-
1.
公开(公告)号:US20240338977A1
公开(公告)日:2024-10-10
申请号:US18293630
申请日:2022-07-15
申请人: Smartphone ID
CPC分类号: G06V40/40 , G06V10/82 , G06V40/166 , G06V40/172
摘要: A method for determining whether an image of a person's face is suitable for use as an ID photograph comprises a step of acquiring a first image and a second image of the person's face. The method also comprises a step of propagating facial cues from the first image and facial cues from the second image into two Siamese branches of a main neural network. A computer program may be employed to implement the method, and a system may be configured to implement the method.
-
公开(公告)号:US12033428B2
公开(公告)日:2024-07-09
申请号:US17619935
申请日:2020-02-04
发明人: Cheuk Lun Dong , Chun Tung Wong , Munirul Abedin , Yee Won Nyon
IPC分类号: G06V40/16 , G06F16/51 , G06F16/535 , G06V40/40
CPC分类号: G06V40/161 , G06F16/51 , G06F16/535 , G06V40/166 , G06V40/40
摘要: A method of verifying a user for transportation purposes is disclosed. The method may include using a communication apparatus to detect a face of the user. The method may include using the communication apparatus to instruct the user to perform a specific action, to validate that the specific action is performed by the user, to extract a frame from the specific action to use as an image, to obtain image parameters from the frame and to use the communication apparatus to send the image to a server for the server to determine whether the image is a genuine face by comparing the image parameters of the image with parameters in a database to obtain a comparison result and to use the comparison result to determine if the user should be verified.
-
公开(公告)号:US20240221340A1
公开(公告)日:2024-07-04
申请号:US17918816
申请日:2022-04-27
发明人: Jianming LV , Jiangfeng YUAN
IPC分类号: G06V10/141 , G06F21/32 , G06V40/16 , G06V40/40
CPC分类号: G06V10/141 , G06F21/32 , G06V40/172 , G06V40/40
摘要: Embodiments of this application relate to the terminal field, and provide a method and an apparatus for facial recognition so as to improve security of facial recognition. The method is applied to an electronic device, where the electronic device includes a TOF camera module, and the TOF camera module includes a transmitter configured to transmit a light signal. The method includes: receiving a first operation by a user, where the first operation is used to trigger the TOF camera module to work; controlling the transmitter to work at a first current value; controlling, in a case that the transmitter is working at a first current value, the transmitter to work at a second current value, where the second light intensity is higher than the first light intensity.
-
公开(公告)号:US20240220594A1
公开(公告)日:2024-07-04
申请号:US18465312
申请日:2023-09-12
申请人: Private Identity LLC
发明人: Scott Edward Streit
IPC分类号: G06F21/32 , G06F18/214 , G06N3/04 , G06V10/772 , G06V10/774 , G06V10/82 , G06V10/98 , G06V40/12 , G06V40/16 , G06V40/40 , H04L9/40
CPC分类号: G06F21/32 , G06F18/214 , G06N3/04 , G06V10/772 , G06V10/774 , G06V10/82 , G06V10/993 , G06V40/12 , G06V40/16 , G06V40/40 , H04L63/0236 , H04L63/1416 , H04L63/1466
摘要: Helper neural network can play a role in augmenting authentication services that are based on neural network architectures. For example, helper networks are configured to operate as a gateway on identification information used to identify users, enroll users, and/or construct authentication models (e.g., embedding and/or prediction networks). Assuming, that both good and bad identification information samples are taken as part of identification information capture, the helper networks operate to filter out bad identification information prior to training, which prevents, for example, identification information that is valid but poorly captured from impacting identification, training, and/or prediction using various neural networks. Additionally, helper networks can also identify and prevent presentation attacks or submission of spoofed identification information as part of processing and/or validation.
-
公开(公告)号:US12002294B2
公开(公告)日:2024-06-04
申请号:US17192605
申请日:2021-03-04
发明人: Xiaomin Liu , Lei Zhang , Qun Gu , Zilong Hu
CPC分类号: G06V40/40 , G06V40/168 , H04N5/33 , H04N23/45
摘要: A method of face anti-spoofing, comprising, receiving a near infra-red facial image, having a near infrared channel, receiving a red-green-blue facial image, having a red channel, a green channel and a blue channel, generating a synthetic three channel image based on the near infrared channel, the red channel, the green channel and the blue channel and training a deep neural network based on the synthetic three channel image.
-
6.
公开(公告)号:US20240153263A1
公开(公告)日:2024-05-09
申请号:US17776338
申请日:2021-09-30
申请人: NEC Corporation
发明人: Hirokazu AKIBA , Shinji OOMINATO , Yifeng ZHOU
IPC分类号: G06V10/98 , G06V10/141 , G06V40/16 , G06V40/18 , G06V40/19 , G06V40/40 , G06V40/50 , G06V40/60 , G06V40/70
CPC分类号: G06V10/993 , G06V10/141 , G06V40/172 , G06V40/19 , G06V40/197 , G06V40/40 , G06V40/50 , G06V40/67 , G06V40/70
摘要: An information processing system (10) comprises: an image acquisition unit (110) that acquires a face image and an iris image with respect to a registration target; a score computing unit (120) that calculates a quality-score indicating quality with respect to each of the face image and the iris image; and a selection unit (130) that selects each of the face image and the iris image for registration based on the quality-score. According to this information processing system, it is possible to register high-quality face image and iris image.
-
公开(公告)号:US20240127630A1
公开(公告)日:2024-04-18
申请号:US17967254
申请日:2022-10-17
CPC分类号: G06V40/40 , G06V20/46 , G06V40/168 , G06V40/172
摘要: Systems, methods, and other embodiments associated with computer deepfake detection are described. In one embodiment, a method includes converting audio-visual content of a person delivering a speech into a set of time series signals. Residual time series signals of residuals that indicate an extent to which the time series signals differ from machine learning estimates of authentic delivery of the speech by the person are generated. Residual values from one synchronous observation of the residual time series signals are placed into an array of residual values for a point in time. A sequential analysis of the residual values of the array is performed to detect an anomaly in the residual values for the point in time. In response to detection of the anomaly, an alert that deepfake content is detected in the audio-visual content is generated.
-
公开(公告)号:US20240104962A1
公开(公告)日:2024-03-28
申请号:US18340686
申请日:2023-06-23
发明人: Tae Wook KANG , Sung Eun KIM , Kyung Jin BYUN , Kwang IL OH , Jae-Jin LEE
CPC分类号: G06V40/40 , G06V10/70 , G06V40/1306
摘要: Disclosed are a fingerprint forgery detection device and a method of operating the same. The fingerprint forgery detection device includes a memory that stores a first feature signal including biological channel feature information of a user, a transmitter including at least one transmission electrode for transmitting a pulse signal to the user, a receiver including at least one reception electrode for receiving a biological channel response signal in response to the transmitted pulse signal, and a signal processor for processing the biological channel response signal to detect whether a fingerprint is forged, and at least one processor that controls the memory, the transmitter, and the receiver.
-
公开(公告)号:US11941918B2
公开(公告)日:2024-03-26
申请号:US18301147
申请日:2023-04-14
申请人: Yoti Holding Limited
IPC分类号: G06V40/40 , B29C64/393 , B33Y50/00 , B33Y50/02 , G06F18/214 , G06N3/08 , G06T7/20 , G06T7/50 , G06T7/55 , G06T17/00 , G06V10/141 , G06V10/44 , G06V10/764 , G06V10/82 , G06V20/64 , G06V40/16 , B29L31/48 , B33Y30/00 , B33Y80/00 , G06F21/32
CPC分类号: G06V40/40 , B29C64/393 , B33Y50/00 , B33Y50/02 , G06F18/214 , G06N3/08 , G06T7/20 , G06T7/50 , G06T7/55 , G06T17/00 , G06V10/141 , G06V10/454 , G06V10/764 , G06V10/82 , G06V20/647 , G06V40/16 , G06V40/168 , G06V40/172 , B29L2031/48 , B33Y30/00 , B33Y80/00 , G06F21/32 , G06T2200/04 , G06T2207/10021 , G06T2207/20081 , G06T2207/20084 , G06T2207/30201
摘要: An image processing component is trained to process 2D images of human body parts, in order to extract depth information about the human body parts captured therein. Image processing parameters are learned during the training from a training set of captured 3D training images, each 3D training image of a human body part and captured using 3D image capture equipment and comprising 2D image data and corresponding depth data, by: processing the 2D image data of each 3D training image according to the image processing parameters, so as to compute an image processing output for comparison with the corresponding depth data of that 3D image, and adapting the image processing parameters in order to match the image processing outputs to the corresponding depth data, thereby training the image processing component to extract depth information from 2D images of human body parts.
-
公开(公告)号:US11941906B2
公开(公告)日:2024-03-26
申请号:US17294917
申请日:2019-06-10
发明人: Bonkon Koo , Jaewoo Ko
CPC分类号: G06V40/107 , G02B27/017 , G06F3/017 , G06V40/103 , G06V40/28 , G06V40/40
摘要: Provided is a method of identifying a hand of a genuine user wearing a wearable device. According to an embodiment, the method includes using a sensor included in the wearable device to recognize a hand located in a detection area of the sensor; estimating a position of a shoulder connected to the recognized hand based on a positional relation between the orientation of the recognized hand and at least one body part connected to the recognized hand; and using information about a probability of a shoulder of the genuine user being present in the estimated position to determine whether the recognized hand is a hand of the genuine user.
-
-
-
-
-
-
-
-
-