CN112069482B - Identity authentication system based on footprint comparison method - Google Patents

Identity authentication system based on footprint comparison method Download PDF

Info

Publication number
CN112069482B
CN112069482B CN202010912788.9A CN202010912788A CN112069482B CN 112069482 B CN112069482 B CN 112069482B CN 202010912788 A CN202010912788 A CN 202010912788A CN 112069482 B CN112069482 B CN 112069482B
Authority
CN
China
Prior art keywords
footprint
image
information
comparison
area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010912788.9A
Other languages
Chinese (zh)
Other versions
CN112069482A (en
Inventor
张艳
王鹏鹏
王年
高梓健
鲁玺龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui University
Original Assignee
Anhui University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui University filed Critical Anhui University
Priority to CN202010912788.9A priority Critical patent/CN112069482B/en
Publication of CN112069482A publication Critical patent/CN112069482A/en
Application granted granted Critical
Publication of CN112069482B publication Critical patent/CN112069482B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • G06N3/084Backpropagation, e.g. using gradient descent
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T3/00Geometric image transformation in the plane of the image
    • G06T3/40Scaling the whole image or part thereof
    • G06T3/4038Scaling the whole image or part thereof for image mosaicing, i.e. plane images composed of plane sub-images
    • G06T5/70
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/20Special algorithmic details
    • G06T2207/20081Training; Learning
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/20Special algorithmic details
    • G06T2207/20084Artificial neural networks [ANN]

Abstract

The invention discloses an identity authentication system based on a footprint comparison method, relates to the technical field of identity authentication, and particularly relates to an identity authentication system based on a footprint comparison method, which can help a specific place of a warehouse, a bank and a prison to realize the automation of entrance and exit identity authentication; a footprint is one of the biological features that can characterize a person's identity information; by adopting the identity authentication system of the footprint comparison method, internal personnel in related places can freely come in and go out only by collecting the footprint data once when registering information.

