G06V30/18143

KEY-POINT ASSOCIATING APPARATUS, KEY-POINT ASSOCIATING METHOD, AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM
20260051145 · 2026-02-19 · ·

A key-point associating apparatus acquires a target image on which one or more persons are captured, detects key-points from the target image, and generates a spatial feature map for each one of pairs of the body parts. The spatial feature map includes a first direction region for each key-point that represents a first body part of the corresponding pair and the second direction region for each key-points that represents a second body part of the corresponding pair. The first and second direction regions belonging to a same person as each other represent a direction from the key-point of the first direction region to the key-point of the second direction region. The key-point associating apparatus generates a key-point group for each one of the persons captured on the target image.

Method and apparatus for processing document image based on text recognition and image division, and electronic device

In a method for processing a document image, a document image to be processed is acquired. Text nodes of multiple granularities, visual nodes of multiple granularities, respective node information of the text nodes, and respective node information of the visual nodes in the document image are obtained. A multi-granularity and multi-modality document graph is construct based on the text nodes of multiple granularities, the visual nodes of multiple granularities, the respective node information of the text nodes and the respective node information of the visual nodes. Multi-granularity semantic feature information of the document image is determined based on the multi-granularity and multi-modality document graph, the respective node information of the text nodes and the respective node information of the visual nodes.

Model for Detecting Phishing URLS
20260039694 · 2026-02-05 ·

Methods, storage systems and computer program products implement embodiments of the present invention for protecting a computing device. These embodiments include detecting that a digital communication is received by the computing device, the digital communication including a Uniform Resource Locator (URL) for a web page in a first domain. The web page is retrieved from the domain, and a set of keywords are extracted from the retrieved web page. A query included the set of keywords is submitted to a search engine, and a response to the query is received from the search engine, the response indicating a set of second domains and their respective rankings. An alert is generated if it is determined that a ranking associated with a second domain corresponding to the first domain does not satisfy a specified ranking threshold

Information extraction from documents containing handwritten text

A method, computer system, and a computer program product for information extraction is provided. The present invention may include receiving, by a handwriting detection model of an integrated system, a mixed-text document including a combination of typed text and handwritten text, where the received mixed-text document includes at least one key-value pair. The present invention may also include receiving, by the handwriting detection model of the integrated system, a first location information of at least one key from the at least one key-value pair in the received mixed-text document. The present invention may further include detecting, by the handwriting detection model of the integrated system, at least one handwritten text in the received mixed-text document based on the received first location information of the at least one key.

USER INTERFACES FOR DETECTING OBJECTS

In some embodiments, a computer system detects objects such as physical objects and/or one or more people in the physical environment of the electronic device. In some embodiments, the computer system presents indications of characteristics of the physical objects and/or people. In some embodiments, the physical objects are entry points to physical locations. In some embodiments, the physical objects are people in the physical environment of the computer system.