CN112241521A - Identity verification method and device of plosive, electronic equipment and medium - Google Patents

Identity verification method and device of plosive, electronic equipment and medium Download PDF

Info

Publication number
CN112241521A
CN112241521A CN202011396887.2A CN202011396887A CN112241521A CN 112241521 A CN112241521 A CN 112241521A CN 202011396887 A CN202011396887 A CN 202011396887A CN 112241521 A CN112241521 A CN 112241521A
Authority
CN
China
Prior art keywords
user
plosive
target
poetry
chinese character
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011396887.2A
Other languages
Chinese (zh)
Inventor
白世杰
吴富章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Yuanjian Information Technology Co Ltd
Original Assignee
Beijing Yuanjian Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Yuanjian Information Technology Co Ltd filed Critical Beijing Yuanjian Information Technology Co Ltd
Priority to CN202011396887.2A priority Critical patent/CN112241521A/en
Publication of CN112241521A publication Critical patent/CN112241521A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/40Scenes; Scene-specific elements in video content
    • G06V20/46Extracting features or characteristics from the video content, e.g. video fingerprints, representative shots or key frames
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/174Facial expression recognition
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L25/00Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00
    • G10L25/48Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 specially adapted for particular use
    • G10L25/51Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 specially adapted for particular use for comparison or discrimination

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computational Linguistics (AREA)
  • Signal Processing (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Acoustics & Sound (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The application provides a plosive authentication method, a plosive authentication device, electronic equipment and a plosive authentication medium, and relates to the technical field of authentication. The method comprises the following steps: acquiring a face image of a user acquired by a camera, and comparing the face image of the user with a face image in a preset database to obtain a face similarity; if the face similarity is larger than a preset threshold value, generating and prompting a user to read out a target poetry, wherein the target poetry comprises at least one plosive Chinese character; acquiring video data and audio data when a user reads out a target poem; and determining whether the identity of the user is successfully verified according to the video data and the audio data. In the embodiment of the application, video data and audio data when a user reads a target poem containing plosive Chinese characters can be obtained, and video positioning can be carried out on the video data according to the audio data containing the plosive. And the reliability of user identity authentication is improved by utilizing the matching analysis between the audio data and the video data.

Description

Identity verification method and device of plosive, electronic equipment and medium
Technical Field
The present application relates to the field of identity authentication technologies, and in particular, to a plosive identity authentication method, apparatus, electronic device, and medium.
Background
In key system login scenes such as mobile phone unlocking, mobile payment and remote identity authentication, face swiping operation is one of the most convenient and fast behavior modes, compared with password authentication, authentication is performed by using identity information of people, the method is safer and can represent personal operation, and the method is an effective means for preventing hacker attack.
In the prior art, under the condition that hardware such as an infrared sensor or a depth sensor is added mostly, the three-dimensional property of a human face is judged by utilizing a depth image, and the method can directly defend two-dimensional attacks, such as a non-bendable display screen of a mobile phone, a computer and the like, but has poor effect on bendable printed photos.
Therefore, the prior art can not reliably complete the identity authentication of the user and can not complete the accurate defense against the attack.
Disclosure of Invention
In order to solve the problems in the prior art, the application provides a plosive authentication method, a plosive authentication device, electronic equipment and a plosive authentication medium.
The first aspect of the present application provides an identity authentication method of plosive, including:
acquiring a face image of a user acquired by a camera, and comparing the face image of the user with a face image in a preset database to obtain a face similarity;
if the face similarity is greater than a preset threshold value, then:
generating and prompting a user to read a target poetry, wherein the target poetry comprises at least one plosive Chinese character;
acquiring video data and audio data when the user reads the target poetry;
and determining whether the identity of the user is successfully verified according to the video data and the audio data.
Optionally, the determining whether the identity of the user is successfully verified according to the video data and the audio data includes:
performing Chinese character recognition processing on the audio data, and determining a target time point for the user to read the plosive Chinese characters;
and performing closed mouth identification processing on the image of the target time point in the video data to determine whether the identity of the user is successfully verified.
Optionally, the performing chinese character recognition processing on the audio data to determine a target time point at which the user reads out the plosive includes:
carrying out Chinese character recognition processing on the audio data to obtain a recognized actual Chinese character sequence;
and if the actual Chinese character sequence is consistent with the Chinese character sequence of the target poetry, obtaining a target time point of the user for reading out the plosive according to the time point of the plosive Chinese characters in the actual Chinese character sequence in the audio data.
Optionally, the method further comprises:
and if the actual Chinese character sequence is not consistent with the Chinese character sequence of the target poetry, determining that the authentication of the user fails.
Optionally, the performing a closed mouth recognition process on the image at the target time point in the video data to determine whether the identity of the user is successfully verified includes:
and if the image of the target time point in the video data is identified to contain the mouth closing characteristic, determining that the identity verification of the user is successful.
Optionally, the generating and prompting the user to read out the target poetry includes:
selecting plosive Chinese characters from a preset plosive Chinese character library;
and if poems including the plosive Chinese characters exist in a preset poem library, taking the poems including the plosive Chinese characters as the target poems.
Optionally, the method further comprises:
if the poetry comprising the plosive Chinese characters does not exist in the preset poetry library, generating poetry comprising the plosive Chinese characters based on a poetry generating model, and taking the poetry comprising the plosive Chinese characters as the target poetry.
This application second aspect provides an authentication device of plosive, includes: an acquisition unit, a generation unit, and a determination unit;
the acquisition unit is used for acquiring a face image of a user acquired by a camera and comparing the face image of the user with a face image in a preset database to obtain a face similarity;
if the face similarity is larger than a preset threshold value, the generating unit is used for generating and prompting a user to read out a target poetry, and the target poetry comprises at least one plosive Chinese character;
the acquisition unit is also used for acquiring video data and audio data when the user reads out the target poetry;
the determining unit is used for determining whether the identity of the user is successfully verified according to the video data and the audio data.
Optionally, the determining unit is specifically configured to perform chinese character recognition processing on the audio data, and determine a target time point at which the user reads out the plosive chinese character;
and performing closed mouth identification processing on the image of the target time point in the video data to determine whether the identity of the user is successfully verified.
Optionally, the determining unit is specifically configured to perform chinese character recognition processing on the audio data to obtain a recognized actual chinese character sequence;
and if the actual Chinese character sequence is consistent with the Chinese character sequence of the target poetry, obtaining a target time point of the user for reading out the plosive according to the time point of the plosive Chinese characters in the actual Chinese character sequence in the audio data.
Optionally, the determining unit is further configured to determine that the authentication of the user fails if the actual chinese character sequence is inconsistent with the chinese character sequence of the target poetry.
Optionally, the determining unit is specifically configured to determine that the authentication of the user is successful if it is identified that the image at the target time point in the video data includes a mouth-closing feature.
Optionally, the generating unit is specifically configured to select a plosive Chinese character from a preset plosive Chinese character library;
and if poems including the plosive Chinese characters exist in a preset poem library, taking the poems including the plosive Chinese characters as the target poems.
Optionally, the generating unit is further configured to generate poems including the plosive characters based on a poem generation model if poems including the plosive characters do not exist in the preset poem library, and use the poems including the plosive characters as the target poems.
A third aspect of the present application provides an electronic device comprising: a processor, a storage medium and a bus, wherein the storage medium stores machine-readable instructions executable by the processor, and when the electronic device is operated, the processor communicates with the storage medium through the bus, and the processor executes the machine-readable instructions to perform the steps of the method according to the first aspect.
A fourth aspect of the present application provides a storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method according to the first aspect.
In a plosive authentication method, a plosive authentication device, an electronic device, and a medium provided by the application, the plosive authentication method includes: acquiring a face image of a user acquired by a camera, and comparing the face image of the user with a face image in a preset database to obtain a face similarity; if the face similarity is larger than a preset threshold value, generating and prompting a user to read out a target poetry, wherein the target poetry comprises at least one plosive Chinese character; acquiring video data and audio data when the user reads the target poetry; and determining whether the identity of the user is successfully verified according to the video data and the audio data. In the embodiment of the application, video data and audio data when a user reads a target poem containing plosive Chinese characters can be obtained, and video positioning can be carried out on the video data according to the audio data containing the plosive. And the reliability of user identity authentication is improved by utilizing the matching analysis between the audio data and the video data.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 is a schematic flowchart of an identity verification method of plosive provided in an embodiment of the present application;
fig. 2 is a schematic flowchart of an identity verification method of a plosive according to another embodiment of the present application;
fig. 3 is a schematic flowchart of an identity verification method of a plosive according to another embodiment of the present application;
fig. 4 is a schematic flowchart of an identity verification method of a plosive according to another embodiment of the present application;
fig. 5 is a schematic overall flowchart of an identity verification method for plosives according to an embodiment of the present application;
fig. 6 is a schematic diagram of an identity verification apparatus using a plosive according to an embodiment of the present disclosure;
fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it should be understood that the drawings in the present application are for illustrative and descriptive purposes only and are not used to limit the scope of protection of the present application. Additionally, it should be understood that the schematic drawings are not necessarily drawn to scale. The flowcharts used in this application illustrate operations implemented according to some embodiments of the present application. It should be understood that the operations of the flow diagrams may be performed out of order, and steps without logical context may be performed in reverse order or simultaneously. One skilled in the art, under the guidance of this application, may add one or more other operations to, or remove one or more operations from, the flowchart.
In addition, the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present application without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that in the embodiments of the present application, the term "comprising" is used to indicate the presence of the features stated hereinafter, but does not exclude the addition of further features.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
Furthermore, the terms "first," "second," and the like in the description and in the claims, as well as in the drawings, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that the features of the embodiments of the present application may be combined with each other without conflict.
In key system login scenes such as mobile phone unlocking, mobile payment and remote identity authentication, face swiping operation is one of the most convenient and fast behavior modes, compared with password authentication, authentication is performed by using identity information of people, the method is safer and can represent personal operation, and the method is an effective means for preventing hacker attack. In the prior art, under the condition that hardware such as an infrared sensor or a depth sensor is added mostly, the three-dimensional property of a human face is judged by utilizing a depth image, and the method can directly defend two-dimensional attacks, such as a non-bendable display screen of a mobile phone, a computer and the like, but has poor effect on bendable printed photos.
In order to solve the technical problems in the prior art, the present application provides an inventive concept: the method comprises the steps of obtaining video data and audio data when a user reads a target poem containing plosive Chinese characters, and simultaneously determining identity information of the user according to the audio data and the video data.
The following describes a specific technical solution provided by the present application through possible implementation manners.
Fig. 1 is a schematic flowchart of an identity verification method for plosives according to an embodiment of the present application, where an execution subject of the method may be a processing device such as an intelligent mobile device, a computer, a server, and the like. As shown in fig. 1, the method includes:
s101, acquiring a face image of a user acquired by a camera, and comparing the face image of the user with a face image in a preset database to obtain a face similarity.
It should be noted that the identity authentication method using a plosive according to the embodiment of the present application may be used for logging in a device, for example: and logging in before the intelligent mobile equipment is started for use. Login of applications on the device, for example: login of a payment treasure, login of different bank applications, login of a WeChat program and the like.
The face information of the user can be acquired through the built-in camera or the external camera of the equipment. When the face image verification method is used for logging in the equipment, the equipment only possibly prestores the face image of the owner of the equipment, and the face image is directly compared with the face image in the corresponding database of the equipment to obtain the similarity information of the face image to be verified. When the method is used for logging in an application program on a device, the method needs to be compared with a face image in an application server corresponding to the application program of the device, and exemplarily: the similarity between the face image corresponding to the login account information of the application program and the face image of the user can be compared.
In addition, the similarity between the face image of the user and the face image in the preset database can be obtained by calculation in the manner of euclidean distance and cosine similarity, and the embodiment of the present application is not particularly limited.
And S102, if the face similarity is larger than a preset threshold value, generating and prompting a user to read out a target poem, wherein the target poem comprises at least one plosive Chinese character.
In the embodiment of the application, when the similarity of the human face is greater than a preset threshold value, the target poetry is generated on the screen of the equipment and prompted to be read by a user. And when the similarity of the face is smaller than a preset threshold value, directly quitting the face image acquisition process of the user, and displaying that the identity authentication fails on the screen of the equipment.
It should be noted that the steps subsequent to this step are also performed when the face similarity is greater than the preset threshold, and if the face similarity is less than or equal to the preset threshold, it may be determined that the identification is failed, and this step and the subsequent steps are not performed.
The plosive is a sound generated by the sound-producing organ forming a barrier in the mouth and then the airflow breaking the barrier. In the embodiment of the present application, the plosive chinese characters may be, for example: the Chinese characters include the Chinese characters of a Chinese character ' ba ', bai ', ba, ben, jue, biao, sowing, brooding, lying on stomach, bat, pan, side, spray, cooking, batch, piece, chapter, float, slope, section, pounce, etc. In addition, the target poetry may include one or more hanks containing plosive, and the number of the specific hanks containing plosive is not limited in this embodiment.
S103, video data and audio data of the user reading the target poetry are obtained.
In the embodiment of the application, the video data and the audio data of the user are simultaneously acquired through the video acquisition module and the audio acquisition module on the equipment. The video data and the audio data are video and audio data when the user reads out the target poetry.
In one possible implementation, the target poetry containing the plosive may appear entirely on the device screen for the user to read. In another possible implementation, the target poetry containing the plosive may also appear on the screen of the device word by word, and when the user finishes reading one word, the next word is displayed. In the embodiment of the application, in order to improve the accuracy of voice acquisition, a second display mode can be adopted to display the target poetry on the screen of the equipment.
In addition, in order to accurately acquire the face image of the user, the angle information of the head portrait of the user can be acquired through the acquired video data. Wherein, the angle information of the user head portrait comprises: the method comprises the steps of detecting the head elevation angle, the rotation angle and the head side angle, and generating prompt information on a screen of the equipment when detecting that the angle information of the head portrait of the user is larger than a preset angle threshold value to prompt the user to put the head upright.
And S104, determining whether the identity of the user is successfully verified according to the video data and the audio data.
In the embodiment of the application, the user identity can be verified simultaneously according to the video data and the audio data. Optionally, a segment of video data may be intercepted by the audio data, and the video data is input to the pre-trained neural network in frames, and the user identity is verified by determining the continuity of the video data. In addition, picture data corresponding to screenshot from the video data can be captured through the audio data, the captured picture data is input into a pre-trained neural network, and the identity of the user is verified through recognizing expression characteristics of the face in the picture data.
According to the identity verification method of the plosive, a face image of a user collected by a camera is obtained, and the face image of the user is compared with a face image in a preset database to obtain a face similarity; if the face similarity is larger than a preset threshold value, generating and prompting a user to read out a target poetry, wherein the target poetry comprises at least one plosive Chinese character; acquiring video data and audio data when the user reads the target poetry; and determining whether the identity of the user is successfully verified according to the video data and the audio data. In the embodiment of the application, video data and audio data when a user reads a target poem containing plosive Chinese characters can be obtained, and video positioning can be carried out on the video data according to the audio data containing the plosive. And the reliability of user identity authentication is improved by utilizing the matching analysis between the audio data and the video data.
Fig. 2 is a schematic flow chart of an identity verification method for plosives according to another embodiment of the present application, and as shown in fig. 2, step S104 may specifically include:
s201, carrying out Chinese character recognition processing on the audio data, and determining a target time point for reading the plosive Chinese characters by a user.
In the embodiment of the application, the Chinese character recognition processing can be carried out on the audio data through the voice conversion technology, and the time point when the user reads the plosive Chinese character is determined as the target time point. Among them, the speech conversion technology is a processing technology for converting a natural language into a text output, for example: when the target poetry read by the user through voice is 'Mingri-Dai, Qingshan is a few times', the target poetry read orally is converted into the written target poetry through the voice conversion technology according to the reading sequence of the user, and the written target poetry is displayed on the electronic equipment. In addition, if the blast sound contained in the target poetry "a few times in the mountains, the tomorrow is" bar ", the time point of" bar "in the target speech is read by extraction and is taken as the target time point.
In addition, in order to improve the accuracy of the chinese character recognition processing, in the embodiment of the present application, before the chinese character recognition processing is performed on the audio data, denoising processing may be performed on the audio data. For example: technologies such as fast fourier transform, wavelet transform, and the like may be adopted, and the embodiment of the present application is not limited to a specific denoising technology.
S202, carrying out closed mouth identification processing on the image of the target time point in the video data, and determining whether the identity of the user is successfully verified.
In this embodiment, after determining the target time point when the user reads out the plosive Chinese character, the image at the corresponding target time point is captured from the video data. And carrying out closed mouth identification processing on the intercepted image to determine whether the identity of the user is successfully verified. Specifically, the intercepted image may be input to a facial expression recognition model to determine expression information of the intercepted image, and when the expression information in the intercepted image is closed mouth information, it is determined that the user identity authentication is passed. And when the expression information in the intercepted image is not the mouth closing information, determining that the user identity authentication fails.
The facial expression recognition model can be a model obtained by using a large number of training samples in advance, the facial expression recognition model can be a machine learning model, and the specific form of the facial expression recognition model is not limited in the application.
Fig. 3 is a schematic flow chart of an identity verification method for plosives according to another embodiment of the present application, and as shown in fig. 3, step S201 may further include:
s301, carrying out Chinese character recognition processing on the audio data to obtain a recognized actual Chinese character sequence.
In the embodiment of the application, in order to avoid mismatching between the acquired voice data and the generated target poetry, the voice recognition processing technology can be used for carrying out Chinese character recognition processing on the audio data to obtain a recognized actual Chinese character sequence.
In one implementation, if the actual sequence of Chinese characters is not consistent with the sequence of Chinese characters of the target poetry, it is determined that the user's authentication has failed.
In another implementation, if the actual sequence of the chinese characters is consistent with the sequence of the target poetry, the next step of the identity verification is performed, and the specific execution steps are as described in the following embodiments.
And S302, if the actual Chinese character sequence is consistent with the Chinese character sequence of the target poetry, obtaining a target time point of the user for reading the plosive according to the time point of the plosive Chinese characters in the actual Chinese character sequence in the audio data.
In the embodiment of the application, the time point of the plosive Chinese characters in the actual Chinese character sequence in the audio data is obtained by matching the actual Chinese character sequence with the Chinese character sequence of the target poetry, and the target time point is obtained.
It should be noted that, in the embodiment of the present application, when one plosive Chinese character exists in the Chinese character sequence of the target poetry, one target time point may be obtained correspondingly, and when two plosive Chinese characters exist in the Chinese character sequence of the target poetry, two target time points may be obtained correspondingly, that is, the number of the target time points corresponds to the number of the plosive Chinese characters existing in the Chinese character sequence of the target poetry.
Further, in order to complete the correspondence of the audio data and the video data in the time sequence, in the embodiment of the application, when the face is far away from the video acquisition frame of the camera and the camera cannot acquire the face image, the identity authentication fails and the identity authentication procedure is exited.
Optionally, the performing a closed mouth recognition process on the image at the target time point in the video data to determine whether the identity of the user is successfully verified includes:
and if the image of the target time point in the video data is identified to contain the mouth closing characteristic, determining that the identity verification of the user is successful.
Optionally, in this embodiment of the application, the expression information included in the image at the target time point may be determined by a pre-trained network model, for example, a facial expression recognition model. For example, images corresponding to all target time points may be input into the facial expression recognition model, expression feature recognition may be performed on the images corresponding to all target time points, and when the images at the target time points all include a mouth closing feature, it is determined that the identity verification of the user is successful.
In addition, when some images at the target time point contain the closed mouth feature, and some images do not contain the closed mouth feature, the authentication of the user is determined to fail.
Fig. 4 is a schematic flow chart of an identity verification method of plosive provided in another embodiment of the present application, and as shown in fig. 4, generating and prompting a user to read a target poem includes:
s401, selecting the plosive Chinese characters from a preset plosive Chinese character library.
S402, if poems including the plosive Chinese characters exist in the preset poem library, taking the poems including the plosive Chinese characters as target poems.
In the embodiment of the application, a certain number of plosive Chinese characters can be prestored as a preset plosive Chinese character library, and a preset number of plosive Chinese characters can be randomly selected from the preset plosive Chinese character library.
And matching the selected plosive Chinese characters with poetry characters in a preset poetry library, and taking the poetry containing the plosive Chinese characters as target poetry if the poetry characters in the preset poetry library contain the selected plosive Chinese characters.
Optionally, the method further comprises: if the poetry comprising the plosive Chinese characters does not exist in the preset poetry word library, generating the poetry comprising the plosive Chinese characters based on a poetry generating model, and taking the poetry comprising the plosive Chinese characters as target poetry.
In the embodiment of the application, a poetry generating model can be obtained by utilizing the existing poetry training language model containing plosive. When poems including the plosive Chinese characters do not exist in the preset poem library, the selected plosive Chinese characters can be input into a poem generation model to obtain poems including the plosive Chinese characters, and the poems including the plosive Chinese characters are used as target poems.
In order to clearly illustrate the identity verification method of a plosive of the present application, fig. 5 is a schematic overall flow chart of the identity verification method of a plosive provided in an embodiment of the present application. As shown in fig. 5, the method includes:
s501, acquiring a face image of a user acquired by a camera, and comparing the face image of the user with a face image in a preset database to obtain a face similarity.
And S502, if the face similarity is larger than a preset threshold value, generating and prompting a user to read out a target poem, wherein the target poem comprises at least one plosive Chinese character.
In the embodiment of the present application, the processing procedures of steps S501 to S502 are similar to those of steps S101 to S102 described above. In step S502, the process of generating the target poetry specifically refers to steps S401 to S402, which is not described in detail in this embodiment.
And S503, if the face similarity is less than or equal to the preset threshold, the identity authentication fails.
And if the face similarity is smaller than or equal to the preset threshold, the identity authentication fails and the identity authentication program is quitted.
S504, video data and audio data of the user reading the target poetry are obtained.
And S505, carrying out Chinese character recognition processing on the audio data to obtain a recognized actual Chinese character sequence.
Step S504 is similar to the step S103, and the step S505 is similar to the step S301, which is not repeated herein.
S506, matching the actual Chinese character sequence with the target poetry to obtain whether the actual Chinese character sequence is consistent with the target poetry.
And S507, if the actual Chinese character sequence is inconsistent with the Chinese character sequence of the target poetry, the identity verification fails.
And S508, if the actual Chinese character sequence is consistent with the Chinese character sequence of the target poetry, obtaining a target time point of the user for reading out the plosive according to the time point of the plosive Chinese characters in the actual Chinese character sequence in the audio data.
And matching the actual Chinese character sequence with the target poetry to judge whether the actual Chinese character sequence is consistent with the target poetry. And when the actual Chinese character sequence is inconsistent with the Chinese character sequence of the target poetry, determining that the user identity authentication fails. And when the actual Chinese character sequence is consistent with the Chinese character sequence of the target poetry, continuously executing the following steps.
S509, the image of the target time point in the video data is subjected to closed mouth identification processing, and whether the identity of the user is successfully verified is determined.
S510, if the image of the target time point in the video data is identified to contain the mouth closing feature, the identity verification of the user is determined to be successful.
The execution process of step S509 is similar to that of step S202, and is not repeated herein. In step S510, when it is recognized that the image at the target time point in the video data includes the mouth closing feature, and the image features at all the target time points include the mouth closing feature, it is determined that the authentication of the user is successful.
And S511, if the image of the target time point in the video data does not contain the mouth closing feature, determining that the authentication of the user fails.
And when the image of the target time point in the video data is identified not to contain the mouth closing feature, or the image feature of the partial target time point does not contain the mouth closing feature, determining that the authentication of the user fails.
The following describes a device, a storage medium, and the like corresponding to the method for performing identity authentication provided by the present application, and specific implementation processes and technical effects thereof are referred to above, and are not described in detail below.
Fig. 6 is a schematic diagram of an identity verification apparatus using a plosive according to an embodiment of the present disclosure, and as shown in fig. 6, the apparatus may include: an acquisition unit 501, a generation unit 502, and a determination unit 503;
the acquiring unit 501 is configured to acquire a face image of a user acquired by a camera, and compare the face image of the user with a face image in a preset database to obtain a face similarity;
if the face similarity is greater than the preset threshold, a generating unit 502 is used for generating and prompting a user to read out a target poetry, wherein the target poetry comprises at least one plosive Chinese character;
the acquiring unit 501 is further configured to acquire video data and audio data when a user reads out a target poem;
a determining unit 503, configured to determine whether the identity of the user is successfully verified according to the video data and the audio data.
Optionally, the determining unit 503 is specifically configured to perform chinese character recognition processing on the audio data, and determine a target time point when a user reads out a plosive chinese character;
and carrying out closed mouth identification processing on the image of the target time point in the video data to determine whether the identity of the user is successfully verified.
Optionally, the determining unit 503 is specifically configured to perform chinese character recognition processing on the audio data to obtain a recognized actual chinese character sequence;
and if the actual Chinese character sequence is consistent with the Chinese character sequence of the target poetry, obtaining a target time point of the user for reading the plosive according to the time point of the plosive Chinese characters in the actual Chinese character sequence in the audio data.
Optionally, the determining unit 503 is further configured to determine that the authentication of the user fails if the actual sequence of the chinese characters is inconsistent with the sequence of the target poetry.
Optionally, the determining unit 503 is specifically configured to determine that the authentication of the user is successful if it is identified that the image at the target time point in the video data includes the closed-mouth feature.
Optionally, the generating unit 502 is specifically configured to select a plosive Chinese character from a preset plosive Chinese character library;
and if poems including the plosive Chinese characters exist in the preset poem library, taking the poems including the plosive Chinese characters as target poems.
Optionally, the generating unit 502 is further configured to generate poems including the plosive characters based on the poem generating model if poems including the plosive characters do not exist in the preset poem library, and use the poems including the plosive characters as target poems.
Fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present application, including: a processor 710, a storage medium 720 and a bus 730, wherein the storage medium 720 stores machine-readable instructions executable by the processor 710, when the electronic device is operated, the processor 710 communicates with the storage medium 720 through the bus 730, and the processor 710 executes the machine-readable instructions to perform the steps of the above-mentioned method embodiments. The specific implementation and technical effects are similar, and are not described herein again.
The embodiment of the application provides a storage medium, wherein a computer program is stored on the storage medium, and the computer program is executed by a processor to execute the method.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device) or a processor (processor) to perform some steps of the methods according to the embodiments of the present application. And the aforementioned storage medium includes: a U disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (9)

1. A plosive identity authentication method is characterized by comprising the following steps:
acquiring a face image of a user acquired by a camera, and comparing the face image of the user with a face image in a preset database to obtain a face similarity;
if the face similarity is larger than a preset threshold value, generating and prompting a user to read out a target poetry, wherein the target poetry comprises at least one plosive Chinese character;
acquiring video data and audio data when the user reads the target poetry;
determining whether the identity of the user is successfully verified according to the video data and the audio data;
the determining whether the identity of the user is successfully verified according to the video data and the audio data includes:
performing Chinese character recognition processing on the audio data, and determining a target time point for the user to read the plosive Chinese characters;
and performing closed mouth identification processing on the image of the target time point in the video data to determine whether the identity of the user is successfully verified.
2. The method of claim 1, wherein said performing chinese character recognition processing on said audio data to determine a target time point for said user to read said plosive comprises:
carrying out Chinese character recognition processing on the audio data to obtain a recognized actual Chinese character sequence;
and if the actual Chinese character sequence is consistent with the Chinese character sequence of the target poetry, obtaining a target time point of the user for reading out the plosive according to the time point of the plosive Chinese characters in the actual Chinese character sequence in the audio data.
3. The method of claim 2, further comprising:
and if the actual Chinese character sequence is not consistent with the Chinese character sequence of the target poetry, determining that the authentication of the user fails.
4. The method according to claim 1, wherein the performing a closed mouth identification process on the image of the target time point in the video data to determine whether the identity verification of the user is successful comprises:
and if the image of the target time point in the video data is identified to contain the mouth closing characteristic, determining that the identity verification of the user is successful.
5. The method of any one of claims 1-4, wherein said generating and prompting a user to read a target poetry comprises:
selecting plosive Chinese characters from a preset plosive Chinese character library;
and if poems including the plosive Chinese characters exist in a preset poem library, taking the poems including the plosive Chinese characters as the target poems.
6. The method of claim 5, further comprising:
if the poetry comprising the plosive Chinese characters does not exist in the preset poetry library, generating poetry comprising the plosive Chinese characters based on a poetry generating model, and taking the poetry comprising the plosive Chinese characters as the target poetry.
7. An identity verification device of plosive, comprising: an acquisition unit, a generation unit, and a determination unit;
the acquisition unit is used for acquiring a face image of a user acquired by a camera and comparing the face image of the user with a face image in a preset database to obtain a face similarity;
if the face similarity is larger than a preset threshold value, the generating unit is used for generating and prompting a user to read out a target poetry, and the target poetry comprises at least one plosive Chinese character;
the acquisition unit is also used for acquiring video data and audio data when the user reads out the target poetry;
the determining unit is used for determining whether the identity of the user is successfully verified according to the video data and the audio data;
the determining unit is specifically configured to perform Chinese character recognition processing on the audio data, and determine a target time point at which the user reads out the plosive Chinese characters;
and performing closed mouth identification processing on the image of the target time point in the video data to determine whether the identity of the user is successfully verified.
8. An electronic device, comprising: a processor, a storage medium and a bus, the storage medium storing machine-readable instructions executable by the processor, the processor and the storage medium communicating via the bus when the electronic device is operating, the processor executing the machine-readable instructions to perform the steps of the method according to any one of claims 1-6.
9. A storage medium, having stored thereon a computer program which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 6.
CN202011396887.2A 2020-12-04 2020-12-04 Identity verification method and device of plosive, electronic equipment and medium Pending CN112241521A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011396887.2A CN112241521A (en) 2020-12-04 2020-12-04 Identity verification method and device of plosive, electronic equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011396887.2A CN112241521A (en) 2020-12-04 2020-12-04 Identity verification method and device of plosive, electronic equipment and medium

Publications (1)

Publication Number Publication Date
CN112241521A true CN112241521A (en) 2021-01-19

Family

ID=74175460

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011396887.2A Pending CN112241521A (en) 2020-12-04 2020-12-04 Identity verification method and device of plosive, electronic equipment and medium

Country Status (1)

Country Link
CN (1) CN112241521A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012128382A1 (en) * 2011-03-18 2012-09-27 Sharp Kabushiki Kaisha Device and method for lip motion detection
CN105989346A (en) * 2015-02-17 2016-10-05 天津市阿波罗信息技术有限公司 Composition method of large commodity online shopping mobile phone payment system
CN109461437A (en) * 2018-11-28 2019-03-12 平安科技(深圳)有限公司 The verifying content generating method and relevant apparatus of lip reading identification
CN109815806A (en) * 2018-12-19 2019-05-28 平安科技(深圳)有限公司 Face identification method and device, computer equipment, computer storage medium
CN111401134A (en) * 2020-02-19 2020-07-10 北京三快在线科技有限公司 Living body detection method, living body detection device, electronic apparatus, and storage medium
CN111898569A (en) * 2020-08-05 2020-11-06 福建工程学院 Face identification method based on living body detection

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012128382A1 (en) * 2011-03-18 2012-09-27 Sharp Kabushiki Kaisha Device and method for lip motion detection
CN105989346A (en) * 2015-02-17 2016-10-05 天津市阿波罗信息技术有限公司 Composition method of large commodity online shopping mobile phone payment system
CN109461437A (en) * 2018-11-28 2019-03-12 平安科技(深圳)有限公司 The verifying content generating method and relevant apparatus of lip reading identification
CN109815806A (en) * 2018-12-19 2019-05-28 平安科技(深圳)有限公司 Face identification method and device, computer equipment, computer storage medium
CN111401134A (en) * 2020-02-19 2020-07-10 北京三快在线科技有限公司 Living body detection method, living body detection device, electronic apparatus, and storage medium
CN111898569A (en) * 2020-08-05 2020-11-06 福建工程学院 Face identification method based on living body detection

Similar Documents

Publication Publication Date Title
CN106302330B (en) Identity verification method, device and system
CN109726624B (en) Identity authentication method, terminal device and computer readable storage medium
CN106599772B (en) Living body verification method and device and identity authentication method and device
CN112328999B (en) Double-recording quality inspection method and device, server and storage medium
CN106850648B (en) Identity verification method, client and service platform
WO2019153982A1 (en) Payment processing method and device, computer apparatus, and storage medium
WO2018233487A1 (en) Identity authentication method, terminal and storage medium
TW201907330A (en) Method, device, device and data processing method for identity authentication
US11188628B2 (en) Biometric challenge-response authentication
CN109635772A (en) Dictation content correcting method and electronic equipment
US20170302662A1 (en) Account information obtaining method, terminal, server and system
CN109450850A (en) Auth method, device, computer equipment and storage medium
CN109660509A (en) Login method, device, system and storage medium based on recognition of face
CN110348193A (en) Verification method, device, equipment and storage medium
CN101494690A (en) Mobile terminal and unlocking method thereof
CN106529379A (en) Method and device for recognizing living body
CN106529255B (en) Method for identifying ID and device based on person's handwriting fingerprint
CN109409058A (en) Identity identifying method, device and computer equipment based on electronic signature
CN109871834A (en) Information processing method and device
WO2020051971A1 (en) Identity recognition method, apparatus, electronic device, and computer-readable storage medium
CN112329750B (en) Digital sequence-based identity recognition method and device, electronic equipment and medium
CN112351047B (en) Double-engine based voiceprint identity authentication method, device, equipment and storage medium
JP2022177229A (en) Liveness detection verification method, liveness detection verification system, recording medium, and method for training liveness detection verification system
CN113627387A (en) Parallel identity authentication method, device, equipment and medium based on face recognition
CN110163164B (en) Fingerprint detection method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210119