Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

3D face live detection method, face authentication and recognition method and device

A liveness detection and face technology, applied in the computer field, can solve problems such as poor performance of liveness detection, achieve the effects of improving accuracy, effective security verification, and ensuring overall performance

Active Publication Date: 2018-12-25
ADVANCED NEW TECH CO LTD
View PDF11 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of this specification provides a three-dimensional facial living body detection method, face authentication and recognition method and device, which are used to solve the problem of poor performance of living body detection in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • 3D face live detection method, face authentication and recognition method and device
  • 3D face live detection method, face authentication and recognition method and device
  • 3D face live detection method, face authentication and recognition method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0069] refer to Figure 1a As shown, it is a schematic diagram of the steps of the three-dimensional facial living detection method provided by the embodiment of this specification. The method can be executed by a three-dimensional facial living detection device or a mobile terminal installed with a three-dimensional facial living detection device.

[0070] The three-dimensional facial living body detection method may include the following steps:

[0071] Step 102: Obtain multiple frames of depth images for the target detection object.

[0072] It should be understood that in the embodiments of this specification, the 3D face liveness detection involved is mainly aimed at the 3D face liveness detection of human beings. According to the analysis of the 3D face image, it is determined whether the target detection object is a living body, that is, whether it is Object detection in the image The subject himself. In fact, the target detection object of the 3D face liveness detecti...

Embodiment 2

[0163] refer to Figure 4 As shown, it is a schematic diagram of the steps of the face recognition recognition method provided by the embodiment of this specification, and the method can be executed by a face recognition recognition device or a mobile terminal installed with a face recognition recognition device.

[0164] The facial recognition recognition method may include the following steps:

[0165] Step 402: Obtain multiple frames of depth images for the target detection object.

[0166] For the specific implementation of step 402, reference may be made to step 102.

[0167] Step 404: Perform alignment preprocessing on the multi-frame depth images to obtain preprocessed point cloud data.

[0168] For the specific implementation of step 404, reference may be made to step 104.

[0169] Step 406: Perform normalization processing on the point cloud data to obtain a grayscale depth image.

[0170] For the specific implementation of step 406, reference may be made to step ...

Embodiment 3

[0177] Refer below Figure 5 The electronic equipment of the embodiment of this specification is introduced in detail. Please refer to Figure 5 , at the hardware level, the electronic device includes a processor, and optionally also includes an internal bus, a network interface, and a memory. Wherein, the memory may include a memory, such as a high-speed random-access memory (Random-Access Memory, RAM), and may also include a non-volatile memory (Non-Volatile Memory), such as at least one disk memory. Of course, the electronic device may also include hardware required by other services.

[0178] The processor, network interface, and memory can be interconnected by an internal bus, which can be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, or an extended industrial bus. Standard structure (Extended Industry Standard Architecture, EISA) bus, etc. The bus can be divided into address bus, data bus, control bus and so on. For conv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the specification relates to a three-dimensional face living detection method, a face authentication recognition method and a device thereof. The method comprises the following steps:acquiring a plurality of frames of depth images for a target detection object; performing alignment preprocessing on the multi-frame depth images to obtain the preprocessed point cloud data; normalizing the point cloud data to obtain a gray-scale depth image; a live detection being perform based on that gray-scale depth image and the live detection model.

Description

technical field [0001] The embodiments of this specification relate to the field of computer technology, and in particular to a three-dimensional face biopsy detection method, a face authentication recognition method and a device. Background technique [0002] In order to improve authentication security, the currently popular face recognition detection technology has been used. [0003] In the face recognition system, the most common way of deception is impersonation attack, that is, an imposter uses some fake features with the same expression to invade the face recognition system. At present, the commonly used impersonation attack methods mainly include photos, videos and 3D models. [0004] At present, live detection technology is mainly used to defend against similar attacks. Specific living body actions are completed through the issued instructions, such as blinking, head turning, mouth opening and other physiological behaviors, so that whether it is a living body can ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00G06T7/55
CPCG06T7/55G06T2207/30201G06T2207/10028G06T2207/20081G06T2207/20084G06V40/161G06V40/172G06V40/45G06V40/16G06V20/64G06N3/045
Inventor 马晨光李亮
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products