Author of the publication

A survey of diminished reality: Techniques for visually concealing, eliminating, and seeing through real objects.

, , and . IPSJ Trans. Comput. Vis. Appl., (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Panoramic Movie Generation Using an Omnidirectional Multi-camera System for Telepresence., , and . SCIA, volume 2749 of Lecture Notes in Computer Science, page 1074-1081. Springer, (2003)Super-Resolved Video Mosaicing for Documents Based on Extrinsic Camera Parameter Estimation., , , , , and . ACCV (2), volume 3852 of Lecture Notes in Computer Science, page 101-110. Springer, (2006)Super-resolved Video Mosaicing for Documents by extrinsic Camera parameter estimation., , , , , and . ICCVG, volume 32 of Computational Imaging and Vision, page 327-336. Springer, (2004)Web-Based Telepresence System Using Omni-directional Video Streams., , , , , , , and . PCM (3), volume 3333 of Lecture Notes in Computer Science, page 45-52. Springer, (2004)Construction of Feature Landmark Database Using Omnidirectional Videos and GPS Positions., , , and . 3DIM, page 249-256. IEEE Computer Society, (2007)Workshop on Highly Diverse Cameras and Displays for Mixed and Augmented Reality (HDCD4MAR) Summary., , and . ISMAR Adjunct, page 326. IEEE Computer Society, (2017)Background Image Registration as a Post-Processing Technique in Diminished Reality Rendering Procedures., , , , , and . ISMAR Adjunct, page 200-201. IEEE Computer Society, (2017)Selective Voltage Application to Connected Loads Using Soft Matter Computer Based on Conductive Droplet Interval Design., , , , , and . IEEE Robotics Autom. Lett., 8 (3): 1747-1754 (March 2023)Procams-Based Cybernetics., , , and . CoRR, (2015)Attack on PPG Biometrics: Presentation Attack by Stealth Recording and Waveform Estimation., , , , and . EMBC, page 64-67. IEEE, (2021)