Abstract:
In accordance with embodiments of the present disclosure, an information handling system may include a processor and a non-transitory computer-readable medium embodying a program of instructions. The program of instructions may be configured to, when read and executed by the processor, receive a visible-light image from a visible-light sensor, receive an infrared image from an active infrared sensor, and compare the visible-light image to the infrared image to determine shadow regions of the visible-light image having shadows.
Abstract:
In accordance with embodiments of the present disclosure, a method for managing a mute state of a participant in a teleconference may include detecting, based on analysis of at least one characteristic of audio data received from a microphone associated with the participant or image data received from a camera associated with the participant, whether the participant is attempting to speak to other teleconference participants. The method may also include providing an alert to the participant in response to a detecting that the participant is attempting to speak to other conference participants while the microphone is muted.
Abstract:
In accordance with embodiments of the present disclosure, a method for managing a mute state of a participant in a teleconference may include detecting, based on analysis of at least one characteristic of audio data received from a microphone associated with the participant or image data received from a camera associated with the participant, whether the participant is attempting to speak to other teleconference participants. The method may also include providing an alert to the participant in response to a detecting that the participant is attempting to speak to other conference participants while the microphone is muted.
Abstract:
In accordance with embodiments of the present disclosure, a method for managing a mute state of a participant in a teleconference may include detecting, based on analysis of at least one characteristic of audio data received from a microphone associated with the participant or image data received from a camera associated with the participant, whether the participant is attempting to speak to other teleconference participants. The method may also include providing an alert to the participant in response to a detecting that the participant is attempting to speak to other conference participants while the microphone is muted.
Abstract:
Context captured with sensors of an information handling system is applied to selectively lock access to currently unlocked information, with conditions for locking access based upon the context. Nervous states enforce locking of selected information based upon the confidence of the security of the information under sensed external conditions. Increased sensitivity for locking access includes reduced timeouts to a lock command, increased response to sensed conditions, and more rapid response where unlocked access is to sensitive information.
Abstract:
In accordance with embodiments of the present disclosure, an information handling system may include a processor and a non-transitory computer-readable medium embodying a program of instructions. The program of instructions may be configured to, when read and executed by the processor, receive a visible-light image from a visible-light sensor, receive an infrared image from an active infrared sensor, and compare the visible-light image to the infrared image to determine shadow regions of the visible-light image having shadows.
Abstract:
A system, method, and computer-readable medium for performing a selective video manipulation operation for privacy enhancement. More specifically, the selective video manipulation operation detects video transmission protected regions in a scene and applies effects to these regions before transmitting a modified video stream which presents a selectively modified scene. In certain embodiments, the video transmission protected regions include potentially sensitive or distracting regions in the scene. In certain embodiments the selective video manipulation operation automatically detects video transmission protected regions which may be located in at least one of the background of the scene or the foreground attic scene and applies user-configurable effects to the identified regions.
Abstract:
Systems and methods for adapting a display based on input from an iris camera are disclosed. The method includes receiving an image captured by an iris camera, processing the image to determine a status of an eye of a user of a display, determining whether the user eye comfort is adequate based on the status of the eye of the user, and in response to determining that the user eye comfort is not adequate, adjusting a setting of the display.
Abstract:
Methods and systems for user interaction with information handling systems include using a physical object as a virtual input device. The virtual input device may be manipulated by a user to provide user input to an information handling system. The physical object may be identified and tracked using an image acquisition device. Different types of physical objects may be manipulated by the user to define gestures that are interpreted as user input.
Abstract:
Context captured with sensors of an information handling system is applied to selectively lock access to currently unlocked information, with conditions for locking access based upon the context. Nervous states enforce locking of selected information based upon the confidence of the security of the information under sensed external conditions. Increased sensitivity for locking access includes reduced timeouts to a lock command, increased response to sensed conditions, and more rapid response where unlocked access is to sensitive information.