摘要:
A method includes forming a feature vector associated with an iris of an individual using a transform operation including converting an iris image into a log-polar image, scaling one or more samples in the log-polar image according to a Fourier-Mellin transform, and performing a Fourier transform on the scaled samples. The method involves forming an iris digest based on the feature vector, and creating a biometric identifier based on the iris digest. A system includes an iris scanner, an iris analyzer that forms an image of a human iris wherein the presence of eyelashes in the image is minimized, forms a feature vector associated with the iris image using a modified Fourier-Mellin transform, and compresses the feature vector into an iris digest.
摘要:
A method includes forming a feature vector associated with an iris of an individual using a transform operation including converting an iris image into a log-polar image, scaling one or more samples in the log-polar image according to a Fourier-Mellin transform, and performing a Fourier transform on the scaled samples. The method involves forming an iris digest based on the feature vector, and creating a biometric identifier based on the iris digest. A system includes an iris scanner, an iris analyzer that forms an image of a human iris wherein the presence of eyelashes in the image is minimized, forms a feature vector associated with the iris image using a modified Fourier-Mellin transform, and compresses the feature vector into an iris digest.
摘要:
The subject matter includes systems, engines, methods, and schemata for embedding spread-spectrum fingerprints in multimedia content: a first fingerprint to identify a recipient of the multimedia content and a second fingerprint at a location in the first fingerprint that represents a subset of a much larger group of recipients. By locating the second fingerprint, the search for a media pirate is immediately narrowed down to the subset, thus immensely speeding up pirate identification. In one implementation, chips of the second fingerprint can be made small and embedded sparsely, making alteration difficult. Systems, engines, methods, and schemata for synchronizing a pirated copy with original multimedia content to facilitate fingerprint recovery are also described.
摘要:
A method includes forming a feature vector associated with an iris of an individual using a transform operation including converting an iris image into a log-polar image, scaling one or more samples in the log-polar image according to a Fourier-Mellin transform, and performing a Fourier transform on the scaled samples. The method involves forming an iris digest based on the feature vector, and creating a biometric identifier based on the iris digest. A system includes an iris scanner, an iris analyzer that forms an image of a human iris wherein the presence of eyelashes in the image is minimized, forms a feature vector associated with the iris image using a modified Fourier-Mellin transform, and compresses the feature vector into an iris digest.
摘要:
A method includes forming a feature vector associated with an iris of an individual using a transform operation including converting an iris image into a log-polar image, scaling one or more samples in the log-polar image according to a Fourier-Mellin transform, and performing a Fourier transform on the scaled samples. The method involves forming an iris digest based on the feature vector, and creating a biometric identifier based on the iris digest. A system includes an iris scanner, an iris analyzer that forms an image of a human iris wherein the presence of eyelashes in the image is minimized, forms a feature vector associated with the iris image using a modified Fourier-Mellin transform, and compresses the feature vector into an iris digest.
摘要:
The subject matter includes systems, engines, methods, and schemata for embedding spread-spectrum fingerprints in multimedia content: a first fingerprint to identify a recipient of the multimedia content and a second fingerprint at a location in the first fingerprint that represents a subset of a much larger group of recipients. By locating the second fingerprint, the search for a media pirate is immediately narrowed down to the subset, thus immensely speeding up pirate identification. In one implementation, chips of the second fingerprint can be made small and embedded sparsely, making alteration difficult. Systems, engines, methods, and schemata for synchronizing a pirated copy with original multimedia content to facilitate fingerprint recovery are also described.
摘要:
In certain embodiments, overlap operators are applied during encoding and/or decoding of digital media, where the overlap operators have reduced DC gain mismatch and/or DC leakage between interior overlap operators and overlap operators at the edge and/or corner. In other embodiments, information indicating a selected tile boundary option for overlap processing can be encoded and/or decoded. The selected tile boundary option indicates one of a hard tile boundary option and a soft tile boundary option for processing with overlap operators. Overlap transform processing can then be applied based at least in part on the selected tile boundary option.
摘要:
Systems and techniques to provide an improved reputation scoring for products in an online storefront are described. A technique may include obtaining at least one objective measure and at least one subjective measure about a product in an online storefront; calculating a reputation level for the product from the subjective and objective measures; and displaying a listing for the product in the online storefront according to the reputation level. A technique may further include providing feedback to product developers about the reputation level of the product. Other embodiments are described and claimed.