Unlock instant, AI-driven research and patent intelligence for your innovation.

A face recognition method and system based on public key ciphertext comparison

A face recognition and public key technology, applied in the field of face recognition, to ensure the indistinguishability of trapdoors and the indistinguishability of ciphertexts

Active Publication Date: 2022-06-17
广东君略科技咨询有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of the deficiencies in the prior art, one of the purposes of the present invention provides a face recognition method based on public key ciphertext comparison, which can solve the problem of face recognition that does not rely on plaintext face features;
[0005] The second object of the present invention is to provide a face recognition system based on public key ciphertext comparison, which can solve the problem of face recognition without relying on plaintext face features;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A face recognition method and system based on public key ciphertext comparison
  • A face recognition method and system based on public key ciphertext comparison
  • A face recognition method and system based on public key ciphertext comparison

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] refer to figure 1 and figure 2 , a face recognition method based on public key ciphertext comparison, comprising the following steps:

[0060] Step 1: Generate the global parameter SGP, and the global parameter SGP is generated in the trusted center. The face collection terminal used to collect face features randomly generates at least two secret values ​​(x 1 ,x 2 ), and for the two secret values ​​(x 1 ,x 2 ) to generate the corresponding public key and get the public key pair PK s =(PK 1s ,PK 2s ), i.e. x 1 The public key is PK 1s , x 2 The public key is PK2s . The face recognition terminal randomly generates at least two secret values ​​(y 1 ,y 2 ), two secret values ​​(y 1 ,y 2 ) as the private key of the face recognition terminal, for the two password values ​​(y 1 ,y 2 ) to generate the public key set PK r =(PK 1r ,PK 2r ), i.e. y 1 The public key is PK 1r , y 2 The public key is PK 2r . Among them, there is one face collection terminal,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a face recognition method and system based on public key ciphertext comparison, the method includes: generating at least two secret values ​​and corresponding public key pairs according to global parameters, and generating at least two password values ​​for faces and the corresponding public key set; collect the first face information and extract the face feature data set, generate face feature ciphertext according to the password value and the public key component set; collect the second face information and extract the face feature data According to the password value and public key component set, the face feature trapdoor is generated; the face feature ciphertext is compared with the face feature trapdoor through the preset matching algorithm, and the first face information and the second face feature information are judged according to the matching comparison results. Whether the face information of the two people is the same, so as to output the face recognition result. The invention can carry out face recognition and verification under the condition of ciphertext comparison, the face feature data has confidentiality, and is suitable for one face collection terminal and several face recognition terminals.

Description

technical field [0001] The invention relates to the technical field of face recognition, in particular to a face recognition method and system based on public key ciphertext comparison. Background technique [0002] Nowadays, faces are required in many life and work scenarios. Common access control face swiping cards, such as bank face recognition authentication, face recognition has become one of the commonly used identification methods for the public. [0003] Most of the existing face recognition technologies are based on the comparison and recognition of plaintext face features, which is easy to cause face feature data leakage, especially in the fields of cloud computing and big data, once the face feature data leakage is often large-scale. It is easy to leak the privacy of a large number of people, and even bring about the subsequent secondary accident impact, for example, the use of the leaked facial feature data for identity theft to steal money. In cloud computing, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06V40/16G06V40/50H04L9/08
CPCH04L9/0825
Inventor 蒋绍雄周权杨宁滨唐屹
Owner 广东君略科技咨询有限公司