Security protection management method and system based on face features and gait features

A technology of gait features and facial features, applied in the field of security management methods and systems based on facial features and gait features, can solve problems such as unavoidable photo deception

Inactive Publication Date: 2016-07-20
SHENZHEN SENSETIME TECH CO LTD
View PDF10 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Another example: the existing security management system based on face recognition cannot avoid photo spoofing, that is, if a malicious

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protection management method and system based on face features and gait features
  • Security protection management method and system based on face features and gait features
  • Security protection management method and system based on face features and gait features

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In a basic embodiment, a security management method based on facial features and gait features is provided, the method includes the following steps:

[0019] S100. Establish a user feature library: collect user information of legal users who are allowed to pass through the access control, the user information includes a face image, and extract the face features of the face image; collect the gait features of the corresponding user; , the gait feature and the user information are stored in the user feature library;

[0020] S200. Extracting the image data of the video frame: obtaining the real-time video from the camera within the scope of security management, decoding the video, and extracting the image data of the video frame;

[0021] S300. Extracting user features: performing user positioning on the image data of the video frame extracted in step S200, extracting facial features and corresponding gait features;

[0022] S400, judging whether it is a legitimate user:...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security protection management method and system based on face features and gait features. The method comprises establishing a user feature database, extracting image data of video frames, extracting user features, determining valid users and invalid users, and the like. On the basis of face identification, the authenticity and the validness of the users are further verified through gaits, and accuracy of identity identification can be provided. The system is realized based on the method and comprises a user feature database model, a video frame image data extraction module, a user feature extraction module, a valid user determining module, a valid user verification module and the like. Through non-contact type face identification and gait identification, convenience is brought to security protection management.

Description

technical field [0001] The present disclosure relates to the field of access control management, in particular to a security management method and system based on facial features and gait features. Background technique [0002] Deep learning is one of the most important breakthroughs in artificial intelligence in the last decade. It has achieved great success in speech recognition, natural language processing, computer vision, image and video analysis, multimedia and many other fields. Improvement, among which intelligent community management is an important part of it. Most of the existing community property management needs manpower to complete. We can use deep learning technology to endow the camera with the function of "wisdom to recognize people" to solve the security of the existing community Problems in management, such as: the existing community usually needs to swipe the card to authorize access, which not only requires the active cooperation of the residents, but ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/00G06K9/62G07C9/00
CPCG07C9/37G06V40/166G06V40/168G06V40/45G06F18/2148
Inventor 刘祖希王子彬张伟陈朝军刘亮肖伟华马堃金啸张广程
Owner SHENZHEN SENSETIME TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products