Unlock instant, AI-driven research and patent intelligence for your innovation.

Face anti-fraud method and system based on asymmetric auxiliary information embedded network

A technology of auxiliary information and auxiliary network, which is applied in the field of face anti-fraud methods and systems, can solve problems such as easy-to-deceive face recognition systems and difficulties, and achieve the effect of improving discrimination accuracy and generalization

Active Publication Date: 2021-05-14
中科人工智能创新技术研究院(青岛)有限公司
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The inventors discovered that the human face is easier to obtain than other biometrics such as fingerprints and irises, but in a malicious environment, this advantage becomes a weakness, and an attacker can easily spoof face recognition using a photo or video of a valid user system
On the other hand, with the development of science and technology, there are more and more complex attack tools such as 3D masks, which make the face recognition system face greater threats; in recent years, face anti-fraud technology has made some progress, but Existing works still have difficulties in dealing with complex spoofing attacks and applying them to real scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Face anti-fraud method and system based on asymmetric auxiliary information embedded network
  • Face anti-fraud method and system based on asymmetric auxiliary information embedded network
  • Face anti-fraud method and system based on asymmetric auxiliary information embedded network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] The purpose of this embodiment is to provide a face anti-spoofing method based on asymmetric auxiliary information embedding network.

[0045] A face anti-fraud method based on asymmetric auxiliary information embedding network, including:

[0046] Obtain a face image, detect its face position area, and obtain the key point position of the face according to the face position area;

[0047] Perform a preprocessing operation on the face image according to the positions of key points of the face;

[0048] Input the pre-processed face image into the pre-trained asymmetric auxiliary information embedding network, and obtain a confidence list corresponding to the face image that is judged to be a real face;

[0049] Comparing the values ​​in the confidence list with a preset confidence threshold to obtain anti-fraud detection results for all faces in the face image.

[0050] Further, the method uses an asymmetric multi-classification method and an asymmetric triple loss, on...

Embodiment 2

[0113] The purpose of this embodiment is to provide a face anti-fraud system based on asymmetric auxiliary information embedded in the network.

[0114] A face anti-fraud system based on asymmetric auxiliary information embedded network, including:

[0115] An image acquisition unit configured to acquire a face image, detect its face position area, and acquire the key point position of the face according to the face position area;

[0116] A pre-processing unit configured to perform a pre-processing operation on the face image according to the positions of key points of the face;

[0117] A detection unit configured to input the pre-processed face image into a pre-trained asymmetric auxiliary information embedding network, and obtain a confidence list corresponding to the face image that is judged to be a real face; The value in the confidence list is compared with the preset confidence threshold to obtain the anti-fraud detection results of all faces in the face image.

Embodiment 3

[0119] The purpose of this embodiment is to provide an electronic device.

[0120] An electronic device, including a memory, a processor, and a computer program stored on the memory, when the processor executes the program, the face anti-fraud method based on asymmetric auxiliary information embedded in the network is implemented, including :

[0121] Obtain a face image, detect its face position area, and obtain the key point position of the face according to the face position area;

[0122] Perform a preprocessing operation on the face image according to the positions of key points of the face;

[0123] Input the pre-processed face image into the pre-trained asymmetric auxiliary information embedding network, and obtain a confidence list corresponding to the face image that is judged to be a real face;

[0124] Comparing the values ​​in the confidence list with a preset confidence threshold to obtain anti-fraud detection results for all faces in the face image.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a face anti-fraud method and system based on an asymmetric auxiliary information embedded network. The method comprises the steps: obtaining a face image, and obtaining the positions of face key points; performing preprocessing operation on the face image according to the face key point position; inputting the face image subjected to the preprocessing operation into a pre-trained asymmetric auxiliary information embedding network, and obtaining a confidence coefficient list which corresponds to the face image and is judged as a real face; and comparing the values in the confidence coefficient list with a preset confidence coefficient threshold value to obtain anti-fraud detection results of all faces in the face image. According to the scheme, through an asymmetric multi-classification method and asymmetric triple loss, on one hand, the algorithm is guided to find features of multiple attack types, and on the other hand, the distance between a real face category and other multiple false face attack categories is increased, so that the generalization of the algorithm to the attack types and the practicability in practical application are improved.

Description

technical field [0001] The disclosure belongs to the technical fields of artificial intelligence, pattern recognition, and digital image processing, and in particular relates to a face anti-fraud method and system based on embedding asymmetric auxiliary information into a network. Background technique [0002] The statements in this section merely provide background information related to the present disclosure and do not necessarily constitute prior art. [0003] Face anti-spoofing, also known as liveness detection, face expression attack detection, etc., aims to judge whether the captured face is a real face or a fake face attack (such as: paper printed image, image or video on an electronic screen, masks, etc.). Commonly used face representation attack tools include paper, electronic screens, and 3D masks. [0004] In recent years, with the development of artificial intelligence and deep learning, face recognition technology has been widely used in our daily life, such ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K9/00G06N3/08
CPCG06N3/08G06V40/161G06V40/45Y02T10/40
Inventor 李琦单彩峰王卫宁孙哲南董潇潇王海滨李凯
Owner 中科人工智能创新技术研究院(青岛)有限公司