Unless you literally wear a mask all the time, it is almost impossible to completely avoid cameras and face recognition technology. Not only is this a privacy concern, but it also presents a potential liability for companies that need to protect personal data. D-ID, a startup currently taking part in Y Combinator, wants to solve the problem with tools that process images to make them unrecognizable to face recognition algorithms, but still look similar to the original picture .
D-ID (its name stands for “de-identification”) was founded last year by CEO Gil Perry, COO Sella Blondheim, and CTO Eliran Kuta. Perry and Blondheim met when both were in the Israeli Special Forces about a decade ago, while Kuta served in the Israeli Intelligence Corps. At that time, photo-sharing on social media was relatively new, but they already needed to be mindful of face recognition technology.
“We couldn’t share our photos and profiles over the web because of sensitive positions. Even after we finished our service, we couldn’t share our photos when we traveled in South America,” Perry says. “We felt bad because we are very social and everyone was sharing photos, but we couldn’t.”
Perrz and Blondheim realized that people in the security industry were also forbidden from sharing photos online. They started brainstorming ideas to protect pictures from face recognition tech and came up with a basic algorithm. After an interlude of a few years, during which each of them worked on separate startups, they regrouped, added Kuta to their team, and launched D-ID.
Finding a way to deal with face recognition technology has become even more imperative. ATMs that use face recognition technology have already been deployed in Macau and are being tested by border control agencies in several countries. In China, it’s even been used to identify jaywalkers.
“We started thinking about it when only people who worked in security or the government were very aware of face recognition technology,” says Perry. “Now everyone needs to be aware of it. Streets today are covered by cameras, we all carry smartphones. We are being photographed all the time Security Information and Event Management. When you combine all the cameras and face recognition technology, privacy is actually gone.z
The growth of D-ID will also be driven by new data privacy regulations like the European Union’s General Data Protection Regulation (GDPR), which will become enforceable in May 2018 and require companies to guard personal data, including biometric data, more stringently or risk heavy fines. D-ID claims that its technology is designed to be difficult for artificial intelligence to overcome. Perry declined to go into detail about how the startup’s algorithms accomplish that, but said its goal is to be “the standard of image protection,” protecting every photo containing biometric data that is shared online.
D-ID serves three verticals: companies that need to protect images of their employees or customers, health management organizations, and government and security agencies that want to secure biometric data. It will launch a pilot program with cloud-based image management service Cloudinary to protect more than 14 billion media assets, Perry says.
Other companies that are developing ways to protect data from face recognition tech include ones that specialize in helping organizations comply with privacy regulations or offer data protection on a SaaS basis. Many of their tools work by making faces completely unrecognizable, but Perry says D-ID differentiates because their changes are much less detectable as possible, at least to the human eye. This element means that D-ID’s tech can appeal to individuals who just want to protect photos they put online. Perry says a consumer app may be released if there is enough demand Laser Facial . D-ID’s founders also say they welcome more competition because that means more companies are finding ways to help people protect their personal data.
“It’s an important point in time right now, with the progress of deep learning and every place being covered by cameras and regulators understand that,” Perry says. “More competitors are going to come and that’s a good thing. we need to move fast in order to make an impact and we want to make as large an impact as possible in order to restore and protect privacy.”
相关推荐
《Ruge Kuta v2 v4:数字项目-matlab开发》 在计算机科学与工程领域,数值计算是解决复杂数学问题的关键工具。Ruge Kuta方法是一种高效的数值积分算法,它在MATLAB环境下得到了广泛应用。MATLAB,全称矩阵实验室...
四阶Runge-Kutta方法是求解常微分方程(ODE)的一种数值积分方法,尤其在计算机科学和工程领域中被广泛使用。MATLAB作为一种强大的数学计算软件,提供了便捷的环境来实现这种算法。本篇文章将深入探讨四阶Runge-...
numerical methods for simpson3 rung kuta
此外,程序还提供了一个`main`函数,该函数负责读取输入(初始条件、区间和步长)并调用`Runge_Kuta`函数来计算一系列结果。最后,程序输出了每个步骤的结果。 #### 示例代码分析 下面是对给定示例代码的详细分析...
double a,double b) double central_difference(double(*f)(double),double a, double h,double eps, int max_it) double runge_kuta(double(*f)(double,double),double x[],double y[],double h,int n) ...
文章详细介绍了三种具体的时程分析程序:基于Duhamel积分法、Newmark-beta法和Rong-kuta法。对于多自由度结构体系,通常采用振型分解法将问题转化为多个广义单自由度结构体系问题,然后通过一定的准则进行模态叠加,...
MATLAB中的三阶龙格库塔函数`DELGKT3_kuta`实现如下: ```matlab function y = DELGKT3_kuta(f, h, a, b, y0, varvec) % ... % 省略的代码部分包括变量定义、循环计算k值和更新y值 % ... ``` **四阶龙格库塔法** ...
- **关键字**:在C/C++中,关键字是具有特殊含义的保留字,如`int`, `if`, `else`, `for`, `while`等,它们不能用作变量名或其他标识符。 - **运算符**:包括算术运算符(如`+`, `-`, `*`, `/`, `%`),关系运算符...
给出了静止卫星在地球非球形...利用方程组的解计算各种摄动因素对静止卫星轨道根数的影响的量级估计,并用Runge-Kuta7(8)阶方法求出卫星运动微分方程组的数值解,通过解析解与数值解的比较,说明解析解的精度为10-5量级
可以从Runge-Kuta实体中获得4%的收入,并且可以从模型中获得收入。 Para usarlo hay que bajar el archivo,“在朱丽叶终端(笔记本)上的注解”,包括(“ ModeloCovid-19CDMX.jl”),或在dayan hayan ...
如何引用: Škuta,C.; Bartůněk, P.; Svozil, D. InCHlib – Web 应用程序的交互式集群热图。 化学信息学杂志 2014, 6 (44), 。 InCHlib(交互式集群热图库)是一个开源交互式 Javascript 库,它提供了一种...
程序内容和功能如下: 1. 矩阵。 1.1 矩阵定义和特殊类型的矩阵。 1.2 矩阵的行列式。 1.3 矩阵的逆。 2.... 2.1 直接方法(矩阵的逆,Cramer 规则,Gauss Jordan,Monante)。... 常微分方程(Euler, Runge-Kuta)。
在提供的代码中,`runge_kuta`函数接收一个函数指针f,用于计算微分方程的导数,以及自变量x和因变量y的离散值数组,还有步长h和步数n。函数返回一个整数,如果计算过程中没有问题,则返回0。 另外,代码中还定义了...
double Runge_Kuta(double (*f)(double x, double y), double x0, double y0, double xn, long step) { // 算法实现... } ``` 2. **高斯列主元法** 高斯列主元法是一种线性代数中的消元法,用于求解增广矩阵形式...
在案例研究中,项目团队参考了全球10多个度假区的成功案例,如美国夏威夷的Kaanupali、Ewa,印尼巴厘岛的Nusa Dua和Kuta,以及墨西哥的Cancun等,以这些案例的经验指导三亚湾新城的规划。 在商业区规划上,根据功能...
例如,"クラス" (kurasu) 表示面向对象编程中的"类",而"コンストラクタ" (kon sutora kuta) 是"构造函数"。这些概念在编程实践中具有重要的作用,因此学习时应结合实例来加深理解。 在工具方面,日语中的"ツール" ...
以解析法为基础,采用新的精确计算方法求解线性系统的状态方程.该方法属于一种2N类算法,它是把每一...与传统的Runge-Kuta方法比较,这种方法兼有解析法与数值法的优点,稳定性好,可以采用较大的时间步长以提高计算效率.
double Runge_Kuta(double (*f)(double x, double y), double x0, double y0, double xn, long step) { double k1, k2, k3, k4, result; double h = (xn - x0) / step; if (step ) return y0; if (step == 1) {...
DELGKT3_kuta 用库塔三阶法求一阶常微分方程的数值解 DELGKT4_lungkuta 用经典龙格-库塔法求一阶常微分方程的数值解 DELGKT4_jer 用基尔法求一阶常微分方程的数值解 DELGKT4_qt 用变形龙格-库塔法求一阶常微分方程的...