Description

Identity authentication system based on footprint comparison method
Technical Field
The invention relates to the technical field of identity authentication, in particular to an identity authentication system based on a footprint comparison method.
Background
The storage of goods, the office area of a bank, prisons, and other scenarios are in principle not accessible to non-insider personnel, and therefore require security monitoring of these areas. According to the traditional security method, cameras or an access control system based on an IC card need to be arranged at an entrance and an exit, so that the workload of security workers is increased in the actual operation process, and troubles are brought to the workers needing to frequently come in and go out of the places.
The invention provides an identity authentication system based on a footprint comparison method, which can be used for constructing an identity authentication system and helping a specific place of a warehouse, a bank and a prison to realize the automation of entrance and exit identity authentication; a footprint is one of the biological features that can characterize a person's identity information; the footprints do not need to be matched by the collection personnel deliberately in the collection process, and the collection device is arranged at the necessary place of the entrance and exit of the relevant places.
By adopting the identity authentication system based on the footprint comparison method, the internal personnel of the related places only need to collect the footprint data once when registering the information, and then can freely come in and go out, and the identity authentication work is completed by the footprint identity authentication system laid at the entrance and the exit.
Disclosure of Invention
The invention provides an identity authentication system based on a footprint comparison method, and solves the problems that the security protection capability of security systems in related places of warehouses, banks and prisons is not strong enough and the operation process is troublesome at present.
(II) technical scheme
In order to achieve the purpose, the invention provides the following technical scheme: an identity authentication system based on a footprint comparison method comprises a supervision area, a gate channel, a footprint collector and a footprint authentication system, wherein a gate channel is respectively arranged in an entrance channel and an exit channel of the supervision area, and the footprint collector is arranged at an entrance end of the gate channel; the gate channel and the footprint collector are in communication connection with the footprint authentication system.
As optimization, the backbone network of the footprint authentication system is VGG11; firstly, splicing two footprint images to be compared in the depth direction, inputting the two footprint images into a VGG11 to extract comparison characteristics, inputting a 1000-dimensional vector output by the last layer of the VGG11 as a comparison characteristic vector into a Similarity Score Calculation Network (SSCN) designed by the invention, and calculating the similarity between the two footprints; if the similarity is larger than the set threshold value TH, the two footprints can be considered to belong to the same person, otherwise, the two footprints can be considered not to belong to the same person. In a footprint comparison network, the similarity fraction calculation network has two fully-connected layers, the fully-connected layer of the first layer receives a 1000-dimensional comparison feature vector output by a VGG11, the dimension is reduced to 30 dimensions, a BN (Batchnormalization) layer and a ReLU activation function layer are connected behind the fully-connected layer, the fully-connected layer of the second layer receives the 30-dimensional feature vector output by the first layer, a one-dimensional vector is output as a predicted similarity value, the similarity value cannot be directly used as a final similarity prediction result, and a Sigmoid activation function is required to be used for converting the similarity value into a value between 0 and 1 as a final prediction result.
A footprint comparison method comprises the following steps:
step 1: identity acquisition: collecting information of workers, wherein 1,2,3 represent identity information of three persons respectively, and when the information is registered, a plurality of footprint images of the three persons, and other information such as identity card numbers and job numbers are collected, wherein the footprint images of each person and the respective personal information are corresponding;
and 2, step: acquiring and preprocessing the footprint image and archiving information: after the footprint image of the registrant is preprocessed, irrelevant information on the image is removed, the image resolution is reduced to the extent that the image resolution can be stored in a larger scale without influencing the identity authentication precision, and after the preprocessing, the image acquired during the registration is filed and stored in a database;
and step 3: and (3) information comparison: when people enter the field, the people will collect their footprint images, then the images of the people and the images in the database form a comparison image pair, and the comparison image pair is sent to a footprint authentication system, and the footprint authentication system outputs the similarity scores between the images through the comparison of the images; assuming that the threshold TH =0.7 set by the system, the similarity between the footprint of the person performing identity authentication and the footprint 1 data is 0.8 > TH, which indicates that the person is person number 1 in the database; the comparison is passed, and the comparison can be released; if the similarity between any footprint image and the image to be authenticated is not larger than the threshold value in the database, the footprint authentication system considers that the person does not carry out information registration and does not pass.
As an optimization, the step 2: acquiring and preprocessing a footprint image, archiving information, and when the footprint is acquired: the collected person walks through the footprint collector, and the image collected by the footprint collector is a gray image with 256 gray levels;
preprocessing a footprint image: the purpose of preprocessing the image is mainly to remove noise on the image and scale information carried by a collecting instrument so as to facilitate image comparison, and reduce the size of the image so as to facilitate archiving.
As an optimization, the step 2: the footprint image acquisition preprocessing and information archiving method comprises the following steps:
a. removing the scale information on the footprint image, wherein the image fixed area acquired by the footprint collector is provided with scale information for calculating the size of the footprint, and the information has little use for footprint comparison, so that the information needs to be removed, and the specific operation is to directly assign the gray value of the image fixed area to 255;
b. denoising and footprint positioning are carried out based on an Otsu algorithm, and a distinguishing threshold th is determined based on the Otsu algorithm because a footprint area and a background area of the collected footprint image are easy to distinguish; the pixel points with the gray scale smaller than th in the image are regarded as points of the footprint area, the other points are regarded as backgrounds, and the footprint image can be scanned from four directions, namely the upper direction, the lower direction, the left direction and the right direction after the th is determined, four boundaries of the footprint area are detected, and therefore footprint positioning is completed; after the footprint positioning is completed, because most of the noise is outside the footprint area, the denoising work is actually completed at the moment;
c. adjusting the size of the footprint image and carrying out gray inversion, determining the position of the footprint area in the step b, wherein the distance between the upper boundary and the lower boundary of the footprint is larger than the distance between the left boundary and the right boundary under the general condition, so that the system considers that the footprint image with the distance between the upper boundary and the lower boundary smaller than the distance between the left boundary and the right boundary is an abnormal footprint image, and an alarm is sent out in the specific implementation of the system; after the distance between the upper boundary and the lower boundary is determined, a square area with the pixel value of 255 is defined, and the side length is the distance between the upper boundary and the lower boundary; then directly copying the footprint area to the midpoint of the square area, and subtracting the pixel value of each point of the square area by 255 to perform gray level inversion at the pixel level; and finally, downsampling the obtained square area, adjusting the resolution and storing.
As an optimization, the step 3: the information comparison comprises the following steps: step one, network training: dividing the collected footprint sample into two parts according to the collected object, wherein the footprint sample of one part of the object is used as a training set sample, and the other part of the object is used as a verification set sample; if two footprint images input into the network belong to the same person, the two images form a positive sample X with a label Y of 1, otherwise, the two images form a negative sample X with a label Y of 0; randomly sampling from a training set each time to obtain a Batch of (Batch) positive samples or negative samples, inputting the Batch of (Batch) positive samples or negative samples into a network for similarity calculation, and making an MSE loss on an output value and a label, wherein the loss expression is as follows:
Figure GDA0004070680010000051
/>
in the formula, B represents the batch size during training, FCN represents a footprint comparison network, and any sample X is input into the network to obtain a prediction label of the network;
during training, performing back propagation on the loss L of each batch of samples, and then optimizing the model by using a gradient descent method; when the training batches are enough, the network is equivalent to parameter optimization on all possible positive and negative sample spaces; performing model optimization by repeatedly and randomly extracting positive and negative samples, and gradually converging a model;
secondly, selecting a model: the model to be finally stored in the neural network generally needs to be selected from the trained intermediate models by using a verification set, enough samples need to be randomly selected from the verification set during model selection, the samples are input into the network for similarity calculation, if the similarity is more than 0.5, the model is regarded as the footprint of the same person, if the similarity is less than 0.5, the model is not the footprint of the same person, and the intermediate model with the highest footprint comparison accuracy is taken as the model to be finally stored.
(III) advantageous effects
The invention provides an identity authentication system based on a footprint comparison method. The method has the following beneficial effects:
the invention provides an identity authentication system based on a footprint comparison method, which can help a specific place of a warehouse, a bank and a prison to realize the automation of the identity authentication of an entrance and an exit; a footprint is one of the biological features that can characterize a person's identity information; the footprints are not required to be matched by the collected personnel in the collecting process, and the collecting device is arranged at a necessary position of an entrance and an exit of a relevant place; by adopting the identity authentication system of the footprint comparison method, internal personnel in related places only need to collect footprint data once when registering information, and then can freely come in and go out, and identity authentication work is completed by the footprint identity authentication system laid at an entrance and an exit; the problems that the safety protection capability of the security system in the related places of the warehouse, the bank and the prison is not strong enough and the operation process is troublesome at present are solved.
Drawings
FIG. 1 is a schematic structural diagram of the present invention.
FIG. 2 is a schematic view of the footprint image pre-processing process of the present invention.
FIG. 3 is a footprint comparison network diagram of the present invention.
FIG. 4 is a flowchart of footprint identity authentication of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
As shown in fig. 1 to 4, the present invention provides a technical solution: an identity authentication system based on a footprint comparison method comprises a supervision area, a gate channel, a footprint collector and a footprint authentication system, wherein a gate channel is respectively arranged in an entrance channel and an exit channel of the supervision area, and the footprint collector is arranged at an entrance end of the gate channel; the gate channel and the footprint collector are in communication connection with the footprint authentication system.
In this embodiment, the backbone network of the footprint authentication system is VGG11; firstly, splicing two footprint images to be compared in the depth direction, inputting the two footprint images into a VGG11 to extract comparison characteristics, inputting a 1000-dimensional vector output by the last layer of the VGG11 as a comparison characteristic vector into a Similarity Score Calculation Network (SSCN) designed by the invention, and calculating the similarity between the two footprints; if the similarity is larger than the set threshold value TH, the two footprints can be considered to belong to the same person, otherwise, the two footprints are considered not to belong to the same person. In the footprint comparison network, the similarity score calculation network has two total connection layers, the first layer of the total connection layer receives 1000-dimensional comparison feature vectors output by the VGG11, the dimension is reduced to 30 dimensions, a BN (Batchnormalization) layer and a ReLU activation function layer are connected behind the VGG11, the second layer of the total connection layer receives the 30-dimensional feature vectors output by the first layer, one-dimensional vectors are output as predicted similarity values, the similarity values cannot be directly used as final similarity prediction results, and the Sigmoid activation function is required to be converted into a value between 0 and 1 to serve as the final prediction results.
A footprint comparison method comprises the following steps:
step 1: identity acquisition: collecting information of workers, wherein 1,2,3 represent identity information of three persons respectively, and when the information is registered, a plurality of footprint images of the three persons, and other information such as identity card numbers and job numbers are collected, wherein the footprint images of each person and the respective personal information are corresponding;
step 2: acquiring and preprocessing the footprint image and archiving information: after the footprint image of the registrant is preprocessed, irrelevant information on the image is removed, the image resolution is reduced to the extent that the image resolution can be stored in a larger scale without influencing the identity authentication precision, and after the preprocessing, the image acquired during the registration is filed and stored in a database;
and 3, step 3: and (3) information comparison: when people enter the field, the people will collect their footprint images, then the images of the people and the images in the database form a comparison image pair, and the comparison image pair is sent to a footprint authentication system, and the footprint authentication system outputs the similarity scores between the images through the comparison of the images; assuming that the threshold TH =0.7 set by the system, the similarity between the footprint of the person performing identity authentication and the footprint 1 data is 0.8 > TH, which indicates that the person is person number 1 in the database; the comparison is passed, and the comparison can be released; if the similarity between any footprint image and the image to be authenticated is not larger than the threshold value in the database, the footprint authentication system considers that the person does not carry out information registration and does not pass.
In this embodiment, the step 2: acquiring and preprocessing a footprint image, archiving information, and when the footprint is acquired: the collected person walks through the footprint collector, and the image collected by the footprint collector is a gray image with 256 gray levels;
preprocessing a footprint image: the purpose of preprocessing the image is mainly to remove noise on the image and scale information carried by a collecting instrument so as to facilitate image comparison, and reduce the size of the image so as to facilitate archiving.
In this embodiment, the step 2: the footprint image acquisition preprocessing and information archiving method comprises the following steps:
a. removing the scale information on the footprint image, wherein the image fixed area acquired by the footprint collector is provided with scale information for calculating the size of the footprint, and the information has little use for footprint comparison, so that the information needs to be removed, and the specific operation is to directly assign the gray value of the image fixed area to 255;
b. denoising and footprint positioning are carried out based on an Otsu algorithm, and a distinguishing threshold th is determined based on the Otsu algorithm because a footprint area and a background area of the collected footprint image are easy to distinguish; the pixel points with the gray scale smaller than th in the image are regarded as points of the footprint area, the other points are regarded as backgrounds, and the footprint image can be scanned from four directions, namely the upper direction, the lower direction, the left direction and the right direction after the th is determined, four boundaries of the footprint area are detected, and therefore footprint positioning is completed; after footprint positioning is completed, because most of noise is outside the footprint area, the denoising work is actually completed at the moment;
c. adjusting the size of the footprint image and carrying out gray inversion, determining the position of the footprint area in the step b, wherein the distance between the upper boundary and the lower boundary of the footprint is larger than the distance between the left boundary and the right boundary under the general condition, so that the system considers that the footprint image with the distance between the upper boundary and the lower boundary smaller than the distance between the left boundary and the right boundary is an abnormal footprint image, and an alarm is sent out in the specific implementation of the system; after the distance between the upper boundary and the lower boundary is determined, a square area with the pixel value of 255 is defined, and the side length is the distance between the upper boundary and the lower boundary; then directly copying the footprint area to the midpoint of the square area, and subtracting the pixel value of each point of the square area from 255 to perform gray level inversion at the pixel level; and finally, downsampling the obtained square area, adjusting the resolution and storing.
In this embodiment, the step 3: the information comparison comprises the following steps:
step one, network training: dividing the collected footprint sample into two parts according to the collected object, wherein the footprint sample of one part of the object is used as a training set sample, and the other part of the object is used as a verification set sample;
if two footprint images input into the network belong to the same person, the two images form a positive sample X with a label Y of 1, otherwise, the two images form a negative sample X with a label Y of 0; randomly sampling from a training set each time to obtain a Batch of (Batch) positive samples or negative samples, inputting the Batch of (Batch) positive samples or negative samples into a network for similarity calculation, and making an MSE loss on an output value and a label, wherein the loss expression is as follows:
Figure GDA0004070680010000091
in the formula, B represents batch size during training, FCN represents footprint comparison network, and any sample X is input into the network to obtain a prediction label of the network;
during training, performing back propagation on the loss L of each batch of samples, and then optimizing the model by using a gradient descent method; when the training batches are enough, the network is equivalent to parameter optimization on all possible positive and negative sample spaces; through repeated random extraction of positive and negative samples for model optimization, the model is gradually converged finally;
secondly, selecting a model: the model to be finally stored in the neural network generally needs to be selected from the trained intermediate models by using a verification set, enough samples need to be randomly selected from the verification set during model selection, the samples are input into the network for similarity calculation, if the similarity is more than 0.5, the model is regarded as the footprint of the same person, if the similarity is less than 0.5, the model is not the footprint of the same person, and the intermediate model with the highest footprint comparison accuracy is taken as the model to be finally stored.
The working principle is as follows:
when the method is used, firstly, information is collected for workers, the collected people walk through a footprint collector, an image collected by the footprint collector is a gray image with 256 gray levels, a fixed image area collected by the footprint collector is provided with scale information for calculating the size of a footprint, the information has little use for footprint comparison, and therefore needs to be removed, the specific operation is that the gray value of the fixed image area is directly assigned to be 255, and the footprint area and a background area of the collected footprint image are easily distinguished, so that a distinguishing threshold th is determined based on an Otsu algorithm; the pixel points with the gray scale smaller than th in the image are regarded as points of the footprint area, the other points are regarded as backgrounds, and the footprint image can be scanned from four directions, namely the upper direction, the lower direction, the left direction and the right direction after the th is determined, four boundaries of the footprint area are detected, and therefore footprint positioning is completed; after the footprint positioning is completed, because most of the noise is outside the footprint area, the denoising work is actually completed at the moment; adjusting the size of the footprint image, carrying out gray inversion, and defining a square area with the pixel value of 255 after determining the distance between the upper boundary and the lower boundary, wherein the side length is the distance between the upper boundary and the lower boundary; then directly copying the footprint area to the midpoint of the square area, and subtracting the pixel value of each point of the square area by 255 to perform gray level inversion at the pixel level; finally, downsampling the obtained square area, adjusting the resolution ratio, storing the square area, collecting footprint images of personnel when the personnel enter the field in the using process, forming comparison image pairs by the images of the personnel and the images in the database, sending the comparison image pairs into a footprint authentication system, and outputting similarity scores between the images by the footprint authentication system through comparison of the images; assuming that the threshold TH =0.7 set by the system, the similarity between the footprint of the person performing identity authentication and the footprint 1 data is 0.8 > TH, which indicates that the person is person number 1 in the database; the comparison is passed, and the comparison can be released; if the similarity between any footprint image and the image to be authenticated is not larger than the threshold value in the database, the footprint authentication system considers that the person does not carry out information registration and does not pass.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (1)

1. An identity authentication system based on footprint comparison method is characterized in that: the system comprises a supervision area, gate channels, footprint collectors and a footprint authentication system, wherein one gate channel is respectively arranged in an entrance channel and an exit channel of the supervision area, and the footprint collectors are arranged at entrance ends of the gate channels; the gate channel and the footprint collector are in communication connection with the footprint authentication system; the footprint comparison method comprises the following steps: step 1: identity acquisition: collecting information of workers, wherein 1,2,3 represent identity information of three persons respectively, and when the information is registered, a plurality of footprint images of the three persons, and other information such as identity card numbers and job numbers are collected, wherein the footprint images of each person and the respective personal information are corresponding; step 2: acquiring and preprocessing the footprint image and archiving information: after the footprint image of the registrant is preprocessed, irrelevant information on the image is removed, the image resolution is reduced to the extent that the image resolution can be stored in a larger scale without influencing the identity authentication precision, and after the preprocessing, the image acquired during the registration is filed and stored in a database; and step 3: and (3) information comparison: when people enter the field, the people will collect their footprint images, then the images of the people and the images in the database form a comparison image pair, and the comparison image pair is sent to a footprint authentication system, and the footprint authentication system outputs the similarity scores between the images through the comparison of the images;
the step 2: acquiring and preprocessing a footprint image, archiving information, and when the footprint is acquired: the collected person walks through the footprint collector, and the image collected by the footprint collector is a gray image with 256 gray levels; preprocessing a footprint image: the purpose of preprocessing the image is mainly to remove noise on the image and acquire scale information carried by an instrument so as to facilitate image comparison, and reduce the size of the image so as to facilitate archiving;
the step 2: the footprint image acquisition preprocessing and information archiving method comprises the following steps: a. removing the scale information on the footprint image, wherein the image fixed area acquired by the footprint collector is provided with scale information for calculating the size of the footprint, and the information has little use for footprint comparison, so that the information needs to be removed, and the specific operation is to directly assign the gray value of the image fixed area to 255; b. denoising and footprint positioning are carried out based on an Otsu algorithm, and a distinguishing threshold th is determined based on the Otsu algorithm because a footprint area and a background area of the collected footprint image are easy to distinguish; taking pixel points with the gray scale smaller than th in the image as points of the footprint area, taking the rest points as backgrounds, scanning the footprint image from four directions, namely up, down, left and right after the th is determined, detecting four boundaries of the footprint area, and completing the footprint positioning; after the footprint positioning is completed, because most of the noise is outside the footprint area, the denoising work is actually completed at the moment; c. adjusting the size of the footprint image and carrying out gray inversion, determining the position of the footprint area in the step b, wherein the distance between the upper boundary and the lower boundary of the footprint is larger than the distance between the left boundary and the right boundary under the general condition, so that the system considers that the footprint image with the distance between the upper boundary and the lower boundary smaller than the distance between the left boundary and the right boundary is an abnormal footprint image, and an alarm is sent out in the specific implementation of the system; after the distance between the upper boundary and the lower boundary is determined, a square area with the pixel value of 255 is defined, and the side length is the distance between the upper boundary and the lower boundary; then directly copying the footprint area to the midpoint of the square area, and subtracting the pixel value of each point of the square area from 255 to perform gray level inversion at the pixel level; finally, the obtained square area is subjected to down-sampling, the resolution ratio is adjusted, and the square area is stored;
the step 3: the information comparison comprises the following steps: step one, network training: dividing the collected footprint sample into two parts according to the collected object, wherein the footprint sample of one part of the object is used as a training set sample, and the other part of the object is used as a verification set sample; if two footprint images input into the network belong to the same person, the two images form a positive sample X with a label Y of 1, otherwise, the two images form a negative sample X with a label Y of 0; randomly sampling from the training set each time to obtain a Batch of (Batch) positive samples or negative samples, inputting the Batch of (Batch) positive samples or negative samples into the network for similarity calculation, and making an MSE (mean Square error) by using an output value and a label
Loss, the expression for loss is:
Figure FDA0004070680000000031
in the formula, B represents the batch size during training, FCN represents a footprint comparison network, and any sample X is input into the network to obtain a prediction label of the network; during training, performing back propagation on the loss L of each batch of samples, and then optimizing the model by using a gradient descent method; when the training batches are enough, the network is equivalent to parameter optimization on all possible positive and negative sample spaces; through repeated random extraction of positive and negative samples for model optimization, the model is gradually converged finally; secondly, selecting a model: the model to be finally stored in the neural network generally needs to be selected from the trained intermediate models by using a verification set, enough samples need to be randomly selected from the verification set during model selection, the samples are input into the network for similarity calculation, if the similarity is more than 0.5, the model is regarded as the footprint of the same person, if the similarity is less than 0.5, the model is not the footprint of the same person, and the intermediate model with the highest footprint comparison accuracy is taken as the model to be finally stored.
CN202010912788.9A 2020-09-03 2020-09-03 Identity authentication system based on footprint comparison method Active CN112069482B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010912788.9A CN112069482B (en) 2020-09-03 2020-09-03 Identity authentication system based on footprint comparison method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010912788.9A CN112069482B (en) 2020-09-03 2020-09-03 Identity authentication system based on footprint comparison method

Publications (2)

Publication Number Publication Date
CN112069482A CN112069482A (en) 2020-12-11
CN112069482B true CN112069482B (en) 2023-04-07

Family

ID=73666392

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010912788.9A Active CN112069482B (en) 2020-09-03 2020-09-03 Identity authentication system based on footprint comparison method

Country Status (1)

Country Link
CN (1) CN112069482B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010261159A (en) * 2009-04-30 2010-11-18 Yamatake Corp System and method for room entry-exit control
CN103985175A (en) * 2014-05-21 2014-08-13 清华大学 Control method and system of home entrance guard
CN205091816U (en) * 2015-11-06 2016-03-16 天津大学 Personnel management system based on identity information
CN111382629A (en) * 2018-12-28 2020-07-07 中国科学院半导体研究所 Footprint identification and information mining method and system based on convolutional neural network
CN111402202A (en) * 2020-02-24 2020-07-10 安徽大学 Similarity evaluation method for plantar pressure images

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010261159A (en) * 2009-04-30 2010-11-18 Yamatake Corp System and method for room entry-exit control
CN103985175A (en) * 2014-05-21 2014-08-13 清华大学 Control method and system of home entrance guard
CN205091816U (en) * 2015-11-06 2016-03-16 天津大学 Personnel management system based on identity information
CN111382629A (en) * 2018-12-28 2020-07-07 中国科学院半导体研究所 Footprint identification and information mining method and system based on convolutional neural network
CN111402202A (en) * 2020-02-24 2020-07-10 安徽大学 Similarity evaluation method for plantar pressure images

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
一种基于CNN的足迹图像检索与匹配方法;陈扬等;《南京师范大学学报(工程技术版)》;20180930(第03期);39-45 *

Also Published As

Publication number Publication date
CN112069482A (en) 2020-12-11

Similar Documents

Publication Publication Date Title
US20180089187A1 (en) Image recognition method and image recognition apparatus
CN102629319B (en) Robust iris region segmentation method based on specific boundary detectors
CN101739555A (en) Method and system for detecting false face, and method and system for training false face model
CN113269070B (en) Pedestrian re-identification method fusing global and local features, memory and processor
CN113221086B (en) Offline face authentication method and device, electronic equipment and storage medium
US9378406B2 (en) System for estimating gender from fingerprints
CN109145704B (en) Face portrait recognition method based on face attributes
CN111488798B (en) Fingerprint identification method, fingerprint identification device, electronic equipment and storage medium
Srinidhi et al. Pothole detection using CNN and AlexNet
CN112069482B (en) Identity authentication system based on footprint comparison method
CN101276404A (en) System and method for quickly and exactly processing intelligent image
CN114445862A (en) Attendance detection method and system based on offline classroom monitoring
CN114840748A (en) Information pushing method, device and equipment based on face recognition and storage medium
Verma et al. Static Signature Recognition System for User Authentication Based Two Level Cog, Hough Tranform and Neural Network
JP4270842B2 (en) Fingerprint verification device
CN114550224A (en) Fingerprint image identification comparison method and device based on deep learning and electronic equipment
CN110533636B (en) Image analysis device
CN113591619A (en) Face recognition verification device based on video and verification method thereof
Daramola et al. Fingerprint verification system using support vector machine
CN111582440A (en) Data processing method based on deep learning
WO2020232889A1 (en) Check encashment method, apparatus and device, and computer-readable storage medium
CN112182537A (en) Monitoring method, device, server, system and storage medium
Ren et al. Large-scale pose-invariant face recognition using cellular simultaneous recurrent network
Privietha et al. Deep Learning Technic on Gait Analysis
CN113221088B (en) User identity identification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant