CN110826045A - Authentication method and device, electronic equipment and storage medium - Google Patents

Authentication method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN110826045A
CN110826045A CN201810915665.3A CN201810915665A CN110826045A CN 110826045 A CN110826045 A CN 110826045A CN 201810915665 A CN201810915665 A CN 201810915665A CN 110826045 A CN110826045 A CN 110826045A
Authority
CN
China
Prior art keywords
reference image
image
template
state information
image template
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810915665.3A
Other languages
Chinese (zh)
Other versions
CN110826045B (en
Inventor
王贵杰
高航
张鹏飞
赖磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Sensetime Technology Co Ltd
Original Assignee
Shenzhen Sensetime Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Sensetime Technology Co Ltd filed Critical Shenzhen Sensetime Technology Co Ltd
Priority to CN201810915665.3A priority Critical patent/CN110826045B/en
Publication of CN110826045A publication Critical patent/CN110826045A/en
Application granted granted Critical
Publication of CN110826045B publication Critical patent/CN110826045B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/74Image or video pattern matching; Proximity measures in feature spaces
    • G06V10/75Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video features; Coarse-fine approaches, e.g. multi-scale approaches; using context analysis; Selection of dictionaries
    • G06V10/751Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching

Abstract

The disclosure relates to an authentication method and apparatus, an electronic device, and a storage medium. The method comprises the following steps: acquiring state information of a first image, wherein the state information of the first image comprises at least one of the following items: scene information of the first image and state information of an object to be verified contained in the first image; determining a target reference image template from at least one reference image template according to the state information of the first image; and obtaining an authentication result of the object to be verified based on the target reference image template. According to the embodiment of the disclosure, the accuracy of the authentication result of the object to be verified can be improved.

Description

Authentication method and device, electronic equipment and storage medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to an authentication method and apparatus, an electronic device, and a storage medium.
Background
With the rapid development of internet technology, computer vision technology has been and is applied to various fields, for example, to the verification of various types of objects (e.g., performing face verification, etc.). However, in the related art, the accuracy of the authentication result still needs to be improved.
Disclosure of Invention
In view of this, the present disclosure provides an authentication method.
According to an aspect of the present disclosure, there is provided an authentication method, the method including:
acquiring state information of a first image;
determining a target reference image template from at least one reference image template according to the state information of the first image;
and obtaining an authentication result of the object to be verified based on the target reference image template.
In this way, images to be processed corresponding to different states can be authenticated based on different reference image templates, and therefore accuracy of authentication results is improved.
Optionally, the authentication method includes: acquiring a first image; and determining a target reference image template from at least one stored reference image template based on the state information of the first image, and obtaining an authentication result of the image to be verified contained in the first image based on the target reference image template.
In one possible implementation, the state information of the first image includes at least one of: scene information of the first image, and state information of an object to be verified included in the first image.
In one possible implementation manner, the first image is three-dimensional image information, and the reference image template is three-dimensional image information.
In this way, the reference image template is three-dimensional image information, so that feature information capable of authentication is abundant, and the accuracy of an authentication result is improved.
In one possible implementation manner, the determining a target reference image template from at least one reference image template according to the state information of the first image includes:
and determining the target reference image template from at least one reference image template according to the state information of the first image and the state information corresponding to the at least one reference image template.
In this way, the obtained target reference image template is determined to be the reference image template with the highest similarity or matching degree between the state information and the state information of the current first image. The authentication is carried out based on the target reference image template determined in the way, so that the authentication errors caused by large difference between the state information during authentication and the state information during registration can be effectively reduced, and the accuracy of the authentication result is improved.
In a possible implementation manner, the determining the target reference image template from at least one reference image template according to the state information of the first image and the state information corresponding to the at least one reference image template includes:
and determining the reference image template with the highest matching degree between the state information of the at least one reference image template and the state information of the first image as the target reference image template.
In this way, the reference image template which is closest to the state information of the image of the object to be verified in the at least one reference image template can be used as the target reference image template, and authentication is performed based on the target reference image template, so that authentication errors caused by large difference between the authentication state and the registration state are reduced, and the accuracy of the authentication result is improved.
In a possible implementation manner, the obtaining an authentication result of the object to be verified based on the target reference image template includes:
comparing the first image with the target reference image template to obtain a comparison result;
and obtaining an authentication result of the object to be verified based on the comparison result.
Thus, a more accurate authentication result can be obtained.
In one possible implementation manner, the comparison result includes a similarity between the first image and the target reference image template,
wherein, the obtaining the authentication result of the object to be verified based on the comparison result comprises:
and when the similarity is greater than or equal to a preset threshold value, determining that the authentication result of the object to be verified is authentication passing.
Thus, the authentication result can be obtained more accurately.
In a possible implementation manner, the comparing the first image with the target reference image template to obtain a comparison result includes:
performing feature extraction processing on the first image to obtain feature information of the object to be verified;
and obtaining the comparison result based on the distance between the characteristic information of the object to be verified and the characteristic information included in the target reference image template.
Therefore, a more accurate comparison result can be determined, so that the accuracy of the authentication result of the object to be verified is improved.
In one possible implementation, before the determining the target reference image template from the at least one reference image template, the method further includes:
generating a three-dimensional reference image based on the acquired second image;
obtaining at least one reference image template based on the three-dimensional reference image;
and storing the at least one reference image template and the state information corresponding to the at least one reference image template.
In this way, by generating a three-dimensional reference image based on the acquired second image, at least one reference image template is obtained based on the three-dimensional reference image. When the authentication is carried out, at least one reference image template can be provided for authentication, a target reference image template with state information close to that of the first image is determined from the at least one reference image template, the authentication result of the object to be verified is determined based on the target reference image template, and the accuracy of the authentication result can be effectively improved.
In a possible implementation, before the generating a three-dimensional reference image based on the acquired second image, the method further includes:
and responding to the received registration request, and starting the image acquisition device.
Therefore, the user can register, and the reference image template determined by registration can be used for authentication, such as face authentication, so that the user can conveniently perform various operations such as quick payment and safety verification, and the safety and the convenience of the system are improved.
In one possible implementation, the reference image template includes at least one of a reference image and feature information of the reference image.
In this way, the reference image template is three-dimensional image information, and the reference image template may include at least one of the reference image and feature information of the reference image, so that feature information capable of authentication is abundant to improve the accuracy of the authentication result.
In a possible implementation manner, the state information of the object to be verified includes at least one of a state of the object to be verified and a clothing state of the object to be verified.
In one possible implementation, the object to be verified includes a human face.
In one possible implementation, the method further includes:
and under the condition that the authentication result of the object to be verified is determined to be authenticated, unlocking the terminal equipment.
Therefore, the terminal equipment can be unlocked without inputting an unlocking password by a user, and the safety and the convenience of the terminal equipment are improved. The terminal equipment can be conveniently and quickly unlocked by a user, and meanwhile, the safety of the terminal equipment is guaranteed.
In one possible implementation, the method further includes:
and under the condition that the authentication result of the object to be verified is determined to be authenticated, performing payment operation.
Therefore, the payment operation can be carried out without inputting a payment password by the user, so that the user can pay quickly and conveniently, and the payment safety is ensured.
According to another aspect of the present disclosure, there is provided an authentication apparatus, the apparatus including:
the information acquisition module is used for acquiring the state information of the first image;
the template determining module is used for determining a target reference image template from at least one reference image template according to the state information of the first image;
and the result obtaining module is used for obtaining the authentication result of the object to be verified based on the target reference image template.
In one possible implementation, the state information of the first image includes at least one of: scene information of the first image, and state information of an object to be verified included in the first image.
In one possible implementation manner, the first image is three-dimensional image information, and the reference image template is three-dimensional image information.
In one possible implementation, the template determining module includes:
and the first determining submodule is used for determining the target reference image template from at least one reference image template according to the state information of the first image and the state information corresponding to the at least one reference image template.
In one possible implementation, the first determining sub-module includes:
and the second determining submodule is used for determining the reference image template with the highest matching degree between the state information of the at least one reference image template and the state information of the first image as the target reference image template.
In one possible implementation, the result obtaining module includes:
the first obtaining submodule is used for comparing the first image with the target reference image template to obtain a comparison result;
and the second obtaining submodule is used for obtaining the authentication result of the object to be verified based on the comparison result.
In one possible implementation manner, the comparison result includes a similarity between the first image and the target reference image template,
wherein the second obtaining module comprises:
and the third determining submodule is used for determining that the authentication result of the object to be verified is authenticated when the similarity is greater than or equal to a preset threshold value.
In one possible implementation manner, the first obtaining module includes:
the third obtaining submodule is used for carrying out feature extraction processing on the first image to obtain feature information of the object to be verified;
and the fourth obtaining submodule is used for obtaining the comparison result based on the distance between the characteristic information of the object to be verified and the characteristic information included in the target reference image template.
In one possible implementation, the apparatus further includes:
the reference image generation module is used for generating a three-dimensional reference image based on the acquired second image;
a template obtaining module, configured to obtain at least one reference image template based on the three-dimensional reference image;
and the storage module is used for storing the at least one reference image template and the state information corresponding to the at least one reference image template.
In one possible implementation, the apparatus further includes:
and the device starting module is used for responding to the received registration request and starting the image acquisition device.
In one possible implementation, the reference image template includes at least one of a reference image and feature information of the reference image.
In a possible implementation manner, the state information of the object to be verified includes at least one of a state of the object to be verified and a clothing state of the object to be verified.
In one possible implementation, the object to be verified includes a human face.
In one possible implementation, the apparatus further includes:
and the releasing module is used for releasing the locking of the terminal equipment under the condition that the authentication result of the object to be verified is determined to be authenticated.
In one possible implementation, the apparatus further includes:
and the payment module is used for carrying out payment operation under the condition that the authentication result of the object to be verified is confirmed to be passed through authentication.
According to another aspect of the present disclosure, there is provided an electronic device including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to: the above authentication method is performed.
In one possible implementation manner, the electronic device includes a mobile phone or a tablet computer.
In one possible implementation, the memory is configured to store the at least one reference image template.
In another possible implementation manner, the memory is further configured to store state information corresponding to each of the at least one reference image template.
Optionally, the electronic device further comprises a receiver for receiving the first image from a terminal device.
Optionally, the electronic device further includes a camera for acquiring the first image.
Optionally, the electronic device further includes at least one sensor, and the at least one sensor is configured to sense status information of the first image, or the status information of the first image is obtained based on data sensed by the at least one sensor.
According to another aspect of the present disclosure, there is provided an electronic device including:
the camera is used for acquiring a first image;
a memory for storing at least one reference image template;
and the processor is used for determining a target reference image template from at least one reference image template stored in the memory based on the state information of the first image acquired by the camera, and obtaining an authentication result of the image to be verified contained in the first image based on the target reference image template.
According to another aspect of the present disclosure, there is provided a server including:
a receiver for receiving a first image from a terminal device;
a memory for storing at least one reference image template;
and the processor is used for determining a target reference image template from at least one reference image template stored in the memory based on the state information of the first image received by the receiver, and obtaining an authentication result of the image to be verified contained in the first image based on the target reference image template.
Optionally, the status information of the first image comprises at least one of: scene information of the first image, and state information of an object to be verified included in the first image.
Optionally, the electronic device further comprises: the processor is further used for acquiring the state information of the first image sensed by the at least one sensor.
Optionally, the processor is configured to perform the steps of any possible implementation of the above-described authentication method.
According to another aspect of the present disclosure, there is provided a computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the above-described authentication method.
According to the embodiment of the disclosure, a target reference image template is determined from at least one reference image template according to the state information of the first image and the acquired state information of the first image, and an authentication result of the object to be verified is obtained according to the target reference image template. Thus, the accuracy of determining the resulting authentication result of the object to be verified based on the target reference image template that is close to the state information of the first image is high, it being understood that the above general description and the following detailed description are exemplary and explanatory only and are not restrictive of the present disclosure.
Other features and aspects of the present disclosure will become apparent from the following detailed description of exemplary embodiments, which proceeds with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and, together with the description, serve to explain the principles of the disclosure.
Fig. 1 shows a flow diagram of an authentication method according to an embodiment of the present disclosure.
Fig. 2 shows a flow diagram of one example of an authentication method according to an embodiment of the present disclosure.
Fig. 3 shows a flow diagram of another example of an authentication method according to an embodiment of the present disclosure.
Fig. 4 shows a schematic diagram of another example of an authentication method according to an embodiment of the present disclosure.
Fig. 5 shows a schematic diagram of another example of an authentication method according to an embodiment of the present disclosure.
Fig. 6 shows a flowchart of another example of an authentication method according to an embodiment of the present disclosure.
Fig. 7 shows a flowchart of another example of an authentication method according to an embodiment of the present disclosure.
Fig. 8 shows a block diagram of an authentication device according to an embodiment of the present disclosure.
Fig. 9 shows a block diagram of an authentication device according to an embodiment of the present disclosure.
FIG. 10 is a block diagram illustrating an electronic device in accordance with an example embodiment.
FIG. 11 is a block diagram illustrating an electronic device in accordance with an example embodiment.
Detailed Description
Various exemplary embodiments, features and aspects of the present disclosure will be described in detail below with reference to the accompanying drawings. In the drawings, like reference numbers can indicate functionally identical or similar elements. While the various aspects of the embodiments are presented in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
The word "exemplary" is used exclusively herein to mean "serving as an example, embodiment, or illustration. Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments.
The term "and/or" herein is merely an association describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the term "at least one" herein means any one of a plurality or any combination of at least two of a plurality, for example, including at least one of A, B, C, and may mean including any one or more elements selected from the group consisting of A, B and C.
Furthermore, in the following detailed description, numerous specific details are set forth in order to provide a better understanding of the present disclosure. It will be understood by those skilled in the art that the present disclosure may be practiced without some of these specific details. In some instances, methods, means, elements and circuits that are well known to those skilled in the art have not been described in detail so as not to obscure the present disclosure.
Fig. 1 shows a flow diagram of an authentication method according to an embodiment of the present disclosure. The method is applicable to an electronic device, which may be provided as a terminal, a server, or other form of device. The terminal may be a User Equipment (UE), a mobile device, a user terminal, a cellular phone, a cordless phone, a Personal Digital Assistant (PDA), a handheld device, a computing device, a vehicle-mounted device, a wearable device, or the like, which is not limited in this disclosure. In some possible implementations, the authentication method may be implemented by way of a processor invoking computer readable instructions stored in a memory. As shown in fig. 1, an authentication method according to an embodiment of the present disclosure includes:
in S101, state information of a first image is acquired, the state information of the first image including at least one of: scene information of the first image and state information of an object to be verified contained in the first image;
in S102, determining a target reference image template from at least one reference image template according to the state information of the first image;
in S103, an authentication result of the object to be verified is obtained based on the target reference image template.
According to the embodiment of the disclosure, at least one reference image template is set, a target reference image template is determined from the at least one reference image template according to the state information of the first image and the acquired state information of the first image, and an authentication result of the object to be verified is obtained according to the target reference image template. In this way, images to be processed corresponding to different states can be authenticated based on different reference image templates, and therefore accuracy of authentication results is improved.
In the embodiment of the present disclosure, the authentication of the object to be verified may include identity verification, for example, identity verification may be performed through face comparison, or living body detection may also be included, but the embodiment of the present disclosure does not limit this.
The disclosed embodiments may be applied to the processing of three-dimensional (3D) images, for example to the liveness detection and/or authentication of 3D images, when the first image is a 3D image and, correspondingly, the reference image template corresponds to a 3D reference image. Alternatively, the embodiment of the present disclosure may also be applied to processing of a two-dimensional (2D) image, in which case, the first image is a 2D image, and accordingly, the reference image template corresponds to a 2D reference image, which is not limited by the embodiment of the present disclosure.
In the embodiment of the present disclosure, the state information of the image may include at least one of scene information of the image and state information of an object to be verified included in the image.
Scene information of an image may include environmental information at the time the image was captured. Such as light intensity, background color, etc. The object to be authenticated may include various types of objects, such as a human face, a human body, an article, and the like. The state information of the object to be verified may include at least one of a state of the object to be verified (for example, if the object to be verified is a face, an expression of the face, an angle of the face, various deformations of the face, and the like) and a clothing state of the object to be verified, or may further include other information. Such as whether the person is wearing accessories, such as glasses, a mask, headwear, etc. Optionally, the status information of the image may also include other information, and the present disclosure does not limit the form and content of the status information of the image.
In some possible implementations, the first image may also be acquired, for example, the image processing apparatus acquires the first image through an image acquisition module (e.g., a camera), but the embodiments of the present disclosure are not limited thereto.
For example, assume that the image processing apparatus is an electronic device. An electronic device (e.g., a cell phone, tablet, etc.) may include a camera. For example, during authentication, the mobile phone may acquire the first image through the camera. For example, a first image containing an object to be authenticated may be acquired by a camera. Alternatively, the electronic device (e.g., server) may include a receiver, such as a receive antenna or receive port, and receive the first image from the terminal device.
In some possible implementations, the state information of the first image may be obtained by image processing the first image. For example, image recognition may be performed on the first image when or after the first image is acquired, for example, environment information recognition (for example, light intensity, background color, and the like that can be used to determine an environment), face recognition, face key point positioning, face action unit detection (a face action unit can be used to determine an expression and a deformation of a face), object recognition, and the like are performed on the first image.
The image recognition of the first image may be performed by a trained neural network. For example, the acquired first image is input into a trained neural network, so that information such as articles and human face action units included in the first image is detected through the neural network, and an image recognition result is obtained. The state information of the first image may be determined according to the image recognition result. For example, the image recognition result includes: the objects contained in the first image include glasses, a mask, and a plurality of determined face action units (for example, the face action units determine that the expression of the face is a haha laugh). Determining the state information of the first image according to the image recognition result includes: glasses, mask, haha laugh. The present disclosure does not limit the processing mode and time of image recognition and the mode of determining the state information of the first image according to the image recognition result.
In other possible implementations, the status information of the first image may also be determined by the electronic device through various types of data acquired by the sensor.
For example, an electronic device (e.g., a cell phone) may include a light sensor (e.g., that may be used to detect the intensity of light in the environment in which the electronic device is located, etc.). For example, during authentication, the mobile phone may acquire the state information of the first image through the light sensor. For example, scene information of the first image (e.g., light intensity of the current environment) may be detected by a light sensor. The detected scene information may be determined as state information of the image. The present disclosure does not limit the manner in which the status information of the image is acquired.
In other possible implementations, the status information of the first image may be obtained by the electronic device (e.g., a server) from the terminal device. For example, a receiver of the electronic device acquires state information of a first image transmitted by the terminal device.
In the disclosed embodiments, a reference image template (which may also be referred to as reference image information, reference image data, or reference image template data) is used to authenticate an object to be verified in an image, such as identity verification and/or liveness detection. The information related to the reference image may be included, for example, the information includes the reference image and/or the information of the reference image, where optionally, the information of the reference image may include feature information of the reference image, or may further include state information of the reference image, and so on, and embodiments of the present disclosure do not limit specific implementations of the reference image template.
The reference image template may be preset. In some alternative implementations, the reference image template may be obtained during a user registration process, for example, the reference image template is obtained based on an image acquired during the registration process, and the means for obtaining the reference image template and the like are not limited in the embodiments of the present disclosure.
Fig. 2 shows a flow diagram of one example of an authentication method according to an embodiment of the present disclosure. In one possible implementation, before S102, as shown in fig. 2, the method further includes:
in S104, a three-dimensional reference image is generated based on the acquired second image;
in S105, obtaining at least one reference image template based on the three-dimensional reference image;
in S106, the at least one reference image template and the state information corresponding to the at least one reference image template are stored.
In some possible implementations, the acquired second image is a 2D image, and at this time, the second image may be processed to generate a three-dimensional reference image. In other possible implementations, the acquired second image is a 3D image, and the acquired second image may be directly used as a reference image, but the embodiment of the disclosure is not limited thereto.
Optionally, the reference image may be transformed to obtain at least one reference image, where different reference images correspond to different state information, and at least one reference image template is obtained based on the at least one reference image, where in some possible implementations, the reference image and the reference image template may be in a one-to-one correspondence relationship. For example, each of the at least one reference image is directly determined as a reference image template, or the reference image may be subjected to feature extraction processing to obtain feature data of the reference image and determine the feature data of the reference image as the reference image template, or the feature information and/or other information of the reference image and the reference image are determined as the reference image templates, which is not limited in the embodiment of the present disclosure.
In some possible implementations, the at least one reference image template, the state information of the at least one reference image template, and the correspondence between the at least one reference image template and the state information may be stored, for example, the corresponding reference image template and the state information are assigned the same identifier, or the reference image template is compressed or marked based on the state information, and so on. Alternatively, the reference image template may include corresponding state information, which is not limited in this disclosure.
In some possible implementations, the at least one reference image template and/or the state information of the at least one reference image template stored in the memory may be acquired, and the target reference image template may be determined from the at least one reference image template based on the state information of the first image, but the embodiments of the present disclosure are not limited thereto.
For convenience of understanding, the object to be verified is described as a human face in the following as an example, but the embodiment of the present disclosure is not limited thereto.
Fig. 3 shows a flow diagram of another example of an authentication method according to an embodiment of the present disclosure. In one possible implementation, before S104, as shown in fig. 3, the method further includes:
in S107, the image capture device is turned on in response to the received registration request.
For example, a registration request (e.g., from user a) may be received prior to authentication, and in response to the received registration request, an image capture device (e.g., a camera) may be turned on to capture the second image. Therefore, the user can register, and the reference image template determined in the registration process can be used for authentication, such as face authentication, so that the user can conveniently perform various operations such as quick payment and safety verification, and the safety and the convenience of the system are improved.
For example, the second image (e.g., a face image of the user a) may be acquired by the image acquisition device. When the face image of the user a is acquired (for example, when the face image of the user a is acquired by a camera), a three-dimensional reference image may be generated.
Fig. 4 shows a schematic diagram of another example of an authentication method according to an embodiment of the present disclosure. In one possible implementation, as shown in fig. 4, when the face image of the user a is acquired, a three-dimensional reference image of the face of the user a may be generated. Wherein generating the three-dimensional reference image based on the acquired two-dimensional second image may include various ways.
For example, when the terminal device acquires a face image of the user a through the camera, one or more frames of two-dimensional images may be acquired, for example, a plurality of face images at different angles are acquired. In addition, the terminal device may further acquire depth information of the face of the user a, that is, depth information corresponding to the face image, in multiple ways. For example, the depth information of the face of the user a may be acquired by various sensors such as structured light, time of flight based, and the like. Then, 3D modeling may be performed according to the acquired 2D image and depth information of the face, and a three-dimensional reference image of the face of the user a is generated.
For another example, when the terminal device acquires the face image of the user a through the camera, the key point positioning (for example, determining information such as eyes and eyebrows) may be performed on the face of the user a, and a three-dimensional reference image of the face of the user a may be generated according to the key point information of the face.
The embodiment of the present disclosure does not limit the manner in which the three-dimensional reference image is generated based on the acquired two-dimensional second image.
In S105, there may be a plurality of ways to obtain at least one reference image template based on the three-dimensional reference image.
For example, a three-dimensional reference image may be processed, for example, the reference image may be transformed based on different states, respectively, to obtain at least one reference image template. At least one reference image template can be obtained by respectively simulating different scenes and/or different states of the object to be verified.
Fig. 5 shows a schematic diagram of another example of an authentication method according to an embodiment of the present disclosure. In a possible implementation manner, when the face image (i.e., the second image) of the user a is collected, the collection environment is daytime, and the face state of the user a is face-up, smile, and glasses are worn. The three-dimensional reference image obtained based on the second image may be processed, for example, as shown in fig. 5, by software rendering, different scenes (e.g., different light rays, etc.) and different states (e.g., different expressions, angles, deformations, etc.) of the object to be verified are simulated to be combined, so as to obtain different 3D face images.
For example, a 3D face image may be obtained by simulating night (dim light), a face state being laugh and wearing a headband based on a reference image, and determining state information of a reference image template corresponding to the 3D face image as: dim light, laugh, and wear a headband.
In some optional implementation manners, a 3D face image may be obtained by simulating nighttime (dark light) and the face state of the user a as a side face and a frown based on the reference image, and determining that the state information of the reference image template corresponding to the 3D face image is: dark light, side face, frown.
The embodiment of the present disclosure does not limit the number of the reference image templates and the specific implementation of the state information.
In S106, the at least one reference image template and the state information corresponding to the at least one reference image template are stored.
The at least one reference image template and the state information corresponding to the at least one reference image template can be used for authentication. In this way, by generating a three-dimensional reference image based on the acquired second image, at least one reference image template is obtained based on the three-dimensional reference image. When the authentication is carried out, at least one reference image template can be provided for authentication, a target reference image template with state information close to that of the first image is determined from the at least one reference image template, the authentication result of the object to be verified is determined based on the target reference image template, and the accuracy of the authentication result can be effectively improved.
In one possible implementation, determining a target reference image template from at least one reference image template according to the state information of the first image (S102) may include:
and determining the target reference image template from at least one reference image template according to the state information of the first image and the state information corresponding to the at least one reference image template.
For example, it may be determined whether there is state information that is the same as or similar to the state information of the first image in the state information corresponding to the at least one reference image template, and if so, the reference image template corresponding to the same or similar state information may be determined as the target reference image template.
In this way, the determined target reference image template is the reference image template with the highest similarity or matching degree between the state information and the state information of the first image. The authentication is carried out based on the target reference image template determined in the way, so that the authentication errors caused by large state difference between the authentication time and the registration time can be effectively reduced, and the accuracy of the authentication result is improved.
In one possible implementation manner, determining the target reference image template from at least one reference image template according to the state information of the first image and the state information corresponding to the at least one reference image template (S102) may include:
and determining the reference image template with the highest matching degree between the state information of the at least one reference image template and the state information of the first image as the target reference image template.
For example, as described above, the state information of the first image is obtained by: dim light, smile and head towel wearing, if at least one reference image template has a reference image template a, the corresponding state information of the reference image template a is as follows: dim light, smile, and head towel wearing, the reference image template a may be determined as the target reference image template.
The matching degree can be measured in various ways, and the disclosure does not limit this. For example, the matching degree can be measured by the proportion of the same number of state information in the state information corresponding to the reference image template, and the higher the proportion of the same state information is, the higher the matching degree is. Alternatively, different weights may be given to different status information (for example, higher weight is given to angle or light intensity), and matching degree is measured by combining the same status information and the weight thereof, and the embodiment of the disclosure does not limit this.
In some possible implementations, the target reference image template may also be selected from the at least one reference image template in combination with other conditions. The embodiment of the present disclosure does not limit a manner of determining the target reference image template from at least one reference image template according to the state information of the first image and the state information corresponding to the at least one reference image template.
In this way, the reference image template which is closest to the state information of the image of the object to be verified in the at least one reference image template can be used as the target reference image template, and authentication is performed based on the target reference image template, so that authentication errors caused by large difference between the authentication state and the registration state are reduced, and the accuracy of the authentication result is improved.
In S103, the object may be compared based on the target reference image template to obtain an authentication result of the object to be verified.
In a possible implementation manner, obtaining an authentication result of the object to be verified based on the target reference image template (S103) may include:
comparing the first image with the target reference image template to obtain a comparison result;
and obtaining an authentication result of the object to be verified based on the comparison result.
For example, the first image may be compared to the target reference image template. For example, feature information of the first image is extracted, the feature information of the first image is compared with feature information included in the target reference image template to obtain a comparison result, for example, a distance or a similarity between the feature information of the first image and the feature information included in the target i reference image template is determined, and the distance or the similarity is determined as the comparison result. For another example, a similarity between the first image and the reference image included in the target reference image template may be determined, and the similarity may be used as a comparison result. In the embodiment of the present disclosure, the comparison result may be similarity, matching score, and the like, which is not limited in the embodiment of the present disclosure.
The authentication result of the object to be verified can be obtained based on the preset judgment standard and the comparison result. For example, when the comparison result is a matching score, the authentication result of the object to be verified may be determined by comparing the comparison result with the matching threshold. For example, if the matching score is greater than or equal to the matching threshold, the authentication result of the object to be verified is determined to be authenticated, and if the matching score is less than the matching threshold, the authentication result of the object to be verified is determined to be not authenticated.
Thus, a more accurate authentication result can be obtained. The present disclosure does not limit the form of the comparison result, the specific manner of obtaining the authentication result of the object to be verified according to the comparison result, and the like.
In a possible implementation manner, comparing the first image with the target reference image template to obtain a comparison result may include:
performing feature extraction processing on the first image to obtain feature information of the object to be verified;
and obtaining the comparison result based on the distance between the characteristic information of the object to be verified and the characteristic information included in the target reference image template.
For example, feature extraction processing may be performed on the first image, for example, to obtain feature information of an object to be verified. For example, the first image is a face image, feature information of a plurality of key points (for example, eyes, eyebrows, a mouth, and the like) included in the face image may be extracted, feature information of a face contour, and the like may also be extracted. The present disclosure does not limit the form, category, and number of the feature information of the object to be verified in the first image, and the specific manner of performing the feature extraction processing on the first image.
For example, a distance between feature information of the object to be authenticated and feature information included in the target reference image template may be determined. For example, the closer the distance between the feature information of the object to be verified and the feature information included in the target reference image template is, the more similar the two are, and the comparison result may be obtained based on the distance. For example, the similarity between the feature information of the object to be verified and the feature information included in the target reference image template is determined based on the distance therebetween.
In some optional embodiments, the feature information of the object to be verified may be compared with each corresponding feature information in the target reference image template to determine a matching score. For example, similarity information between each feature information of the object to be verified and each corresponding feature information of the target reference image template may be determined, and a matching score may be determined according to the similarity information (for example, each similarity information is higher, and the matching score is determined to be 90 points), so as to determine the comparison result. The comparison result can be used to determine the authentication result of the object to be verified.
Therefore, a more accurate comparison result can be determined, so that the accuracy of the authentication result of the object to be verified is improved.
In one possible implementation manner, the comparison result includes a similarity between the first image and the target reference image template,
obtaining an authentication result of the object to be verified based on the comparison result may include:
and when the similarity is greater than or equal to a preset threshold value, determining that the authentication result of the object to be verified is authentication passing.
For example, as described above, the comparison result may include a similarity between the first image and the target reference image template, and the authentication result may be determined based on the similarity. For example, there may be a preset threshold. For example, the preset threshold is 80%, and when the determined comparison result is that the similarity is 90% (greater than the preset threshold), the authentication result of the object to be verified is determined to be authenticated. And when the determined comparison result is that the similarity is 70% (smaller than a preset threshold), determining that the authentication result of the object to be verified is not authenticated.
Thus, the authentication result can be obtained more accurately. The present disclosure does not limit the specific values, setting manners, and the like of the preset threshold.
Fig. 6 shows a flowchart of another example of an authentication method according to an embodiment of the present disclosure. In one possible implementation, as shown in fig. 6, the method further includes:
in S108, if it is determined that the authentication result of the object to be verified is authenticated, the terminal device is unlocked.
For example, a terminal device (e.g., a mobile phone, a tablet computer, etc.) has a face unlocking function, and when the terminal device is in a locked state, a user cannot use the terminal device or a specific function of the terminal device. When a user indicates to unlock the terminal device, a camera of the terminal device may acquire one or more images or video sequences (including a first image) of a face to be verified, and then may perform face recognition on the acquired still or video frame image to determine whether to unlock the terminal device, for example, whether to switch a lock interface to an unlock interface. And under the condition that the authentication result of the face to be verified is determined to be authenticated, unlocking the terminal equipment. Therefore, the terminal equipment can be unlocked without inputting an unlocking password by a user, and the safety and the convenience of the terminal equipment are improved.
Therefore, the terminal equipment can be conveniently and quickly unlocked by a user, and the safety of the terminal equipment is ensured. It will be appreciated that the terminal device may have a variety of locking conditions, for example, as described above, the handset itself is locked and the user cannot use the handset. But also locking of a certain application program of the terminal device, etc., which is not limited by this disclosure.
Fig. 7 shows a flowchart of another example of an authentication method according to an embodiment of the present disclosure. In one possible implementation, as shown in fig. 7, the method further includes:
in S109, in a case where it is determined that the authentication result of the object to be verified is authenticated, a payment operation is performed.
For example, a user may perform various types of payment operations through their terminal device (e.g., a cell phone, a tablet, etc.). When the payment operation is carried out, the quick payment can be carried out through the face recognition. For example, when the user instructs to pay, one or more images or video sequences (including the first image) of the face to be verified can be acquired through the camera of the terminal device. And then, carrying out face recognition on the obtained static or video frame image, and carrying out payment operation when the authentication result of the face to be verified is determined to be passing authentication. Therefore, the payment operation can be carried out without inputting a payment password by the user, so that the user can pay quickly and conveniently, and the payment safety is ensured. The present disclosure does not limit the application scenario of the payment operation.
It should be noted that the authentication result of the object to be verified can be applied to various application scenarios. For example, as described above, when the determined authentication result is that the authentication is passed, the lock of the terminal device may be released, the payment operation may be performed, or the like. In addition, various application scenes such as entrance guard unlocking, various virtual account login, multiple account association of the same user, user identity confirmation and the like can be performed, and the application scene of the authentication result of the determined object to be verified is not limited by the method and the device.
Fig. 8 shows a block diagram of an authentication device according to an embodiment of the present disclosure. As shown in fig. 8, the apparatus includes:
an information obtaining module 201, configured to obtain status information of a first image, where the status information of the first image includes at least one of the following: scene information of the first image and state information of an object to be verified contained in the first image;
a template determining module 202, configured to determine a target reference image template from at least one reference image template according to the state information of the first image;
and a result obtaining module 203, configured to obtain an authentication result of the object to be verified based on the target reference image template.
In one possible implementation manner, the first image is three-dimensional image information, and the reference image template is three-dimensional image information.
In one possible implementation, the template determining module 202 includes:
and the first determining submodule is used for determining the target reference image template from at least one reference image template according to the state information of the first image and the state information corresponding to the at least one reference image template.
In one possible implementation, the first determining sub-module includes:
and the second determining submodule is used for determining the reference image template with the highest matching degree between the state information of the at least one reference image template and the state information of the first image as the target reference image template.
In one possible implementation, the result obtaining module 203 includes:
the first obtaining submodule is used for comparing the first image with the target reference image template to obtain a comparison result;
and the second obtaining submodule is used for obtaining the authentication result of the object to be verified based on the comparison result.
In one possible implementation manner, the comparison result includes a similarity between the first image and the target reference image template,
wherein the second obtaining module comprises:
and the third determining submodule is used for determining that the authentication result of the object to be verified is authenticated when the similarity is greater than or equal to a preset threshold value.
In one possible implementation manner, the first obtaining module includes:
the third obtaining submodule is used for carrying out feature extraction processing on the first image to obtain feature information of the object to be verified;
and the fourth obtaining submodule is used for obtaining the comparison result based on the distance between the characteristic information of the object to be verified and the characteristic information included in the target reference image template.
Fig. 9 shows a block diagram of an authentication device according to an embodiment of the present disclosure. As shown in fig. 9, in a possible implementation manner, the apparatus further includes:
a reference image generation module 204, configured to generate a three-dimensional reference image based on the acquired second image;
a template obtaining module 205, configured to obtain at least one reference image template based on the three-dimensional reference image;
a storage module 206, configured to store the at least one reference image template and state information corresponding to the at least one reference image template.
As shown in fig. 9, in a possible implementation manner, the apparatus further includes:
and a device starting module 207, configured to start the image capturing device in response to the received registration request.
In one possible implementation, the reference image template includes at least one of a reference image and feature information of the reference image.
In a possible implementation manner, the state information of the object to be verified includes at least one of a state of the object to be verified and a clothing state of the object to be verified.
In one possible implementation, the object to be verified includes a human face.
As shown in fig. 9, in a possible implementation manner, the apparatus further includes:
and the releasing module 208 is configured to release the lock on the terminal device when it is determined that the authentication result of the object to be verified is authenticated.
As shown in fig. 9, in a possible implementation manner, the apparatus further includes:
and the payment module 209 is configured to perform a payment operation when the authentication result of the object to be verified is determined to be authenticated.
In some embodiments, functions of or modules included in the apparatus provided in the embodiments of the present disclosure may be used to execute the method described in the above method embodiments, and for specific implementation, reference may be made to the description of the above method embodiments, and for brevity, details are not described here again
Embodiments of the present disclosure also provide a computer-readable storage medium having stored thereon computer program instructions, which when executed by a processor, implement the above-mentioned method. The computer readable storage medium may be a non-volatile computer readable storage medium.
An embodiment of the present disclosure further provides an electronic device, including: a processor; a memory for storing processor-executable instructions; wherein the processor is configured as the above method.
FIG. 10 is a block diagram illustrating an electronic device in accordance with an example embodiment. For example, the electronic device 800 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, or the like terminal.
Referring to fig. 10, electronic device 800 may include one or more of the following components: processing component 802, memory 804, power component 806, multimedia component 808, audio component 810, input/output (I/O) interface 812, sensor component 814, and communication component 816.
The processing component 802 generally controls overall operation of the electronic device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing components 802 may include one or more processors 820 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 802 can include one or more modules that facilitate interaction between the processing component 802 and other components. For example, the processing component 802 can include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
The memory 804 is configured to store various types of data to support operations at the electronic device 800. Examples of such data include instructions for any application or method operating on the electronic device 800, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 804 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The power supply component 806 provides power to the various components of the electronic device 800. The power components 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the electronic device 800.
The multimedia component 808 includes a screen that provides an output interface between the electronic device 800 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 808 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the electronic device 800 is in an operation mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive external audio signals when the electronic device 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 also includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between the processing component 802 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 814 includes one or more sensors for providing various aspects of state assessment for the electronic device 800. For example, the sensor assembly 814 may detect an open/closed state of the electronic device 800, the relative positioning of components, such as a display and keypad of the electronic device 800, the sensor assembly 814 may also detect a change in the position of the electronic device 800 or a component of the electronic device 800, the presence or absence of user contact with the electronic device 800, orientation or acceleration/deceleration of the electronic device 800, and a change in the temperature of the electronic device 800. Sensor assembly 814 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 816 is configured to facilitate wired or wireless communication between the electronic device 800 and other devices. The electronic device 800 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 816 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 816 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the electronic device 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer-readable storage medium, such as the memory 804, is also provided that includes computer program instructions executable by the processor 820 of the electronic device 800 to perform the above-described methods.
FIG. 11 is a block diagram illustrating an electronic device in accordance with an example embodiment. For example, the electronic device 1900 may be provided as a server. Referring to fig. 11, electronic device 1900 includes a processing component 1922 further including one or more processors and memory resources, represented by memory 1932, for storing instructions, e.g., applications, executable by processing component 1922. The application programs stored in memory 1932 may include one or more modules that each correspond to a set of instructions. Further, the processing component 1922 is configured to execute instructions to perform the above-described method.
The electronic device 1900 may also include a power component 1926 configured to perform power management of the electronic device 1900, a wired or wireless network interface 1950 configured to connect the electronic device 1900 to a network, and an input/output (I/O) interface 1958. The electronic device 1900 may operate based on an operating system stored in memory 1932, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, or the like.
In an exemplary embodiment, a non-transitory computer readable storage medium, such as the memory 1932, is also provided that includes computer program instructions executable by the processing component 1922 of the electronic device 1900 to perform the above-described methods.
The present disclosure may be systems, methods, and/or computer program products. The computer program product may include a computer-readable storage medium having computer-readable program instructions embodied thereon for causing a processor to implement various aspects of the present disclosure.
The computer readable storage medium may be a tangible device that can hold and store the instructions for use by the instruction execution device. The computer readable storage medium may be, for example, but not limited to, an electronic memory device, a magnetic memory device, an optical memory device, an electromagnetic memory device, a semiconductor memory device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a Static Random Access Memory (SRAM), a portable compact disc read-only memory (CD-ROM), a Digital Versatile Disc (DVD), a memory stick, a floppy disk, a mechanical coding device, such as punch cards or in-groove projection structures having instructions stored thereon, and any suitable combination of the foregoing. Computer-readable storage media as used herein is not to be construed as transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission medium (e.g., optical pulses through a fiber optic cable), or electrical signals transmitted through electrical wires.
The computer-readable program instructions described herein may be downloaded from a computer-readable storage medium to a respective computing/processing device, or to an external computer or external storage device via a network, such as the internet, a local area network, a wide area network, and/or a wireless network. The network may include copper transmission cables, fiber optic transmission, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. The network adapter card or network interface in each computing/processing device receives computer-readable program instructions from the network and forwards the computer-readable program instructions for storage in a computer-readable storage medium in the respective computing/processing device.
The computer program instructions for carrying out operations of the present disclosure may be assembler instructions, Instruction Set Architecture (ISA) instructions, machine-related instructions, microcode, firmware instructions, state setting data, or source or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The computer-readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider). In some embodiments, the electronic circuitry that can execute the computer-readable program instructions implements aspects of the present disclosure by utilizing the state information of the computer-readable program instructions to personalize the electronic circuitry, such as a programmable logic circuit, a Field Programmable Gate Array (FPGA), or a Programmable Logic Array (PLA).
Various aspects of the present disclosure are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the disclosure. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer-readable program instructions.
These computer-readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer-readable program instructions may also be stored in a computer-readable storage medium that can direct a computer, programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer-readable medium storing the instructions comprises an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer, other programmable apparatus or other devices implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Having described embodiments of the present disclosure, the foregoing description is intended to be exemplary, not exhaustive, and not limited to the disclosed embodiments. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terms used herein were chosen in order to best explain the principles of the embodiments, the practical application, or technical improvements to the techniques in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.

Claims (10)

1. An authentication method, the method comprising:
acquiring state information of a first image, wherein the state information of the first image comprises at least one of the following items: scene information of the first image and state information of an object to be verified contained in the first image;
determining a target reference image template from at least one reference image template according to the state information of the first image;
and obtaining an authentication result of the object to be verified based on the target reference image template.
2. The method of claim 1, wherein the first image is three-dimensional image information and the reference image template is three-dimensional image information.
3. The method according to claim 1 or 2, wherein determining a target reference image template from at least one reference image template according to the state information of the first image comprises:
and determining the target reference image template from at least one reference image template according to the state information of the first image and the state information corresponding to the at least one reference image template.
4. The method of claim 3, wherein determining the target reference image template from at least one reference image template according to the status information of the first image and the corresponding status information of the at least one reference image template comprises:
and determining the reference image template with the highest matching degree between the state information of the at least one reference image template and the state information of the first image as the target reference image template.
5. An authentication apparatus, characterized in that the apparatus comprises:
an information obtaining module, configured to obtain status information of a first image, where the status information of the first image includes at least one of: scene information of the first image and state information of an object to be verified contained in the first image;
the template determining module is used for determining a target reference image template from at least one reference image template according to the state information of the first image;
and the result obtaining module is used for obtaining the authentication result of the object to be verified based on the target reference image template.
6. The apparatus of claim 5, wherein the first image is three-dimensional image information and the reference image template is three-dimensional image information.
7. The apparatus of claim 5 or 6, wherein the template determination module comprises:
and the first determining submodule is used for determining the target reference image template from at least one reference image template according to the state information of the first image and the state information corresponding to the at least one reference image template.
8. The apparatus of claim 7, wherein the first determination submodule comprises:
and the second determining submodule is used for determining the reference image template with the highest matching degree between the state information of the at least one reference image template and the state information of the first image as the target reference image template.
9. An electronic device, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to: performing the method of any one of claims 1 to 4.
10. A computer readable storage medium having computer program instructions stored thereon, which when executed by a processor implement the method of any one of claims 1 to 4.
CN201810915665.3A 2018-08-13 2018-08-13 Authentication method and device, electronic equipment and storage medium Active CN110826045B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810915665.3A CN110826045B (en) 2018-08-13 2018-08-13 Authentication method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810915665.3A CN110826045B (en) 2018-08-13 2018-08-13 Authentication method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110826045A true CN110826045A (en) 2020-02-21
CN110826045B CN110826045B (en) 2022-04-05

Family

ID=69546760

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810915665.3A Active CN110826045B (en) 2018-08-13 2018-08-13 Authentication method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110826045B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112328995A (en) * 2020-07-08 2021-02-05 德能森智能科技(成都)有限公司 Social management system based on TOF image sensor verification
CN114820575A (en) * 2022-05-24 2022-07-29 四川中绳矩阵技术发展有限公司 Image verification method and device, computer equipment and storage medium

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1482580A (en) * 2002-09-15 2004-03-17 �����з��ѿƼ����޹�˾ Method for forming new three-dimensional model using a group of two-dimensional photos and three-dimensional library
US20110292042A1 (en) * 2010-06-01 2011-12-01 Vladimir Vaganov 3d digital painting
CN103516518A (en) * 2013-07-03 2014-01-15 北京百纳威尔科技有限公司 Safety verification method and device
US20140232638A1 (en) * 2013-02-21 2014-08-21 Samsung Electronics Co., Ltd. Method and apparatus for user interface using gaze interaction
CN104246793A (en) * 2012-04-25 2014-12-24 华为技术有限公司 Three-dimensional face recognition for mobile devices
CN104657713A (en) * 2015-02-09 2015-05-27 浙江大学 Three-dimensional face calibrating method capable of resisting posture and facial expression changes
CN105051755A (en) * 2013-01-18 2015-11-11 微软技术许可有限责任公司 Part and state detection for gesture recognition
CN106295497A (en) * 2016-07-19 2017-01-04 西安理工大学 The apparatus and method that a kind of three-dimensional surface light field coding signal generates and identifies
CN107066983A (en) * 2017-04-20 2017-08-18 腾讯科技(上海)有限公司 A kind of auth method and device
CN107395881A (en) * 2017-07-13 2017-11-24 广东欧珀移动通信有限公司 Solve lock control method and Related product
CN107463813A (en) * 2017-07-13 2017-12-12 广东欧珀移动通信有限公司 Condition control method and Related product
CN107977439A (en) * 2017-12-07 2018-05-01 宁波亿拍客网络科技有限公司 A kind of facial image base construction method

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1482580A (en) * 2002-09-15 2004-03-17 �����з��ѿƼ����޹�˾ Method for forming new three-dimensional model using a group of two-dimensional photos and three-dimensional library
US20110292042A1 (en) * 2010-06-01 2011-12-01 Vladimir Vaganov 3d digital painting
CN104246793A (en) * 2012-04-25 2014-12-24 华为技术有限公司 Three-dimensional face recognition for mobile devices
CN105051755A (en) * 2013-01-18 2015-11-11 微软技术许可有限责任公司 Part and state detection for gesture recognition
US20140232638A1 (en) * 2013-02-21 2014-08-21 Samsung Electronics Co., Ltd. Method and apparatus for user interface using gaze interaction
CN103516518A (en) * 2013-07-03 2014-01-15 北京百纳威尔科技有限公司 Safety verification method and device
CN104657713A (en) * 2015-02-09 2015-05-27 浙江大学 Three-dimensional face calibrating method capable of resisting posture and facial expression changes
CN106295497A (en) * 2016-07-19 2017-01-04 西安理工大学 The apparatus and method that a kind of three-dimensional surface light field coding signal generates and identifies
CN107066983A (en) * 2017-04-20 2017-08-18 腾讯科技(上海)有限公司 A kind of auth method and device
CN107395881A (en) * 2017-07-13 2017-11-24 广东欧珀移动通信有限公司 Solve lock control method and Related product
CN107463813A (en) * 2017-07-13 2017-12-12 广东欧珀移动通信有限公司 Condition control method and Related product
CN107977439A (en) * 2017-12-07 2018-05-01 宁波亿拍客网络科技有限公司 A kind of facial image base construction method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
CHENGCHAO QU等: "3D vs. 2D: On the Importance of Registration for Hallucinating Faces under Unconstrained Poses", 《网页在线公开:HTTPS://IEEEXPLORE.IEEE.ORG/STAMP/STAMP.JSP?TP=&ARNUMBER=7158332》 *
方淑仙等: "基于知识的人脸鉴别技术研究", 《2018年全国电子认证技术交流大会》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112328995A (en) * 2020-07-08 2021-02-05 德能森智能科技(成都)有限公司 Social management system based on TOF image sensor verification
CN114820575A (en) * 2022-05-24 2022-07-29 四川中绳矩阵技术发展有限公司 Image verification method and device, computer equipment and storage medium
CN114820575B (en) * 2022-05-24 2023-01-20 四川中绳矩阵技术发展有限公司 Image verification method and device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN110826045B (en) 2022-04-05

Similar Documents

Publication Publication Date Title
CN108197586B (en) Face recognition method and device
CN108764069B (en) Living body detection method and device
CN110287671B (en) Verification method and device, electronic equipment and storage medium
WO2021031609A1 (en) Living body detection method and device, electronic apparatus and storage medium
EP3133528A1 (en) Method and apparatus for fingerprint identification
CN110569777B (en) Image processing method and device, electronic device and storage medium
CN111553864B (en) Image restoration method and device, electronic equipment and storage medium
US20210012091A1 (en) Method and apparatus for image processing, electronic device, and storage medium
US9924090B2 (en) Method and device for acquiring iris image
CN110928627B (en) Interface display method and device, electronic equipment and storage medium
CN107944367B (en) Face key point detection method and device
CN111241887B (en) Target object key point identification method and device, electronic equipment and storage medium
CN110532957B (en) Face recognition method and device, electronic equipment and storage medium
EP3246850A1 (en) Image sending method and apparatus, computer program and recording medium
CN110765434A (en) Identity authentication method and device, electronic equipment and storage medium
CN110909203A (en) Video analysis method and device, electronic equipment and storage medium
CN107977636B (en) Face detection method and device, terminal and storage medium
CN112184787A (en) Image registration method and device, electronic equipment and storage medium
CN112270288A (en) Living body identification method, access control device control method, living body identification device, access control device and electronic device
CN112667984A (en) Identity authentication method and device, electronic equipment and storage medium
CN110826045B (en) Authentication method and device, electronic equipment and storage medium
CN109284591B (en) Face unlocking method and device
CN114581525A (en) Attitude determination method and apparatus, electronic device, and storage medium
CN111582381B (en) Method and device for determining performance parameters, electronic equipment and storage medium
CN110544335B (en) Object recognition system and method, electronic device, and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant