Multiple intelligent terminal sharing face confidential identification method based on cloud environment

A recognition method and multi-intelligence technology, applied in the fields of cryptography and computer vision, can solve the problem that cryptographic tools are not efficient, and achieve the effect of protecting security, easy implementation, and low algorithm complexity

Active Publication Date: 2016-11-09
韶鼎人工智能科技有限公司
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Recently, many researchers have focused on privacy-preserving computer vision problems, most of them using cryptography tools that are not efficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multiple intelligent terminal sharing face confidential identification method based on cloud environment
  • Multiple intelligent terminal sharing face confidential identification method based on cloud environment
  • Multiple intelligent terminal sharing face confidential identification method based on cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0043] A face detector has a strong classifier of the form:

[0044] H ( x ) = s i g n ( Σ n = 0 N - 1 h n ( x ) ) - - - ( 1 )

[0045] h n (x) is a threshold function of the type

[0046]

[0047] Among them, y n ∈F L is the threshold function h n (x) hyperplane. h n (x) parameter α n ∈F,β n ∈ F, θ n ∈F is determined during training; N is the number of we...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a multiple intelligent terminal sharing face confidential identification method based on a cloud environment, which can be carried out under a secure protocol, and meanwhile simultaneously protect the privacy of user image data and the privacy of a third party face detector. The method applies a secure inner product algorithm to security face detection under a cloud environment for the first time, realizes user image storage in ciphertexts, provides an image query function under a ciphertext state, and prevents the third party face detector from being discovered. In addition, user images storage forms are enciphered in a standard encryption algorithm, and data security can be guaranteed; the secure inner product algorithm is employed for each query, and algorithm complexities are related to selected encryption matrix dimensions; the algorithm complexities are low, and can be flexibly configured according to computational capabilities and security demands; a lot of computation depends on the cloud with a great computational capability, so as to effectively shorten detection time; in addition, the encryption method is easy to realize through software. The multiple intelligent terminal sharing face confidential identification method can be widely applied to cloud computation, face identification, etc.

Description

technical field [0001] The invention belongs to the fields of cryptography and computer vision, in particular to a method for concealed face detection and recognition, in particular to a cloud environment-based multi-smart terminal shared face concealed recognition method. Background technique [0002] In the era of mobile Internet, a surge of mobile users backs up their photos to cloud servers. When a huge number of images are stored on the cloud server, the privacy of users becomes an issue that cannot be ignored, for example, the face information of family members, the possible relationship between people, the geographic location where the photo was taken, home address, work unit, school, etc. etc. will be exposed to unknown dangerous people, threatening personal and property safety. So images should be stored in ciphertext rather than plaintext. At the same time, the face detector used in the face image retrieval service provided by the cloud server is also provided by...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00G06F21/60G06K9/62
CPCG06F21/602G06V40/161G06F18/22
Inventor 金鑫马铭鑫宋承根赵耿李晓东袁鹏田玉露刘妍
Owner 韶鼎人工智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products