CN103886235B - Face image biological key generating method - Google Patents
Face image biological key generating method Download PDFInfo
- Publication number
- CN103886235B CN103886235B CN201410075104.9A CN201410075104A CN103886235B CN 103886235 B CN103886235 B CN 103886235B CN 201410075104 A CN201410075104 A CN 201410075104A CN 103886235 B CN103886235 B CN 103886235B
- Authority
- CN
- China
- Prior art keywords
- face
- matrix
- vector
- image
- secret key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 41
- 239000013598 vector Substances 0.000 claims abstract description 43
- 230000001815 facial effect Effects 0.000 claims abstract 3
- 239000011159 matrix material Substances 0.000 claims description 66
- 238000012549 training Methods 0.000 claims description 19
- 238000000605 extraction Methods 0.000 claims description 7
- 230000008569 process Effects 0.000 claims description 7
- 238000000513 principal component analysis Methods 0.000 claims description 6
- 238000010276 construction Methods 0.000 claims description 5
- 238000012545 processing Methods 0.000 claims description 4
- 239000000284 extract Substances 0.000 claims description 3
- 230000015572 biosynthetic process Effects 0.000 claims 4
- 230000007613 environmental effect Effects 0.000 claims 2
- 230000005540 biological transmission Effects 0.000 abstract 1
- 238000006243 chemical reaction Methods 0.000 abstract 1
- 230000000087 stabilizing effect Effects 0.000 abstract 1
- 238000005516 engineering process Methods 0.000 description 8
- 238000005286 illumination Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 239000013256 coordination polymer Substances 0.000 description 1
- 238000000354 decomposition reaction Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000006641 stabilisation Effects 0.000 description 1
- 238000011105 stabilization Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/168—Feature extraction; Face representation
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Computer Vision & Pattern Recognition (AREA)
- General Health & Medical Sciences (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Image Processing (AREA)
- Collating Specific Patterns (AREA)
Abstract
Description
技术领域technical field
本发明属于信息安全技术领域,具体涉及一种通过正面人脸图像提取人脸生物密钥的方法。其能够通过摄取人脸图像,直接生成生物密钥,使基于人脸的网络身份认证过程更加简化和灵活,为网络身份认证技术提供了一种新的认证方法。扩展人脸识别技术在网络安全中的应用。The invention belongs to the technical field of information security, and in particular relates to a method for extracting a human face biological key through a front face image. It can directly generate a biological key by ingesting a face image, which makes the face-based network identity authentication process more simplified and flexible, and provides a new authentication method for network identity authentication technology. Expand the application of face recognition technology in network security.
背景技术Background technique
近年来,基于机器视觉的人脸识别技术受到广泛关注,因其在日常生活领域可以有广泛的应用。其中一个重要的应用即身份认证,人脸打卡系统、网络端身份认证等都是人脸识别技术运用的良好案例。在网络身份认证领域,人脸认证采用如下的认证模式:1)采集用户人脸,提取用脸特征模板,存储到远端网络认证服务器;2)当需进行用户身份认证时,在用户终端采集用户人脸,生成人脸特征,传输到远端网络认证服务器;3)认证服务器将用户人脸特征与存储的人脸特征模板进行比对,一致则认证通过,不一致则认证失败。这一认证模式有一定的缺点:需要在不安全的网络环境中存储、传递用户人脸信息。如果用户对认证端不熟悉,一般不会配合上传自己的人脸图像。这限制了人脸认证在网络身份认证中的推广。另外,在云存储蓬勃发展的环境中,人脸认证由于不支持人脸生物特征信息加密,用户无法用自己的生物特征对自己的私有数据进行保护。这局限了人脸识别技术在信息安全领域的发展,人脸识别技术未能在云存储安全方面发挥它应有的作用。In recent years, face recognition technology based on machine vision has received widespread attention because it can be widely used in daily life. One of the important applications is identity authentication. Face check-in systems and network-side identity authentication are all good examples of the use of face recognition technology. In the field of network identity authentication, face authentication adopts the following authentication mode: 1) Collect user's face, extract the face feature template, and store it in the remote network authentication server; The user's face generates face features and transmits them to the remote network authentication server; 3) The authentication server compares the user's face features with the stored face feature templates. If they are consistent, the authentication will pass, and if they are inconsistent, the authentication will fail. This authentication mode has certain disadvantages: it needs to store and transmit user face information in an unsafe network environment. If the user is not familiar with the authentication terminal, generally he will not cooperate with uploading his own face image. This limits the promotion of face authentication in network identity authentication. In addition, in an environment where cloud storage is booming, since face authentication does not support the encryption of face biometric information, users cannot use their own biometrics to protect their private data. This limits the development of face recognition technology in the field of information security, and face recognition technology fails to play its due role in cloud storage security.
