Sandeep Gowda - Academia.edu (original) (raw)
Papers by Sandeep Gowda
Indian Journal of Endocrinology and Metabolism
2014 Ieee International Conference on Advanced Communications Control and Computing Technologies, May 1, 2014
Proceedings of the 1st ACM SIGCHI symposium on Engineering interactive computing systems - EICS '09, 2009
This paper evaluates the input performance capabilities of Velocity Threshold (I-VT) and Kalman F... more This paper evaluates the input performance capabilities of Velocity Threshold (I-VT) and Kalman Filter (I-KF) eye movement detection models when employed for eye-gaze-guided interface control. I-VT is a common eye movement identification model employed by the eye tracking community, but it is neither robust nor capable of handling high levels of noise present in the eye position data. Previous research implies that use of a Kalman filter reduces the noise in the eye movement signal and predicts the signal during brief eye movement failures, but the actual performance of I-KF was never evaluated. We evaluated the performance of I-VT and I-KF models using guidelines for ISO 9241 Part 9 standard, which is designed for evaluation of non keyboard/mouse input devices with emphasis on performance, comfort, and effort. Two applications were implemented for the experiment: 1) an accuracy test 2) a photo viewing application specifically designed for eye-gaze-guided control. Twenty-one subjects participated in the evaluation of both models completing a series of tasks. The results indicates that I-KF allowed participants to complete more tasks with shorter completion time while providing higher general comfort, accuracy and operation speeds with easier target selection than the I-VT model. We feel that these results are especially important to the engineers of new assistive technologies and interfaces that employ eye-tracking technology in their design.
Proceedings of the International Conference on Advances in Computer Enterntainment Technology - ACE '09, 2009
In this paper, we introduce and evaluate a new Instantaneous Saccade (IS) selection scheme for ey... more In this paper, we introduce and evaluate a new Instantaneous Saccade (IS) selection scheme for eye gaze driven interfaces where the speed of the target selection is of utmost importance. In the IS selection scheme, target selection occurs at the start (onset) of a saccade requiring only constant amount of time to be completed. The IS performance is compared to the conventional Dwell Time (DT) selection scheme where target selection is triggered when a user fixates on an object for a certain amount of time. The IS method is also compared to the Saccade Offset (SO) selection scheme where target selection occurs at the end of a saccade. All three schemes were evaluated in terms of task completion time and the throughput of input performance in horizontal target selection task by six subjects. Results show that the Instantaneous Saccade selection was 57% faster than the DT selection to complete a task. In terms of throughput comparison, the throughput of the IS selection is 1.9 times greater than the throughput of DT selection. We hypothesize that Instantaneous Saccade selection will be beneficial in gaming environments that require fast very interaction speeds.
Proceedings of the 28th of the international conference extended abstracts on Human factors in computing systems - CHI EA '10, 2010
Page 1. Real Time Eye Movement Identification Protocol Keywords Eye movement, identification, cla... more Page 1. Real Time Eye Movement Identification Protocol Keywords Eye movement, identification, classification, eye tracking, human computer interaction, real time ACM Classification Keywords I.5.2 Pattern Recognition: Design ...
Optics express, Jan 30, 2012
Chaos-based image cipher has been widely investigated over the last decade or so to meet the incr... more Chaos-based image cipher has been widely investigated over the last decade or so to meet the increasing demand for real-time secure image transmission over public networks. In this paper, an improved diffusion strategy is proposed to promote the efficiency of the most widely investigated permutation-diffusion type image cipher. By using the novel bidirectional diffusion strategy, the spreading process is significantly accelerated and hence the same level of security can be achieved with fewer overall encryption rounds. Moreover, to further enhance the security of the cryptosystem, a plain-text related chaotic orbit turbulence mechanism is introduced in diffusion procedure by perturbing the control parameter of the employed chaotic system according to the cipher-pixel. Extensive cryptanalysis has been performed on the proposed scheme using differential analysis, key space analysis, various statistical analyses and key sensitivity analysis. Results of our analyses indicate that the ne...
