CN115953798A - Certificate identification method, device and equipment - Google Patents

Certificate identification method, device and equipment Download PDF

Info

Publication number
CN115953798A
CN115953798A CN202211697569.9A CN202211697569A CN115953798A CN 115953798 A CN115953798 A CN 115953798A CN 202211697569 A CN202211697569 A CN 202211697569A CN 115953798 A CN115953798 A CN 115953798A
Authority
CN
China
Prior art keywords
image
certificate
scanning
characterization vector
classification model
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211697569.9A
Other languages
Chinese (zh)
Inventor
陈志军
徐崴
郭明宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Original Assignee
Advanced New Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced New Technologies Co Ltd filed Critical Advanced New Technologies Co Ltd
Priority to CN202211697569.9A priority Critical patent/CN115953798A/en
Publication of CN115953798A publication Critical patent/CN115953798A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/214Generating training patterns; Bootstrap methods, e.g. bagging or boosting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • G06F18/241Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Abstract

The embodiment of the specification provides a certificate identification method, a certificate identification device and certificate identification equipment. The scheme comprises the following steps: acquiring a first scanning image of the certificate comprising a plurality of anti-counterfeiting areas under a first scanning angle, wherein the anti-counterfeiting areas present different image information at different scanning angles; then acquiring a second scanning image of the certificate at a second scanning angle, and processing the first image by adopting a classification model to obtain a first characterization vector comprising characteristic information of a plurality of anti-counterfeiting areas for characterizing the first image; processing the second image to obtain a second characterization vector comprising characteristic information for characterizing a plurality of anti-counterfeiting areas of the second image, and calculating first similarity of the first characterization vector and the second characterization vector; and when the first similarity is smaller than a preset threshold value, determining that the certificate passes the identification.

Description

Certificate identification method, device and equipment
Technical Field
One or more embodiments of the present disclosure relate to the field of computer technologies, and in particular, to a method, an apparatus, and a device for certificate identification.
Background
At present, with the development of internet technology, various certificates are increasingly applied to daily life of people, such as employee's cards, entrance cards, residence certificates, identity cards and the like, which tend to be intelligent and bring great convenience to our life. However, with the popularization of the certificates, cases for making fake certificates emerge continuously, and various certificate counterfeiting schemes are also in endless, so that people pay more and more attention to the anti-counterfeiting of the certificates.
In the prior art, when the certificate is identified, a single anti-counterfeit label in the certificate is generally identified or a plurality of labels are respectively identified one by one so as to verify the authenticity of the certificate, the process is complex, the efficiency is low, and the accuracy is low.
Accordingly, there is a need to provide a more reliable credential identification scheme.
Disclosure of Invention
In view of this, one or more embodiments of the present disclosure provide a method, an apparatus, and a device for identifying a certificate, which are used to identify an anti-counterfeiting area in the certificate simultaneously by using a classification model, and have high identification accuracy.
In order to solve the above technical problem, the embodiments of the present specification are implemented as follows:
the certificate identification method provided by the embodiment of the specification comprises the following steps:
acquiring a first scanning image of a certificate under a first scanning angle, wherein the scanning angle is an included angle between a plane where a scanning lens is located and a plane where the certificate is located, the certificate comprises one or more anti-counterfeiting areas, and the anti-counterfeiting areas present different image information at different scanning angles;
acquiring a second scanning image of the certificate at a second scanning angle, wherein the first scanning angle is different from the second scanning angle;
processing the first image by adopting a classification model to obtain a first characterization vector, wherein the first characterization vector comprises characteristic information for characterizing a plurality of anti-counterfeiting areas of the first image;
processing the second image by adopting the classification model to obtain a second characterization vector, wherein the second characterization vector comprises characteristic information for characterizing a plurality of anti-counterfeiting areas of the second image;
calculating a first similarity of the first token vector and the second token vector;
judging whether the first similarity is smaller than a preset threshold value or not to obtain a first judgment result;
and when the first judgment result shows that the first similarity is smaller than a preset threshold value, determining that the certificate passes the identification.
The embodiment of this specification provides a certificate recognition device, includes:
the certificate comprises one or more anti-counterfeiting areas, and the anti-counterfeiting areas present different image information at different scanning angles;
the second scanning image acquisition module is used for acquiring a second scanning image of the certificate at a second scanning angle, and the first scanning angle is different from the second scanning angle;
the first characterization vector determination module is used for processing the first image by adopting a classification model to obtain a first characterization vector, and the first characterization vector comprises feature information used for characterizing a plurality of anti-counterfeiting areas of the first image;
the second characterization vector module is used for processing the second image by adopting the classification model to obtain a second characterization vector, and the second characterization vector comprises characteristic information used for characterizing a plurality of anti-counterfeiting areas of the second image;
the first similarity calculation module is used for calculating the first similarity of the first characterization vector and the second characterization vector;
the first judging module is used for judging whether the first similarity is smaller than a preset threshold value or not to obtain a first judging result;
and the certificate identification module is used for determining that the certificate passes identification when the first judgment result shows that the first similarity is smaller than a preset threshold value.
An embodiment of this specification provides a certificate identification equipment, includes:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to cause the at least one processor to:
acquiring a first scanning image of a certificate under a first scanning angle, wherein the certificate comprises one or more anti-counterfeiting areas, and the anti-counterfeiting areas present different image information at different scanning angles;
acquiring a second scanning image of the certificate at a second scanning angle, wherein the first scanning angle is different from the second scanning angle;
processing the first image by adopting a classification model to obtain a first characterization vector, wherein the first characterization vector comprises characteristic information for characterizing a plurality of anti-counterfeiting areas of the first image;
processing the second image by adopting the classification model to obtain a second characterization vector, wherein the second characterization vector comprises characteristic information for characterizing a plurality of anti-counterfeiting areas of the second image;
calculating a first similarity of the first token vector and the second token vector;
judging whether the first similarity is smaller than a preset threshold value or not to obtain a first judgment result;
and when the first judgment result shows that the first similarity is smaller than a preset threshold value, determining that the certificate passes the identification.
Embodiments of the present specification provide a computer readable medium having computer readable instructions stored thereon, the computer readable instructions being executable by a processor to implement a method of credential identification.
One embodiment of the present description achieves the following advantageous effects: acquiring a first scanning image of a certificate under a first scanning angle, wherein the certificate comprises one or more anti-counterfeiting areas presenting different image information at different scanning angles; acquiring a second scanning image of the certificate at a second scanning angle, wherein the first scanning angle is different from the second scanning angle; the method comprises the steps of respectively processing a first image and a second image by adopting a classification model to obtain a first characterization vector and a second characterization vector which are used for characterizing feature information of a plurality of anti-counterfeiting areas of the images, calculating a first similarity of the first characterization vector and the second characterization vector, determining that the certificate passes identification when the first similarity is smaller than a preset threshold value, judging the authenticity of the scanned certificate according to the similarity, identifying the plurality of anti-counterfeiting areas in the certificate at the same time, and having high identification accuracy; the classification model is adopted to simultaneously verify the anti-counterfeiting areas in the certificate, and each anti-counterfeiting label does not need to be verified independently, so that the anti-counterfeiting efficiency of the certificate is improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of one or more embodiments of the disclosure and are incorporated in and constitute a part of this specification, illustrate exemplary embodiments of the disclosure and together with the description serve to explain the embodiments of the disclosure and not to limit the embodiments of the disclosure. In the drawings:
FIG. 1 is a schematic overall flow chart of a certificate identification method in an embodiment of the present disclosure;
FIG. 2 is a schematic flow chart of a method for identifying a document provided in an embodiment of the present disclosure;
fig. 3 is a schematic diagram of a document of a hong kong resident identification card in a document identification method provided in an embodiment of the present specification;
FIG. 4 is a schematic diagram of a credential identification device corresponding to FIG. 2 provided in an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of a certificate recognition device corresponding to fig. 2 provided in an embodiment of the present specification.
Detailed Description
To make the objects, technical solutions and advantages of one or more embodiments of the present disclosure more apparent, the technical solutions of one or more embodiments of the present disclosure will be described in detail and completely with reference to the specific embodiments of the present disclosure and the accompanying drawings. It is to be understood that the embodiments described are only a few embodiments of the present specification, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of one or more embodiments of the present specification.
The technical solutions provided by the embodiments of the present description are described in detail below with reference to the accompanying drawings.
Fig. 1 is an overall flow diagram of a certificate identification method in an embodiment of the present specification. As shown in fig. 1, a scanned image of a document under multiple scanning angles is acquired, the document image is input into a trained multi-label classification model, and a characterization vector is output, where the characterization vector may include feature information for characterizing multiple anti-counterfeit areas of the scanned image, and a value of each label may correspond to an image information state presented by the anti-counterfeit area corresponding to the label, such as: and (3) obtaining three states of red, yellow and green of the triangle, any one of HK icons, human image definition and digital definition, calculating the similarity between the characterization information after obtaining the characterization information, and identifying the authenticity of the certificate according to the similarity.
Next, a certificate identification method provided in an embodiment of the specification will be specifically described with reference to the accompanying drawings:
fig. 2 is a schematic flowchart of a certificate identification method provided in an embodiment of the present disclosure. From the program perspective, the execution subject of the flow may be a program installed in the application server or an application client.
As shown in fig. 2, the process may include the following steps:
step 202: a first scanned image of a document at a first scanning angle is acquired, the document including one or more security areas presenting different image information at different scanning angles.
The scanning angle is an included angle between a plane where the scanning lens is located and a plane where the certificate is located.
Credentials may refer to certificates and documents used to prove a user's identity, experience, etc., such as: resident identification cards, passports and the like.
When certificate scanning identification is carried out, a certificate scanning mode can be started, such as: and opening the camera function through the installed application program to generate a certificate scanning interface. The scan angle referred to herein is understood to mean the angle between the plane of the camera and the plane of the document.
In practical application, the first scanning angle may represent an included angle between a plane where the scanning lens is located and a plane where the certificate is located. The first scanning angle may represent an angle value or an angle range. Such as: the first scanning angle is 10 °, or the first scanning angle is 0 ° to 20 °.
The security area may represent at least one area of the document for performing a security identification. Multiple security areas may be present in a document.
Step 204: and acquiring a second scanning image of the certificate at a second scanning angle, wherein the first scanning angle is different from the second scanning angle.
In order to ensure that the obtained scanning image is the scanning image of the certificate under different postures, the scanning image can be obtained in a mode of changing the scanning angle, and the scanning image of the certificate under different scanning angles is obtained.
It should be noted that different gestures can represent different gestures of a document, and can also represent a gesture of a scanning camera, a scanned image of the document in different gestures is obtained by changing a scanning angle, a plane where the camera is located can be tilted by tilting equipment, so that the scanning angle is changed, and the scanning angle can also be changed by changing the gesture of the document, for example: when scanning, the certificate is in a shaking state, and scanning images of the certificate under different postures can also be obtained. When the certificate image is scanned, the certificate scanning image obtained under different postures (different scanning angles) only needs to be acquired, and the scheme of the specific scanning angle changing mode is not limited.
Step 206: and processing the first image by adopting a classification model to obtain a first characterization vector, wherein the first characterization vector comprises characteristic information for characterizing a plurality of anti-counterfeiting areas of the first image.
Step 208: and processing the second image by adopting the classification model to obtain a second characterization vector, wherein the second characterization vector comprises characteristic information for characterizing a plurality of anti-counterfeiting areas of the second image.
The multi-label classification model may be a trained convolutional neural network, which may include a plurality of layers arranged in a sequence from lowest to highest, which may include one or more convolutional layers followed by one or more fully-connected layers.
The processing the first image by using the classification model to obtain a first characterization vector may specifically include:
and processing the first image by adopting the classification model, and taking the last layer of feature vector in the classification model as the first characterization vector.
The processing the second image by using the classification model to obtain a second characterization vector may specifically include:
and processing the second image by adopting the classification model, and taking the last layer of feature vector in the classification model as the second characterization vector.
It should be noted that the multi-label classification (multilabellasification) can be understood as follows: each sample was given a series of target labels. The input layer of the multi-label classification model can input images corresponding to a plurality of anti-counterfeiting areas in the images, and the last layer of the multi-label classification model can generate representation information corresponding to the images.
Such as: after the first image is processed by the multi-classification model, the first characterization vector output by the last layer is [1, 0], at this time, it can be understood that four anti-counterfeiting areas (respectively: a first anti-counterfeiting area, a second anti-counterfeiting area, a third anti-counterfeiting area and a fourth anti-counterfeiting area) exist in the first image, the feature information in the first anti-counterfeiting area and the feature information in the second anti-counterfeiting area are both 1, which can indicate that a first anti-counterfeiting label in a first state exists in the first anti-counterfeiting area, a second anti-counterfeiting label in the first state exists in the second anti-counterfeiting area, and the feature information in the third anti-counterfeiting area and the fourth anti-counterfeiting area are 0, which can indicate that anti-counterfeiting labels in second states exist in both the third anti-counterfeiting area and the fourth anti-counterfeiting area. It should be noted that this example is only used to explain the expression form of the value in the token vector, and the meaning represented by 0 or 1 in the example may be limited according to the actual situation, and the example herein does not limit the scheme of the embodiment of the present specification.
Step 210: calculating a first similarity of the first token vector and the second token vector.
The similarity can represent the correlation between the two, and in the present scheme, the similarity between the two token vectors can be represented.
In practical application, the certificate can adopt laser etching technology, color ultraviolet pattern technology, micro text printing technology, tactile embossing technology and other anti-counterfeiting technologies. Such as: hologram, embossed special logo, optical color-changing ink area and warning chip on the hong Kong intelligent identity card, and the surface adopts anti-counterfeiting film and multi-item printing anti-counterfeiting technology. For another example: the resident identification card is provided with a 'great wall' pattern with directional light change and color change at the position of a sex item, and a 'Chinese CHINA' character stored with light change and color change is arranged under a photo; the fluorescent printed "great wall" pattern can be found if the front side of the document is placed under ultraviolet light, or viewed obliquely. The certificates have different gloss and information under different light, and the certificate images scanned from different angles are not completely the same.
Step 212: and judging whether the first similarity is smaller than a preset threshold value or not to obtain a judgment result.
Step 214: and when the first judgment result shows that the first similarity is smaller than a preset threshold value, determining that the certificate passes the identification.
It should be noted that, due to the particularity of the certificate, the image information obtained by scanning the anti-counterfeit label in the anti-counterfeit area under different directional light or at different angles is different, so that when the authenticity of the certificate is judged, the authenticity of the certificate can be further judged by judging the similarity degree between the image information corresponding to the certificate under different scanning angles, and in practical application, the more similar the images obtained at different scanning angles are, the greater the possibility of being a counterfeit certificate is. Such as: the preset threshold value of the similarity is set to be 40%, and when the similarity between two images under different scanning angles is calculated to be 90%, the scanned certificate can be considered as a fake certificate.
The preset threshold may be specifically set according to different types of certificates, and is not limited herein. If the similarity is higher than the preset threshold, the front scanned image of the scanned certificate and the side image of the oblique scanning are considered to be basically the same (for example, the fluorescent printed 'great wall' pattern cannot be seen during the front scanning of the identity card, and the 'great wall' pattern on the anti-counterfeiting film cannot be seen in different images corresponding to different angles scanned after the oblique angle, the certificate is considered to be a false certificate), and at this time, the scanned certificate can be considered to be the false certificate.
It should be understood that the order of some steps in the method described in one or more embodiments of the present disclosure may be interchanged according to actual needs, or some steps may be omitted or deleted.
In the method in fig. 2, the images of the certificate including the multiple anti-counterfeiting areas at different scanning angles are acquired, the acquired images are processed by using the classification model to obtain the characterization vectors of the certificate at different scanning angles, and the authenticity of the scanned certificate is judged by calculating the similarity degree between the characterization vectors and the similarity degree, so that the anti-counterfeiting areas in the certificate can be identified at the same time, and the identification accuracy is high; the classification model is adopted to simultaneously verify the anti-counterfeiting areas in the certificate, and each anti-counterfeiting label does not need to be verified independently, so that the anti-counterfeiting efficiency of the certificate is improved.
Based on the method of fig. 2, the present specification also provides some specific embodiments of the method, which are described below.
Optionally, the security area may include one or more of an optically variable area, a multiple laser image area, a multiple letter pattern area, and a micro-text printing area.
The document may be a hong kong resident identification card, the optically variable region may include a triangular label, the multi-component letter pattern region includes an HK label, the multi-laser image region includes a portrait definition label, and the micro-text printing region includes a digital definition label.
It should be noted that the triangular label obtains a red, yellow or green triangular image at different scanning angles; the HK label respectively corresponds to character images of 'H' or 'K' under different scanning angles; the portrait definition labels correspond to portrait images with different definitions under different scanning angles; the digital definition labels correspond to digital images with different definitions under different scanning angles. For a better understanding of the security areas in hong Kong documents, reference is made to FIG. 3.
Fig. 3 is a schematic diagram of a certificate of a hong kong resident identification card in a certificate identification method provided in an embodiment of the present specification. As shown in fig. 3, for example, in hong kong id card, the photochromic area 301 may be a triangular label, the multi-letter pattern area 302 may be an HK label, the multi-laser image area 303 may be a human image definition label, and the micro-text printing area 304 may be a digital definition label. The triangular label of the photochromic area 301 may be a triangle printed by the photochromic ink, and the color change is red → yellow → green when viewed from different angles. A multiple laser image area 303 is arranged at the lower left corner of the card, and when the card is observed from different inclined angles, human images with different definitions can be displayed at different inclined angles. A micro-text printing area 304 is provided below the multiple laser image area 303, and can display numbers with different definitions at different tilt angles. In the multiplexed letter pattern area 302 to the left of the multiple laser images, alternating occurrences of the letters "H" or "K" are visible if viewed from different angles.
After the determining whether the first similarity is smaller than a preset threshold and obtaining a first determination result, the method may further include:
acquiring a third scanning image of the certificate at a third scanning angle;
acquiring a fourth scanning image of the certificate at a fourth scanning angle, wherein the third scanning angle is different from the fourth scanning angle;
processing the third image by adopting the classification model to obtain a third eigenvector;
processing the fourth image by adopting the classification model to obtain a fourth characterization vector;
calculating a second similarity of the third token vector and the fourth token vector;
judging whether the second similarity is smaller than a preset threshold value or not to obtain a second judgment result;
and when the second judgment result shows that the second similarity is smaller than a preset threshold value, determining that the certificate passes the identification.
In practical application, a plurality of frames of scanned images can be acquired, and then the similarity is judged. When the authenticity of the certificate is judged according to the similarity, an image under a first scanning angle obtained by scanning can be selected to be compared with another image under a second scanning angle in the similarity, a plurality of images under the first scanning angle and a plurality of images under the second scanning angle can also be grouped, each group of image pair comprises an image under the first scanning angle and an image under the second scanning angle, the similarity between the two images in each group of images is respectively calculated, and the authenticity of the certificate is judged according to the similarity.
When the authenticity of the certificate is specifically judged, the following method can be adopted:
the method I comprises the following steps of when certificate anti-counterfeiting judgment is carried out according to the similarity between two images respectively corresponding to two different scanning angles:
determining a first characterization vector corresponding to a first image obtained at a first scanning angle, and then determining a second characterization vector corresponding to a second image obtained at a second scanning angle; calculating a first similarity between the first token vector and the second token vector; judging whether the first similarity is smaller than a preset threshold value or not to obtain a judgment result; and when the first similarity is smaller than a preset threshold value, the certificate identification is passed.
And secondly, when certificate anti-counterfeiting judgment is carried out according to the similarity between two image sets respectively corresponding to two different scanning angles:
obtaining second similarity of the plurality of groups of images according to the first characterization vector and the second characterization vector; calculating the proportion of the second similarity smaller than a preset threshold; and when the proportion is smaller than a proportion threshold value, obtaining a second verification result, wherein the second verification result represents that the certificate identification is not passed.
Such as: the image set obtained under the first scanning angle is { image A1, image B1, image C1, image D1}, the image set obtained under the second scanning angle is { image A2, image B2, image C2, image D2}, and the obtained multiple groups of images are a first group: { image A1, image A2}, second group: { image B1, image B2}, third group: { image C1, image C2}, fourth group: { image D1, image D2}, the preset threshold value of the similarity is 50%, and the ratio threshold value is 1/2. The similarity between the first group of images A1 and the images A2 is 30%, the similarity between the second group of images B1 and the images B2 is 90%, the similarity between the third group of images C1 and the images C2 is 10%, and the similarity between the fourth group of images D1 and the images D2 is 6%, it can be seen that the image pairs with the similarity smaller than the preset threshold value comprise the first group, the third group and the fourth group, the proportion 3/4 of the second similarity smaller than the preset threshold value is larger than 1/2, the certificate can be considered to be recognized to pass, and otherwise, the certificate cannot be recognized to pass.
By the method, the similarity between one or more images obtained under different scanning angles is judged, and the authenticity of the certificate is determined according to the similarity, so that the identification accuracy of the certificate can be improved.
In practical application, the multi-label classification model is adopted to process images obtained under different scanning angles, and the characterization vectors are obtained. The specific training process of the adopted multi-label classification model can be carried out by adopting the following method:
before the processing the first image by using the classification model, the method may further include:
acquiring a multi-label known certificate image sample set; each certificate image sample in the certificate image sample set comprises image information of N anti-counterfeiting areas, the number of image information states which can be presented in one anti-counterfeiting area is more than or equal to 2, the number of labels corresponding to each certificate image sample is N, and the value of each label corresponds to the image information state presented in the anti-counterfeiting area corresponding to the label;
and training a deep learning model or a recognition classification model by adopting the multi-label known certificate image sample set to obtain the multi-label classification model.
It should be noted that, during model training, a supervised learning method may be used to perform model training, input sample data may be a multi-label known certificate image sample set, one sample may include image information of all anti-counterfeiting areas, one anti-counterfeiting area may include one label, and a value of each label may correspond to an image information state presented by the corresponding anti-counterfeiting area. Such as: using hong Kong resident ID card document as an example, in a plurality of labels, the triangle-shaped label can present three kinds of different image information states under the scanning angle of difference, is respectively: yellow, red and green, wherein yellow is marked as 1, red is marked as 0, green is marked as 2, and in the image information state presented by the "HK label", H is marked as 1, H is marked as 0, in the image information state corresponding to the human image definition label, the human image can be clearly marked as 1, and the human image can be indistinctly marked as 0, and in the image information state corresponding to the digital definition label, the digital definition label can be 1, and the unclear label is 0. The input sample set can be { sample 1, sample 2, sample 3, \8230;, sample N }, any one of the samples, for example, sample 1, can be represented as {2,1,0,1}, and the first sample can represent that the triangle label in the acquired image is green, the image of 'H' is displayed, the portrait is unclear, and the number is clear. And training the neural network by taking the known label as input to obtain a multi-label classification model.
It should be noted that, when the multi-label known certificate image sample set training model is adopted, a neural network, a convolutional neural network, a deep learning network, a pattern recognition classification model or other conventional classification models may be adopted for training the multi-label known certificate image sample set, which is not limited in this scheme.
By the method, multiple labels are designed, the multi-label is used for guiding the training network through supervised learning, the feature vector output by the last layer is used as the description vector of the anti-counterfeiting area, and the multi-label classification model obtained through training has a better classification and identification effect.
After the multi-label classification model training is completed, the trained multi-label classification model can be adopted to process the acquired image, and the specific process can adopt the following steps:
the processing the first image by using the classification model to obtain a first characterization vector may specifically include:
and processing the first image by adopting the classification model, and taking the last layer of feature vector in the classification model as the first characterization vector.
The processing the second image by using the classification model to obtain a second characterization vector may specifically include:
and processing the second image by adopting the classification model, and taking the last layer of feature vector in the classification model as the second characterization vector.
It should be noted that, the classification model is used to process images acquired at different scanning angles, a vector at the last layer of the model can be used as a characterization vector corresponding to an identified image, and any one characterization vector can include feature information corresponding to a plurality of labels.
By the method, the image is processed by using the multi-classification prediction model, the characteristic information of the anti-counterfeiting labels is identified by the convolutional neural network, and then a characterization vector capable of describing the characteristic information of the labels in the image is obtained, so that the anti-counterfeiting area can be predicted at the same time, and the anti-counterfeiting efficiency of the certificate is improved.
It should be noted that, in order to achieve the technical effect in the present scheme, a classification algorithm may be applied to the certificate identification method, and the multi-label classification task is replaced with a classification task. For example: for the hong Kong resident identification card, the multi-label contained in the identification card can be processed by adopting a classification algorithm, three classifications of red, yellow and green exist in a triangle, "H" and "K" in "HK", and two classifications of clear and unclear exist in the face definition and the digital definition respectively, so that 3 × 2=24 can be classified by adopting the classification algorithm.
When specifically calculating the similarity between two characterization vectors, the following method steps may be employed:
the calculating a first similarity between the first characterization vector and the second characterization vector may specifically include:
calculating the cosine value of an included angle between the first characterization vector and the second characterization vector;
and determining the similarity between the first characterization vector and the second characterization vector according to the included angle cosine value, wherein the included angle cosine value is in direct proportion to the similarity.
When the similarity calculation is specifically performed, the similarity between the two vectors can be calculated by adopting an algorithm for calculating the cosine distance, and the similarity can be calculated by selecting other algorithms according to the actual application scene, which is not limited in the scheme. When the similarity is calculated by adopting an algorithm for calculating the cosine distance, firstly, the cosine value of an included angle between two characterization vectors can be determined, and then the similarity between the first characterization vector and the second characterization vector is determined according to the cosine value of the included angle, wherein the larger the cosine value of the included angle is, the larger the similarity between the two vectors is.
The acquiring a first scanned image of the document at the first scanning angle may specifically include:
acquiring a multiframe scanning image of the certificate obtained by scanning;
extracting a scanning image meeting preset image conditions from the scanning image, wherein the preset image conditions comprise a scanning angle and image quality, and the image quality comprises one or more of definition, brightness, color cast and noise;
and taking out a first scanned image with the identification label and the face image from the scanned images meeting the preset image condition.
The extracting the first scanned image with the identification tag and the face image from the scanned image meeting the preset image condition may specifically include:
calculating the pixel mean value of each image in the scanned image;
calculating the pixel variance corresponding to each image according to each pixel mean value;
and when the pixel variance is larger than a preset threshold value, the image meets an image quality preset condition.
It should be noted that the scanned images in the acquired multi-frame scanned images may be images that have undergone preliminary screening, and the preliminary screening may include screening out images that satisfy image quality and/or images with head portrait. Specifically, a scanned image satisfying an image preset condition may be extracted, where the image preset condition may include a second preset angle and image quality, and the image quality may include one or more of sharpness, brightness, color shift, and noise. Such as: the multi-frame images in the first graph set are images with scanning angles smaller than 10 degrees, identification marks and head images and meet image quality conditions.
The certificate identification can be all relevant identifications that can identify the certificate, such as: the anti-fake membrane on certificate surface, the anti-fake chip on certificate surface, anti-fake fingerprint board etc. certificate identification mark can be different under the shooting angle of difference or the image of shooing under the different shooting light conditions that obtains, for example: it is possible to change color under different light or to display different image information under different photographing angles.
By the method, the first image set and the second image set which are obtained by scanning at the first scanning angle and the second scanning angle are obtained, and the images in the two image sets meet one or more of image quality conditions, the images comprise head images and identification marks of certificates, so that the image sets for comparison and identification can be ensured to be effective image sets, the authenticity of the certificates can be more effectively identified, and the certificate identification efficiency is improved.
Before the extracting the first scanned image with the identification tag and the face image from the scanned image satisfying the preset image condition, the method may further include:
determining the positions of four points of the certificate corners;
determining a proportional relation among the four points according to the positions of the four points;
and estimating to obtain a multi-frame scanning image meeting the preset scanning angle condition according to the positions of four points of the certificate corners and the proportional relation among the four points by adopting a posture estimation algorithm.
When certificate scanning is carried out, the scanning angle of the certificate can be estimated through a certificate posture estimation method, four points at four corners of the certificate can be automatically positioned during specific scanning, such as 303 in fig. 3, the four corners of the certificate are automatically positioned, an included angle between a plane where the certificate is located and a plane where a camera is located can be estimated approximately through proportions among the four points of the certificate, and when a user sees that the four points of the certificate in a scanning frame deviate from the scanning frame far away, the scanning angle at the moment can be considered not to meet a preset condition. The automatic positioning of four points can also be used for the client to see whether the object positioned by the four points is a document to be scanned, such as: the certificate is placed on four directions of note paper for scanning, four points in the scanning frame can be positioned at four corners of the note paper at the moment, the four points are not positioned on the certificate to be scanned, and at the moment, a user can move away the note paper or adjust the distance or the angle between the plane where the camera is located and the plane where the certificate is located.
Besides, it should be noted that, when the method is used for estimating the pose of the certificate, in addition to the above method, a pose estimation classifier based on deep learning may be trained, a current picture of the certificate is input, and then the angle of the pose of the certificate is output, where the angle of the certificate may be an up-down tilt angle, a left-right tilt angle, an in-plane rotation tilt angle, and the like, and a suitable pose estimation algorithm may be selected according to actual conditions.
By the method, before the classification model is adopted to process the image, the scanning angle of the image can be ensured to meet the condition, the defect of inaccuracy in the later model processing process is avoided, and the accuracy of certificate identification is improved.
Based on the same idea, the embodiment of the present specification further provides a device corresponding to the above method. Fig. 4 is a schematic structural diagram of a document identification device corresponding to fig. 2 provided in an embodiment of the present disclosure. As shown in fig. 4, the apparatus may include:
a first scanned image acquiring module 402, configured to acquire a first scanned image of a certificate at a first scanning angle, where the scanning angle is an included angle between a plane where the scanning lens is located and a plane where the certificate is located, the certificate includes one or more anti-counterfeit areas, and the anti-counterfeit areas present different image information at different scanning angles;
a second scanned image acquiring module 404, configured to acquire a second scanned image of the certificate at a second scanning angle, where the first scanning angle is different from the second scanning angle;
a first characterization vector determination module 406, configured to process the first image by using a classification model to obtain a first characterization vector, where the first characterization vector includes feature information for characterizing a plurality of anti-counterfeiting areas of the first image;
a second characterization vector module 408, configured to process the second image using the classification model to obtain a second characterization vector, where the second characterization vector includes feature information for characterizing multiple anti-counterfeiting areas of the second image;
a first similarity calculation module 410, configured to calculate a first similarity between the first token vector and the second token vector;
a first determining module 412, configured to determine whether the first similarity is smaller than a preset threshold, so as to obtain a first determination result;
and the certificate identification module 414 is configured to determine that the certificate passes identification when the first determination result indicates that the first similarity is smaller than a preset threshold.
Optionally, the device may further comprise
The third scanning image acquisition module is used for acquiring a third scanning image of the certificate at a third scanning angle;
the fourth scanning image acquisition module is used for acquiring a fourth scanning image of the certificate at a fourth scanning angle, and the third scanning angle is different from the fourth scanning angle;
a third eigenvector determining module, configured to process the third image by using the classification model to obtain a third eigenvector;
the fourth characterization vector determining module is used for processing the fourth image by adopting the classification model to obtain a fourth characterization vector;
a second similarity calculation module, configured to calculate a second similarity between the third token vector and the fourth token vector;
the second judgment module is used for judging whether the second similarity is smaller than a preset threshold value or not to obtain a second judgment result;
and the certificate identification first module is used for determining that the certificate passes identification when the second judgment result shows that the second similarity is smaller than a preset threshold value.
Optionally, the apparatus may further include:
the training sample set acquisition module is used for acquiring a multi-label known certificate image sample set; each certificate image sample in the certificate image sample set comprises image information of N anti-counterfeiting areas, the number of image information states which can be presented in one anti-counterfeiting area is more than or equal to 2, the number of labels corresponding to each certificate image sample is N, and the value of each label corresponds to the image information state presented in the anti-counterfeiting area corresponding to the label;
and the multi-label classification model training module is used for training a deep learning model or a recognition classification model by adopting the known multi-label certificate image sample set to obtain the multi-label classification model.
Optionally, the first token vector determining module 406 may be specifically configured to:
and processing the first image by adopting the classification model, and taking the last layer of feature vector in the classification model as the first characterization vector.
Optionally, the second token vector determining module may be specifically configured to:
and processing the second image by adopting the classification model, and taking the last layer of feature vector in the classification model as the second characterization vector.
Optionally, the first similarity calculating module may be specifically configured to:
calculating the cosine value of an included angle between the first characterization vector and the second characterization vector;
and determining the similarity between the first characterization vector and the second characterization vector according to the cosine value of the included angle, wherein the cosine value of the included angle is in direct proportion to the similarity.
Optionally, the anti-counterfeiting area may include one or more of an optically variable area, a multiple laser image area, a multiple letter pattern area, and a micro-text printing area.
Optionally, the document may be a hong kong resident identification card, the optically variable region may include triangular labels, the multiplexed letter pattern region may include HK labels, the multiple laser image region may include portrait resolution labels, and the micro-text printing region may include digital resolution labels.
Optionally, the first scan image acquiring module 402 may be specifically configured to:
the scanning image acquisition unit is used for scanning to obtain multi-frame scanning images of the certificate;
the screening unit is used for extracting a scanning image meeting preset image conditions from the scanning image, wherein the preset image conditions comprise a scanning angle and image quality, and the image quality comprises one or more of definition, brightness, color cast and noise;
and a first scanning image extracting unit for taking out 5 a first scanning image with the identification label and the face image from the scanning images meeting the image preset condition.
Optionally, the screening unit may be specifically configured to:
calculating the pixel mean value of each image in the scanned image;
calculating the pixel variance corresponding to each image according to each pixel mean value;
and when the pixel variance is larger than a preset threshold value, the image meets an image quality preset condition.
Optionally, 0, the first scan image acquiring module 402 may further be configured to:
determining the positions of four points of the certificate corners;
determining the proportional relation among the four points according to the positions of the four points;
the method comprises the steps of obtaining a multi-frame scanning image 5 meeting preset scanning angle conditions by estimating according to the positions of four points of the certificate corner and the proportional relation among the four points by adopting a posture estimation algorithm based on the same idea, and the embodiment of the specification also provides equipment corresponding to the method.
Fig. 5 is a schematic structural diagram of a certificate recognition device corresponding to fig. 2 provided in an embodiment of the present specification. As shown in fig. 5, the apparatus 500 may include:
at least one processor 510; and the number of the first and second groups,
a memory 530 communicatively coupled to the at least one processor; wherein 0 the memory 530 stores instructions 520 executable by the at least one processor 510 to enable the at least one processor 510 to:
acquiring a first scanning image of a certificate under a first scanning angle, wherein the scanning angle is an included angle between a plane where a scanning lens is located and a plane where the certificate is located, the certificate comprises one or more anti-counterfeiting areas, and the anti-counterfeiting areas present different image information at different scanning angles;
5 obtaining a second scanned image of the document at a second scanning angle, the first scanning angle and the second scanning angle
The second scanning angle is different;
processing the first image by adopting a classification model to obtain a first characterization vector, wherein the first characterization vector comprises characteristic information for characterizing a plurality of anti-counterfeiting areas of the first image;
processing the second image by adopting the classification model to obtain a second characterization vector, wherein the second characterization vector comprises characteristic information for characterizing a plurality of anti-counterfeiting areas of the second image;
calculating a first similarity of the first token vector and the second token vector;
judging whether the first similarity is smaller than a preset threshold value or not to obtain a first judgment result;
and when the first judgment result shows that the first similarity is smaller than a preset threshold value, determining that the certificate passes the identification.
Based on the same idea, the embodiments of the present specification also provide a computer-readable medium corresponding to the above method. The computer readable medium has computer readable instructions stored thereon which are executable by a processor to implement a method comprising:
acquiring a first scanning image of a certificate under a first scanning angle, wherein the scanning angle is an included angle between a plane where a scanning lens is located and a plane where the certificate is located, the certificate comprises one or more anti-counterfeiting areas, and the anti-counterfeiting areas present different image information at different scanning angles;
acquiring a second scanning image of the certificate at a second scanning angle, wherein the first scanning angle is different from the second scanning angle;
processing the first image by adopting a classification model to obtain a first characterization vector, wherein the first characterization vector comprises characteristic information for characterizing a plurality of anti-counterfeiting areas of the first image;
processing the second image by adopting the classification model to obtain a second characterization vector, wherein the second characterization vector comprises characteristic information for characterizing a plurality of anti-counterfeiting areas of the second image;
calculating a first similarity of the first token vector and the second token vector;
judging whether the first similarity is smaller than a preset threshold value or not to obtain a first judgment result;
and when the first judgment result shows that the first similarity is smaller than a preset threshold value, determining that the certificate passes the identification.
The foregoing description of specific embodiments has been presented for purposes of illustration and description. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
In the 90 s of the 20 th century, it became clear that improvements in one technology could be distinguished from 5 improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) or improvements in software (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.)
In an improvement of the process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain a corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD), such as a Field Programmable Gate Array (FPGA), is an integrated circuit whose logic functions are determined by programming the device by a user. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Moreover, nowadays, instead of manually making integrated power
The chip, such programming is also mostly realized by using "logic compiler" (software), which 5 is similar to the software compiler used in program development and writing, and the original code before compiling can be used
Specific programming languages are written, which are called Hardware Description Languages (HDL), and HDL is not only one but many, such as ABEL (Advanced bootstrapped Language), AHDL (altera hardwaredescriptridogrifying Language), traffic, CUPL (corrnell university programing Language), HDCal, JHDL0 (java hardwaredescriptridogrifying Language), lava, lola, myHDL, lapam, RHDL (rubbyhardwaredescriptridogrifying Language), and VHDL (Very-High-speed integrated circuit descriptionlanguage) and Verilog are currently the most commonly used. It will also be apparent to those skilled in the art that the method flow need only be described in a few of the above hardware description languages
The logic is programmed and programmed into the integrated circuit, and the hardware 5 circuit for realizing the logic method flow can be easily obtained.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer readable medium that stores computer readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: ARC625D, atmel at91SAM, microchip PIC18F26K20, and silicon labsc8051F320, the memory controller may also be implemented as part of the control logic of the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller in purely computer readable program code means, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be conceived to be both a software module implementing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the various elements may be implemented in the same one or more pieces of software and/or hardware in implementing one or more embodiments of the present description.
One skilled in the art will recognize that one or more embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, one or more embodiments of the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, one or more embodiments of the present description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
One or more embodiments of the present description are described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to one or more embodiments of the description. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a," "8230," "8230," or "comprising" does not exclude the presence of other like elements in a process, method, article, or apparatus comprising the element.
One or more embodiments of the present description may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. One or more embodiments of the specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is merely exemplary of the present disclosure and is not intended to limit one or more embodiments of the present disclosure. Various modifications and alterations to one or more embodiments described herein will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement or the like made within the spirit and principle of one or more embodiments of the present disclosure should be included in the scope of claims of one or more embodiments of the present disclosure.

Claims (15)

1. A method of document identification, comprising:
acquiring a first scanning image of a certificate under a first scanning angle, wherein the certificate comprises one or more anti-counterfeiting areas, and the anti-counterfeiting areas present different image information at different scanning angles;
acquiring a second scanning image of the certificate at a second scanning angle, wherein the first scanning angle is different from the second scanning angle;
processing the first scanned image by adopting a classification model to obtain a first characterization vector, wherein the first characterization vector comprises characteristic information for characterizing a plurality of anti-counterfeiting areas of the first scanned image;
processing the second scanned image by using the classification model to obtain a second characterization vector, wherein the second characterization vector comprises characteristic information for characterizing a plurality of anti-counterfeiting areas of the second scanned image;
and judging whether the certificate passes the identification or not according to the first characterization vector and the second characterization vector.
2. The method of claim 1, wherein the determining whether the certificate passes the identification according to the first token vector and the second token vector comprises:
calculating a first similarity of the first token vector and the second token vector;
judging whether the first similarity is smaller than a preset threshold value or not to obtain a first judgment result;
and when the first judgment result shows that the first similarity is smaller than a preset threshold value, determining that the certificate passes the identification.
3. The method according to claim 2, wherein the determining whether the first similarity is smaller than a preset threshold value further includes, after obtaining a first determination result:
acquiring a third scanning image of the certificate at a third scanning angle;
acquiring a fourth scanning image of the certificate at a fourth scanning angle, wherein the third scanning angle is different from the fourth scanning angle;
processing the third scanned image by adopting the classification model to obtain a third eigenvector;
processing the fourth scanned image by using the classification model to obtain a fourth characterization vector;
calculating a second similarity of the third token vector and the fourth token vector;
judging whether the second similarity is smaller than a preset threshold value or not to obtain a second judgment result;
and when the second judgment result shows that the second similarity is smaller than a preset threshold value, determining that the certificate passes the identification.
4. The method according to any one of claims 1 to 3, wherein the processing the first scanned image using the classification model specifically comprises:
processing the first scanned image using a multi-label classification model;
the processing the second scanned image by using the classification model specifically includes:
and processing the second scanned image by adopting a multi-label classification model.
5. The method of claim 4, prior to processing the first scanned image using the multi-label classification model, further comprising:
acquiring a multi-label known certificate image sample set; each certificate image sample in the certificate image sample set comprises image information of N anti-counterfeiting areas, the number of image information states which can be presented in one anti-counterfeiting area is more than or equal to 2, the number of labels corresponding to each certificate image sample is N, and the value of each label corresponds to the image information state presented in the anti-counterfeiting area corresponding to the label;
and training a deep learning model or a recognition classification model by adopting the multi-label known certificate image sample set to obtain a multi-label classification model.
6. The method of claim 5, wherein processing the first scanned image using the classification model to obtain a first characterization vector comprises:
and processing the first scanned image by adopting the classification model, and taking the last layer of feature vector in the classification model as the first characterization vector.
7. The method according to claim 5, wherein the processing the second scanned image by using the classification model to obtain a second characterization vector specifically includes:
and processing the second scanned image by adopting the classification model, and taking the last layer of feature vector in the classification model as the second characterization vector.
8. The method of claim 2, wherein the calculating the first similarity between the first token vector and the second token vector comprises:
calculating the cosine value of an included angle between the first characterization vector and the second characterization vector;
and determining the similarity between the first characterization vector and the second characterization vector according to the included angle cosine value, wherein the included angle cosine value is in direct proportion to the similarity.
9. The method of claim 1, wherein the security area comprises one or more of an optically variable area, a multiple laser image area, a multiple letter pattern area, and a micro-text printing area.
10. The method of claim 9, wherein the document is a hong kong resident identification card, the optically variable region comprises a triangular shaped label, the multiplexed alphanumeric region comprises an HK label, the multiple laser image region comprises a human image definition label, and the microprint printing region comprises a digital definition label.
11. The method of claim 1, wherein acquiring the first scan image of the document at the first scan angle comprises:
acquiring a multiframe scanning image of the certificate obtained by scanning;
extracting a scanning image meeting preset image conditions from the scanning image, wherein the preset image conditions comprise a scanning angle and image quality, and the image quality comprises one or more of definition, brightness, color cast and noise;
and taking out a first scanned image with an identification label and a face image from the scanned images meeting the preset image condition.
12. The method according to claim 11, wherein the extracting a first scanned image with an identification tag and a face image from the scanned images satisfying the preset image condition specifically comprises:
calculating the pixel mean value of each image in the scanned image;
calculating the pixel variance corresponding to each image according to each pixel mean value;
and when the pixel variance is larger than a preset threshold value, the image meets an image quality preset condition.
13. The method according to claim 11, before the extracting the first scanned image in which the identification tag and the face image exist from the scanned images satisfying the image preset condition, further comprising:
determining the positions of four points of the certificate corners;
determining a proportional relation among the four points according to the positions of the four points;
and estimating to obtain a multi-frame scanning image meeting the preset scanning angle condition according to the positions of four points of the certificate corners and the proportional relation among the four points by adopting a posture estimation algorithm.
14. A credential identification device comprising:
the certificate comprises one or more anti-counterfeiting areas, and the anti-counterfeiting areas present different image information at different scanning angles;
the second scanning image acquisition module is used for acquiring a second scanning image of the certificate at a second scanning angle, and the first scanning angle is different from the second scanning angle;
a first characterization vector determination module, configured to process the first scanned image by using a classification model to obtain a first characterization vector, where the first characterization vector includes feature information used for characterizing a plurality of anti-counterfeiting areas of the first scanned image;
the second characterization vector module is used for processing the second scanned image by using the classification model to obtain a second characterization vector, and the second characterization vector comprises feature information used for characterizing a plurality of anti-counterfeiting areas of the second scanned image;
and the first judging module is used for judging whether the certificate passes the identification or not according to the first characterization vector and the second characterization vector.
15. A credential identification device comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
acquiring a first scanning image of a certificate under a first scanning angle, wherein the certificate comprises one or more anti-counterfeiting areas, and the anti-counterfeiting areas present different image information at different scanning angles;
acquiring a second scanning image of the certificate at a second scanning angle, wherein the first scanning angle is different from the second scanning angle;
processing the first scanned image by adopting a classification model to obtain a first characterization vector, wherein the first characterization vector comprises characteristic information for characterizing a plurality of anti-counterfeiting areas of the first scanned image;
processing the second scanned image by adopting the classification model to obtain a second characterization vector, wherein the second characterization vector comprises characteristic information for characterizing a plurality of anti-counterfeiting areas of the second scanned image;
and judging whether the certificate passes the identification or not according to the first characterization vector and the second characterization vector.
CN202211697569.9A 2019-08-27 2019-08-27 Certificate identification method, device and equipment Pending CN115953798A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211697569.9A CN115953798A (en) 2019-08-27 2019-08-27 Certificate identification method, device and equipment

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211697569.9A CN115953798A (en) 2019-08-27 2019-08-27 Certificate identification method, device and equipment
CN201910796423.1A CN110516739B (en) 2019-08-27 2019-08-27 Certificate identification method, device and equipment

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201910796423.1A Division CN110516739B (en) 2019-08-27 2019-08-27 Certificate identification method, device and equipment

Publications (1)

Publication Number Publication Date
CN115953798A true CN115953798A (en) 2023-04-11

Family

ID=68627182

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201910796423.1A Active CN110516739B (en) 2019-08-27 2019-08-27 Certificate identification method, device and equipment
CN202211697569.9A Pending CN115953798A (en) 2019-08-27 2019-08-27 Certificate identification method, device and equipment

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201910796423.1A Active CN110516739B (en) 2019-08-27 2019-08-27 Certificate identification method, device and equipment

Country Status (1)

Country Link
CN (2) CN110516739B (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPWO2021049234A1 (en) * 2019-09-12 2021-03-18
CN112906437B (en) * 2019-12-04 2023-12-26 中国农业科学院农业资源与农业区划研究所 Oat plant identification method and device
CN111275105B (en) * 2020-01-19 2023-10-20 支付宝实验室(新加坡)有限公司 Certificate verification method and device and electronic equipment
CN111243159A (en) * 2020-01-20 2020-06-05 支付宝实验室(新加坡)有限公司 Counterfeit certificate identification method and device and electronic equipment
CN111324874B (en) * 2020-01-21 2023-06-20 支付宝实验室(新加坡)有限公司 Certificate authenticity identification method and device
CN111291797A (en) * 2020-01-21 2020-06-16 支付宝实验室(新加坡)有限公司 Anti-counterfeiting identification method and device and electronic equipment
CN111275042B (en) * 2020-01-21 2023-07-18 支付宝实验室(新加坡)有限公司 Identification method and device for forged certificate and electronic equipment
CN111310634B (en) * 2020-02-10 2024-03-15 支付宝实验室(新加坡)有限公司 Certificate type recognition template generation method, certificate recognition method and device
CN111523605B (en) * 2020-04-28 2023-04-07 新疆维吾尔自治区烟草公司 Image identification method and device, electronic equipment and medium
SG10202004041SA (en) * 2020-05-02 2021-12-30 Alipay Labs Singapore Pte Ltd An identification document authentication method and system
CN112017352B (en) * 2020-09-03 2022-12-06 平安科技(深圳)有限公司 Certificate authentication method, device, equipment and readable storage medium
CN112016629B (en) * 2020-09-04 2023-07-28 平安科技(深圳)有限公司 Method, apparatus, computer device and storage medium for authenticating credentials
CN112200136A (en) * 2020-10-29 2021-01-08 腾讯科技(深圳)有限公司 Certificate authenticity identification method and device, computer readable medium and electronic equipment
CN113240043B (en) * 2021-06-01 2024-04-09 平安科技(深圳)有限公司 Pseudo-identification method, device, equipment and storage medium based on multi-picture difference

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6272245B1 (en) * 1998-01-23 2001-08-07 Seiko Epson Corporation Apparatus and method for pattern recognition
CN1731414A (en) * 2004-08-04 2006-02-08 上海银晨智能识别科技有限公司 Method and apparatus for anti-counterfeiting of certificate based on human face identification technology
AU2009238260A1 (en) * 2009-11-13 2011-06-02 Canon Kabushiki Kaisha Forgery detection using finger print
CN102129555A (en) * 2011-03-23 2011-07-20 北京深思洛克软件技术股份有限公司 Second-generation identity card-based authentication method and system
CN102855496B (en) * 2012-08-24 2016-05-25 苏州大学 Block face authentication method and system
CN103426016B (en) * 2013-08-14 2017-04-12 湖北微模式科技发展有限公司 Method and device for authenticating second-generation identity card
US10354472B2 (en) * 2014-06-20 2019-07-16 Facebook, Inc. Self-learning system and methods for automatic document recognition, authentication, and information extraction
CN105302151B (en) * 2014-08-01 2018-07-13 深圳中集天达空港设备有限公司 A kind of system and method for aircraft docking guiding and plane type recognition
CN106156712A (en) * 2015-04-23 2016-11-23 信帧电子技术(北京)有限公司 A kind of based on the ID (identity number) card No. recognition methods under natural scene and device
CN105956578B (en) * 2016-05-23 2019-05-14 深圳华中科技大学研究院 A kind of face verification method of identity-based certificate information
CN108133207A (en) * 2017-11-24 2018-06-08 阿里巴巴集团控股有限公司 The image of auxiliary items closes the method, apparatus and electronic equipment of rule
CN108537085A (en) * 2018-03-07 2018-09-14 阿里巴巴集团控股有限公司 A kind of barcode scanning image-recognizing method, device and equipment
CN109359647A (en) * 2018-10-16 2019-02-19 翟红鹰 Identify the method, equipment and computer readable storage medium of a variety of certificates
CN110163152A (en) * 2019-05-23 2019-08-23 艾科芯(深圳)智能科技有限公司 Antiforge recognizing method, method for anti-counterfeit, system, device end and storage medium

Also Published As

Publication number Publication date
CN110516739B (en) 2022-12-27
CN110516739A (en) 2019-11-29

Similar Documents

Publication Publication Date Title
CN110516739B (en) Certificate identification method, device and equipment
CN111652223B (en) Certificate identification method and device
Matern et al. Gradient-based illumination description for image forgery detection
Kakar et al. Exposing digital image forgeries by detecting discrepancies in motion blur
CN111242124B (en) Certificate classification method, device and equipment
Chen et al. Image splicing detection via camera response function analysis
CN114787648B (en) Systems and methods for transparent object segmentation using polarization cues
Gill et al. A review paper on digital image forgery detection techniques
CN112686812B (en) Bank card inclination correction detection method and device, readable storage medium and terminal
CN111324874B (en) Certificate authenticity identification method and device
CN111291797A (en) Anti-counterfeiting identification method and device and electronic equipment
CN110490200B (en) Certificate scanning method, device and equipment
CN110263775A (en) Image-recognizing method, device, equipment and authentication method, device, equipment
CN109766885A (en) A kind of character detecting method, device, electronic equipment and storage medium
CN112200136A (en) Certificate authenticity identification method and device, computer readable medium and electronic equipment
CN110263805A (en) Certificate verification, auth method, device and equipment
Ebihara et al. Specular-and diffuse-reflection-based face spoofing detection for mobile devices
Setta et al. Real-time facial recognition using SURF-FAST
Kada et al. Hologram detection for identity document authentication
Mancas-Thillou et al. A multifunctional reading assistant for the visually impaired
Rashid et al. On the design of embedded solutions to banknote recognition
Agarwal et al. The advent of deep learning-based image forgery detection techniques
Koliaskina et al. MIDV-Holo: A Dataset for ID Document Hologram Detection in a Video Stream
CN110415424B (en) Anti-counterfeiting identification method and device, computer equipment and storage medium
JP2008009745A (en) Face detector

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination