Tracking and Comparing Eye Movements Patterns While Watching Interactive and Non-interactive Videos

被引:1
|
作者
Daita, Ananda Rohit [1 ]
Mai, Bin [2 ]
Namuduri, Kamesh [1 ]
机构
[1] Univ North Texas, Denton, TX 76203 USA
[2] Texas A&M Univ, College Stn, TX 77843 USA
关键词
Video watching; Fixation; Saccade; Eye tracking; Eye movements;
D O I
10.1007/978-3-030-01087-4_22
中图分类号
B84 [心理学];
学科分类号
04 ; 0402 ;
摘要
In this paper, we demonstrate how our eye moments differ when we are watching non-interactive videos (sports clips) versus interactive videos (video games clips). We obtained the eye tracking data from Collaborative Research in Computational Neuroscience's (CRCNS) data sharing set; we analyzed the subsets of eye movement data which were tracked while the test subjects were watching sports clips (videos whose contents are non-interactive) and video game clips (videos whose contents are interactive). We then compare the variations of both x- and y-coordinate eye movements between watching real videos and watching animated videos to identify the difference in eye movement patterns between the cases. Moreover, we also conducted tests on to see if there exists any difference in the distribution of the eye status of fixation or saccade between the cases. Our results provide insights into the cognitive processes when people are watching videos. We also discuss the implications of our results to the various applications in IS field.
引用
收藏
页码:178 / 185
页数:8
相关论文
共 50 条
  • [21] Reusable Non-Interactive Secure Computation
    Chase, Melissa
    Dodis, Yevgeniy
    Ishai, Yuval
    Kraschewski, Daniel
    Liu, Tianren
    Ostrovsky, Rafail
    Vaikuntanathan, Vinod
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III, 2019, 11694 : 462 - 488
  • [22] Signcryption with Non-interactive Non-repudiation
    John Malone-Lee
    [J]. Designs, Codes and Cryptography, 2005, 37 : 81 - 109
  • [23] A non-interactive multiple model tracker
    Alouani, AT
    Gray, JE
    [J]. ACQUISITION, TRACKING, AND POINTING XVII, 2003, 5082 : 65 - 76
  • [24] A Survey of Non-Interactive Key Exchange
    Zhang, Ming-Rui
    Zhang, Rui
    Zhang, Lei
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2024, 47 (03): : 558 - 574
  • [25] Efficient Non-interactive Range Proof
    Yuen, Tsz Hon
    Huang, Qiong
    Mu, Yi
    Susilo, Willy
    Wong, Duncan S.
    Yang, Guomin
    [J]. COMPUTING AND COMBINATORICS, PROCEEDINGS, 2009, 5609 : 138 - +
  • [26] Non-interactive oblivious transfer protocols
    Qin Jing
    Zhao Hua-wei
    Wang Ming-Qiang
    [J]. 2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2009, : 120 - +
  • [27] Non-interactive cryptosystem for entity authentication
    Lee, HW
    Kim, JE
    Kim, TY
    [J]. INFORMATION SECURITY, PROCEEDINGS, 1999, 1729 : 72 - 84
  • [28] Signcryption with non-interactive non-repudiation
    Malone-Lee, J
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2005, 37 (01) : 81 - 109
  • [29] Towards Non-interactive Witness Hiding
    Kuykendall, Benjamin
    Zhandry, Mark
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2020, PT I, 2020, 12550 : 627 - 656
  • [30] Efficient Non-interactive Secure Computation
    Ishai, Yuval
    Kushilevitz, Eyal
    Ostrovsky, Rafail
    Prabhakaran, Manoj
    Sahai, Amit
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 406 - +