Abstract:
A method for updating biometric authentication data authenticates an input image using an enrollment database (DB) over a first length of time, the authentication including generating information for authenticating the input image, and updates the enrollment DB based on the first length time and the information for authenticating the input image.
Abstract:
A method of preprocessing an image including biological information is disclosed, in which an image preprocessor may set an edge line in an input image including biological information, calculate an energy value corresponding to the edge line, and adaptively crop the input image based on the energy value.
Abstract:
A recognizer training method and apparatus includes selecting training data, generating clusters by clustering the selected training data based on a global shape parameter, and classifying training data from at least one cluster based on a local shape feature.
Abstract:
At least some example embodiments disclose a method and apparatus for facial recognition. The facial recognition method includes detecting initial landmarks from a facial image, first normalizing the facial image using the initial landmarks, updating a position of at least one of intermediate landmarks based on the first normalizing, the intermediate landmarks being landmarks transformed from the initial landmarks through the first normalizing, second normalizing the facial image after the updating and recognizing a face using a feature of the second normalized facial image.
Abstract:
A liveness testing apparatus includes a testing circuit. The testing circuit is configured to test a liveness of an object included in a received input image based on whether an image of the object has a characteristic indicative of a flat surface or a characteristic indicative of a three-dimensional (3D) structure.
Abstract:
The disclosure relates to a 5G communication system or a 6G communication system for supporting higher data rates beyond a 4G communication system such as long term evolution (LTE). Disclosed is a method performed by a terminal, which includes generating application process state (APS) information indicating whether data generated by at least one application of the terminal is data generated in a background process or data generated in a foreground process; and transmitting a control signal including the APS information to a base station.
Abstract:
The present disclosure relates to a 5G or a 6G communication system for supporting higher data rates beyond a 4G communication system such as LTE. The present disclosure provides a method for an AI-based CSI report in a 5G or 6G communication system. The method performed by a base station in a wireless communication system include receiving capability information indicating whether the UE supports generation of AI-based CSI, receiving information on a change in inference time related to the AI-based CSI generation and information on a change in a channel state, based on the capability information, identifying information on a CSI report timing, based on the information on the change in the inference time and the change in the channel state, transmitting RRC configuration information including the CSI report timing, transmitting a CSI-RS, and receiving the CSI report based on the CSI-RS and the information on the CSI report timing.
Abstract:
A fingerprint verification method includes selecting one or more first fingerprint groups from among a plurality of fingerprint groups based on an input fingerprint image, each fingerprint group of the plurality of fingerprint groups including partial fingerprint images; and determining whether verification is successful based on the input fingerprint image and each of the partial fingerprint images included in the one or more first fingerprint groups.
Abstract:
An apparatus and method for detecting a fake fingerprint is disclosed. The apparatus may divide an input fingerprint image into blocks, determine an image quality assessment (IQA) value associated with each block, determine a confidence value based on the IQA values using a confidence determination model, and determine whether an input fingerprint in the input fingerprint image is a fake fingerprint based on the determined confidence value.
Abstract:
A fingerprint recognition method includes receiving an input partial image corresponding to a partial image of a fingerprint of a first user; partitioning the input partial image into a plurality of blocks; performing a comparison operation based on the plurality of blocks and the enrolled partial images corresponding to partial images of an enrolled fingerprint; and recognizing the fingerprint of the first user based on a result of the comparison operation.