Privacy camera

ABSTRACT

A privacy camera, such as a light field camera that includes an array of cameras or an RGBZ camera(s)) is used to capture images and display images according to a selected privacy mode. The privacy mode may include a blur background mode and a background replacement mode and can be automatically selected based on the meeting type, participants, location, and device type. A region of interest and/or an object(s) of interest (e.g. one or more persons in a foreground) is determined and the privacy camera is configured to clearly show the region/object of interest and obscure or replace the background according to the selected privacy mode. The displayed image includes the region/object(s) of interest clearly shown (e.g. in focus) and any objects in a background of the combined image shown having a limited depth of field (e.g. blurry/not in focus) and/or the background replaced with another image and/or fill.

BACKGROUND

Video conferencing is becoming more popular both at home and at work.Many users, however, may not wish to have their background in a sharedwork or home environment clearly visible to other participants. Forexample, the background may be messy, distracting include confidentialinformation, and the like. While some video conferencing systems may usea background replacement (e.g. green screen/static background) orinclude a blurring capability, these methods may be difficult toimplement (e.g., require a green screen) or may adversely impact adisplay of content in a scene (e.g., have significant image artifacts).

SUMMARY

This Summary is provided to introduce a selection of concepts in asimplified form that are further described below in the DetailedDescription. This Summary is not intended to identify key features oressential features of the claimed subject matter, nor is it intended tobe used as an aid in determining the scope of the claimed subjectmatter.

A privacy camera, such as a light field camera that includes an array ofcameras or an RGBZ (RGB+depth) camera(s)) is used to capture images anddisplay images according to a selected privacy mode. The privacy modemay include a blur background mode and a background replacement mode. Aregion of interest and/or an object(s) of interest (e.g. one or morepersons in a foreground) is determined and the privacy camera isconfigured (e.g. depending on the type of camera) to clearly show theregion/object of interest and the background according to the selectedprivacy mode. The displayed image includes the region/object(s) ofinterest clearly shown (e.g. in focus) and any objects in a backgroundof the combined image shown having a limited depth of field (e.g.blurry/not in focus) and/or the background replaced with another imageand/or fill. The privacy camera may also be used to determine a depthestimate for object in a scene.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 shows a system for using a privacy camera;

FIG. 2 shows an exemplary arrangement of an array of cameras used in alight field camera;

FIGS. 3A and 3B illustrates exemplary displays showing a non-privacymode and a privacy mode;

FIGS. 4 and 5 shows illustrative processes for using a camera device tocreate a privacy mode;

FIG. 6 illustrates a video conferencing system using a privacy camera;

FIG. 7 shows a networked environment where embodiments may beimplemented;

FIG. 8 illustrates an exemplary system for a privacy camera; and

FIGS. 9-11 and the associated descriptions provide a discussion of avariety of operating environments in which embodiments of the inventionmay be practiced.

DETAILED DESCRIPTION

Referring now to the drawings, in which like numerals represent likeelements, various embodiment will be described.

FIG. 1 shows a system for using a privacy camera. As illustrated, system100 includes application program 110, camera manager 26 and touch screeninput device/display 110 including a privacy camera 120.

In order to facilitate communication with the camera manager 26, one ormore callback routines, may be implemented. According to one embodiment,application program 110 is a video conferencing application, such asMICROSOFT LYNC. The application program may be other programs thatutilize an imaging feature using a privacy mode. As illustrated,application program 110 is configured to receive input from atouch-sensitive input device 110 and/or other input devices. Forexample, voice input, keyboard input (e.g. a physical keyboard and/orSIP), video based input, and the like. For example, camera manager 26may provide information to application 110 in response to a user'sgesture selecting a user interface element, selecting a region/object ofinterest, interacting with content and other touch based gestures. Forexample, gestures may include, but are not limited to: a pinch gesture;a stretch gesture; a select gesture (e.g. a tap action on a displayedelement); a select and hold gesture (e.g. a tap and hold gesturereceived on a displayed element); a swiping action and/or draggingaction; and the like.

System 100 as illustrated comprises a touch screen input device/display110 that detects when a touch input has been received (e.g. a fingertouching or nearly teaching the touch screen). Any type of touch screenmay be utilized that detects a user's touch input. For example, thetouch screen may include one or more layers of capacitive material thatdetects the touch input. Other sensors may be used in addition to or inplace of the capacitive material. For example, Infrared (IR) sensors maybe used. According to an embodiment, the touch screen is configured todetect objects that in contact with or above a touchable surface.Although the term “above” is used in this description, it should beunderstood that the orientation of the touch panel system is irrelevant.The term “above” is intended to be applicable to all such orientations.The touch screen may be configured to determine locations of where touchinput is received (e.g. a starting point, intermediate points and anending point). Actual contact between the touchable surface and theobject may be detected by any suitable means, including, for example, bya vibration sensor or microphone coupled to the touch panel. Anon-exhaustive list of examples for sensors to detect contact includespressure-based mechanisms, micro-machined accelerometers, piezoelectricdevices, capacitive sensors, resistive sensors, inductive sensors, laservibrometers, and LED vibrometers.

