Identity authentication method and device

An identity authentication device and identity authentication technology are applied in the field of digital image processing and pattern recognition, which can solve the problems of poor anti-interference and low accuracy, and achieve the effects of enhanced anti-interference, easy implementation and improved accuracy.

Inactive Publication Date: 2016-03-30
BEIJING TECHSHINO TECH
View PDF3 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These three face authentication methods all have the di

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device
  • Identity authentication method and device
  • Identity authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0025] In order to make the technical problems, technical solutions and advantages to be solved by the present invention more clear, the following will be described in detail with reference to the accompanying drawings and specific embodiments.

[0026] On the one hand, the present invention provides an identity authentication method, such as figure 1 shown, including:

[0027] Step S101: obtaining a sample pair of face images, one of which is an ID card photo, and the other face image is an image collected on-site;

[0028] In this step, the images collected on site can be obtained by intercepting the collected video samples, or obtained by taking pictures on site.

[0029] Step S102: using a face image pyramid algorithm to process the acquired face image sample pairs to obtain a face image pyramid structure;

[0030] In this step, the face image pyramid structure is used for multi-scale and multi-resolution representation of the face image. This algorithm can comprehensive...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication method and device, and belongs to the field of image processing and mode identification. The method comprises the steps of: obtaining a face image sample pair, wherein one face image is an identity card photograph, and the other face image is an image collected on site; utilizing a face image pyramid algorithm to process the obtained face image sample pair, and obtaining a face image pyramid structure; calculating gray scale gradient directions of the face images of all scales in the face image pyramid structure of the obtained face image sample pair, and obtaining gradient direction pyramid GOP characteristics; and according to the GOP characteristics of the obtained face image sample pair, calculating and judging whether the face image sample pair belongs to the same person. By adopting the identity authentication method and device, the interference of factors such as illumination, age and expression is effectively avoided, and the accuracy of identity authentication is substantially improved.

Description

technical field [0001] The invention relates to digital image processing and pattern recognition, in particular to an identity authentication method and device. Background technique [0002] The second-generation ID card is a valid document for Chinese residents, which records the basic information of the cardholder. In most cases at present, ID card registration is still done manually, which is very inconvenient. With the maturity of computer technology, image processing and character recognition algorithms, it has become possible to use computers for automatic identification and entry of ID cards. By comparing the photos on the ID card with the video photos collected on the spot, the identity of the person can be determined. However, due to the problems of low resolution and large age span of the second-generation ID card itself, the video photos collected on-site are interfered by obstructions such as light, posture, expression, glasses, etc., and the single-sample prob...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/64G06K9/00
CPCG06V10/75
Inventor 毛秀萍朱和贵张祥德
Owner BEIJING TECHSHINO TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products