Step in a booth to put your 3D image on the net

July 21, 1999

A digital photo booth that allows people to create three-dimensional computer images of themselves will be launched at a digital imaging convention in Los Angeles next month. The idea is to let you send a computerised 3D version of yourself-animated if you wish-into Internet chat rooms or networked computer games, to show users who they are dealing with.

At present, you can pretend to be anyone, of either sex. But by using the new technique to help build realistic computer models-known as avatars-you should be able to give other users a clearer impression of who you are, says Adrian Hilton, who developed the technology at the University of Surrey. Besides enabling people to recognise one another on the Internet, they could be used to personalise an e-mail, a computer game or a website.

Already one company is developing a service based on the technology, and is planning to make booths available in the near future. They should be as easy to use as an ordinary photo booth, says Hilton, with four digital photos taken of the person's front, back and sides-full-length, clothing and all. The subject is spared the usual five-minute wait, because their 3D model is transferred electronically to a secure website from which it can be downloaded later.

The avatar is generated by mapping the four images onto four 2D templates of a human outline. The templates, which come from a generic 3D model of a person, are stretched or squeezed by the program to fit the shape of the person and then recombined into a 3D "wire-mesh" model with movable joints. Colour is added by comparing the colour of each photo at every point on the model and filling in the relevant section on the avatar. Animation software can then be harnessed to make the model move.

Hilton believes that the avatars could be useful as a form of identification on the Internet. "If you want to be recognised as yourself then these avatars are very good," he says. But he concedes that it would be far from foolproof, because someone could steal your avatar and use it for their own ends.

Phil Jones, an assistant registrar at Britain's Office of the Data Protection Registrar, says there is no obvious protection in British law against someone acquiring and misusing another person's image. "For that reason people need to be careful about making it available," he warns.

One drawback of the technique is that in mapping the photos onto the templates the program uses the person's crotch and armpits as landmarks. The unfortunate consequence of this, says Hilton, is that if they are wearing a skirt it assumes that the hem is their crotch and gives them extremely short legs with knee joints in their ankles. "We're working on this," he says.
Author: Duncan Graham-Rowe
New Scientist issue 24th July


New Scientist

Related Internet Articles from Brightsurf:

Towards an unhackable quantum internet
Harvard and MIT researchers have found a way to correct for signal loss with a prototype quantum node that can catch, store and entangle bits of quantum information.

Swimming toward an 'internet of health'?
In recent years, the seemingly inevitable 'internet of things' has attracted considerable attention: the idea that in the future, everything in the physical world -- machines, objects, people -- will be connected to the internet.

Everything will connect to the internet someday, and this biobattery could help
In the future, small paper and plastic devices will be able to connect to the internet for a short duration, providing information on everything from healthcare to consumer products, before they are thrown away.

Your body is your internet -- and now it can't be hacked
Purdue University engineers have tightened security on the 'internet of body.' Now, the network you didn't know you had is only accessible by you and your devices, thanks to technology that keeps communication signals within the body itself.

What's next for smart homes: An 'Internet of Ears?'
A pair of electrical engineering and computer science professors in Cleveland, Ohio, have been experimenting with a new suite of smart-home sensors.

Child-proofing the Internet of Things
As many other current, and potentially future, devices can connect to the Internet researchers are keen to learn more about how so called IoT devices could affect the privacy and security of young people.

Quantum internet goes hybrid
ICFO researchers report the first demonstration of an elementary link of a hybrid quantum information network, using a cold atomic cloud and a doped crystal as quantum nodes as well as single telecom photons as information carriers.

Connecting up the quantum internet
Major leap for practical building blocks of a quantum internet: Published in Nature Physics, new research from an Australian team demonstrates how to dramatically improve the storage time of a telecom-compatible quantum memory, a vital component of a global quantum network.

Internet searches for suicide after '13 Reasons Why'
Internet searches about suicide were higher than expected after the release of the Netflix series '13 Reasons Why' about the suicide of a fictional teen that graphically shows the suicide in its finale, according to a new research letter published by JAMA Internal Medicine.

Weaponizing the internet for terrorism
Writing in the International Journal of Collaborative Intelligence, researchers from Nigeria suggest that botnets and cyber attacks could interfere with infrastructure, healthcare, transportation, and power supply to as devastating an effect as the detonation of explosives of the firing of guns.

Read More: Internet News and Internet Current Events is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to