Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Face recognition anti-spoofing method, system and terminal based on infrared rays

A face recognition and anti-spoofing technology, applied in the field of face recognition, can solve the problems of unknown feasibility, inconvenient, complicated use, etc.

Active Publication Date: 2020-09-22
XIDIAN UNIV
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] (1) The existing face recognition technology often ignores or does not consider face spoofing attacks, and is vulnerable to forgery attacks;
[0008] (2) Many existing anti-spoofing technologies are based on traditional manual design methods, which are complicated to use and not very accurate;
[0009] (3) Existing anti-spoofing technologies have their own special situations, but their versatility and robustness are poor;
[0010] (4) Most of the existing anti-spoofing technologies are not effective against environmental lighting changes, 3D mask deception, etc., and some of them require the cooperation of users, which is not convenient enough
However, the feasibility of using infrared imaging for face anti-spoofing is still unknown and needs to be verified experimentally.
In addition, the infrared face data collected by the infrared camera is often not directly usable, and necessary preprocessing and image enhancement are required. This is also one of the difficulties in anti-spoofing based on infrared faces.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Face recognition anti-spoofing method, system and terminal based on infrared rays
  • Face recognition anti-spoofing method, system and terminal based on infrared rays
  • Face recognition anti-spoofing method, system and terminal based on infrared rays

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0101] Aiming at the problems existing in the prior art, the present invention provides an infrared-based face recognition anti-spoofing method.

[0102] Such as figure 1 As shown, the infrared-based face recognition anti-spoofing method provided by the present invention comprises the following steps:

[0103] S101: Obtain a near-infrared face image of the user by using a near-infrared camera;

[0104] S102: Perform image enhancement on the collected near-infrared face image;

[0105] S103: constructing a face authenticity classifier based on a convolutional neural network;

[0106] S104: Construct a dataset of real and fake faces under near-infrared rays, and use the dataset of near-infrared rays of faces to train a face authenticity classifier based on a convolutional neural network;

[0107] S105: User anti-spoofing test, if the output of the classifier is a real face, it is judged that the user belongs to the real identity, allowing access to the subsequent face recogni...

Embodiment 2

[0153] On the basis of the above-mentioned embodiment 1, the embodiment of the present invention provides a face recognition anti-spoofing system based on near-infrared face anti-spoofing, such as Figure 8 Shown is a schematic structural diagram of this embodiment.

[0154] The system provided by the embodiment of the present invention includes hardware (hardware structure such as Figure 8 (a) shown) and software (software structure such as Figure 8 (b) shows) two parts. Wherein the hardware structure includes an infrared image collector, a display, a processor, a memory, an alarm, a communication interface and a communication bus (such as Figure 8 (a) shown). The near-infrared image collector, display, processor, memory, alarm and communication interface are connected through a communication bus to complete mutual data transmission.

[0155] Infrared image collector: used for user's near-infrared face image acquisition;

[0156] Display: display the user data collect...

Embodiment 3

[0167] On the basis of the above-mentioned embodiment 2, the embodiment of the present invention provides a computer program for face recognition anti-spoofing based on infrared rays, such as Figure 9 Shown is a schematic flow chart of this embodiment.

[0168] A computer program based on infrared face recognition and anti-spoofing provided by this embodiment implements the following steps when executed by a processor:

[0169] Step 1. Activate the program and perform necessary initialization.

[0170] Step 2, call the near-infrared image collector to collect the face image, and output the image to the monitor of the computer.

[0171] Step 3. Preprocessing and enhancing the collected face images.

[0172] Specifically, the preprocessing of the image in Step 3 of this embodiment includes: cropping and scaling the near-infrared face image to the resolution required by the program and image grayscale processing. Image enhancement is the cascaded image enhancement method used...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of face recognition, and discloses a face recognition anti-spoofing method, a system and a terminal based on infrared rays, and the method comprises the steps: employing a near-infrared camera to obtain a near-infrared face image of a user; carrying out image enhancement on the acquired near-infrared human face image; constructing a face authenticity classifier based on a convolutional neural network; constructing a real and forged face data set under near infrared rays, and training a face authenticity classifier based on a convolutional neural network by using the near infrared face data set; and performing an anti-spoofing test on the face input by the user, if the output of the system is a real face, judging that the user belongs to a real identity, and allowing access to a subsequent face recognition process. And if the output of the classifier is a forged face, a fact that the user performs spoofing attacking is determined, the user isforbidden from accessing a subsequent face recognition process, and alarm processing is performed. According to the method, the defect that a traditional face recognition technology is poor in safetyor insufficient in anti-spoofing capacity is overcome, and compared with other anti-spoofing methods, the method has higher precision and higher robustness.

Description

technical field [0001] The invention belongs to the technical field of face recognition, and in particular relates to an infrared-based face recognition anti-spoofing method, system and terminal. Background technique [0002] At present, the research and development of identification systems are very important for social life and personal daily life. Biometric identification is a technology for personal identification based on the inherent physiological characteristics of the human body (such as hand shape, fingerprints, facial features, iris, retina, etc.) and behavioral characteristics (such as handwriting, voice, gait). Traditionally based on passwords, identity cards, etc., it does not need to be carried, memorized, and will not be lost or damaged. Among them, face recognition technology has attracted more and more social attention in recent years because of its rapid development in theory and practical application. However, face information is easy to leak, and face r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00G06N3/04G06N3/08
CPCG06N3/08G06V40/166G06V40/168G06V40/172G06V40/45G06N3/045
Inventor 曹志诚庞辽军车东旭赵恒
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products