CN109657627A - Auth method, device and electronic equipment - Google Patents
Auth method, device and electronic equipment Download PDFInfo
- Publication number
- CN109657627A CN109657627A CN201811578077.1A CN201811578077A CN109657627A CN 109657627 A CN109657627 A CN 109657627A CN 201811578077 A CN201811578077 A CN 201811578077A CN 109657627 A CN109657627 A CN 109657627A
- Authority
- CN
- China
- Prior art keywords
- image
- portrait image
- portrait
- identified
- comparison diagram
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/168—Feature extraction; Face representation
- G06V40/171—Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Oral & Maxillofacial Surgery (AREA)
- General Health & Medical Sciences (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Image Processing (AREA)
Abstract
The embodiment of the present invention provides a kind of auth method, device and electronic equipment.Wherein, the auth method includes: the identification marking for reading the identity document of user to be identified, and to obtain the certificate information of the user to be identified, the certificate information includes the first portrait image of the user to be identified;Acquire the second portrait image of the user to be identified;Judge whether first portrait image meets setting condition;If it is not, then acquiring the image data of the identity document, third portrait image is obtained;The third portrait image and second portrait image are compared, obtain veritifying result.By the way that when the first portrait image is unsatisfactory for condition, the image on captured identity certificate, can be improved the effect for obtaining the image of identity document again, rate is proved to be successful to improve.
Description
Technical field
The present invention relates to field of computer technology, set in particular to a kind of auth method, device and electronics
It is standby.
Background technique
It is directly using the information in card reader of ID card reading identity card chip that the current testimony of a witness, which veritifies technology, and face is known
Other algorithm carries out recognition of face and parsing to the picture in information, and extracts characteristic value, the holder photo captured with scene into
Row, which is veritified, to be compared.
But since the pixel of the identity card picture in identity card chip is particularly low, photo size is particularly small, so
The certain probability of face recognition algorithms can not identify face, cause veritification process that can not continue, so as to will lead to identity
The failure of veritification.
Summary of the invention
In view of this, the embodiment of the present invention is designed to provide a kind of auth method, device and electronic equipment.
In a first aspect, a kind of auth method provided in an embodiment of the present invention, comprising:
The identification marking of the identity document of user to be identified is read, it is described to obtain the certificate information of the user to be identified
Certificate information includes the first portrait image of the user to be identified;
Acquire the second portrait image of the user to be identified;
Judge whether first portrait image meets setting condition;
If it is not, then acquiring the image data of the identity document, third portrait image is obtained;
The third portrait image and second portrait image are compared, obtain veritifying result.
It is optionally, described that the step of whether first portrait image meets setting condition judged, comprising:
Judge in first portrait image whether identifiable human face region, identifiable human face region if it exists, then
It indicates that first portrait image meets to impose a condition.
Optionally, it is described judge in first portrait image whether identifiable human face region the step of, comprising:
First portrait image is identified using face recognition algorithms, obtains recognition result;
Judge whether to recognize human face region according to the recognition result, if recognizing human face region, then it represents that described
One portrait image, which meets, to impose a condition.
Optionally, the image data of the acquisition identity document, the step of obtaining third portrait image, comprising:
Start the first image collecting device, the picture number of the identity document is acquired by the first image acquisition device
According to obtaining third portrait image.
Optionally, the image data of the acquisition identity document, the step of obtaining third portrait image, comprising:
Image capture instruction is sent to external image capture device, so that external image acquisition equipment acquires the body
The image data of part certificate;
Receive the image data that the external image acquisition equipment is sent.
Optionally, the method also includes:
Acquire the second portrait image of the user to be identified;
The third portrait image and second portrait image are compared, obtain veritifying result.
Optionally, described to compare the third portrait image and second portrait image, it obtains veritifying result
The step of, comprising:
By the face portion intercepts in the third portrait image, the first comparison diagram is obtained;
By the face portion intercepts in second portrait image, the second comparison diagram is obtained;
First comparison diagram and second comparison diagram are compared, obtain veritifying result.
Optionally, described to compare first comparison diagram and second comparison diagram, obtain the step for veritifying result
Suddenly, comprising:
The feature for extracting first comparison diagram, obtains the First Eigenvalue;
The feature for extracting second comparison diagram, obtains Second Eigenvalue;
The First Eigenvalue and Second Eigenvalue input face are judged to calculate in algorithm, obtained to score
Value;
Judge whether the comparison score value is greater than the set value, if so, being judged to being proved to be successful, otherwise authentication failed.
Optionally, described that required portion intercepts will be compared in the third portrait image, obtain the first comparison diagram
Step, comprising:
By the face portion intercepts in the third portrait image, the first comparison diagram is obtained;
It is described will be compared in second portrait image required for portion intercepts, the step of obtaining the second comparison diagram, packet
It includes:
Optionally, by the face portion intercepts of second portrait image, the second comparison diagram is obtained.
After judging whether first portrait image meets setting condition, further includes:
If judging that first portrait image meets to impose a condition, by first portrait image and second portrait
Image compares, and obtains veritifying result.
Second aspect, the embodiment of the present invention also provide a kind of authentication means, comprising:
Read module, the identification marking of the identity document for reading user to be identified, to obtain the user's to be identified
Certificate information, the certificate information include the first portrait image of the user to be identified;
Judgment module, for judging whether first portrait image meets setting condition;
Second acquisition module acquires the image data of the identity document if being judged as NO for the judgment module,
Obtain third portrait image;
First acquisition module, for acquiring the second portrait image of the user to be identified;
Contrast module obtains veritifying knot for comparing the third portrait image and second portrait image
Fruit.
The third aspect, the embodiment of the present invention also provide a kind of electronic equipment, comprising: memory and processor, it is described to deposit
Reservoir for storing computer program, the processor is used to that the computer program to be read and run from the memory,
To execute the above method.
Fourth aspect, the embodiment of the present invention also provide a kind of computer readable storage medium, the computer-readable storage
Computer program is stored on medium, the computer program executes above-mentioned method when being run by processor the step of.
Compared with prior art, the auth method, device and electronic equipment of the embodiment of the present invention.By to pass through read
It takes identification marking to obtain the image in certificate information to be judged, if it is impossible to meet set for the image obtained by identification marking
Fixed condition then can obtain the image on identity document again through the mode that image capture device acquires image, to obtain
It can be used for the third portrait image verified.Further to carry out realization veritification using third portrait image, authentication is improved
Success rate.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, special embodiment below, and appended by cooperation
Attached drawing is described in detail below.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached
Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair
The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this
A little attached drawings obtain other relevant attached drawings.
Fig. 1 is the block diagram of electronic equipment provided in an embodiment of the present invention.
Fig. 2 is the flow chart of auth method provided in an embodiment of the present invention.
Fig. 3 is the detail flowchart of the step S205 of auth method provided in an embodiment of the present invention.
Fig. 4 shows the flow diagram of testimony of a witness checking method according to an embodiment of the invention.
Fig. 5 is the functional block diagram of authentication means provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete
Ground description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Usually exist
The component of the embodiment of the present invention described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause
This, is not intended to limit claimed invention to the detailed description of the embodiment of the present invention provided in the accompanying drawings below
Range, but it is merely representative of selected embodiment of the invention.Based on the embodiment of the present invention, those skilled in the art are not doing
Every other embodiment obtained under the premise of creative work out, shall fall within the protection scope of the present invention.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi
It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.Meanwhile of the invention
In description, term " first ", " second " etc. are only used for distinguishing description, are not understood to indicate or imply relative importance.
The testimony of a witness veritifies all-in-one machine at present, supports that the identity information on live face and identity document is veritified, this side
Case requires that identity card or other certificates need to be provided.The photo on certificate is obtained by reading additional clause chip, it then will card
The portrait of image and collection in worksite on part compares, to realize that the testimony of a witness is veritified.It, may but in practical application scene
It will appear that the image pixel read by additional clause chip is lower, the face in image can not be recognized, may result in
Veritify failure.
Based on deficiency present in foregoing description, the application, which provides multiple embodiments, can efficiently solve above-mentioned deficiency,
It is described in detail below.
Embodiment one
Firstly, describing the exemplary electronic device of the auth method for realizing the embodiment of the present invention referring to Fig.1
100.The exemplary electronic device 100 can be computer, be also possible to the mobile terminals such as smart phone, tablet computer.
As shown in Figure 1, electronic equipment 100 includes one or more processors 102, one or more storage devices 104.It can
Selection of land, electronic equipment 100 can also include input unit 106, output device 108 and image collecting device 110, these components
It is interconnected by bindiny mechanism's (not shown) of bus system 112 and/or other forms.It should be noted that electronic equipment shown in FIG. 1
100 component and structure be it is illustrative, and not restrictive, as needed, electronic equipment 100 also can have other groups
Part and structure.
The processor 102 can be central processing unit (CPU), graphics processing unit (GPU) or have at data
The processing unit of reason ability and/or the other forms of instruction execution capability, and can control its in the electronic equipment 100
Its component is to execute desired function.
The storage device 104 may include one or more computer program products, and the computer program product can
To include various forms of computer readable storage mediums, such as volatile memory and/or nonvolatile memory.It is described easy
The property lost memory for example may include random access memory (RAM) and/or cache memory (cache) etc..It is described non-
Volatile memory for example may include read-only memory (ROM), hard disk, flash memory etc..In the computer readable storage medium
On can store one or more computer program instructions, processor 102 can run described program instruction, to realize hereafter institute
The client functionality (realized by processor) in the embodiment of the present invention stated and/or other desired functions.In the meter
Can also store various application programs and various data in calculation machine readable storage medium storing program for executing, for example, the application program use and/or
The various data etc. generated.
The input unit 106 can be the device that user is used to input instruction, and may include keyboard, mouse, wheat
One or more of gram wind and touch screen etc..
The output device 108 can export various information (for example, image or sound) to external (for example, user), and
It and may include one or more of display, loudspeaker etc..
Described image acquisition device 110 can shoot the desired image of user (such as photo, video etc.), and will be clapped
The image taken the photograph is stored in the storage device 104 for the use of other components.Specifically, the electronic equipment in the present embodiment
100 may include multiple images acquisition device 110, and different image collecting devices 110 can be used for acquiring different picture numbers
According to.
Illustratively, for realizing auth method according to an embodiment of the present invention, the exemplary electron of apparatus and system
Each device in equipment can integrate setting, such as can also be filled processor 102, storage device 104, input with scattering device
Set 106 and output device 108 it is integrally disposed in one, and it is image collecting device 110 is separately positioned.
In the present embodiment, electronic equipment 100 may be implemented as the above-mentioned testimony of a witness and veritify all-in-one machine.The testimony of a witness veritifies all-in-one machine
It is connect by network with server communication, encryption data can be sent to server so that server is further tested
Card.Certainly, server can also veritify all-in-one machine with one or more testimony of a witnesies by network and be communicatively coupled, to carry out data
Communication or interaction.The server can be network server, database server etc..
Embodiment two
The present embodiment provides a kind of auth method, the auth method in the present embodiment can veritify one by the testimony of a witness
Body machine executes.Specifically, referring to Fig. 2, being the flow chart of auth method provided in an embodiment of the present invention.It below will be to figure
Detailed process shown in 2 is described in detail.
Step S201 reads the identification marking of the identity document of user to be identified, to obtain the certificate of the user to be identified
Information.
Certificate information includes the first portrait image of user to be identified.The first above-mentioned portrait image can be portrait figure
Piece, portrait video, portrait cardon etc..
In the present embodiment, the certificate information includes the first portrait image of the user to be identified.
Above-mentioned identification marking can be mounted in the chip on identity document.
Identification marking is also possible to be attached to the mark that the identification code etc. on identity document can store certificate information, for example,
Two dimensional code, bar code, character string etc..
Step S202 acquires the second portrait image of the user to be identified.
The second acquisition device that electronic equipment can be used in the second above-mentioned portrait image collects.
Step S203, judges whether the first portrait image meets setting condition.
In the present embodiment, imposes a condition and can be the condition that there is the face that can be identified in image, be also possible to image
The middle condition that there are the face such as human eye, nose, the mouth that can be identified, can also be there is the item for the pupil that can be identified in image
Part or other conditions, as long as the first portrait image for meeting setting condition is sufficient for the comparison with the second portrait image.
Algorithm used in subsequent contrast's step is different, and setting condition can also be different.For example, if comparison step uses face pair
Than imposing a condition is the condition that there is the face that can be identified in image, if comparison step is compared using face, sets item
Part is the condition that there are the face that can be identified in image.Meanwhile the condition of " recognizable " is also relied on subsequent contrast's step and is made
Depending on the requirement of algorithm.
Specifically, step S203 may be implemented as: judge in first portrait image with the presence or absence of identifiable people
Face region, if it exists identifiable human face region, then it represents that first portrait image, which meets, to impose a condition.
Further, specifically judging whether there is facial image can be used face recognition algorithms, described in above-mentioned judgement
The step of whether there is identifiable human face region in first portrait image may be implemented as: using face recognition algorithms to institute
It states the first portrait image to be identified, obtains recognition result;Judge whether to recognize human face region according to the recognition result, if
Recognize human face region, then it represents that first portrait image, which meets, to impose a condition.
Face recognition algorithms can be the method based on geometrical characteristic, the method based on template and the method based on model.
Wherein, the above-mentioned method based on geometrical characteristic is that the identification of progress front face is important generally by human eye, mouth, nose etc. is extracted
The geometry of the vitals such as the position of characteristic point and eyes is as characteristic of division.Method based on template, which can be divided into, to be based on
The method of relevant matches, linear discriminant analysis method, singular value decomposition method, neural network method, dynamically connects eigenface method
Connect matching process etc..Method based on model then has based on hidden markov model, active shape model and active appearance models
Method etc..The present embodiment will not carry out that explanation is unfolded one by one with regard to above-mentioned each face recognition algorithms, it is to be understood that this
The technical staff in field is on the basis of the embodiment of the present application, the suitable face recognition algorithms of the selection of being adapted to property, thus
Realize in the first portrait image whether include identifiable face judge.
It, can be according to the detection face used since the possible corresponding recognition capability of different face recognition algorithms is different
Algorithm is different, and above-mentioned setting condition can also correspond to difference.
In one embodiment, the first above-mentioned portrait image is identified according to sorting algorithm, face classification
Algorithm output the result is that about the first portrait image whether include face score, then above-mentioned setting condition can be score
Whether the point threshold of face score is greater than.Specifically, face classification algorithm may include that network (Region is suggested in region
Proposal Network, abbreviation RPN), region convolutional neural networks (Regions with CNN features, referred to as
RCNN) scheduling algorithm.
The testimony of a witness, which is veritified, mainly realizes verifying with comparing by reading identification marking image obtained for living body,
Meet preferentially using reading identification marking image obtained without in addition acquiring image when imposing a condition, therefore first determines whether
Whether the image that the identity document recognized carries meets setting condition, and the efficiency that the subsequent testimony of a witness is veritified can be improved, and improves
The accuracy rate that the testimony of a witness is veritified.
If judging that first portrait image meets to impose a condition, by first portrait image and second portrait
Image compares, and obtains veritifying result.
If judging, first portrait image is unsatisfactory for imposing a condition, and thens follow the steps S204.
Step S204 acquires the image data of the identity document, obtains third portrait image.
In the present embodiment, when being unsatisfactory for imposing a condition in identification marking the first portrait image obtained by reading,
Third portrait image is further then obtained by step S204.Wherein, third portrait image can pass through the figure of electronic equipment
As acquisition device collects, can also be collected by the acquisition equipment communicated to connect with electronic equipment.Acquire the body
The image data of part certificate, refers to the image data that captured identity document surface is printed on.
In a kind of possible embodiment, step S204 is implemented as: the first image collecting device of starting, passes through described the
The image data of identity document described in one image acquisition device obtains third portrait image.First image collecting device can
To start automatically when judging that the first portrait image is unsatisfactory for and imposing a condition.
Testimony of a witness core can be improved to avoid equipment is added by the first image acquisition device that electronic equipment carries
Test the globality of all-in-one machine.Particularly, the first image collecting device can veritify the OCR integrated on all-in-one machine for the testimony of a witness
(Optical Character Recognition, optical character identification) camera, OCR camera can be it is downward, specially
For taking pictures to the certificate laid flat.
In a kind of possible embodiment, step S204 is implemented as: sending Image Acquisition to external image capture device
Instruction, so that external image acquisition equipment acquires the image data of the identity document;Receive the external image acquisition
The image data that equipment is sent.