Privacy camera 120 is configured to record images and includes a privacymode that displays a region/object(s) of interest in focus and otherobjects, such as objects in a background, not in focus (e.g. blurred)and/or the background replaced with an image/fill. According to anembodiment, privacy camera 120 is a light field (plenoptic) camera thatuses a microlens array of cameras (e.g. 3×2, 3×3, . . . ) to capture a4D light field of a scene (See FIG. 2 for exemplary arrays of cameras).Privacy camera 120 may also be implemented using othersensors/camera(s). For example, privacy camera 120 may be an RGBZ camera(a single sensor RGBZ, a two sensor RGB+depth such as MICROSOFT KINECT,and the like). According to an embodiment, camera manager 26 rectifiesthe images obtained from the different cameras of the light field cameraand determines a region/object of interest (e.g. one or more persons ina foreground). Camera manager 26 then configures the privacy camera 120to have a limited depth of field that includes the detectedregion/object(s) of interest. According to an embodiment, afterconfiguring privacy camera 120, a viewable area 152 is created in whichobject(s) that are within the viewable area are shown clearly (e.g.video participant 121) and object that are within the unviewable area154 are shown out of focus due to a limited depth of field (e.g. blurry)such as whiteboard 122 that is shown behind the video participant 121.According to another embodiment, the background may be replaced with animage (e.g. user selected and/or predetermined and/or a fill (e.g. anaverage of the background). Camera manager 26 combines the images fromthe different cameras to create a single image that includes the objectsof interest clearly shown (e.g. in focus) and any objects in abackground shown blurry (e.g. not in focus) and/or the backgroundreplaced with the fill/image. When multiple cameras are used, theobjects in the background appear blurred due to the distance between thedifferent camera sensors. Instead of attempting to use backgroundsegmentation to blur the background, the combination of the differentimages obtained from the light field camera creates the blurring effect.Generally, the more cameras that are included in the light field, themore the objects in the unviewable area 150 (e.g. the background) appearblurred (See FIG. 3). The privacy camera 120 may also be used by thecamera manager to determine a depth estimate for object in a scene. Forexample, a pair of the cameras in the light field may be used todetermine a depth estimate. Another distance measuring device may beused to determine the depth estimate (e.g. measures time of flight). Thelight camera also provides a better signal to noise ratio (SNR) ascompared to a single camera used by a computing device such as typicallyincluded on a slate device, a mobile phone, a desktop computer and thelike. The bandwidth used may also be reduced due to the background blurand/or background replacement. According to an embodiment, a user mayselect different privacy modes using a user interface element (e.g.buttons, slider) to change an amount of detail shown in the backgroundand/or select the fill/image used in the display of the background. Moredetails are provided below.

FIG. 2 shows an exemplary arrangement of an array of cameras used in alight field camera. As illustrated, FIG. 2 shows array 210, array 220,array 240 and array 250.

According to an embodiment, the cameras are OV7690 VGA image sensorsfrom OMNIVISION having an optical format of 1/13 inch that are eachsized 2.5×2.5×2.5 mm Other cameras may be used. For example, a 720 pcamera such as the OMNIVISION OVM2722 that are each sized 4.0×3.0×2.5 mmmay also be used. Generally, the cameras are selected based on a desiredresolution, size, and price point. A Bayer filter may be used and/orsome other filter (e.g. mix of R, G, B, W). The array of cameras fitinto a small area and may be disposed within a frame of today's commonelectronic computing devices (e.g. notebooks, tablets, phones, desktopwebcams, and the like). Further, these different cameras are typicallyinexpensive.

Array 210 shows a 3×2 array of six cameras (211-216) disposed on a base.According to an embodiment, the base used by the different arrays isless than 30 mm×30 mm such that it may be easily incorporated into amobile computing device. According to an embodiment, the six cameras arearranged in an array having a total width of approximately 20 mm fromthe center of camera 211 to the center of camera 213 and a height ofapproximately 10 mm from the center of camera 211 to the center ofcamera 214. Array 210 may be configured for small portable electronicdevices such as notebooks, tablets and/or phones.

Array 220 shows a 3×3 array of six cameras (241-249). According to anembodiment, the nine cameras are arranged in an array having a totalwidth of approximately 20 mm from the center of camera 241 to the centerof camera 243 and a height of approximately 20 mm from the center ofcamera 241 to the center of camera 247. According to an embodiment,array 220 may be configured for a slightly larger electronic device suchas a desktop webcam.

Array 230 shows a 5×3 array of six cameras (221-235). According to anembodiment, the fifteen cameras are arranged in an array having a totalwidth of approximately 30 mm from the center of camera 221 to the centerof camera 225 and a height of approximately 20 mm from the center ofcamera 221 to the center of camera 231.

Array 230 shows a N×N array of cameras (1-N). According to anembodiment, the cameras are arranged in an array based on a desiredwidth and height for the cameras.

Each camera in the arrays is configured to provide an image to cameramanager 26. Since multiple cameras are included within an array, afailure rate of pixels within one or more of the cameras may becompensated for based on the other cameras in the array. One or more ofthe cameras may also fail within the array while still providing aprivacy mode.

FIG. 3A and FIG. 3B illustrates exemplary displays showing a non-privacymode and a privacy mode. As illustrated, FIG. 3A includes display 300,display 310 and display 320.

Display 300 shows an exemplary display showing an image of a scenewithout having the privacy mode active for a camera. As can be seen,each of the objects in the scene is clearly visible and legible.

Display 310 shows an exemplary scene displayed using a privacy mode. Ascan be seen the objects in the background (311, 312) are not shown infocus (e.g. blurred) due to the limited depth of field as compared tothe object of interest (video participant).

Display 320 shows an exemplary scene displayed using a privacy mode. Ascan be seen the objects in the background (321, 322) are shown not infocus as compared to the object of interest (video participant). Thebackground objects in display 320 appear more blurred as compared to thebackground objects in display 310. Using a larger array of cameras in aprivacy camera and/or having a different spacing of the cameras in thearray may be used to produce a larger blurring effect.

FIG. 3B shows replacing the background with a fill and an image. Asillustrated, FIG. 3B includes display 330 and display 340.

