G06K9/38

CENTRIFUGAL PROTECTIVE BLOWER
20210246904 · 2021-08-12 ·

A centrifugal protective hair blower, comprising a plastic shell for wrapping powered devices of the blower, wherein the plastic shell is made of polycarbonate casting; an electric heating device which is arranged in the plastic shell of the hair blower, composed of a two to three sections electric heating wire, and is used to control the blowing temperature of the hair blower; a hemispherical picture-shooting mechanism, which includes a trailing measurement device, an image interception device, a data analysis device, a DC drive motor, an optical filter, optical lens and an image sensing device; an electric heating device, which is connected with a vector analysis device, and is used to reduce the blowing temperature of the hair blower when the target type is a cat, a dog or a rabbit. Through the present invention, it is capable of preventing the hair blower from causing unwarranted injury to surrounding pets.

Method and device for acquiring slant value of slant image, terminal and storage medium

A method, a device, a terminal and a storage medium for acquiring slant value of slant image are provided. The method for acquiring slant value of a slant image comprises: analyzing the slant image and acquiring coordinate information of a plurality of boundary lines of the slant image; acquiring first slant values of the boundary lines by analysing and calculating the coordinate information; acquiring a correction value; calculating difference values between the first slant values and the correction value respectively; determining the first slant value corresponding to the minimum difference value as the slant value of the slant image. The technical solution of the present disclosure can uniquely determine a slant value of slant image.

Verification of a security document

A method for verifying a security document by means of a reading device wherein first transmission and/or reflection properties of a first region of the security document are detected in a first spectral range by the reading device and a first data set specifying these properties is generated therefrom, wherein the first region at least in some regions overlaps an optical security element arranged on the security document or embedded in the security document and wherein second transmission and/or reflection properties of the first region of the security document are detected in a second spectral range by the reading device and a second data set specifying these properties is generated therefrom, wherein the first spectral range differs from the second spectral range, and wherein, the authenticity of the security document and/or of the security element is checked on the basis of at least the first data set and the second data set.

Method of living body detection and terminal device

A method of living body detection performed with a terminal device includes the following operations. A first image for a target object is obtained via a camera at a first focal length, and a second image for the target object is obtained via the camera at a second focal length. A difference image of the first image and the second image is determined. Whether the target object is a living body is determined according to the difference image.

Method and apparatus for processing distortion of fingerprint image

The present invention relates to a method and an apparatus for processing a distortion of a fingerprint image. An electronic device according to various embodiments of the present invention comprises: a housing; a transparent member which forms at least a part of an outer surface of the electronic device and is arranged in at least a part of the housing; a display (160) of which at least a part is accommodated in the housing and which is arranged in at least a partial area of the transparent member; a fingerprint sensor formed in at least a partial area of the display; and a processor connected with the display and the fingerprint sensor, wherein the processor can be configured to confirm status information related to contamination of at least a partial area, of the transparent member, corresponding to the fingerprint sensor, by using the fingerprint sensor, to acquire bio-information through at least a partial area, of the transparent member, corresponding to the fingerprint sensor, by using the fingerprint sensor, and to recognize the bio-information on the basis of the status information.

Background noise reduction using a variable range of color values dependent upon the initial background color distribution

A method to reduce background noise in a document image. The method includes extracting, from the document image, a connected component corresponding to a background of the document image, generating a histogram of pixel values of the connected component, generating, using a non-linear mapping function based on the histogram, a non-linear probability distribution of the pixel values in the connected component, generating, based at least on a comparison between the non-linear probability distribution and a predetermined threshold, a replacement range of the pixel values, selecting, from the connected component, a pixel having a pixel value within the replacement range, and converting the pixel value of the pixel to a uniform background color.

Liveness detection in fingerprint-based biometric systems

A fingerprint-based biometric system is used in security applications. To distinguish between live and spoof fingerprints, fundamental fingerprint features such as ridge contours are used. Ridge-valley contrast and ridge orientation, i.e., directional field of ridges, are extracted in spatial and frequency domains. Both feature sets are then quantized, and the quantized feature set is then integrated to populate a 2D histogram to represent the fundamental feature set extracted against a single fingerprint image. The extracted fundamental feature sets are used to discriminate between live and spoof fingerprints.

Machine Learning-Based Root Cause Analysis of Process Cycle Images
20210241048 · 2021-08-05 · ·

The technology disclosed relates to classification of process cycle images to predict success or failure of process cycles. The technology disclosed includes capturing and processing images of sections arranged on an image generating chip in genotyping process. Image description features of production cycle images are created and given as input to classifiers. A trained classifier separates successful production images from unsuccessful or failed production images. The failed production images are further classified by a trained root cause classifier into various categories of failure.

PREVENTING FEATURE LOSS WHEN COMPRESSING IMAGES
20210295570 · 2021-09-23 ·

In an approach to image compression while retaining feature information at original coordinates, one or more computer processors compress an image while retaining pattern and feature information at original coordinates, wherein the image is a full resolution 3D image. The one or more computer processors create one or more image subsets based on the one or more determined regions of interest identified by utilizing a first pass selection of the regions of interest based on the compressed image. The one or more computer processors train one or more models based the created one or more image subsets that contain one or more regions of interest based on the compressed image.

METHODS, SYSTEMS AND APPARATUS TO IMPROVE IMAGE CLASSIFICATION WITH BOUNDARY-BITMAPS
20210182595 · 2021-06-17 ·

Methods, systems, apparatus and articles of manufacture are disclosed herein to improve image classification with boundary-bitmaps. An example disclosed apparatus includes a silhouette engine to identify a foreground silhouette within the image, generate a bounding box based on borders of the foreground silhouette, and generate an encoded silhouette matrix which identifies cells of a foreground and cells of a background, a convolution cell selector to convolve the encoded silhouette matrix to generate a convoluted bitmap matrix, and a filter cell selector to improve image classification efficiency by identifying eligible blocks of the convoluted bitmap matrix by retaining first respective cells of the convoluted bitmap matrix that satisfy a cell retention threshold, and removing second respective cells of the convoluted bitmap matrix that do not satisfy the cell retention threshold.