Video Manipulation Techniques for the Protection of Privacy in Remote Presence Systems

Jan 13, 2015
Figure 1 for Video Manipulation Techniques for the Protection of Privacy in Remote Presence Systems
Figure 2 for Video Manipulation Techniques for the Protection of Privacy in Remote Presence Systems
Figure 3 for Video Manipulation Techniques for the Protection of Privacy in Remote Presence Systems
Figure 4 for Video Manipulation Techniques for the Protection of Privacy in Remote Presence Systems

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: