Method for recognizing human face based on electrical power system network safety

A face recognition and network security technology, applied in the face recognition field of network security access, can solve problems such as deceiving trust, and achieve the effect of good grasp, adaptable face width, face detection and face recognition performance improvement

Inactive Publication Date: 2008-10-01
长春供电公司
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] To reduce or avoid wrong operations by personnel, strict regulations can be formulated or an anti-misoperation locking function can be added to the software of the centralized control station; while the unauthorized operations of u

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Implement the present invention mainly to carry out through the following steps:

[0022] a) First use the face recognition algorithm based on local feature analysis and optimal matching, and use the neural network method to estimate some feature points that play an important role in face recognition, such as pupils, eye corners, eyebrows, eyebrow corners, mouth corners, and nose tip , and then use the local multi-scale analysis characteristics of Gabor wavelet to extract the multi-scale features of feature points;

[0023] b) In the positioning of feature points, six BP neural networks are used for feature point positioning, of which the first is used for pupil positioning, the second is for eye corner positioning, the third is for brow center positioning, and the third is for pupil positioning. Four are used for the positioning of the corners of the eyebrows, the fifth is used for the positioning of the tip of the nose, and the sixth is used for the positioning of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A human face identifying method based on network security access of power system, belonging to human face detecting and security identifying field, by using a human face identifying algorithm based on local characteristics analysis and optimization matching, the method according to the invention comprises: estimating several key characteristic points in human face identification via neural network method; using six BP neural networks to carry out characteristic point positioning process for characteristic point position; during the dynamic human face detection, the image function containing human face rapidly varies by the time t, detecting over 20 frames per second; the BP neural network comprises three layers, namely an input layer, a hiding layer and an output layer with same structure, the topology structure of each layer uses integral interconnection mode. With realization of the method, the problem of light compensation in human face detection and identification can be effectively solved, in order to enhance the performance of human face detection and human identification in different light condition. The method also has advantages of high operation efficiency, excellent operating convenience, suitable for wide application.

Description

technical field [0001] The invention belongs to the field of face detection and security identification, in particular to a face identification method for network security access of a power system. Background technique [0002] Traditional network security and identity authentication mostly use passwords, electronic certificates, keys, etc., which have their shortcomings, may be stolen or lost, and are not easy to carry around. The advancement of computing technology, especially the popularity of the Internet, has made identity authentication a part of our life and work. However, the traditional identity authentication methods that mainly rely on passwords have exposed more and more problems, such as credit card passwords, bank account passwords, Network login passwords take up our precious memory space. We need passwords to open computers, passwords to enter mailboxes, passwords to withdraw money from banks, etc. We not only need to memorize various passwords, but also reme...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/00G06K9/62
Inventor 王书春张喜林刘阳石钰张鹏宇苑立民陈亚芳孙莉刘晓航韩国炜王金霞
Owner 长春供电公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products