Multiple intelligent terminal sharing face confidential identification method based on cloud environment
A recognition method and multi-intelligence technology, applied in the fields of cryptography and computer vision, can solve the problem that cryptographic tools are not efficient, and achieve the effect of protecting security, easy implementation, and low algorithm complexity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0042] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.
[0043] A face detector has a strong classifier of the form:
[0044] H ( x ) = s i g n ( Σ n = 0 N - 1 h n ( x ) ) - - - ( 1 )
[0045] h n (x) is a threshold function of the type
[0046]
[0047] Among them, y n ∈F L is the threshold function h n (x) hyperplane. h n (x) parameter α n ∈F,β n ∈ F, θ n ∈F is determined during training; N is the number of we...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com