Revealed because the software looks for holograms
Many reporters are sick, but actually escape to travel. If posting photos to play on personal website or photo sharing website like Flickr,
Many reporters are sick, but actually escape to travel. If posting photos to play on personal websites or photo-sharing websites like Flickr, their " boss " will quickly discover that they have lied because of new search technology.
Polar Rose tool does not analyze image-attached text as regular search services that have the ability to compare facial expressions in files to filter out the same image. Therefore, "bosses" can search all images uploaded to the web related to a certain employee even if they are not properly named as search keywords.
Personal photos on Flickr are easily found by Polar Rose.Photo: KomoTV .
Sweden's Polar Rose AB has customized face-recognition technology and 3-dimensional technology so that its software can compare features in the image according to 90 different attributes. For example, when scanning through the Flickr sharing site, the software sees a person with Bill Gates similarities in the database, it will conclude that the person is Gates despite the file name written "in 1997." ". Meanwhile, image search services can now only display files named after the Microsoft president
According to CEO Nikolaj Nyholm of Polar Rose AB, tests with a collection of 10,000 images have reached 95% accuracy. But when the image is larger, which contains millions, even billions of files, the reliability of the software will decrease.
Polar Rose is compatible with Internet Explorer, Firefox and will be released at the beginning of 2007. Users will be free to use Polar Rose, but experts fear they will pay a higher price: personal rights.
" When people post pictures on the Internet, they rarely use their real names to annotate photos because they don't want to be easily searched through search engines ," explains Simon Davies, director of Privacy International. " But Polar Rose compared facial features instead of file names ."
- Microsoft is committed to not suing the open source community
- Software deletes people who don't want to get out of the picture
- Software makes the phone 'reactive'
- Detecting ghost PC management software
- Oracle suddenly revealed a security error
- Surf the web more safely with anti-Keylog software
- 28% of software is not patched by security
- Google 'hacked in' the software market
- Robot will write a novel
- 5 best free antivirus software 2016
What is the Snapdragon SiP chip? How to create a yellow circle around the mouse cursor on Windows Edit the Boot.ini file in Windows XP 3 ways to restart the remote computer via the Internet Vietnam computer market: Looking back a year How to restore deleted applications on Android How to increase the capacity of C drive on Windows 10, 8, 7 ... 8 security features of Windows operating system