TW200530943A - Digital security system - Google Patents

Digital security system Download PDF

Info

Publication number
TW200530943A
TW200530943A TW93106078A TW93106078A TW200530943A TW 200530943 A TW200530943 A TW 200530943A TW 93106078 A TW93106078 A TW 93106078A TW 93106078 A TW93106078 A TW 93106078A TW 200530943 A TW200530943 A TW 200530943A
Authority
TW
Taiwan
Prior art keywords
enter
person
scope
item
dimensional image
Prior art date
Application number
TW93106078A
Other languages
Chinese (zh)
Inventor
Chi-Hsien Shih
Original Assignee
Avermedia Tech Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Avermedia Tech Inc filed Critical Avermedia Tech Inc
Priority to TW93106078A priority Critical patent/TW200530943A/en
Publication of TW200530943A publication Critical patent/TW200530943A/en

Links

Landscapes

  • Collating Specific Patterns (AREA)

Abstract

A digital security system includes a 3-D camera, a 3-D image-retrieving device, a database, a 3-D image comparison device, and a controlling device. The 3-D camera is used to obtain the 3-D image of an entrant. The 3-D image-retrieving device is used to retrieve the relative distance of facial features in the 3-D image. The 3-D image comparison device is used to compare the facial features distance of the entrant and the record in the database. The controlling device decides whether the entrant can enter the digital security system according to the comparison result.

Description

200530943 玖、發明說明 【發明所屬之技術領域】 本發明係關於一種數位保全系統,且更具體地,本發 明係關於一種利用臉部三維影像進行辨識之數位保全^ 統。 ’、 【先前技術】 現今一般之保全系統,大多使用刷卡方式作為管制人員 進出之方式。但此種採用刷卡機制之保全系統,經常會發 生卡片遺失或遭冒用之情形,使得保全系統之管制機制產 生漏洞。故隨之發展出採用生物特徵作為辨識基礎之保全 系統。因每個人所擁有之生物特徵均不同,故使用生物 特徵作為辨識機制之保全系統將具有較高之專一性與安 全性。使用生物特徵作為辨識之方式包含臉部辨識,語音 辨識,指紋辨識,視網膜辨識,與虹膜 用臉部特徵作為身份辨識之優點在於可身;二; 之可能性減至最低,可更精確地辨識人員之身份。 第1圖係繪示習知技藝之臉部辨識方法。當欲進入者 10欲進入保全系統時,雷射光源12乃產生一雷射格柵14, 投射於欲進入者10之臉部。雷射格栅14乃作為一座標尺 規,藉由紀錄臉部特徵於雷射格柵14之位置,以測量臉部 特徵間之相對距離。但此種臉部辨識方式具有數個缺點。 首先’雷射光源12所產生之雷射格柵14解析度有限,故 無法精確地測量臉部特徵間之相對距離。且#雷射格拇14 200530943 投射於欲進人纟1G之臉科,因人體臉部並非—平碎表 面,將造成雷射格栅u變形成為—曲面,而造成测量:之 誤差,進一步於比對時產生辨識錯誤之情況。 因此需要-種改進之保全系統,得以更精確地辨識臉 部特徵間之相對距離,以降低發生辨識錯誤之情 言 保全系統之可靠性。 间 【發明内容】 維影像進 因此本發明之一目的係提供一種藉由臉部三 行辨識之數位保全系統。 種藉由臉部三維影像辨識 本發明之另一目的係提供一 之數位保全系統管控方法。 …根據本發明之上述目的,提出_種藉由臉部三維影像 =仃辨識之數位保全系統。根據本發明之數位保全系統, 各有一維影像成像裝置,三維影像擷取裝置,資料庫,三 維〜像比對裝i ’以及管制裝置。三維影像成像裝置乃用 以成像奴進入者之臉部三維影像。三維影像擷取裝置用以 擷取臉部三維影像中,臉部特徵間之相對距離。資料庫乃 儲存允卉進入者之臉部紀錄,每一臉部紀錄含有每一允呼 進入者之臉部特徵間之相對距離。三維影 ^ 者臉部特徵間之相對距離,逐一與資料庫中,允 、者之臉部紀錄比較,並產生一比較結果。隨後,其 制裝置根據三維影像比對裝置產生之比較結果 : 否允許欲進入者進入。 兴疋疋 200530943 根據本發明之另-目的,提出一種藉由臉部三維影像 辨識之數位保全系統管控方法。根據本發明之數位保全系 統管控方法,首先成像欲進入者之臉部三維影像。接著, 擷取臉部三維影像中,臉部特徵間之相對距離。隨後,針 對欲進入者臉部特徵間之相對距離,盘一 允許進人者之臉部紀錄比較,並產生—比較結 根據此比對結果,以決定是否允許欲進入者進入。 ,、、根據本發明之數位保全系統,可更快速且準確地辨識 欲進入者之身❾。即使欲進人者藉由化妝改變其外貌,但 其臉部特徵之相對距離並不會因此而改變,故仍可正確地 進打辨識。且根據本發明之臉部特徵辨識方法,無須使用 田射秸柵,故亦無測量誤差而造成辨識錯誤之情形發生。 根據本發明之數位保全系統,可用於許多場合之門荦管 制,例如公家軍警政單位、大型企業工廠、教育單Z, J i行號、社區、員工進出管制、一般居家防盜設備等。 【實施方式】 請參照第2圖,係繪示依照本發明之數位保全系統示 意圖。根據本發明之數位保全系統2〇,含有三維影像成像 裝置22,三維影像擷取裝置24,資料庫26,三維影像比對 裝置28,與管制裝置29。三維影像成像裝置22乃用以獲 取欲進入者之臉部三維影像。三維影像擷取裝置24接著對 於此臉部三維影像進行辨識,擷取此臉部三維影像中,所 有臉部特徵之位置與彼此間之相對距離。三維影像比對裝 200530943 置28接著將三維影像擷取裝置24所擷取之臉部特徵間相 對距離,與資料庫26中所儲存之臉部紀錄進行比較,資料 庫26所儲存之臉部紀錄乃含有所有允許進入之人員,其臉 部特徵間相對距離之資料。隨後,管制裝置29根據三維影 像比對裝置28產生之比較結果,以決定是否允許欲進入者 進入,或啟動其他之保全措施。 第3圖與第4圖乃以一較佳具體實施例,進一步說明 根據本發明之數位保全系統。第3圖係繪示根據本發明之 臉部辨識方式示意圖。當一欲進入者1〇欲進入數位保全系 統20時,三維影像成像裝置22,例如一雙鏡頭數位立體 成像相機,對於欲進入者10進行成像,以獲得欲進入者1〇 之臉部三維影像。三維影像成像裝置22可進一步設計為可 自動感應名欠進入I 10之接近,並提示欲進入纟10若欲進 入,需先進行影像攝取之步驟。 三維影像擷取裝置24接著對於三維影像成像裝置22 所攝取之臉部二維影像進行辨識。首先係辨識所攝得之 部三維影像中,各個臉部特徵之位置。此臉部特徵例如為 眉毛’眼睛,袅早,峻pr 甘 # M ^ 耳木專,並標示出每個臉部特 位址。例如,帛4圖⑩示㈣取之-臉部三維 純,於此臉部三維f彡像巾,將右眉靠近 心 …一夺另一鳊點軚示為h,將左眉靠近臉部 ^ 點標不為Ν,並將另一端點標示為b2。 :似地’可將右眼靠近臉部中心之端點標 另一端點標示為c 验士日土 將 為2將左眼罪近臉部中心之端點標示為七, 200530943 下端點右耳之上端點標示為… 二了為左耳之上端點標示為fl,下端點標示為 二亡山77'尖標不為h,並將嘴巴之右端點標示為gI, 將左端點標示為g2。 =,任意擁取兩端點間之距離,例如,擷取端點〜 至1點ba距離’此距離乃表示兩眉中心端點間之距離。 於此具體實施例_,可擷取之端點有a,、a2、bl、b2、Ci、 '62 6、gl、g2、h,故任意擷取兩端點 =料形成c,/種組合。監控人員可根據所需精確度而 ^取適¥之端點,當擁取之端點越多時,所形成之距離组 口可月Μ生也越多,則於進行比對之步驟時,產生辨識錯誤 之可能性也越低。 例如’於本較佳具體實施例中,為說明目的,乃選取 七個端點間之距離’分別為aibi、aic丨、4、一丨、以丨、 〜gi、aih。當三維影像擷取裝置24獲得欲進入者ι〇之此 七個端點距離後’接著,三維影像比對裝置28便鱼資料庫 %中所儲存之所有允許進入者之此七個端點距離逐一比 較。於三維影像比對裝4 28中,可設定—相符程度⑽值, 例如’當欲進入者10之此七個端點距離中,係有五個距離 與資料庫26所儲存之某—允許進人者相同,則表示此欲進 入者10為資料庫中26之此允許進入者,故可允許其進入。 可根據實際需要選取臉部特徵之端點,以及設定不同 =相符程度門檻值。例如’當數位保全系统2〇乃用於管制 高機密或貴重裝置時,便可增加所選取之臉部特徵之端 200530943 點。當所選取之臉部特徵端點越多,則產生之可能距離組 合越多,同時亦可提高相符程度門檻值,則產生辨識錯誤 之可能性就越低。當數位保全系統20用於一般門禁用途 時,則可降低所擷取之臉部特徵端點,同時降低相符程度 門檻值,以減少進行辨識時所花費之時間。 三維影像比較裝置28接著產生一比較結果,產生一允 許進入絲絕進人之比較結果。t制裝置29接著根據此比 較結果,以啟動各種不同之保全機制。例如,當管制裝置 29接收到允許進入之比較結果後,便允許此欲進入者⑺進 入,同時紀錄此欲進入者1〇進入之時間,並儲存此進入者 1〇之臉部三維影像,以作為日後追蹤人員出人紀錄之用。 當管制裝置29接收到拒絕進入之比較結果後,可提干 欲進入者1〇再次進行攝影之動作,以重新進行辨識。或者, 可於要求欲進人者1G進行重新辨識時, 員,告知有欲進入者10嘗試進入作失 皿t人 ★ + _ 疋1一天敗,需即時加以觀察。 或者,亦可設計為當連續三次辨識後均失敗,則啟動保全 防4措施,例如啟動警報裝置,或通知監控人員等。王 此^ ’亦可與現有之其他辨識機制結合 合輸入密碼之機制,或更 了配 識,虹膜辨識等m^ 5 s”辨識’指紋辨 之數位保全系統 多重'證機制,以提供更周延 第5圖係為一流程圖,用以說明 全系統管控方法。首先乃對於欲進幻之數位保 欲進入者之臉部三維影像(步驟5。。)。:;成:,以獲得 )接耆,由所獲得之 200530943 臉部三維影像中,擷取臉部特徵間之相對距離(步驟502 )。 隨後’將㈣取之這些臉部特徵間相對距離,逐—與資料 庫中所儲存之允許進人者之臉部紀錄進行比較(步驟 504 )臉紀錄乃含有所有允許進入纟,其臉部特徵間相 對距離。 將欲進入者之臉部特徵相對距離與資料庫比較之後, 產生-比較結果。若此比較結果高於一預設之相符程度門 檻值(步驟506 ),則允碑Α卜处、心 ;則兄訐此欲進八者進入(步驟508 )。之 後,可進-步紀錄此欲進入者之臉部三維影像,以及此欲 進入者進人保全系統之時間(步驟5ig),以作為日後追縱 出入記錄之用。 若比較結果乃低於預設之相符程度門櫃值,則要求欲 進入者再次進行臉部三維影像成像與辨識(步驟511)。同 :’亦可根據使用需求與設定’進—步警示保全系統之監 控人員(步驟512),或是啟動警報裝置(步驟514)。 根據本發明之數位保全系統, 欲進入者之身份。即使欲進人者^2速且準確地辨識 考错由化妝改變其外貌 其臉部特徵之相對距離並不會因此而改變故仍可正確地進 =。=本發明之臉部特徵辨識方法,無須使用雷 身格栅’㈣無測量誤差而造成辨識錯誤之情形發 據本發明之數位保全系統,可用 x 例如公家軍警政單位、大型企業工廠、教」:,制, 行號、社區、員工進出管制、 —@早 小型 雖然本發明已P較佳盜設備等。 貫知例揭露如上,然其並非用 200530943 以限定本發明,任何熟習此技藝者,在不脫離本發 神和範圍β,當可作各種之更動與潤飾,因此本發明之^ 遵乾圍當視後附之申請專利範圍所界定者為準。 【圖式簡單說明】 由以上本發明中較佳具體實施例之細節描述,可以 對本發明之目的、觀點及優點有更佳的了解。同 下列本發明之圖式加以說明: 第1圖係繪示習知技藝之臉部辨識方法示意圖。 第2圖係繪示依照本發明—較佳具體實施例之數 全系統方塊圖。 保 第3圖係繪示依照本發明一 識示意圖。 ⑽具體貫施例之臉部辨 第4圖係繪示依照本發明—較佳具體 臉部三維影像示意圖。 J彌取之 第5圖係繪示依照本發明一較佳具體實施例之 王系統官控方法流程圖。 ’、 【元件代表符號簡單說明】 10 12 14 20 欲進入者 雷射光源 雷射格桃 數位保全系統 三維影像成像裝置 12 22 200530943 24 三維影像擷取裝置 26 資料庫 28 三維影像比對裝置 29 管制裝置200530943 发明 Description of the invention [Technical field to which the invention belongs] The present invention relates to a digital security system, and more specifically, the present invention relates to a digital security system using three-dimensional facial image recognition. ‘Previous technology’ Most security systems today use a swipe card method as a way for control personnel to get in and out. However, such a security system that uses a card swipe mechanism often results in lost or fraudulent cards, making loopholes in the security system's control mechanism. Therefore, a security system using biological characteristics as the basis for identification was developed. Because each person has different biological characteristics, a security system using biological characteristics as an identification mechanism will have higher specificity and security. The use of biometrics as a means of identification includes facial recognition, voice recognition, fingerprint recognition, retinal recognition, and iris. The advantages of using facial features as identity recognition are that it can be worn. Second, the possibility is minimized and can be identified more accurately. Identity of personnel. Figure 1 shows the face recognition method of the conventional technique. When the entrant 10 wants to enter the security system, the laser light source 12 generates a laser grid 14 to be projected on the face of the entrant 10. The laser grille 14 is used as a ruler to measure the relative distance between facial features by recording the position of facial features on the laser grille 14. However, this face recognition method has several disadvantages. First, the resolution of the laser grid 14 generated by the 'laser light source 12 is limited, so the relative distance between facial features cannot be accurately measured. And #laser grid thumb 14 200530943 is projected on the face of the person who wants to enter 1G, because the human face is not a flat surface, the laser grille u will be deformed into a curved surface, which will cause the measurement: Misidentification occurred during comparison. Therefore, an improved security system is needed to more accurately recognize the relative distances between facial features, so as to reduce the occurrence of recognition errors. The reliability of the security system. [Summary of the invention] Dimensional image advancement It is therefore an object of the present invention to provide a digital security system that recognizes three lines of the face. A three-dimensional image recognition through the face Another object of the present invention is to provide a digital security system management method. … According to the above-mentioned object of the present invention, a digital security system that recognizes a three-dimensional image of a face = 仃 recognition is proposed. According to the digital security system of the present invention, each has a one-dimensional image imaging device, a three-dimensional image capture device, a database, a three-dimensional to image comparison device i ', and a control device. The three-dimensional image imaging device is used to image the three-dimensional image of the face of the entrant. The 3D image capture device is used to capture the relative distance between facial features in a 3D image of a face. The database stores the facial records of the entrants. Each facial record contains the relative distance between the facial features of each entrant. The relative distances between the three-dimensional shadows' facial features are compared with the facial records in the database one by one, and a comparison result is generated. Subsequently, the manufacturing device according to the comparison result produced by the three-dimensional image comparison device: whether to allow the person who wants to enter. Xingye 200530943 According to another object of the present invention, a method for controlling a digital security system by recognizing a three-dimensional image of a face is proposed. According to the digital security system management and control method of the present invention, a three-dimensional image of the face of a person who wants to enter is first imaged. Then, the relative distance between the facial features in the three-dimensional image of the face is captured. Then, for the relative distance between the facial features of the person who wants to enter, Pan 1 allows the person's facial records to be compared, and a comparison is made based on the comparison result to decide whether to allow the person who wants to enter. According to the digital security system of the present invention, the identity of the person who wants to enter can be identified more quickly and accurately. Even if the person who wants to enter changes his appearance through makeup, the relative distance of his facial features will not change because of this, so he can still correctly recognize it. Moreover, according to the facial feature recognition method of the present invention, it is not necessary to use a field shoot stalk, so there is no recognition error caused by measurement errors. The digital security system according to the present invention can be used for door and door management of many occasions, such as public military police units, large-scale enterprise factories, education bills Z, Ji line number, community, employee access control, general home anti-theft equipment, etc. [Embodiment] Please refer to FIG. 2 for a schematic view of a digital security system according to the present invention. The digital security system 20 according to the present invention includes a three-dimensional image imaging device 22, a three-dimensional image acquisition device 24, a database 26, a three-dimensional image comparison device 28, and a control device 29. The three-dimensional imaging device 22 is used to obtain a three-dimensional image of the face of a person who wants to enter. The three-dimensional image capturing device 24 then recognizes the three-dimensional image of the face, and captures the relative distances between the positions of all facial features in the three-dimensional image of the face. The three-dimensional image comparison device 200530943 is set to 28, and then the relative distance between the facial features captured by the three-dimensional image capture device 24 is compared with the face records stored in the database 26, and the face records stored in the database 26 It contains information on the relative distance between facial features of all persons allowed to enter. Then, the control device 29 decides whether to allow the person who wants to enter, or activates other security measures according to the comparison result generated by the three-dimensional image comparison device 28. Figures 3 and 4 illustrate a digital security system according to the present invention with a preferred embodiment. Fig. 3 is a schematic diagram showing a face recognition method according to the present invention. When an entrant 10 wants to enter the digital security system 20, the three-dimensional image imaging device 22, such as a dual-lens digital stereo imaging camera, images the entrant 10 to obtain a three-dimensional image of the face of the entrant 10. . The three-dimensional image imaging device 22 may be further designed to automatically sense the proximity of the name to the I 10 and prompts that if you want to enter the Y 10, you need to perform the image capture step first. The three-dimensional image capturing device 24 then recognizes the two-dimensional image of the face captured by the three-dimensional image imaging device 22. First, identify the position of each facial feature in the 3D image captured. This facial feature is, for example, eyebrows, eyes, early morning, prpr 甘 # M ^ Auricularia, and the special address of each face is marked. For example, Figure 4 shows how to take-the face is three-dimensionally pure. Here, the face is three-dimensionally f-shaped like a towel, bringing the right eyebrow closer to the heart ... grabbing another point as h, and bringing the left eyebrow closer to the face ^ The point mark is not N, and the other end point is marked as b2. : Similarly, the end point of the right eye near the center of the face can be marked with the other end point as c. The tester Sun soil will be 2 The end point of the left eye near the center of the face is marked as seven, 200530943 The upper endpoint is marked as ... Second, the upper endpoint of the left ear is marked as fl, the lower endpoint is marked as the second dead mountain 77 'tip is not h, the right endpoint of the mouth is marked as gI, and the left endpoint is marked as g2. =, The distance between the two ends of the arbitrary capture, for example, the distance between the end point of the capture and the point 1 to ba. This distance represents the distance between the center ends of the two eyebrows. In this specific embodiment, the endpoints that can be retrieved are a ,, a2, bl, b2, Ci, '62 6, gl, g2, h, so arbitrary endpoints are retrieved = material forms c, / combinations . The monitoring personnel can ^ take the endpoints suitable for ¥ according to the required accuracy. When the more endpoints it holds, the more distance groups can be formed, the more the number of months can be generated. When performing the comparison step, The lower the possibility of identification errors. For example, in the preferred embodiment, for the purpose of illustration, the distances between the seven endpoints are selected as aibi, aic 丨, 4, a 丨, 丨, ~ gi, aih. When the three-dimensional image capturing device 24 obtains the seven endpoint distances of the person who wants to enter, then, the three-dimensional image comparing device 28 stores the seven endpoint distances of all permitted entrants stored in the fish database%. Compare them one by one. In the 3D image comparison device 4 28, you can set the value of the degree of conformity, for example, 'When the distance between the seven endpoints of the person 10 to enter, there are five distances and one stored in the database 26-allowed to enter If the person is the same, it means that the person who wants to enter 10 is the allowed person in the database 26, so he can be allowed to enter. The endpoints of facial features can be selected according to actual needs, and different thresholds for the degree of conformity can be set. For example, when the digital security system 20 is used to control highly confidential or valuable devices, the number of selected facial features can be increased by 200530943 points. When more face feature endpoints are selected, more combinations of possible distances can be generated. At the same time, the threshold of the degree of matching can be increased, and the possibility of identification errors is lower. When the digital security system 20 is used for general access control purposes, the facial feature endpoints captured can be reduced, and at the same time, the threshold of the degree of compliance can be reduced to reduce the time taken for identification. The three-dimensional image comparison device 28 then generates a comparison result, which produces a comparison result that allows entry into the world. The t control device 29 then uses the comparison result to activate various security mechanisms. For example, when the control device 29 receives the comparison result of allowing entry, it allows the person who wants to enter into the room, records the time when the person who wants to enter 10 enters, and stores a three-dimensional image of the face of the person who enters 10. It is used to track the record of people coming out in the future. When the control device 29 receives the comparison result of refusal of entry, it can be mentioned that the entrant 10 is required to perform the photographing operation again to re-identify. Alternatively, when the person who wants to enter 1G is required to re-identify, the staff member informs the person who wants to enter 10 to try to enter as the loser. ★ + _ 疋 1 day failure, you need to observe immediately. Alternatively, it can also be designed to start security measures when identification fails for three consecutive times, such as activating an alarm device or notifying a monitoring staff. Wang Yi ^ 'It can also be combined with other existing identification mechanisms to enter a password mechanism, or more m ^ 5 s, such as identification, iris identification, etc. "Identification of the fingerprint identification digital security system multiple' identification mechanism, to provide more delay Figure 5 is a flowchart to explain the whole system management and control method. The first is a three-dimensional image of the face of a digital enthusiast who wants to enter the fantasy (step 5.). Then, from the obtained three-dimensional 200530943 facial image, the relative distances between facial features are extracted (step 502). Then, the relative distances between these facial features will be captured one by one with the data stored in the database. The face records of the entrants are allowed to be compared (step 504). The face records contain all the relative distances between the facial features that are allowed to enter the salamander. After comparing the relative distances of the facial features of the entrants with the database, a comparison is made. Result. If the result of this comparison is higher than a preset threshold of conformity (step 506), then the monument Abu will be allowed, and the heart will enter; then the brother will enter the eight (step 508). After that, you can proceed- Record this desire The three-dimensional image of the person ’s face, and the time (step 5ig) for the person who wants to enter the security system, are used for future entry and exit records. If the comparison result is lower than the preset door level value, it is required Those who want to enter again perform face three-dimensional image imaging and recognition (step 511). The same as: 'Also according to the use needs and settings'-monitor the personnel of the security system (step 512), or activate the alarm device (step 514) ). According to the digital security system of the present invention, the identity of the person who wants to enter. Even if the person who wants to enter ^ 2 speeds and accurately recognizes the error, the relative distance of the facial features changed by makeup will not change because of this. It can be correctly entered =. = The facial feature recognition method of the present invention does not require the use of a lightning grid. There is no measurement error that causes recognition errors. According to the digital security system of the present invention, x can be used, for example, public military police units. ", Large enterprise factories, teaching" :, system, line number, community, employee access control, @ 早 小 though the present invention has been better than stealing equipment, etc. The conventional examples are disclosed as above, but it is not intended to limit the present invention with 200530943. Any person skilled in this art can make various modifications and retouches without departing from the spirit and scope β of the present invention. Subject to the scope of the attached patent application. [Brief description of the drawings] From the above detailed description of the preferred embodiments of the present invention, the purpose, viewpoint, and advantages of the present invention can be better understood. It is explained with the following drawings of the present invention: FIG. 1 is a schematic diagram showing a face recognition method of a conventional technique. FIG. 2 is a block diagram of the whole system according to the preferred embodiment of the present invention. Fig. 3 is a schematic diagram showing the recognition according to the present invention.辨 Facial Recognition in Specific Embodiments Fig. 4 is a schematic diagram of a three-dimensional image of a face according to the present invention, which is a preferred embodiment. Figure 5 of J Mito is a flowchart showing the official control method of the King system according to a preferred embodiment of the present invention. ', [Simple description of component representative symbols] 10 12 14 20 Laser light source laser grid peach digital security system 3D imaging device 12 22 200530943 24 3D image acquisition device 26 database 28 3D image comparison device 29 control Device

1313

Claims (1)

200530943 拾、申請專利範圍 種數位保全系統,係對於一欲進入者之一臉部 二維影像進行辨識,以決定是否允許該欲進入者進入該數 位保全糸統,該系統至少包含: 一二維影像成像裝置,係用以成像該欲進入者之 該臉部三維影像; 一二維影像擷取裝置,係用以擷取該臉部三維影 像中複數個臉部特徵間之相對距離; 一資料庫,係儲存複數個允許進入者之臉部紀 錄,該每一臉部紀錄係含有該每一允許進入者之複數個臉 部特徵間之相對距離; 一維衫像比對裝置,係針對該欲進入者之該些 臉部特徵間之相對距離,逐一與該資料庫之該些允許進入 者之臉部紀錄比較,並產生一比較結果;及 一管制裝置,係根據該三維影像比對裝置產生之 该比較結果,以決定是否允許該欲進入者進入。 2.如申請專利範圍第1項所述之系統,其中該三維 影像成像裝置為一雙鏡頭數位立體成像相機。 3·如申請專利範圍第1項所述之系統,其中當該比 較結果高於一相符程度門檻值時,該管制裝置允許^欲進 入者進入。 200530943 4·如申晴專利範圍第3項所述之系統,其中當該比 較結果高於該相符程度門權值時,紀錄該欲進入者之該臉 部三維影像,以及該欲進入者進入該數位保全系統之一進 入時間。 5·如申請專利範圍第1項所述之系統,其中當該比 較結果低於一相符程度門檻值時,該管制裝置拒絕該欲進 入者進入。 6 ·如申請專利範圍第5項所述之系統,其中當該比 較結果低於該相符程度門檻值時,該管制裝置產生一警示 信號給予該數位保全系統之一監控者。 7·如申請專利範圍第5項所述之系統,其中當該比 較結果低於該相符程度門檻值時,該管制裝置啟動一警報 裝置。 8· 如申請專利範圍第1項所述之系統,其中該臉部 特徵係為眼睛,眉毛,鼻子,嘴巴,耳朵其中之一。 9· 如申請專利範圍第1項所述之系統,其中該數位 保全系統進一步具有一密碼確認機制。 10· 一種數位保全系統之管控方法,係對於一欲進入 15 200530943 者之一臉部三維影像進行辨識,五… 汧蠘以決定是否允許該欲進入 者進入該數位保全系統,該方法至少包含: 成像該欲進入者之該臉部三維影像,· 擁取該臉部三維影像中複數個臉部特徵間之相對 距離; 針對該欲進入者之該些臉部特徵間之相對距離, 逐-與-資料庫之複數個允許進人者之臉部紀錄比較並 產生一比較結果’其中該每一臉部紀錄係含有該每一允許 進入者之複數個臉部特徵間之相對距離;及 根據該比對結果,以決定是否允許該欲進入者進 入0 11.如申請專利範圍第10項所述之方法,其中係使用 一雙鏡頭數位立體成像相機,以成像該欲進入者之該臉 三維影像。 12 ·々申叫專利範圍第1 〇項所述之方法,其中當該比 較結果高於-相符程度門檀值時’允許該欲進人者進入。 13二如申請專利範圍第12項所述之方法,其中當該比 較結果高於該相符程度門檻值時,紀錄該欲進人者之該臉 邛一維汾像以及該欲進入者進入該數位保全系統之— 入時間。 $ 200530943 14·如申請專利範圍第1〇項所述之方法,其中卷: 較結果低於一相符程度門檻值時,拒絕該欲進入者::比 •如申請專利範圍第14項所述之方法,其 申當該比 15 較結果低於該相符程度門檻值時,產 ^ /玍王 詈不#就給 數位保全系統之一監控者。 σ 16·如申請專利範圍第14項所述之方法,其申 較結果低於該相符程度門檻值時,啟動 比 警報裝置 17·如申請專利範圍第10項所 特忾孫盔胳成 „ ,, 疋之方法’其令該臉部 寻徵係為眼晴,眉毛,鼻子,嘴巴,且几 +木其Φ夕_。 18.如申請專利範圍第10項所 仅八么Μ ^ 心万法’其中該數位 保王系統進一步具有一密碼確認機制。 17200530943 A digital security system for the scope of patent applications, which recognizes a two-dimensional image of the face of a person who wants to enter, to decide whether to allow the person who wants to enter the digital security system, the system includes at least: a two-dimensional An image imaging device is used to image a three-dimensional image of the face of the person who wants to enter; a two-dimensional image capture device is used to capture the relative distance between a plurality of facial features in the three-dimensional image of the face; a data The library stores a plurality of facial records of the permitted entrants, and each facial record contains the relative distances between the facial features of each permitted entrants; the one-dimensional shirt image comparison device is aimed at the The relative distances between the facial features of the person who wants to enter are compared with the facial records of those who are allowed to enter the database one by one, and a comparison result is generated; and a control device is based on the three-dimensional image comparison device The comparison result is generated to determine whether the entry is allowed. 2. The system according to item 1 of the patent application scope, wherein the three-dimensional image imaging device is a dual-lens digital stereo imaging camera. 3. The system according to item 1 of the scope of patent application, wherein when the comparison result is higher than a threshold of a degree of compliance, the control device allows a person who wants to enter. 200530943 4. The system as described in item 3 of Shen Qing's patent scope, wherein when the comparison result is higher than the matching degree threshold weight, a three-dimensional image of the face of the person who wants to enter and the person who wants to enter the Entry time for one of the digital security systems. 5. The system as described in item 1 of the scope of patent application, wherein when the comparison result is lower than a threshold of a degree of compliance, the control device refuses the entry of the entrant. 6. The system according to item 5 of the scope of patent application, wherein when the comparison result is lower than the compliance threshold, the control device generates a warning signal to a monitor of the digital security system. 7. The system according to item 5 of the scope of patent application, wherein the control device activates an alarm device when the comparison result is lower than the compliance degree threshold. 8. The system according to item 1 of the scope of patent application, wherein the facial features are one of eyes, eyebrows, nose, mouth, and ears. 9. The system described in item 1 of the scope of patent application, wherein the digital security system further has a password confirmation mechanism. 10. · A digital security system management and control method is to identify a three-dimensional image of the face of a person who wants to enter 15 200530943, five ... to determine whether to allow the person who wants to enter the digital security system, the method includes at least: The three-dimensional image of the face of the person who wants to enter is captured, and the relative distance between a plurality of facial features in the three-dimensional image of the face is taken; for the relative distance between the facial features of the person who wants to enter, one by one and -A comparison of the facial records of a plurality of permitted persons in the database and a comparison result is generated 'where each facial record contains the relative distance between the plurality of facial features of each permitted person; and according to the Compare the results to determine whether the entrant is allowed to enter 0 11. The method described in item 10 of the scope of patent application, wherein a dual-lens digital stereo imaging camera is used to image the three-dimensional image of the face of the entrant . 12. The method described in item 10 of the patent scope, wherein when the comparison result is higher than the -compliance threshold value ', the enterer is allowed to enter. 13 2. The method according to item 12 of the scope of patent application, wherein when the comparison result is higher than the threshold of the degree of conformity, record the one-dimensional Fen face of the person who wants to enter and the number of persons who want to enter Security System-Entry Time. $ 200530943 14 · The method as described in item 10 of the scope of patent application, wherein the volume: When the comparison result is lower than a threshold of a degree of consistency, the person who wants to enter is denied :: • as described in item 14 of the scope of patent application Method, which states that when the result of the ratio 15 is lower than the threshold of the degree of compliance, the product ^ / 玍 王 詈 不 # gives a monitor of one of the digital security systems. σ 16 · The method as described in item 14 of the scope of patent application, when the application result is lower than the threshold of the degree of compliance, than the alarm device is activated. , 疋 的 方法 ', which makes the facial signs of clear eyes, eyebrows, nose, mouth, and a few + wood Φ eve. 18. As the scope of the patent application No. 10 only eight MM ^ Heart Wanfa 'Which of the digital Baowang system further has a password confirmation mechanism. 17
TW93106078A 2004-03-08 2004-03-08 Digital security system TW200530943A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW93106078A TW200530943A (en) 2004-03-08 2004-03-08 Digital security system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW93106078A TW200530943A (en) 2004-03-08 2004-03-08 Digital security system