曾经有科研工作者提出生物密钥的概念,希望直接从生物特征中获取稳定的生物密钥序列。但是目前的研究并未给出完整的人脸特征信息,实际生产生活中未出现可实用的人脸生物密钥技术。Some researchers once proposed the concept of biological key, hoping to obtain a stable biological key sequence directly from biological characteristics. However, the current research does not give complete face feature information, and there is no practical face bio-key technology in actual production and life.
发明内容Contents of the invention
本发明提出了一种人脸生物密钥生成方法。方法将用户正面人脸图像经特征空间变换后,向高维空间中投影,在高维空间中将人脸特征信息 稳定到可接受的波动范围内,再对稳定后的特征向量提取数字序列,从数字序列中编码生成生物密钥。整个方法在移动终端、认证服务器端均无需存储用户人脸信息,也无需在网络中传递用户的人脸图像。用户通过采集自身的正面人脸图像在本地生成(用户名、密钥)对,通过(用户名、密钥)对衍生的各种认证方法进行网络身份认证。该方法还支持用人脸生物密钥直接对用户私有数据进行加密保护,可扩展到云存储安全领域中应用。只要人脸生物密钥的密钥空间足够大,可保证高安全性。本发明提取的人脸生物密钥序列长度可调,可大于256bit。The invention proposes a method for generating a face biological key. The method transforms the user's frontal face image into the high-dimensional space after the feature space transformation, stabilizes the face feature information in the high-dimensional space to an acceptable fluctuation range, and then extracts the digital sequence from the stabilized feature vector, Generate a bio-key encoded from a sequence of numbers. The whole method does not need to store the user's face information on the mobile terminal or the authentication server side, and does not need to transmit the user's face image in the network. Users generate (username, key) pairs locally by collecting their own frontal face images, and perform network identity authentication through various authentication methods derived from (username, key) pairs. The method also supports directly encrypting and protecting user's private data with the face biological key, and can be extended to the application in the field of cloud storage security. As long as the key space of the face biometric key is large enough, high security can be guaranteed. The length of the human face biological key sequence extracted by the present invention is adjustable and can be greater than 256 bits.
人脸生物密钥生成分两部分,第一部分为人脸生物密钥训练部分,第二部分为人脸生物密钥提取部分。The face biological key generation is divided into two parts, the first part is the face biological key training part, and the second part is the face biological key extraction part.
人脸生物密钥训练部分具体步骤为:The specific steps of face biometric key training are as follows:
第一步,用户通过摄像头采集正面脸图像,正面脸由用户自行调整,采集环境要求在室内光线充裕的环境,自然光、人工光源皆可,重复采集8次以上。In the first step, the user collects the frontal face image through the camera, and the frontal face is adjusted by the user. The collection environment requires an indoor environment with sufficient light. Both natural light and artificial light source are acceptable, and the collection is repeated more than 8 times.
第二步,对人脸图像进行灰度化处理,调整图像大小为统一尺寸128×128,或64×64,用户可凭经验自行决定。The second step is to grayscale the face image and adjust the size of the image to a uniform size of 128×128 or 64×64, which can be determined by the user based on experience.
第三步,求人脸图像自商图,得8幅以上的自商图图像。The third step is to seek the self-quotient map of the face image, and obtain more than 8 self-quotient map images.
第四步,将8幅以上的自商图图像组织成样本矩阵,进行主成分分析(PCA)处理,得人脸在特征空间中的投影矩阵,记为P1。将8幅以上的自商图图像分别经投影矩阵P1投影,得到人脸特征向量。将求得的特征向量组织为一个M×D维的特征向量矩阵,记为S1,M为自商图图像个数,D为投影后特征向量元素个数,一般D>M。The fourth step is to organize more than 8 self-quotient images into a sample matrix and perform principal component analysis (PCA) processing to obtain the projection matrix of the face in the feature space, which is denoted as P1. More than 8 self-quotient images are projected through the projection matrix P1 to obtain the face feature vector. Organize the obtained eigenvectors into an M×D dimensional eigenvector matrix, denoted as S1, M is the number of self-quotient image images, D is the number of projected eigenvector elements, and generally D>M.
第五步,将矩阵S1扩展为2个矩阵,L×L维的随机误差方阵EX,L×L维的标准值方阵EY,L>D(具体构造方法在具体实施方式中说明)。The fifth step is to expand the matrix S1 into two matrices, the L×L-dimensional random error square matrix EX, and the L×L-dimensional standard value square matrix EY, where L>D (the specific construction method is described in the specific implementation).
第六步,求解EX的广义逆矩阵,记为IEX,将IEX左乘矩阵EY得到人脸特征向量的高维空间投影矩阵PEX=IEX×EY,在用户端存储投影矩阵P1和PEX。The sixth step is to solve the generalized inverse matrix of EX, denoted as IEX, multiply IEX by the matrix EY to the left to obtain the high-dimensional space projection matrix PEX=IEX×EY of the face feature vector, and store the projection matrices P1 and PEX on the user end.
人脸生物密钥训练完成。Face biometric key training is complete.
人脸生物密钥提取部分具体步骤为:The specific steps of face biometric key extraction are as follows:
第一步,用户通过摄像头采集正面脸图像,正面脸由用户自行调整, 采集环境要求在室内光线充裕的环境,自然光、人工光源皆可。In the first step, the user collects the frontal face image through the camera, and the frontal face is adjusted by the user. The collection environment requires an indoor environment with sufficient light, either natural light or artificial light source.
第二步,对人脸图像进行灰度化处理,调整图像大小为统一尺寸与人脸生物密钥训练时设定的尺寸一致。The second step is to grayscale the face image, and adjust the size of the image to be consistent with the size set during the training of the face biometric key.
第三步,求人脸图像自商图。The third step is to find the self-quotient map of the face image.
第四步,将自商图图像转为行向量,取人脸生物密钥训练时存储的投影矩阵P1,左乘投影矩阵P1,得人脸在特征空间中的特征向量,记为Z,长度为D。The fourth step is to convert the self-quotient image into a row vector, take the projection matrix P1 stored during the face biological key training, and multiply the projection matrix P1 to the left to get the feature vector of the face in the feature space, which is recorded as Z, and the length is for D.
第五步,将向量Z扩展为1×L维矩阵EZ,左乘PEX矩阵,得1×L维向量ED;扩展方法与人脸生物密钥训练时一致。The fifth step is to expand the vector Z into a 1×L-dimensional matrix EZ, and multiply the PEX matrix to the left to obtain a 1×L-dimensional vector ED; the expansion method is consistent with the face biometric key training.
第六步,用棋盘法对向量ED中的数值进行进一步稳定处理,取前DL个数值得1×DL维向量EE,DL≤D。将向量EE中各元素的数值前后拼接,即生成人脸生物密钥。(棋盘法在具体实施方式中说明)The sixth step is to use the checkerboard method to further stabilize the values in the vector ED, and take the value of the previous DL values to be 1×DL-dimensional vector EE, where DL≤D. The value of each element in the vector EE is concatenated back and forth to generate a face biometric key. (The chessboard method is described in the specific implementation manner)
本发明的有益效果:本发明提出了一种人脸生物密钥生成方法。可以改变传统的网络生物特征身份认证模式,用户无需在移动终端、认证服务器端存储个人的人脸信息,也无需在网络中传递人脸图像,即可完成基于人脸的网络身份认证。同时,该方法还支持用人脸生物密钥直接对用户私有数据进行加密保护,可扩展到云存储安全领域中应用。Beneficial effects of the present invention: the present invention proposes a method for generating a face biological key. It can change the traditional network biometric identity authentication mode. Users do not need to store personal face information on the mobile terminal or authentication server, and do not need to transmit face images in the network to complete face-based network identity authentication. At the same time, the method also supports directly encrypting and protecting the user's private data with the face biometric key, which can be extended to the application in the field of cloud storage security.
附图说明Description of drawings
图1为人脸生物密钥提取流程图。Figure 1 is a flow chart of face biometric key extraction.
图2为人脸自商图效果示意图。Figure 2 is a schematic diagram of the effect of the face self-quotation map.
图3为人脸图像转化为行向量示意图。Figure 3 is a schematic diagram of converting a face image into a row vector.
图4为人脸主成份分析流程图。Figure 4 is a flowchart of face principal component analysis.
图5为人脸生物密钥生成过程示意图。Fig. 5 is a schematic diagram of the process of generating a face biometric key.
具体实施方式detailed description
下面结合附图对本发明作进一步说明。The present invention will be further described below in conjunction with accompanying drawing.
目前的人脸识别技术对多姿态人脸、复杂光照条件人脸无法正确识别。本发明人脸生物密钥提取的前提条件是正面脸,光照充裕,无多光源多角度照射。在此前提下,人脸识别已有很高的准确率。经过一系列的稳定处理,已可以从中提取生物密钥。人脸生物密钥的提取流程如图1所示。The current face recognition technology cannot correctly identify faces with multiple poses and complex lighting conditions. The preconditions for extracting the human face biological key in the present invention are a frontal face, sufficient illumination, and no multi-light source and multi-angle irradiation. Under this premise, face recognition has a high accuracy rate. After a series of stabilization processes, the biological key can be extracted from it. The extraction process of the face biometric key is shown in Figure 1.
光照条件对现有的人脸识别效果有很大的影响,需要先消除光照影响,本发明使用自商图方法消除光照影响,效果如图2所示。Illumination conditions have a great influence on the existing face recognition effect, and the influence of illumination needs to be eliminated first. The present invention uses the self-quotient graph method to eliminate the influence of illumination, and the effect is shown in FIG. 2 .
本发明提出的人脸生物密钥生成方法分两部分,第一部分为人脸生物密钥训练部分,第二部分为人脸生物密钥提取部分。The face biological key generation method proposed by the present invention is divided into two parts, the first part is the human face biological key training part, and the second part is the human face biological key extraction part.
人脸生物密钥训练部分具体步骤为:The specific steps of face biometric key training are as follows:
第一步,用户通过摄像头采集正面脸图像,正面脸由用户自行调整,采集环境要求在室内光线充裕的环境,自然光、人工光源皆可,重复采集8次以上。In the first step, the user collects the frontal face image through the camera, and the frontal face is adjusted by the user. The collection environment requires an indoor environment with sufficient light. Both natural light and artificial light source are acceptable, and the collection is repeated more than 8 times.
第二步,对人脸图像进行灰度化处理。灰度化处理公式为The second step is to grayscale the face image. The grayscale processing formula is
f(i,j)=0.30R(i,j)+0.59G(i,j)+0.11B(i,j) (1)f(i,j)=0.30R(i,j)+0.59G(i,j)+0.11B(i,j) (1)
R、G、B为红、绿、蓝三分量。调整图像大小为统一尺寸128×128,或64×64或用户可凭经验自行决定。R, G, and B are three components of red, green, and blue. Resize the image to a uniform size of 128×128, or 64×64 or the user can decide by experience.
第三步,求人脸图像自商图,得8幅以上的自商图图像。自商图计算公式为The third step is to seek the self-quotient map of the face image, and obtain more than 8 self-quotient map images. The formula for calculating the self-quotient graph is
其中为I平滑后的版本,F为滤波核,*为卷积运算符。一般取高斯滤波核,3阶、5阶皆可,如F取in Is the smoothed version of I, F is the filter kernel, and * is the convolution operator. Generally take the Gaussian filter kernel, the 3rd order and the 5th order can be used, such as F is taken
第四步,将8幅以上的自商图图像组织成样本矩阵。记共有M幅自商图图像。单幅图像以行为单位前后拼接排列,成一维行向量,含n个元素,如图3所示;所有自商图转化为行向量后,以行为单位从第1行至第M行顺次排列,得M×n维样本矩阵S。The fourth step is to organize more than 8 self-quotient images into a sample matrix. Note that there are M self-quotient graph images in total. A single image is spliced forward and backward in row units to form a one-dimensional row vector containing n elements, as shown in Figure 3; after all self-quotient images are converted into row vectors, they are arranged sequentially in row units from row 1 to row M , to get M×n-dimensional sample matrix S.
对样本矩阵进行主成分分析(PCA)。分析流程如图4所示。Perform principal component analysis (PCA) on the sample matrix. The analysis process is shown in Figure 4.
样本矩阵中心化处理,矩阵的每一列除以对应的均值,公式为:The sample matrix is centralized, and each column of the matrix is divided by the corresponding mean value. The formula is:
Sij为样本矩阵的任一分量。S ij is any component of the sample matrix.
计算样本矩阵协方差阵;Calculate the sample matrix covariance matrix;
将协方差阵C对角化。先对C进行特征值分解,得到特征向量矩阵并正交化即为P。P满足:Diagonalize the covariance matrix C. First, the eigenvalue decomposition of C is performed, and the eigenvector matrix is obtained and orthogonalized to be P. P satisfies:
PTCP=Λ (5)P T CP = Λ (5)
Λ为对角矩阵,对角元素的值为矩阵C的特征值。Λ is a diagonal matrix, and the values of the diagonal elements are the eigenvalues of matrix C.
取最大的前D(D<n)个特征值对应的特征向量组成新的特征向量矩阵P1(n×D维),P1即人脸在特征空间中的投影矩阵。Take the eigenvectors corresponding to the largest first D (D<n) eigenvalues to form a new eigenvector matrix P1 (n×D dimension), P1 is the projection matrix of the face in the feature space.
将M幅自商图图像分别经投影矩阵P1投影,计算公式为The M self-quotient images are respectively projected through the projection matrix P1, and the calculation formula is
S1=S×P1 (6)S1=S×P1 (6)
S1为M×D维的特征向量矩阵,D为投影后特征向量元素个数,一般D>M。S1 is an M×D dimensional feature vector matrix, D is the number of feature vector elements after projection, and generally D>M.
第五步,将矩阵S1扩展为2个矩阵,L×L维的随机误差方阵EX,L×L维的EY,L>D,构造方法为:The fifth step is to expand the matrix S1 into two matrices, the L×L dimension random error square matrix EX, the L×L dimension EY, L>D, and the construction method is:
取矩阵S1的M个行向量,求均值,得均值向量EB(1×D维);Take the M row vectors of the matrix S1, calculate the mean value, and obtain the mean value vector EB (1×D dimension);
设定波动范围Er,如Er=10;为EB增加随机误差扰动,计算公式为Set the fluctuation range Er, such as Er=10; add random error disturbance to EB, the calculation formula is
S1j代表S1矩阵中的第j行,EXj代表一个行向量;rand(0,1)函数返回(0,1)之间的随机数;将EXj以行为单位装配为L×D维的矩阵。S1 j represents the jth row in the S1 matrix, and EX j represents a row vector; the rand(0,1) function returns a random number between (0,1); assemble EX j into an L×D dimensional matrix.
构造L-D个非线性函数,输入变量是一维行向量(x1,x2,…,xD),D个元素,输出为一维行向量(x1,x2,…,xD,…,xL),L个元素。非线性函数可由用户自行定义,作为示例,可取如下非线性函数Construct LD nonlinear functions, the input variable is a one-dimensional row vector (x 1 ,x 2 ,…,x D ), D elements, and the output is a one-dimensional row vector (x 1 ,x 2 ,…,x D ,… , x L ), L elements. The nonlinear function can be defined by the user. As an example, the following nonlinear function can be taken
Z(t)=(x1-x2)×sin(t)+(t^2)×(x3%10)(t为整数,0<t<L-D)(8)Z(t)=(x 1 -x 2 )×sin(t)+(t ^ 2)×(x 3 %10)(t is an integer, 0<t<LD)(8)
sin(t)三角函数,(t^2)表示t的平方,(x3%10)表示x3模10运算。sin(t) trigonometric function, (t ^ 2) means the square of t, (x 3 %10) means x 3 modulo 10 operation.
用构造的Z(t)对EXj进行运算,j遍历1~L,得L×L维矩阵,即随机误差方阵EX。Use the constructed Z(t) to operate on EX j , and j traverses 1~L to get an L×L dimensional matrix, which is the random error square matrix EX.
EY构造方法为:The EY construction method is:
将均值向量EB重复L行,得L×D维矩阵,记为EYt。用Z(t)对EYtj进行运算,j遍历1-L,得L×L维矩阵,即标准值方阵EY。Repeat the mean value vector EB for L rows to obtain an L×D dimensional matrix, which is denoted as EYt. Use Z(t) to operate EYt j , and j traverses 1-L to obtain an L×L dimensional matrix, which is the standard value square matrix EY.
第六步,求解EX的广义逆矩阵,记为IEX,将IEX左乘矩阵EY得到人脸特征向量的高维空间投影矩阵PEX=IEX×EY,在用户端存储投影矩阵P1和PEX。The sixth step is to solve the generalized inverse matrix of EX, denoted as IEX, multiply IEX by the matrix EY to the left to obtain the high-dimensional space projection matrix PEX=IEX×EY of the face feature vector, and store the projection matrices P1 and PEX on the user end.
人脸生物密钥训练完成。Face biometric key training is complete.
人脸生物密钥提取过程的数字序列流变化情况如图5所示,具体步骤为:Figure 5 shows the change of digital sequence flow in the face biometric key extraction process, and the specific steps are as follows:
第一步,用户通过摄像头采集正面脸图像,正面脸由用户自行调整,采集环境要求在室内光线充裕的环境,自然光、人工光源皆可。In the first step, the user collects the frontal face image through the camera, and the frontal face is adjusted by the user. The collection environment requires an indoor environment with sufficient light, and natural light or artificial light can be used.
第二步,对人脸图像进行灰度化处理,调整图像大小为统一尺寸与人脸生物密钥训练时设定的尺寸一致。The second step is to grayscale the face image, and adjust the size of the image to be consistent with the size set during the training of the face biometric key.
第三步,求人脸图像自商图。与人脸生物密钥训练部分方法相同。The third step is to find the self-quotient map of the face image. The method is the same as that of face biometric key training.
第四步,将自商图图像转为行向量,方法与人脸生物密钥训练部分方法相同。取人脸生物密钥训练时存储的投影矩阵P1,左乘投影矩阵P1,得人脸在特征空间中的特征向量,记为Z,长度为D。The fourth step is to convert the self-quotient map image into a row vector, and the method is the same as that of the face biological key training part. Take the projection matrix P1 stored during face biological key training, and multiply the projection matrix P1 to the left to get the feature vector of the face in the feature space, denoted as Z, and the length is D.
第五步,将向量Z扩展为1×L维矩阵EZ。扩展方法与人脸生物密钥训练时保持一致。如取扩展函数为人脸生物密钥训练部分第五步描述的扩展函数Z(t)。The fifth step is to expand the vector Z into a 1×L-dimensional matrix EZ. The extension method is consistent with the face biometric key training. For example, the extension function is taken as the extension function Z(t) described in the fifth step of the face biometric key training part.
矩阵EZ左乘PEX,得1×L维向量ED;The matrix EZ is multiplied by PEX to the left to obtain a 1×L-dimensional vector ED;
第六步,用棋盘法对向量ED中的数值进行进一步稳定处理。棋盘法描述如下:The sixth step is to use the checkerboard method to further stabilize the values in the vector ED. The chessboard method is described as follows:
对ED中的每一个元素(记为EDXi)进行一次运算,伪代码为Perform an operation on each element in ED (denoted as EDX i ), the pseudocode is
mod()为取模函数,maxdis标记棋盘法的格子大小,取奇数,具体值 可由用户根据经验选定。mod() is a modulo function, and maxdis marks the grid size of the chessboard method, which is an odd number, and the specific value can be selected by the user based on experience.
取前DL个数值得1×DL维向量EE,DL≤D。将向量EE中各元素的数值前后拼接,即生成人脸生物密钥。DL由用户根据需要选定。Take the value of the previous DL number as 1×DL dimension vector EE, DL≤D. The value of each element in the vector EE is concatenated back and forth to generate a face biometric key. DL is selected by the user according to needs.
本技术领域中的普通技术人员应当认识到,以上实施例仅是用来说明本发明,而并非作为对本发明的限定,只要在本发明的实质范围内,对以上实施例的变化、变型都将落在本发明的保护范围。Those of ordinary skill in the art should recognize that the above embodiments are only used to illustrate the present invention, rather than as a limitation to the present invention, as long as they are within the essential scope of the present invention, changes and modifications to the above embodiments will be Fall within the protection scope of the present invention.
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410075104.9A CN103886235B (en) | 2014-03-03 | 2014-03-03 | Face image biological key generating method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410075104.9A CN103886235B (en) | 2014-03-03 | 2014-03-03 | Face image biological key generating method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103886235A CN103886235A (en) | 2014-06-25 |
CN103886235B true CN103886235B (en) | 2017-02-22 |
Family
ID=50955124
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410075104.9A Active CN103886235B (en) | 2014-03-03 | 2014-03-03 | Face image biological key generating method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103886235B (en) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104639528A (en) * | 2014-11-19 | 2015-05-20 | 中国联合网络通信集团有限公司 | DBA (database administrator) mobile client counterattack method and DBA mobile client counterattack device |
US10069627B2 (en) * | 2015-07-02 | 2018-09-04 | Qualcomm Incorporated | Devices and methods for facilitating generation of cryptographic keys from a biometric |
CN110517182B (en) * | 2019-08-29 | 2021-06-25 | 海南大学 | A zero-watermark embedding method for medical images based on NSCT combined transform |
CN110990849A (en) * | 2019-11-20 | 2020-04-10 | 维沃移动通信有限公司 | A kind of privacy data encryption, decryption method and terminal |
CN111144352B (en) * | 2019-12-30 | 2023-05-05 | 杭州电子科技大学 | A secure transmission and recognition method for face image intelligent sensing |
CN111723395B (en) * | 2020-05-11 | 2022-11-18 | 华南理工大学 | Portrait biological characteristic privacy protection and decryption method |
CN114726506B (en) * | 2021-01-04 | 2024-11-08 | 腾讯科技(深圳)有限公司 | Data encryption method, device, computer equipment and storage medium |
CN112949576B (en) * | 2021-03-29 | 2024-04-23 | 北京京东方技术开发有限公司 | Attitude estimation method, apparatus, device and storage medium |
CN114978500B (en) * | 2022-05-20 | 2025-04-11 | 中国电信股份有限公司 | Data transmission method, device, electronic device and storage medium |
CN116647335B (en) * | 2023-05-26 | 2024-08-09 | 中国大唐集团财务有限公司 | Method and device for generating private key through scene based on discrete cosine transform |
CN116628660B (en) | 2023-05-26 | 2024-01-30 | 杭州电子科技大学 | Personalized face biometric key generation method based on deep neural network coding |
CN119049166A (en) * | 2024-09-20 | 2024-11-29 | 安徽霍迹寻踪科技有限公司 | AI intelligent community intelligent visitor management system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1297553A (en) * | 1998-12-14 | 2001-05-30 | 皇家菲利浦电子有限公司 | Biometric identification mechanism that preserves integrity of biometric information |
CN101459518A (en) * | 2008-12-01 | 2009-06-17 | 清华大学 | Digital cipher extraction and protection method based on biological characteristic |
CN101976321A (en) * | 2010-09-21 | 2011-02-16 | 北京工业大学 | Generated encrypting method based on face feature key |
US8422746B2 (en) * | 2009-04-28 | 2013-04-16 | Samsung Electro-Mechanics Co., Ltd. | Face authentication system and authentication method thereof |
-
2014
- 2014-03-03 CN CN201410075104.9A patent/CN103886235B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1297553A (en) * | 1998-12-14 | 2001-05-30 | 皇家菲利浦电子有限公司 | Biometric identification mechanism that preserves integrity of biometric information |
CN101459518A (en) * | 2008-12-01 | 2009-06-17 | 清华大学 | Digital cipher extraction and protection method based on biological characteristic |
US8422746B2 (en) * | 2009-04-28 | 2013-04-16 | Samsung Electro-Mechanics Co., Ltd. | Face authentication system and authentication method thereof |
CN101976321A (en) * | 2010-09-21 | 2011-02-16 | 北京工业大学 | Generated encrypting method based on face feature key |
Non-Patent Citations (1)
Title |
---|
"基于人脸特征密钥生成的身份认证系统";毋立芳等;《中国科技论文在线》;20111031;第6卷(第10期);750-753 * |
Also Published As
Publication number | Publication date |
---|---|
CN103886235A (en) | 2014-06-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103886235B (en) | Face image biological key generating method | |
CN104298973B (en) | Facial image spinning solution based on self-encoding encoder | |
CN104168112B (en) | A Key Generation Method Based on Multimodal Biometric Features | |
CN104156464B (en) | Micro- video retrieval method and device based on micro- video frequency feature data storehouse | |
CN108573243A (en) | A kind of comparison method of the low quality face based on depth convolutional neural networks | |
CN110659379B (en) | A Searchable Encrypted Image Retrieval Method Based on Deep Convolutional Network Features | |
CN103870810B (en) | Method for generating human digital vein biometric key | |
CN110188667B (en) | A Face Correction Method Based on Tripartite Adversarial Generative Network | |
CN118211268A (en) | Heterogeneous federal learning privacy protection method and system based on diffusion model | |
CN111242078A (en) | A face-to-face generation method based on self-attention mechanism | |
Juefei-Xu et al. | Fastfood dictionary learning for periocular-based full face hallucination | |
CN108199828A (en) | A kind of color image Encryption Algorithm and device | |
CN117391968A (en) | A face image restoration method, system, storage medium and equipment | |
CN102710417A (en) | Fuzzy vault method based on fingerprint features and Internet key exchange protocol | |
CN116684061A (en) | A private picture encryption method and device based on an improved AES algorithm based on key expansion | |
CN114419178B (en) | A method and device for generating line drawings corresponding to murals based on deep learning | |
CN108921106B (en) | A face recognition method based on capsule | |
CN113973161B (en) | Image encryption method for compressed sensing and chaotic systems based on deep learning | |
CN119541052A (en) | Gesture recognition method and system based on multi-head attention and spatiotemporal feature fusion | |
CN117993480B (en) | AIGC federated learning method for designer style fusion and privacy protection | |
CN118839750A (en) | Clustering federation learning method based on data characterization optimization and related equipment | |
CN102750523A (en) | Face recognition method and device | |
Chen et al. | Optional multi-biometric cryptosystem based on fuzzy extractor | |
CN104052607B (en) | Signature verification method based on aspherical Gauss sampling | |
CN115830679A (en) | Face recognition method based on secret sharing and federal learning |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |