[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Pedersen et al., 2016 - Google Patents

Vision Security–the role of imaging for observer and observed

Pedersen et al., 2016

View PDF
Document ID
5372071475330302116
Author
Pedersen M
Hardeberg J
Busch C
Publication year
Publication venue
Electronic Imaging

External Links

Snippet

Vision Security is the topic area that covers the intersection of Security with the human, who is the observed or the observing data subject, and who is most commonly the final user, customer or beneficiary of Security. For humans, the visual system is the main channel …
Continue reading at library.imaging.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00268Feature extraction; Face representation
    • G06K9/00281Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00288Classification, e.g. identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/20Image acquisition
    • G06K9/2018Identifying/ignoring parts by sensing at different wavelengths
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00597Acquiring or recognising eyes, e.g. iris verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00885Biometric patterns not provided for under G06K9/00006, G06K9/00154, G06K9/00335, G06K9/00362, G06K9/00597; Biometric specific functions not specific to the kind of biometric
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR OF PAPER CURRENCY OR SIMILAR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency
    • G07D7/20Testing patterns thereon, e.g. recognition of patterns, image processing, comparing to a reference in a memory
    • G07D7/2025Pattern matching
    • G07D7/2058Pattern matching matching a template
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR OF PAPER CURRENCY OR SIMILAR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency
    • G07D7/06Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency using wave or particle radiation, e.g. radiating waves onto the banknote
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Similar Documents

Publication Publication Date Title
Galbally et al. Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition
Raghavendra et al. Presentation attack detection for face recognition using light field camera
Li et al. Replayed video attack detection based on motion blur analysis
Raja et al. Video presentation attack detection in visible spectrum iris recognition using magnified phase information
US10061996B1 (en) Face recognition method and system for personal identification and authentication
Gonzalez et al. Hybrid two-stage architecture for tampering detection of chipless id cards
KR102038576B1 (en) Method of detecting fraud of an iris recognition system
Kim et al. Face spoofing detection with highlight removal effect and distortions
Thamaraimanalan et al. Multi biometric authentication using SVM and ANN classifiers
Akhtar et al. Robustness of multi-modal biometric systems under realistic spoof attacks against all traits
CN116383791A (en) Customer identity authentication method, device, electronic equipment and medium
Ma et al. Multi-perspective dynamic features for cross-database face presentation attack detection
Geradts et al. Interpol review of forensic video analysis, 2019–2022
Bakshi et al. An efficient face anti-spoofing and detection model using image quality assessment parameters
Benlamoudi Multi-modal and anti-spoofing person identification
Destruel et al. Color noise-based feature for splicing detection and localization
Edmunds et al. Fake face detection based on radiometric distortions
Nourmohammadi-Khiarak et al. An ear anti-spoofing database with various attacks
Pedersen et al. Vision Security–the role of imaging for observer and observed
Maurya et al. Spoofed Video Detection Using Histogram of Oriented Gradients
Ghaffar et al. Presentation attack detection for face recognition on smartphones: a comprehensive review
Merkle et al. Face morphing detection: issues and challenges
CN118230395B (en) Human face recognition method and device based on INSIGHTFACE and LIS file management
Dostal et al. HLFSIM: Objective image quality metric based on ROI analysis
Priyanka et al. Genuine selfie detection algorithm for social media using image quality measures