Pedersen et al., 2016 - Google Patents
Vision Security–the role of imaging for observer and observedPedersen et al., 2016
View PDF- Document ID
- 5372071475330302116
- Author
- Pedersen M
- Hardeberg J
- Busch C
- Publication year
- Publication venue
- Electronic Imaging
External Links
Snippet
Vision Security is the topic area that covers the intersection of Security with the human, who is the observed or the observing data subject, and who is most commonly the final user, customer or beneficiary of Security. For humans, the visual system is the main channel …
- 238000003384 imaging method 0 title abstract description 31
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00268—Feature extraction; Face representation
- G06K9/00281—Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/20—Image acquisition
- G06K9/2018—Identifying/ignoring parts by sensing at different wavelengths
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00597—Acquiring or recognising eyes, e.g. iris verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00885—Biometric patterns not provided for under G06K9/00006, G06K9/00154, G06K9/00335, G06K9/00362, G06K9/00597; Biometric specific functions not specific to the kind of biometric
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR OF PAPER CURRENCY OR SIMILAR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency
- G07D7/20—Testing patterns thereon, e.g. recognition of patterns, image processing, comparing to a reference in a memory
- G07D7/2025—Pattern matching
- G07D7/2058—Pattern matching matching a template
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR OF PAPER CURRENCY OR SIMILAR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency
- G07D7/06—Testing specially adapted to determine the identity or genuineness of paper currency or similar valuable papers, e.g. for segregating those which are unacceptable or alien to a currency using wave or particle radiation, e.g. radiating waves onto the banknote
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2207/00—Indexing scheme for image analysis or image enhancement
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Galbally et al. | Image quality assessment for fake biometric detection: Application to iris, fingerprint, and face recognition | |
Raghavendra et al. | Presentation attack detection for face recognition using light field camera | |
Li et al. | Replayed video attack detection based on motion blur analysis | |
Raja et al. | Video presentation attack detection in visible spectrum iris recognition using magnified phase information | |
Farmanbar et al. | Spoof detection on face and palmprint biometrics | |
US10061996B1 (en) | Face recognition method and system for personal identification and authentication | |
Liu et al. | Detect image splicing with artificial blurred boundary | |
Gonzalez et al. | Hybrid two-stage architecture for tampering detection of chipless ID cards | |
KR102038576B1 (en) | Method of detecting fraud of an iris recognition system | |
Kim et al. | Face spoofing detection with highlight removal effect and distortions | |
Akhtar et al. | Robustness of multi-modal biometric systems under realistic spoof attacks against all traits | |
Thamaraimanalan et al. | Multi biometric authentication using SVM and ANN classifiers | |
CN116383791A (en) | Customer identity authentication method, device, electronic equipment and medium | |
Bakshi et al. | An efficient face anti-spoofing and detection model using image quality assessment parameters | |
Ma et al. | Multi-perspective dynamic features for cross-database face presentation attack detection | |
Ashok et al. | Deepfake Detection Using XceptionNet | |
Destruel et al. | Color noise-based feature for splicing detection and localization | |
Benlamoudi | Multi-modal and anti-spoofing person identification | |
Edmunds et al. | Fake face detection based on radiometric distortions | |
González et al. | Towards refining ID cards presentation attack detection systems using face quality index | |
Busch | Challenges for automated face recognition systems | |
Nourmohammadi-Khiarak et al. | An ear anti-spoofing database with various attacks | |
Pedersen et al. | Vision Security–the role of imaging for observer and observed | |
Namis et al. | Face Morphing Attacks Detection Approaches: A Review | |
Maphisa et al. | Face Anti-spoofing based on Convolutional Neural Networks |