WO2015020709A2 - Visual recognition system based on visually distorted image data - Google Patents

Visual recognition system based on visually distorted image data Download PDF

Info

Publication number
WO2015020709A2
WO2015020709A2 PCT/US2014/037462 US2014037462W WO2015020709A2 WO 2015020709 A2 WO2015020709 A2 WO 2015020709A2 US 2014037462 W US2014037462 W US 2014037462W WO 2015020709 A2 WO2015020709 A2 WO 2015020709A2
Authority
WO
WIPO (PCT)
Prior art keywords
image
camera
distorted
facial recognition
entering
Prior art date
Application number
PCT/US2014/037462
Other languages
French (fr)
Other versions
WO2015020709A3 (en
Inventor
Nicholas P. De Luca
Original Assignee
Cryovac, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cryovac, Inc. filed Critical Cryovac, Inc.
Publication of WO2015020709A2 publication Critical patent/WO2015020709A2/en
Publication of WO2015020709A3 publication Critical patent/WO2015020709A3/en

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/24Reminder alarms, e.g. anti-loss alarms
    • G08B21/245Reminder of hygiene compliance policies, e.g. of washing hands
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19678User interface
    • G08B13/19686Interfaces masking personal details for privacy, e.g. blurring faces, vehicle license plates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/50Maintenance of biometric data or enrolment thereof
    • G06V40/53Measures to keep reference information secret, e.g. cancellable biometrics

