CN104866832B - A kind of novel examination face authentication method - Google Patents

A kind of novel examination face authentication method Download PDF

Info

Publication number
CN104866832B
CN104866832B CN201510287691.2A CN201510287691A CN104866832B CN 104866832 B CN104866832 B CN 104866832B CN 201510287691 A CN201510287691 A CN 201510287691A CN 104866832 B CN104866832 B CN 104866832B
Authority
CN
China
Prior art keywords
data
acquisition
tested
cloud storage
storage service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510287691.2A
Other languages
Chinese (zh)
Other versions
CN104866832A (en
Inventor
庄弘
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
FUJIAN WISDOM INTERNET OF THINGS RESEARCH INSTITUTE Co Ltd
Original Assignee
FUJIAN WISDOM INTERNET OF THINGS RESEARCH INSTITUTE Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by FUJIAN WISDOM INTERNET OF THINGS RESEARCH INSTITUTE Co Ltd filed Critical FUJIAN WISDOM INTERNET OF THINGS RESEARCH INSTITUTE Co Ltd
Priority to CN201510287691.2A priority Critical patent/CN104866832B/en
Publication of CN104866832A publication Critical patent/CN104866832A/en
Application granted granted Critical
Publication of CN104866832B publication Critical patent/CN104866832B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • G06F18/241Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
    • G06F18/2411Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on the proximity to a decision surface, e.g. support vector machines

Abstract

The present invention relates to Internet of Things information technology fields, and in particular to a kind of novel examination face authentication method, comprising the following steps: data acquisition device acquisition character information and image information simultaneously generate acquisition data;Data processing equipment is according to the region affiliation for acquiring data, it will be in corresponding territorial classification database in the long-range client database of acquired data storage to cloud storage service device, field verifying acquisition device acquires Data Concurrent to be tested and send to cloud storage service device, the data to be tested are compared cloud storage service device tune with acquisition data, whether matched with the territorial classification database where corresponding acquisition data with judging the region affiliation of the data to be tested, matching result generates verification information, to judge that can the data to be tested obtain verifying authorization, if, then further by 1 than the comparison method of N to know data to be tested whether with acquisition data match, and then obtain the admission the verifying whether data to be tested pass through region affiliation ground.Verification efficiency of the present invention is high.

