Multiple intelligent terminal sharing face confidential identification method based on cloud environment
A recognition method and multi-intelligence technology, applied in the fields of cryptography and computer vision, can solve the problem that cryptographic tools are not efficient, and achieve the effect of protecting security, easy implementation, and low algorithm complexity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0042] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.
[0043] A face detector has a strong classifier of the form:
[0044] H ( x ) = s i g n ( Σ n = 0 N - 1 h n ( x ) ) - - - ( 1 )
[0045] h n (x) is a threshold function of the type
[0046]
[0047] Among them, y n ∈F L is the threshold function h n (x) hyperplane. h n (x) parameter α n ∈F,β n ∈ F, θ n ∈F is determined during training; N is the number of we...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com