Notification and Privacy Management of Online Photos and Videos
First Claim
1. A computer-implemented method, comprising:
- detecting a first feature from a first image belonging to an image source, wherein the first image comprises a tag and;
determining a first feature location of the first feature;
determining a first tag location of the tag;
extracting a first feature signature from the first feature based on a relationship between the first feature location and the first tag location;
detecting a second feature from a second image belonging to the image source;
extracting a second feature signature from the second feature;
performing a first comparison between the first feature signature and the second feature signature; and
deriving a first similarity score based on a result of the first comparison.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for notification and privacy management of online photos and videos are herein disclosed. According to one embodiment, a computer-implemented method includes detecting a first feature from a first image belonging to an image source. The first image includes a tag. The computer-implemented method further includes determining a first feature location of the first feature, determining a first tag location of the tag, extracting a first feature signature from the first feature based on a relationship between the first feature location and the first tag location, detecting a second feature from a second image belonging to the image source, extracting a second feature signature from the second feature, performing a first comparison between the first feature signature and the second feature signature, and deriving a first similarity score based on a result of the first comparison.
-
Citations
23 Claims
-
1. A computer-implemented method, comprising:
-
detecting a first feature from a first image belonging to an image source, wherein the first image comprises a tag and; determining a first feature location of the first feature; determining a first tag location of the tag; extracting a first feature signature from the first feature based on a relationship between the first feature location and the first tag location; detecting a second feature from a second image belonging to the image source; extracting a second feature signature from the second feature; performing a first comparison between the first feature signature and the second feature signature; and deriving a first similarity score based on a result of the first comparison. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer-implemented method, comprising:
-
deriving a true accept function based on deriving a plurality of true accept data points, wherein the plurality of true accept data points represents an identity of a test feature is common with an identity of a training feature; deriving a false accept function based on a plurality of false accept data points, wherein the plurality of false accept data points represents the identity of the test feature is different from the identity of a training feature; and deriving a threshold function based on the true accept function and the false accept function; - View Dependent Claims (22, 23)
-
Specification