Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

Professor Philip Ogunbona

None

System

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Face To Face Communications In Multiplayer Online Games: A Real-Time System, Ce Zhan, Wanqing Li, Farzad Safaei, Philip Ogunbona Sep 2012

Face To Face Communications In Multiplayer Online Games: A Real-Time System, Ce Zhan, Wanqing Li, Farzad Safaei, Philip Ogunbona

Professor Philip Ogunbona

Multiplayer online games (MOG) bring HCI into a new era of human-human interactions in computer world. Although current MOG provide more interactivity and social interaction in the virtual world, natural facial expression as a key factor in emulating face to face communications has been neglected by game designers. In this work, we propose a real-time automatic system to recognize players’ facial expressions, so that the recognition results can be used to drive the MOG’s “facial expression engine” instead of “text commands”. Our major contributions are the evaluation, improvement and efficient implementation of existing algorithms to build a real-time system that …


A Secure And Flexible Authentication System For Digital Images, Takeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona Sep 2012

A Secure And Flexible Authentication System For Digital Images, Takeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona

Professor Philip Ogunbona

Authentication of image data is a challenging task. Unlike data authentication systems that detect a single bit change in the data, image authentication systems must remain tolerant to changes resulting from acceptable image processing or compression algorithms while detecting malicious tampering with the image. Tolerance to the changes due to lossy compression systems is particularly important because in the majority of cases images are stored and transmitted in compressed form, and so it is important for verification to succeed if the compression is within the allowable range. In this paper we consider an image authentication system that generates an authentication …