CN108521821A - Identification authentication method, identification authentication device and electronic equipment - Google Patents
Identification authentication method, identification authentication device and electronic equipment Download PDFInfo
- Publication number
- CN108521821A CN108521821A CN201880000325.6A CN201880000325A CN108521821A CN 108521821 A CN108521821 A CN 108521821A CN 201880000325 A CN201880000325 A CN 201880000325A CN 108521821 A CN108521821 A CN 108521821A
- Authority
- CN
- China
- Prior art keywords
- identification authentication
- under test
- object under
- image information
- dimensional
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 93
- 238000012360 testing method Methods 0.000 claims abstract description 280
- 238000013527 convolutional neural network Methods 0.000 claims description 23
- 238000013135 deep learning Methods 0.000 claims description 15
- 238000000605 extraction Methods 0.000 claims description 13
- 210000001508 eye Anatomy 0.000 claims description 12
- 210000004709 eyebrow Anatomy 0.000 claims description 12
- 210000000216 zygoma Anatomy 0.000 claims description 12
- 210000001061 forehead Anatomy 0.000 claims description 11
- 230000005611 electricity Effects 0.000 claims description 9
- 239000000284 extract Substances 0.000 claims description 9
- 230000006870 function Effects 0.000 claims description 5
- 238000012546 transfer Methods 0.000 claims description 3
- 238000012545 processing Methods 0.000 claims description 2
- 210000005252 bulbus oculi Anatomy 0.000 claims 4
- 238000012549 training Methods 0.000 claims 4
- 230000003287 optical effect Effects 0.000 description 17
- 238000010586 diagram Methods 0.000 description 16
- 238000005516 engineering process Methods 0.000 description 16
- 230000001815 facial effect Effects 0.000 description 11
- 230000004044 response Effects 0.000 description 7
- 230000008859 change Effects 0.000 description 6
- 238000010521 absorption reaction Methods 0.000 description 4
- 238000004458 analytical method Methods 0.000 description 4
- 239000011159 matrix material Substances 0.000 description 4
- 238000009877 rendering Methods 0.000 description 4
- 238000011160 research Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 3
- 230000005855 radiation Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 238000012790 confirmation Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 210000004556 brain Anatomy 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 239000000470 constituent Substances 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000002474 experimental method Methods 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 210000004209 hair Anatomy 0.000 description 1
- 210000003128 head Anatomy 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000001537 neural effect Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/60—Type of objects
- G06V20/64—Three-dimensional objects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/24—Classification techniques
- G06F18/241—Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
- G06F18/2413—Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on distances to training or reference patterns
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/161—Detection; Localisation; Normalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/168—Feature extraction; Face representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/172—Classification, e.g. identification
Abstract
This application discloses a kind of identification authentication method, identification authentication device and electronic equipments.The identification authentication method includes:Step S1:It projects on infrared floodlight a to object under test, senses the first infrared image of the object under test;Step S2:It projects on infrared structure light to the object under test, senses the second infrared image of the object under test;Step S3:According to first infrared image and second infrared image, confirm whether the identity of the object under test is legal.The identification authentication device runs the identification authentication method.The electronic equipment includes the identification authentication device.
Description
Technical field
This application involves a kind of identification authentication method, identification authentication device and electronic equipments.
Background technology
With the development of science and technology, more and more occasions start that object is identified using various sensing technologies.For example,
Fingerprint identification technology, iris recognition technology etc..So, fingerprint identification technology and iris recognition technology etc. have its respective limitation
Property, for example, fingerprint identification technology can not carry out longer-distance sensing, the sensing response speed of iris recognition technology is slower
Deng.
Therefore, it is necessary to provide a kind of novel sensing technology, it to be used for identification authentication.
Invention content
The application embodiment aims to solve at least one of the technical problems existing in the prior art.For this purpose, the application is real
The mode of applying needs to provide a kind of identification authentication method, identification authentication device and electronic equipment.
First, the application provides a kind of identification authentication method, including:
Step S1:It projects on infrared floodlight a to object under test, senses the first infrared image of the object under test;
Step S2:It projects on infrared structure light to the object under test, senses the second infrared image of the object under test;
Step S3:According to first infrared image and second infrared image, confirm whether the identity of the object under test closes
Method.
In presently filed embodiment, reflected to the identity of the object under test by way of optical image sensing
Power.Wherein, the 2D attribute informations that the object under test can be obtained according to first infrared image, according to the second infrared image energy
The 3D attribute informations of the object under test are enough obtained, to which the object under test can be confirmed according to the 2D and 3D attribute informations
Whether identity is legal.It can be seen that this application provides a kind of novel optical sensing technologies to realize identification authentication.
In addition, the optical sensing technology is applicable to longer-distance sensing, and it is very fast to sense response speed.It is described farther out
Distance for example, 1 meter within the scope of or even more farther distance.
The application also provides a kind of identification authentication device, including:
First projector, for projecting infrared floodlight to an object under test;
Second projector, for projecting infrared structure light to the object under test;
Image sensing device, for capturing by the reflected infrared floodlight of the object under test, sensing the object under test
First infrared image, and for capturing by the reflected infrared structure light of the object under test, sensing the of the object under test
Two infrared images;
Processor, for according to first infrared image and the second infrared image, confirming that the identity of the object under test is
It is no legal.
In presently filed embodiment, the identification authentication device is by way of optical image sensing to the object under test
Identity authenticated.Wherein, which can obtain the 2D attributes letter of the object under test according to first infrared image
Breath, the 3D attribute informations of the object under test can be obtained according to second infrared image, to, according to first infrared image and
Second infrared image is able to confirm that whether the identity of the object under test is legal.It can be seen that this application provides a kind of novel
Optical sensing technology come realize authentication.
In addition, the optical sensing technology is applicable to longer-distance sensing, and it is very fast to sense response speed.It is described farther out
Distance for example, 1 meter within the scope of or even more farther distance.
The application also provides a kind of electronic equipment, including it is any one of above-mentioned described in identification authentication device.
Since the electronic equipment of the application includes above-mentioned identification authentication device, which can realize pair
The longer-distance sensing of object under test, and it is very fast to sense response speed.
The additional aspect and advantage of the application embodiment will be set forth in part in the description, partly will be from following
Become apparent in description, or recognize by the practice of the application embodiment.
Description of the drawings
The above-mentioned and/or additional aspect and advantage of the application embodiment retouch embodiment from conjunction with following accompanying drawings
It will be apparent and be readily appreciated that in stating, wherein:
Fig. 1 is the flow diagram of the first embodiment of the identification authentication method of the application.
Fig. 2 is the relation schematic diagram between the radiation intensity and wavelength of ambient light.
Fig. 3 is the flow diagram of the second embodiment of the identification authentication method of the application.
Fig. 4 is the flow diagram of the third embodiment of the identification authentication method of the application.
Fig. 5 is the flow diagram of the 4th embodiment of the identification authentication method of the application.
Fig. 6 is the flow diagram of the 5th embodiment of the identification authentication method of the application.
Fig. 7 is the structure diagram of one embodiment of identification authentication device of the application.
Fig. 8 is the structural schematic diagram of one embodiment of electronic equipment of the application.
Specific implementation mode
Presently filed embodiment is described below in detail, the example of the embodiment is shown in the accompanying drawings, wherein from beginning
Same or similar element or element with the same or similar functions are indicated to same or similar label eventually.Below by ginseng
The embodiment for examining attached drawing description is exemplary, and is only used for explaining the application, and should not be understood as the limitation to the application.
In the description of the present application, it is to be understood that term " first ", " second " are used for description purposes only, and cannot
It is interpreted as indicating or implies relative importance or implicitly indicate the quantity of indicated technical characteristic.Define as a result, " the
One ", the feature of " second " can explicitly or implicitly include one or more feature.In the description of the present application
In, the meaning of " plurality " is two or more, unless otherwise specifically defined.
In the description of the present application, it should be noted that unless otherwise clearly defined and limited, term " installation ", " phase
Even ", " connection " shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or be integrally connected;It can
Can also be to be electrically connected or can be in communication with each other to be mechanical connection;It can be directly connected, it can also be by between intermediary
It connects connected, can be the interaction relationship of the connection or two elements inside two elements.For the ordinary skill of this field
For personnel, the concrete meaning of above-mentioned term in this application can be understood as the case may be.
Following disclosure provides many different embodiments or example is used for realizing the different structure of the application.In order to
Simplify disclosure herein, hereinafter to the component of specific examples and being set for describing.Certainly, they are merely examples, and
And purpose does not lie in limitation the application.In addition, the application can in different examples repeat reference numerals and/or reference letter,
This repetition is for purposes of simplicity and clarity, itself not indicate between discussed various embodiments and/or setting
Relationship.
Further, described feature, structure can be incorporated in one or more embodiment party in any suitable manner
In formula.In the following description, many details are provided to fully understand presently filed embodiment to provide.So
And one of ordinary skill in the art would recognize that, without one or more in the specific detail, or using other structures,
Constituent element etc. can also put into practice the technical solution of the application.In other cases, it is not shown in detail or describes known features or behaviour
Make to avoid fuzzy the application.
Referring to Fig. 1, Fig. 1 is the flow diagram of the first embodiment of the identification authentication method of the application.The identity
On an electronic device, the electronic equipment is such as, but not limited to consumer electronics for method for authenticating such as, but not limited to application
The electronic product of the suitable types such as product, household formula electronic product, vehicular electronic product, financial terminal product.Wherein, it consumes
Property electronic product such as but being not limited to mobile phone, tablet computer, laptop, tabletop display, computer all-in-one machine.Household
Formula electronic product such as but being not limited to intelligent door lock, TV, refrigerator, Wearable.Vehicular electronic product for example but
It is not limited to automatic navigator, vehicle-carrying DVD etc..Financial terminal product for example but be not limited to ATM machine, self-service transacting business end
End etc..The identification authentication method includes:
Step S1:It projects on infrared floodlight a to object under test, senses the first infrared image of the object under test;
Step S2:It projects on infrared structure light to the object under test, senses the second infrared image of the object under test;With
Step S3:According to first infrared image and second infrared image, confirm whether the identity of the object under test closes
Method.
In the present embodiment, it by projecting infrared floodlight on infrared structure light to the object under test, is somebody's turn to do respectively
The different infrared images of object under test, to realize sensing and the identification to the object under test.Wherein, according to first infrared image
Two dimension (2-Dimension, 2D) image information that the object under test can be obtained, can be somebody's turn to do according to second infrared image
Three-dimensional (3-Dimension, 3D) image information of object under test, the 3D rendering information is for example including depth information.To, according to
Whether the identity that the 2D image informations confirm the object under test with 3D rendering information is legal.
As shown in the above, this application provides a kind of novel optical sensing technologies to realize identification authentication.
Further, due to the optical characteristics of infrared floodlight and infrared structure light, the optical sensing technology be applicable to compared with
Sensing at a distance, and it is very fast to sense response speed.It is described relatively it is remote be, for example, within the scope of 1 meter or it is even more farther away from
From.
In step sl, infrared floodlight is projected to the object under test for example, by using infrared floodlight, and utilize image sensing
Device capture is by the reflected infrared floodlight of the object under test, to obtain the first infrared image.
In step s 2, infrared structure light is projected to the object under test for example, by using optical module.The optical module
Such as including light source, collimation camera lens and diffractive-optical element (DOE), wherein light source is for generating an infrared laser beam;Collimation
Camera lens calibrates infrared laser beam, forms less parallel light;Diffractive-optical element carries out the infrared laser beam after calibration
Modulation, forms corresponding speckle pattern.The speckle pattern such as, but not limited to include rule dot matrix, striped formula, grid type,
One or more of speckle formula, coding type etc..Wherein, speckle formula is also known as random dot matrix.Coding type pattern is not for example by
The light of same waveform forms, a kind of number of each waveforms stands, and the combination of each waveform is to encode.In addition, the optical module example
As can be also made of other suitable optical elements.
Above-mentioned projected on known infrared structure light pattern to the object under test using based on pumped FIR laser principle.Image
Sensing device or processor determine that the depth of the object under test is believed according to the infrared structure light pattern of the deformation captured to analyze
Breath.It is space structure light to define such infrared structure light.
Ground is changed, such as can also be used based on flight time (Time of Flight, ToF) principle, infrared knot is projected
Structure light is to the object under test.Image sensing device or processor are for example counted by measuring the propagation delay time between light pulse
Calculate the depth information of object under test.It is time structure light to define such infrared structure light.
The time structure light is such as, but not limited in the combination of any one or two kinds in sine wave, square wave.
The object under test is, for example, the face of human body.Correspondingly, the identification authentication method of the application face for identification.
So, the application is not limited thereto, which is for example alternatively other proper sites of human body, even other suitable
Organism or inorganic matter etc..
Existing, industry usually projects the near infrared light that wavelength is 850 nanometers, to obtain the infrared image of object under test.
However, present inventor passes through a large amount of creative work, analysis is found with research:It is 940 nanometers red to project wavelength
Outer floodlight, 940 nanometers of infrared structure light are sensed, and accurate sensing effect can be obtained.
Referring to Fig. 2, relation schematic diagrams of the Fig. 2 between the radiation intensity and wavelength of ambient light.Wherein, wavelength horizontal axis
It indicates, and is denoted as alphabetical λ, radiation intensity is indicated with the longitudinal axis, and is denoted as letter e.Inventor passes through theoretical research, knot
A large amount of experiment test is closed, is verified and is repeated analysis and research etc., creatively found:Ambient light medium wavelength range is
The near infrared light of [920,960] nanometer is easily larger by Atmospheric Absorption, strength retrogression, be when step S1 projects wave-length coverage [920,
960] the infrared floodlight of nanometer obtains the first infrared image of the object under test according to the infrared floodlight of capture to object under test
When, it can be disturbed by ambient light less, to improve the acquisition precision of image.Similarly, when step S2 projections wave-length coverage is
The infrared structure light of [920,960] nanometer obtains the second of the object under test to object under test, according to the infrared structure light of capture
, can be disturbed by ambient light less when infrared image, to improve the acquisition precision of image.
Further, it is the near infrared light that in the infrared light of [920,960] nanometer, wavelength is 940 nanometers in wave-length coverage
It is more easy to by Atmospheric Absorption, strength retrogression's maximum, therefore, in presently filed embodiment, the infrared floodlight of step S1 projections
Wavelength is preferably 940 nanometers, and the wavelength of the infrared structure light of step S2 projections is preferably 940 nanometers.
However, in practical applications, infrared knot that the wavelength and step S2 of the infrared floodlight that step S1 is projected are projected
The wavelength of structure light has certain deviation on the basis of 940 nanometers, such as has (+15) nanometer or (- 15) ran
Deviation.Therefore, the wave-length coverage of the infrared floodlight of step S1 projections is, for example, [925,955] nanometer, and step S2 is projected infrared
The wave-length coverage of structure light is, for example, [925,955] nanometer.As it can be seen that the wave-length coverage [925,955] still falls within wave-length coverage
[920,960] in.
It should be noted that the infrared structure light that the wavelength and step S2 of the infrared floodlight that step S1 is projected are projected
Wavelength is any one numerical value fallen in above-mentioned wave-length coverage [920,960] nanometer.The application is succinct clear in order to describe, herein
Place does not enumerate each concrete numerical value, but any one numerical value fallen in this wave-length coverage [920,960] nanometer is all feasible
's.
Certainly, ground is changed, other suitable waves can also be used in the step S1 and step S2 of the identification authentication method of the application
The infrared floodlight, infrared structure light of long (for example, 850 nanometers) are projected.
Further, due to step S1 projection it is infrared floodlight, step S2 projections are therefore infrared structure light is
The first infrared image and the second infrared image aliasing, step S1 is avoided to be carried out with step S2 timesharing.
In the present embodiment, step S1 is carried out prior to step S2.So, ground, in other embodiments, step are changed
S2 can also be carried out prior to step S1.
Referring to Fig. 3, Fig. 3 is the flow diagram of the second embodiment of the identification authentication method of the application.This second
The identification authentication method of embodiment is roughly the same with the identification authentication method of first embodiment, and the two main distinction is:
The step S3 of the identification authentication method of the second embodiment includes:
Sub-step S31:According to the first infrared image that step S1 is obtained, compare the two-dimensional image information of the object under test with
Whether the two-dimensional image information to prestore matches, when the two-dimensional image information for confirming the two-dimensional image information of the object under test and prestoring
When matching, then sub-step S32 is executed, otherwise, when the two dimensional image for confirming the two-dimensional image information of the object under test and prestoring is believed
When breath mismatches, then identification authentication fails;
Sub-step S32:According to the second infrared image that step S2 is obtained, judge whether the object under test is three-dimensional object,
When judging that it is three-dimensional object to learn the object under test not, then identification authentication fails.
In sub-step S31, the two-dimensional image information by comparing the object under test is with the two-dimensional image information to prestore
No matching, obstructed out-of-date when identifying for the first time to carry out first time identification to the object under test, then identification authentication fails, flow
Terminate.
It is illustrated by taking recognition of face as an example, before carrying out face recognition, user has registered the face of he or she in advance
Portion's image template, and be stored in a such as memory.Wherein, which includes two-dimensional image information.The storage
Device can for example prestore the two-dimensional image information of one or more sample objects.
When executing face recognition, the first time identification to the object under test is exactly:Compare the X-Y scheme of the object under test
As whether information matches with the two-dimensional image information of registered users face, if it is confirmed that the two-dimensional image information of the object under test
It is mismatched with the two-dimensional image information of the registered users face, then identification authentication fails.
If it is confirmed that the two-dimensional image information of the object under test is matched with the two-dimensional image information of the registered users face,
It can't then determine that the identity of the object under test is legal, reason is:In sub-step S31, because being sentencing for two-dimensional image information
Disconnected and identification, if the photo using the user can equally identify success.
Next, by executing sub-step S32, to avoid above-mentioned the case where passing through using photo array.
In sub-step S32, according to the second infrared image that step S2 is obtained, judge whether the object under test is stereoscopic article
Body.For example, since depth information can be obtained according to second infrared image, to judge the determinand according to depth information
Whether body is three-dimensional object.
If it is determined that the object under test is not three-dimensional object, then identification authentication fails, and flow terminates.In this case,
It is possible to be that other people carry out identification using the photo of validated user or video etc..
Optionally, in sub-step S32, when it is three-dimensional object to confirm the object under test, then identification authentication success.
Due to only judging that the object under test is three-dimensional object in sub-step S32, without to be measured to this
The stereo image information of object largely analyze and calculate, and time and reduction are sensed so as to reduce power consumption, reduce
Cost.
Specifically, for example, in sub-step S31, when the two-dimensional image information and registered users for confirming the object under test
When the matching factor of the two-dimensional image information of face is greater than or equal to a predetermined threshold, then the X-Y scheme of the object under test can be confirmed
As information is matched with the two-dimensional image information of registered users face.Relatively, if it is confirmed that matching factor is less than the predetermined threshold
When value, then the two-dimensional image information and the two-dimensional image information of registered users face that can confirm the object under test mismatch.
In the present embodiment, step S1 is carried out prior to step S2.
The sub-step S31 and step S2 is carried out at the same time.It so, it is possible further to reduce the sensing time, promote work
Efficiency.
So, ground is changed, in other embodiments, the step S2 can also be carried out prior to sub-step S31.
In addition, changing ground, in other embodiments, the step S2 can also be carried out prior to step S1, and step S1 is first
It is carried out in step S3.
Specifically, in sub-step S31, about the comparison of two-dimensional image information, for example, can be by comparing the determinand
The plane picture of the plane picture of body and the object face to prestore is realized.
However, present applicant proposes another realization methods compared for two-dimensional image information.The two dimension to prestore
Image information includes face feature information.The sub-step S31 further comprises that measuring targets carry out face feature information and carry
It takes, by comparing the face feature information extracted and the face feature information to prestore, to confirm the X-Y scheme of the object under test
As whether information matches with the two-dimensional image information to prestore.To relative to comparing for picture in its entirety, by comparing feature
Mode can be further reduced calculation amount, improve sensing efficiency.
In one example, in sub-step S31, the facial characteristics that the object under test is extracted by deep learning method is believed
Breath.The deep learning method includes:Depth convolutional neural networks model is established, the depth is trained using the human face photo of predetermined quantity
Convolutional neural networks model is spent, according to the characteristic parameter of the trained depth convolutional neural networks model extraction face.
Change ground, in other embodiments, in sub-step S31, also can extract nose, eyes, face, eyebrow,
The facial characteristics such as width of forehead, cheekbone, chin, face, the width of nose, chin, or/and, nose, eyes, face, eyebrow
The range information arbitrarily combined in hair, forehead, cheekbone, chin etc..For example, the distance between nose and eyes information.Certainly, institute
It states face feature information and is not limited to example listed above or other suitable characteristic informations.
The application is not limited to the alignments of above involved two-dimensional image information or other suitably compares other side
Formula.
Further, in sub-step S32, the extraction to second infrared image progress stereoscopic features information, and according to
The stereoscopic features information extracted judges whether the object under test is three-dimensional object.
In one example, the stereoscopic face characteristic information of the object under test is extracted by deep learning method.The depth
Learning method includes:Depth convolutional neural networks model is established, the depth convolutional Neural is trained using the human face photo of predetermined quantity
Network model, according to the characteristic parameter of the trained depth convolutional neural networks model extraction face.
Change ground, in other embodiments, in sub-step S32, also can extract nose, eyes, face, eyebrow,
Any one or a few three-dimensional size information in the facial characteristics such as forehead, cheekbone, chin, face.The three-dimensional size letter
Breath is depth information.Certainly, the stereoscopic features information is not limited to example listed above or other suitable
Characteristic information.
So, the application is not limited to the judgment mode of above-mentioned three-dimensional object, for example, ground is changed, in other embodiment
In, stereo image information can also be constructed, and be compared with the stereo image information to prestore according to the second infrared image,
To judge that the object under test is three-dimensional object.
As shown in the above, the identification authentication method of the second embodiment can save sensing the time, save power consumption,
And cost can be reduced.
So, ground is changed, in some embodiments, sub-step S32 further includes:When confirmation, the object under test is stereoscopic article
After body, further judge whether the steric information of the object under test meets the facial stereo feature of human body.
When judging to learn that the steric information of the object under test does not meet the facial stereo feature of human body, then identification authentication loses
It loses.
Optionally, when the two-dimensional image information for confirming the object under test in sub-step S31 and the two-dimensional image information to prestore
Matching, and when sub-step S32 judgement learns that the steric information of the object under test meets the facial stereo feature of human body, then identity is reflected
It weighs successfully.
Referring to Fig. 4, Fig. 4 is the flow diagram of the third embodiment of the identification authentication method of the application.The third
The identification authentication method of embodiment is roughly the same with the identification authentication method of second embodiment, and the two main distinction is:
The step S3 of the identification authentication method of third embodiment includes:
Sub-step S32:According to the second infrared image that step S2 is obtained, judge whether the object under test is three-dimensional object,
When judge to learn the object under test as three-dimensional object when, S31 is thened follow the steps, otherwise, when judging that learning the object under test not is
When three-dimensional object, then identification authentication fails;
Sub-step S31:According to the first infrared image that step S1 is obtained, compare the two-dimensional image information of the object under test with
Whether the two-dimensional image information to prestore matches, when the two-dimensional image information for confirming the two-dimensional image information of the object under test and prestoring
When mismatch, then identification authentication fails.
Power consumption due to executing sub-step S32 is less than the power consumption for executing sub-step S31, when sub-step S32 is first held
Row, and when judging that it is three-dimensional object to learn the object under test not, terminate identification authentication, it is seen then that such identification authentication method
Power consumption consumption opposite will become smaller.
It should be noted that the specific implementation of the sub-step S32 and sub-step S31 of third embodiment can refer to
The sub-step S32 and sub-step S31 of two embodiments, in order to illustrate the concise of book, details are not described herein again.
In the present embodiment, step S2 is carried out prior to step S1, and sub-step S32 is carried out at the same time with step S1, to save
Save the sensing time.Ground is changed, in other embodiments, step S1 can also be carried out prior to sub-step S32.
In addition, changing ground, step S1 can also be carried out prior to step S2, and step S2 is carried out prior to sub-step S32.
Referring to Fig. 5, Fig. 5 is the flow diagram of the 4th embodiment of the identification authentication method of the application.4th is real
The identification authentication method for applying mode is roughly the same with the identification authentication method of second embodiment, and the main distinction of the two is:
The step S2 of present embodiment is performed when the comparison result that sub-step S31 is obtained is matching, specifically, present embodiment
Step S3 includes:
Sub-step S31:According to the first infrared image that step S1 is obtained, compare the two-dimensional image information of the object under test with
Whether the two-dimensional image information to prestore matches, when the two-dimensional image information for confirming the two-dimensional image information of the object under test and prestoring
When matching, then follow the steps S2, otherwise, when the two-dimensional image information for confirming the object under test and the two-dimensional image information that prestores not
When matching, then identification authentication fails;With
Sub-step S32:According to the second infrared image that step S2 is obtained, judge whether the object under test is three-dimensional object,
When judging that it is three-dimensional object to learn the object under test not, then identification authentication fails.
Optionally, when executing sub-step S32, when the object under test is learnt in judgement when three-dimensional object, then identification authentication is successful.
It should be noted that the specific implementation of the sub-step S31 and sub-step S32 of the 4th embodiment can refer to
The sub-step S31 and sub-step S32 of two embodiments, in order to illustrate the concise of book, details are not described herein again.
Referring to Fig. 6, Fig. 6 is the flow diagram of the 5th embodiment of the identification authentication method of the application.5th
The identification authentication method of embodiment is roughly the same with the identification authentication method of third embodiment, and the main distinction of the two exists
In:The step S1 of present embodiment judges to learn the object under test to be performed when three-dimensional object in sub-step S32, specifically,
The step S3 of present embodiment includes:
Sub-step S32:According to the second infrared image that step S2 is obtained, judge whether the object under test is three-dimensional object,
When judge to learn the object under test as three-dimensional object when, S1 is thened follow the steps, otherwise, when judging that it is vertical to learn the object under test not
When body object, then identification authentication fails;
Sub-step S31:According to the first infrared image that step S1 is obtained, compare the two-dimensional image information of the object under test with
Whether the two-dimensional image information to prestore matches, when the two-dimensional image information for confirming the two-dimensional image information of the object under test and prestoring
When mismatch, then identification authentication fails.
Optionally, when the two-dimensional image information for confirming the object under test in sub-step S31 and the two-dimensional image information to prestore
When matching, then identification authentication success.
It should be noted that the specific implementation of the sub-step S32 and sub-step S31 of the 5th embodiment can refer to
The sub-step S32 and sub-step S31 of two embodiments, in order to illustrate the concise of book, details are not described herein again.
Referring to Fig. 7, Fig. 7 is the structure diagram of an embodiment of the identification authentication device of the application.The identification authentication
Device 1 includes first projector 10, second projector 12, image sensing device 14 and processor 16.Wherein, first projection
Device 10 is for projecting infrared floodlight to an object under test.Second projector 12 is for projecting infrared structure light to the determinand
Body.The image sensing device 14 is for capturing by the reflected infrared floodlight of the object under test, according to the infrared floodlight of capture
Sensing obtains the first infrared image of the object under test, and for capturing by the reflected infrared structure of the object under test
Light, the second infrared image that the object under test is obtained according to the infrared structure light sensing of capture.The processor 16 is used for basis should
First infrared image and the second infrared image confirm whether the identity of the object under test is legal.
When carrying out identification authentication, the identification authentication device 1 is to be measured to this by projecting infrared floodlight and infrared structure light
On object, the different infrared images of the object under test are obtained respectively, to realize sensing and the identification to the object under test.Wherein,
Two dimension (2-Dimension, 2D) image information that the object under test can be obtained according to first infrared image, according to this second
Infrared image can obtain three-dimensional (3-Dimension, 3D) image information of the object under test, the 3D rendering information for example including
Depth information.To which whether the identity for confirming the object under test with 3D rendering information according to the 2D image informations is legal.
As shown in the above, this application provides a kind of novel optical profile type identification authentication devices.
Further, due to the optical characteristics of infrared floodlight and infrared structure light, which may be adapted to farther out
The sensing of distance, and it is very fast to sense response speed.It is, for example, within the scope of 1 meter or even more farther distance that this is relatively remote.
Optionally, the identification authentication device 1 further comprises control circuit 17.The control circuit 17 and first projection
Device 10 and the connection of second projector 12, for controlling first projector 10, second projector 12 and image sensing dress
Set 14 collaborative works.
In the present embodiment, the control circuit 17 is divided for controlling first projector 10 and second projector 12
When work.Specifically, which controls first projector 10 and works prior to second projector 12, or, institute
It states control circuit 17 and controls second projector 12 and work prior to first projector 10.
First projector 10 is such as, but not limited to infrared floodlight.
Second projector 12 projects infrared structure light to the object under test for example, by using optical module.The optics
Component is for example including light source, collimation camera lens and diffractive-optical element (DOE), and wherein light source is for generating an infrared laser beam;
Collimation camera lens calibrates infrared laser beam, forms less parallel light;Diffractive-optical element is to the infrared laser beam after calibration
It is modulated, forms corresponding speckle pattern.The speckle pattern such as, but not limited to includes regular dot matrix, striped formula, net
One or more of format, speckle formula, coding type etc..Wherein, speckle formula is also known as random dot matrix.Coding type pattern is for example
It is made of the light of different wave, a kind of number of each waveforms stands, the combination of each waveform is to encode.In addition, the optics group
Part for example can be also made of other suitable optical elements.
Above-mentioned is using based on pumped FIR laser principle, which projects known infrared structure light pattern and waited for this
It surveys on object.Image sensing device 14 or processor 16 analyze determining be somebody's turn to do according to the infrared structure light pattern of the deformation captured
The depth information of object under test.It is space structure light to define such infrared structure light.
Ground is changed, such as can also be used based on flight time (Time of Flight, ToF) principle, second projection
Device 12 projects infrared structure light to the object under test.Image sensing device 14 or processor 16 are for example by between measurement light pulse
Propagation delay time calculate the depth information of object under test.It is time structure light to define such infrared structure light.
The time structure light is such as, but not limited in the combination of any one or two kinds in sine wave, square wave.
When second projector 12 projection be space structure light when, the image sensing device 14 is for example including an infrared figure
As sensor 141, which captures for timesharing by the reflected infrared floodlight of the object under test and red
External structure light.Due to sharing same infrared image sensor 141, so as to reduce cost.
However, when second projector 12 projection be time structure light when, the image sensing device 14 is for example including two
The structure of infrared image sensor, two infrared image sensor is different, and sensing principle is different, resolution ratio difference etc..Wherein, one
Infrared image sensor is for capturing by the reflected infrared floodlight of the object under test, and another infrared image sensor is for catching
It obtains by the reflected infrared structure light of the object under test.
The object under test is, for example, the face of human body.Correspondingly, the identification authentication device 1 of the application face for identification.
So, the application is not limited thereto, which is for example alternatively other proper sites of human body, even other suitable
Organism or inorganic matter etc..
Existing, industry usually projects the near infrared light that wavelength is 850 nanometers, to obtain the infrared image of object under test.
However, present inventor passes through a large amount of creative work, analysis is found with research:It is 940 nanometers red to project wavelength
Outer floodlight, 940 nanometers of infrared structure light are sensed, and accurate sensing effect can be obtained.
Referring again to Fig. 2, ambient light medium wavelength range is the near infrared light of [920,960] nanometer easily by Atmospheric Absorption, strong
Degree decaying it is larger, when first projector 10 projection wave-length coverage be [920,960] nanometer infrared floodlight to object under test, be somebody's turn to do
When image sensing device 14 obtains the first infrared image of the object under test according to the infrared floodlight of capture, it can lack by ambient light
Interference, to improve the acquisition precision of image.Similarly, when second projector 12 projection wave-length coverage is [920,960]
The infrared structure light of nanometer obtains the object under test to object under test, the image sensing device 14 according to the infrared structure light of capture
The second infrared image when, can be disturbed by ambient light less, to improve the acquisition precision of image.
Further, it is the near infrared light that in the infrared light of [920,960] nanometer, wavelength is 940 nanometers in wave-length coverage
It is more easy to by Atmospheric Absorption, strength retrogression's maximum, therefore, in presently filed embodiment, which projects red
The wavelength of outer floodlight is preferably 940 nanometers, and the wavelength of the infrared structure light of second projector 12 projection is preferably 940 nanometers.
However, in practical applications, the wavelength and second projector of the red general outer light which is projected
The wavelength of the 12 infrared structure light projected has certain deviation on the basis of 940 nanometers, for example, have (+15) nanometer or
The deviation of (- 15) ran.Therefore, the wave-length coverage for the infrared floodlight which is projected be, for example, [925,
955] wave-length coverage of nanometer, the infrared structure light which is projected is, for example, [925,955] nanometer.As it can be seen that
The wave-length coverage [925,955] is still fallen in wave-length coverage [920,960].
It should be noted that the wavelength for the infrared floodlight that first projector 10 is projected and second projector 12 are thrown
The wavelength for the infrared structure light penetrated is any one numerical value fallen in above-mentioned wave-length coverage [920,960] nanometer.The application in order to
Narration is succinct clear, does not enumerate each concrete numerical value here, but falls appointing in this wave-length coverage [920,960] nanometer
A numerical value of anticipating all is feasible.
Certainly, change ground, first projector 10 and second projector 12 can also project respectively wavelength be 850 nanometers or
Infrared floodlight, the infrared structure light of the other suitable wavelengths of person.
What it is due to the projection of first projector 10 is infrared floodlight, and the projection of second projector 12 is infrared structure light, in order to
Avoid the first infrared image and the second infrared image generation aliasing that the sensing of image sensing device 14 obtains, therefore, the control
Circuit 17 controls first projector, 10 and second projector, 12 time-sharing work.
In some embodiments, the identification authentication device 1 further comprises memory 18.The memory 18 is for pre-
Deposit the two-dimensional image information of one or more sample objects.The two-dimensional image information of the sample object is, for example, that user registers in advance
Successful face template information.
For example, when carrying out identification authentication, which controls first projector 10 prior to second projector 12
Work.Correspondingly, described image sensing device 14 first senses first infrared image.The processor 16 is red according to described first
Outer image compares whether the two-dimensional image information of the object under test matches with the two-dimensional image information to prestore, when confirming that this is to be measured
When the two-dimensional image information of object is matched with the two-dimensional image information to prestore, the processor 16 is infrared then according to described second
Image judges whether the object under test is three-dimensional object, otherwise, when confirming the two-dimensional image information of the object under test and prestore
Two-dimensional image information mismatch when, then identification authentication fail.
When it is three-dimensional object that the processor 16 judgement, which learns the object under test not, then identification authentication fails.
As shown in the above, which passes through the two-dimensional image information for comparing the object under test and the two dimension to prestore
Whether image information matches, obstructed out-of-date when identifying for the first time to carry out first time identification to the object under test, then identification authentication
Failure, flow terminate.
It is illustrated by taking recognition of face as an example, before carrying out face recognition, user has registered the face of he or she in advance
Portion's image template, and be stored in the memory 18.Wherein, which includes two-dimensional image information.When execution face
When portion identifies, the first time identification to the object under test is exactly:Compare the object under test two-dimensional image information whether with noted
The two-dimensional image information matching of volume user face, if it is determined that learning two-dimensional image information and user face of the object under test
Two-dimensional image information mismatch, then identification authentication fail.
If it is confirmed that the two-dimensional image information of the object under test is matched with the two-dimensional image information of the user face, then also not
It can determine that the identity of the object under test is legal, reason is:Because being the judgement and identification to two-dimensional image information, if using should
The photo of user can equally identify success.
Next, the processor 16 by according to the second infrared image judge the object under test whether three-dimensional object, to keep away
Exempt from above-mentioned the case where being identified by using photo etc..
In some specific embodiments, which for example can obtain depth letter according to second infrared image
Breath, to judge whether the object under test is three-dimensional object according to depth information.
If the processor 16 judges that it is three-dimensional object to learn the object under test not, identification authentication failure, flow knot
Beam.In this case, it is possible to be that other people carry out identification using the photo of validated user or video etc..
Optionally, when the processor 16 judgement learns that the object under test is three-dimensional object, then confirm the object under test
Identity is legal, identification authentication success.
When carrying out second of identification to the object under test, since the processor 16 only judges that the object under test is
Three-dimensional object carries out a large amount of analysis without the stereo image information to the object under test and calculates, so as to drop
Low-power consumption reduces the sensing time and reduces cost.
Specifically, for example, when the processor 16 confirms two-dimensional image information and the registered users face of the object under test
Two-dimensional image information matching factor be greater than or equal to a predetermined threshold when, then can confirm the object under test two dimensional image letter
Breath is matched with the two-dimensional image information of registered users face.Relatively, if it is confirmed that when matching factor is less than the predetermined threshold,
The two-dimensional image information that can then confirm the object under test and the two-dimensional image information of registered users face mismatch.
In the above-described embodiment, which controls first projector 10 and works prior to second projector 12.
Optionally, the processor 16 is in the two-dimensional image information for comparing the two-dimensional image information of the object under test and prestoring
While whether matching:The control circuit 17 controls second projector 12 and projects infrared structure light to the object under test,
Described image sensing device 14 senses the second infrared image of the object under test.It so, it is possible further to reduce the sensing time,
Promote working efficiency.
Or, ground is changed, when the processor 16 is in the two dimension for comparing the two-dimensional image information of the object under test and prestoring
Before whether image information matches:The control of the control circuit 17 controls first projector 10 and closes, the second projection of control
Device 12 is opened, and described image sensing device 14 senses the second infrared image of the object under test.That is, the processor 16 is in the image
Sensing device 14 successively obtains first infrared image and second infrared image and then starts to execute to two-dimensional image information
It is compared.
In addition, change ground, in other embodiments, the control circuit 17 also can control second projector 12 prior to
First projector 10 works, and successively sense in the image sensing device 14 that obtain second infrared image first infrared with this
After image, which starts to execute the comparison work of two-dimensional image information again.
Ground is changed again, in some embodiments, when the processor 16 confirms the two-dimensional image information of the object under test
When being matched with the two-dimensional image information to prestore, which starts to control second projector 12 unlatching, the image sensing
Device 14 obtains the second infrared image of the object under test.The processor 16 judges the determinand further according to second infrared image
Whether body is three-dimensional object.
In the above-described embodiment, by taking face recognition as an example, the two-dimensional image information to prestore includes object face
Two-dimensional image information.
Correspondingly, about the comparison of two-dimensional image information, for example, the processor 16 can be by comparing the object under test
The plane picture of plane picture and the object face to prestore is realized.
However, present applicant proposes another realization methods compared for two-dimensional image information.The two dimension to prestore
Image information includes face feature information.The processor 16 further comprises that carrying out face feature information to the object under test carries
It takes, by comparing the face feature information extracted and the face feature information to prestore, to confirm the X-Y scheme of the object under test
As whether information matches with the two-dimensional image information to prestore.To relative to comparing for picture in its entirety, by comparing feature
Mode can be further reduced calculation amount, improve sensing efficiency.
In one example, the processor 16 extracts the face feature information of the object under test by deep learning method.
The deep learning method includes:Depth convolutional neural networks model is established, the depth is trained using the human face photo of predetermined quantity
Convolutional neural networks model, according to the characteristic parameter of the trained depth convolutional neural networks model extraction face.
Change ground, in other embodiments, the processor 16 also can extract nose, eyes, face, eyebrow, forehead,
The facial characteristics such as width of cheekbone, chin, face, the width of nose, chin, or/and, nose, eyes, face, eyebrow, volume
The range information arbitrarily combined in head, cheekbone, chin etc..For example, the distance between nose and eyes information.Certainly, the face
Portion's characteristic information is not limited to example listed above or other suitable characteristic informations.
The application is not limited to the alignments of above involved two-dimensional image information or other suitably compares other side
Formula.
Further, which is additionally operable to carry out second infrared image extraction of stereoscopic features information, and root
Judge whether the object under test is three-dimensional object according to the stereoscopic features information extracted.
In one example, which extracts the stereoscopic face feature letter of the object under test by deep learning method
Breath.The deep learning method includes:Depth convolutional neural networks model is established, the depth is trained using the human face photo of predetermined quantity
Convolutional neural networks model is spent, according to the characteristic parameter of the trained depth convolutional neural networks model extraction face.
Change ground, in other embodiments, the processor 16 also can extract nose, eyes, face, eyebrow, forehead,
Any one or a few three-dimensional size information in the facial characteristics such as cheekbone, chin, face.The three-dimensional size information is
Depth information.Certainly, the stereoscopic features information is not limited to example listed above or other suitable features
Information.
So, the application is not limited to the judgment mode of above-mentioned three-dimensional object, for example, ground is changed, in other embodiment
In, stereo image information can also be constructed, and be compared with the stereo image information to prestore according to the second infrared image,
To judge that the object under test is three-dimensional object.
As shown in the above, the identification authentication device 1 of the above embodiment can save sensing the time, save power consumption,
And cost can be reduced.
So, ground is changed, in some embodiments, which is additionally operable to:When confirmation, the object under test is three-dimensional
After object, further judge whether the steric information of the object under test meets the facial stereo feature of human body.
When the processor 16 judgement learns that the steric information of the object under test does not meet the facial stereo feature of human body, then
Identification authentication fails.
Optionally, when the two-dimensional image information that the processor 16 confirms the two-dimensional image information of the object under test and prestores
When matching, and judging to learn that the steric information of the object under test meets the facial stereo feature of human body, then identification authentication success.
In some other embodiments, when carrying out identification authentication, which controls second projector
12 work prior to first projector 10, which is used to whether judge the object under test according to second infrared image
For three-dimensional object, when judge to learn the object under test as three-dimensional object when, the processor 16 is then according to the first infrared image
Whether the two-dimensional image information to compare the object under test matches with the two-dimensional image information to prestore.
When the two-dimensional image information that the processor 16 confirms the two-dimensional image information of the object under test and prestores mismatches
When, then identification authentication fails.
Since whether the processor 16 execution is that the power consumption consumed needed for the judgement of three-dimensional object wants small to the object under test
Therefore it is to the object under test when the processor 16 is first carried out in executing the power consumption for comparing required consumption to two-dimensional image information
The no judgement for three-dimensional object, and when judging that it is three-dimensional object to learn the object under test not, terminate identification authentication, correspondingly,
The power consumption consumption of the identification authentication device 1 opposite will become smaller.
Optionally, when the two-dimensional image information that the processor 16 confirms the two-dimensional image information of the object under test and prestores
When matching, then identification authentication success.
Optionally, whether the processor 16 is while it is three-dimensional object to judge the object under test:The control circuit
17, which control first projector 10, projects infrared floodlight to the object under test, and described image sensing device 14 senses the determinand
First infrared image of body.In this way, saving the sensing time.
Or, when the processor 16 is before judging whether the object under test is three-dimensional object:The control circuit 17 is controlled
System controls second projector 12 and closes, and first projector 10 of control is opened, and described image sensing device 14 is successively sensed and obtained
Obtain the second infrared image and the first infrared image of the object under test.
In addition, changing ground, the control circuit 17 also can first control first projector 10 prior to second projector
12 work, after the image sensing device 14 successively obtains first infrared image and the second infrared image, the processor 16
Start to execute again to the object under test whether be three-dimensional object judgement.
Ground is changed again, in some embodiments, when the processor 16 judges to learn the object under test as three-dimensional object
When, which controls first projector 10 and opens, and correspondingly, which senses the object under test
The first infrared image.Then, which compares the two dimension of the object under test further according to first infrared image of acquisition
Whether image information matches with the two-dimensional image information to prestore.
Optionally, which further comprises high-speed data transfer link 19, for image sensing device
It indicates that the signal of the signal and expression of first infrared image second infrared image is transmitted in the processor 16 in 14 to carry out
Processing.The high-speed data transfer link 19 is, for example, Mobile Industry Processor Interface (Mobile Industry Processor
Interface, MIPI).
The identification authentication device 1 can be used for running the identification authentication method of above-mentioned the application.
Referring to Fig. 8, Fig. 8 is the structural schematic diagram of an embodiment of the electronic equipment of the application.The electronic equipment
100 be such as, but not limited to consumer electrical product, household formula electronic product, vehicular electronic product, financial terminal product
Etc. suitable types electronic product.Wherein, consumer electrical product for example but be not limited to mobile phone, tablet computer, notebook electricity
Brain, tabletop display, computer all-in-one machine etc..Household formula electronic product for example but is not limited to intelligent door lock, TV, refrigerator, wears
Wear formula equipment etc..Vehicular electronic product such as but being not limited to automatic navigator, vehicle-carrying DVD.Financial terminal product is for example
But it is not limited to ATM machine, the terminal etc. of self-service transacting business.The electronic equipment 100 includes above-mentioned identification authentication device 1.Institute
State whether electronic equipment 100 executes corresponding function according to the identification authentication result of the identification authentication device 1 to correspond to.It is described
Corresponding function is such as, but not limited to include unlocking, paying, starting any one or a few in preset application program.
In the present embodiment, it is illustrated so that electronic equipment is mobile phone as an example.The mobile phone that the mobile phone for example, shields comprehensively,
The identity recognition device 1 is for example arranged on the positive top of mobile phone.Certainly, which is also not restricted to comprehensive screen mobile phone.
For example, when user needs to boot up unlock, the screen for lifting mobile phone or touch mobile phone can act as wake-up
The effect of the identification authentication device 1.After the identification authentication device 1 is waken up, identify that the user in front of the mobile phone is legal
User when, then solve lock screen.
As it can be seen that since the electronic equipment 100 applies the identification authentication device 1, which can realize to be measured
The longer-distance sensing of object, and it is very fast to sense response speed.
In the description of this specification, reference term " embodiment ", " certain embodiments ", " schematically implementation
What the description of mode ", " example ", " specific example " or " some examples " etc. meant to describe in conjunction with the embodiment or example
Particular features, structures, materials, or characteristics are contained at least one embodiment or example of the application.In the present specification,
Schematic expression of the above terms are not necessarily referring to identical embodiment or example.Moreover, the specific features of description, knot
Structure, material or feature can be combined in any suitable manner in any one or more embodiments or example.
Although presently filed embodiment has been shown and described above, it is to be understood that the above embodiment is
Illustratively, it should not be understood as the limitation to the application, those skilled in the art within the scope of application can be right
The above embodiment is changed, changes, replacing and modification.
Claims (80)
1. a kind of identification authentication method, including:
Step S1:It projects on infrared floodlight a to object under test, senses the first infrared image of the object under test;
Step S2:It projects on infrared structure light to the object under test, senses the second infrared image of the object under test;
Step S3:According to first infrared image and second infrared image, confirm whether the identity of the object under test is legal.
2. identification authentication method as described in claim 1, it is characterised in that:Step S1 is carried out with step S2 timesharing.
3. identification authentication method as claimed in claim 2, it is characterised in that:Step S1 is carried out prior to step S2;Or, step S2
It is carried out prior to step S1.
4. identification authentication method as claimed in claim 3, it is characterised in that:It is described when step S1 is carried out prior to step S2
Step S3 includes:
Sub-step S31:According to the first infrared image that step S1 is obtained, compares the two-dimensional image information of the object under test and prestore
Two-dimensional image information whether match, when confirm the object under test two-dimensional image information matched with the two-dimensional image information to prestore
When, then execute sub-step S32, otherwise, when the two-dimensional image information for confirming the object under test and the two-dimensional image information that prestores not
When matching, then identification authentication fails;
Sub-step S32:According to the second infrared image that step S2 is obtained, judge whether the object under test is three-dimensional object.
5. identification authentication method as claimed in claim 4, it is characterised in that:When the object under test is learnt in sub-step S32 judgements
When not being three-dimensional object, then identification authentication fails.
6. identification authentication method as claimed in claim 5, it is characterised in that:When the object under test is learnt in sub-step S32 judgements
For three-dimensional object when, then identification authentication success.
7. identification authentication method as claimed in claim 4, it is characterised in that:The sub-step S31 and step S2 is carried out at the same time,
Or, step S2 is carried out prior to sub-step S31.
8. identification authentication method as claimed in claim 3, it is characterised in that:It is described when step S2 is carried out prior to step S1
Step S3 includes:
Sub-step S32:According to the second infrared image that step S2 is obtained, judge whether the object under test is three-dimensional object, when sentencing
It is disconnected to then follow the steps S31 when learning that the object under test is three-dimensional object, otherwise, when judging to learn the object under test to be not three-dimensional
When object, then identification authentication fails;
Sub-step S31:According to the first infrared image that step S1 is obtained, compares the two-dimensional image information of the object under test and prestore
Two-dimensional image information whether match.
9. identification authentication method as claimed in claim 8, it is characterised in that:When sub-step S31 confirms the two of the object under test
When dimension image information and the two-dimensional image information to prestore mismatch, then identification authentication fails.
10. identification authentication method as claimed in claim 9, it is characterised in that:When sub-step S31 confirms the two of the object under test
When dimension image information is matched with the two-dimensional image information to prestore, then identification authentication success.
11. identification authentication method as claimed in claim 8, it is characterised in that:The sub-step S32 and step S1 simultaneously into
Row or step S1 are carried out prior to sub-step S32.
12. identification authentication method as claimed in claim 3, it is characterised in that:It is described when step S1 is carried out prior to step S2
Step S3 includes:
Sub-step S31:According to the first infrared image that step S1 is obtained, compares the two-dimensional image information of the object under test and prestore
Two-dimensional image information whether match, when confirm the object under test two-dimensional image information matched with the two-dimensional image information to prestore
When, S2 is thened follow the steps, otherwise, when the two-dimensional image information for confirming the two-dimensional image information of the object under test and prestoring mismatches
When, then identification authentication fails;With
Sub-step S32:According to the second infrared image that step S2 is obtained, judge whether the object under test is three-dimensional object.
13. identification authentication method as claimed in claim 12, it is characterised in that:When the determinand is learnt in sub-step S32 judgements
When body is not three-dimensional object, then identification authentication fails.
14. identification authentication method as claimed in claim 13, it is characterised in that:When the determinand is learnt in sub-step S32 judgements
When body is three-dimensional object, then identification authentication success.
15. identification authentication method as claimed in claim 3, it is characterised in that:It is described when step S1 is carried out prior to step S2
Step S3 includes:
Sub-step S32:According to the second infrared image that step S2 is obtained, judge whether the object under test is three-dimensional object, when sentencing
It is disconnected then to execute sub-step S31 when learning that the object under test is three-dimensional object, otherwise, when judging that it is vertical to learn the object under test not
When body object, then identification authentication fails;With
Sub-step S31:According to the first infrared image that step S1 is obtained, compares the two-dimensional image information of the object under test and prestore
Two-dimensional image information whether match.
16. identification authentication method as claimed in claim 15, it is characterised in that:When the determinand is learnt in sub-step S31 comparisons
When the two-dimensional image information of body and the two-dimensional image information to prestore mismatch, then identification authentication fails.
17. identification authentication method as claimed in claim 16, it is characterised in that:When the determinand is learnt in sub-step S31 comparisons
When the two-dimensional image information of body is matched with the two-dimensional image information to prestore, then identification authentication success.
18. identification authentication method as claimed in claim 3, it is characterised in that:It is described when step S2 is carried out prior to step S1
Step S3 includes:
Sub-step S32:According to the second infrared image that step S2 is obtained, judge whether the object under test is three-dimensional object, when sentencing
It is disconnected to then follow the steps S1 when learning that the object under test is three-dimensional object, otherwise, when judging that it is stereoscopic article to learn the object under test not
When body, then identification authentication fails;
Sub-step S31:According to the first infrared image that step S1 is obtained, compares the two-dimensional image information of the object under test and prestore
Two-dimensional image information whether match.
19. identification authentication method as claimed in claim 18, it is characterised in that:When sub-step S31 confirms the object under test
When two-dimensional image information and the two-dimensional image information to prestore mismatch, then identification authentication fails.
20. identification authentication method as claimed in claim 19, it is characterised in that:When sub-step S31 confirms the object under test
When two-dimensional image information is matched with the two-dimensional image information to prestore, then identification authentication success.
21. identification authentication method as claimed in claim 3, it is characterised in that:It is described when step S2 is carried out prior to step S1
Step S3 includes:
Sub-step S31:According to the first infrared image that step S1 is obtained, compares the two-dimensional image information of the object under test and prestore
Two-dimensional image information whether match, when confirm the object under test two-dimensional image information matched with the two-dimensional image information to prestore
When, then execute sub-step S32, otherwise, when the two-dimensional image information for confirming the object under test and the two-dimensional image information that prestores not
When matching, then identification authentication fails;
Sub-step S32:According to the second infrared image that step S2 is obtained, judge whether the object under test is three-dimensional object.
22. identification authentication method as claimed in claim 21, it is characterised in that:When the determinand is learnt in sub-step S32 judgements
When body is not three-dimensional object, then identification authentication fails.
23. identification authentication method as claimed in claim 22, it is characterised in that:When the determinand is learnt in sub-step S32 judgements
When body is three-dimensional object, then identification authentication success.
24. the identification authentication method as described in any one of claim 4-23, it is characterised in that:The X-Y scheme to prestore
As information includes the two-dimensional image information in object plane portion.
25. identification authentication method as claimed in claim 24, it is characterised in that:The two-dimensional image information of the object face is
The two-dimensional image information of human body face.
26. identification authentication method as claimed in claim 25, it is characterised in that:In sub-step S32, obtained according to step S2
The second infrared image, judge whether the object under test is three-dimensional object.
27. identification authentication method as claimed in claim 26, it is characterised in that:When confirming the object under test in sub-step S31
Two-dimensional image information matched with the two-dimensional image information of the human body face to prestore, and in sub-step S32 judge learn that this is to be measured
When object is three-dimensional object, then confirm that the identity of the object under test is legal, identification authentication success.
28. identification authentication method as claimed in claim 25, it is characterised in that:The two-dimensional image information to prestore includes face
Portion's characteristic information, the sub-step S31 further comprise that measuring targets carry out face feature information extraction, are extracted by comparing
To face feature information and the face feature information that prestores, come confirm the two-dimensional image information of the object under test and prestore two
Whether dimension image information matches.
29. identification authentication method as claimed in claim 28, it is characterised in that:In sub-step S31, by deep learning side
Method extracts the face feature information of the object under test.
30. identification authentication method as claimed in claim 29, it is characterised in that:The deep learning method includes:Establish depth
Convolutional neural networks model trains the depth convolutional neural networks model using the human face photo of predetermined quantity, according to training
The depth convolutional neural networks model extraction face characteristic parameter.
31. identification authentication method as claimed in claim 28, it is characterised in that:The face feature information includes nose, eye
Eyeball, face, eyebrow, forehead, cheekbone, chin, face, the width of nose, chin width in any one or a few, or/
With the range information that nose, eyes, face, eyebrow, forehead, cheekbone, lower Palestine and China arbitrarily combine.
32. identification authentication method as claimed in claim 28, it is characterised in that:The sub-step S32 further comprises:To this
Second infrared image carries out the extraction of stereoscopic features information, and the determinand is judged according to the stereoscopic features information extracted
Whether body is three-dimensional object.
33. identification authentication method as claimed in claim 32, it is characterised in that:In sub-step S32, by deep learning side
Method extracts the stereoscopic face characteristic information of the object under test.
34. identification authentication method as claimed in claim 33, it is characterised in that:The deep learning method includes:Establish depth
Convolutional neural networks model trains the depth convolutional neural networks model using the human face photo of predetermined quantity, according to training
The depth convolutional neural networks model extraction face characteristic parameter.
35. identification authentication method as claimed in claim 32, it is characterised in that:The stereoscopic features information includes nose, eye
Any one or a few three-dimensional size information in eyeball, face, eyebrow, forehead, cheekbone, chin, face.
36. identification authentication method as described in claim 1, it is characterised in that:The wave-length coverage of the infrared floodlight be [920,
960] nanometer, and/or, the wave-length coverage of the infrared structure light is [920,960] nanometer.
37. identification authentication method as described in claim 1, it is characterised in that:The wavelength of the infrared floodlight be 940 nanometers,
Or/and the wavelength of the infrared structure light is 940 nanometers.
38. a kind of identification authentication device, including:
First projector, for projecting infrared floodlight to an object under test;
Second projector, for projecting infrared structure light to the object under test;
Image sensing device, for capturing by the reflected infrared floodlight of the object under test, sensing the first of the object under test
Infrared image, and for capturing by the reflected infrared structure light of the object under test, sensing the second red of the object under test
Outer image;
Processor, for according to first infrared image and the second infrared image, confirming whether the identity of the object under test closes
Method.
39. identification authentication device as claimed in claim 38, it is characterised in that:The identification authentication device further comprises controlling
Circuit processed, the control circuit is for controlling first projector and second projector time-sharing work.
40. identification authentication device as claimed in claim 39, it is characterised in that:When carrying out identification authentication, the control electricity
Road works for controlling first projector prior to second projector;Or, the control circuit is for controlling described the
Two projectors work prior to first projector.
41. identification authentication device as claimed in claim 40, it is characterised in that:When carrying out identification authentication, the control electricity
Road controls first projector and works prior to second projector, and the processor is used for according to first infrared image
Whether the two-dimensional image information to compare the object under test match with the two-dimensional image information to prestore, when confirming the object under test
When two-dimensional image information is matched with the two-dimensional image information to prestore, the processor is sentenced then according to second infrared image
Whether the disconnected object under test is three-dimensional object, otherwise, when the X-Y scheme for confirming the two-dimensional image information of the object under test and prestoring
When being mismatched as information, then identification authentication fails.
42. identification authentication device as claimed in claim 41, it is characterised in that:When the object under test is learnt in processor judgement
When not being three-dimensional object, then identification authentication fails.
43. identification authentication device as claimed in claim 42, it is characterised in that:When the object under test is learnt in processor judgement
For three-dimensional object when, then identification authentication success.
44. identification authentication device as claimed in claim 41, it is characterised in that:The processor is infrared according to described first
While whether image matches to compare the two-dimensional image information of the object under test with the two-dimensional image information to prestore:The control
Second projector described in circuit control projects infrared structure light to the object under test, the described image sensing device senses determinand
Second infrared image of body;Or, when the processor is in the X-Y scheme for comparing the two-dimensional image information of the object under test and prestoring
Before whether being matched as information:The control circuit control controls first projector and closes, and second projector of control is opened,
Second infrared image of the described image sensing device senses object under test.
45. identification authentication device as claimed in claim 40, it is characterised in that:When carrying out identification authentication, the control electricity
Road controls second projector and works prior to first projector, and the processor is used for according to second infrared image
Judge whether the object under test is three-dimensional object, when judge to learn the object under test as three-dimensional object when, the processor connects
It and whether the two-dimensional image information of the object under test and the two-dimensional image information to prestore is compared according to first infrared image
Matching.
46. identification authentication device as claimed in claim 45, it is characterised in that:When the processor confirms the object under test
When two-dimensional image information and the two-dimensional image information to prestore mismatch, then identification authentication fails.
47. identification authentication device as claimed in claim 26, it is characterised in that:When the processor confirms the object under test
When two-dimensional image information is matched with the two-dimensional image information to prestore, then identification authentication success.
48. identification authentication device as claimed in claim 45, it is characterised in that:The processor is infrared according to described second
Image is come while judging whether the object under test is three-dimensional object:It is red that the control circuit controls first projector projection
Outer floodlight is to the object under test, the first infrared image of the described image sensing device senses object under test;Or, working as the processing
Device is before judging whether the object under test is three-dimensional object:The control circuit controls second projector and closes, control
First projector is opened, the first infrared image of the described image sensing device senses object under test.
49. identification authentication device as claimed in claim 40, it is characterised in that:When carrying out identification authentication, the control electricity
Road controls first projector and works prior to second projector, and the processor is used for according to first infrared image
Whether the two-dimensional image information to compare the object under test match with the two-dimensional image information to prestore, when confirming the object under test
When two-dimensional image information and the two-dimensional image information that prestores mismatch, then identification authentication fails, when confirming the two of the object under test
When dimension image information is matched with the two-dimensional image information to prestore, the control circuit then controls the closing of first projector, control
Second projector is opened, the second infrared image of the described image sensing device senses object under test;The processor then root
Judge whether the object under test is three-dimensional object according to second infrared image.
50. identification authentication device as claimed in claim 49, it is characterised in that:When the determinand is learnt in processor judgement
When body is not three-dimensional object, then identification authentication fails.
51. identification authentication device as claimed in claim 50, it is characterised in that:When the determinand is learnt in processor judgement
When body is three-dimensional object, then identification authentication success.
52. identification authentication device as claimed in claim 40, it is characterised in that:When carrying out identification authentication, the control electricity
Road controls first projector and works prior to second projector, and is obtaining the first infrared image and second infrared respectively
After image, the processor is used to according to second infrared image judge whether the object under test is three-dimensional object, when sentencing
Disconnected then identification authentication fails when to learn the object under test not be three-dimensional object, when judging to learn that the object under test is three-dimensional object
When, then further according to first infrared image, compare the two-dimensional image information of the object under test is with the two-dimensional image information to prestore
No matching.
53. identification authentication device as claimed in claim 52, it is characterised in that:When the processor confirms the two of the object under test
When dimension image information and the two-dimensional image information to prestore mismatch, then identification authentication fails.
54. identification authentication device as claimed in claim 53, it is characterised in that:When the processor confirms the two of the object under test
When dimension image information is matched with the two-dimensional image information to prestore, then identification authentication success.
55. identification authentication device as claimed in claim 40, it is characterised in that:When carrying out identification authentication, the control electricity
Road controls second projector and works prior to first projector, and the processor is used for according to second infrared image
Judge whether the object under test is three-dimensional object, when judging that it is three-dimensional object to learn the object under test not, then identification authentication
Failure, when it is three-dimensional object to judge to learn the object under test, the control circuit then controls second projector and closes, and controls
First projector is opened, the first infrared image of the described image sensing device senses object under test;The processor then root
Compare whether the two-dimensional image information of the object under test matches with the two-dimensional image information to prestore according to first infrared image.
56. identification authentication device as claimed in claim 55, it is characterised in that:When the processor confirms the object under test
When two-dimensional image information and the two-dimensional image information to prestore mismatch, then identification authentication fails.
57. identification authentication device as claimed in claim 56, it is characterised in that:When the processor confirms the object under test
When two-dimensional image information is matched with the two-dimensional image information to prestore, then identification authentication success.
58. identification authentication device as claimed in claim 40, it is characterised in that:When carrying out identification authentication, the control electricity
Road controls second projector and works prior to first projector, and is obtaining the second infrared image and first infrared respectively
After image, the processor be used to be compared according to the first infrared image of acquisition the two-dimensional image information of the object under test with it is pre-
Whether the two-dimensional image information deposited matches, if it is confirmed that the two-dimensional image information of the object under test and the two-dimensional image information to prestore
It mismatches, then identification authentication fails, if it is confirmed that the two-dimensional image information of the object under test and the two-dimensional image information to prestore
Match, then further according to the second infrared image of acquisition, judges whether the object under test is three-dimensional object.
59. identification authentication device as claimed in claim 58, it is characterised in that:When the object under test is learnt in processor judgement
When not being three-dimensional object, then identification authentication fails.
60. identification authentication device as claimed in claim 59, it is characterised in that:When the object under test is learnt in processor judgement
When being three-dimensional object, then identification authentication success.
61. the identification authentication device as described in any one of claim 41-60, it is characterised in that:The two dimension to prestore
Image information includes the two-dimensional image information of object face.
62. identification authentication device as claimed in claim 61, it is characterised in that:The two-dimensional image information to prestore is human body
The two-dimensional image information of face.
63. identification authentication device as claimed in claim 62, it is characterised in that:The processor is sentenced according to second infrared image
Whether the disconnected object under test is three-dimensional object.
64. the identification authentication device as described in claim 63, it is characterised in that:When the processor confirms the two of the object under test
Dimension image information is matched with the two-dimensional image information of the human body face to prestore, and judges to learn the object under test as three-dimensional object
When, then confirm that the identity of the object under test is legal, identification authentication success.
65. identification authentication device as claimed in claim 62, it is characterised in that:The two-dimensional image information to prestore includes face
Portion's characteristic information, the face feature information that the processor is further used for measuring targets extract, and are extracted by comparing
To face feature information and the face feature information that prestores, come confirm the two-dimensional image information of the object under test and prestore two
Whether dimension image information matches.
66. the identification authentication device as described in claim 65, it is characterised in that:The processor is extracted by deep learning method
The face feature information of the object under test.
67. the identification authentication device as described in claim 66, it is characterised in that:The deep learning method includes:Establish depth
Convolutional neural networks model trains the depth convolutional neural networks model using the human face photo of predetermined quantity, according to training
The depth convolutional neural networks model extraction face characteristic parameter.
68. the identification authentication device as described in claim 65, it is characterised in that:The face feature information includes nose, eye
Eyeball, face, eyebrow, forehead, cheekbone, chin, face, the width of nose, chin width in any one or a few, or/
With the range information that nose, eyes, face, eyebrow, forehead, cheekbone, lower Palestine and China arbitrarily combine.
69. the identification authentication device as described in claim 65, it is characterised in that:The processor be further used for this second
Infrared image carries out the extraction of stereoscopic features information, and judges that the object under test is according to the stereoscopic features information extracted
No is three-dimensional object.
70. the identification authentication device as described in claim 69, it is characterised in that:The processor is extracted by deep learning method
The stereoscopic face characteristic information of the object under test.
71. the identification authentication device as described in claim 70, it is characterised in that:The deep learning method includes:Establish depth
Convolutional neural networks model trains the depth convolutional neural networks model using the human face photo of predetermined quantity, according to training
The depth convolutional neural networks model extraction face characteristic parameter.
72. the identification authentication device as described in claim 69, it is characterised in that:The stereoscopic features information includes nose, eye
Any one or a few three-dimensional size information in eyeball, face, eyebrow, forehead, cheekbone, chin, face.
73. identification authentication device as claimed in claim 38, it is characterised in that:The wave-length coverage of the infrared floodlight is
[920,960] nanometer, and/or, the wave-length coverage of the infrared structure light is [920,960] nanometer.
74. identification authentication device as claimed in claim 38, it is characterised in that:The wavelength of the infrared floodlight be 940 nanometers,
Or/and the wavelength of the infrared structure light is 940 nanometers.
75. identification authentication device as claimed in claim 39, it is characterised in that:When carrying out identification authentication, the control electricity
Road cooperates for controlling first projector, second projector and the image sensing device.
76. identification authentication device as claimed in claim 38, it is characterised in that:The identification authentication device further comprises high speed
Data transfer links, for the signal and expression second infrared image for indicating first infrared image in image sensing device
Signal be transmitted in the processor and handled.
77. the identification authentication device described in any one of a kind of electronic equipment, including claim 38-76.
78. the electronic equipment as described in claim 77, it is characterised in that:The electronic equipment is used for according to the identification authentication
Whether the identification authentication result of device executes corresponding function to correspond to.
79. the electronic equipment as described in claim 78, it is characterised in that:Corresponding function includes unlock, payment, starts
Any one or a few in preset application program.
80. the electronic equipment as described in claim 77, it is characterised in that:The electronic equipment include consumer electrical product,
Any one or a few in household formula electronic product, vehicular electronic product, financial terminal product.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2018/083614 WO2019200571A1 (en) | 2018-04-18 | 2018-04-18 | Identity authentication method, identity authentication device, and electronic apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108521821A true CN108521821A (en) | 2018-09-11 |
Family
ID=63428700
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201880000325.6A Pending CN108521821A (en) | 2018-04-18 | 2018-04-18 | Identification authentication method, identification authentication device and electronic equipment |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN108521821A (en) |
WO (1) | WO2019200571A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109635539A (en) * | 2018-10-30 | 2019-04-16 | 华为技术有限公司 | A kind of face identification method and electronic equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017113286A1 (en) * | 2015-12-31 | 2017-07-06 | 深圳先进技术研究院 | Authentication method and apparatus |
CN106991377A (en) * | 2017-03-09 | 2017-07-28 | 广东欧珀移动通信有限公司 | With reference to the face identification method, face identification device and electronic installation of depth information |
CN107105217A (en) * | 2017-04-17 | 2017-08-29 | 深圳奥比中光科技有限公司 | Multi-mode depth calculation processor and 3D rendering equipment |
CN107277053A (en) * | 2017-07-31 | 2017-10-20 | 广东欧珀移动通信有限公司 | Auth method, device and mobile terminal |
CN107609383A (en) * | 2017-10-26 | 2018-01-19 | 深圳奥比中光科技有限公司 | 3D face identity authentications and device |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9076048B2 (en) * | 2012-03-06 | 2015-07-07 | Gary David Shubinsky | Biometric identification, authentication and verification using near-infrared structured illumination combined with 3D imaging of the human ear |
CN105574518B (en) * | 2016-01-25 | 2020-02-21 | 北京眼神智能科技有限公司 | Method and device for detecting living human face |
-
2018
- 2018-04-18 WO PCT/CN2018/083614 patent/WO2019200571A1/en active Application Filing
- 2018-04-18 CN CN201880000325.6A patent/CN108521821A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017113286A1 (en) * | 2015-12-31 | 2017-07-06 | 深圳先进技术研究院 | Authentication method and apparatus |
CN106991377A (en) * | 2017-03-09 | 2017-07-28 | 广东欧珀移动通信有限公司 | With reference to the face identification method, face identification device and electronic installation of depth information |
CN107105217A (en) * | 2017-04-17 | 2017-08-29 | 深圳奥比中光科技有限公司 | Multi-mode depth calculation processor and 3D rendering equipment |
CN107277053A (en) * | 2017-07-31 | 2017-10-20 | 广东欧珀移动通信有限公司 | Auth method, device and mobile terminal |
CN107609383A (en) * | 2017-10-26 | 2018-01-19 | 深圳奥比中光科技有限公司 | 3D face identity authentications and device |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109635539A (en) * | 2018-10-30 | 2019-04-16 | 华为技术有限公司 | A kind of face identification method and electronic equipment |
WO2020088296A1 (en) * | 2018-10-30 | 2020-05-07 | 华为技术有限公司 | Face recognition method and electronic device |
Also Published As
Publication number | Publication date |
---|---|
WO2019200571A1 (en) | 2019-10-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108496182A (en) | Identification authentication method, identification authentication device and electronic equipment | |
CN108566777A (en) | Identification authentication method, identification authentication device and electronic equipment | |
Gunawan et al. | Development of face recognition on raspberry pi for security enhancement of smart home system | |
CN108496172A (en) | Electronic equipment and its personal identification method | |
KR20140001163A (en) | Facial recognition | |
CN102622588A (en) | Dual-certification face anti-counterfeit method and device | |
CN103886283A (en) | Method for fusing multi-biometric image information for mobile user and application thereof | |
Linder et al. | Real-time full-body human gender recognition in (RGB)-D data | |
CN110516578A (en) | A kind of monitoring system based on recognition of face and target following | |
US11854310B2 (en) | Face liveness detection method and related apparatus | |
TW201327413A (en) | Systems and methods for face authentication or recognition using spectrally and/or temporally filtered flash illumination | |
Li et al. | Robust RGB-D face recognition using Kinect sensor | |
CN109243030A (en) | A kind of control method and system of night contactless access control system | |
CN108513661A (en) | Identification authentication method, identification authentication device and electronic equipment | |
Mian | Illumination invariant recognition and 3D reconstruction of faces using desktop optics | |
CN106650634A (en) | Image mirror reflection interference detection and feedback method used for terminal bio-identification | |
CN209168110U (en) | Identification authentication device and electronic equipment | |
CN108701228A (en) | Identification authentication method, identification authentication device and electronic equipment | |
CN108521821A (en) | Identification authentication method, identification authentication device and electronic equipment | |
CN108513662A (en) | Identification authentication method, identification authentication device and electronic equipment | |
CN210515292U (en) | System for preventing and controlling myopia of children based on 3D (three-dimensional) modeling technology of flight time method | |
Montazeri et al. | Eye detection in digital images: challenges and solutions | |
Guo et al. | Human face recognition using a spatially weighted Hausdorff distance | |
CN109753869A (en) | The member system system of recognition of face | |
Zhan et al. | Facial authentication system based on real-time 3D facial imaging by using correlation image sensor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 518055 room 2101, Kim Chi Chi house, 1 Tong Ling Road, Taoyuan street, Shenzhen, Guangdong, Nanshan District Applicant after: Shenzhen Fuji science and Technology Co., Ltd. Address before: 518055 Shenzhen, Nanshan District, Guangdong Xili Street Honghua Ling Industrial Zone 2 District 1 District 5 Building (Xi Bian) Applicant before: Shenzhen Fuji science and Technology Co., Ltd. |
|
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |