Unlock instant, AI-driven research and patent intelligence for your innovation.

Face recognition method and system based on public key and capable of performing ciphertext comparison

A face recognition and public key technology, applied in the field of face recognition, to achieve the effect of ensuring the indistinguishability of trapdoors and ciphertext

Active Publication Date: 2021-11-16
广东君略科技咨询有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] For the deficiencies in the prior art, one of the purposes of the present invention provides a face recognition method based on public key ciphertext comparison, which can solve the problem of not relying on plaintext face features for face recognition;
[0005] The second object of the present invention is to provide a face recognition system based on public key ciphertext comparison, which can solve the problem of not relying on plaintext face features for face recognition;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Face recognition method and system based on public key and capable of performing ciphertext comparison
  • Face recognition method and system based on public key and capable of performing ciphertext comparison
  • Face recognition method and system based on public key and capable of performing ciphertext comparison

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] refer to figure 1 , a face recognition method based on public key ciphertext comparison, comprising the following steps:

[0060]Step 1: Generate the global parameter SGP, and the global parameter SGP is generated in the trusted center. The face acquisition end used to collect face features randomly generates at least two secret values ​​(x 1 ,x 2 ), and for the two secret values ​​(x 1 ,x 2 ) to generate the corresponding public key and get the public key pair PK s =(PK 1s , PK 2s ), ie x 1 The public key is PK 1s , x 2 The public key is PK 2s . The face recognition end randomly generates at least two secret values ​​(y 1 ,y 2 ), two secret values ​​(y 1 ,y 2 ) as the private key of the face recognition terminal, for the two password values ​​(y 1 ,y 2 ) to generate the public key set PK r =(PK 1r , PK 2r ), that is, y 1 The public key is PK 1r ,y 2 The public key is PK 2r . Among them, there is 1 face collection terminal, and there are usually...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a face recognition method and system based on a public key and capable of performing ciphertext comparison, and the method comprises the steps: generating at least two secret values and corresponding public key pairs according to global parameters, and generating at least two password values and corresponding public key sets for a face; collecting first face information, extracting a face feature data set, and generating a face feature ciphertext according to the password value and the public key component set; collecting second face information, extracting a face feature data set, and generating a face feature trap door according to the password value and the public key component set; and comparing the face feature ciphertext with the face feature trap door through a preset matching algorithm, and judging whether the first face information and the second face information are the same or not according to a matching comparison result, thereby outputting a face recognition result. According to the method, face recognition verification can be carried out under the condition of ciphertext comparison, face feature data has confidentiality, and the method is suitable for being used by one face acquisition end and a plurality of face recognition ends.

Description

technical field [0001] The present invention relates to the technical field of face recognition, in particular to a face recognition method and system based on public key ciphertext comparison. Background technique [0002] Nowadays, faces are needed in many life and work scenarios. The common access control face card swiping, such as bank face recognition authentication, face recognition has become one of the commonly used identification methods for the public. [0003] Most of the existing face recognition technologies are based on the comparison and recognition of face features in plain text, which is easy to cause face feature data leakage, especially in the field of cloud computing and big data. Once face feature data leaks are often large-scale The leakage of a large number of people will easily lead to the leakage of privacy of a large number of people, and even bring about the impact of subsequent secondary accidents, for example, using the leaked facial feature data...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00H04L9/08
CPCH04L9/0825
Inventor 蒋绍雄周权杨宁滨唐屹
Owner 广东君略科技咨询有限公司