Face authentication method, image base input method and device and processing equipment

A face image and authentication method technology, applied in the field of image processing, can solve the problems of slow unlocking process of mobile devices, substandard quality of face images, and unlocking failures, etc.

Inactive Publication Date: 2019-05-10
BEIJING KUANGSHI TECH CO LTD
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the above method has flaws. Even after the algorithm model screening, there are still cases where face images with substandard quality are stored as authentication information. When using the above face images to unlock, the unlocking process of the mobile device is slow or even fails to unlock.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Face authentication method, image base input method and device and processing equipment
  • Face authentication method, image base input method and device and processing equipment
  • Face authentication method, image base input method and device and processing equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] First, refer to figure 1 An example electronic device 100 for implementing the face authentication method and the image base database entry method according to the embodiment of the present invention will be described.

[0031] Such as figure 1 A schematic structural diagram of an electronic device is shown, and the electronic device 100 includes one or more processing devices 102 and one or more storage devices 104 . Optionally, figure 1 The electronic device 100 shown may further include an input device 106, an output device 108, and an image capture device 110, and these components are interconnected by a bus system 112 and / or other forms of connection mechanisms (not shown). It should be noted that figure 1 The components and structure of the electronic device 100 shown are only exemplary, not limiting, and the electronic device may also have other components and structures as required.

[0032] The processing device 102 may be a gateway, or an intelligent termi...

Embodiment 2

[0040] see figure 2 Shown is a flow chart of a face authentication method, which can be executed by the electronic device provided in the foregoing embodiments, such as a mobile terminal. The method specifically includes the following steps:

[0041] Step S202, acquiring the image of the object to be authenticated.

[0042] The mobile terminal can collect images of the object to be authenticated through a camera, such as a front camera. When the user uses the mobile terminal to perform face unlocking, the user can point the face at the camera device, and the face image is collected by it, that is, the face image of the object to be authenticated is obtained. After the face image is acquired, feature extraction can be performed on it to obtain feature information corresponding to the face image, which is used in the comparison process in the subsequent steps.

[0043] Step S204, comparing the above-mentioned image with a plurality of face images in the bottom database to obt...

Embodiment 3

[0065] see image 3 Shown is a flow chart of a method for entering an image base database. This method can be executed by the electronic device provided in the foregoing embodiments, such as a mobile terminal. The method specifically includes the following steps:

[0066] Step S302, acquiring multiple images of the object.

[0067] In this embodiment, the face image of the subject can be captured by the front camera module of the mobile terminal.

[0068] Step S304, performing image quality detection on the above-mentioned images respectively.

[0069] For a specific image quality detection manner, reference may be made to the foregoing embodiments, and details are not repeated here.

[0070] In step S306, the image that passes the detection is used as the bottom library image of the above-mentioned object. . Delete the images that fail the detection, and reacquire at least one image of the object.

[0071] In this embodiment, the multi-bottom library image entry mechanis...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a face authentication method, an image base input method and device, and processing equipment, and relates to the technical field of mobile terminals, and the method comprises the steps: obtaining an image of a to-be-authenticated object; comparing the images with a plurality of base library face images respectively to obtain a plurality of similarity values, and enabling the plurality of base library face images to correspond to the same to-be-authenticated object; and determining whether the to-be-authenticated object passes the authentication or not according to the plurality of similarity values. According to the embodiment of the invention, after the to-be-identified image is acquired, the to-be-identified image is compared with a plurality of pre-stored base library face images; and whether authentication is passed is judged according to a comparison result, the same object is supported to input a plurality of bottom library face images, the unlocking problem caused by the bottom library image quality can be solved, and compared with a single bottom library unlocking method, the unlocking success rate is increased, and the user experience is improved.

Description

technical field [0001] The invention relates to the technical field of image processing, in particular to a face authentication method, an image base database entry method, a device and a processing device. Background technique [0002] In the existing face unlocking scheme for mobile devices, the user records his face through the camera, so that the mobile device memorizes the face information in advance, and then recognizes the face through the camera to unlock and log in to the device. When using the camera to record, generally only a single image is collected on the user's face. The single image can be an infrared (Infrared Radiation) image or an RGB image. The authentication information for face unlocking is saved to the bottom library of the mobile device. [0003] However, there are defects in the above method. Even after the algorithm model screening, there are still cases where face images with substandard quality are stored as authentication information. When usin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00G06F16/583G06F21/32
Inventor 曹剑楠
Owner BEIJING KUANGSHI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products