PS3 Eye As A Webcam On Windows

The NUI Group has been working hard to bring the PS3 Eye to windows.  From the factory, this device has pretty impressive specs, but no windows drivers.  After a bit of hacking, they’ve developed a driver for it and released it on their forums.  The main reason they are so interested in it is that it can capture full frame at 60 frames per second, making it perfect for multi touch sensing.  Now that they’ve got it working with windows, they’re working on a custom PS3 Eye filter for touchlib.

[via PS3 Fanboy, thanks vor]

Webcam Laser Rangefinder


This has been around for a while, but I thought it deserved some attention. [Todd] used a laser pointer, a webcam, some trig and (sigh) some windows development tools to create his own laser range finder. Given the position of the beam strike and that the camera is located at a right angle to the laser, calculating the distance is pretty simple. This could be handy if you’re building a bot for defcon…

Laser 3d Scanning With A Webcam


[Jan] noted that they’ve come up with an interesting, low cost method of 3d scanning over (Update: http://www.david-laserscanner.com/wiki) at the Institute for Robotics and Process Control. Once the software is calibrated with the preset background image, a laser line is run over the object (Just think about every sci-fi laser scanner you’ve ever seen) The software appears to measure the contour of the object by the breaks in the line as it’s passed over the object. Once a mesh of measurements is taken, the object can be reconstructed in the software. According to [Jan] “With Their technique they won the Main Prize of the “work group for Pattern recognition” this Year in Berlin.” Now, make it work under something besides windows and .NET.

Get your Design Challenge entries in! The 25th is rolling up on us quick!

Make An Infrared Webcam

IR webcam hack

First off — don’t go getting all Silence of the lambs on us, aight? But if you’ve got some legitimate, non-creepy reason you want to record video in infrared, Geoff Johnson’s gonna show you how to do it. He’s gutting a fairly generic USB camera made by Sweex, and is careful to note which steps are Sweex-specific and which are not. You should be able to get this working with any ol’ USB cam you’ve got lying around with possible slight modifications.

Keeping Tabs On An Undergraduate Projects Lab’s Door Status

Over at the University of Wisconsin’s Undergraduate Projects Lab (UPL) there’s been a way to check whether this room is open for general use by CS undergraduates and others practically for most of the decades that it has existed. Most recently [Andrew Moses] gave improving on the then latest, machine vision-based iteration a shot. Starting off with a historical retrospective, the 1990s version saw a $15 camera combined with a Mac IIcx running a video grabber, an FTP server and an HP workstation that’d try to fetch the latest FTP image.

As the accuracy of this system means the difference between standing all forlorn in front of a closed UPL door and happily waddling into the room to work on some projects, it’s obvious that any new system had to be as robust as possible. The machine vision based version that got installed previously seemed fancy: it used a Logitech C920 webcam, a YOLOv7 MV model to count humanoids and a tie into Discord to report the results. The problem here was that this would sometimes count items like chairs as people, and there was the slight issue that people in the room didn’t equate an open door, as the room may be used for a meeting.

Thus the solution was changed to keeping track of whether the door was open, using a sensor on the two doors into the room. Sadly, the captive-portal-and-login-based WiFi made the straightforward approach with a reed sensor, a magnet and an ESP32 too much of a liability. Instead the sensor would have to communicate with a device in the room that’d be easier to be updated, ergo a Zigbee-using door sensor, Raspberry Pi with Zigbee dongle and Home Assistant (HA) was used.

One last wrinkle was the need to use a Cloudflare-based tunnel add-on to expose the HA API from the outside, but now at long last the UPL door status can be checked with absolute certainty that it is correct. Probably.

Featured image: The machine vision-based room occupancy system at UoW’s UPL. (Credit: UPL, University of Wisconsin)

Building A Sound Camera For Under $400

[Benn Jordan] had an idea. He’d heard of motion amplification technology, where cameras are used to capture tiny vibrations in machinery and then visually amplify it for engineering analysis. This is typically the preserve of high-end industrial equipment, but [Benn] wondered if it really had to be this way. Armed with a modern 4K smartphone camera and the right analysis techniques, could he visually capture sound?

The video first explores commercially available “acoustic cameras” which are primarily sold business-to-business at incredibly high prices. However, [Benn] suspected he could build something similar on the cheap. He started out with a 16-channel microphone that streams over USB for just $275, sourced from MiniDSP, and paired it  with a Raspberry Pi 5 running the acoular framework for acoustic beamforming. Acoular analyses multichannel audio and visualizes them so you can locate sound sources. He added a 1080p camera, and soon enough, was able to overlay sound location data over the video stream. He was able to locate a hawk in a tree using this technique, which was pretty cool, and the total rig came in somewhere under $400.

The rest of the video covers other sound-camera techniques—vibration detection, the aforementioned motion amplification, and some neat biometric techniques. It turns out your webcam can probably detect your heart rate, for example.

It’s a great video that illuminates just what you can achieve with modern sound and video capture. Think SIGGRAPH-level stuff, but in a form you can digest over your lunchbreak. Video after the break.

Continue reading “Building A Sound Camera For Under $400”

This Week In Security: Malicious Rollback, WHOIS, And More

It’s time to talk about Microsoft’s patch Tuesday, and the odd vulnerability rollback that happened. CVE-2024-43491 has caught some attention, as it’s a 9.8 on the CVSS scale, is under active exploitation, and results in Remote Code Execution (RCE). Yikes, it sounds terrible!

First off, what actually happened? The official statement is that “build version numbers crossed into a range that triggered a code defect”. We don’t know the exact details, but it’s something like an unsigned integer that was interpreted as a signed integer. A build number could have rolled over 32767, and what was intended to be 32768 or higher suddenly became −32767. Lots of “if greater than or equal” logic breaks down in that situation. Because of a logic flaw like this, certain versions of Windows 10 were unintentionally opting out of some historical security fixes.

And that’s where the high CVSS score and active exploitation descriptor comes from. This is simply the highest score of the resurgent flaws, and an acknowledgement that they have been exploited in the past. The good news is that this only applies to Windows 10 build 1507, so either the original install without any of the major updates installed, or one of the Windows 10 Enterprise Long-Term Servicing Branch (LTSB) versions. It seems that the March 2024 monthly security update introduced the problem, and it wasn’t fixed until this month’s updates. Continue reading “This Week In Security: Malicious Rollback, WHOIS, And More”