Proceedings of the 2010 Symposium on Eye-Tracking Research & Applications - ETRA '10, 2010
This paper presents a set of qualitative and quantitative scores designed to assess performance o... more This paper presents a set of qualitative and quantitative scores designed to assess performance of the various eye movement classification algorithms. The scores are designed to provide a foundation for the eye tracking researchers to communicate about the performance validity of various eye movement classification algorithms. The paper concentrates on the five algorithms in particular: Velocity Threshold Identification (IVT), Dispersion Threshold Identification (IDT), Minimum Spanning Tree Identification (MST), Hidden Markov Model Identification (I HMM) and Kalman Filter Identification (IKF). The paper presents an evaluation of the classification performance of each algorithm in the case when values of the input parameters are varied. Advantages provided by the new scores are discussed. Discussion on what is the "best" classification algorithm is provided for several applications. General recommendations for the selection of the input parameters for each algorithm are provided.
In an effort toward standardization, this paper evaluates the performance of five eye-movement cl... more In an effort toward standardization, this paper evaluates the performance of five eye-movement classification algorithms in terms of their assessment of oculomotor fixation and saccadic behavior. The results indicate that performance of these five commonly used algorithms vary dramatically, even in the case of a simple stimulus-evoked task using a single, common threshold value. The important contributions of this paper are: evaluation and comparison of performance of five algorithms to classify specific oculomotor behavior; introduction and comparison of new standardized scores to provide more reliable classification performance; logic for a reasonable threshold-value selection for any eye-movement classification algorithm based on the standardized scores; and logic for establishing a criterion-based baseline for performance comparison between any eye-movement classification algorithms. Proposed techniques enable efficient and objective clinical applications providing means to assure meaningful automated eye-movement classification.
Optics Express, 2012
Chaos-based image cipher has been widely investigated over the last decade or so to meet the incr... more Chaos-based image cipher has been widely investigated over the last decade or so to meet the increasing demand for real-time secure image transmission over public networks. In this paper, an improved diffusion strategy is proposed to promote the efficiency of the most widely investigated permutation-diffusion type image cipher. By using the novel bidirectional diffusion strategy, the spreading process is significantly accelerated and hence the same level of security can be achieved with fewer overall encryption rounds. Moreover, to further enhance the security of the cryptosystem, a plain-text related chaotic orbit turbulence mechanism is introduced in diffusion procedure by perturbing the control parameter of the employed chaotic system according to the cipher-pixel. Extensive cryptanalysis has been performed on the proposed scheme using differential analysis, key space analysis, various statistical analyses and key sensitivity analysis. Results of our analyses indicate that the new scheme has a satisfactory security level with a low computational complexity, which renders it a good candidate for real-time secure image transmission applications.
Indian Journal of Endocrinology and Metabolism
2014 Ieee International Conference on Advanced Communications Control and Computing Technologies, May 1, 2014
Proceedings of the 1st ACM SIGCHI symposium on Engineering interactive computing systems - EICS '09, 2009
This paper evaluates the input performance capabilities of Velocity Threshold (I-VT) and Kalman F... more This paper evaluates the input performance capabilities of Velocity Threshold (I-VT) and Kalman Filter (I-KF) eye movement detection models when employed for eye-gaze-guided interface control. I-VT is a common eye movement identification model employed by the eye tracking community, but it is neither robust nor capable of handling high levels of noise present in the eye position data. Previous research implies that use of a Kalman filter reduces the noise in the eye movement signal and predicts the signal during brief eye movement failures, but the actual performance of I-KF was never evaluated. We evaluated the performance of I-VT and I-KF models using guidelines for ISO 9241 Part 9 standard, which is designed for evaluation of non keyboard/mouse input devices with emphasis on performance, comfort, and effort. Two applications were implemented for the experiment: 1) an accuracy test 2) a photo viewing application specifically designed for eye-gaze-guided control. Twenty-one subjects participated in the evaluation of both models completing a series of tasks. The results indicates that I-KF allowed participants to complete more tasks with shorter completion time while providing higher general comfort, accuracy and operation speeds with easier target selection than the I-VT model. We feel that these results are especially important to the engineers of new assistive technologies and interfaces that employ eye-tracking technology in their design.
Proceedings of the International Conference on Advances in Computer Enterntainment Technology - ACE '09, 2009
In this paper, we introduce and evaluate a new Instantaneous Saccade (IS) selection scheme for ey... more In this paper, we introduce and evaluate a new Instantaneous Saccade (IS) selection scheme for eye gaze driven interfaces where the speed of the target selection is of utmost importance. In the IS selection scheme, target selection occurs at the start (onset) of a saccade requiring only constant amount of time to be completed. The IS performance is compared to the conventional Dwell Time (DT) selection scheme where target selection is triggered when a user fixates on an object for a certain amount of time. The IS method is also compared to the Saccade Offset (SO) selection scheme where target selection occurs at the end of a saccade. All three schemes were evaluated in terms of task completion time and the throughput of input performance in horizontal target selection task by six subjects. Results show that the Instantaneous Saccade selection was 57% faster than the DT selection to complete a task. In terms of throughput comparison, the throughput of the IS selection is 1.9 times greater than the throughput of DT selection. We hypothesize that Instantaneous Saccade selection will be beneficial in gaming environments that require fast very interaction speeds.
