Facial recognition
First Claim
1. A method comprising:
- receiving, from an image capture device coupled to a computing device, a first image of a face of a user, and a second image of the face of the user;
identifying at least one facial landmark in the first image and at least one corresponding facial landmark in the second image;
extracting, by the computing device, a first sub-image from the first image, wherein the first sub-image represents a portion of the first image, and wherein the first sub-image includes a representation of the at least one facial landmark;
extracting, by the computing device, a second sub-image from the second image, wherein the second sub-image represents a portion of the second image, and wherein the second sub-image includes a representation of the at least one corresponding facial landmark;
detecting a facial gesture by determining, by the computing device, whether a sufficient difference exists between the second sub-image and the first sub-image to indicate the facial gesture;
determining, by the computing device, whether the first image of the face of the user and the second image of the face of the user are associated with a consistent user identity, based at least in part on determining whether a sufficient similarity exists between the first image of the face of the user and the second image of the face of the user; and
determining, based at least in part on detecting the facial gesture and on determining whether the first image of the face of the user and the second image of the face of the user are associated with the consistent user identity, whether to deny authentication to the user with respect to accessing one or more functionalities controlled by the computing device.
2 Assignments
0 Petitions
Accused Products
Abstract
An example method includes receiving first and second images of a face of a user, where one or both images have been granted a match by facial recognition. The method includes identifying at least one facial landmark in the first image and at least one corresponding facial landmark in the second image, and extracting a first sub-image from the first image, where the first sub-image includes a representation of the at least one facial landmark. The method includes extracting a second sub-image from the second image, where the second sub-image includes a representation of the at least one corresponding facial landmark, detecting a facial gesture by determining whether a sufficient difference exists between the second sub-image and first sub-image to indicate the facial gesture, and determining, based on detecting the facial gesture, whether to deny authentication to the user with respect to accessing functionalities controlled by the computing device.
281 Citations
25 Claims
-
1. A method comprising:
-
receiving, from an image capture device coupled to a computing device, a first image of a face of a user, and a second image of the face of the user; identifying at least one facial landmark in the first image and at least one corresponding facial landmark in the second image; extracting, by the computing device, a first sub-image from the first image, wherein the first sub-image represents a portion of the first image, and wherein the first sub-image includes a representation of the at least one facial landmark; extracting, by the computing device, a second sub-image from the second image, wherein the second sub-image represents a portion of the second image, and wherein the second sub-image includes a representation of the at least one corresponding facial landmark; detecting a facial gesture by determining, by the computing device, whether a sufficient difference exists between the second sub-image and the first sub-image to indicate the facial gesture; determining, by the computing device, whether the first image of the face of the user and the second image of the face of the user are associated with a consistent user identity, based at least in part on determining whether a sufficient similarity exists between the first image of the face of the user and the second image of the face of the user; and determining, based at least in part on detecting the facial gesture and on determining whether the first image of the face of the user and the second image of the face of the user are associated with the consistent user identity, whether to deny authentication to the user with respect to accessing one or more functionalities controlled by the computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 24, 25)
-
-
22. A computing device comprising:
-
a memory, at least one processor; at least one image capture device operable by the at least one processor to capture a first image of a face of a user, and a second image of the face of the user; a facial recognition module operable by the at least one processor to grant a match, by facial recognition, to at least one of the first image and the second image; a landmark detection module operable by the at least one processor to identify at least one facial landmark in the first image and at least one corresponding facial landmark in the second image; a sub-image extraction module operable by the at least one processor to; extract a first sub-image from the first image, wherein the first sub-image represents a portion of the first image, and wherein the first sub-image includes a representation of the at least one facial landmark, and extract a second sub-image from the second image, wherein the second sub-image represents a portion of the second image, and wherein the second sub-image includes a representation of the at least one corresponding facial landmark; and an anti-spoofing module operable by the at least one processor to; detect a facial gesture by determining whether a sufficient difference exists between the second sub-image and the first sub-image to indicate the facial gesture, determine whether the first image of the face and the second image of the face are associated with a consistent user identity, based at least in part on determining whether a sufficient similarity exists between the first image of the face of the user and the second image of the face of the user, and determine, based at least in part on detecting the facial gesture and on determining whether the first image of the face and the second image of the face are associated with the consistent user identity, whether to deny authentication to the user with respect to accessing one or more functionalities controlled by the computing device.
-
-
23. A computer-readable storage device encoded with instructions that, when executed, cause one or more processors of a computing device to perform operations comprising:
-
receiving, from an image capture device coupled to the computing device, a first image of a face of a user, and a second image of the face of the user; identifying at least one facial landmark in the first image and at least one corresponding facial landmark in the second image; extracting, by the computing device, a first sub-image from the first image, wherein the first sub-image represents a portion of the first image, and wherein the first sub-image includes a representation of the at least one facial landmark; extracting, by the computing device, a second sub-image from the second image, wherein the second sub-image represents a portion of the second image, and wherein the second sub-image includes a representation of the at least one corresponding facial landmark; detecting a facial gesture by determining, by the computing device, whether a sufficient difference exists between the second sub-image and the first sub-image to indicate the facial gesture; determining whether the first image of the face and the second image of the face are associated with a consistent user identity, based at least in part on determining whether a sufficient similarity exists between the first image of the face of the user and the second image of the face of the user; and determining, based at least in part on detecting the facial gesture and on determining whether the first image of the face and the second image of the face are associated with the consistent user identity, whether to deny authentication to the user with respect to accessing one or more functionalities controlled by the computing device.
-
Specification