Above-mentioned third portrait image is acquired by using external world's acquisition equipment, the original testimony of a witness can not be changed and veritify one
The overall structure of body machine also can be realized the acquisition methods of the image in various identity cards.
The auth method of the embodiment of the present invention, by obtaining the image in certificate information to by reading identification marking
Judged, it, can be again through Image Acquisition if it is impossible to meet setting conditions for the image obtained by identification marking
The mode of equipment acquisition image obtains the image on identity document, to obtain the third portrait image that can be used for verifying.Pass through
The image that the image that identification marking obtains is stored by identity document library, has that resolution ratio is too small to be not enough to compare sometimes
The problem of step, the image that image capture device is acquired from identity document usually have it is higher be sufficient for subsequent contrast step
Rapid resolution ratio.
Through the above steps in the available identity document of the step of S201, S203 and S204 including human face region the
Three portrait images.Third portrait image it is possible to further obtain step S204 is used for testimony of a witness verifying, to realize effective
The ground testimony of a witness is veritified.Therefore, on the basis of step S201, S203 and S204, can also include the following steps, to realize the testimony of a witness
It veritifies.
The second portrait image of the above-mentioned acquisition user to be identified is to capture to obtain to the object to be identified scene of carrying out
Candid photograph figure.
In the present embodiment, the sequence of step S202 and S201, S203 and S204 is not with flow chart shown in Fig. 2 signal
Sequence is limited, and step S202 can be held in the arbitrary procedure node in tri- step S201, step S203, step S204 steps
Row, as long as being executed before comparing step S205.For example, step S202 can be executed before step S201, step S202
It can also be executed after step S201 before step S203, step S202 can also be before step S204 after step S203
It executes;Step S202 can also be executed after step s 204.
Step S205 compares the third portrait image and second portrait image, obtains veritifying result.
Consider that the second portrait image and the size of third portrait image, length-width ratio may be different, and hence it is also possible to adjust the
The size of portrait part in three portrait images and the second portrait image, comparison is better achieved.
In the present embodiment, portrait part, identity information section, the second portrait may include in above-mentioned third portrait image
It may include the face of user to be identified, the face of other personnel and some other backgrounds in image, but by third
Portrait image and the second portrait image carry out only needing part required for comparison algorithm therein when the 1:1 testimony of a witness is veritified.Wherein,
The image on the image and identity document that indicate a collection in worksite is veritified in above-mentioned 1:1 comparison, and a collection in worksite image is to one
The veritification of the image behavior of identity document.It therefore, can be first by the comparison algorithm in third portrait image and the second portrait image
Required part is intercepted, and the first comparison of part (such as face, face, pupil) required for only including comparison is obtained
Figure, the second comparison diagram.
In a kind of possible embodiment, step S205 then may include: needed for comparing in the third portrait image
The portion intercepts wanted obtain the first comparison diagram;Portion intercepts required for comparing in second portrait image, obtain second
Comparison diagram;First comparison diagram and second comparison diagram are compared, obtain veritifying result.
Wherein, only possible in third portrait image includes a facial image, then can by third portrait image into
Row recognition of face, interception recognizes to be intercepted for the part of face.The recognition of face of third portrait image can be passed through
The OCR face recognition algorithms integrated on OCR camera carry out.
It may include multiple faces in second portrait image, then need to the part for being identified as face in the second portrait image
It is selected, then by the face portion intercepts in second portrait image, obtaining the second comparison diagram be may be implemented as: detection
Face in second portrait image;Maximum face in the face detected is intercepted to be allocated as the second comparison diagram.
By being obtained according further to interception by the face portion intercepts in the second facial image and third portrait image
Facial image carry out 1:1 comparison and veritify, the available other backgrounds reduced in third portrait image and the second portrait image
Or the interference of face, the accuracy rate of testimony of a witness verifying can be improved.
In a kind of possible embodiment, as shown in figure 3, step S205 may include:
Step S2051 extracts the feature of the first comparison diagram, obtains the First Eigenvalue;
Step S2052 extracts the feature of the second comparison diagram, obtains Second Eigenvalue;
The First Eigenvalue and Second Eigenvalue input face are judged to calculate in algorithm by step S2053,
Obtain comparison score value;
Step S2054, judges whether the comparison score value is greater than the set value, if so, otherwise testing being judged to being proved to be successful
Card failure.
