CN113780029B - Verification method and equipment for novel three-dimensional code combined with portrait - Google Patents

Verification method and equipment for novel three-dimensional code combined with portrait Download PDF

Info

Publication number
CN113780029B
CN113780029B CN202111049877.6A CN202111049877A CN113780029B CN 113780029 B CN113780029 B CN 113780029B CN 202111049877 A CN202111049877 A CN 202111049877A CN 113780029 B CN113780029 B CN 113780029B
Authority
CN
China
Prior art keywords
picture
portrait
dimensional code
user
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111049877.6A
Other languages
Chinese (zh)
Other versions
CN113780029A (en
Inventor
陈绳旭
王秋婉
马吉良
何荣茂
李丽英
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cn3wm Xiamen Network Technology Co ltd
Original Assignee
Cn3wm Xiamen Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cn3wm Xiamen Network Technology Co ltd filed Critical Cn3wm Xiamen Network Technology Co ltd
Priority to CN202111049877.6A priority Critical patent/CN113780029B/en
Publication of CN113780029A publication Critical patent/CN113780029A/en
Application granted granted Critical
Publication of CN113780029B publication Critical patent/CN113780029B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code

Landscapes

  • Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Electromagnetism (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Image Analysis (AREA)

Abstract

The invention relates to a verification method of a novel three-dimensional code combined with a portrait, which comprises the following steps: acquiring a three-dimensional code, wherein the three-dimensional code comprises a portrait picture, a data code group and a positioning code group; extracting a positioning code group in the three-dimensional code; carrying out distortion correction on the portrait pictures and the data code groups according to the positioning code groups; acquiring a face picture of a user; judging whether the face picture of the user and the corrected face picture are the same face or not through a face recognition algorithm, and if so, verifying the identity of the user; otherwise, the user identity is not verified. According to the invention, visual information is provided for a user through the portrait pictures in the three-dimensional codes, and the user can identify the three-dimensional codes through the portrait pictures, so that user experience is improved; and the off-line verification of the user identity is realized by comparing the portrait pictures arranged in the three-dimensional code with the face pictures of the user, so that only the user can acquire the three-dimensional code data, the data security of the three-dimensional code is ensured, and the dependence of code scanning equipment on a network is also eliminated.

Description

Verification method and equipment for novel three-dimensional code combined with portrait
Technical Field
The invention relates to a verification method and equipment for a novel three-dimensional code combined with a portrait, belonging to the field of graphic coding.
Background
Two-dimensional codes are also called two-dimensional bar codes, and are image coding and expression forms of data information, and data symbol information is recorded by using a certain specific geometric figure which is distributed on a plane (in a two-dimensional direction) according to a certain rule and is black-white alternate figure. Because the two-dimensional code algorithm is open-source and can carry various data, the two-dimensional code algorithm becomes a mainstream coding mode on mobile equipment in recent years. Based on the characteristic of the two-dimension code algorithm open source, any person can acquire the data content in the two-dimension code by scanning the two-dimension code. For some two-dimensional codes which store special data, only a specific user can acquire the data content.
The prior art comprises the following steps: 1. the data content in the two-dimensional code is encrypted, so that only a user who knows the key can acquire the data content, but the key has leakage risk and the user experience is poor. 2. And collecting the biological characteristics of the user, and verifying the identity of the user according to the biological characteristics. However, the method stores the biological characteristics in the cloud, and the code verification equipment needs to be connected with the network to obtain verification results.
Patent publication No. CN110990814A discloses a method, a system, a device and a medium for authenticating a trusted digital identity, which comprises the following steps: s10, scanning a network card two-dimensional code presented by a user, and verifying the network card two-dimensional code to generate a network card two-dimensional code verification result; step S20, collecting a living body figure of a user according to the network card two-dimensional code verification result, and verifying the living body figure to generate a living body figure verification result; and step S30, outputting two information of the identity card according to the living body portrait verification result. The invention has the following defects: the code verification device needs to be connected with the network to obtain the verification result of the user portrait.
Disclosure of Invention
In order to solve the problems in the prior art, the invention provides a novel three-dimensional code verification method combined with a portrait, which realizes offline verification of user identity by comparing a portrait picture arranged in the three-dimensional code with a user face picture, ensures that only the user can acquire three-dimensional code data, ensures the data security of the three-dimensional code, and gets rid of the dependence of code scanning equipment on a network.
The technical scheme of the invention is as follows:
the technical scheme is as follows:
a verification method of a novel three-dimensional code combined with a portrait comprises the following steps:
acquiring a three-dimensional code, wherein the three-dimensional code comprises a portrait picture, a data code group and a positioning code group;
extracting a positioning code group in the three-dimensional code;
carrying out distortion correction on the portrait pictures and the data code groups according to the positioning code groups;
the user identity is verified, and the steps are as follows: acquiring a face picture of a user; judging whether the face picture of the user and the corrected face picture are the same face or not through a face recognition algorithm, if so, verifying the identity of the user, and decoding the data code group; otherwise, the user identity is not verified and the data code group is not decoded.
Further, the method further comprises the following steps: the three-dimensional code is verified, and the method specifically comprises the following steps:
pre-storing the portrait pictures;
acquiring the pre-stored portrait pictures; judging whether the pre-stored portrait pictures are consistent with the corrected portrait pictures or not through an image recognition algorithm, and if so, verifying the three-dimensional code; otherwise, the three-dimensional code is not validated.
Further, the step of judging whether the face picture of the user and the corrected face picture are the same face through the face recognition algorithm specifically comprises the following steps:
respectively inputting the corrected portrait picture and the user face picture into a deep learning model to obtain a first feature vector and a second feature vector; if the Euclidean distance between the first feature vector and the second feature vector is smaller than a first threshold value, the corrected portrait picture and the user face picture are considered to be the same face; otherwise, the corrected face image and the user face image are not considered to be the same face.
Further, the data code group and the positioning code group are arranged around the portrait picture.
Further, the method further comprises the following steps: decoding the corrected data code group to obtain encoded data, wherein the encoded data comprises an identifier; the identifier is used for indexing and inquiring to obtain the pre-stored portrait picture.
Further, the method further comprises the following steps: decoding the corrected data code group to obtain encoded data, wherein the encoded data comprises a function identifier; the function identifier is used for judging whether to verify the three-dimensional code or store the corrected portrait picture or store the encoded data.
The second technical scheme is as follows:
the verification device of a new three-dimensional code combined with portrait comprises a memory, a camera and a processor;
the camera is used for acquiring a three-dimensional code and a user face picture, wherein the three-dimensional code comprises a portrait picture, a data code group and a positioning code group;
the memory stores instructions adapted to be loaded by the processor and to perform the steps of: extracting a positioning code group in the three-dimensional code; carrying out distortion correction on the portrait pictures according to the positioning code groups; judging whether the face picture of the user and the corrected face picture are the same face or not through a face recognition algorithm, if so, the user identity passes the verification, and the data code group is decoded; otherwise, the user identity is not verified and the data code group is not decoded.
Further, the method further comprises the following steps: the three-dimensional code is verified, and the method specifically comprises the following steps:
pre-storing the portrait pictures;
acquiring the pre-stored portrait pictures; judging whether the pre-stored portrait pictures are consistent with the corrected portrait pictures or not through an image recognition algorithm, and if so, verifying the three-dimensional code; otherwise, the three-dimensional code is not validated.
Further, the step of judging whether the face picture of the user and the corrected face picture are the same face through the face recognition algorithm specifically comprises the following steps:
respectively inputting the corrected portrait picture and the user face picture into a deep learning model to obtain a first feature vector and a second feature vector; if the Euclidean distance between the first feature vector and the second feature vector is smaller than a first threshold value, the corrected portrait picture and the user face picture are considered to be the same face; otherwise, the corrected face image and the user face image are not considered to be the same face.
Further, the data code group and the positioning code group are arranged around the portrait picture.
Further, the method further comprises the following steps: decoding the corrected data code group to obtain encoded data, wherein the encoded data comprises an identifier; the identifier is used for indexing and inquiring to obtain the pre-stored portrait picture.
Further, the method further comprises the following steps: decoding the corrected data code group to obtain encoded data, wherein the encoded data comprises a function identifier; the function identifier is used for judging whether to verify the three-dimensional code or store the corrected portrait picture or store the encoded data.
The invention has the following beneficial effects:
1. the portrait pictures in the three-dimensional codes provide visual information for users, and the users can identify the three-dimensional codes through the portrait pictures, so that user experience is improved.
2. By comparing the portrait pictures arranged in the three-dimensional code with the face pictures of the user, the offline verification of the user identity is realized, the fact that only the user can acquire the three-dimensional code data is ensured, the data safety of the three-dimensional code is ensured, and the dependence of code scanning equipment on a network is also eliminated.
3. The portrait picture, the data code group and the positioning code group are taken as a whole, and the positioning code group is utilized to carry out distortion correction on the portrait picture, so that the accuracy of picture comparison during subsequent verification of user identity and verification of the three-dimensional code is improved, the data safety is ensured, and the accuracy of three-dimensional code verification is improved.
4. And the data code group and the positioning code group are arranged around the portrait picture, so that the size of the picture is not limited, the picture is not blocked by code points, and visual information conveyed by the picture is not influenced.
5. The invention sets the identifier in the coded data, inquires the portrait picture through the identifier index during code checking, and can prevent the picture or the data code group in the three-dimensional code from being tampered into other data.
6. The function identification is arranged in the coded data, the function of the three-dimensional code can be flexibly selected according to actual requirements, the portrait picture or the verification three-dimensional code is transferred or the data is transferred, the information transfer capacity (large picture data amount) of the three-dimensional code is increased, and the user experience is good.
Drawings
FIG. 1 is a three-dimensional code verification flow chart;
FIG. 2 is a three-dimensional code generation flow chart;
FIG. 3 is a three-dimensional code decoding flow chart in the fourth embodiment;
FIG. 4 is a schematic representation of a three-dimensional code;
fig. 5 is a schematic diagram of a corrector.
Detailed Description
The invention will now be described in detail with reference to the drawings and to specific embodiments.
Example 1
As shown in fig. 1, the code scanning device obtains a three-dimensional code picture through a camera, and the following steps are executed through a processor: extracting a positioning module in the three-dimensional code picture; carrying out distortion correction on the three-dimensional code picture through a positioning module; and extracting the portrait picture and the data code group in the corrected three-dimensional code picture.
And the camera acquires the face picture of the user. The processor performs the steps of: judging whether the face picture of the user and the corrected face picture are the same face or not through a face recognition algorithm, if so, verifying the identity of the user, and decoding the data code group; otherwise, the user identity is not verified and the data code group is not decoded.
The beneficial effects of this embodiment lie in:
1. the portrait pictures in the three-dimensional codes provide visual information for users, and the users can identify the three-dimensional codes through the portrait pictures, so that user experience is improved.
2. By comparing the portrait pictures arranged in the three-dimensional code with the face pictures of the user, the offline verification of the user identity is realized, the fact that only the user can acquire the three-dimensional code data is ensured, the data safety of the three-dimensional code is ensured, and the dependence of code scanning equipment on a network is also eliminated.
3. The portrait picture, the data code group and the positioning code group are taken as a whole, and the positioning code group is utilized to carry out distortion correction on the portrait picture, so that the accuracy of picture comparison during subsequent verification of user identity and verification of the three-dimensional code is improved, the data safety is ensured, and the accuracy of three-dimensional code verification is improved.
Example two
Referring to fig. 2, the three-dimensional code is generated as follows:
and obtaining a portrait picture. An identifier is generated that identifies the portrait picture, which in this embodiment is a string of 36-bit characters. The portrait pictures and identifiers are stored in a server, and the identifiers are associated with the storage addresses of the portrait pictures in the server, as shown in table 1.
TABLE 1
Encoded data is generated, the encoded data including a function identification and a data field. When the function identifier is 00, the three-dimensional code is used for transmitting the portrait picture, the data field does not contain an identifier, and the three-dimensional code is not verified; when the function identifier is 01, the three-dimensional code is used for transmitting a data field, and the data field does not contain an identifier and is not verified; when the function identifier is 10, the data field contains an identifier, and the three-dimensional code needs to be verified; when the function identifier is 11, the three-dimensional code is used to transfer the data field, and the data field contains the identifier, which requires verification.
The encoded data is converted into a binary stream, data 0 is the white code point and data 1 is the black code point. And arranging the code points around the portrait pictures according to a preset rule to obtain a data code group. In this embodiment, the code points are sequentially arranged in the counterclockwise direction in four rectangular areas outlined in fig. 4. Generating a positioning module, wherein the positioning module comprises three positioners and a corrector. In this embodiment, the locator is a rectangular frame embedded with a black square, and the corrector (as shown in fig. 5) includes a quarter rectangular frame and the black square. The black square blocks in the corrector occupy larger area proportion in the corrector, have higher anti-fouling capability and are easier to identify, thereby being beneficial to improving the success rate of distortion correction. And adding positioning modules at four corners outside the portrait picture to obtain a three-dimensional code, as shown in fig. 4. In the embodiment, a mask is further overlapped on the three-dimensional code, so that black and white code points are distributed more uniformly, and the difficulty of decoding the three-dimensional code is increased.
The beneficial effects of this embodiment lie in: and the data code group and the positioning code group are arranged around the portrait picture, so that the size of the picture is not limited, the picture is not blocked by code points, and visual information conveyed by the picture is not influenced.
Example III
The process of converting encoded data into a binary stream is illustrated:
the encoded data includes: a start field, a count field, a function identification, and a data field. The encoded data is converted into a binary stream.
The data fields are: 002/0002937c-62a9-4934-9ee0-6a1b703ebb a start field of 10, count field of 00101000, function identification of 10.
The binary stream obtained after encoding is:
001100000011000000110010001011110011000000110000001100 0000110010001110010011001100110111011000110010110100110110 0011001001100001001110010010110100110100001110010011001100 1101000010110100111001011001010110010100110000001011010011 0110011000010011000101100010001101110011000000110011011001 0101100010011000100011001100110101
example IV
In the second embodiment, the correspondence between the portrait picture, the identifier and the address of the portrait picture stored in the server is stored in the server in advance.
As shown in fig. 3, the decoding step of the three-dimensional code is as follows:
s1, the decoding end shoots the three-dimensional code to obtain a three-dimensional code picture.
S2, extracting a positioning module in the three-dimensional code picture; carrying out distortion correction on the three-dimensional code picture through a positioning module;
s3, extracting a portrait picture and a data code group in the corrected three-dimensional code picture;
s4, verifying the identity of the user, wherein the steps are as follows: acquiring a face picture of a user; the decoding end is provided with a deep learning model facenet, and the corrected portrait picture and the user face picture are respectively input into the deep learning model facenet to obtain a first feature vector and a second feature vector; if the Euclidean distance between the first feature vector and the second feature vector is smaller than a first threshold value, the corrected portrait picture is considered to be consistent with the user face picture, and the next step is continued; otherwise, the corrected portrait picture is not consistent with the user face picture, decoding is stopped, and the fact that the user identity verification is not passed is displayed.
S5, converting the data code group into coded data; judging the function of the three-dimensional code according to the function identification in the coded data: if the function identifier is 00, the three-dimensional code is not verified, and the decoding end stores the portrait picture; if the function identifier is 10, the three-dimensional code is verified, specifically:
the decoding end sends the identifier in the encoded data to a server; inquiring a storage address by the server according to the identifier to obtain a pre-stored portrait picture in the server, and returning the pre-stored portrait picture to the decoding end;
the criterion for judging whether the pre-stored portrait pictures are consistent with the corrected portrait pictures comprises the following steps: the two pictures are completely consistent or the two pictures are the same face. The embodiment does not require the pictures to be completely consistent, and only the same face is required. The decoding end inputs the pre-stored portrait pictures to a deep learning model facenet to obtain a third feature vector; if the Euclidean distance between the first feature vector and the third feature vector is smaller than a first threshold value, the portrait picture is considered to be consistent with the pre-stored portrait picture; otherwise, the portrait picture is not consistent with the pre-stored portrait picture.
The progress of this embodiment is that:
1. the identifier is arranged in the coded data, and the portrait picture is queried through the identifier index during code checking, so that the picture or the data code group in the three-dimensional code can be prevented from being tampered into other data.
2. The function identification is arranged in the coded data, the function of the three-dimensional code can be flexibly selected according to actual requirements, the portrait picture or the verification three-dimensional code is transferred or the data is transferred, the information transfer capacity (large picture data amount) of the three-dimensional code is increased, and the user experience is good.
3. And comparing the corrected human image picture with a pre-stored human image picture and comparing the corrected human image picture with a user face picture by using the deep learning model, so that the user can automatically change the face image in the code, and the user experience is improved.
The foregoing description is only illustrative of the present invention and is not intended to limit the scope of the invention, and all equivalent structures or equivalent processes or direct or indirect application in other related technical fields are included in the scope of the present invention.

Claims (8)

1. The verification method of the novel three-dimensional code combined with the portrait is characterized by comprising the following steps:
acquiring a three-dimensional code, wherein the three-dimensional code comprises a portrait picture, a data code group and a positioning code group;
extracting a positioning code group in the three-dimensional code;
carrying out distortion correction on the portrait pictures and the data code groups according to the positioning code groups;
the user identity is verified, and the steps are as follows: acquiring a face picture of a user; judging whether the face picture of the user and the corrected face picture are the same face or not through a face recognition algorithm, if so, verifying the identity of the user, and decoding the data code group; otherwise, the user identity is not verified and the data code group is not decoded;
decoding the corrected data code group to obtain encoded data, wherein the encoded data comprises an identifier;
the three-dimensional code is verified, and the method specifically comprises the following steps: pre-storing the portrait pictures; inquiring a storage address according to the identifier index in the coded data to obtain a portrait picture prestored in a server; judging whether the pre-stored portrait pictures are consistent with the corrected portrait pictures or not through an image recognition algorithm, and if so, verifying the three-dimensional code; otherwise, the three-dimensional code is not validated.
2. The method for verifying a novel three-dimensional code combined with a human figure according to claim 1, wherein the method for judging whether the human face picture of the user and the corrected human figure picture are the same human face through a human face recognition algorithm is specifically as follows:
respectively inputting the corrected portrait picture and the user face picture into a deep learning model to obtain a first feature vector and a second feature vector; if the Euclidean distance between the first feature vector and the second feature vector is smaller than a first threshold value, the corrected portrait picture and the user face picture are considered to be the same face; otherwise, the corrected face image and the user face image are not considered to be the same face.
3. The method of claim 1, wherein the data code set and the location code set are arranged around the portrait picture.
4. The method for verifying a novel three-dimensional code in combination with a portrait of claim 1, further comprising: decoding the corrected data code group to obtain encoded data, wherein the encoded data comprises a function identifier; the function identifier is used for judging whether to verify the three-dimensional code or store the corrected portrait picture or store the encoded data.
5. The verification device of the novel three-dimensional code combined with the portrait is characterized by comprising a memory, a camera and a processor;
the camera is used for acquiring a three-dimensional code and a user face picture, wherein the three-dimensional code comprises a portrait picture, a data code group and a positioning code group;
the memory stores instructions adapted to be loaded by the processor and to perform the steps of:
extracting a positioning code group in the three-dimensional code;
carrying out distortion correction on the portrait pictures and the data code groups according to the positioning code groups;
judging whether the face picture of the user and the corrected face picture are the same face or not through a face recognition algorithm, if so, the user identity passes the verification, and the data code group is decoded; otherwise, the user identity is not verified and the data code group is not decoded;
decoding the corrected data code group to obtain encoded data, wherein the encoded data comprises an identifier;
the three-dimensional code is verified, and the method specifically comprises the following steps: pre-storing the portrait pictures; inquiring a storage address according to the identifier index in the coded data to obtain a portrait picture prestored in a server; judging whether the pre-stored portrait pictures are consistent with the corrected portrait pictures or not through an image recognition algorithm, and if so, verifying the three-dimensional code; otherwise, the three-dimensional code is not validated.
6. The device for verifying a new three-dimensional code combined with a human figure according to claim 5, wherein the method for judging whether the human face picture of the user and the corrected human figure picture are the same human face by a human face recognition algorithm is specifically as follows:
respectively inputting the corrected portrait picture and the user face picture into a deep learning model to obtain a first feature vector and a second feature vector; if the Euclidean distance between the first feature vector and the second feature vector is smaller than a first threshold value, the corrected portrait picture and the user face picture are considered to be the same face; otherwise, the corrected face image and the user face image are not considered to be the same face.
7. The authentication device of claim 5, wherein the data code set and the location code set are arranged around the portrait picture.
8. The authentication device of a novel three-dimensional code incorporating a portrait of claim 5, further comprising: decoding the corrected data code group to obtain encoded data, wherein the encoded data comprises a function identifier; the function identifier is used for judging whether to verify the three-dimensional code or store the corrected portrait picture or store the encoded data.
CN202111049877.6A 2021-09-08 2021-09-08 Verification method and equipment for novel three-dimensional code combined with portrait Active CN113780029B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111049877.6A CN113780029B (en) 2021-09-08 2021-09-08 Verification method and equipment for novel three-dimensional code combined with portrait

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111049877.6A CN113780029B (en) 2021-09-08 2021-09-08 Verification method and equipment for novel three-dimensional code combined with portrait

Publications (2)

Publication Number Publication Date
CN113780029A CN113780029A (en) 2021-12-10
CN113780029B true CN113780029B (en) 2024-01-23

Family

ID=78841748

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111049877.6A Active CN113780029B (en) 2021-09-08 2021-09-08 Verification method and equipment for novel three-dimensional code combined with portrait

Country Status (1)

Country Link
CN (1) CN113780029B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106330464A (en) * 2016-10-26 2017-01-11 上海众人网络安全技术有限公司 Identity authentication method, device and system
CN110990814A (en) * 2019-10-29 2020-04-10 新大陆(福建)公共服务有限公司 Trusted digital identity authentication method, system, equipment and medium
CN111241860A (en) * 2019-12-31 2020-06-05 徐波 Positioning and decoding method for arbitrary material annular code
JP6779397B1 (en) * 2020-02-05 2020-11-04 株式会社セブン銀行 Identity verification device and program
CN112307875A (en) * 2020-07-16 2021-02-02 新大陆数字技术股份有限公司 Face verification method and face verification system
CN113011307A (en) * 2021-03-15 2021-06-22 东北大学 Face recognition identity authentication method based on deep residual error network

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106330464A (en) * 2016-10-26 2017-01-11 上海众人网络安全技术有限公司 Identity authentication method, device and system
CN110990814A (en) * 2019-10-29 2020-04-10 新大陆(福建)公共服务有限公司 Trusted digital identity authentication method, system, equipment and medium
CN111241860A (en) * 2019-12-31 2020-06-05 徐波 Positioning and decoding method for arbitrary material annular code
JP6779397B1 (en) * 2020-02-05 2020-11-04 株式会社セブン銀行 Identity verification device and program
CN112307875A (en) * 2020-07-16 2021-02-02 新大陆数字技术股份有限公司 Face verification method and face verification system
CN113011307A (en) * 2021-03-15 2021-06-22 东北大学 Face recognition identity authentication method based on deep residual error network

Also Published As

Publication number Publication date
CN113780029A (en) 2021-12-10

Similar Documents

Publication Publication Date Title
US10798081B2 (en) Method, apparatus, and system for providing a security check
US10374789B2 (en) Encrypting and decrypting information
Fang et al. Screen-shooting resilient watermarking
CN104834839B (en) A kind of code generating method, method for authenticating and associated terminal based on bar code
US20180150623A1 (en) Authentication Methods and Systems
WO2015179640A1 (en) Method, apparatus, and system for providing a security check
CN108491913B (en) Method for authenticating QR (quick response) code with secret beautification function
CN113780029B (en) Verification method and equipment for novel three-dimensional code combined with portrait
Wan et al. Multiple security anti-counterfeit applications to QR code payment based on visual secret sharing and QR code
Duda et al. Image-like 2d barcodes using generalizations of the Kuznetsov–Tsybakov problem
CN108830364A (en) A kind of Dynamic Two-dimensional code generating method and system
CN110084329A (en) The set code method of centre letter code
CN113987446A (en) Authentication method and device
CN106503771A (en) A kind of Quick Response Code fidelity systems
CN113780028B (en) Verification method and device for novel three-dimensional code combined with picture
CN109064375B (en) Zero watermark-based large data property identification method and system
US20220391327A1 (en) Methods for enrolling data in order to verify the authenticity of a security datum or for verifying the authenticity of a security datum
CN108108629A (en) Power equipment approaches to IM based on Quick Response Code
CN109391616B (en) Information management method and terminal
CN114494474B (en) Generation method, verification method and device of universal verification code of human and legal equipment
Kim et al. Design of an efficient image protection method based on QR code
Arjona López et al. Post-quantum biometric authentication based on homomorphic encryption and classic McEliece
CN113378623A (en) Face recognition method and system based on negative database algorithm encryption
Belhadri et al. New biometric cryptosystem to protect sensitive data in Internet of objects
CN114491619A (en) Face authentication identification method, face authentication identification device, storage medium and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant