Patent classifications
G06V10/56
High efficiency dynamic contrast processing
A high efficiency method of processing images to provide perceptual high-contrast output. Pixel intensities are calculated by a weighted combination of a fixed number of static bounding rectangle sizes. This is more performant than incrementally growing the bounding rectangle size and performing expensive analysis on resultant histograms. To mitigate image artifacts and noise, blurring and down-sampling are applied to the image prior to processing.
System and method for determining situation of facility by imaging sensing data of facility
Embodiments relate to a method and system for determining a situation of a facility by imaging a sensing data of the facility including receiving sensing data through a plurality of sensors at a query time, generating a situation image at the query time, showing the situation of the facility at the query time based on the sensing data, and determining if an abnormal situation occurred at the query time by applying the situation image to a pre-learned situation determination model.
Context-aware text color recommendation system
Embodiments are disclosed for determining a context-aware text color recommendation for text at a text location on an image. In particular, in one or more embodiments, the disclosed systems and methods comprise obtaining an image and a text location on the image, identifying at least one color theme based on a color harmonic template associated with the image, modifying the at least one color theme based on characteristics of the image, determining accessibility for at least one color in the at least one color theme based on the text location on the image, and determining a color palette recommendation for text at the text location on the image based on the determined accessibility for the at least one color in the at least one color theme.
Context-aware text color recommendation system
Embodiments are disclosed for determining a context-aware text color recommendation for text at a text location on an image. In particular, in one or more embodiments, the disclosed systems and methods comprise obtaining an image and a text location on the image, identifying at least one color theme based on a color harmonic template associated with the image, modifying the at least one color theme based on characteristics of the image, determining accessibility for at least one color in the at least one color theme based on the text location on the image, and determining a color palette recommendation for text at the text location on the image based on the determined accessibility for the at least one color in the at least one color theme.
Method for simulating the rendering of a make-up product on a body area
A method for simulating a rendering of a makeup product on a body area including the steps of: acquiring an image of the body area without makeup of a subject, determining first color parameters of the pixels of the image corresponding to the body area without makeup, identifying the pixels of the body area without makeup exhibiting highest brightness or red component value, and determining second color parameters of the pixels of the image corresponding to the body area, wherein the second color parameters render a making up of the body area by the makeup product.
Method for simulating the rendering of a make-up product on a body area
A method for simulating a rendering of a makeup product on a body area including the steps of: acquiring an image of the body area without makeup of a subject, determining first color parameters of the pixels of the image corresponding to the body area without makeup, identifying the pixels of the body area without makeup exhibiting highest brightness or red component value, and determining second color parameters of the pixels of the image corresponding to the body area, wherein the second color parameters render a making up of the body area by the makeup product.
Under-screen fingerprint sensing device and fingerprint sensing method
An under-screen fingerprint sensing device and fingerprint sensing method are provided. The under-screen fingerprint sensing device includes a fingerprint sensor and a processor. The processor performs a first FFC on a first color original value, a second color original value, and a third color original value provided by the fingerprint sensor to determine whether a target object is a real finger. When the processor determines that the target object is an unreal finger, the processor performs a second FFC on the first color original value, the second color original value, and the third color original value to determine again whether the target object is the real finger.
Under-screen fingerprint sensing device and fingerprint sensing method
An under-screen fingerprint sensing device and fingerprint sensing method are provided. The under-screen fingerprint sensing device includes a fingerprint sensor and a processor. The processor performs a first FFC on a first color original value, a second color original value, and a third color original value provided by the fingerprint sensor to determine whether a target object is a real finger. When the processor determines that the target object is an unreal finger, the processor performs a second FFC on the first color original value, the second color original value, and the third color original value to determine again whether the target object is the real finger.
Method and apparatus for authenticating a user of a computing device
A system for authenticating a user attempting to access a computing device or a software application executing thereon. A data storage device stores one or more digital images or frames of video of face(s) of authorized user(s) of the device. The system subsequently receives from a first video camera one or more digital images or frames of video of a face of the user attempting to access the device and compares the image of the face of the user attempting to access the device with the stored image of the face of the authorized user of the device. To ensure the received video of the face of the user attempting to access the device is a real-time video of that user, and not a forgery, the system further receives a first photoplethysmogram (PPG) obtained from a first body part (e.g., a face) of the user attempting to access the device, receives a second PPG obtained from a second body part (e.g., a fingertip) of the user attempting to access the device, and compares the first PPG with the second PPG. The system authenticates the user attempting to access the device based on a successful comparison of (e.g., correlation between, consistency of) the first PPG and the second PPG and based on a successful comparison of the image of the face of the user attempting to access the device with the stored image of the face of the authorized user of the device.
Method and apparatus for authenticating a user of a computing device
A system for authenticating a user attempting to access a computing device or a software application executing thereon. A data storage device stores one or more digital images or frames of video of face(s) of authorized user(s) of the device. The system subsequently receives from a first video camera one or more digital images or frames of video of a face of the user attempting to access the device and compares the image of the face of the user attempting to access the device with the stored image of the face of the authorized user of the device. To ensure the received video of the face of the user attempting to access the device is a real-time video of that user, and not a forgery, the system further receives a first photoplethysmogram (PPG) obtained from a first body part (e.g., a face) of the user attempting to access the device, receives a second PPG obtained from a second body part (e.g., a fingertip) of the user attempting to access the device, and compares the first PPG with the second PPG. The system authenticates the user attempting to access the device based on a successful comparison of (e.g., correlation between, consistency of) the first PPG and the second PPG and based on a successful comparison of the image of the face of the user attempting to access the device with the stored image of the face of the authorized user of the device.