Abstract:
An example method includes capturing, by an image capture device of a computing device, an image of a face of a user. The method further includes detecting, by the computing device, whether a distance between the computing device and an object represented by at least a portion of the image is less than a threshold distance, and, when the detected distance is less than a threshold distance, denying authentication to the user with respect to accessing one or more functionalities controlled by the computing device, where the authentication is denied independent of performing facial recognition based at least in part on the captured image.
Abstract:
An example method includes capturing, by an image capture device of a computing device, an image of a face of a user. The method further includes detecting, by the computing device, whether a distance between the computing device and an object represented by at least a portion of the image is less than a threshold distance, and, when the detected distance is less than a threshold distance, denying authentication to the user with respect to accessing one or more functionalities controlled by the computing device, where the authentication is denied independent of performing facial recognition based at least in part on the captured image.
Abstract:
Facial recognition can be used to determine whether or not a user has access privileges to a device such as a smartphone. It may be possible to spoof an authenticated user's image using a picture of the user. Implementations disclosed herein utilize time of flight and/or reflectivity measurements of an authenticated user to compare to such values obtained for an image of an object. If the time of flight distance and/or reflectivity distance for the object match a measured distance, then the person (i.e., object) may be granted access to the device.
Abstract:
An example method includes capturing, by a camera of a mobile computing device, an image, determining whether the image includes a representation of at least a portion of a face, and, when the image includes the representation of at least the portion of the face, analyzing characteristics of the image. The characteristics include at least one of a tonal distribution of the image that is associated with a darkness-based mapping of a plurality of pixels of the image, and a plurality of spatial frequencies of the image that are associated with a visual transition between adjacent pixels of the image. The method further includes classifying, by the mobile computing device, a quality of the image based at least in part on the analyzed characteristics of the image.
Abstract:
An example method includes receiving a first image and a second image of a face of a user, where one or both images have been granted a match by facial recognition. The method further includes detecting a liveness gesture based on at least one of a yaw angle of the second image relative to the first image and a pitch angle of the second image relative to the first image, where the yaw angle corresponds to a transition along a horizontal axis, and where the pitch angle corresponds to a transition along a vertical axis. The method further includes generating a liveness score based on a yaw angle magnitude and/or a pitch angle magnitude, comparing the liveness score to a threshold value, and determining, based on the comparison, whether to deny authentication to the user with respect to accessing one or more functionalities controlled by the computing device.
Abstract:
A transformed video and a source video may be synchronized according to implementations disclosed herein to provide tag information to the device receiving the transformed version of the video. A synchronization signal may be computed on the source video and the transformed video using a statistic such as mean pixel intensity. The synchronization signals computed for the transformed video and source video may be compared to determine a transformed video reference point location for the requested tag information. The requested tag information may be provided to the device receiving the transformed version of the video.
Abstract:
An example method includes receiving a first image and a second image of a face of a user, where one or both images have been granted a match by facial recognition. The method further includes detecting a liveness gesture based on at least one of a yaw angle of the second image relative to the first image and a pitch angle of the second image relative to the first image, where the yaw angle corresponds to a transition along a horizontal axis, and where the pitch angle corresponds to a transition along a vertical axis. The method further includes generating a liveness score based on a yaw angle magnitude and/or a pitch angle magnitude, comparing the liveness score to a threshold value, and determining, based on the comparison, whether to deny authentication to the user with respect to accessing one or more functionalities controlled by the computing device.
Abstract:
An example method includes capturing, by a camera of a mobile computing device, an image, determining whether the image includes a representation of at least a portion of a face, and, when the image includes the representation of at least the portion of the face, analyzing characteristics of the image. The characteristics include at least one of a tonal distribution of the image that is associated with a darkness-based mapping of a plurality of pixels of the image, and a plurality of spatial frequencies of the image that are associated with a visual transition between adjacent pixels of the image. The method further includes classifying, by the mobile computing device, a quality of the image based at least in part on the analyzed characteristics of the image.
Abstract:
Facial recognition can be used to determine whether or not a user has access privileges to a device such as a smartphone. It may be possible to spoof an authenticated user's image using a picture of the user. Implementations disclosed herein utilize time of flight and/or reflectivity measurements of an authenticated user to compare to such values obtained for an image of an object. If the time of flight distance and/or reflectivity distance for the object match a measured distance, then the person (i.e., object) may be granted access to the device.
Abstract:
A transformed video and a source video may be synchronized according to implementations disclosed herein to provide tag information to the device receiving the transformed version of the video. A synchronization signal may be computed on the source video and the transformed video using a statistic such as mean pixel intensity. The synchronization signals computed for the transformed video and source video may be compared to determine a transformed video reference point location for the requested tag information. The requested tag information may be provided to the device receiving the transformed version of the video.