Distributed human face authentication information generation method, and distributed human face authentication method and apparatus

An authentication information and distributed technology, applied in the field of data processing, can solve problems such as difficulties in the widespread use of face recognition systems or devices, increased complexity of system deployment, and difficulties in collecting face databases

Pending Publication Date: 2017-08-25
杨陶柳
View PDF7 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the database is stored locally, the cost of storage hardware will be increased. If the storage server is placed at the remote end and communicated through a network connection, it will not only increase the cost of storage hardware, but also increase the complexity of system deployment.
[0006] 2) It is difficult to collect a face database containing all targets
In this way, the deployment complexity and maintenance cost of the system are further increased
[0007] 3) Under the conditions of a large number of face recognition databases, it will be difficult to achieve fast recognition and high-precision recognition
[0008] 4) There is a legal and moral risk of infringing on privacy
Facial feature information is personal sensitive privacy information. The current system or device needs to store the face feature information of the person to be identified on the server or the local storage of the device. In this way, the implementation of the system cannot avoid personal privacy issues.
[0009] It is also these practical problems mentioned above that have brought more difficulties to the widespread use of current face recognition systems or devices.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed human face authentication information generation method, and distributed human face authentication method and apparatus
  • Distributed human face authentication information generation method, and distributed human face authentication method and apparatus
  • Distributed human face authentication information generation method, and distributed human face authentication method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0075] see figure 1 , the figure shows a method for generating distributed face authentication information, including steps:

[0076] Step S101: collecting target face pictures on-site with a camera;

[0077] Step S102: extracting face feature data from the target face picture;

[0078] Step S103: Generate authorization information for the facial feature data according to a preset policy;

[0079] Step S104: compressing the facial feature data and the authorization information according to the maximum supported capacity of the two-dimensional code;

[0080] Step S105: Input the compressed data into the two-dimensional code generator;

[0081] Step S106: The two-dimensional code generator outputs the two-dimensional code carrying the face authentication information.

[0082] At present, a large number of mobile terminals are equipped with cameras, such as mobile phones, PADs, computers, etc. When users register through APP or web pages, they can conveniently collect face im...

no. 2 example

[0105] see image 3 , which shows another method for generating distributed face authentication information, including steps:

[0106] Step S301: collecting target face pictures on the spot with a camera;

[0107] Step S302: extracting face feature data from the target face picture;

[0108] Step S303: Generate authorization information for the facial feature data according to a preset strategy;

[0109] Step S304: generating a verification code for the facial feature data and the authorization information;

[0110] Step S305: Compress the facial feature data, the authorization information and the verification code together according to the maximum supported capacity of the two-dimensional code;

[0111] Step S306: Input the compressed data into the two-dimensional code generator;

[0112] Step S307: The two-dimensional code generator outputs the two-dimensional code carrying the face authentication information.

[0113] At present, a large number of mobile terminals are ...

no. 5 example

[0134] Corresponding to the above method, the embodiment of the present invention also provides a distributed face authentication information generation device, such as Figure 5 shown, including:

[0135] Image processor 501, for extracting face feature data from target face picture;

[0136] An authorization information distributor 502, connected to the image processor 501, configured to generate authorization information for the facial feature data according to a preset strategy;

[0137]A data compressor 503, connected to both the image processor 501 and the authorization information distributor 502, for compressing the facial feature data and the authorization information according to the maximum supported capacity of the two-dimensional code;

[0138] The two-dimensional code generator 504 is connected to the data compressor 503, inputs the compressed data, and outputs a two-dimensional code carrying face authentication information.

[0139] In another embodiment, a ch...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a distributed human face authentication information generation method, and a distributed human face authentication method and apparatus. The authentication information generation method comprises the steps of extracting human face feature data from a target human face picture; generating authorized information for the human face feature data according to a preset policy; performing compression processing on the human face feature data and the authorized information according to maximum supported capacity of a two-dimensional code; inputting the compressed data to a two-dimensional code generator; and outputting the two-dimensional code bearing human face authentication information. According to the authentication information generation method, human face features obtained by scanning two-dimensional codes are compared with human face features extracted on site in an one-to-one manner when human face identification is required, and persons with the human face features higher than a threshold are identified as the same person, so that high-precision human face identification can be realized; and only one-to-one comparison is required, so that compared with a system for performing identification in a database with a large amount of human face data, the calculation amount required for performing identification calculation once is small; and in a distributed calculation mode, a network can be flexibly established.

Description

technical field [0001] The invention belongs to the technical field of data processing. Background technique [0002] At present, face recognition technology has made great progress. There are also quite a few types of face recognition systems and related equipment on the market. However, these systems or devices all have one thing in common, that is, they all need to store the sample information of the face to be recognized collected in advance in the memory of the entire system or distributed in different device memories to form a face feature When the database, system or device is running, it is necessary to obtain these sample information through network connection or direct access to local storage, so as to realize face recognition or face comparison and complete the face recognition function. [0003] In addition, with the development of machine learning technology, face recognition systems or devices with better recognition results at this stage mostly use deep neur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/31G06K9/00
CPCG06F21/31G06F21/32G06V40/168
Inventor 杨陶柳王曲直贾海涛
Owner 杨陶柳
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products