CN106295669B - Information processing method and electronic equipment - Google Patents

Information processing method and electronic equipment Download PDF

Info

Publication number
CN106295669B
CN106295669B CN201510316425.8A CN201510316425A CN106295669B CN 106295669 B CN106295669 B CN 106295669B CN 201510316425 A CN201510316425 A CN 201510316425A CN 106295669 B CN106295669 B CN 106295669B
Authority
CN
China
Prior art keywords
identification
result
scanned image
recognition
mode
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510316425.8A
Other languages
Chinese (zh)
Other versions
CN106295669A (en
Inventor
孙林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201510316425.8A priority Critical patent/CN106295669B/en
Publication of CN106295669A publication Critical patent/CN106295669A/en
Application granted granted Critical
Publication of CN106295669B publication Critical patent/CN106295669B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/217Validation; Performance evaluation; Active pattern learning techniques
    • G06F18/2193Validation; Performance evaluation; Active pattern learning techniques based on specific statistical tests
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/18Eye characteristics, e.g. of the iris

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Data Mining & Analysis (AREA)
  • Human Computer Interaction (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Evolutionary Computation (AREA)
  • General Engineering & Computer Science (AREA)
  • Evolutionary Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Ophthalmology & Optometry (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Probability & Statistics with Applications (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Collating Specific Patterns (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

The invention discloses an information processing method and electronic equipment, wherein the method comprises the following steps: scanning a designated area of an acquisition object to form a scanned image; identifying the scanned image by adopting a first identification mode to form a first identification result; when the certainty factor of the first recognition result is greater than a first specified threshold, authenticating the acquisition object based on the first recognition result; and when the reliability of the first identification result is smaller than the first specified threshold, identifying the scanned image by adopting a second identification mode to form a second identification result, and authenticating the acquisition object based on the second identification result.

