Face recognition algorithm evaluation method suitable for public security combats

A face recognition and evaluation method technology, applied in character and pattern recognition, computing, computer parts and other directions, can solve the problems of simplified test difficulty, high algorithm performance, and inability to test algorithm characteristics, and achieve scientific and feasible evaluation results. The effect of high reliability and good practical operability

Active Publication Date: 2018-05-01
SHANGHAI YITU NETWORK SCI & TECH +1
View PDF6 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. The type of comparison does not match: the comparison in academia focuses more on 1:1 comparison, that is, to determine whether two portraits are of the same person. This comparison method is more suitable for civilian scenarios, and is rarely used in public security combat scenarios. use
[0005] 2. The magnitude of the data does not match: the data of the test set in the academic world is small, usually below the order of 10,000, which cannot match the order of tens of millions required by the actual combat of the public security
Experience has shown that when the scale of the portrait library is enlarged by 100 times, the accuracy of 1:N comparison may drop sharply
[0006] 3. Data type mismatch: In the 1:N comparison, although the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Face recognition algorithm evaluation method suitable for public security combats
  • Face recognition algorithm evaluation method suitable for public security combats
  • Face recognition algorithm evaluation method suitable for public security combats

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The present invention will be described in detail below with reference to the drawings and specific embodiments. This embodiment is implemented on the premise of the technical solution of the present invention, and provides detailed implementation and specific operation procedures, but the protection scope of the present invention is not limited to the following embodiments.

[0057] A face recognition algorithm evaluation method suitable for public security actual combat, such as figure 1 Shown, including:

[0058] Library building test: Input the sample picture database, build a portrait library by the program equipped with the algorithm to be tested, and collect the library building speed and storage rate of the program;

[0059] Recognition test: input multiple pictures to be recognized, and the program selects the closest set number of pictures for each picture to be recognized from the portrait library created by the program, that is, a 1:N test method is adopted;

[006...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a face recognition algorithm evaluation method suitable for public security combats. The method comprises the following steps of: library establishment test: inputting a sample picture database, establishing a portrait library by a program which carries a to-be-tested algorithm, and acquiring a library establishment speed and a pass rate of the program; recognition test: inputting a plurality of to-be-recognized pictures, selecting a proximate set number of pictures for each to-be-recognized picture from the established portrait library by the program; and result evaluation: obtaining evaluation for the program according to results of the library establishment test and the recognition test. Compared with the prior art, the library establishment process and the recognition process are tested, for query in 1: N test, a plurality of data sets are clearly divided in the recognition process according to data, some data sets are divided according to different photo types, some data sets are divided according to factors which influence the face appearances, and particularly, groups with different age differences are added, so that using performance of old photos in combats is used for reference.

Description

Technical field [0001] The invention relates to an evaluation method, in particular to a face recognition algorithm evaluation method suitable for public security actual combat. Background technique [0002] The face algorithm in the field of public security actual combat mainly has the following application forms: the first type is 1:N comparison, for the unknown identity of the person, query its most similar K person in a given portrait database; the second type is n :N comparison, cross-comparison of two libraries, and judge whether there are the same persons in the two libraries by similarity. In the 1:N comparison, the portrait database is usually very large, such as several million to tens of millions of permanent (or temporary) population. After obtaining the most similar K portrait, the public security personnel can confirm their identity through post-investigation. In the n:N comparison, the purpose is to screen out the criminal suspects whose identity is whitewashed. n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/00
CPCG06V40/172
Inventor 俞梦洁陈远浩庄唯胡雷地
Owner SHANGHAI YITU NETWORK SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products