Definitions

  • the present invention relates to the field of visual recognition systems and processes, particularly as related to human identity.
  • Video surveillance is a standard practice for the purpose of monitoring human actions and behaviors. Cameras are now ubiquitous within public as well as private areas and are monitored both automatically as well as by human beings. Cameras are manufactured by a large number of companies, including Sony, Toshiba, Trendnet, Cisco, Logitech, and Uniden.
  • CMOS complementary metal-oxide semiconductor
  • CCD charge- coupled device
  • Kinect infrared versus visible light is measured.
  • Microsoft Corporation sells a camera called Kinect that includes a depth sensor camera based on using an infrared sensor.
  • the image can be analyzed to detect a face.
  • Image-based algorithms include Principal Component Analysis, Independent Component Analysis, Linear Discriminant Analysis, Evolutionary Pursuit Analysis, Elastic Bunch Graph Matching, Kernel Methods, Trace Transform, Radon Transform, Active Appearance Model, 3-D Morphable Model, 3-D Canonical Surface Data, Bayesian Framework, Support Vector Machine, Hidden Markova Models, Boosting and Ensemble Solutions.
  • Video-based solutions may also combine one or more of the above-identified image-based algorithms to process a video sequence.
  • the above-identified image-based algorithms require a focused image for processing.
  • the image analyzed and processed can be easily discerned by a human being from the image captured by the camera.
  • the image, once captured by the camera's sensor may be encrypted prior to or after transmission to the computer.
  • Images captured may be processed by humans or computers on site or at remote locations.
  • the images transmitted may be encrypted prior to transmission but must then be de-encrypted prior to analysis.
  • the images are stored electronically (such as on a memory card or on magnetic tape) and accessed over time.
  • VSS ® Vision Safety
  • a first aspect pertains to a facial recognition system comprising an optical image distorter, a camera, a processing algorithm, a data storage system, and a computer.
  • the optical image distorter occludes, blurs, filters, multiplies, segments, mirrors, lenses, or otherwise distorts the image.
  • the light entering the camera has passed through a lens just prior to entering the camera.
  • the light entering the camera has bounced off a mirrored surface just prior to entering the camera.
  • the mirrored surface is not flat.
  • one or more parts of the original image are sent to more than one camera.
  • the light entering the camera has passed through one or more lenses to create a blurred image just prior to entering the camera.
  • the light entering the camera passes through a diffraction grating just prior to entering the camera.
  • the light entering the camera passes through a light diffuser just prior to entering the camera.
  • the light entering the camera has passed through a multiple prism beam expander so as to distort the image just prior to entering the camera.
  • the light entering the camera has passed through an achromatic lens so as to distort the image just prior to entering the camera.
  • the light entering the camera has passed through color filters so as to distort the image just prior to entering the camera.
  • a second aspect of the invention is directed to a hand wash or hand sanitation compliance system wherein the association of an individual to the hand wash or hand sanitation compliance monitoring is done by using a facial recognition system that relies on a distorted image entering the camera.
  • the light entering the camera passes through one or more of the image distorters described herein.
  • a third aspect is directed to a facial recognition process, comprising: (A) acquiring an image of a face of an unidentified individual, the image being formed from light reflected from the face of the unidentified individual; (B) distorting the image of the face of the unidentified individual, by passing the reflected light through a distortion device which carries out an image distortion process to produce a distorted image corresponding with the face of the unidentified individual; (C) impinging the distorted image of the unidentified individual on a red green blue color filter array or a charge coupled device array, to form a digitized distorted image signal or an analog distorted image signal; (D) transmitting the digitized or analog distorted image signal to a computer for data storage and data processing, the computer having stored therein a plurality of digitized or analog distorted facial images of corresponding with the images of faces of a plurality of identified individuals; and (E) processing the digitized or analog distorted facial image of the unidentified individual in a manner so that the
  • the distorted image of the unidentified individual is encrypted, and the distorted images of the identified individuals are also encrypted.
  • the distorted image of the unidentified individual is processed by at least one algorithm selected from the group consisting of Principal Component Analysis, Independent Component Analysis, Linear Discriminant Analysis, Evolutionary Pursuit Analysis, Elastic Bunch Graph Matching, Kernel Methods, Trace Transform, Radon Transform, Active Appearance Model, 3-D Morphable Model, 3-D Canonical Surface Data, Bayesian Framework, Support Vector Machine, Hidden Markova Models, and Boosting and Ensemble Solutions.
  • the image distortion comprises at least one member selected from the group consisting of mirroring, occlusion, blurring, segmentation, color filtering, and shape distorting. [0028] In an embodiment, the distorted image is not recognizable when
  • the distorted image contains key attributes which are used to match the distorted image of the unidentified individual to a database of equally distorted images of identified individuals, so that a match can be made, resulting in the identification of the unidentified individual.
  • the facial recognition process is used in a hand wash compliance system including a sink, a hand sanitizer and a camera acquiring a distorted facial image of an unidentified individual.
  • the process is used in a hand wash compliance system including a sink, a hand sanitizer and a camera acquiring a visual identification of a tag or other transmission signal.
  • the visual recognition system comprises a standard video camera (generally a CMOS or CCD array), a physical visual distortion system placed between the camera and incoming light, a mathematical characterization of the distortion system in the form of an algorithm, and a facial recognition or other biometric recognition system.
  • the distortion system provides a singular or paired effect of occlusion, blurring, segmentation, multiplicity, color filtering, Sensing, mirroring, or other distortive effect that makes the camera output of human facial features or other biometric data impossible to recognize by a human being.
  • the distortive effect can be further characterized mathematically in part or in whole, and this characterization can be used partially or in whole to allow for faciai recognition or other biometric recognition by a computer system.
  • the system can be coupled to a database to correlate the analyzed images to the identification of people or physical objects.
  • the system is coupled with a monitoring system.
  • the monitoring system includes a hand wash compliance system and/or a hand sanitizing compliance system.
  • a recognition system is used to identify an individual within an environment that is sensitive to privacy, in an embodiment, the recognition system is used to identify the face of an individual within the privacy-sensitive environment.
  • light impinging the surface of the sensor is used to produce a distorted image of at least a portion of an individual, with the distorted image being unidentifiabie to a human observer thereof , but being identifiable to an automated identification system.
  • the automated identification system has the capacity to compare the distorted image to a catalog of distorted images of identified individuals.
  • the automated identification system has the capacity to identify the individual by reversing the distortion of the image to generate a reversed undistorted image, followed by comparing the reversed undistorted image to a catalog of undistorted images of identified individuals.
  • the distorted image is, through means of a software system, capable of comparing the distorted image to other distorted images.
  • the comparison can be made at high speed.
  • light impinging on the surface of the sensor is used to produce a distorted image that does not resemble a human face.
  • the distorted image may be converted back into an undistorted image of the subject matter from which the distorted image was prepared.
  • light impinging on the surface of the sensor is used to produce a distorted image that does not resemble the face of an individual to be identified, i.e., the distorted image cannot be used to create an identifiable biometric feature such as a human face.
  • the images obtained by the camera may be correlated to an individual's name or create a unique data set associated with an individual.
  • the processing of images obtained by the camera used in the following invention not require encryption prior to, during, or after processing by a local or remote computer.
  • facial recognition algorithms are used to analyze the images obtained. Brief Description of the Drawings
  • Fig. 1 is a schematic diagram of a prior art process by which images are acquired and processed with a traditional facial recognition system.
  • Fig. 2 is a schematic diagram of a working embodiment in which distorted images are acquired and processed to form a facial recognition system.
  • Fig. 3 is a schematic of a camera using a distortion element as in the embodiment of Fig. 2.
  • Figs. 4A, 4B, 4C, 4D, 4E, 4F, and 4G are illustrative of images acquired using the camera of Fig. 3 with various distortive elements of Fig. 2 in a system according to Fig. 2.
  • Fig. 5 illustrates the process by which the distorted images acquired and processed in accordance with Fig. 2 are processed to obtain the identity of an individual
  • Fig. 6 illustrates a hand wash compliance system integrating the facia! recognition system of Fig. 2.
  • Fig. 7 is an illustration of the process by which the data of the hand wash compliance system in Fig. 6 is stored and the associated data is stored.
  • Fig. 1 is a schematic diagram of a prior art process by which an image is acquired and processed with a traditional facial recognition system 1 .
  • Light 2 entering the camera lens 3 impinges a RGB (i.e., red green blue) color filter array 4 or CCD array 4 and is generally digitized in step 5.
  • RGB i.e., red green blue
  • This digitized or analog image signal is then transmitted to a computer 6 and further stored for processing on a storage medium such as a hard drive 7.
  • the storage may be encrypted in step 14 and additional processing of the images may require an encryption key 15.
  • step 8 Algorithms such as Principal Component Analysis, Independent Component Analysis, Linear Discriminant Analysis, Evolutionary Pursuit Analysis, Elastic Bunch Graph Matching, Kernel Methods, Trace Transform, Radon Transform, Active Appearance Model, 3-D Morphabfe Model, 3-D Canonical Surface Data, Bayesian Framework, Support Vector Machine, Hidden Markova Models, Boosting and Ensemble Solutions are used in step 8 to process the image data with algorithm(s) immediateiy prior to storage on the computer or the images are retrieved and processed to detect a face.
  • a database of images is accessed to compare the newly characterized image to the dataset and determine a relevant identity 9 or a non- matching or irrelevant identity 0.
  • an encrypted image may be transmitted to a web site. This matched pair is then sent to a server 12 and may be accessed by a user for viewing through an encrypted process 15.
  • a biasing factor 500 is not used.
  • Fig. 2 is a flow diagram of working process 300 wherein light 1 undergoes an image distortion process 301 prior to entering camera lens 3, with the resulting image data being received, digitized, transmitted to a computer, stored, encrypted (optional), retrieved, processed, and compared with images in a database, as per process 201 of Fig. 1.
  • Distortions 305 may include mirroring effects 302, occlusion effects 303, blurring 304, segmentation 305, color filtering 306, distortive lens effects 307, and/or any alternative or further distortion effect.
  • a blurred image 304 such as that created by using a pair of unfocused lenses.
  • the image obtained may then be processed using an algorithm such as those used in step 8 of Fig. 1 with a biasing factor 500 included. In this way, although the image is not recognizable when unencrypted, the key attributes used to match the image to a database of equally unfocused images remain the same and allow for a match.
  • FIG. 3 shows the structure of a camera 800 wherein light 1 bounces off of individual 400 illustrated as face 500, with redirected light 402 (i.e., reflected light 402) passing to and through distorter 301.
  • the segmentation 305 by distorter 301 produces distorted light 401 which passes through lens 3, thereafter impinging the CMOS sensor or CCD array 4.
  • the array is read with processor 5 which also transmits the signal digitally or serially.
  • Figs. 4A, 4B, 4C, 4D, 4E, 4F, and 4G are illustrative of the image acquired using the camera of Fig. 3 with distortive elements 305 and of an image that would normally appear as shown in Fig. 4 using the process of Fig. 1 , Fig. 4A shows no distorter 301 in effect, while Fig. 4B shows mirroring effects 302, Fig. 4C shows occlusion effects 303, Fig. 4D shows blurring 304, Fig. 4E shows segmentation 305, Fig. 4F shows color filtering 306, and Fig. 4G shows distortive lens effects 307.
  • the biasing 500 When processing facial images that have been distorted, the biasing 500 will be turned on and used in conjunction with the algorithms 8 to create a characterized "neutral image".
  • This "neutral image” although visually uncharacterizable by a human being and thus allowing for full privacy of any recorded image (whether decrypted or not) will have maintained the information required to form a
  • the facial characterization will not be.
  • Fig. 5 illustrates the process 300 by which the images obtained in the process illustrated in Fig. 2 are processed using a segmented distorted image 305 to obtain facial recognition characterization and identification 601.
  • Fig. 6 illustrates a hand wash compliance system integrating the facial recognition system of Fig. 2 consisting of a sink 802, a hand sanitizer 801 , a camera 800 that acquires one or more images of individual 400 with face 500 and hand/arm 804.
  • RFID transmitter and/or receiver 803 detects an RFID badge that is used to identify the individual by name and further associate the individual with distorted image data set 12.
  • Fig. 7 is an illustration of the process 1001 by which the data of the hand wash compliance system in Fig. 6 is stored and processed and the associated data is stored.
  • the light that enters the camera and process 800 has been distorted prior by distortion process 301 and in some cases segmented by 305.
  • the data is processed as per the description of the various figures discussed above.
  • the association of a distorted facial image to a hand wash event is then completed at step 13.
  • the characterization of the actual hand wash event is generally done separately through various sensors including cameras, vibration sensors,
  • the association of a name to the characterized facial image can be done through visual identification of a tag, through passive or active RFID tag or other transmission signal.

Landscapes

  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Epidemiology (AREA)
  • Public Health (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Image Processing (AREA)
  • Collating Specific Patterns (AREA)

Abstract

Visual recognition system includes a video camera (e.g., CMOS or CCD array), a physical visual distortion system between the camera and incoming light, a mathematical characterization of the physical distortion device, a facial recognition or other biometric recognition algorithm, and a coupling of the analyzed images to an individual's identity. The distortion system provides a singular or paired effect of occluding, blurring, segmenting, multiplying, color filtering, lensing, mirroring, or other distortive effect that render the resulting distorted image unrecognizable to an observer. The identity of the individual from which the distorted image is generated is thereafter determined by electronic comparison of the distorted image against a catalog of stored distorted images obtained from identified individuals.

Description

Visual Recognition System Based on Visually Distorted Image Data
Field
[0001] The present invention relates to the field of visual recognition systems and processes, particularly as related to human identity.
Background
[0002] Video surveillance is a standard practice for the purpose of monitoring human actions and behaviors. Cameras are now ubiquitous within public as well as private areas and are monitored both automatically as well as by human beings. Cameras are manufactured by a large number of companies, including Sony, Toshiba, Trendnet, Cisco, Logitech, and Uniden.
[0003] Light entering these cameras first passes through a lens that focuses an image on a CMOS (complementary metal-oxide semiconductor) or CCD (charge- coupled device) sensor. Due to its architecture, a CCD sensor generally produces a higher quality image compared to a CMOS sensor, but both are commonly used. The image can be broken up into its respective color components and the intensity of the light at each pixel measured. A video signal is then created and transferred to a computer for processing.
[0004] In the case of using a 3-dimensional camera (3-D camera), depth
information is created using multiple image sensors. In some cases, infrared versus visible light is measured. For example, Microsoft Corporation sells a camera called Kinect that includes a depth sensor camera based on using an infrared sensor.
[0005] Once transferred to the computer, the image can be analyzed to detect a face.
[0006] Algorithms exist for the purpose of facial recognition which can be generally categorized into two classes: those that are image-based and those that are video- based. Image-based algorithms include Principal Component Analysis, Independent Component Analysis, Linear Discriminant Analysis, Evolutionary Pursuit Analysis, Elastic Bunch Graph Matching, Kernel Methods, Trace Transform, Radon Transform, Active Appearance Model, 3-D Morphable Model, 3-D Canonical Surface Data, Bayesian Framework, Support Vector Machine, Hidden Markova Models, Boosting and Ensemble Solutions. Video-based solutions may also combine one or more of the above-identified image-based algorithms to process a video sequence. The above-identified image-based algorithms require a focused image for processing. The image analyzed and processed can be easily discerned by a human being from the image captured by the camera. In some cases the image, once captured by the camera's sensor, may be encrypted prior to or after transmission to the computer.
[0007] Use of video cameras and video analytics within commercial and private settings is becoming more and more common. Images captured may be processed by humans or computers on site or at remote locations. The images transmitted may be encrypted prior to transmission but must then be de-encrypted prior to analysis. In many cases, the images are stored electronically (such as on a memory card or on magnetic tape) and accessed over time.
[0008] Sealed Air Corporation offers a system called VSS® (Vision Safety
Solutions, powered by VTID™) that captures images of individuals in the process of washing their hands. The images of hand washing or sterilizing events are generally processed on a local computer. The identification of the individual performing the hand wash is determined using a radio frequency tag or antenna that is generally attached to a badge that is worn by the health care provider. However, it would be beneficial to avoid the use of radio frequency tags for identifying individuals, due to the inherent cost of the reader system, the complexity of mounting antennas, and the difficulty in obtaining a clear signal from a badge due to various badge positions near a body.
[0009] One alternative to using a radio frequency tag is the use of facial recognition to identify a person. In the case of the Vision Safety Solutions system described above, a camera could be placed at the monitored sink or hand sanitizing station and the image acquired compared to a database of facial images. The primary objection to using such a system relates to maintaining privacy laws and the risk that a breach of security would allow the link of biometric data to an individual. Summary of the Invention
[0010] A first aspect pertains to a facial recognition system comprising an optical image distorter, a camera, a processing algorithm, a data storage system, and a computer.
[0011] In an embodiment, the optical image distorter occludes, blurs, filters, multiplies, segments, mirrors, lenses, or otherwise distorts the image.
[0012] In an embodiment, the light entering the camera has passed through a lens just prior to entering the camera.
[0013] In an embodiment, the light entering the camera has bounced off a mirrored surface just prior to entering the camera. In an embodiment, the mirrored surface is not flat.
[0014] In an embodiment, only partial segments of the image enter the camera.
[0015] In an embodiment, one or more parts of the original image are sent to more than one camera.
[0016] in an embodiment, the light entering the camera has passed through one or more lenses to create a blurred image just prior to entering the camera.
[0017] In an embodiment, the light entering the camera passes through a diffraction grating just prior to entering the camera.
[0018] In an embodiment, the light entering the camera passes through a light diffuser just prior to entering the camera.
[0019] In an embodiment, the light entering the camera has passed through a multiple prism beam expander so as to distort the image just prior to entering the camera.
[0020] In an embodiment, the light entering the camera has passed through an achromatic lens so as to distort the image just prior to entering the camera.
[0021] in an embodiment, the light entering the camera has passed through color filters so as to distort the image just prior to entering the camera.
[0022] A second aspect of the invention is directed to a hand wash or hand sanitation compliance system wherein the association of an individual to the hand wash or hand sanitation compliance monitoring is done by using a facial recognition system that relies on a distorted image entering the camera. [0023] In an embodiment, the light entering the camera passes through one or more of the image distorters described herein.
[0024] A third aspect is directed to a facial recognition process, comprising: (A) acquiring an image of a face of an unidentified individual, the image being formed from light reflected from the face of the unidentified individual; (B) distorting the image of the face of the unidentified individual, by passing the reflected light through a distortion device which carries out an image distortion process to produce a distorted image corresponding with the face of the unidentified individual; (C) impinging the distorted image of the unidentified individual on a red green blue color filter array or a charge coupled device array, to form a digitized distorted image signal or an analog distorted image signal; (D) transmitting the digitized or analog distorted image signal to a computer for data storage and data processing, the computer having stored therein a plurality of digitized or analog distorted facial images of corresponding with the images of faces of a plurality of identified individuals; and (E) processing the digitized or analog distorted facial image of the unidentified individual in a manner so that the distorted facial image of the unidentified individual is compared with the stored plurality of digitized or analog distorted images of identified individuals, with the comparing being carried out in order to determine if the distorted image of the unidentified individual corresponds with a distorted image of an identified individual stored in the computer.
[0025] in an embodiment, the distorted image of the unidentified individual is encrypted, and the distorted images of the identified individuals are also encrypted.
[0026] In an embodiment, the distorted image of the unidentified individual is processed by at least one algorithm selected from the group consisting of Principal Component Analysis, Independent Component Analysis, Linear Discriminant Analysis, Evolutionary Pursuit Analysis, Elastic Bunch Graph Matching, Kernel Methods, Trace Transform, Radon Transform, Active Appearance Model, 3-D Morphable Model, 3-D Canonical Surface Data, Bayesian Framework, Support Vector Machine, Hidden Markova Models, and Boosting and Ensemble Solutions.
[0027] In an embodiment, the image distortion comprises at least one member selected from the group consisting of mirroring, occlusion, blurring, segmentation, color filtering, and shape distorting. [0028] In an embodiment, the distorted image is not recognizable when
unencrypted, the distorted image contains key attributes which are used to match the distorted image of the unidentified individual to a database of equally distorted images of identified individuals, so that a match can be made, resulting in the identification of the unidentified individual.
[0029] In an embodiment, the facial recognition process is used in a hand wash compliance system including a sink, a hand sanitizer and a camera acquiring a distorted facial image of an unidentified individual.
[0030] in an embodiment, the process is used in a hand wash compliance system including a sink, a hand sanitizer and a camera acquiring a visual identification of a tag or other transmission signal.
[0031] In an embodiment, the visual recognition system comprises a standard video camera (generally a CMOS or CCD array), a physical visual distortion system placed between the camera and incoming light, a mathematical characterization of the distortion system in the form of an algorithm, and a facial recognition or other biometric recognition system. The distortion system provides a singular or paired effect of occlusion, blurring, segmentation, multiplicity, color filtering, Sensing, mirroring, or other distortive effect that makes the camera output of human facial features or other biometric data impossible to recognize by a human being. The distortive effect can be further characterized mathematically in part or in whole, and this characterization can be used partially or in whole to allow for faciai recognition or other biometric recognition by a computer system. The system can be coupled to a database to correlate the analyzed images to the identification of people or physical objects.
[0032] In an embodiment, the system is coupled with a monitoring system. In an embodiment, the monitoring system includes a hand wash compliance system and/or a hand sanitizing compliance system.
[0033] In an embodiment, a recognition system is used to identify an individual within an environment that is sensitive to privacy, in an embodiment, the recognition system is used to identify the face of an individual within the privacy-sensitive environment. [0034] In an embodiment, light impinging the surface of the sensor is used to produce a distorted image of at least a portion of an individual, with the distorted image being unidentifiabie to a human observer thereof , but being identifiable to an automated identification system. In an embodiment, the automated identification system has the capacity to compare the distorted image to a catalog of distorted images of identified individuals. In a supplemental and/or alternative embodiment, the automated identification system has the capacity to identify the individual by reversing the distortion of the image to generate a reversed undistorted image, followed by comparing the reversed undistorted image to a catalog of undistorted images of identified individuals.
[0035] In an embodiment, the distorted image is, through means of a software system, capable of comparing the distorted image to other distorted images. The comparison can be made at high speed.
[0036] In an embodiment, light impinging on the surface of the sensor is used to produce a distorted image that does not resemble a human face. However, through electronic and/or mechanical means, the distorted image may be converted back into an undistorted image of the subject matter from which the distorted image was prepared.
[0037] In an embodiment, light impinging on the surface of the sensor is used to produce a distorted image that does not resemble the face of an individual to be identified, i.e., the distorted image cannot be used to create an identifiable biometric feature such as a human face.
[0038] In an embodiment, the images obtained by the camera may be correlated to an individual's name or create a unique data set associated with an individual.
[0039] In an embodiment, the processing of images obtained by the camera used in the following invention not require encryption prior to, during, or after processing by a local or remote computer.
[0040] In an embodiment, facial recognition algorithms are used to analyze the images obtained. Brief Description of the Drawings
[0041] Fig. 1 is a schematic diagram of a prior art process by which images are acquired and processed with a traditional facial recognition system.
[0042] Fig. 2 is a schematic diagram of a working embodiment in which distorted images are acquired and processed to form a facial recognition system.
[0043] Fig. 3 is a schematic of a camera using a distortion element as in the embodiment of Fig. 2.
[0044] Figs. 4A, 4B, 4C, 4D, 4E, 4F, and 4G are illustrative of images acquired using the camera of Fig. 3 with various distortive elements of Fig. 2 in a system according to Fig. 2.
[0045] Fig. 5 illustrates the process by which the distorted images acquired and processed in accordance with Fig. 2 are processed to obtain the identity of an individual
[0046] Fig. 6 illustrates a hand wash compliance system integrating the facia! recognition system of Fig. 2.
[0047] Fig. 7 is an illustration of the process by which the data of the hand wash compliance system in Fig. 6 is stored and the associated data is stored.
Detailed Description
[0048] Fig. 1 is a schematic diagram of a prior art process by which an image is acquired and processed with a traditional facial recognition system 1 . Light 2 entering the camera lens 3 impinges a RGB (i.e., red green blue) color filter array 4 or CCD array 4 and is generally digitized in step 5. This digitized or analog image signal is then transmitted to a computer 6 and further stored for processing on a storage medium such as a hard drive 7. The storage may be encrypted in step 14 and additional processing of the images may require an encryption key 15.
Algorithms such as Principal Component Analysis, Independent Component Analysis, Linear Discriminant Analysis, Evolutionary Pursuit Analysis, Elastic Bunch Graph Matching, Kernel Methods, Trace Transform, Radon Transform, Active Appearance Model, 3-D Morphabfe Model, 3-D Canonical Surface Data, Bayesian Framework, Support Vector Machine, Hidden Markova Models, Boosting and Ensemble Solutions are used in step 8 to process the image data with algorithm(s) immediateiy prior to storage on the computer or the images are retrieved and processed to detect a face. A database of images is accessed to compare the newly characterized image to the dataset and determine a relevant identity 9 or a non- matching or irrelevant identity 0. In step 1 1 , an encrypted image may be transmitted to a web site. This matched pair is then sent to a server 12 and may be accessed by a user for viewing through an encrypted process 15. In this traditional (prior art) process 1 a biasing factor 500 is not used.
[0049] Fig. 2 is a flow diagram of working process 300 wherein light 1 undergoes an image distortion process 301 prior to entering camera lens 3, with the resulting image data being received, digitized, transmitted to a computer, stored, encrypted (optional), retrieved, processed, and compared with images in a database, as per process 201 of Fig. 1. Distortions 305 may include mirroring effects 302, occlusion effects 303, blurring 304, segmentation 305, color filtering 306, distortive lens effects 307, and/or any alternative or further distortion effect. As an example, consider a blurred image 304 such as that created by using a pair of unfocused lenses. The image obtained may then be processed using an algorithm such as those used in step 8 of Fig. 1 with a biasing factor 500 included. In this way, although the image is not recognizable when unencrypted, the key attributes used to match the image to a database of equally unfocused images remain the same and allow for a match.
[0050] Fig. 3 shows the structure of a camera 800 wherein light 1 bounces off of individual 400 illustrated as face 500, with redirected light 402 (i.e., reflected light 402) passing to and through distorter 301. The segmentation 305 by distorter 301 produces distorted light 401 which passes through lens 3, thereafter impinging the CMOS sensor or CCD array 4. The array is read with processor 5 which also transmits the signal digitally or serially.
[0051] Figs. 4A, 4B, 4C, 4D, 4E, 4F, and 4G are illustrative of the image acquired using the camera of Fig. 3 with distortive elements 305 and of an image that would normally appear as shown in Fig. 4 using the process of Fig. 1 , Fig. 4A shows no distorter 301 in effect, while Fig. 4B shows mirroring effects 302, Fig. 4C shows occlusion effects 303, Fig. 4D shows blurring 304, Fig. 4E shows segmentation 305, Fig. 4F shows color filtering 306, and Fig. 4G shows distortive lens effects 307. When processing facial images that have been distorted, the biasing 500 will be turned on and used in conjunction with the algorithms 8 to create a characterized "neutral image". This "neutral image" although visually uncharacterizable by a human being and thus allowing for full privacy of any recorded image (whether decrypted or not) will have maintained the information required to form a
characterization that can be stored and then matched. Thus, if the computer storing the matched information is stolen, although an individual's name may be
decipherable, the facial characterization will not be.
[0052] Fig. 5 illustrates the process 300 by which the images obtained in the process illustrated in Fig. 2 are processed using a segmented distorted image 305 to obtain facial recognition characterization and identification 601.
[0053] Fig. 6 illustrates a hand wash compliance system integrating the facial recognition system of Fig. 2 consisting of a sink 802, a hand sanitizer 801 , a camera 800 that acquires one or more images of individual 400 with face 500 and hand/arm 804. RFID transmitter and/or receiver 803 detects an RFID badge that is used to identify the individual by name and further associate the individual with distorted image data set 12.
[0054] Fig. 7 is an illustration of the process 1001 by which the data of the hand wash compliance system in Fig. 6 is stored and processed and the associated data is stored. The light that enters the camera and process 800 has been distorted prior by distortion process 301 and in some cases segmented by 305. The data is processed as per the description of the various figures discussed above. The association of a distorted facial image to a hand wash event is then completed at step 13. The characterization of the actual hand wash event is generally done separately through various sensors including cameras, vibration sensors,
mechanical switches, or other electro-mechanical means. The association of a name to the characterized facial image can be done through visual identification of a tag, through passive or active RFID tag or other transmission signal.

Claims

WHAT IS CLAIMED IS:
1 . A facial recognition system comprising an optical image distorter, a camera, a processing algorithm, a data storage system, and a computer.
2. The facial recognition system of claim 1 , wherein the optical image distorter occludes, blurs, filters, multiplies, segments, mirrors, Ienses, or otherwise distorts the image.
3. The facial recognition system of claim 1 , wherein the light entering the camera has passed through a lens just prior to entering the camera.
4. The facial recognition system of claim 1 , wherein the light entering the camera has bounced off a mirrored surface just prior to entering the camera.
5. The facial recognition system of claim 4, wherein the mirrored surface is not flat.
6. The facial recognition system of claim 1 , wherein only partial segments of the image enter the camera.
7. The facial recognition system of claim 6, wherein one or more parts of the original image are sent to more than one camera.
8. The facial recognition system of claim 1 , wherein the light entering the camera has passed through one or more ienses to create a blurred image just prior to entering the camera.
9. The facial recognition system of claim 1 , wherein the fight entering the camera has passed through a diffraction grating just prior to entering the camera.
10. The facial recognition system of claim 1 wherein the light entering the camera has passed through a light diffuser just prior to entering the camera.
1. The facial recognition system of claim 1 wherein the light entering the camera has passed through a multiple prism beam expander so as to distort the image just prior to entering the camera.
12. The facial recognition system of claim 1 wherein the light entering the camera has passed through an achromatic lens so as to distort the image just prior to entering the camera.
13. The facial recognition system of claim 1 wherein the light entering the camera has passed through color filters so as to distort the image just prior to entering the camera.
14. The facial recognition system of claim 1 wherein the light entering the camera has passed through one or more of the distorters of claims 3-13.
15. A hand wash or hand sanitation compliance system wherein the association of an individual to the hand wash or hand sanitation compliance monitoring is done by using a facia! recognition system that relies on a distorted image entering the camera.
16. The hand wash or hand sanitation compliance system of claim 15 wherein the light entering the camera passes through one or more of the image distorters of claims 3-13.
17. A facial recognition process, comprising:
(A) acquiring an image of a face of an unidentified individual, the image being formed from fight reflected from the face of the unidentified individual;
(B) distorting the image of the face of the unidentified individual, by passing the reflected iight through a distortion device which carries out an image distortion process to produce a distorted image corresponding with the face of the unidentified individual;
(C) impinging the distorted image of the unidentified individual on a red green blue color filter array or a charge coupled device array, to form a digitized distorted image signal or an analog distorted image signal;
(D) transmitting the digitized or analog distorted image signal to a computer for data storage and data processing, the computer having stored therein a plurality of digitized or analog distorted facial images of corresponding with the images of faces of a plurality of identified individuals;
(E) processing the digitized or analog distorted facial image of the unidentified individual in a manner so that the distorted facial image of the unidentified individual is compared with the stored plurality of digitized or analog distorted images of identified individuals, with the comparing being carried out in order to determine if the distorted image of the unidentified individual corresponds with a distorted image of an identified individual stored in the computer.
18. The facial recognition process according to Claim 17, wherein the distorted image of the unidentified individual is encrypted, and the distorted images of the identified individuals are also encrypted.
19. The facial recognition process according to Ciaim 17, wherein the distorted image of the unidentified individual is processed by at least one algorithm selected from the group consisting of Principal Component Analysis, independent Component Analysis, Linear Discriminant Analysis, Evolutionary Pursuit Analysis, Elastic Bunch Graph Matching, Kernel Methods, Trace Transform, Radon Transform, Active Appearance Model, 3-D Morphable Model, 3-D Canonical Surface Data, Bayesian Framework, Support Vector Machine, Hidden Markova Models, and
Boosting and Ensemble Solutions.
20. The facial recognition process according to Claim 17, wherein the image distortion comprises at least one member selected from the group consisting of mirroring, occlusion, blurring, segmentation, color filtering, and shape distortion.
21. The facial recognition process according to Claim 17, wherein the distorted image is not recognizable when unencrypted, and the distorted image contains key attributes which are used to match the distorted image of the
unidentified individual to a database of equally distorted images of identified individuals, so that a match can be made, resulting in the identification of the unidentified individual.
22. The facial recognition process according to Claim 17, wherein the process is used in a hand wash compliance system including a sink, a hand sanitizer and a camera acquiring a distorted facial image of an unidentified individual.
23. The facial recognition process according to Claim 17, wherein the process is used in a hand wash compliance system including a sink, a hand sanitizer and a camera acquiring a visual identification of a tag or other transmission signal.
PCT/US2014/037462 2013-05-09 2014-05-09 Visual recognition system based on visually distorted image data WO2015020709A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201361821418P 2013-05-09 2013-05-09
US61/821,418 2013-05-09

Publications (2)

Publication Number Publication Date
WO2015020709A2 true WO2015020709A2 (en) 2015-02-12
WO2015020709A3 WO2015020709A3 (en) 2015-04-09

Family

ID=51999499

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2014/037462 WO2015020709A2 (en) 2013-05-09 2014-05-09 Visual recognition system based on visually distorted image data

Country Status (1)

Country Link
WO (1) WO2015020709A2 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3109840A1 (en) * 2015-06-26 2016-12-28 Fundació Institut de Recerca Biomédica de Bellvitge (IDIBELL) Hygiene compliance monitoring system
WO2016207370A1 (en) * 2015-06-26 2016-12-29 Fundació Institut De Recerca Biomédica De Bellvitge (Idibell) Hygiene compliance monitoring system
WO2017046651A3 (en) * 2015-09-17 2017-05-04 Valdhorn Dan Method and apparatus for privacy preserving optical monitoring
CN109284747A (en) * 2018-12-07 2019-01-29 宁波宝尼尔厨具电器有限公司 The shape of face that shaves identification mechanism
CN111079538A (en) * 2019-11-18 2020-04-28 重庆春之翼信息科技有限公司 Face recognition equipment
WO2020147249A1 (en) * 2019-01-16 2020-07-23 Shenzhen GOODIX Technology Co., Ltd. Anti-spoofing face id sensing
DE102020007336A1 (en) 2020-07-30 2022-02-03 Fielers & Danilov Dynamic Solutions GmbH Sensor for recording optical information with physically adjustable information content

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7120607B2 (en) * 2000-06-16 2006-10-10 Lenovo (Singapore) Pte. Ltd. Business system and method using a distorted biometrics
US20060133651A1 (en) * 2002-12-31 2006-06-22 Polcha Andrew J Recoverable biometric identity system and method
US7659824B2 (en) * 2006-10-31 2010-02-09 Resurgent Health & Medical, Llc Sanitizer dispensers with compliance verification

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
None

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3109840A1 (en) * 2015-06-26 2016-12-28 Fundació Institut de Recerca Biomédica de Bellvitge (IDIBELL) Hygiene compliance monitoring system
WO2016207370A1 (en) * 2015-06-26 2016-12-29 Fundació Institut De Recerca Biomédica De Bellvitge (Idibell) Hygiene compliance monitoring system
WO2017046651A3 (en) * 2015-09-17 2017-05-04 Valdhorn Dan Method and apparatus for privacy preserving optical monitoring
CN109284747A (en) * 2018-12-07 2019-01-29 宁波宝尼尔厨具电器有限公司 The shape of face that shaves identification mechanism
WO2020147249A1 (en) * 2019-01-16 2020-07-23 Shenzhen GOODIX Technology Co., Ltd. Anti-spoofing face id sensing
CN111699495A (en) * 2019-01-16 2020-09-22 深圳市汇顶科技股份有限公司 Anti-spoofing facial ID sensing
US11367314B2 (en) 2019-01-16 2022-06-21 Shenzhen GOODIX Technology Co., Ltd. Anti-spoofing face ID sensing based on retro-reflection
US11403884B2 (en) 2019-01-16 2022-08-02 Shenzhen GOODIX Technology Co., Ltd. Anti-spoofing face ID sensing
CN111699495B (en) * 2019-01-16 2024-02-02 深圳市汇顶科技股份有限公司 Anti-spoof face ID sensing
CN111079538A (en) * 2019-11-18 2020-04-28 重庆春之翼信息科技有限公司 Face recognition equipment
DE102020007336A1 (en) 2020-07-30 2022-02-03 Fielers & Danilov Dynamic Solutions GmbH Sensor for recording optical information with physically adjustable information content
WO2022022782A3 (en) * 2020-07-30 2022-03-31 Fielers & Danilov Dynamic Solutions GmbH Method for capturing image and/or object data, and sensor system therefor

Also Published As

Publication number Publication date
WO2015020709A3 (en) 2015-04-09

Similar Documents

Publication Publication Date Title
US20230370432A1 (en) Information output device, camera, information output system, information output method, and program
WO2015020709A2 (en) Visual recognition system based on visually distorted image data
US10121331B1 (en) Detection of unauthorized devices on ATMs
Labati et al. Toward unconstrained fingerprint recognition: A fully touchless 3-D system based on two views on the move
US10108793B2 (en) Systems and methods for secure biometric processing
CN106548148A (en) Method and system for identifying unknown face in video
JP2023533020A (en) Privacy protection image delivery
Shende et al. A survey based on fingerprint, face and iris biometric recognition system, image quality assessment and fake biometric
Kumar et al. Security standards for real time video surveillance and moving object tracking challenges, limitations, and future: a case study
CN112601054B (en) Pickup picture acquisition method and device, storage medium and electronic equipment
Ahmed et al. Automated intruder detection from image sequences using minimum volume sets
Asaduzzaman et al. Improving facial recognition accuracy by applying liveness monitoring technique
Anika et al. Multi image retrieval for kernel-based automated intruder detection
Shaikh et al. Modality identification for heterogeneous face recognition
Paulraj et al. Liveliness detection using thermograph patterns in face recognition
US20220269890A1 (en) Method and system for visual analysis and assessment of customer interaction at a scene
WO2023242874A1 (en) Device, system and method to recognize security threats from surroundings
Paulraj et al. Liveliness Detection using Thermograph Patterns in Face Recognition

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14805389

Country of ref document: EP

Kind code of ref document: A2

122 Ep: pct application non-entry in european phase

Ref document number: 14805389

Country of ref document: EP

Kind code of ref document: A2