Description

A kind of novel examination face authentication method
Technical field
The present invention relates to Internet of Things information technology fields, and in particular to a kind of novel examination face authentication method.
Background technique
Existing examination process be all student's standard textual criticism etc. carry out after identification just can admission, this examination process deposits In two o'clock drawback: first is that pupilage identifies problem, the process is more difficult to determine whether examinee, easily occurs impersonating phenomenon;Two It is that the process is not humanized enough, examinee easily omits admission card for entrance examination, or passes through other many and diverse formalities.Time, nothing are both consumed in this way It doubts and increases unnecessary psychological burden to examinee.
Above mentioned traditional personal identification method mainly include two aspect: 1. identity articles, as identity card, Atm card, key etc.;2. identity knowledge, such as user name, password.There are distinct disadvantages for these traditional identity recognition methods: a Personage's product are lost, and personal information is forged, even personation.For above situation, people need to find more easily personal Recognition methods, such as fingerprint recognition, recognition of face.
Current Internet of Things, cloud computing, mode identification technology rapidly develop, and on the other hand various examinations emerge one after another, and take an examination Personnel are numerous, and examination personnel's face data is resourceful, therefore how to be solved using new technology, biometric image, face resource etc. Exam information identification problem has become more and more important.
Summary of the invention
Above-mentioned technical problem is solved, the present invention provides a kind of novel examination face authentication methods, based in data cloud The heart and technology of Internet of things substantially increase recognition efficiency, improve anti-counterfeiting performance.
In order to achieve the above object, the technical scheme adopted by the invention is that, a kind of novel examination face authentication method, This method applies to a system, the service system, including data acquisition device, data processing equipment, cloud storage service device and more Acquisition device is verified in a admission, and data acquisition device establishes data communication by wired or wireless internet and data processing equipment Connection, data processing equipment are established data communication with cloud storage service device by wired or wireless LAN and are connect, data acquisition Device acquisition character information and image information simultaneously generate acquisition data, are sent to data processing equipment in real time;Data processing equipment According to the region affiliation of acquisition data, by corresponding area in the long-range client database of acquired data storage to cloud storage service device In the taxonomy database of domain;Method includes the following steps:
Data acquisition device acquisition character information and image information simultaneously generate acquisition data, are sent to data processing dress in real time It sets;Data processing equipment is according to the region affiliations of acquisition data, by acquired data storage to the remote port of cloud storage service device In database in corresponding territorial classification database;
Multiple admission verifying acquisition device dispersed distributions are in each region ownership place admission check post, admission verifying acquisition dress It sets acquisition Data Concurrent to be tested to send to cloud storage service device, cloud storage service device compares the data to be tested and acquisition data It is right, whether matched with the territorial classification database where corresponding acquisition data with judging the region affiliation of the data to be tested, Verification information is generated with result, to judge that can the data to be tested obtain verifying authorization, if so, further passing through 1 ratio than N Compared with method to knowing whether data to be tested match with acquisition data, and then obtains the data to be tested and whether pass through the region and return The admission in possession is verified.
Further, described 1 comparison method than N specifically: cloud storage service device is by 1 data to be tested and N number of acquisition number It is compared according to by the face recognition algorithms of characteristic weighing, the face recognition algorithms of this feature weighting are the following steps are included: head Facial image is first resolved into using wavelet transformation by high-low frequency weight, principal component analysis (PCA) then is carried out to different components and is mentioned Take characteristic image, be weighted further according to the importance of each component using AHP algorithm, finally using support vector machines (SVM) into Row Classification and Identification.
The present invention is by using above-mentioned technical proposal, compared with prior art, has the advantages that
One, when admission identification, by the acquisition data in the data to be tested and long-range client database of invigilating collection in worksite It is compared, compared with existing identification method, recognition efficiency and accuracy rate can be improved;Moreover, first critical region ownership place with Can whether the territorial classification database where acquisition data matches, generate verification information according to matching result, be obtained with judgement Verifying authorization is obtained, and then knows whether data to be tested are verified by the admission on the region affiliation ground, different regions can be prevented ID inquiring, verifying between ownership place, improve the confidentiality of admission authentication.
