0% found this document useful (0 votes)
7 views

Assistive Technology for Enhanced Human-Computer Interaction

Uploaded by

sufian.m.salih
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Assistive Technology for Enhanced Human-Computer Interaction

Uploaded by

sufian.m.salih
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

"Assistive Technology for Enhanced Human-Computer

Interaction"
Dr. Salih sufian Munther

Chapter one
Introduction

1.1 Introduction

Recently there has been a growing interest in developing natural interaction


between human and computer. Several studies for human-computer
interaction in universal computing are introduced. The vision-based interface
technique extracts motion information without any high cost equipment from
an input video image. However, to develop a vision-based multimodal
human computer interface system, an eye and face tracking and their
recognition is done. Our system also proposed voice recognition. All
ordinary devices require manual control and cannot be used by persons
impaired in movement capacity. There is a need for developing alternative
methods of communication between human and computer that would be
suitable for the persons with motor impairments and would give them the
opportunity to become a part of the Information Society. A vision-based
system for detection of eye and face movements is presented, together with
its implementation as a Human-Computer Interface for people with
disabilities. The proposed work includes face detection, face tracking, eye
blink detection, voice recognition and interpretation of a sequence of blinks

1
in real time to control a non-intrusive human–computer interface. To replace
the traditional mouse with the human face and eye movements to interact the
Computer. It is to assist the physically challenged persons without hands to
use the computer efficiently and also easy.

1.1.1 Problem Definition

As accordingly to the previously invention mouse motion through eye blink


was possible but the circumstances that occurred were the small blink or
short blink were neglected. Even hardware was used for detecting eye blinks
but it used to cause an eye damage. Our system uses only webcam for
detecting face and eye movements and microphone for voice recognition to
give better output.

1.1.2 Proposed System

Our system is real time which captures a movement of mouse cursor through
face detection and facial features. It overcomes the existing system by avoiding
the use of external hardware that caused serious eye damages. It uses a
template matching method for eye extraction instead of using hardware, even
as in previous system the short blinks of eyes were avoided or neglected. In
this system the hard blink is only used for selecting particular file or folder.
With eye detection it is first aim is to captured face for the movement of mouse
cursor. Then it reacts as the mouse does .

1.2 In the hands of the project

The main objective of technology is to help people and facilitate their work,
and therefore within this context, many of the techniques and aids to disabled
people to use modern technology. The issue of communication with people

2
with disabilities is still fraught with weakness and inadequacy, although the
technologies continue to compensate for the incapacity of the disabled and to
meet their need to communicate with others. This research is a new
contribution in this area, where it is mainly directed to people with
quadriplegia who can control the mouse of the computer through facial
movements, and enables them to write on the computer. In our research, we
will discuss several chapters that show us how to design and implement a
software system that ensures the use of mouse and keyboard for people who
can not physically use them by recognizing the human face and moving the
mouse arrow with its movement with individual or double recognition through
a wink of the eyes, The screen in the form of a keyboard simulates the shape
and function of the physical keyboard but clicks through the mouse arrow.

1.3 How did the idea of the project come about

The mere fact that we talk about disabilities and that people with disabilities
are deprived of the use of life technology has been very interesting to us. We
followed this new area and read articles about it, we liked its applications, and
we saw that the door is still open to any of our needs to help the disabled, so
we decided to be our research area. As we went along this path, we conducted
research and prepared theses, which necessitated attention to the subject of
control of the chair of the elderly through the movement of the pupil, and we
thought of a new contribution in this range.

1.4 Curriculum adopted in the project

Since the field of research is the use of the computer through facial
movements, we have followed the scientific and programmatic approach in the
application of the conflict between the face and the computer. Our plan of

3
action was the process of detecting the human face through the camera in the
computer in one of the algorithms as will be shown later, and then moved to
the second phase is the detection of the eyes, and then we have drawn the
features that distinguish the eye whether open or closed, we used these features
in the right click, left and double. As we shall see, we used the process of
processing the image and computer vision, and this was done using Visual
Studio to finally get an application that enables patients with quadriplegia to
use the computer. We followed in our work these standards and scientific
steps, and informed us before the previous studies and methods used to reach
the result and benefit from it, and detailed in the following chapters.

1.5 Literature Review

survey implementation of controlling mouse motion is done by tracking face


and multiple eye blinks. Face detection is an important aspect that are
undertaken using featured-based and image based on method.
Featured-Based method finds the facial features and performs geometrical
analysis for their locations, areas and distances from each other.
Image-based method is based on scanning the image of interest with a
window that looks for faces at all scales and locations. The detected face
from this method is used with template matching. It has used universal
approaches for eye detection namely regression approach, Bayesian
approach and discriminative approach. These approaches give output as
minimizing distances between actual and predicate eye positions, learning of
eye appearance and non-eye appearance and treat the problem as feature
classifications. survey, the model parameters which encode the variations
caused by blinking are analyzed and determine. The Haar cascading
algorithm is used for face detection and template matching is for eye
4
extraction. It extracts the eye portion by certain geometrical dependencies.
Eye tracking is done by template matching and it is performed at its initial
stage. It has used face classifiers for movement of cursor (such as up, down,
left, right). The main stages included in this system is first it detects face
from the video then second eye extraction then third stage is feature
extraction then last courser movement and mouse event.

1.6 Goal of the system

1. Hands-free mouse controlling

2. To establish vision system

3. Controlling mouse motions using facial gesture and voice

4. To eliminating the limitations of stationary head

5. To provide real time eye tracking.

1.7 Outlines of the project

The project has been organized in the following chapters:

Chapter one: Gives an introduction to the project include its aim.

Chapter two: This chapter is talking about the help technique for people
with special needs, the operative software for typed text, font zoom
programs and the devices used in the project.

5
Chapter three: This chapter includes anatomical brief and spinal cord
infections, composite disability, quadriplegia and their causes, effects and
treatment.

6
Chapter two

Help techniques for people

with special needs

2.1 Introduction:

There is a growing global interest in the use of techniques in the educational


process, and the need for it is more urgent among individuals with
disabilities, and with the emergence of supporting technologies for the needs
of this category, disabled people can benefit from their full capacity. The
technologies whether it's devices or programs to facilitate access one of the
important aspects in the rehabilitation of the educational environment for
people with disabilities as well as the creation of the electronic environment
to interact with these devices and programs to facilitate accessibility of
disabled services and websites, and through the next lines offer a
presentation of the techniques according to disabilities types.

2.2 Technical Assistance for Disabled

2.2.1 Optical Disability (Visual IMPAIRIZMENTS): Opinion of the


generalization of the necessary categories of services to special visits, and
the main ratings of these categories are:

Blindness: A person whose sharpness is less than 60/6 meters (200/20 feet)
or less than 20 degrees.
7
Poor sight: A person whose sharpness is between 26/6 - 60/6 m (20/80,
200/20 ft) with the strongest eyes after making possible corrections.

2.3 Software

2.3.1 Software of operative reading for written text:

This software is called a "document reader" or a ''screen reader'' such as


what is in the Ebsar program as well as JAWS and Hal programs, where the
technique reads both Arabic and English texts , whether taken through the
panel Keys or texts that have been scanned, with audio messages
accompanying the visually impaired during use at all stages of the program,
to guide him by each step of what to do, and thus it provides the feature of
converting electronic files to audio files that visually impaired can be heard
at any time as a regular audio file, And this technique is present in most of
the software for the visually disabled, such as ( Ebsar - JAWS - Hal -
Krozuel - zoom text).

These programs help the visually impaired to browse websites available to


him on his personal computer and read his email and also the practice of
chat services, where the program starts reading the page title by a message

8
and then reads the details of the page content of the links, images, and
punctuation. The program that provides this service can automatically scroll
the page while browsing.

2.3.2 On-screen text magnification software:

a service offered to visually impaired users through special software such as


text zoom software. The program magnifies the computer screen more than
16 times the normal size and uses a lens to magnify parts of the screen after
the previous zoom and can open another part of the magnifying screen in
another screen is magnified by the same proportion also allows during this
magnification to read those parts of the screen and express but in English
language There are many other programs that offer this service as "super
nova"

Figure (2_1) interface of text zoom program.

9
2.4 Devices

Electronic line device

The electronic line is a device with a row of special cells made of plastic or
metal dots. These points are controlled by the computer and move up or
down to display Braille characters on the computer screen. This type of
device is described as a "revolving device" because it changes as the user
moves and navigates the screen, usually placed next to the computer
keyboard, which works in conjunction with desktop or laptop computers to
act as an input unit and interact with the computer through A set of Perkins
input keys, linked to its interface with the computer-based screen reader
software, and also acts as a data output unit by translating data and
outputting them in matrix points that enable the blind to read the contents of
the computer in Braille.

11
Portable notebook with electronic line

This device is a laptop for the blind and visually impaired. It enables them to
perform a variety of tasks in order to meet their different needs in work,
study or reading environments. The most important tasks are writing, saving,
internet access and surfing. During reading it in a Braille way or listening to
it through the loudspeaker and then visually disabled can retrieval and
archiving study files.

11
Braille printing

Any text written and saved is printed in the depth of the txt or doc. Through
special printers that convert the text from normal language in to Braille.
This technique provides the visually disabled by the material after hearing it
in a way that can be retained and reviewed as he wishes.

12
2.5 Hearing Impairment

Hearing impairment is divided into two main types:

Deafness: a person who suffers from a loss of 70 decibel and above and
causes him disability of receive or transmit speech using or without the use
of hearing aid.

Hearing impaired: A person suffers from hearing loss ranges between 35 -


69 decibel, and don't causing it to be obstructed in receiving or transmitting
speech using and without the use of hearing aid. The modern techniques
have played an important role in activating communication with the hearing
disabled, especially in the development of electronic communication skills
through the use and programming of the computer. For example, the deaf
user relies on the method of communication through the language of
movements known as ''cued Speech'', which was used in English, and then
translated in to several international languages, including French and Arabic.
This language has been developed in the form of a program that aims to help
the deaf communicate through this language by the hand movements that
appear on the computer screen and the education of this language does not
need any computer skills from the deaf user, enough to click on some keys
to appear in front of him on the screen. It is possible to convert texts written
on websites or files saved on the device in a format txt or doc to hand and
face drawings to form audio clips, words and sentences.

13
the use of multimedia techniques through the websites there is a set of
instructions for activating the multimedia for the disabled for example
activate the video clips in the sign language and write the audio explanation
in the user language for the video category, such as activating the audio files
in an assistant that includes the content of the audio file.

2.6 Physical disability

Physical disability refers to a wide range of conditions or conditions that


may limit the movement and vitality of an individual in the exercise of one
or more of the major life functions (such as walking, sitting, standing,
speaking, learning, working, self-care, etc..), And may weaken the strength,
speed, endurance and ingenuity in the performance of the former major life
functions.

14
With the advancement of science and assistive medical equipment, patients
with physical disabilities participated in the design and perseverance of their
normal life and functioning. Among these patients, Stephen Hawking,
despite his 19 years of age, was one of the most prominent theoretical
physicists at the level worldwide. The following cases represent the majority
of physical disabilities:

Total or Partial paralysis disabilities.

 Amputation.

 Severe injuries

 Muscular dystrophy

 Cerebral palsy.

 Multiple sclerosis

 Spina bifida

 Temporary body injuries.

2.7 Alternative input devices

There are suitable input devices and alternative to the keyboard that are used
with the normal or mouse which is connected to the computer to make it
more suitable for students with special needs, especially those who suffer
from problems in the coordination of musculoskeletal or cannot get the
mouse and control. And input devices Alternatives:

• Trackball: Is a mouse. Instead of moving the mouse, the learner rotates


the ball directly, and the ball can be used in larger sizes, making it easier to

15
control. However, but controlling the cursor by rotating the ball does not
give it a chance to click.

• The joystick: a direct alternative to the mouse, but it still requires a


reasonable amount of consistency between the eye and hand and does not
stop control of the stick by hand, the learner can hold it to other parts of his
body such as mouth.

• Touch screen: The idea of working of the touch screen based on the
development of transparent screen sensitive to the front of the computer and
the learner can use the computer and deal with files and lists easily.

16
A humidifier: can be boosted by a sensor of air and used as an infidel by
blowing the mouth of the disabled with quadriplegia. It is activated with
software for this purpose. A famous example is the free Breath Bird
program. My father works on the iPad in English and Japanese only. When
the program is run, the timeline contents of the person's Twitter page are
displayed automatically updated on the right side of the program. On the left
side a writable box is displayed and a virtual keyboard divided into five rows
and in order to write, the program lights the first character in each row. If the
character to be written is in the class, the user will blow the microphone to
lock the row, and then the program will shade each character in the row
respectively to select it. The process of interaction in this way may seem
tired and difficult, but from the point of view of the target group is certainly
a good step in order to integrate them into society.

Figure (2_2) humidifier with air sensor.

17
• Bigkeys LX: is designed for large Big Key, Large-format keyboard with
large letters to facilitate the use of the computer for disabled and those with
mobility problems. Many technology companies have released computer
types for the help of quadriplegic patients, where the continent has been
dispensed with and replaced with an indicator on the camera and the
keyboard is customized so that it appears on the screen and is clicked by the
previous cursor or by voice commands. The technology that talked about
previously is rather expensive and therefore aimed at this project to improve
similar method to control the mouse through the digital camera, which we
will review it in the rest paragraphs.

18
Chapter three

Anatomical brief

1.3 Introduction

The spine, one of the most important and effectiveness in the human body
because it is the main axis, which the human depends on with the movement
and the situation, and has another importance lies in the protection of second
most important organ in the human body ''the spinal cord'', Everyone knows
that the backbone is one of the basic means of protecting the spinal cord
from shocks and external mechanisms.

3.2 An anatomical profile

In the beginning we should point out a simple anatomical profile of the


spine.

The spine is containing spinal cord and holding the head and trunk. It is
connecting with rips and muscles. One of the most important point we must
know in our project is that the spinal cord ends in the level of first lumbar
vertebrae, therefore any damage below this site may result in hemiplegia.

19
Figure (3_1) spinal cord structure.

3.3 Spinal Cord Injury

The spinal cord consists of tens of thousands of nerve fibers, acting as a


receiver cable and the transmitter carries messages between the brain and
various organs of the body. Injuries cause loss of sensation, bowel
movement and bladder, and may also affect the breathing and body
temperature. The impact of movement or sensation depends on the severity
of the injury, which leads to loss of sensation and movement altogether This
is often caused by quadriplegia or hemiplegia, and hemiplegia is mean
paralysis or weakness of legs and movement Chest and trunk on the degree

21
of injury and hands are not affected at all four quadruple means the
weakness of the four parties.

3.4 Causes of spinal cord injury

Anyone with spinal cord injuries is exposed to the young child - mothers -
parents - older adolescents, and the age of people exposed to such injuries is
15-29 years. The ratio of women to men is 4:1, most of which occur to
young people.

These injuries fall into two basic categories: those related to injuries or
distant from them, most of which fall within the first category and their
causes

-Motorcyclists and pedestrians such as these - accidents of different means


of transport from cars, and injuries are forgotten: 51%

- Falling: 19%.

- Water sports: 13%.

- Violence: 3%.

- Football: Dr. 2%.

- Other sports: 102%.

- Horseback riding: 0. 6%.

21
3.5 Spinal Cord Injury effect

Any damage to the spinal cord is serious. The patient may have the
following symptoms:

- The inability to move the limbs.

- The inability to feel cold or heat in the area under pressure under the
affected area directly, and the arrival of blood to these places, which leads to
damage to skin cells.

- The inability to feel the desire to urinate when the bladder filled his leg
involuntarily. Muscle spasm down the affected area.

- Low blood pressure is not in all cases, rarely raised.

- Disorder in regulating body temperature.

- The psychological state of the person is affected by loss of confidence and


disorder of his poetic state.

Figure (3_2) human suffer from spinal cord injury.

22
3.6 Treatment of spinal cord injuries

At first, a person cannot practice his normal life when he is aware of the
injury. He cannot go to school, university, for work, Exercise or shopping.
And after a short period of time he can return to his normal life, while
providing the right treatment and in the absence of any other repercussions
for the injury. A person suffering from hemorrhagic paralysis can return to
normal life and return to self-reliance within 4-12 months. Quadriplegia
takes a year or more. Unfortunately, at the present time, any spinal cord
injury is a permanent injury and there is no cure. These people do not
recognize any disability and do not rely on others for work. But there is
something important that no one can live away from The others do not resort
to them and rely on them in some things. The question is not what we can do
or do not do, but how to take care of what we do even if we are healthy.

3.7 Disability

Motor disability is not confined to the injury of the paralyzed person, there
are other injuries related to those that occur in the nerves, and the causes of
this type of disabilities: a defect in the electrical messages emitted from the
brain and lose the ability to reach the muscles correctly, as the muscles are
which move joints.

Where each muscle of fuel and brake on each side to be able to stretch and
shrink, and sometimes with brain injuries, these messages are inhibited and
cause the stimulation of one aspect of these muscles in excess, and this King
(exhausted) is not conductive electricity to overload it and thus affected

23
movement Muscles, if not reached the nerve message of these muscles have
a severe reaction.

3.7.1 Quadriplegia

One of physical motor impairments in tetraplegia, usually indicates


subsequent damage to the cervical spinal cord, although it may be the result
of injury to the brain or peripheral nerves (cervical spinal cord located
within a canal) The vertebrae connect the brain to the majority of the body's
organs by means of nerve fibers passing through it. Recently, a dramatic
change in the medical effects of these infections on the patient has been of
great importance in medicine, thanks to a new therapeutic method applied in
the middle of the last century. In similar cases, which previously led to death
within three years, now tens of years after injury. In addition, a significant
recovery was achieved in 75% of the injured and the tools were developed
for independent functional performance, even for those who still suffer
damage to the nervous system, but they were previously ineligible to serve
themselves and not their home of course. This medical revolution got,
although it is not yet available. Effective treatment for damaged spinal cord
in humans. There are experimental treatments that have succeeded in
developing spinal processes in an infected spinal cord in animals, including
the introduction of antibodies or special cells from the immune system to the
affected site, or through the implantation of sections of nerves or embryonic
stem cells at the site of infection. But it seems that many years will pass
before these treatments become useful to humans as well,

The radical development of the treatments and their results was the result of
the realization that the fate of the injured does not depend on the integrity
and integrity of the spinal cord. Even without repairing the same
24
neurological damage, preventing complications and restoring functional
functioning allow for healing and congestion. The purpose of medical
treatment Occupational dysfunction is related to the extent, severity and
severity of the injury. Complete damage to the upper part of the cervical
spinal cord may result in dependence and dependence on the kidneys to help
others, and impede spontaneous self-breathing. In contrast, partial damage or
damage to the lower part of the cervical spinal cord can allow the patient to
perform his functions almost independently and be able to walk. The
involuntary contraction of the muscles, which accompanies paralysis and is
called spasm, mostly exacerbates the job disorder, but it may help in
functionality, sometimes.

3.7.2 Causes of quadriplegia

among the causes of quadriplegia and the factors that cause damage to the
spinal cord: direct injuries, narrowing of the spinal canal and rupture of discs
between the paragraphs, multiple sclerosis, tumors, inflammation and
vascular disease. The quality of the agent causing the damage and the extent
of his response to the medical treatment have an impact on the extent and
duration of the damage. But as soon as we stir it, the damage will have dire
consequences, whatever the fall.

3.7.3 Treatment of quadriplegia

the treatment of quadriplegia includes drugs, some physical and educational


means, as well as auxiliary equipment, both traditional and modern. As a
complement to the auxiliary equipment, special tools can also be used such
as hand grips, portable electric chairs and home control systems

25
Chapter four

Theoretical foundations

Of the research
4.1 Computer vision

is one of the fields of computer science, which aims to build intelligent


applications capable of understanding the content of images as understood
by humans. Where data can take several forms of successive images (video),
seen from several cameras, data of several dimensions taken from a medical
imaging. Some examples of computer vision applications:

1. An application that is able to identify objects or persons within an


image. Applications of automatic control (industrial robot, motor
vehicles):

2. building models of objects or ocean of industrial inspection, medical


image analysis).

3. An application that is able to follow an image within an image

4. an application capable of knowing the third dimension of one or more


images of a dimensionality dimension (or of an image and a moving
laser light).

Computational vision can be described as synonymous (and not necessarily


inverse) with physiological vision. Just as the physiological vision of
humans and animals is studied in order to identify the properties of anorexia,
computer vision studies and describes the artificial vision systems that are

26
carried out in programs or devices. The cooperation between the fields of
physiological and computer vision study has developed a profound
understanding of both fields.

The following areas fall under the field of computer vision.

Motion Estimation.

Image Restoration.

Object recognition.

Video Tracking 171.

4.1.1 Computer vision systems

Computer vision systems vary widely and are distributed between large and
complex systems that perform general and comprehensive tasks, and
between small systems that perform dedicated and simple tasks. Most
computer vision systems, however, mainly include the following elements:

1. Image acquisition: The image is obtained using one or more image


sensors. These include many light sensor cameras, distance cascades,
radios, radar, ultrasound cameras. . . Etc. Depending on the sensor type,
the resultant image is a two-dimensional, three-dimensional, or
successive series of images. The value of each pixel in the image is
dependent on the value of the intensity of the light radiation in one or
more optical beams, gray images, or color images. But it can also refer

27
to many physical measurements such as distance, absorption, or
reflection of electromagnetic waves.

2. Precedent processes: before applying the computer vision algorithm to


image data in order to obtain useful information, it is necessary to
perform advance data operations in order to confirm that the data
satisfies specific algorithm-specific borrowings. Some examples of
these operations are:

 Reselect the image resolution to confirm the correctness of the image


coordinate system.

 reduce noise to ensure that the sensor does not provide any
information.

 increase the contrast in order to ensure that the desired information


will be available.

3. Feature extraction.

Image parameters are obtained at different resolution levels from the image
data itself.

These parameters are classified in to:

o global features such as color and shape.

o Local features such as Harris Corner, and patches.

It is possible to get more complex features related to the colors and shapes in
the picture.

A. Detection / Segmentation: Any points or areas of the image are


identified as important areas for subsequent operations. For example:

28
 Select a set of distinct mark points.

 divide one or more images containing the region containing the object
of interest.

B. High-level operations: At this stage, the input data is a small set of data,
for example a set of points or area of the image that is suspected to
contain the subject matter and the remaining processes, do the following:

 Ensure that the data obtained agree with the assumptions of the
proposed application.

 estimate the values of the specific parameters of the application,


such as body direction or body size.

4.2 Face Detection

Many of the algorithms used in facial detection are classified into:

1. The template - Matching algorithm: that depends on the patterns ready


for the face

2. Feature invariant approaches: this algorithm is used to identify the


face by identifying the structural features during the changes of the
number of On-the-Elevation degrees.

3. Appearance based This algorithm initially creates templates


depending on the images containing the face and then is used. In the
face detection, this algorithm is particularly used in neural networks.

29
4. Knowledge – Based: This algorithm is based on the knowledge of the
facial components in the formation of the faceted templates and uses a
basic shape to locate the face.

Using the first face detection algorithm using the HAAR files inside the
EMGU library used in computer vision and HAAR files is a medical
platform for face shape, we will present the main steps in this algorithm,
noting that the K objects used for detection are vertical and have a front end
and are surrounded by the same lighting conditions.

31
4.2.1 Template matching algorithm

The following figure show the flow chart of this algorithm

Start

Face tracking

Calculate the thread The second mass

no

Copare with
no The last
sample mass
s
yes

Locat the face The end

Delet the
detected
face

Figure (4_1) the flow chart of face detection algorithm.

After you get the image from the camera, we do the following:
A. Skin Segmentation: determining the color of the skin in the images
is a well-known and useful process in the face detection. The input
material is in mode of RGB (Red - Green - Blue) image, and
because of this mode the picture is greatly affected by the lighting

31
conditions so face detection through it will cause problems, so
convert the image to one of the following modes:
 HSV (Hue - Saturation - Value):
H: refers to pure color, which is a number between zero and one.
S: refers to the degree of white color, is a number between zero and one,
White takes zero value.
V: Indicates the degree of color darkness, is a number between zero and one,
black takes zero value.
The following figure which called Single_ Hexcone Model illustrates the
distribution of the values of the contest.

Figure (4_2) Single_ Hexcone Model

H: expresses the degree of angle, S: expresses the degree of dimension from


the center of the cone, v: expresses the degree of distance from the cone
head.

32
 YIQ (Yellow - In -phase - Quadrature):
Y: Express the degree of illumination.
I, Q: Expressing the degree of coloring, their values between zero and one.
The convertion between RGB and this mode by using the following
equation:

( ) ( )( )

This pattern will be used in television systems and it is useful as it contains a


transformer that reflects the value of illumination, beacause the color of the
human eye is very sensitive to illumination.
YCbCr (Yellow -Component blue -Difference - Component red difference).
Y: The degree of illumination ranges within the range [235 - 16].
Cb,Cr : are expressing degree of coloration, their values range from [-112 _
114 ].
The conversion between RGB mode and this pattern is done using the
following relationship:

( ) ( )( )

eventually converts images from RGB to YCbCr. During the Treatment of


determination of the skin color Each pixel of the image is classified as either
a skin color or not depending on its components, ie its YCBCr. This
classification is based on the calculation of the mean and incest of each of
the CbCr of the pixel.

33
For 164 faces with in seven images, each of Cb and Cr of each pixel of skin
color, their values are shown in Figure (4_3) and their statistical distribution
is shown in Figure (4_4) (a|) and (b)

Figure (4_3) Cb,Cr values for skin pixels.

34
Figure (4_4) (a) statistical distribution for Cb

Figure (4_4) (b) statistical distribution Cr

35
Figure (4_5) The experimental image

Figure (4_6) The resul

36
37

You might also like