Ottakath et al., 2023 - Google Patents
Enhanced computer vision applications with blockchain: A review of applications and opportunitiesOttakath et al., 2023
View HTML- Document ID
- 4313000041018544142
- Author
- Ottakath N
- Al-Ali A
- Al-Maadeed S
- Elharrouss O
- Mohamed A
- Publication year
- Publication venue
- Journal of King Saud University-Computer and Information Sciences
External Links
Snippet
Videos and image processing have significantly transformed computer vision, enabling computers to analyse, and manipulate visual data. The proliferation of cameras and IR equipment has facilitated the collection of valuable information about individuals and their …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00087—Matching; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30244—Information retrieval; Database structures therefor; File system structures therefor in image databases
- G06F17/30247—Information retrieval; Database structures therefor; File system structures therefor in image databases based on features automatically derived from the image data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30781—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F17/30784—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
- G06F17/30799—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre using low-level visual features of the video content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/20—Image acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2127—Bluffing
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Uddin et al. | A survey on the adoption of blockchain in iot: Challenges and solutions | |
US11323269B2 (en) | Preserving privacy of linked cross-network transactions | |
US11201726B2 (en) | Multi-layered image encoding for data block | |
CN111951003A (en) | Cognitive system for managing consent to user data | |
US20230161894A1 (en) | Protecting Sensitive Data | |
AU2021210206B2 (en) | Index structure for blockchain ledger | |
US11949794B2 (en) | Data anonymization of blockchain-based processing pipeline | |
US11303446B2 (en) | Prevention of majority attacks | |
US10956204B1 (en) | Free-riding node identification for blockchain | |
US11838400B2 (en) | Image encoding for blockchain | |
Kamal et al. | A review study on blockchain-based IoT security and forensics | |
US11314729B2 (en) | Multi-candidate data structure for transaction validation | |
US11455403B2 (en) | Privacy-preserving document sharing | |
US11228424B2 (en) | Blu-ray copy service | |
Ottakath et al. | Enhanced computer vision applications with blockchain: A review of applications and opportunities | |
George et al. | MediTrans—Patient‐centric interoperability through blockchain | |
US11310311B2 (en) | Media obfuscation | |
US11792022B2 (en) | Resolution of conflicting data | |
WO2021116813A1 (en) | Anonymization of partners | |
Rathore et al. | An evolutionary algorithmic framework cloud based evidence collection architecture | |
Najmath et al. | Enhanced computer vision applications with blockchain: A review of applications and opportunities | |
US11379594B2 (en) | Media obfuscation | |
Shekar et al. | Securing personal identity using blockchain | |
Vadrevu et al. | A review on privacy preservation techniques in surveillance and health care data publication | |
Rajasekar et al. | Blackchain-based Identity Management Systems in Digital Forensics |