Abstract:
A method for picture processing is described. A first tracking area is obtained. A second tracking area is also obtained. The method includes beginning to track the first tracking area and the second tracking area. Picture processing is performed once a portion of the first tracking area overlapping the second tracking area passes a threshold.
Abstract:
A method of generating metadata includes using at least one digital image to select at least one among a plurality of objects, wherein the at least one digital image depicts the plurality of objects in relation to a physical space. The method also includes, in response to the selecting at least one object, determining a position of the at least one object in a location space. The method also includes, based on said determined position, producing metadata that identifies one among a plurality of separate regions that divide the location space, wherein said plurality of separate regions includes regions of unequal size.
Abstract:
A method for picture processing is described. A first tracking area is obtained. A second tracking area is also obtained. The method includes beginning to track the first tracking area and the second tracking area. Picture processing is performed once a portion of the first tracking area overlapping the second tracking area passes a threshold.
Abstract:
A method of generating metadata includes using at least one digital image to select a plurality of objects, wherein the at least one digital image depicts the plurality of objects in relation to a physical space. The method also includes, by at least one processor and based on information indicating positions of the selected objects in a location space, producing metadata that identifies one among a plurality of candidate geometrical arrangements of the selected objects.
Abstract:
A method of generating metadata includes using at least one digital image to select a plurality of objects, wherein the at least one digital image depicts the plurality of objects in relation to a physical space. The method also includes, by at least one processor and based on information indicating positions of the selected objects in a location space, producing metadata that identifies one among a plurality of candidate geometrical arrangements of the selected objects.
Abstract:
A method for picture processing is described. A first tracking area is obtained. A second tracking area is also obtained. The method includes beginning to track the first tracking area and the second tracking area. Picture processing is performed once a portion of the first tracking area overlapping the second tracking area passes a threshold.
Abstract:
A method for picture processing is described. A first tracking area is obtained. A second tracking area is also obtained. The method includes beginning to track the first tracking area and the second tracking area. Picture processing is performed once a portion of the first tracking area overlapping the second tracking area passes a threshold.
Abstract:
Disclosed is a mobile device to provide continuous and discrete user authentication. The mobile device may include: a contextual sensor; a soft biometric sensor; and a processor. The processor may be configured to: implement a background authentication process in a continuous manner based upon a soft biometric input from the soft biometric sensor and a contextual input from the contextual sensor; determine an anomaly event; and based upon the anomaly event, request a discrete authentication input from the user.
Abstract:
A method of image retrieval includes obtaining information identifying a plurality of selected objects and selecting one among a plurality of candidate geometrical arrangements. This method also includes, by at least one processor, and in response to the selecting, identifying at least one digital image, among a plurality of digital images, that depicts the plurality of selected objects arranged according to the selected candidate geometrical arrangement.
Abstract:
One feature pertains to a method for extracting a secret key during a secure boot flow of an integrated circuit. Specifically, the secure boot flow includes powering ON a first volatile memory circuit to generate a plurality of initial logical state values, deriving secret data based on the plurality of initial logical state values, storing the secret data in a secure volatile memory circuit that is secured by a secure execution environment (SEE), clearing the plurality of initial logical state values in the first volatile memory circuit, executing a cryptographic algorithm at the SEE to extract a secret key based on the secret data, and storing the secret key in the secure volatile memory circuit. The secure boot flow controls access to the first volatile memory circuit to secure the secret data and the plurality of initial logical state values from the insecure applications.