Display 330 shows an exemplary scene displayed using a privacy mode withthe background shown with a fill 335. As can be seen, the objects in thebackground (e.g. see 311, 312 in Display 310) are covered by the fill335 while leaving the object of interest (video participant) clearlyshown. According to an embodiment, fill 335 is an average of thebackground objects. Other fill/fill patterns may be used. For example, apredefined and/or user selected fill patterns may be selected (e.g.automatically/manually).

Display 340 shows an exemplary scene displayed using a privacy mode withthe background replaced with a background image 345. As can be seen, theobjects in the background (e.g. see 311, 312 in Display 310) are coveredby the background image 345 while leaving the object of interest (videoparticipant) clearly shown. Background image 345 may be determinedautomatically/manually. For example, a user may select a backgroundimage 345. Different background images and/or fills may be used. Forexample, a background image of Paris may be used for a video conferencewith a family member, a solid background may be selected for securebusiness meetings, and/or a background blur may be used for less securebusiness meetings.

FIGS. 4 and 5 show illustrative processes 400 and 500 for using a cameradevice to create a privacy mode. When reading the discussion of theroutines presented herein, it should be appreciated that the logicaloperations of various embodiments are implemented (1) as a sequence ofcomputer implemented acts or program modules running on a computingsystem and/or (2) as interconnected machine logic circuits or circuitmodules within the computing system. The implementation is a matter ofchoice dependent on the performance requirements of the computing systemimplementing the invention. Accordingly, the logical operationsillustrated and making up the embodiments described herein are referredto variously as operations, structural devices, acts or modules. Theseoperations, structural devices, acts and modules may be implemented insoftware, in firmware, in special purpose digital logic, and anycombination thereof.

FIG. 4 shows an example of using a privacy camera using differentprivacy modes in a video conference.

After a start operation, the process moves to operation 410, where thepeople in the view are detected. For example, the depth of the peoplefrom the privacy camera may be determined, the orientation of their facemay be determined, and the like. According to an embodiment, each userthat is within a predetermined area (e.g. one or more persons within apredetermined distance of the privacy camera) and are participating inthe video conference are determined.

Flowing to decision operation 420, a privacy mode is determined. Theprivacy mode may: blur the background; replace the background; or be off(e.g. no blurring or background replacement). The privacy mode may bedetermined manually/automatically. Different information may be used indetermining the privacy mode selected. User privacy preferences 412 mayinclude different preferences for one or more uses that define when toselect a privacy mode and what image/fill to select when the privacymode is set to background replacement. Call information 414 (e.g.attendees, call location, device type) may also be used in determiningthe privacy mode. For example, preferences 412 and/or call information414 may specify that for: intra-company intra-group meetings use privacymode M1; intra-company inter-group meetings use mode M2; inter-companymeetings use mode M3; meetings with person X use mode M4; meetings frommy smart phone use mode M5; personal calls from home use mode M6; andthe like. According to an embodiment, each privacy mode can have customblur settings and backgrounds (e.g., Paris for family member, solidbackground for secure business meetings, background blur for less securebusiness meetings, hatched background for business group meetings, . . .).

When the privacy mode determined is background replacement, the processmoves to operation 430, where the min/max foreground depth is determinedand the background is replaced with an image and/or fill. For example,the foreground depths (min, max) may be determined automatically bydetecting the person(s) participating in the video conference and/ormanually by receiving the selections from a user. According to anembodiment, for background replacement the foreground/backgroundsegmentation is set dynamically based on number people in the field ofview (FOV) and their respective depths using face detectors/persontrackers and depth estimates. The determined background image/fill isused to replace the background that is not determined to be in theforeground.

When the privacy mode determined is background blur, the process movesto operation 440. After determining the foreground, the background isblurred. The background may be blurred different amounts (e.g. somewhatblurred to very blurred). According to an embodiment, when backgroundblur is the privacy mode, the Depth of Field (DOF) is set dynamicallybased on the number of people in the FOV and their respective depthsusing face detectors/person trackers and depth estimates. The backgroundblur and background replacement are performed differently by differenttypes of privacy cameras. For example, light field cameras do not usedepth for background blur but use depth information for backgroundreplacement whereas RGB+depth cameras use depth for background blur andfor background replacement.

FIG. 5 shows another process for using a privacy camera.

After a start operation, the process moves to operation 510, whereimages are received. According to an embodiment, the images are receivedfrom a light field (plenoptic) camera that uses a microlens array ofcameras (e.g. 3×2, 3×3, . . . ) to capture a 4D light field of a scene.The cameras may be used for single image applications and/or multipleimage applications (e.g. video conferencing). According to anembodiment, the cameras are low-cost and small such that the array ofcameras may be included with a mobile personal computing device (e.g.notebook, slate, phone, . . . ).

Flowing to operation 520, the images are rectified to transform theobtained images to a common image to account for the spatialrelationship of the cameras.

Moving to operation 530, one or more region/objects of interest aredetermined. For example, in a video conferencing application, a videoconference participant is typically the object of interest. Generally,the region/object of interest is an object determined to have thecameras focused on. The region/object of interest may be determinedautomatically/manually. For example, a face detection and faceorientation method may be used to automatically detect an object ofinterest (e.g. a person). A user may also select an object in an imageto focus on (e.g. touch and/or some other input method).

Transitioning to operation 540, the privacy camera is refocused whendetermined. For example, when the privacy camera is a light camera, thenno refocusing is conducted. When the privacy camera is an RGB+depthcamera (or some similar camera) then the camera(s) are refocused tofocus on the determined region/object of interest.

Flowing to operation 550, the images are obtained.

Moving to operation 560, a combined image is created from the obtainedimages. The combined image creates a single image that clearly shows theobject of interest (and other objects having a same focal length) withthe objects not in focus shown blurry and/or replaced with afill/background. The blur effect may be automatically created by thecombination of the images from the cameras arranged in the array.Generally, changing a number of cameras in the array and/or changing thespatial relationship of the cameras changes the amount of blur in thecombined image (e.g. more cameras usually creates more blur for objectsnot focused on).

Transitioning to operation 570, the image is displayed. According to anembodiment, the images are displayed in a video conferencingapplication.

The process then moves to an end operation and returns to processingother actions.

FIG. 6 illustrates a video conferencing system 600 using a privacycamera.

In a video capture system, one or more cameras 652 capture video imagesof participants in a video conference. Cameras 652 may be incorporatedwith a display 654 for showing a video signal, such as one or moreincoming video feeds. According to an embodiment, at least one of thecameras is a light field camera that includes at least six camerasarranged in an array. A video conference managing module 650 may be usedto manage the display and receipt/transmission of video images and mayinclude the functionality of camera manager 26 as described herein. Forexample, module 650 may be used to select incoming video feeds. Module650 may also be used to perform video processing on theincoming/outgoing video. For example, module 650 may be used to improveimage quality such as enhancing a person or region of interest throughadjustment of exposure and/or gain for that portion of the video frame.The sound source localization, multi-person, and active speakerdetectors 642, 644, 646 use audio and/or visual cues to select a regionof interest and/or an object of interest. Sound source localizationdetector 642 uses audio features such as sound detection from multiplemicrophones to detect the location of the speaker among multiple people.The multi-person detector 644 uses motion and image features (such ascontours of a person, facial recognition, etc.) to determine thespeaker. The active speaker detector 646 uses sound source localization,motion, and image features to detect the current speaker. Module 650 maydetermine to highlight a video display of an incoming feed on display654 more often when the video feed shows the speaker. For example, thevideo feed of the speaker may be displayed larger on display 654 thenthe display of the other incoming feeds. The incoming video feeds may beshown one after another, layered, in a pattern, and the like, on display654. According to one embodiment, the feeds to show on display 654 maybe selected. Module 650 may be implemented as hardware, software, or acombination of the two.

FIG. 7 shows a networked environment where embodiments may beimplemented. One or more of the locations participating in the videoconference may include a camera device as described above (e.g. 120).

Such a system may comprise any topology of servers, clients, Internetservice providers, and communication media. Also, the system may have astatic or dynamic topology. While a networked system implementingembodiments may involve many more components, relevant ones arediscussed in conjunction with this figure.

Video conferencing applications may be executed and video rendered indevices 781-784. One or more of the devices may include a light fieldcamera, and/or RGB+depth (structured light, stereo, time of flight)camera as described herein to create the privacy mode. According toanother embodiment, a privacy mode may be created using a single camerathat has an f/# less than or equal to about 1. For example, a 1080 pwebcam may include a lens with f/#<=1, an electromechanically adjustableaperture, an electromechanically adjustable focus and a VFOV=60° (e.g.to capture body gestures). The camera may also include a range finder(e.g. ultrasonic). A lens with a low f/# has a small depth of field(DOF). The DOF can be adjusted using an aperture such that the cameracan have a “normal mode” with a large DOF, and a “privacy mode” with asmall DOF. Using the privacy mode (e.g. f/#<=1) increases the SNR sincea lens with a smaller f/# gets more light then a lens with a higher f/#.

If the video application is part of a communication application (orservice), the application or service may be managed by one or moreservers (e.g. server 785). A portion or all of the generated video maybe stored instead of being instantaneously rendered. In that scenario,the video files may be stored in a data store such as data stores 788and provided to the video application(s) in devices subsequently throughdatabase server 786 or retrieved directly by the video application(s).

Network(s) 780 may include a secure network such as an enterprisenetwork, an unsecure network such as a wireless open network, or theInternet. Network(s) 780 provide communication between the nodesdescribed herein. By way of example, and not limitation, network(s) 780may include wired media such as a wired network or direct-wiredconnection, and wireless media such as acoustic, RF, infrared and otherwireless media.

Many other configurations of computing devices, applications, datasources, data distribution systems may be employed to implement a videoconferencing system. Furthermore, the networked environments discussedin FIG. 7 are for illustration purposes only. Embodiments are notlimited to the example applications, modules, or processes.

FIG. 8 illustrates an exemplary system using a privacy camera. Asillustrated, system 1000 includes service 1010, data store 1045, touchscreen input device/display 1050 (e.g. a slate) including privacy camera1002 and smart phone 1030 including privacy camera 1001.

As illustrated, service 1010 is a cloud based and/or enterprise basedservice that may be configured to provide services, such as videoconferencing services (e.g. MICROSOFT LYNC, SKYPE), electronic messagingservices (e.g. MICROSOFT EXCHANGE/OUTLOOK), productivity services (e.g.MICROSOFT OFFICE 365 or some other cloud based/online service. Theservice may be interacted with using different types of input/output.For example, a user may use touch input, hardware based input, speechinput, and the like. The service may provide speech output that combinespre-recorded speech and synthesized speech. Functionality of one or moreof the services/applications provided by service 1010 may also beconfigured as a client/server based application. Although system 1000shows a service relating to a messaging application, otherservices/applications may be configured.

As illustrated, service 1010 is a multi-tenant service that providesresources 1015 and services to any number of tenants (e.g. Tenants 1-N).Multi-tenant service 1010 is a cloud based service that providesresources/services 1015 to tenants subscribed to the service andmaintains each tenant's data separately and protected from other tenantdata.

