Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Encrypted face recognition method based on Ridgelet-DCT and Tent-Henon double chaos

A face recognition and double chaos technology, applied in the field of face recognition, can solve problems such as poor resistance to geometric attacks and occlusion attacks, theft of face images and their personal related information, and potential safety hazards

Pending Publication Date: 2022-02-25
HAINAN UNIVERSITY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

While face recognition technology brings a series of conveniences, there are also huge security risks
During face recognition, a large amount of original face data is collected and stored and transmitted in the cloud, which may easily lead to the theft, leakage or tampering of face images and personal related information by others, causing certain losses and impacts on individuals and society
[0003] At present, the method used for face image encryption and recognition is mainly the face recognition method based on wavelet dimensionality reduction under homomorphic encryption. Although it has a high recognition effect, it has poor anti-geometric attack and occlusion attack ability and low robustness.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted face recognition method based on Ridgelet-DCT and Tent-Henon double chaos
  • Encrypted face recognition method based on Ridgelet-DCT and Tent-Henon double chaos
  • Encrypted face recognition method based on Ridgelet-DCT and Tent-Henon double chaos

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to enable those skilled in the art to better understand the solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0036] For ease of understanding, see figure 1 with figure 2 , the encrypted face recognition method based on Ridgelet-DCT transform and Tent-Henon double chaos provided by the present invention may further comprise the steps:

[0037] Step 101, construct a Tent-Henon double chaos model based on Tent chaos scrambling and Henon chaos scrambling. The ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encrypted face recognition method based on Ridgelet-DCT and Tent-Henon double chaos. The method comprises the following steps: generating a first encryption key and a second encryption key by using a double-chaos model, performing Ridgelet transformation on a face image, and performing primary encryption on the face image in a Ridgelet transformation domain and the first encryption key; carrying out DCT on the encrypted image and performing Hadamard product operation on the encrypted image and a second encryption key for secondary encryption, and acquiring an encrypted face image after DCT inverse transformation; finally, extracting encrypted face image features in combination with a PCA algorithm, and training a neural network model to complete encryption recognition of the face image. The geometric attack resistance and the shielding attack resistance of the face image are improved, so that the method has high robustness.

Description

technical field [0001] The invention relates to the technical field of face recognition, in particular to an encrypted face recognition method based on Ridgelet-DCT transformation and Tent-Henon double chaos. Background technique [0002] Face recognition technology refers to computer technology that uses analysis and comparison of facial feature information for identity identification. In recent years, face recognition technology has become a hot spot in artificial intelligence research, and face recognition products have been widely used in finance, security inspection, medical care and other fields. While face recognition technology brings a series of conveniences, there are also huge security risks. During face recognition, a large amount of original face data is collected and stored and transmitted in the cloud, which may easily lead to the theft, leakage or tampering of face images and personal related information by others, causing certain losses and impacts on indiv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K9/62G06N3/08G06V40/16H04L9/00H04L9/14
CPCG06N3/084H04L9/001H04L9/14G06F18/2135G06F18/214
Inventor 李京兵刘子龙黄梦醒刘婧陈延伟
Owner HAINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products