Face recognition method and device capable of protecting privacy

A technology to protect privacy and face recognition, applied in the computer field, can solve the problem of inability to access cloud servers

Active Publication Date: 2021-01-08
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in some offline scenarios or weak network environments, due to the inability to acces

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Face recognition method and device capable of protecting privacy
  • Face recognition method and device capable of protecting privacy
  • Face recognition method and device capable of protecting privacy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029]The following describes the solutions provided in this specification with reference to the drawings.

[0030]Before describing the solution provided in this specification, the following description of the inventive concept of this solution is provided:

[0031]As mentioned earlier, current face recognition methods are generally not suitable for offline scenarios or weak network environments. In order to improve the universal applicability of the face recognition method, the inventor of this application proposes that the terminal alone executes a complete face recognition solution. That is, after the face image is collected on the terminal, the terminal extracts features from the collected face image, and compares the extracted features with the features of each face image in the face feature library (hereinafter referred to as face features) . The terminal here may be, for example, a mobile phone, a tablet computer, a personal computer, a wearable device, etc.

[0032]It should be unde...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a privacy-protecting face recognition method and device, and the method comprises the steps: obtaining a layered navigable small-world HNSW graph; and obtaining target features of a to-be-recognized face image, and performing the first dimension reduction on the target features to obtain dimension reduction features; performing homomorphic encryption on thedimension reduction feature by adopting the first public key to obtain a first target ciphertext vector; performing homomorphic encryption on the target feature by using a second public key to obtaina second target ciphertext vector; starting from the topmost NSW of the multi-layer NSW, performing layer search on each layer of NSW according to a sequence from top to bottom until k neighbor nodesof the first target ciphertext vector are searched from the N nodes in the bottommost NSW; obtaining respective second ciphertext vectors of the k face images represented by the k neighbor nodes froman encrypted second face feature library; and comparing the second target ciphertext vector with respective second ciphertext vectors of the k face images to determine a comparison result of the to-be-recognized face image.

Description

Technical field[0001]One or more embodiments of this specification relate to the field of computer technology, and more particularly to a privacy-protected face recognition method and device.Background technique[0002]In recent years, face recognition technology has developed rapidly and quickly landed, and it has been widely used in various scenarios, such as authentication and verification, face access control, self-service kiosks, face payment, and so on.[0003]Most of the current face recognition technologies are to collect face images on the terminal first, then extract features from the collected face images on the cloud server, and compare the extracted features with the facial features in the feature library. To complete face recognition. However, in some offline scenes or weak network environments, because the cloud server cannot be accessed, it is impossible to complete face recognition based on the current face recognition method.Summary of the invention[0004]One or more em...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/00G06K9/62G06F21/60G06F21/62G06N3/04
CPCG06F21/602G06F21/6245G06V40/161G06V40/168G06N3/045G06F18/213G06F18/2135
Inventor 周启贤张君涛
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products