H04N1/32283

SYSTEMS AND METHODS FOR IDENTIFYING NON-COMPLIANT IMAGES USING NEURAL NETWORK ARCHITECTURES
20210232620 · 2021-07-29 · ·

Systems and methods including one or more processors and one or more non-transitory storage devices storing computing instructions configured to run on the one or more processors and perform: receiving images at an electronic platform; generating, using a fingerprinting network associated with a neural network architecture, feature embeddings corresponding to the images; generating, using the fingerprinting network, codes based on the feature embeddings; storing the codes in one or more databases; receiving, using a search component associated with the electronic platform, a non-compliant image comprising non-compliant content; and searching the codes in the one or more databases to identify one or more of the images that include non-compliant content similar to, or the same as, the non-compliant content included in the non-compliant image. Other embodiments are disclosed herein.

SYSTEMS AND METHODS FOR IDENTIFYING NON-COMPLIANT IMAGES USING NEURAL NETWORK ARCHITECTURES
20230403363 · 2023-12-14 · ·

A system comprising one or more processors and one or more non-transitory computer-readable media storing computing instructions that, when executed on the one or more processors, cause the one or more processors to perform operations comprising: generating, using a fingerprinting network associated with a neural network architecture, feature embeddings corresponding to images; receiving, at an electronic platform, a first non-compliant image; identifying first non-compliant content in the first non-compliant image; and identifying, using multi-modal search options and codes based on the feature embeddings, one or more of the images comprising non-compliant content corresponding to the first non-compliant content in the first non-compliant image. Other embodiments are disclosed herein.

SYSTEMS AND METHODS FOR AUTHENTICATING AN IMAGE

An image capturing device may capture image data for processing to form an image. The image capturing device may perform a hashing procedure on the image data, wherein performing the hashing procedure generates a hash value of the image data. The image capturing device may provide, to an image authentication device, the hash value of the image data, wherein the hash value of the image data is to be used by the image authentication device to validate the image based on a request to authenticate the image received from a receiving device. The image capturing device may process the image data to form the image for display to a user. The image capturing device may provide, after providing the hash value of the image data to the image authentication device, the image for display to the user.

METHODS AND APPARATUS TO IDENTIFY MEDIA USING HYBRID HASH KEYS
20230412737 · 2023-12-21 ·

Apparatus, system, methods, and articles of manufacture are disclosed to identify media using hash keys. An example system includes a hybrid hash key analyzer to access a metered hash key of an exposure record obtained from a meter, access reference records representative of respective portions of a plurality of media, and determine reference confirmation data candidates from respective ones of the reference records that include hash keys matching the metered hash key. The example system includes an impression logger to, when first confirmation data associated with the exposure record matches one of the reference confirmation data candidates, store an impression record that associates the media identification data associated with the matching one of the reference confirmation data candidates with a meter identifier of the exposure record. The impression logger also is to credit at least a portion of the media corresponding to the media identification data with an exposure credit.

Systems and methods for authenticating an image

An image capturing device may capture image data for processing to form an image. The image capturing device may perform a hashing procedure on the image data, wherein performing the hashing procedure generates a hash value of the image data. The image capturing device may provide, to an image authentication device, the hash value of the image data, wherein the hash value of the image data is to be used by the image authentication device to validate the image based on a request to authenticate the image received from a receiving device. The image capturing device may process the image data to form the image for display to a user. The image capturing device may provide, after providing the hash value of the image data to the image authentication device, the image for display to the user.

System, method of detecting alternation of printed matter, and storage medium
10893162 · 2021-01-12 · ·

A system includes circuitry configured to embed a digital watermark data in an original image, wherein the original image is divided into a plurality of blocks each block having been embedded with a pattern corresponding to each value of the digital watermark data, store, in a memory, the original image, the digital watermark data embedded in the original image, and an embedding position of the pattern of the digital watermark data in association, detect a pattern in a scanned image of a printed matter, decode the detected pattern to acquire digital watermark data included in the scanned image, align each block between the original image and the scanned image, based on the embedding position of the pattern associated with the original image and a detection position of the pattern detected from the scanned image, and obtain a difference between the original image and the scanned image aligned with each other.

Health Monitoring System Including Privacy-Ensuring Obfuscated Camera Images

The unobtrusive health-monitoring apparatus includes a camera, a controller, a data transmission port, and, optionally, a graphics processing unit (GPU) which executes nonlinear transformation algorithms. The camera may be inconspicuously disposed within a fixture in the room. The camera collects graphic data which may include still images or video of the user, or both. The GPU may execute the nonlinear transformation algorithms which may transform the graphic data into formats which cannot be recognized by humans. However, these formats preserve features that can be parsed by machine learning methods and used for health tracking purposes. The formats cannot be parsed by humans or be converted back to the original image or video by mathematical inversion or available computational methods. User privacy is thus preserved. The graphic data may be transmitted to a remote processor. The remote processor may perform algorithms which create a health status analyses.

Converting biometric data into two-dimensional images for use in authentication processes
10805501 · 2020-10-13 · ·

Methods and systems for converting biometric data into two-dimensional images for use in authentication processes are described. Biometric data is received and then hashed into a string of characters. A 2-D image is created based on the hashed string of characters. The 2-D image is then provided for printing on a personal transaction card.

METHODS FOR REQUESTING AND AUTHENTICATING PHOTOGRAPHIC IMAGE DATA

A system and method include obtaining and authenticating image files from users such as insured users at the request of an entity such as an insurance provider. The requesting entity may supply an electronic address of the user and a unique identifier. The system may transmit a link to the electronic address. When selected, the link causes an image authentication application to be installed on a user device. The application takes the images securely and separately from a native camera application. Each image authentication application may be customized for each requesting entity. The authentication server may identify the requesting entity that made the request and identify a corresponding image authentication application to be provided to the electronic address. The images from the image authentication application may be authenticated via reverse image search, time, geolocation, and/or other information. The authenticated images and/or related data may be provided to the requesting entity.

INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, AND NON-TRANSITORY COMPUTER READABLE MEDIUM STORING INFORMATION PROCESSING PROGRAM FOR VERIFYING AN ELECTRONIC SIGNATURE
20200296253 · 2020-09-17 · ·

An information processing apparatus includes a calculation unit that calculates a hash value of an original image represented by electronic information to which an electronic signature is added in advance, and a storage unit that stores image information representing the original image and the hash value calculated by the calculation unit in association with the electronic information.