Above-mentioned comparison score value can be expressed as the similarity of the First Eigenvalue and Second Eigenvalue.
The sequencing of step S2051 and step S2052 are with no restrictions.
The similarity for obtaining two face characteristics is compared in the First Eigenvalue and Second Eigenvalue obtained by face,
By verifying whether the two face characteristics belong to same people compared with setting value.Setting value can be set according to concrete condition
It sets, in an example, setting value can be 70%, 75%, 80% equivalence.
It is unsatisfactory for being sufficient for the setting condition of subsequent contrast's step in the first portrait image obtained by identification marking
When, then third portrait image is obtained by the image data of captured identity certificate, two ways obtains the portrait on identity document
The probability for obtaining and meeting the portrait image that subsequent contrast's step uses can be improved in image, also further improves testimony of a witness veritification
Success rate.
It should be noted that step shown in the flowchart of the accompanying drawings can be in such as a group of computer-executable instructions
It is executed in computer system, although also, logical order is shown in flow charts, and it in some cases, can be with not
The sequence being same as herein executes shown or described step.
The process of auth method is described so that identity document is identity card as an example below.Fig. 4 shows according to the present invention one
The flow diagram of the testimony of a witness checking method of a embodiment.As shown in figure 4, the process of testimony of a witness checking method is as follows:
User holds identity card and carries out veritification of swiping the card;
The testimony of a witness veritifies the information in the card reader of ID card reading identity card chip of all-in-one machine, obtains the photograph in identity card
Piece;
The camera that the testimony of a witness veritifies all-in-one machine captures the facial image (not shown) of user;
The face recognition algorithms on all-in-one machine, which are veritified, by the testimony of a witness judges whether the photo in identity card can recognize that people
Face;
If the photo in identity card can recognize that face, by identity card photo and capture user image into
Row comparison is veritified;
If the photo in identity card cannot recognize that face, the automatic OCR camera shooting started on testimony of a witness veritification all-in-one machine
Head carries out people to gained photo of taking pictures to the photograph on identity card, with the OCR face recognition algorithms integrated on OCR camera
Result after identification and the image for capturing user are compared veritification by face identification.
Embodiment three
Conceived based on same application, additionally provides identity corresponding with above-mentioned auth method in the embodiment of the present application
Device is verified, the principle and the above-mentioned auth method embodiment of the application solved the problems, such as due to the device in the embodiment of the present application
It is similar, therefore the implementation of device may refer to the implementation of method, overlaps will not be repeated.Specifically, referring to Fig. 5, being this
The functional block diagram for the authentication means that inventive embodiments provide.It is each in authentication means in the present embodiment
Module is used to execute each step in above method embodiment.The authentication means include: read module 301, first
Acquisition module 302, judgment module 303, the second acquisition module 304 and contrast module 305, wherein
Read module 301, the identification marking of the identity document for reading user to be identified, to obtain the user to be identified
Certificate information, the certificate information includes the first portrait image of the user to be identified;
First acquisition module 302, for acquiring the second portrait image of the user to be identified;
Judgment module 303, for judging whether first portrait image meets setting condition;
Second acquisition module 304 acquires the figure of the identity document if being judged as NO for the judgment module 303
As data, third portrait image is obtained;
Contrast module 305 compares the third portrait image and second portrait image, obtains veritifying knot
Fruit.
A kind of optional embodiment, judgment module 303 are also used to:
Judge in first portrait image whether identifiable human face region, identifiable human face region if it exists, then
It indicates that first portrait image meets to impose a condition.
A kind of optional embodiment, judgment module 303 are also used to:
First portrait image is identified using face recognition algorithms, obtains recognition result;
Judge whether to recognize human face region according to the recognition result, if recognizing human face region, then it represents that described
One portrait image, which meets, to impose a condition.
A kind of optional embodiment, the second acquisition module 304, is also used to:
Start the first image collecting device, the picture number of the identity document is acquired by the first image acquisition device
According to obtaining third portrait image.
A kind of optional embodiment, the second acquisition module 304, is also used to:
Image capture instruction is sent to external image capture device, so that external image acquisition equipment acquires the body
The image data of part certificate;
Receive the image data that the external image acquisition equipment is sent.