System 1000 as illustrated comprises a touch screen input device/display1050 (e.g. a slate/tablet device) and smart phone 1030 that detects whena touch input has been received (e.g. a finger touching or nearlytouching the touch screen). Any type of touch screen may be utilizedthat detects a user's touch input. For example, the touch screen mayinclude one or more layers of capacitive material that detects the touchinput. Other sensors may be used in addition to or in place of thecapacitive material. For example, Infrared (IR) sensors may be used.According to an embodiment, the touch screen is configured to detectobjects that in contact with or above a touchable surface. Although theterm “above” is used in this description, it should be understood thatthe orientation of the touch panel system is irrelevant. The term“above” is intended to be applicable to all such orientations. The touchscreen may be configured to determine locations of where touch input isreceived (e.g. a starting point, intermediate points and an endingpoint). Actual contact between the touchable surface and the object maybe detected by any suitable means, including, for example, by avibration sensor or microphone coupled to the touch panel. Anon-exhaustive list of examples for sensors to detect contact includespressure-based mechanisms, micro-machined accelerometers, piezoelectricdevices, capacitive sensors, resistive sensors, inductive sensors, laservibrometers, and LED vibrometers.

According to an embodiment, smart phone 1030 and touch screen inputdevice/display 1050 are configured with video applications that utilizea privacy camera as described herein.

As illustrated, touch screen input device/display 1050 and smart phone1030 shows exemplary displays 1052/1032 showing the use of a videoconferencing application. Display 1052 shows a privacy view created fromimages of a privacy camera in which the video participant is clearlyshown and the background objects are blurred. Display 1032 shows aprivacy view created using a privacy camera in which the videoparticipant is clearly shown and the background is replaced with animage/fill. Data may be stored on a device (e.g. smart phone 1030, slate1050 and/or at some other location (e.g. network data store 1045). Theapplications used by the devices may be client based applications,server based applications, cloud based applications and/or somecombination.

Camera manager 26 is configured to perform operations relating tocreating a privacy view as described herein. While manager 26 is shownwithin service 1010, the functionality of the manager may be included inother locations (e.g. on smart phone 1030 and/or slate device 1050).

The embodiments and functionalities described herein may operate via amultitude of computing systems, including wired and wireless computingsystems, mobile computing systems (e.g., mobile telephones, tablet orslate type computers, laptop computers, etc.). In addition, theembodiments and functionalities described herein may operate overdistributed systems, where application functionality, memory, datastorage and retrieval and various processing functions may be operatedremotely from each other over a distributed computing network, such asthe Internet or an intranet. User interfaces and information of varioustypes may be displayed via on-board computing device displays or viaremote display units associated with one or more computing devices. Forexample user interfaces and information of various types may bedisplayed and interacted with on a wall surface onto which userinterfaces and information of various types are projected. Interactionwith the multitude of computing systems with which embodiments of theinvention may be practiced include, keystroke entry, touch screen entry,voice or other audio entry, gesture entry where an associated computingdevice is equipped with detection (e.g., camera) functionality forcapturing and interpreting user gestures for controlling thefunctionality of the computing device, and the like.

FIGS. 9-11 and the associated descriptions provide a discussion of avariety of operating environments in which embodiments of the inventionmay be practiced. However, the devices and systems illustrated anddiscussed with respect to FIGS. 9-11 are for purposes of example andillustration and are not limiting of a vast number of computing deviceconfigurations that may be utilized for practicing embodiments of theinvention, described herein.

FIG. 9 is a block diagram illustrating example physical components of acomputing device 1100 with which embodiments of the invention may bepracticed. The computing device components described below may besuitable for the computing devices described above. In a basicconfiguration, computing device 1100 may include at least one processingunit 1102 and a system memory 1104. Depending on the configuration andtype of computing device, system memory 1104 may comprise, but is notlimited to, volatile (e.g. random access memory (RAM)), non-volatile(e.g. read-only memory (ROM)), flash memory, or any combination. Systemmemory 1104 may include operating system 1105, one or more programmingmodules 1106, and may include a web browser application 1120. Operatingsystem 1105, for example, may be suitable for controlling computingdevice 1100's operation. In one embodiment, programming modules 1106 mayinclude a camera manager 26, as described above, installed on computingdevice 1100. Furthermore, embodiments of the invention may be practicedin conjunction with a graphics library, other operating systems, or anyother application program and is not limited to any particularapplication or system. This basic configuration is illustrated in FIG. 9by those components within a dashed line 1108.

Computing device 1100 may have additional features or functionality. Forexample, computing device 1100 may also include additional data storagedevices (removable and/or non-removable) such as, for example, magneticdisks, optical disks, or tape. Such additional storage is illustrated bya removable storage 1109 and a non-removable storage 1110.

As stated above, a number of program modules and data files may bestored in system memory 1104, including operating system 1105. Whileexecuting on processing unit 1102, programming modules 1106, such as themanager may perform processes including, for example, operations relatedto methods as described above. The aforementioned process is an example,and processing unit 1102 may perform other processes. Other programmingmodules that may be used in accordance with embodiments of the presentinvention may include video conferencing applications, imagingapplications, electronic mail and contacts applications, word processingapplications, spreadsheet applications, database applications, slidepresentation applications, drawing or computer-aided applicationprograms, etc.

Generally, consistent with embodiments of the invention, program modulesmay include routines, programs, components, data structures, and othertypes of structures that may perform particular tasks or that mayimplement particular abstract data types. Moreover, embodiments of theinvention may be practiced with other computer system configurations,including hand-held devices, multiprocessor systems,microprocessor-based or programmable consumer electronics,minicomputers, mainframe computers, and the like. Embodiments of theinvention may also be practiced in distributed computing environmentswhere tasks are performed by remote processing devices that are linkedthrough a communications network. In a distributed computingenvironment, program modules may be located in both local and remotememory storage devices.

Furthermore, embodiments of the invention may be practiced in anelectrical circuit comprising discrete electronic elements, packaged orintegrated electronic chips containing logic gates, a circuit utilizinga microprocessor, or on a single chip containing electronic elements ormicroprocessors. For example, embodiments of the invention may bepracticed via a system-on-a-chip (SOC) where each or many of thecomponents illustrated in FIG. 9 may be integrated onto a singleintegrated circuit. Such an SOC device may include one or moreprocessing units, graphics units, communications units, systemvirtualization units and various application functionality all of whichare integrated (or “burned”) onto the chip substrate as a singleintegrated circuit. When operating via an SOC, the functionality,described herein, with respect to the manager 26 may be operated viaapplication-specific logic integrated with other components of thecomputing device/system 1100 on the single integrated circuit (chip).Embodiments of the invention may also be practiced using othertechnologies capable of performing logical operations such as, forexample, AND, OR, and NOT, including but not limited to mechanical,optical, fluidic, and quantum technologies. In addition, embodiments ofthe invention may be practiced within a general purpose computer or inany other circuits or systems.

Embodiments of the invention, for example, may be implemented as acomputer process (method), a computing system, or as an article ofmanufacture, such as a computer program product or computer readablemedia. The computer program product may be a computer storage mediareadable by a computer system and encoding a computer program ofinstructions for executing a computer process.

The term computer readable media as used herein may include computerstorage media. Computer storage media may include volatile andnonvolatile, removable and non-removable media implemented in any methodor technology for storage of information, such as computer readableinstructions, data structures, program modules, or other data. Systemmemory 1104, removable storage 1109, and non-removable storage 1110 areall computer storage media examples (i.e., memory storage.) Computerstorage media may include, but is not limited to, RAM, ROM, electricallyerasable read-only memory (EEPROM), flash memory or other memorytechnology, CD-ROM, digital versatile disks (DVD) or other opticalstorage, magnetic cassettes, magnetic tape, magnetic disk storage orother magnetic storage devices, or any other medium which can be used tostore information and which can be accessed by computing device 1100.Any such computer storage media may be part of device 1100. Computingdevice 1100 may also have input device(s) 1112 such as a keyboard, amouse, a pen, a sound input device, a touch input device, etc. Outputdevice(s) 1114 such as a display, speakers, a printer, etc. may also beincluded. The aforementioned devices are examples and others may beused.

A camera and/or some other sensing device may be operative to record oneor more users and capture motions and/or gestures made by users of acomputing device. Sensing device may be further operative to capturespoken words, such as by a microphone and/or capture other inputs from auser such as by a keyboard and/or mouse (not pictured). The sensingdevice may comprise any motion detection device capable of detecting themovement of a user. For example, a camera may comprise a MICROSOFTKINECT® motion capture device comprising a plurality of cameras and aplurality of microphones. The camera may also be a light field camera asdescribed herein.

The term computer readable media as used herein may also includecommunication media. Communication media may be embodied by computerreadable instructions, data structures, program modules, or other datain a modulated data signal, such as a carrier wave or other transportmechanism, and includes any information delivery media. The term“modulated data signal” may describe a signal that has one or morecharacteristics set or changed in such a manner as to encode informationin the signal. By way of example, and not limitation, communicationmedia may include wired media such as a wired network or direct-wiredconnection, and wireless media such as acoustic, radio frequency (RF),infrared, and other wireless media.

FIGS. 10A and 10B illustrate a suitable mobile computing environment,for example, a mobile telephone, a smartphone, a tablet personalcomputer, a laptop computer, and the like, with which embodiments of theinvention may be practiced. With reference to FIG. 10A, an examplemobile computing device 1200 for implementing the embodiments isillustrated. In a basic configuration, mobile computing device 1200 is ahandheld computer having both input elements and output elements. Inputelements may include touch screen display 1205 and input buttons 1215that allow the user to enter information into mobile computing device1200. Mobile computing device 1200 may also incorporate an optional sideinput element 1215 allowing further user input. Optional side inputelement 1215 may be a rotary switch, a button, or any other type ofmanual input element. In alternative embodiments, mobile computingdevice 1200 may incorporate more or less input elements. For example,display 1205 may not be a touch screen in some embodiments. In yetanother alternative embodiment, the mobile computing device is aportable phone system, such as a cellular phone having display 1205 andinput buttons 1215. Mobile computing device 1200 may also include anoptional keypad 1235. Optional keypad 1215 may be a physical keypad or a“soft” keypad generated on the touch screen display.

Mobile computing device 1200 incorporates output elements, such asdisplay 1205, which can display a graphical user interface (GUI). Otheroutput elements include speaker 1225 and LED light 1220. Additionally,mobile computing device 1200 may incorporate a vibration module (notshown), which causes mobile computing device 1200 to vibrate to notifythe user of an event. In yet another embodiment, mobile computing device1200 may incorporate a headphone jack (not shown) for providing anothermeans of providing output signals.

Although described herein in combination with mobile computing device1200, in alternative embodiments the invention is used in combinationwith any number of computer systems, such as in desktop environments,laptop or notebook computer systems, multiprocessor systems,micro-processor based or programmable consumer electronics, network PCs,mini computers, main frame computers and the like. Embodiments of theinvention may also be practiced in distributed computing environmentswhere tasks are performed by remote processing devices that are linkedthrough a communications network in a distributed computing environment;programs may be located in both local and remote memory storage devices.To summarize, any computer system having a plurality of environmentsensors, a plurality of output elements to provide notifications to auser and a plurality of notification event types may incorporateembodiments of the present invention.

FIG. 10B is a block diagram illustrating components of a mobilecomputing device used in one embodiment, such as the computing deviceshown in FIG. 10A. That is, mobile computing device 1200 can incorporatesystem 1202 to implement some embodiments. For example, system 1202 canbe used in implementing a “smart phone” that can run one or moreapplications similar to those of a desktop or notebook computer such as,for example, presentation applications, browser, e-mail, scheduling,instant messaging, and media player applications. In some embodiments,system 1202 is integrated as a computing device, such as an integratedpersonal digital assistant (PDA) and wireless phoneme.

One or more application programs 1266 may be loaded into memory 1262 andrun on or in association with operating system 1264. Examples ofapplication programs include phone dialer programs, e-mail programs, PIM(personal information management) programs, word processing programs,spreadsheet programs, Internet browser programs, messaging programs, andso forth. System 1202 also includes non-volatile storage 1268 withinmemory 1262. Non-volatile storage 1268 may be used to store persistentinformation that should not be lost if system 1202 is powered down.Applications 1266 may use and store information in non-volatile storage1268, such as e-mail or other messages used by an e-mail application,and the like. A synchronization application (not shown) may also resideon system 1202 and is programmed to interact with a correspondingsynchronization application resident on a host computer to keep theinformation stored in non-volatile storage 1268 synchronized withcorresponding information stored at the host computer. As should beappreciated, other applications may be loaded into memory 1262 and runon the device 1200, including the camera manager 26, described above.

System 1202 has a power supply 1270, which may be implemented as one ormore batteries. Power supply 1270 might further include an externalpower source, such as an AC adapter or a powered docking cradle thatsupplements or recharges the batteries.

System 1202 may also include a radio 1272 that performs the function oftransmitting and receiving radio frequency communications. Radio 1272facilitates wireless connectivity between system 1202 and the “outsideworld”, via a communications carrier or service provider. Transmissionsto and from radio 1272 are conducted under control of OS 1264. In otherwords, communications received by radio 1272 may be disseminated toapplication programs 1266 via OS 1264, and vice versa.

Radio 1272 allows system 1202 to communicate with other computingdevices, such as over a network. Radio 1272 is one example ofcommunication media. Communication media may typically be embodied bycomputer readable instructions, data structures, program modules, orother data in a modulated data signal, such as a carrier wave or othertransport mechanism, and includes any information delivery media. Theterm “modulated data signal” means a signal that has one or more of itscharacteristics set or changed in such a manner as to encode informationin the signal. By way of example, and not limitation, communicationmedia includes wired media such as a wired network or direct-wiredconnection, and wireless media such as acoustic, RF, infrared and otherwireless media. The term computer readable media as used herein includesboth storage media and communication media.

This embodiment of system 1202 is shown with two types of notificationoutput devices; LED 1220 that can be used to provide visualnotifications and an audio interface 1274 that can be used with speaker1225 to provide audio notifications. These devices may be directlycoupled to power supply 1270 so that when activated, they remain on fora duration dictated by the notification mechanism even though processor1260 and other components might shut down for conserving battery power.LED 1220 may be programmed to remain on indefinitely until the usertakes action to indicate the powered-on status of the device. Audiointerface 1274 is used to provide audible signals to and receive audiblesignals from the user. For example, in addition to being coupled tospeaker 1225, audio interface 1274 may also be coupled to a microphone1220 to receive audible input, such as to facilitate a telephoneconversation. In accordance with embodiments of the present invention,the microphone 1220 may also serve as an audio sensor to facilitatecontrol of notifications, as will be described below. System 1202 mayfurther include video interface 1276 that enables an operation ofon-board camera 1230 (e.g. camera 120) to record still images, videostream, and the like.

A mobile computing device implementing system 1202 may have additionalfeatures or functionality. For example, the device may also includeadditional data storage devices (removable and/or non-removable) suchas, magnetic disks, optical disks, or tape. Such additional storage isillustrated in FIG. 10B by storage 1268. Computer storage media mayinclude volatile and nonvolatile, removable and non-removable mediaimplemented in any method or technology for storage of information, suchas computer readable instructions, data structures, program modules, orother data.

Data/information generated or captured by the device 1200 and stored viathe system 1202 may be stored locally on the device 1200, as describedabove, or the data may be stored on any number of storage media that maybe accessed by the device via the radio 1272 or via a wired connectionbetween the device 1200 and a separate computing device associated withthe device 1200, for example, a server computer in a distributedcomputing network such as the Internet. As should be appreciated suchdata/information may be accessed via the device 1200 via the radio 1272or via a distributed computing network. Similarly, such data/informationmay be readily transferred between computing devices for storage and useaccording to well-known data/information transfer and storage means,including electronic mail and collaborative data/information sharingsystems.

FIG. 11 illustrates a system architecture for using a privacy camera.

Components managed via the camera manager 26 and/or other process may bestored in different communication channels or other storage types. Forexample, components along with information from which they are developedmay be stored using directory services 1322, web portals 1324, mailboxservices 1326, instant messaging stores 1328 and social networking sites1330. The systems/applications 26, 1320 may use any of these types ofsystems or the like for enabling management and storage of components ina store 1316. A server 1332 may provide communications and servicesrelating to video conferencing and/or other imaging services. Server1332 may provide services and content over the web to clients through anetwork 1308. Examples of clients that may utilize server 1332 includecomputing device 1302, which may include any general purpose personalcomputer, a tablet computing device 1304 and/or mobile computing device1306 which may include smart phones. Each of these devices may include acamera that includes a privacy mode as described herein. Any of thesedevices may obtain display component management communications andcontent from the store 1316.

Embodiments of the present invention are described above with referenceto block diagrams and/or operational illustrations of methods, systems,and computer program products according to embodiments of the invention.The functions/acts noted in the blocks may occur out of the order asshown in any flowchart. For example, two blocks shown in succession mayin fact be executed substantially concurrently or the blocks maysometimes be executed in the reverse order, depending upon thefunctionality/acts involved.

The above specification, examples and data provide a completedescription of the manufacture and use of the composition of theinvention. Since many embodiments of the invention can be made withoutdeparting from the spirit and scope of the invention, the inventionresides in the claims hereinafter appended.

What is claimed is:
 1. A method for creating a privacy mode from aprivacy camera, comprising: determining objects of interest in a scenecomprising a foreground and a background; determining a privacy modefrom privacy modes comprising a background blur and a backgroundreplacement; when the determined privacy mode is the background blur,creating an image by setting a limited depth of field for the privacycamera such that the objects of interest in the scene in the foregroundappear in focus and any objects within the background of the sceneappear to not be in focus, the privacy camera comprising a plurality ofcameras forming an array, the any objects within the background of thescene being blurred due to a distance between different camera sensorsassociated with the plurality of cameras, the background of the scenebeing blurred in different amounts; when the determined privacy mode isthe background replacement, creating the image by setting a dynamicallyadjustable foreground depth range for the privacy camera used indetermining the foreground to include the objects of interest in thescene and replacing the background with at least one of an image and afill; and displaying the image.
 2. The method of claim 1, wherein theprivacy mode is determined using at least one of: user privacypreferences and call information.
 3. The method of claim 1, whereindetermining the privacy mode further comprises using at least one of: acall location, face detection and head pose, and device type.
 4. Themethod of claim 2, wherein determining the privacy mode comprisesdetermining when a meeting is at least one of: an intra-company meeting,an inter-group meeting, and an inter-company meeting.
 5. The method ofclaim 1, wherein the privacy mode is automatically determined using oneor more of: user privacy preferences, a call location, a device type,face detection, head pose, and call participants.
 6. The method of claim1, further comprising compensating for a failure in at least one of thecameras in the array of cameras using at least one of the other cameraswithin the array.
 7. The method of claim 1, further comprisingdetermining a depth estimate from the privacy camera.
 8. The method ofclaim 2, wherein replacing the background with at least one of the imageand the fill comprises determining the image to use based on one or moreof: user privacy preferences, a call location, a device type, facedetection and head pose, a meeting type including an intra-companymeeting, an inter-group meeting, and an inter-company meeting.
 9. Acomputer-readable storage medium that is not a signal, storingcomputer-executable instructions for using a camera including a privacymode, comprising: determining a region of interest in a foreground of ascene obtained by the camera; determining a privacy mode from privacymodes comprising a background blur and a background replacement; whenthe determined privacy mode is the background blur, creating an image bysetting a limited depth of field for the camera such that the objects ofinterest in the scene in the foreground appears in focus and any objectswithin the background of the scene appear to not be in focus, the cameracomprising a plurality of cameras forming an array, the any objectswithin the background of the scene being blurred due to a distancebetween different camera sensors associated with the plurality ofcameras, the background of the scene being blurred in different amounts;when the determined privacy mode is the background replacement, creatingthe image by automatically setting a foreground depth for the cameraused in determining the foreground to include the region of interest inthe scene based at least in part on a number of people in the scene andtheir respective depths and replacing the background with at least oneof an image and a fill; and displaying the image.
 10. Thecomputer-readable storage medium of claim 9, wherein the privacy mode isautomatically determined using at least one of: user privacy preferencesand call information.
 11. The computer-readable storage medium of claim10, further comprising using at least one of: a call location and adevice type in automatically determining the privacy mode.
 12. Thecomputer-readable storage medium of claim 9, further comprisingdetermining a depth estimate.
 13. The computer-readable storage mediumof claim 9, wherein the privacy mode is automatically determined usingone or more of: user privacy preferences, a call location, a devicetype, and a meeting type including an intra-company meeting, aninter-group meeting, and an inter-company meeting.
 14. A system,comprising: a processor and memory; an operating environment executingusing the processor; a privacy camera comprising: an array of at leastfour cameras disposed on a base having at least a five millimeterspacing between a center of each of the at least four cameras; and acamera manager that is configured to perform actions comprising:automatically determining a region of interest in a foreground of ascene obtained by the privacy camera; determining a privacy mode fromprivacy modes comprising a background blur and a background replacement;when the determined privacy mode is the background blur, creating animage by setting a limited depth of field for the privacy camera suchthat the objects of interest in the scene in the foreground appears infocus and any objects within the background of the scene appear to notbe in focus, the any objects within the background of the scene beingblurred due to a distance between different camera sensors associatedwith the at least four cameras, the background of the scene beingblurred in different amounts; when the determined privacy mode is thebackground replacement, creating the image by setting a foreground depthfor the privacy camera used in determining the foreground to include theregion of interest in the scene and replacing the background with atleast one of an image and a fill; and displaying the image.
 15. Thesystem of claim 14, wherein determining the privacy mode comprises usingone or more of: user privacy preferences, a call location, a devicetype, face detection and head pose, and a meeting type including anintra-company meeting, an inter-group meeting, and an inter-companymeeting to automatically select the privacy mode.
 16. The system ofclaim 14, further comprising compensating for a failure in at least oneof the cameras in the array of at least four cameras using at least oneof the other cameras within the array.
 17. The system of claim 14,wherein replacing the background with at least one of the image and thefill comprises determining the image to use based on one or more of:user privacy preferences, a call location, face detection and head pose,a device type, a meeting type including an intra-company meeting, aninter-group meeting, and an inter-company meeting.