Description

Information processing method and electronic equipment
Technical Field
The present invention relates to the field of electronic technologies, and in particular, to an information processing method and an electronic device.
Background
With the development of electronic technology, many recognition methods have appeared. Specifically, the identification method includes face identification, iris identification, and the like. Generally, there is a situation that the recognition method with a relatively simple implementation is not accurate, and the recognition method with a relatively high accuracy is complex in recognition and large in power consumption. Therefore, the authentication method provided in the prior art can give consideration to both accuracy and low recognition complexity, which is a problem to be solved urgently in the prior art.
Disclosure of Invention
In view of the above, it is desirable to provide an information processing method capable of at least partially solving the problem that the accuracy and the recognition complexity of the authentication of the electronic device cannot be compatible.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
the invention discloses an information processing method, which comprises the following steps:
scanning a designated area of an acquisition object to form a scanned image;
identifying the scanned image by adopting a first identification mode to form a first identification result;
when the certainty factor of the first recognition result is greater than a first specified threshold, authenticating the acquisition object based on the first recognition result;
and when the reliability of the first identification result is smaller than the first specified threshold, identifying the scanned image by adopting a second identification mode to form a second identification result, and authenticating the acquisition object based on the second identification result.
Based on the above scheme, the scanning of the designated region of the acquisition object to form a scanned image includes:
scanning a designated area of the face of the acquisition object to form a scanned image; the designated area includes at least an eye area;
the identifying the scanned image by adopting a first identifying mode to form a first identifying result comprises the following steps:
and identifying the scanned image by using a face identification mode or an eye identification mode.
Based on the above scheme, the identifying the scanned image by using the second identification method to form a second identification result includes:
and identifying the scanned image by using an iris identification mode.
Based on the above scheme, the scanning and acquiring the designated region of the face of the object to form a scanned image includes:
and scanning the designated area of the acquisition object by using a color infrared camera and forming the scanning image by band-pass filtering processing.
Based on the above scheme, the authenticating the collection object based on the second recognition result includes:
when the reliability of the second identification result is greater than a second specified threshold value, directly authenticating the acquisition object based on the second identification result;
and when the reliability of the second identification result is not greater than the second specified threshold, the collected object is authenticated by combining the first identification result and the second identification result.
Based on the above scheme, when the reliability of the second recognition result is not greater than the second specified threshold, recognizing the acquisition object by combining the first recognition result and the second recognition result, including:
and when the first identification result and the second identification result show that the collected object corresponds to the same target object, authenticating the collected object as the target object corresponding to the first identification result and the second identification result.
The invention also discloses an electronic device, comprising:
the acquisition unit is used for scanning the designated area of the acquisition object to form a scanned image;
the first identification unit is used for identifying the scanned image by adopting a first identification mode to form a first identification result;
the authentication unit is used for authenticating the acquisition object based on the first identification result when the certainty factor of the first identification result is greater than a first specified threshold value;
the second identification unit is used for identifying the scanned image by adopting a second identification mode to form a second identification result when the certainty factor of the first identification result is smaller than the first specified threshold value;
the authentication unit is further configured to authenticate the acquisition object based on the second identification result.
Based on the scheme, the acquisition unit is specifically used for scanning the designated area of the face of the acquisition object to form a scanned image; the designated area includes at least an eye area;
the first identification unit is specifically configured to identify the scanned image by using a face identification method or an eye identification method.
Based on the above scheme, the second identification unit is specifically configured to identify the scanned image by using an iris identification method.
Based on the above scheme, the acquisition unit is specifically configured to scan the designated area of the acquisition object by using a color infrared camera and form the scanned image through band-pass filtering processing.
Based on the above scheme, the authentication unit is specifically configured to authenticate the acquisition object directly based on the second identification result when the reliability of the second identification result is greater than a second specified threshold; and when the reliability of the second identification result is not greater than the second specified threshold, the collected object is authenticated by combining the first identification result and the second identification result.
Based on the above scheme, the authentication unit is further specifically configured to authenticate the collected object as the target object to which the first identification result and the second identification result correspond together when the first identification result and the second identification result indicate that the collected object corresponds to the same target object. In the information processing method according to the embodiment of the present invention, when identifying a collection object based on a scan image, a first identification method is preferentially adopted, and whether to start a second identification method for identification is determined according to the certainty factor of the identification result of the first identification method. For example, if the first recognition method has low recognition complexity and low power consumption, the recognition complexity and the power consumption of the electronic device can be reduced as much as possible while ensuring the recognition accuracy.
Drawings
FIG. 1 is a flowchart illustrating an information processing method according to an embodiment of the present invention;
FIG. 2 is a second schematic flowchart of an information processing method according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the invention;
fig. 4 is a third schematic flow chart of the information processing method according to the embodiment of the invention.
Detailed Description
The technical solution of the present invention is further described in detail with reference to the drawings and the specific embodiments of the specification.
The first embodiment of the method comprises the following steps:
as shown in fig. 1, the present embodiment provides an information processing method, including:
step S110: scanning a designated area of an acquisition object to form a scanned image;
step S120: identifying the scanned image by adopting a first identification mode to form a first identification result;
