Unlock instant, AI-driven research and patent intelligence for your innovation.

Face recognition method, device and equipment based on privacy protection

A facial recognition and privacy protection technology, applied in the computer field, can solve problems such as the inability to completely get rid of two-dimensional facial images, poor performance, and the inability of facial recognition system performance to meet business needs.

Active Publication Date: 2020-12-08
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Most of the current facial recognition schemes are mainly based on two-dimensional faces, supplemented by other schemes (such as three-dimensional faces), but whether it is two-dimensional facial recognition or two-dimensional facial recognition, supplemented by many other modes However, no matter it is purely based on two-dimensional facial images or two-dimensional facial images + depth information, neither can completely get rid of two-dimensional facial images, nor can it fundamentally overcome the defects of privacy protection. Currently, based on three-dimensional Compared with two-dimensional facial images, the performance of facial images will be worse. The performance of facial recognition systems based on three-dimensional facial images is far from meeting business needs. Therefore, it is necessary to provide a facial recognition system with better performance and better privacy protection capabilities. Excellent technical solution

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Face recognition method, device and equipment based on privacy protection
  • Face recognition method, device and equipment based on privacy protection
  • Face recognition method, device and equipment based on privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0019] Such as figure 1 As shown, the embodiment of this specification provides a face recognition method based on privacy protection. The execution body of the method can be a terminal device or a server, and the terminal device can be a mobile phone, a tablet computer, a personal computer, or a payment machine, Settlement equipment, vending equipment, facial recognition equipment, etc., the server can be a background server for a certain business (such as transaction business or financial business, etc.), specifically, the server can be a payment business server, or it can be a Servers of facial recognition-related businesses, etc.

[0020] Such as figure 2 Shown is a facial recognition system based on privacy protection, which includes a facial recognition device and a business server. The facial recognition device can include multiple facial recognition devices, each of which can be in a different position, and each facial recognition device can be installed There are a...

Embodiment 2

[0041] Such as image 3 As shown, the embodiment of this specification provides a face recognition method based on privacy protection. The execution body of the method can be a terminal device or a server, and the terminal device can be a mobile phone, a tablet computer, a personal computer, or a payment machine, Settlement equipment, vending equipment, facial recognition equipment, etc., the server can be a background server for a certain business (such as transaction business or financial business, etc.), specifically, the server can be a payment business server, or it can be a Servers of facial recognition-related businesses, etc. The corresponding privacy-preserving facial recognition system can be as follows: figure 2 shown. The method specifically may include the following steps:

[0042] In step S302, three-dimensional historical images and two-dimensional historical images including the faces of one or more different users are obtained, and based on the preset imag...

Embodiment 3

[0099] The above is the facial recognition method based on privacy protection provided by the embodiment of this specification. Based on the same idea, the embodiment of this specification also provides a facial recognition device based on privacy protection, such as Figure 4 shown.

[0100] The facial recognition device based on privacy protection includes: an alignment processing module 401, a confusion module 402, an image data determination module 403 and an identity recognition module 404, wherein:

[0101] The alignment processing module 401 acquires a 3D image and a 2D image including the target user's face, and performs alignment processing on the 3D image and the 2D image based on the preset image key points corresponding to the target user's face, obtaining the aligned three-dimensional image and the two-dimensional image;

[0102] Confusion module 402, block the aligned two-dimensional image, obtain multiple block images of the aligned two-dimensional image, and p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a face recognition method, device and equipment based on privacy protection. The method comprises the steps: obtaining a three-dimensional image and a two-dimensional image which comprise the face of a target user, and aligning the three-dimensional image and the two-dimensional image based on a preset image key point corresponding to the face of the target user to obtain a three-dimensional image and a two-dimensional image after alignment; partitioning the aligned two-dimensional image to obtain a plurality of partitioned images of the aligned two-dimensional image, and performing Arnold transformation on each partitioned image to obtain a partitioned image with confused pixel points so as to protect personal information; obtaining the image dataof the face of the target user based on the blocked image with the confused pixel points and the aligned three-dimensional image; and inputting the image data of the face of the target user into a preset face recognition model to obtain a feature vector corresponding to the image data of the face of the target user, so that the identity information of the target user is determined, wherein the face recognition model is constructed based on a neural network.

Description

technical field [0001] This description relates to the field of computer technology, and in particular to a method, device and equipment for facial recognition based on privacy protection. Background technique [0002] With the continuous maturity and large-scale application of face recognition technology, people's lives are greatly facilitated. Face payment, face attendance, face recognition access control, etc. have been seen everywhere. At the same time, people are paying more and more attention to their private information, and cameras that can be seen everywhere currently collect facial information. Once the facial information is leaked, the privacy of users will also be seriously violated. Therefore, privacy protection is an important link in facial recognition technology. [0003] Most of the current facial recognition schemes are mainly based on two-dimensional faces, supplemented by other schemes (such as three-dimensional faces), but whether it is two-dimensional ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00G06K9/46G06T7/194G06T7/223G06N3/04G06N3/08
CPCG06T7/194G06T7/223G06N3/08G06T2207/10004G06T2207/10028G06T2207/20081G06T2207/30201G06V40/166G06V40/168G06V10/44G06N3/045
Inventor 胡永恒马晨光
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD