Face image biological key generating method

A biological key and positive face technology, applied in the field of information security, can solve the problems of no face biological key technology, no face feature information, etc.

Active Publication Date: 2014-06-25
HANGZHOU DIANZI UNIV
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This authentication mode has certain disadvantages: it needs to store and transmit user face information in an unsafe network environment
However,...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Face image biological key generating method
  • Face image biological key generating method
  • Face image biological key generating method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present invention will be further described below in conjunction with accompanying drawing.

[0028] The current face recognition technology cannot correctly identify faces with multiple poses and complex lighting conditions. The preconditions for extracting the human face biological key in the present invention are a frontal face, sufficient illumination, and no multi-light source and multi-angle irradiation. Under this premise, face recognition has a high accuracy rate. After a series of stabilization processes, the biological key can be extracted from it. The extraction process of the face biometric key is as follows: figure 1 shown.

[0029] Illumination conditions have a great influence on the existing face recognition effect, and it is necessary to eliminate the influence of illumination first. The present invention uses the self-quotient graph method to eliminate the influence of illumination, and the effect is as follows figure 2 shown.

[0030] The fa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a face image biological key generating method. The face image biological key generating method includes steps of subjecting face images of users to characteristic space conversion, projecting the face images into a higher space, stabilizing facial feature information into an acceptable fluctuation range in the higher space, extracting digital sequences from stabilized feature vectors, and encoding in the digital sequences to generate a biological key. By adopting the face image biological key generating method, no face information of the users is required to be stored in mobile terminals and identification servers, and the face images of the users are also dispensed with transmission in the network. The users generate (user names and secret keys) pairs by acquiring the face images of their own and perform network identity authentication by various authentication methods derived from the (user names and secret keys) pairs. The private data of the users are subjected to direct encipherment protection by the method supporting the face biological secret key, and the method can be extended to application in the field of cloud storage safety. As long as key space of the face biological secret keys is larger enough, high safety can be guaranteed.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a method for extracting a human face biological key through a front face image. It can directly generate a biological key by ingesting a face image, which makes the face-based network identity authentication process more simplified and flexible, and provides a new authentication method for network identity authentication technology. Expand the application of face recognition technology in network security. Background technique [0002] In recent years, face recognition technology based on machine vision has received widespread attention because it can be widely used in daily life. One of the important applications is identity authentication. Face check-in systems and network-side identity authentication are all good examples of the use of face recognition technology. In the field of network identity authentication, face authentication adopts the followi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/32G06F21/46G06K9/00
CPCG06F21/32G06F21/46G06V40/168
Inventor 吴震东
Owner HANGZHOU DIANZI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products