Face recognition based method for authenticating identity

A face recognition and identity authentication technology, applied in the field of identity authentication based on face recognition, can solve the problems of large amount of transmitted image data for face authentication, inability to control the angle and size of the face, increasing the amount of calculation and processing difficulty, etc. Achieve the effect of good calculation and identification features, fast processing speed, and reduced calculation amount

Inactive Publication Date: 2010-07-07
PEKING UNIV +1
View PDF2 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this method is that the amount of image data transmitted by face authentication is large, and the calculation amount of face recognition calculation is also very large, so the performance requirements of the processing equipment are relatively

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Face recognition based method for authenticating identity
  • Face recognition based method for authenticating identity
  • Face recognition based method for authenticating identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0029] An identity authentication method based on face recognition mainly includes two parts: the face recognition verification feature extraction for the verified person, and the use of the extracted feature data to verify whether the identity of the registered person is legal.

[0030] Such as figure 1 As shown, a face recognition verification feature extraction method in identity authentication based on face recognition, comprising the following steps:

[0031] F11: The face image of the verified person is acquired by the video acquisition terminal.

[0032] The specific implementation steps are: first input the information of the person being verified, so that the corresponding verification information can be indexed. The face image is obtained from a video capture device, and the video device is a commonly used video device, such as a ca...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a face recognition based method for authenticating identity. In the method, recognition characteristic data and a corresponding recognition characteristic region are extracted through face recognition; a drawn portrait painting is generated by a face image; an authenticated person is prompted to adjust the distance and angle with an image acquisition device by the portrait painting when the face image is acquired; when the acquired image is aligned with the portrait painting, a terminal extracts the recognition characteristic region and calculates the recognition characteristic data; and the recognition characteristic data are associated with the saved corresponding recognition characteristic data to authenticate user identity. The method can greatly reduce the calculated amount and the data communication amount of face recognition, and is particularly applicable to identity authentication application of mobile terminal equipment.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to an identity authentication method based on face recognition. Background technique [0002] As a common identity authentication method, face recognition is widely used in various identity authentication occasions because it only needs to be equipped with a camera and has low requirements for device peripherals. However, face recognition relies on complex image recognition and image processing, and the amount of calculation is often huge. It requires high equipment for recognition and calculation, and its application is limited. For example, PDAs with limited computing power and limited communication data cannot be used. on the mobile terminal device. [0003] Such as the Chinese patent application whose application number is 200610117905.2--network login system and login method with face authentication, this method first stores the feature information including fac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32G06K9/00
Inventor 龚健李平立
Owner PEKING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products