Two, the present invention is applied to invigilator scene, when identifying to invigilator's identity, provides identity without personnel on site to be tested These external things such as card, admission card for entrance examination carry out identification by human face image information, and user experience is good, and anti-counterfeiting performance is good, no It easily forges and stolen;Examination face identification system will arrange to offer convenience to heavy business of examining, and improves admission efficiency, simplifies personnel Setting has preferable operability, achievees the effect that get twice the result with half the effort.
Detailed description of the invention
Fig. 1 is the chain graph of the system of the embodiment of the present invention.
Fig. 2 is the topological diagram of the system of the embodiment of the present invention.
Fig. 3 is each component of one layer of wavelet decomposition and its subgraph.
Fig. 4 is the basic thought schematic diagram of support vector machines.
Fig. 5 is algorithm flow chart.
Fig. 6 is face experimental data base figure
Fig. 7 (I) algorithms of different comparison result comparison diagram.
Fig. 7 (II) algorithms of different comparison result comparison diagram.
Influence schematic diagram of Fig. 8 feature accumulated value to discrimination
Specific embodiment
Now in conjunction with the drawings and specific embodiments, the present invention is further described.
As a specific embodiment, as depicted in figs. 1 and 2, the novel examination face authentication system of one kind of the invention Acquisition device, data acquisition are verified in system, including data acquisition device, data processing equipment, cloud storage service device and multiple admissions Device is established data communication with data processing equipment by wired or wireless internet and is connect, data processing equipment by wired or WLAN is established data communication with cloud storage service device and is connect,
Data acquisition device acquisition character information and image information simultaneously generate acquisition data, are sent to data processing dress in real time It sets;Data processing equipment is according to the region affiliations of acquisition data, by acquired data storage to the remote port of cloud storage service device In database in corresponding territorial classification database;
Multiple admission verifying acquisition device dispersed distributions are in each region ownership place admission check post, admission verifying acquisition dress It sets acquisition Data Concurrent to be tested to send to cloud storage service device, cloud storage service device compares the data to be tested and acquisition data It is right, whether matched with the territorial classification database where corresponding acquisition data with judging the region affiliation of the data to be tested, Verification information is generated with result, to judge that can the data to be tested obtain verifying authorization, if so, further passing through 1 ratio than N Compared with method to knowing whether data to be tested match with acquisition data, and then obtains the data to be tested and whether pass through the region and return The admission in possession is verified.
Another technical solution of the present invention is a kind of novel examination face authentication method, comprising the following steps:
Data acquisition device acquisition character information and image information simultaneously generate acquisition data, are sent to data processing dress in real time It sets;Data processing equipment is according to the region affiliations of acquisition data, by acquired data storage to the remote port of cloud storage service device In database in corresponding territorial classification database;
For multiple admission verifying acquisition device dispersed distributions in each region ownership place admission check post, acquisition device is verified in field It acquires Data Concurrent to be tested to send to cloud storage service device, cloud storage service device tune compares the data to be tested and acquisition data It is right, whether matched with the territorial classification database where corresponding acquisition data with judging the region affiliation of the data to be tested, Verification information is generated with result, to judge that can the data to be tested obtain verifying authorization, if so, further passing through 1 ratio than N Compared with method to knowing whether data to be tested match with acquisition data, and then obtains the data to be tested and whether pass through the region and return The admission in possession is verified.
As shown in Figure 1, being the chain graph of the system of the embodiment of the present invention, it is using directly upload, access, knowledge from bottom to top Otherwise, i.e., user terminal directly can carry out real-time, interactive with network server.The system data acquisition device is integrated in The acquisition, storage, identification of face may be implemented by data acquisition device for PC, plate, mobile phone;Data acquisition device uses hand The modes such as machine card flow, wireless routing, broadband network are transmitted, and data processing equipment is then web-transporting device, the network transmission Equipment has firewall, load-equalizing switch (realizing that multiple terminal access is not delayed) etc., is effectively transmitted to Large Volume Data, It prevents from distorting, attack.Cloud storage service device includes two-stage, and level-one is province, city site server, data are effectively stored, It accesses, issue;Another area Ji Wei great network server carries out big data analysis, statistics examinee's letter to the data that each department upload Breath, issues comprehensive examination district information in time.
The system allows user to carry out personalized customization, provides document content editor, edit model, reaches What You See Is What You Get Effect.The system should have good safety, scalability, can support more high traffic by hardware or software upgrading. System use modularization, modularization (i.e. user can replace recognizer), the design method of objectification, easy of integration, easy customization, Have good ability of second development, really makes the investment of user minimum, the Maximum Value of creation.System provides daily management dimension Shield, expansible, strong real-time, delay is small, recognition accuracy is high.
The system designs the specification for meeting national test office, is suitable for different types of invigilator and authenticates, accurately identifies face Information, high speed storing retrieve face resource, it is ensured that information security provides use habit, network environment of different crowd etc..
As shown in Fig. 2, being the topological diagram of the system, data center stores the human face data information in each province urban district, provinces and cities Data center carries local face data information, and handheld terminal exactly directly compares the data information.
The characteristics of system is the comparative approach using 1:N, and wherein N represents different N faces, and 1 representative needs to compare Face.Traditional authentication method is the method using 1:1, i.e., the locally downloading terminal of the examination data of server end, so The examination of the picture of downloading and admission is compared afterwards, examinee is judged whether according to comparison result.Such as examinee's A admission When, the information of examinee A has been downloaded in local terminal in advance, when examinee's A admission, compares the photo downloaded, and I.It should There are significant deficiencies for method because from the picture of the locally downloading terminal of server, can taking human as distort picture, thus can Cause the mistake of authentication information, it is understood that there may be impersonate phenomenon.And the method proposed with the system, it can effectively evade such one Kind of phenomenon, because N different pictures are stored in server end, local end user, the data of no weight update server end, than To when, examinee need to compare the different pictures comparison of N simultaneously.Such as after examinee A enters examination hall, handheld terminal login service Device website compares examinee A, if server end can find out the information of examinee A, can admission, be such as not present, be not then this People.Previous examination face authentication method, using 1:1 comparative approach, i.e., under the face picture for server end being had test taker number It is downloaded to local terminal, the test taker number of oneself is shown in examinee's admission at this time, can navigate to the people for having downloaded specific test taker number Then face photo compares examinee and corresponding photo again, this method positioning is fast, it is fast to compare speed, is usually used in admission certification of taking an examination. But the drawbacks of this method it is also obvious that i.e. invigilator person may modify the local terminal photo downloaded, will result in this way Photo change so that test-taker has an opportunity to take advantage of, therefore has more security risk using this method.What the embodiment proposed 1:N method can effectively avoid local information and be tampered, i.e., examinee's admission when, invigilator person acquires examinee's photo, and after being directly connected to Platform face database, is compared, and is 1 couple of N since backstage face database has N different examinee's face informations Comparison, this method effectively prevents examinee information and is tampered, and compares again after avoiding examinee information downloading, has reached foreground It acquires, the effect of backstage high ratio pair.
The system has an advantage that, exactly transregional to set up different comparison data libraries, the i.e. Verification System in somewhere only This area can be logged in.Such as certain section examination hall of Quanzhou Licheng District, the database for logging in the section can only be corresponded to, in this way can The problem of effectivelying prevent database access amount big, comparing not in time.And the central server of Licheng District can check that the area is all Examination hall authentication scenario under section, similarly Quanzhou City can check the examination authentication scenario in all areas.After the present embodiment proposes Platform compare, be that partition domain is compared, that is, which section the examinee acquired belongs to, just directly with the examinee information of section ratio It is right, it is therefore prevented that the face information of big data compares, such as: examinee A admission Quanzhou the first examination district of Licheng District, invigilator person hold plate Instrument acquires examinee A, and whole examinee informations of the examinee A only with the section compare at this time, without doing ratio with citywide examinee information It is right, it avoids and compares repeatedly on a large scale, and the reduced time is shorter, examination admission can be suitable for.
In the present embodiment, described 1 comparison method than N specifically: cloud storage service device is by 1 data to be tested and N number of acquisition Data are compared by the face recognition algorithms of characteristic weighing, this feature weighting face recognition algorithms the following steps are included: Facial image is resolved into using wavelet transformation by high-low frequency weight first, principal component analysis (PCA) then is carried out to different components Characteristic image is extracted, is weighted further according to the importance of each component using AHP algorithm, finally uses support vector machines (SVM) Carry out Classification and Identification.
Wavelet transformation
Wavelet transformation is rapidly developing nearly ten years, it is extended out by Fourier transformation, is capable of providing multiresolution And multiscale analysis, it image processing and analyzing, computer vision, in terms of obtained application of result [4].
Wavelet transformation is to be proposed for the first time by researchers such as Morlet in 1984, if ψ (t) ∈ L2It (R) is one square Integrable function, if ψ (t) meets following conditions:
Then ψ (t) is referred to as a wavelet function, and formula (1) is claimed to be the admissible condition of wavelet function, stretches and translates Wavelet mother function ψ (t) obtains wavelet basis function:
Wherein, a and τ is real number, and a > 0, a are contraction-expansion factor, and τ is shift factor.
Function f (t) ∈ L2(R) continuous wavelet transform CWT is defined as follows:
In formulaFor the conjugate function of mother wavelet.A series of wavelet coefficient can be obtained by formula (3), these are Number is the function of shift factor and zoom factor.
In practical application, when handling small echo, it usually needs be discrete signal, just need to change the factor at this time The size of a and continuous translation parameter τ are not only able to satisfy analysis of the signal on different scale, additionally it is possible to according to different in this way Purpose carrys out selecting scale.This analysis method is highly effective, as a result also very accurate.Wavelet transform may be expressed as:
Wherein, a0、b0For constant, and a0> 0, m, n are integer.
The method taken herein is to carry out a layer scattering wavelet transformation to facial image, generates horizontal component, vertical component And diagonal components, as shown in figure 3, what is obtained is 4 subgraph components of face.
LL is low frequency component in Fig. 3, contains most information of original image, and LH is the confidence of face, and HL is vertical Component, the marginal informations such as nose, ear comprising people, HH are diagonal components, less comprising information.
2.2 principal component analysis methods
Principal Component Analysis (PCA) is a kind of common Mathematical Method, it is the sample point certain correlation, choosing It takes these maximum directions of sample point variance as feature space, reconstitutes one group of incoherent data, thus compressed data [3]。
If the size of facial image is m × n, by becoming the column vector of M=m × n dimension, face training sample after vectorization This is N, XiFor the column vector of i-th of sample, then training sample average value mu is taken:
After each training sample is subtracted face mean value again, matrix A=[X is formed1-μ,X2-μ,...,XN- μ], then The covariance matrix of training sample are as follows:
The optimal projection subspace to be found of the composition of feature vector corresponding to C nonzero eigenvalue is sought again, in reality Recognition of face in generally must accumulate contribution rate with characteristic valueDetermine the principal component dimension d to be chosen, it is general to select Taking makes the characteristic value of α >=90% corresponding feature vector construction feature space.Then the matrix of feature space is U=[u1,u2,..., ud], training sample is projected on feature space, obtains projection matrix:
Q=UTA (7)
The as eigenface of sample.
2.3AHP algorithm
Analytic hierarchy process (AHP) (AHP) be the U.S. plan strategies for scholar T.L.Saaty professor proposed in phase early 1970s, AHP provides criteria decision-making method to a challenge.It needs to establish the structural model of Recurison order hierarchy, and construction judges square Battle array, then Mode of Level Simple Sequence and consistency check [5] are carried out, steps are as follows for the realization of the algorithm:
1. problem stratification is constructed a structural model having levels first;
2. Judgement Matricies, relationship between hierarchical structure reflection factor, but each criterion institute's accounting in target measurement Weight is different;
3. Mode of Level Simple Sequence and consistency check, determine the associated element importance of this level and their order it Between weighted value.
The key of AHP algorithm is Judgement Matricies, it assigns different weights, draw here according to the relationship between factor Use digital 1-9 and its inverse as scale, table 1 lists the meaning of 1-9 scale.
The scoring criteria of element in 1 judgment matrix of table
Judged two-by-two by making n (n-1)/2 to element each in matrix, can derive judgment matrix.
Corresponding Maximum characteristic root λ is sought to judgment matrix A againmax:
A ω=λmaxω (9)
The component of ω is exactly the weighted value of the single sequence of corresponding factor.
It additionally needs to carry out consistency check, order matrix B=(b to weighted valueij)n×n, wherein(i, j= 1,2 ... n)
It enables againThus judgment matrix ordering vector w is obtainedi=(w1, w2... wn)TSide Method is known as " and area method ".The maximum eigenvalue of judgment matrix A can be approximated to be at this timeConsistency is calculated again Index:
Finally calculate consistency rationWherein the value of RI is shown in Table 2.
2 RI value range of table
n 1 2 3 4 5 6 7 8 9 10 11
RI 0 0 0.58 0.90 1.12 1.24 1.32 1.41 1.45 1.49 1.52
Be considered as CR < 0.1 total hierarchial sorting result there is more satisfied consistency and receive the analysis as a result, Otherwise just do not receive.Supplement is needed exist for, after consistency check is completed, also needs to examine order consistent judgment matrix Property, it is finally reached crash consistency.
2.4 support vector machines
Support vector machines is grown up on the basis of Statistical Learning Theory, it is the study mould for having supervision Type, commonly used to carry out pattern-recognition, classification and regression analysis, main thought be defined by interior Product function it is non-thread Property transformation the input space is mapped to a higher dimensional space, so that the data of original linearly inseparable is become the data of linear separability [6], the optimal separating hyper plane of higher dimensional space is then solved again, as shown in Figure 4.
Select suitable support vector machines parameter, extract face characteristic data label, the face characteristic data of extraction into Row training obtains training set, then test sample is supplied to support vector machines, provides knowledge by trained supporting vector machine model Other result.
3 algorithms are realized
Low frequency component is mainly extracted using wavelet transformation and Principal Component Analysis in the past and removes high fdrequency component, directly low Face characteristic is extracted using PCA algorithm on frequency component, then carries out svm classifier identification.The shortcoming of this method is directly to remove The high-frequency information of face picture can make identification division imperfect, and each section of image all plays a role to identification, Make full use of the useful information of each section.
In view of above-mentioned analysis, method proposed in this paper is to fully consider facial image different piece, and implementation step is as follows:
1. facial image is passed through one layer of wavelet decomposition into 4 components of low-and high-frequency first;
2. then carrying out principal component analysis (PCA) to different components extracts characteristic image;
3. the importance further according to each component is weighted fusion using AHP algorithm;
4. finally using fused image as face characteristic, then all samples are divided into training set and test set, used SVM carries out Classification and Identification, and implementation process is as shown in Figure 5:
The weight calculation formula of the algorithm is as follows:
X=ω1LL+ω2LH+ω3HL+ω4HH (11)
Here 4 weights are calculated according to AHP algorithm, wherein ω according to the importance of different components123+ ω4=1.
4 experimental results and analysis
The algorithm is tested in classical face database, which has AT&T, ORL, Yale etc..As shown in fig. 6, It is the part face information of the database.
In experiment, the gray level image of face database is pre-processed first, picture format is unified for 112 × 92, every figure Facial detail it is different.Then according to algorithm proposed in this paper, wavelet transformation is carried out to image, generates four width PCA subgraphs, Subgraph is synthesized according to AHP algorithm, then carries out svm classifier identification.
Experiment 1: in order to verify algorithm proposed in this paper, calculating recognition accuracy under different weights, studies weight to knowledge The not influence of rate.Every a kind of number of training N=5 is selected in experiment, different sons are calculated further according to AHP algorithm in α=90% The weight of figure carries out the experiment of multiple groups weight, and experimental result is as follows:
Discrimination under 3 this paper algorithm difference weight of table
It can be seen that working as the weight ω of low frequency part1When increase, when the weight of high frequency section is reduced, recognition accuracy It will increase.Therefore by setting image different piece weight, the accuracy of recognition of face is helped to improve.
This paper algorithm is applied in experiment 2, and the discrimination of comparison principal component analysis method verifies the accuracy of this paper algorithm.It is real every time In testing, the corresponding weighted value of this paper algorithm, but select different training sample number N, every kind of 5 groups of algorithms selection respectively into Row, takes α=90% every time, as table 4 shows:
The comparing result of 4 algorithms of different of table
(I)
(II)
It is respectively 0.74,0.14,0.1,0.02 that table 4 (I), which is in weight, calculates the discrimination that algorithms of different provides, (II) Being be respectively 0.65,0.15,0.17,0.03, Fig. 7 (I), (II) in weight is corresponding tendency chart respectively, calculates algorithms of different The discrimination provided.Can be seen that training sample is more, and accuracy rate is higher from result above, algorithm proposed in this paper than Other two kinds of algorithm accuracys want high, consider to this paper differentiation the different piece of facial image.
The effect that contribution rate α is accumulated in PCA characteristic value is compared in experiment 3, and the value of α will affect the discrimination of algorithms of different, Experimental comparison's PCA+SVM, 2DPCA+SNM, this paper algorithm (every kind of algorithm training sample N=5, this paper algorithm weight takes 0.74, 0.14,0.1,0.02), concrete outcome is as shown in Figure 8:
As can be seen from Figure 8, contribution rate α will affect the discrimination of algorithm, as α=95%, image recognition rate highest, The main information of image all be used to identify, α takes can all cause discrimination to reduce when other values, therefore when carrying out PCA dimensionality reduction, The main dimension at ingredient selects to be also key.
Although specifically showing and describing the present invention in conjunction with preferred embodiment, those skilled in the art should be bright It is white, it is not departing from the spirit and scope of the present invention defined by the appended claims, it in the form and details can be right The present invention makes a variety of changes, and is protection scope of the present invention.

Claims (2)

1. a kind of novel examination face authentication method, this method apply to a system, which includes data acquisition device, number Acquisition device is verified according to processing unit, cloud storage service device and multiple admissions, data acquisition device passes through wired or wireless interconnection Net is established data communication with data processing equipment and is connect, and data processing equipment passes through wired or wireless LAN and cloud storage service Device establishes data communication connection, and the data acquisition device is integrated in PC, plate or mobile phone, which is characterized in that including following step It is rapid:
Data acquisition device acquisition character information and image information simultaneously generate acquisition data, are sent to data processing equipment in real time; Data processing equipment is according to the region affiliations of acquisition data, by the long-range end data of acquired data storage to cloud storage service device In library in corresponding territorial classification database;
Multiple admission verifying acquisition device dispersed distributions are adopted in each region ownership place admission check post, admission verifying acquisition device Collect Data Concurrent to be tested to send to cloud storage service device, which is compared with acquisition data, sentences by cloud storage service device Whether matched with the territorial classification database where corresponding acquisition data to the region affiliation for the data to be tested of breaking, matching result Verification information is generated, to judge that can the data to be tested obtain verifying authorization, if so, further passing through 1 comparison method pair than N Know whether the facial image of data to be tested is matched with the facial image of acquisition data, and then whether obtains the data to be tested It is verified by the admission on the region affiliation ground, wherein 1 represents the facial image for needing to compare, and N represents N and compares people with this The related different faces image of face image.
2. the novel examination face authentication method of one kind according to claim 1, which is characterized in that described 1 comparison than N Method specifically: cloud storage service device adds the facial image of 1 data to be tested and the facial image of N number of acquisition data by feature The face recognition algorithms of power are compared, and the face recognition algorithms of this feature weighting using small echo the following steps are included: become first It changes and facial image is resolved into high-low frequency weight, principal component analysis then is carried out to different components and extracts characteristic image, further according to The importance of each component is weighted using AHP algorithm, finally carries out Classification and Identification using support vector machines.
CN201510287691.2A 2015-05-29 2015-05-29 A kind of novel examination face authentication method Expired - Fee Related CN104866832B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510287691.2A CN104866832B (en) 2015-05-29 2015-05-29 A kind of novel examination face authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510287691.2A CN104866832B (en) 2015-05-29 2015-05-29 A kind of novel examination face authentication method

Publications (2)

Publication Number Publication Date
CN104866832A CN104866832A (en) 2015-08-26
CN104866832B true CN104866832B (en) 2018-12-04

Family

ID=53912653

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510287691.2A Expired - Fee Related CN104866832B (en) 2015-05-29 2015-05-29 A kind of novel examination face authentication method

Country Status (1)

Country Link
CN (1) CN104866832B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107766796A (en) * 2017-09-25 2018-03-06 郑州云海信息技术有限公司 A kind of facial-recognition security systems and method based on cloud computing
CN115086078B (en) * 2022-07-26 2024-05-03 中诚华隆计算机技术有限公司 Terminal verification method and device

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104899493A (en) * 2015-05-29 2015-09-09 福建省智慧物联网研究院有限责任公司 Novel face authentication system for examination

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4762805B2 (en) * 2006-06-29 2011-08-31 富士通株式会社 Biometric authentication method and biometric authentication system
CN101773394B (en) * 2010-01-06 2011-09-07 中国航天员科研训练中心 Identification method and identification system using identification method
CN102024141A (en) * 2010-06-29 2011-04-20 上海大学 Face recognition method based on Gabor wavelet transform and local binary pattern (LBP) optimization
CN102509138B (en) * 2011-11-18 2014-07-02 山东神思电子技术股份有限公司 Authentication system based on second-generation ID card and human face feature recognition and working method therefor
CN103034880A (en) * 2012-12-14 2013-04-10 上海第二工业大学 Examination identity authentication system and identity authentication method based on face recognition
CN103208007B (en) * 2013-03-19 2017-02-08 湖北微驾技术有限公司 Face recognition method based on support vector machine and genetic algorithm

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104899493A (en) * 2015-05-29 2015-09-09 福建省智慧物联网研究院有限责任公司 Novel face authentication system for examination

Also Published As

Publication number Publication date
CN104866832A (en) 2015-08-26

Similar Documents

Publication Publication Date Title
CN104866831B (en) The face recognition algorithms of characteristic weighing
CN108197532B (en) The method, apparatus and computer installation of recognition of face
CN104899493B (en) A kind of new examination face authentication system
CN100361450C (en) System for blocking off erotic images and unhealthy information in internet
US9514356B2 (en) Method and apparatus for generating facial feature verification model
CN109543829A (en) Method and system for hybrid deployment of deep learning neural network on terminal and cloud
US8031947B2 (en) Method and system for rapid matching of video streams
Fong et al. A biometric authentication model using hand gesture images
CN109446991A (en) Gait recognition method based on global and local Fusion Features
CN105874474A (en) Systems and methods for facial representation
Xu et al. Random partial paired comparison for subjective video quality assessment via HodgeRank
CN108573243A (en) A kind of comparison method of the low quality face based on depth convolutional neural networks
CN104867138A (en) Principal component analysis (PCA) and genetic algorithm (GA)-extreme learning machine (ELM)-based three-dimensional image quality objective evaluation method
CN104239859B (en) Face identification method based on structuring factorial analysis
CN109389045A (en) Micro- expression recognition method and device based on mixing space-time convolution model
CN104834909B (en) A kind of new image representation method based on Gabor comprehensive characteristics
CN104866864A (en) Extreme learning machine for three-dimensional image quality objective evaluation
CN108564061A (en) A kind of image-recognizing method and system based on two-dimensional principal component analysis
CN109670423A (en) A kind of image identification system based on deep learning, method and medium
CN104866832B (en) A kind of novel examination face authentication method
CN104240347B (en) Admission identity authorization system based on image recognition
CN104463210B (en) Classification of Polarimetric SAR Image method based on object-oriented and spectral clustering
CN108010015A (en) One kind refers to vein video quality evaluation method and its system
CN110348516A (en) Data processing method, device, storage medium and electronic equipment
Espinosa-Duró et al. A criterion for analysis of different sensor combinations with an application to face biometrics

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20181204

Termination date: 20190529