Security management method and system based on face identification

A face recognition and management method technology, applied in the field of face recognition-based security management methods and systems, can solve problems such as unavoidable photo deception

Active Publication Date: 2016-02-24
SHENZHEN SENSETIME TECH CO LTD
View PDF6 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Another example: the existing security management system based on face recognition cannot avoid photo spoofing, that is, if a malicious user wants to maliciously enter the security management area, he can use the photo of the counterfeiter to carry out malicious attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security management method and system based on face identification
  • Security management method and system based on face identification
  • Security management method and system based on face identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In a basic embodiment, a security management method based on face recognition is provided, the method includes the following steps:

[0022] S100. Establish a user feature library: collect user information of legal users who are allowed to pass through the access control, the user information includes face images; extract the face features of the face images, and save the face features and the user information to user signature database;

[0023] S200. Extracting the image data of the video frame: obtaining the real-time video of the camera within the security management range, decoding the video, and extracting the image data of the video frame;

[0024] S300. Detecting and extracting facial features: performing face positioning on the image data of the video frame extracted in step S200, and extracting facial features using a deep learning method;

[0025] The facial features include inter-class changes and intra-class changes, the inter-class changes refer to the di...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security management method and system based on face identification. The method comprises steps: a user characteristic database is established, image data of video frames are extracted, face characteristics are detected and extracted, whether photograph cheat exists is determined and whether the user is a valid user is determined. Face identification is achieved through deep learning, and the face identification accuracy can be provided. The system is implemented based on the method and comprises a user characteristic database module, a video frame image data extraction module, a face characteristic extraction module, a photograph cheating determination module, a valid user determination module and the like. Through accurate face identification, convenience is provided for security management, photograph cheating is avoided effectively and personnel tracking is achieved.

Description

technical field [0001] The present disclosure relates to the field of access control management, in particular to a security management method and system based on face recognition. Background technique [0002] Deep learning is one of the most important breakthroughs in artificial intelligence in the last decade. It has achieved great success in speech recognition, natural language processing, computer vision, image and video analysis, multimedia and many other fields. Improvement, among which intelligent community management is an important part of it. Most of the existing community property management needs manpower to complete. We can use deep learning technology to endow the camera with the function of "wisdom to recognize people" to solve the security of the existing community Problems in management, such as: the existing community usually needs to swipe the card to authorize access, which not only requires the active cooperation of the residents, but also needs to car...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00G06K9/00
CPCG07C9/257G06V40/172
Inventor 刘祖希王子彬张伟陈朝军刘亮肖伟华马堃金啸张广程
Owner SHENZHEN SENSETIME TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products