Proceedings of the 28th of the international conference extended abstracts on Human factors in computing systems - CHI EA '10, 2010
Page 1. Real Time Eye Movement Identification Protocol Keywords Eye movement, identification, cla... more Page 1. Real Time Eye Movement Identification Protocol Keywords Eye movement, identification, classification, eye tracking, human computer interaction, real time ACM Classification Keywords I.5.2 Pattern Recognition: Design ...
Optics express, Jan 30, 2012
Chaos-based image cipher has been widely investigated over the last decade or so to meet the incr... more Chaos-based image cipher has been widely investigated over the last decade or so to meet the increasing demand for real-time secure image transmission over public networks. In this paper, an improved diffusion strategy is proposed to promote the efficiency of the most widely investigated permutation-diffusion type image cipher. By using the novel bidirectional diffusion strategy, the spreading process is significantly accelerated and hence the same level of security can be achieved with fewer overall encryption rounds. Moreover, to further enhance the security of the cryptosystem, a plain-text related chaotic orbit turbulence mechanism is introduced in diffusion procedure by perturbing the control parameter of the employed chaotic system according to the cipher-pixel. Extensive cryptanalysis has been performed on the proposed scheme using differential analysis, key space analysis, various statistical analyses and key sensitivity analysis. Results of our analyses indicate that the ne...
Proceedings of the 2010 Symposium on Eye-Tracking Research & Applications - ETRA '10, 2010
This paper presents a set of qualitative and quantitative scores designed to assess performance o... more This paper presents a set of qualitative and quantitative scores designed to assess performance of the various eye movement classification algorithms. The scores are designed to provide a foundation for the eye tracking researchers to communicate about the performance validity of various eye movement classification algorithms. The paper concentrates on the five algorithms in particular: Velocity Threshold Identification (IVT), Dispersion Threshold Identification (IDT), Minimum Spanning Tree Identification (MST), Hidden Markov Model Identification (I HMM) and Kalman Filter Identification (IKF). The paper presents an evaluation of the classification performance of each algorithm in the case when values of the input parameters are varied. Advantages provided by the new scores are discussed. Discussion on what is the "best" classification algorithm is provided for several applications. General recommendations for the selection of the input parameters for each algorithm are provided.
In an effort toward standardization, this paper evaluates the performance of five eye-movement cl... more In an effort toward standardization, this paper evaluates the performance of five eye-movement classification algorithms in terms of their assessment of oculomotor fixation and saccadic behavior. The results indicate that performance of these five commonly used algorithms vary dramatically, even in the case of a simple stimulus-evoked task using a single, common threshold value. The important contributions of this paper are: evaluation and comparison of performance of five algorithms to classify specific oculomotor behavior; introduction and comparison of new standardized scores to provide more reliable classification performance; logic for a reasonable threshold-value selection for any eye-movement classification algorithm based on the standardized scores; and logic for establishing a criterion-based baseline for performance comparison between any eye-movement classification algorithms. Proposed techniques enable efficient and objective clinical applications providing means to assure meaningful automated eye-movement classification.
Optics Express, 2012
Chaos-based image cipher has been widely investigated over the last decade or so to meet the incr... more Chaos-based image cipher has been widely investigated over the last decade or so to meet the increasing demand for real-time secure image transmission over public networks. In this paper, an improved diffusion strategy is proposed to promote the efficiency of the most widely investigated permutation-diffusion type image cipher. By using the novel bidirectional diffusion strategy, the spreading process is significantly accelerated and hence the same level of security can be achieved with fewer overall encryption rounds. Moreover, to further enhance the security of the cryptosystem, a plain-text related chaotic orbit turbulence mechanism is introduced in diffusion procedure by perturbing the control parameter of the employed chaotic system according to the cipher-pixel. Extensive cryptanalysis has been performed on the proposed scheme using differential analysis, key space analysis, various statistical analyses and key sensitivity analysis. Results of our analyses indicate that the new scheme has a satisfactory security level with a low computational complexity, which renders it a good candidate for real-time secure image transmission applications.