Publications (1)

Publication Number Publication Date
TW200530943A true TW200530943A (en) 2005-09-16

Family

ID=52348452

Family Applications (1)

Application Number Title Priority Date Filing Date
TW93106078A TW200530943A (en) 2004-03-08 2004-03-08 Digital security system

Country Status (1)

Country Link
TW (1) TW200530943A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI383325B (en) * 2008-04-14 2013-01-21 Xid Technologies Pte Ltd Face expressions identification
CN111833236A (en) * 2019-04-21 2020-10-27 未来市股份有限公司 Method and device for generating three-dimensional face model simulating user

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI383325B (en) * 2008-04-14 2013-01-21 Xid Technologies Pte Ltd Face expressions identification
CN111833236A (en) * 2019-04-21 2020-10-27 未来市股份有限公司 Method and device for generating three-dimensional face model simulating user
CN111833236B (en) * 2019-04-21 2023-07-07 未来市股份有限公司 Method and device for generating three-dimensional face model for simulating user

Similar Documents

Publication Publication Date Title
WO2020010776A1 (en) Access control method, access control device, system and storage medium
Adeoye A survey of emerging biometric technologies
Delac et al. A survey of biometric recognition methods
WO2021227124A1 (en) Facial recognition living body detection method based on facial iris recognition and thermal imaging technology
US6751340B2 (en) Method and apparatus for aligning and comparing images of the face and body from different imagers
CN105740779B (en) Method and device for detecting living human face
CN105260726B (en) Interactive video biopsy method and its system based on human face posture control
Burge et al. Ear biometrics for machine vision
Chauhan et al. A survey of emerging biometric modalities
KR102518243B1 (en) Face recognition apparatus and method using physiognomic information
CN106203369A (en) Active stochastic and dynamic for anti-counterfeiting recognition of face instructs generation system
JP5592040B1 (en) Fraud detection in biometric type access control systems
CN109670390A (en) Living body face recognition method and system
Ali et al. Forensic face recognition: A survey
CN104598797A (en) Authentication device and authentication method with combination of face recognition, face vein authentication and finger vein authentication
WO2016127767A1 (en) Authentication device and method combining finger vein recognition and facial vein recognition
TW202036372A (en) Image identification system for security protection
RU2316051C2 (en) Method and system for automatically checking presence of a living human face in biometric safety systems
Burge et al. Using ear biometrics for passive identification
Hossain et al. Human identity verification by using physiological and behavioural biometric traits
Mardia et al. On statistical problems with face identification from photographs
TW200530943A (en) Digital security system
TW202343388A (en) Multispectral reality detector system
AnkurBansal et al. A Review Paper on FACIAL RECOGNITION‖
Kekre et al. Ageing adaptation for multimodal biometrics using adaptive feature set update algorithm