ANTI-SPOOFING SYSTEM AND METHODS USEFUL IN CONJUNCTION THEREWITH
First Claim
Patent Images
1. An anti-spoofing system operative for repulsing spoofing attacks in which an impostor presents a spoofed image of a registered end user, the system comprising:
- a plurality of spoof artifacts identifiers including a processor configured for identifying a respective plurality of spoofed image artifacts in each of a stream of incoming images; and
a decision maker configured to determine an individual image in the stream is authentic only if a function of artifacts identified therein is less than a threshold criterion.
1 Assignment
0 Petitions
Accused Products
Abstract
An anti-spoofing system operative for repulsing spoofing attacks in which an impostor presents a spoofed image of a registered end user, the system comprising a plurality of spoof artifact identifiers including a processor configured for identifying a respective plurality of spoofed image artifacts in each of a stream of incoming images and a decision maker including a processor configured to determine an individual image in the stream is authentic only if a function of artifacts identified therein is less than a threshold criterion.
-
Citations
19 Claims
-
1. An anti-spoofing system operative for repulsing spoofing attacks in which an impostor presents a spoofed image of a registered end user, the system comprising:
-
a plurality of spoof artifacts identifiers including a processor configured for identifying a respective plurality of spoofed image artifacts in each of a stream of incoming images; and a decision maker configured to determine an individual image in the stream is authentic only if a function of artifacts identified therein is less than a threshold criterion. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 14, 15, 17, 18)
-
- 10. A repository, in computer storage, of spoofed facial images generated using a mobile device to image a spoof of a human face rather than the human face itself.
-
13. A repository, in computer storage, of spoofed facial images generated in the wild.
-
16. An anti-spoofing method operative for repulsing spoofing attacks in which an impostor presents a spoofed image of a registered end user, the method comprising:
-
Providing a plurality of spoof artifact identifiers including a processor configured for identifying a respective plurality of spoofed image artifacts in each of a stream of incoming images; and Determining an individual image in the stream is authentic only if a function of artifacts identified therein is less than a threshold criterion.
-
-
19. A computer program product, comprising a non-transitory tangible computer readable medium having computer readable program code embodied therein, said computer readable program code adapted to be executed to implement a method for anti-spoofing operative for repulsing spoofing attacks in which an impostor presents a spoofed image of a registered end user, the method comprising:
-
Providing a plurality of spoof artifact identifiers including a processor configured for identifying a respective plurality of spoofed image artifacts in each of a stream of incoming images; and Determining an individual image in the stream is authentic only if a function of artifacts identified therein is less than a threshold criterion.
-
Specification