{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T00:20:16Z","timestamp":1742948416207,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319255538"},{"type":"electronic","value":"9783319255545"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25554-5_25","type":"book-chapter","created":{"date-parts":[[2015,10,27]],"date-time":"2015-10-27T09:26:50Z","timestamp":1445938010000},"page":"245-254","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Using Video Manipulation to Protect Privacy in Remote Presence Systems"],"prefix":"10.1007","author":[{"given":"Alexander","family":"Hubers","sequence":"first","affiliation":[]},{"given":"Emily","family":"Andrulis","sequence":"additional","affiliation":[]},{"given":"Levi","family":"Scott","sequence":"additional","affiliation":[]},{"given":"Tanner","family":"Stirrat","sequence":"additional","affiliation":[]},{"given":"Ruonan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ross","family":"Sowell","sequence":"additional","affiliation":[]},{"given":"Matthew","family":"Rueben","sequence":"additional","affiliation":[]},{"given":"Cindy M.","family":"Grimm","sequence":"additional","affiliation":[]},{"given":"William D.","family":"Smart","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,28]]},"reference":[{"unstructured":"Beam remote presence system. https:\/\/www.suitabletech.com\/","key":"25_CR1"},{"unstructured":"VGo robotic telepresence for healthcare. http:\/\/www.vgocom.com\/","key":"25_CR2"},{"issue":"3","key":"25_CR3","doi-asserted-by":"publisher","first-page":"24:1","DOI":"10.1145\/1531326.1531330","volume":"28","author":"C Barnes","year":"2009","unstructured":"Barnes, C., Shechtman, E., Finkelstein, A., Goldman, D.B.: Patchmatch: a randomized correspondence algorithm for structural image editing. ACM Trans. Graph. 28(3), 24:1\u201324:11 (2009)","journal-title":"ACM Trans. Graph."},{"doi-asserted-by":"crossref","unstructured":"Boyle, M., Edwards, C., Greenberg, S.: The effects of filtered video on awareness and privacy. In: CSCW 2000, pp. 1\u201310 (2000)","key":"25_CR4","DOI":"10.1145\/358916.358935"},{"doi-asserted-by":"crossref","unstructured":"Boyle, M., Neustaedter, C., Greenberg, S.: Privacy factors in video-based media spaces. In: Media Space 20+ Years of Mediated Life. CSCW, pp. 97\u2013122 (2009)","key":"25_CR5","DOI":"10.1007\/978-1-84882-483-6_7"},{"issue":"2","key":"25_CR6","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/2384556.2384557","volume":"2","author":"A Edgcomb","year":"2012","unstructured":"Edgcomb, A., Vahid, F.: Privacy perception and fall detection accuracy for in-home video assistive monitoring with privacy enhancements. SIGHIT Rec. 2(2), 6\u201315 (2012)","journal-title":"SIGHIT Rec."},{"doi-asserted-by":"crossref","unstructured":"Eisemann, E., Winnem\u00f6ller, H., Hart, J.C., Salesin, D.: Stylized vector art from 3D models with region support. In: EGSR 2008, pp. 1199\u20131207 (2008)","key":"25_CR7","DOI":"10.1111\/j.1467-8659.2008.01258.x"},{"unstructured":"Gerstner, T., DeCarlo, D., Alexa, M., Finkelstein, A., Gingold, Y., Nealen, A.: Pixelated image abstraction. In: NPAR 2012, pp. 29\u201336 (2012)","key":"25_CR8"},{"doi-asserted-by":"crossref","unstructured":"Herling, J., Broll, W.: Pixmix: a real-time approach to high-quality diminished reality. In: ISMAR 2012, pp. 141\u2013150 (2012)","key":"25_CR9","DOI":"10.1109\/ISMAR.2012.6402551"},{"doi-asserted-by":"crossref","unstructured":"Kim, H.H.J., Gutwin, C., Subramanian, S.: The magic window: lessons from a year in the life of a co-present media space. In: GROUP 2007, pp. 107\u2013116 (2007)","key":"25_CR10","DOI":"10.1145\/1316624.1316640"},{"doi-asserted-by":"crossref","unstructured":"Lu, J., Sander, P.V., Finkelstein, A.: Interactive painterly stylization of images, videos and 3D animations. In: I3D 2010, pp. 127\u2013134 (2010)","key":"25_CR11","DOI":"10.1145\/1730804.1730825"},{"unstructured":"Mould, D.: Texture-preserving abstraction. In: NPAR 2012, pp. 75\u201382 (2012)","key":"25_CR12"},{"doi-asserted-by":"crossref","unstructured":"Olsen, S., Gooch, B.: Image simplification and vectorization. In: NPAR 2011, pp. 65\u201374 (2011)","key":"25_CR13","DOI":"10.1145\/2024676.2024687"},{"key":"25_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1007\/978-3-540-89639-5_107","volume-title":"Advances in Visual Computing","author":"Catherine Sauvaget","year":"2008","unstructured":"Sauvaget, Catherine, Boyer, Vincent: Comics stylization from photographs. In: Peters, J\u00f6rg, Remagnino, Paolo, Boyle, Richard, Porikli, Fatih, Koracin, Darko, Parvin, Bahram, Klosowski, James, Arns, Laura, Chun, Yu Ka, Rhyne, Theresa-Marie, Monroe, Laura, Bebis, George (eds.) ISVC 2008, Part I. LNCS, vol. 5358, pp. 1125\u20131134. Springer, Heidelberg (2008)"},{"doi-asserted-by":"crossref","unstructured":"Schiff, J., Meingast, M., Mulligan, D., Sastry, S., Goldberg, K.: Respectful cameras: detecting visual markers in real-time to address privacy concerns. In: IROS 2007, pp. 971\u2013978 (2007)","key":"25_CR15","DOI":"10.1109\/IROS.2007.4399122"},{"unstructured":"Singh, M., Schaefer, S.: Suggestive hatching. In: Computational Aesthetics 2010, pp. 25\u201332 (2010)","key":"25_CR16"},{"issue":"2","key":"25_CR17","doi-asserted-by":"publisher","first-page":"99","DOI":"10.2307\/3001913","volume":"5","author":"J Tukey","year":"1949","unstructured":"Tukey, J.: Comparing individual means in the analysis of variance. Biometrics 5(2), 99\u2013114 (1949)","journal-title":"Biometrics"},{"issue":"6","key":"25_CR18","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1016\/j.cag.2012.03.004","volume":"36","author":"H Winnem\u00f6ller","year":"2012","unstructured":"Winnem\u00f6ller, H., Kyprianidis, J.E., Olsen, S.C.: Special section on cans: XDoG: an extended difference-of-gaussians compendium including advanced image stylization. Comput. Graph. 36(6), 740\u2013753 (2012)","journal-title":"Comput. Graph."}],"container-title":["Lecture Notes in Computer Science","Social Robotics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25554-5_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,6]],"date-time":"2023-11-06T18:04:47Z","timestamp":1699293887000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-25554-5_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319255538","9783319255545"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25554-5_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"28 October 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICSR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Social Robotics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2015","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 October 2015","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2015","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"socrob2015","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}