step S130: when the certainty factor of the first recognition result is greater than a first specified threshold, authenticating the acquisition object based on the first recognition result; and when the reliability of the first identification result is smaller than the first specified threshold, identifying the scanned image by adopting a second identification mode to form a second identification result, and authenticating the acquisition object based on the second identification result.
The electronic device described in this embodiment may be an electronic device including an image capturing unit, specifically, a mobile phone, a tablet computer, or a wearable electronic device. The scan captures the object, forming a scan image, where the scan may be any form of image capture,
in step S120, first, a first recognition method is preferentially adopted for recognition, and a corresponding first recognition result is formed.
Step S130 may include determining a confidence level of the first recognition result. There are various ways of determining the certainty of the first recognition result, and a specific manner is provided herein. 1 or more characteristics of the collected object are collected in the scanning image, the characteristics can be matched with the stored characteristics of the target object one by one, and the similarity of each characteristic can be determined; and synthesizing the similarity of each characteristic or the specified characteristic to form the certainty factor. Specifically, the scanned image includes 10 features of the acquired object, and after the 10 features are matched with the features of the target object, the matching degree reaches 90%. If the matching degree of 6 features in the identification strategy of the first identification mode reaches 80%, the acquisition object is considered as the target object. However, in this embodiment, the certainty factor of the first recognition result is also calculated, and it can be considered that the certainty factor of the first recognition result is not less than 90% if the first recognition result is calculated by weighted average. It is clear that this is a rather high degree of certainty. Of course, different features have different stabilities, so that different weights may be given in determining the certainty factor, so that the certainty factor can be obtained from the new differences in the stabilities of the different features. The width characteristic between cheekbones of a specific human face is a characteristic with stronger stability compared with the characteristic of a human eyebrow shape. If the collection object has a brow-picking at the moment, the brow-shaped feature may be changed.
Of course, the calculation of the certainty factor can also be determined according to the number of features reaching the matching value. And if the number of the matches reaching the specified threshold value is more, the higher the certainty factor is. If there are 10 features, the matching degree of 7 features reaches 85%, which is higher than the matching degree of 6 features reaching 85%.
There are, of course, many ways of determining the degree of certainty, and this is not necessarily the case.
It is worth noting that: the certainty degree in this application includes a degree of certainty that the acquisition object is the target object, and may further include a degree of certainty that the acquisition object is not the target object. Of course, when it is determined that the certainty factor that the collection object is not the target object reaches the first predetermined threshold, the collection object may be authenticated as not being the target object directly based on the first recognition result. Of course, when the certainty factor that the collection object is the target object is determined to reach the first prescribed threshold value, the collection object can be authenticated as the target object directly based on the first recognition result.
The target object is the matched object received by the storage electronic device or the electronic device from the peripheral.
In a specific implementation process, the recognition accuracy of the first recognition mode is lower than that of the second recognition mode; the recognition complexity of the first recognition mode is lower than that of the second recognition mode. The higher the complexity is, the more energy consumption is consumed by the electronic device to perform identification by using the identification method, and it is very necessary for the mobile terminal to perform energy saving to extend the standby time, and the more system resources such as a memory or a CPC are consumed by the higher the complexity is, which may cause a high load on the system, cause a too high heat dissipation, and fail to respond to other operations in time. In this embodiment, the first identification method and the second identification method having different characteristics are combined to perform identification, so that the advantages of the first identification method and the advantages of the second identification method can be well taken into account, specifically, accuracy, identification complexity and the like are taken into account.
It is worth noting that: in this embodiment, the first identification manner and the second identification manner are both identification manners capable of identifying the scanned image, so that the electronic device only needs to perform image acquisition processing on the acquisition object once. If the first identification mode is a fingerprint identification mode, and the second identification mode is a pupil identification mode, then the scanned image is required to simultaneously include the acquired images of the two parts, otherwise, a plurality of images are required to be acquired, so in the embodiment, in order to reduce the number and times of image acquisition, the first identification mode and the second identification mode are preferentially different identification modes capable of identifying the same area of the acquired object, or one area identifiable by one identification mode includes an area identifiable by the other identification mode.
The second method embodiment:
as shown in fig. 1, the present embodiment provides an information processing method, including:
step S110: scanning a designated area of an acquisition object to form a scanned image;
step S120: identifying the scanned image by adopting a first identification mode to form a first identification result;
step S130, when the certainty factor of the first identification result is greater than a first specified threshold, authenticating the acquisition object based on the first identification result; and when the reliability of the first identification result is smaller than the first specified threshold, identifying the scanned image by adopting a second identification mode to form a second identification result, and authenticating the acquisition object based on the second identification result.
The step S110 may include:
scanning a designated area of the face of the acquisition object to form a scanned image; the designated area includes at least an eye area;
the step S120 may include:
and identifying the scanned image by using a face identification mode or an eye identification mode.
In this embodiment, the designated region of the acquisition object acquired in S110; the designated area includes at least an eye area, and the first recognition result is formed by directly recognizing the scanned image using a face recognition method or a face recognition method in step S120. The face recognition method includes facial feature recognition, and the eye recognition method includes recognition methods with large recognition granularity, such as eye contour recognition.
The two identification modes can be used for identifying and authenticating simply, and have the advantage of simple realization.
When the first recognition mode includes the face recognition mode or the face recognition mode, the second recognition mode may be pupil recognition. Pupil identification is the identification of the pupil in the eye of the acquisition object, and the identification mode requires clear acquisition image and high identification complexity, but the identification accuracy may also be higher. In this embodiment, the finger area acquired in step S110 at least includes the eye area, so that when the second recognition result is used for recognition, the image acquisition is not required to be performed again, which can reduce the energy consumption and system resources of image acquisition.
The third method embodiment:
as shown in fig. 1, the present embodiment provides an information processing method, including:
step S110: scanning a designated area of an acquisition object to form a scanned image;
step S120: identifying the scanned image by adopting a first identification mode to form a first identification result;
step S130, when the certainty factor of the first identification result is greater than a first specified threshold, authenticating the acquisition object based on the first identification result; and when the reliability of the first identification result is smaller than the first specified threshold, identifying the scanned image by adopting a second identification mode to form a second identification result, and authenticating the acquisition object based on the second identification result.
The step S110 may include:
scanning a designated area of the face of the acquisition object to form a scanned image; the designated area includes at least an eye area;
the step S120 may include:
and identifying the scanned image by using a face identification mode or an eye identification mode.
The step S130 may include: and identifying the scanned image by using an iris identification mode.
In this embodiment, the second recognition method is an iris recognition method, which is verified to be a recognition method having high recognition accuracy but high recognition complexity, but the iris recognition method recognizes the iris in the glasses as the subject of acquisition, and thus the recognition accuracy can be ensured.
In a specific implementation, the second identification method may include other identification methods besides the pupil identification method and the iris identification method, and thus, the details thereof are not described here.
The method comprises the following steps:
as shown in fig. 1, the present embodiment provides an information processing method, including:
step S110: scanning a designated area of an acquisition object to form a scanned image;
step S120: identifying the scanned image by adopting a first identification mode to form a first identification result;
step S130, when the certainty factor of the first identification result is greater than a first specified threshold, authenticating the acquisition object based on the first identification result; and when the reliability of the first identification result is smaller than the first specified threshold, identifying the scanned image by adopting a second identification mode to form a second identification result, and authenticating the acquisition object based on the second identification result.
The step S110 may include:
scanning a designated area of the face of the acquisition object to form a scanned image; the designated area includes at least an eye area;
the step S120 may include:
and identifying the scanned image by using a face identification mode or an eye identification mode.
The step S110 may include:
and scanning the designated area of the acquisition object by using a color infrared camera and forming the scanning image by band-pass filtering processing.
In this embodiment, the designated area of the acquisition object is scanned by using a color infrared camera, so that not only the contour information of the acquisition object but also the color information of the designated area can be acquired, and thus the characteristics of the acquisition object are maintained as much as possible. In this embodiment the infrared color camera still carries out band-pass filtering, and for the collection image that does not carry out band-pass filtering, can get rid of the interference of ambient light once to improve the fidelity of scanned image, thereby can promote the accuracy of discernment.
Method example five:
as shown in fig. 1, the present embodiment provides an information processing method, including:
step S110: scanning a designated area of an acquisition object to form a scanned image;
step S120: identifying the scanned image by adopting a first identification mode to form a first identification result;
step S130, when the certainty factor of the first identification result is greater than a first specified threshold, authenticating the acquisition object based on the first identification result; and when the reliability of the first identification result is smaller than the first specified threshold, identifying the scanned image by adopting a second identification mode to form a second identification result, and authenticating the acquisition object based on the second identification result.
As shown in fig. 2, the authenticating the collection object based on the second recognition result in step S130 includes:
step S131: when the reliability of the second identification result is greater than a second specified threshold value, directly authenticating the acquisition object based on the second identification result;
step S132: and when the reliability of the second identification result is not greater than the second specified threshold, the collected object is authenticated by combining the first identification result and the second identification result.
In general, the second recognition result is a relatively accurate recognition result, and if the certainty factor of the second recognition result is high, it indicates that the accuracy of authenticating the collection object based on the second recognition result is high, so that the authentication can be performed directly based on the second recognition result in step S131 to form an authentication result.
If the reliability of the second recognition result is not greater than the second specified threshold, then the authentication may be performed in combination with the first recognition result and the second recognition result. If both the two recognition results indicate that the collection object is not the target object, it may be determined that the collection object cannot pass authentication. Of course, when the two recognition results are different from each other, the subsequent processing may be performed in other recognition manners, and the subsequent processing is not performed again. Of course, it may be considered that the object to be captured is not authenticated as long as one of the first recognition result and the second recognition result considers that the object to be captured is not the target object.
In short, the information processing method of the embodiment ingeniously integrates the recognition results of the two recognition modes, so as to achieve accurate recognition and authentication of the collected object.
It should be noted that, in this embodiment, the calculation of the certainty factor of the second recognition result may be referred to as embodiment one, and a detailed description thereof is not repeated here.
Method example six:
as shown in fig. 1, the present embodiment provides an information processing method, including:
step S110: scanning a designated area of an acquisition object to form a scanned image;
step S120: identifying the scanned image by adopting a first identification mode to form a first identification result;
step S130, when the certainty factor of the first identification result is greater than a first specified threshold, authenticating the acquisition object based on the first identification result; and when the reliability of the first identification result is smaller than the first specified threshold, identifying the scanned image by adopting a second identification mode to form a second identification result, and authenticating the acquisition object based on the second identification result.
As shown in fig. 2, the authenticating the collection object based on the second recognition result in step S130 includes:
step S131: when the reliability of the second identification result is greater than a second specified threshold value, directly authenticating the acquisition object based on the second identification result;
step S132: and when the reliability of the second identification result is not greater than the second specified threshold, the collected object is authenticated by combining the first identification result and the second identification result.
The step S132 may include:
and when the first identification result and the second identification result show that the collected object corresponds to the same target object, authenticating the collected object as the target object corresponding to the first identification result and the second identification result.
In this embodiment, even if the respective certainty factors of the first recognition result and the second recognition result do not reach the corresponding threshold values, both recognition structures consider that the collection object corresponds to the same target object, which indicates that the collection object is very likely to be the corresponding target object, so in this embodiment, the collection object is determined to be the corresponding target object by combining the first recognition result and the second recognition result, thereby completing authentication.
The information processing method of the embodiment at least improves three different situations for identifying the collected object, can ensure higher identification accuracy under the situations, and can ensure simpler identification flow by identifying according to the identification mode in the embodiment of the application, thereby reducing system resources, computers and the like consumed by identification and authentication.
The first embodiment of the device:
as shown in fig. 3, the present embodiment provides an electronic device, including:
an acquisition unit 110 for scanning a designated region of an acquisition object to form a scanned image;
a first identification unit 120, configured to identify the scanned image by using a first identification method to form a first identification result;
an authentication unit 130, configured to authenticate the acquisition object based on the first recognition result when the certainty factor of the first recognition result is greater than a first specified threshold;
a second recognition unit 140, configured to, when the certainty factor of the first recognition result is smaller than the first specified threshold, recognize the scanned image by using a second recognition method to form a second recognition result;
the authentication unit 130 is further configured to authenticate the collection object based on the second identification result.
The electronic device described in this embodiment may be various types of electronic devices such as a mobile phone, a tablet computer, or a wearable device.
The acquisition unit 110 may include various image acquisition structures, such as various types of cameras or video or still cameras.
The specific structure of the first identification unit 120, the second identification unit 140 and the authentication unit 130 may include various processors or processing circuits having information processing functions. The processor can comprise a Central Processing Unit (CPU), a microprocessor MCU, a Digital Signal Processor (DSP), a programmable array PLC and the like. The processing circuit may comprise an application specific integrated circuit, ASCI, or the like.
The processor can complete the functions of the functional units through the execution of the executable codes.
Any two of the first identification unit 120, the second identification unit 140 and the authentication unit 130 may be integrated with the same processor or correspond to different processors respectively.
The recognition accuracy of the first recognition mode is lower than that of the second recognition mode; the recognition complexity of the first recognition mode is lower than that of the second recognition mode. Of course, the difference between the first recognition method and the second recognition method is not limited to these differences.
In short, the electronic device described in this embodiment provides implementation hardware for the information processing method described in the foregoing method embodiment, and has an advantage of being able to well consider the characteristics of the first identification manner and the second identification manner.
It should be noted that fig. 3 is only a schematic diagram of the embodiment described in the present application, and is used to define the specific structure of the electronic device.
The second equipment embodiment:
as shown in fig. 3, the present embodiment provides an electronic device, including:
an acquisition unit 110 for scanning a designated region of an acquisition object to form a scanned image;
a first identification unit 120, configured to identify the scanned image by using a first identification method to form a first identification result;
an authentication unit 130, configured to authenticate the acquisition object based on the first recognition result when the certainty factor of the first recognition result is greater than a first specified threshold;
a second recognition unit 140, configured to, when the certainty factor of the first recognition result is smaller than the first specified threshold, recognize the scanned image by using a second recognition method to form a second recognition result;
the authentication unit 130 is further configured to authenticate the collection object based on the second identification result.
The acquisition unit 110 is specifically configured to scan a designated area of the face of the acquisition object to form a scanned image; the designated area includes at least an eye area;
the first identification unit 120 is specifically configured to identify the scanned image by using a face identification method or an eye identification method.
The acquisition unit 110 according to this embodiment may be specifically configured to scan a designated region of the face of the object to be acquired, so as to form the scanned image, where the designated region at least includes the eye region. In this embodiment, the first recognition unit 120 directly performs recognition and authentication by using a face recognition method or an eye recognition method as the first recognition method.
The electronic device according to this embodiment, using the acquisition unit 110 and the first identification unit 120 according to this embodiment, can easily form the first identification result, and has the advantage of simple structure.
The second recognition unit 140 may be a pupil recognition unit or the like that performs more detailed or precise recognition on the eye or face features, and thus the first recognition unit 120 and the second recognition unit 140 share the same scan image to perform recognition on the captured object.
The third equipment embodiment:
as shown in fig. 3, the present embodiment provides an electronic device, including:
an acquisition unit 110 for scanning a designated region of an acquisition object to form a scanned image;
a first identification unit 120, configured to identify the scanned image by using a first identification method to form a first identification result;
an authentication unit 130, configured to authenticate the acquisition object based on the first recognition result when the certainty factor of the first recognition result is greater than a first specified threshold;
a second recognition unit 140, configured to, when the certainty factor of the first recognition result is smaller than the first specified threshold, recognize the scanned image by using a second recognition method to form a second recognition result;
the authentication unit 130 is further configured to authenticate the collection object based on the second identification result.
The second identification unit 140 is specifically configured to identify the scanned image by using an iris identification method.
In this embodiment, the second recognition unit 140 may be an iris recognition unit, and the specific structure may be any structure capable of performing iris recognition in the prior art, and the accuracy of the final recognition result is ensured by using the accurate iris recognition mode as the second recognition mode.
In short, the electronic device described in this embodiment can provide implementation hardware for the information processing method described in the third embodiment of the implementation method, and has the advantages of simple structure and easy implementation.
The fourth equipment embodiment:
as shown in fig. 3, the present embodiment provides an electronic device, including:
an acquisition unit 110 for scanning a designated region of an acquisition object to form a scanned image;
a first identification unit 120, configured to identify the scanned image by using a first identification method to form a first identification result;
an authentication unit 130, configured to authenticate the acquisition object based on the first recognition result when the certainty factor of the first recognition result is greater than a first specified threshold;
a second recognition unit 140, configured to, when the certainty factor of the first recognition result is smaller than the first specified threshold, recognize the scanned image by using a second recognition method to form a second recognition result;
the authentication unit 130 is further configured to authenticate the collection object based on the second identification result.
The collecting unit 110 is specifically configured to scan the designated area of the collected object by using a color infrared camera and form the scanned image through band-pass filtering processing.
The collecting unit 110 of this embodiment may include a color infrared camera, and the color infrared camera is utilized to scan and collect an object and perform band filtering processing, so as to avoid interference of ambient light on a scanned image, thereby forming a scanned image with a smaller distortion degree, and thus, accuracy of identification and authentication can be improved.
Device example five:
as shown in fig. 3, the present embodiment provides an electronic device, including:
an acquisition unit 110 for scanning a designated region of an acquisition object to form a scanned image;
a first identification unit 120, configured to identify the scanned image by using a first identification method to form a first identification result;
an authentication unit 130, configured to authenticate the acquisition object based on the first recognition result when the certainty factor of the first recognition result is greater than a first specified threshold;
a second recognition unit 140, configured to, when the certainty factor of the first recognition result is smaller than the first specified threshold, recognize the scanned image by using a second recognition method to form a second recognition result;
the authentication unit 130 is further configured to authenticate the collection object based on the second identification result.
The authentication unit 130 is specifically configured to authenticate the acquisition object directly based on the second recognition result when the reliability of the second recognition result is greater than a second specified threshold; and when the reliability of the second identification result is not greater than the second specified threshold, the collected object is authenticated by combining the first identification result and the second identification result.
The authentication unit 130 of this embodiment can perform authentication not only based on the first identification result and the second identification result alone, but also in combination with the first identification result and the second identification result, so that the electronic device of this embodiment can support authentication under at least three conditions, which improves authentication capability and ensures authentication accuracy.
Device example six:
as shown in fig. 3, the present embodiment provides an electronic device, including:
an acquisition unit 110 for scanning a designated region of an acquisition object to form a scanned image;
a first identification unit 120, configured to identify the scanned image by using a first identification method to form a first identification result;
an authentication unit 130, configured to authenticate the acquisition object based on the first recognition result when the certainty factor of the first recognition result is greater than a first specified threshold;
a second recognition unit 140, configured to, when the certainty factor of the first recognition result is smaller than the first specified threshold, recognize the scanned image by using a second recognition method to form a second recognition result;
the authentication unit 130 is further configured to authenticate the collection object based on the second identification result.
The authentication unit 130 is specifically configured to authenticate the acquisition object directly based on the second recognition result when the reliability of the second recognition result is greater than a second specified threshold; and when the reliability of the second identification result is not greater than the second specified threshold, the collected object is authenticated by combining the first identification result and the second identification result.
The authenticating unit 130 is further specifically configured to authenticate the collected object as the target object corresponding to both the first recognition result and the second recognition result when the first recognition result and the second recognition result indicate that the collected object corresponds to the same target object. In addition to the capability of authenticating whether the collected object is the target object based on the first recognition result and the second recognition result separately, the present embodiment also provides a method for authenticating by the authentication unit 130 that the collected object is determined to be the corresponding target object when the first recognition result and the second recognition result both consider that the collected object corresponds to the same target object, which has the advantages of simple implementation and high accuracy.
One specific example is provided below in connection with any of the embodiments described above. As shown in fig. 4, the following steps are included in this example:
the first step is as follows: eye recognition is performed.
The second step is that: and judging whether the reliability of the eye identification is greater than a specified threshold value. In fig. 4, it is determined whether the degree of certainty of the eye recognition is greater than 90%. And if the confidence level of the eye identification is more than 90%, entering the third step, and otherwise, entering the fourth step.
The third step: and determining that the authentication is passed or fails according to the identification result of the eye identification.
The fourth step: and (5) iris recognition is carried out.
The fifth step: and determining that the authentication is passed or fails according to the result of the iris recognition.
The eye recognition in this example may be recognition based on the aforementioned first recognition manner; the iris recognition is the recognition based on the second recognition mode.
Since the accuracy of eye recognition is low relative to that of iris recognition, but the recognition complexity is lower than that of iris recognition, the consumed resources and energy consumption are low. Through the introduction of certainty factor in this example, can directly utilize eye identification mode to discern when eye discernment can comparatively accurate discernment and authentication, if can not then turn into iris discernment, so when tender consolidation guarantees the security of authentication security, reduce electronic equipment's consumption and discernment complexity.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only a logical functional division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all the functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may be separately used as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: a mobile storage device, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (10)

1. An information processing method, the method comprising:
scanning a designated area of an acquisition object to form a scanned image;
identifying the scanned image by adopting a first identification mode to form a first identification result;
when the certainty factor of the first recognition result is greater than a first specified threshold, authenticating the acquisition object based on the first recognition result;
when the reliability of the first identification result is smaller than the first specified threshold, identifying the scanned image by adopting a second identification mode to form a second identification result, and authenticating the acquisition object based on the second identification result;
the first identification mode and the second identification mode are both identification modes capable of identifying the scanned image; in the first identification mode and the second identification mode, the region which can be identified by one identification mode comprises a region which can be identified by the other identification mode; the first identification mode is a face identification mode or an eye identification mode, and the second identification mode is an iris identification mode;
the authenticating the collection object based on the second recognition result includes:
and when the reliability of the second recognition result is not greater than the second specified threshold value, and when the first recognition result and the second recognition result indicate that the collected object corresponds to the same target object, authenticating the collected object as the target object corresponding to both the first recognition result and the second recognition result.
2. The method of claim 1,
the scanning acquires a designated area of the object to form a scanning image, and comprises the following steps:
scanning a designated area of the face of the acquisition object to form a scanned image; the designated area includes at least an eye area;
the identifying the scanned image by adopting a first identifying mode to form a first identifying result comprises the following steps:
and identifying the scanned image by using a face identification mode or an eye identification mode.
3. The method of claim 2,
the recognizing the scanned image by adopting a second recognition mode to form a second recognition result, comprising:
and identifying the scanned image by using an iris identification mode.
4. The method of claim 2,
the scanning acquires a designated area of the face of the object to form a scanned image, and comprises:
and scanning the designated area of the acquisition object by using a color infrared camera and forming the scanning image by band-pass filtering processing.
5. The method of claim 1,
the authenticating the collection object based on the second recognition result further includes:
and when the reliability of the second identification result is greater than a second specified threshold value, directly authenticating the acquisition object based on the second identification result.
6. An electronic device, the electronic device comprising:
the acquisition unit is used for scanning the designated area of the acquisition object to form a scanned image;
the first identification unit is used for identifying the scanned image by adopting a first identification mode to form a first identification result;
the authentication unit is used for authenticating the acquisition object based on the first identification result when the certainty factor of the first identification result is greater than a first specified threshold value;
the second identification unit is used for identifying the scanned image by adopting a second identification mode to form a second identification result when the certainty factor of the first identification result is smaller than the first specified threshold value;
the authentication unit is further used for authenticating the acquisition object based on the second identification result;
the first identification mode and the second identification mode are both identification modes capable of identifying the scanned image; in the first identification mode and the second identification mode, the region which can be identified by one identification mode comprises a region which can be identified by the other identification mode; the first identification mode is a face identification mode or an eye identification mode, and the second identification mode is an iris identification mode;
the authentication unit is specifically configured to authenticate the collected object as the target object corresponding to both the first recognition result and the second recognition result when the reliability of the second recognition result is not greater than the second specified threshold and when the first recognition result and the second recognition result indicate that the collected object corresponds to the same target object.
7. The electronic device of claim 6,
the acquisition unit is specifically used for scanning a designated area of the face of the acquisition object to form a scanned image; the designated area includes at least an eye area;
the first identification unit is specifically configured to identify the scanned image by using a face identification method or an eye identification method.
8. The electronic device of claim 7,
the second identification unit is specifically configured to identify the scanned image by using an iris identification method.
9. The electronic device of claim 7,
the acquisition unit is specifically used for scanning the designated area of the acquisition object by using a color infrared camera and forming the scanning image through band-pass filtering processing.
10. The electronic device of claim 6,
the authentication unit is further specifically configured to authenticate the acquisition object directly based on the second recognition result when the reliability of the second recognition result is greater than a second specified threshold.
CN201510316425.8A 2015-06-10 2015-06-10 Information processing method and electronic equipment Active CN106295669B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510316425.8A CN106295669B (en) 2015-06-10 2015-06-10 Information processing method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510316425.8A CN106295669B (en) 2015-06-10 2015-06-10 Information processing method and electronic equipment

Publications (2)

Publication Number Publication Date
CN106295669A CN106295669A (en) 2017-01-04
CN106295669B true CN106295669B (en) 2020-03-24

Family

ID=57659214

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510316425.8A Active CN106295669B (en) 2015-06-10 2015-06-10 Information processing method and electronic equipment

Country Status (1)

Country Link
CN (1) CN106295669B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1717695A (en) * 2002-11-29 2006-01-04 索尼英国有限公司 Face detection and tracking
CN101504721A (en) * 2009-03-13 2009-08-12 北京中星微电子有限公司 Method and apparatus for identity authentication based on face image
CN101814130A (en) * 2009-02-19 2010-08-25 中国科学院自动化研究所 Iris identification device by using camera array and multimodal biometrics identification method
CN102163288A (en) * 2011-04-06 2011-08-24 北京中星微电子有限公司 Eyeglass detection method and device
CN104331692A (en) * 2014-11-28 2015-02-04 广东欧珀移动通信有限公司 Method and terminal for face recognition based on dual features

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8873813B2 (en) * 2012-09-17 2014-10-28 Z Advanced Computing, Inc. Application of Z-webs and Z-factors to analytics, search engine, learning, recognition, natural language, and other utilities

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1717695A (en) * 2002-11-29 2006-01-04 索尼英国有限公司 Face detection and tracking
CN101814130A (en) * 2009-02-19 2010-08-25 中国科学院自动化研究所 Iris identification device by using camera array and multimodal biometrics identification method
CN101504721A (en) * 2009-03-13 2009-08-12 北京中星微电子有限公司 Method and apparatus for identity authentication based on face image
CN102163288A (en) * 2011-04-06 2011-08-24 北京中星微电子有限公司 Eyeglass detection method and device
CN104331692A (en) * 2014-11-28 2015-02-04 广东欧珀移动通信有限公司 Method and terminal for face recognition based on dual features

Also Published As

Publication number Publication date
CN106295669A (en) 2017-01-04

Similar Documents

Publication Publication Date Title
KR102299847B1 (en) Face verifying method and apparatus
CN105335731B (en) Fingerprint identification method and device and terminal equipment
CN105612533B (en) Liveness detection method, liveness detection system, and computer program product
US10423848B2 (en) Method, system, and computer-readable recording medium for long-distance person identification
EP2658242B1 (en) Apparatus and method for recognizing image
WO2019011073A1 (en) Human face live detection method and related product
CN107463818B (en) Unlock control method and related products
KR20180014624A (en) System and Method for Iris Authentication
CN107251051A (en) Method and electronic device for updating biometric pattern
EP2148295A1 (en) Vein pattern management system, vein pattern registration device, vein pattern authentication device, vein pattern registration method, vein pattern authentication method, program, and vein data structure
CN106096585A (en) A kind of auth method and terminal
CN107517340B (en) Camera module and electronic equipment
KR101724971B1 (en) System for recognizing face using wide angle camera and method for recognizing face thereof
JP7251874B2 (en) Face authentication device, face authentication method, program, and recording medium
CN110826410B (en) Face recognition method and device
JP2018169943A (en) Face authentication processing device, face authentication processing method, and face authentication processing system
US20140369553A1 (en) Method for triggering signal and in-vehicle electronic apparatus
CN107451543A (en) Event processing method and related products
CN109684993B (en) Face recognition method, system and equipment based on nostril information
CN107277265A (en) Unlock control method and related products
US8270681B2 (en) Vein pattern management system, vein pattern registration apparatus, vein pattern authentication apparatus, vein pattern registration method, vein pattern authentication method, program, and vein data configuration
CN112507798A (en) Living body detection method, electronic device, and storage medium
US8320639B2 (en) Vein pattern management system, vein pattern registration apparatus, vein pattern authentication apparatus, vein pattern registration method, vein pattern authentication method, program, and vein data configuration
CN108875472B (en) Image acquisition device and face identity verification method based on image acquisition device
CN106295669B (en) Information processing method and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant