摘要:
A method for selecting an authentication process for identifying and/or authenticating a user on a device, the method comprising: determining a first authentication process and identifying a sensor device configured to capture data for the first authentication process; enabling the sensor device so as to measure one or more environmental parameters; and determining, in dependence on the measured parameters, whether the sensor device is capable of capturing data sufficient for performing the first authentication process.
摘要:
An image forensics system estimates a camera response function (CRF) associated with a digital image, and compares the estimated CRF to a set of rules and compares the estimated CRF to a known CRF. The known CRF is associated with a make and a model of an image sensing device. The system applies a fusion analysis to results obtained from comparing the estimated CRF to a set of rules and from comparing the estimated CRF to the known CRF, and assesses the integrity of the digital image as a function of the fusion analysis.
摘要:
Privacy preserving methods and apparatuses for capturing and processing optical information are provided. Optical information may be captured by a privacy preserving optical sensor. The optical information may be processed, analyzed, and/or monitored. Based on the optical information, information and indications may be provided. Such methods and apparatuses may be used in environments where privacy may be a concern, including in a lavatory environment.
摘要:
An apparatus for detecting a camera tampering, includes: an image capturing unit to capture at least one image; an input-edge-image generating unit to extract an edge image from an object displayed in the captured image and generate an input edge image by using the extracted edge image; a reference-edge-image generating unit to generate a reference edge image from the input edge image; a stolen-edge-image generating unit configured to generate a stolen edge image by substracting the input edge image from the reference edge image; and a tampering determining unit to compare the input edge image with the reference edge image, compare the reference edge image with the stolen edge image, and determine whether or not a camera tampering has occurred, based on a first similarity and a second similarity.
摘要:
Methods and systems involving image processing extract from an image and estimate unique intrinsic characteristics (scanner pattern) of a biometric scanner, such as area type fingerprint scanner. The scanner pattern is permanent over time, can identify a scanner even among scanners of the same manufacturer and model, and can be used to verify if a scanner acquired an image is the same as the scanner used for biometric enrollment, i.e., to authenticate the scanner and prevent security attacks on it. One method comprises selecting pixels from an enrolled and query image, masking useful pixels from the images, computing a similarity score between the common pixels of the enrolled and query useful pixels, and comparing this score with a threshold to determine whether the query image has been acquired by the same scanner as the enrolled image. The method can further comprise inverting the pixel values and/or filtering the selected pixels.
摘要:
A CFA pattern is extracted from captured image data for each first unit region. A first altered region is detected from disturbance of the periodicity of the CFA pattern, and the first altered region is an image region in which copying has been performed from image data different from the captured image data to the captured image data. The feature amount of the captured image data is extracted for each second unit region different in size from the first unit region. The feature amounts are compared for each second unit region to detect a second altered region, and the second altered region is an image region in which copying has been performed from the captured image data to the captured image data. Information concerning the first and second altered regions are output as alteration detection results in the captured image data.
摘要:
A system including an image capturing unit configured to capture an image of at least one medical device monitoring a patient, a database including images of a plurality of medical devices, where each image corresponds to a particular medical device, and a data collection server configured to receive the at least one image, receive patient identification data corresponding to the patient, and identify the medical device in the image by comparing the received image with the images stored in the database and matching the received image with the images stored in the database.
摘要:
A method and apparatus for authenticating a biometric scanner involves estimating unique intrinsic characteristics of the scanner (scanner pattern), that are permanent over time, and can identify a scanner even among scanners of the same manufacturer and model. Image processing and analysis are used to extract a scanner pattern from images acquired with the scanner. The scanner pattern is used to verify whether the scanner that acquired a particular image is the same as the scanner that acquired one or several images during enrollment of the biometric information. Authenticating the scanner can prevent subsequent security attacks using counterfeited biometric information on the scanner, or on the user authentication system.
摘要:
A new technique for identifying from images a camera, or other imaging device such as a scanner, is based on the device's reference noise pattern, a unique stochastic characteristic of all common digital imaging sensors, including CCD, CMOS (Foveon™ X3), and JFET. First, one determines from images the sensor's reference pattern noise, which uniquely identifies each sensor. To identify the sensor from a given image, the presence or absence of the reference pattern noise in the image under examination is established using a correlation detector or other means.
摘要:
A human biological characteristic file corresponding to a particular identity is received and used as a base file. A characteristic code to be authenticated is obtained according to a human biological characteristic of a person who requests identity authentication when an identity authentication request corresponding to the particular identity is received. A base characteristic code is collected from a base file. A collecting algorithm applied for collecting the base characteristic code is the same as or matches an algorithm applied for obtaining the characteristic code. The present techniques determine whether the base characteristic code and the characteristic code correspond to a same human biological characteristic. If a result is positive, the identity authentication request is verified. The present techniques implement communication between different terminal devices of different manufacturers and effectively improve user experiences, thereby efficiently and conveniently implementing remote identity authentication.