Acquisti et al., 2014 - Google Patents
Face recognition and privacy in the age of augmented realityAcquisti et al., 2014
View PDF- Document ID
- 2362110499429628561
- Author
- Acquisti A
- Gross R
- Stutzman F
- Publication year
- Publication venue
- Journal of Privacy and Confidentiality
External Links
Snippet
We investigate the feasibility of combining publicly available Web 2.0 data with off-the-shelf face recognition software for the purpose of large-scale, automated individual re- identification. Two experiments illustrate the ability of identifying strangers online (on a …
- 230000003190 augmentative 0 title abstract description 9
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00268—Feature extraction; Face representation
- G06K9/00281—Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/68—Methods or arrangements for recognition using electronic means using sequential comparisons of the image signals with a plurality of references in which the sequence of the image signals or the references is relevant, e.g. addressable memory
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6288—Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion
- G06K9/6292—Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion of classification results, e.g. of classification results related to same input data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/20—Image acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00852—Recognising whole cursive words
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Acquisti et al. | Face recognition and privacy in the age of augmented reality | |
US11611553B2 (en) | Online identity verification platform and process | |
Lee | Facebook nation | |
US11936648B2 (en) | Methods and apparatus for allowing users to control use and/or sharing of images and/or biometric data | |
US11423126B2 (en) | Computerized system and method for modifying a media file by automatically applying security features to select portions of media file content | |
Liu et al. | Privacy intelligence: A survey on image privacy in online social networks | |
Welinder | A face tells more than a thousand posts: developing face recognition privacy in social networks | |
Lu et al. | Privacy information security classification study in internet of things | |
Shoshitaishvili et al. | Portrait of a privacy invasion | |
Al-Rousan et al. | Social-guard: Detecting scammers in online dating | |
Welinder | Facing real-time identification in mobile apps & wearable computers | |
BĂLŢOI | Integration of Emerging Technologies into Social Networks. | |
Acquisti et al. | Faces of Facebook | |
Hu et al. | Photo crowdsourcing based privacy-protected healthcare | |
Aïmeur | Online privacy: risks, challenges, and new trends | |
Nandhini et al. | Profile similarity technique for detection of duplicate profiles in online social network | |
Selvadurai | Not just a face in the crowd: addressing the intrusive potential of the online application of face recognition technologies | |
Rosenblatt | Is Facebook's facial-scanning technology invading your privacy rights? | |
Anand V et al. | PeopleXploit--A hybrid tool to collect public data | |
Acquisti | Future of Privacy Forum 919 18th Street, NW, Suite 901 Washington, DC 20006 | |
Parimala et al. | Survey on Image Authentication and Privacy in Public Networks | |
Abhijit et al. | AR CARD: Interactive Cards using Augmented Reality | |
Gangloff | Human rights to data | |
Rhinelander et al. | Clearview AI: ethics and artificial intelligence technology | |
Wehle | Anonymity, Faceprints, and the Constitution |