherence”, Feb. 22, 2005, Menlo Park, California, 24 pages. |
Sole et al., “Hierarchical Hole-Filling for Depth-based View Synthesis in FTV and 3D Video”, Draft, IEEE Journal of Selected Topics in Signal Processing, Jun. 2012. |
International Search Report & Written Opinion, dated Jul. 17, 2014, in PCT Patent Application No. PCT/US2014/022464, filed Mar. 10, 2014, 12 pages. |
Smolic, et al., “Intermediate View Interpolation Based on Multiview Video Plus Depth for Advanced 3D Video Systems”, In IEEE 15th International Conference on Image Processing, Oct. 12, 2008, pp. 2448-2451. |
Liu, et al., “Texture-Adaptive Hole-filling Algorithm in Raster-Order for Three-Dimensional Video Applications”, In Journal of Neurocomputing, vol. 111, Jan. 31, 2013, pp. 154-160. |
Vlsaic, et al., “Dynamic Shape Capture using Multi-View Photometric Stereo”, In Proceedings of ACM Transactions on Graphics, vol. 28, Issue 5, Dec. 1, 2009, 11 Pages. |
Amendment dated Nov. 17, 2014, in PCT Patent Application No. PCT/US2014/022464 filed Mar. 10, 2014. |
International Preliminary Report on Patentability dated Mar. 9, 2015, in PCT Patent Application No. PCT/US2014/022464 filed Mar. 10, 2014. |
Amendment filed Mar. 17, 2014, in U.S. Appl. No. 13/801,966 filed Mar. 13, 2013. |
Notice of Allowance dated Mar. 17, 2014, in U.S. Appl. No. 13/801,966 filed Mar. 13, 2013. |
Kanade et al., “A Stereo Machine for Video-rate Dense Depth Mapping and Its New Applications”, IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 1996, pp. 196-202,The Robotics Institute, Carnegie Mellon University, Pittsburgh, PA. |
Miyagawa et al., “CCD-Based Range Finding Sensor”, Oct. 1997, pp. 1648-1652, vol. 44 No. 10, IEEE Transactions on Electron Devices. |
Rosenhahn et al., “Automatic Human Model Generation”, 2005, pp. 41-48, University of Auckland (CITR), New Zealand. |
Aggarwal et al., “Human Motion Analysis: A Review”, IEEE Nonrigid and Articulated Motion Workshop, 1997, University of Texas at Austin, Austin, TX. |
Shao et al., “An Open System Architecture for a Multimedia and Multimodal User Interface”, Aug. 24, 1998, Japanese Society for Rehabilitation of Persons with Disabilities (JSRPD), Japan. |
Kohler, “Special Topics of Gesture Recognition Applied in Intelligent Home Environments”, In Proceedings of the Gesture Workshop, 1998, pp. 285-296, Germany. |
Kohler, “Vision Based Remote Control in Intelligent Home Environments”, University of Erlangen-Nuremberg/ Germany, 1996, pp. 147-154, Germany. |
Kohler, “Technical Details and Ergonomical Aspects of Gesture Recognition applied in Intelligent Home Environments”, 1997, Germany. |
Hasegawa et al., “Human-Scale Haptic Interaction with a Reactive Virtual Human in a Real-Time Physics Simulator”, Jul. 2006, vol. 4, No. 3, Article 6C, ACM Computers in Entertainment, New York, NY. |
Qian et al., “A Gesture-Driven Multimodal Interactive Dance System”, Jun. 2004, pp. 1579-1582, IEEE International Conference on Multimedia and Expo (ICME), Taipei, Taiwan. |
Zhao, “Dressed Human Modeling, Detection, and Parts Localization”, 2001, The Robotics Institute, Carnegie Mellon University, Pittsburgh, PA. |
He, “Generation of Human Body Models”, Apr. 2005, University of Auckland, New Zealand. |
Isard et al., “Condensation—Conditional Density Propagation for Visual Tracking”, 1998, pp. 5-28, International Journal of Computer Vision 29(1), Netherlands. |
Livingston, “Vision-based Tracking with Dynamic Structured Light for Video See-through Augmented Reality”, 1998, University of North Carolina at Chapel Hill, North Carolina, USA. |
Wren et al., “Pfinder: Real-Time Tracking of the Human Body”, MIT Media Laboratory Perceptual Computing Section Technical Report No. 353, Jul. 1997, vol. 19, No. 7, pp. 780-785, IEEE Transactions on Pattern Analysis and Machine Intelligence, Caimbridge, MA. |
Breen et al., “Interactive Occlusion and Collision of Real and Virtual Objects in Augmented Reality”, Technical Report ECRC-95-02, 1995, European Computer-Industry Research Center GmbH, Munich, Germany. |
Freeman et al., “Television Control by Hand Gestures”, Dec. 1994, Mitsubishi Electric Research Laboratories, TR94-24, Caimbridge, MA. |
Hongo et al., “Focus of Attention for Face and Hand Gesture Recognition Using Multiple Cameras”, Mar. 2000, pp. 156-161, 4th IEEE International Conference on Automatic Face and Gesture Recognition, Grenoble, France. |
Pavlovic et al., “Visual Interpretation of Hand Gestures for Human-Computer Interaction: A Review”, Jul. 1997, pp. 677-695, vol. 19, No. 7, IEEE Transactions on Pattern Analysis and Machine Intelligence. |
Azarbayejani et al., “Visually Controlled Graphics”, Jun. 1993, vol. 15, No. 6, IEEE Transactions on Pattern Analysis and Machine Intelligence. |
Granieri et al., “Simulating Humans in VR”, The British Computer Society, Oct. 1994, Academic Press. |
Brogan et al., “Dynamically Simulated Characters in Virtual Environments”, Sep./Oct. 1998, pp. 2-13, vol. 18, Issue 5, IEEE Computer Graphics and Applications. |
Fisher et al., “Virtual Environment Display System”, ACM Workshop on Interactive 3D Graphics, Oct. 1986, Chapel Hill, NC. |
“Virtual High Anxiety”, Tech Update, Aug. 1995, pp. 22. |
Sheridan et al., “Virtual Reality Check”, Technology Review, Oct. 1993, pp. 22-28, vol. 96, No. 7. |
Stevens, “Flights into Virtual Reality Treating Real World Disorders”, The Washington Post, Mar. 27, 1995, Science Psychology, 2 pages. |
“Simulation and Training”, 1994, Division Incorporated. |
English Machine-translation of Japanese Publication No. JP08-044490 published on Feb. 16, 1996. |
Office Action and Search Report dated May 4, 2017, in Chinese Patent Application No. 201480014513.6, 14 Pages. |
Number | Date | Country | |
---|---|---|---|
20150310256 A1 | Oct 2015 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 13801966 | Mar 2013 | US |
Child | 14793337 | US |