A kind of optional embodiment, contrast module 305 are also used to:
Portion intercepts required for comparing in the third portrait image, obtain the first comparison diagram;
Portion intercepts required for comparing in second portrait image, obtain the second comparison diagram;
First comparison diagram and second comparison diagram are compared, obtain veritifying result.
A kind of optional embodiment, contrast module 305 are also used to:
By the face portion intercepts in the third portrait image, the first comparison diagram is obtained;
By the face portion intercepts in second portrait image, the second comparison diagram is obtained;
First comparison diagram and second comparison diagram are compared, obtain veritifying result.
A kind of optional embodiment, contrast module 305 are also used to:
The feature for extracting first comparison diagram, obtains the First Eigenvalue;
The feature for extracting second comparison diagram, obtains Second Eigenvalue;
The First Eigenvalue and Second Eigenvalue input face are judged to calculate in algorithm, obtained to score
Value;
Judge whether the comparison score value is greater than the set value, if so, being judged to being proved to be successful, otherwise authentication failed.
A kind of optional embodiment, contrast module 305 are also used to:
If the judgment module 303 is judged as YES, first portrait image and second portrait image are carried out
Comparison obtains veritifying result.
The authentication means of the embodiment of the present invention, by obtaining the image in certificate information to by reading identification marking
Judged, it, can be again through Image Acquisition if it is impossible to meet setting conditions for the image obtained by identification marking
The mode of equipment acquisition image obtains the image on identity document, to obtain the third portrait image that can be used for verifying.
The embodiment of the present invention also provides a kind of computer readable storage medium, stores on the computer readable storage medium
There is computer program, the step in above method embodiment is executed when the computer program is run by processor.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through
Other modes are realized.The apparatus embodiments described above are merely exemplary, for example, flow chart and block diagram in attached drawing
Show the device of multiple embodiments according to the present invention, the architectural framework in the cards of method and computer program product,
Function and operation.In this regard, each box in flowchart or block diagram can represent the one of a module, section or code
Part, a part of the module, section or code, which includes that one or more is for implementing the specified logical function, to be held
Row instruction.It should also be noted that function marked in the box can also be to be different from some implementations as replacement
The sequence marked in attached drawing occurs.For example, two continuous boxes can actually be basically executed in parallel, they are sometimes
It can execute in the opposite order, this depends on the function involved.It is also noted that every in block diagram and or flow chart
The combination of box in a box and block diagram and or flow chart can use the dedicated base for executing defined function or movement
It realizes, or can realize using a combination of dedicated hardware and computer instructions in the system of hardware.
In addition, each functional module in each embodiment of the present invention can integrate one independent portion of formation together
Point, it is also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module
It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention.
And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.It needs
Illustrate, herein, relational terms such as first and second and the like be used merely to by an entity or operation with
Another entity or operation distinguish, and without necessarily requiring or implying between these entities or operation, there are any this realities
The relationship or sequence on border.Moreover, the terms "include", "comprise" or its any other variant are intended to the packet of nonexcludability
Contain, so that the process, method, article or equipment for including a series of elements not only includes those elements, but also including
Other elements that are not explicitly listed, or further include for elements inherent to such a process, method, article, or device.
In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including the element
Process, method, article or equipment in there is also other identical elements.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field
For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair
Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.It should also be noted that similar label and letter exist
Similar terms are indicated in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, are then not required in subsequent attached drawing
It is further defined and explained.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain
Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.
Claims (12)
1. a kind of auth method characterized by comprising
The identification marking of the identity document of user to be identified is read, to obtain the certificate information of the user to be identified, the certificate
Information includes the first portrait image of the user to be identified;
Acquire the second portrait image of the user to be identified;
Judge whether first portrait image meets setting condition;
If it is not, then acquiring the image data of the identity document, third portrait image is obtained;
The third portrait image and second portrait image are compared, obtain veritifying result.
2. auth method as described in claim 1, which is characterized in that described to judge whether first portrait image is full
The step of foot imposes a condition, comprising:
Judge in first portrait image whether identifiable human face region, identifiable human face region if it exists, then it represents that
First portrait image, which meets, to impose a condition.
3. auth method as claimed in claim 2, which is characterized in that it is described judge in first portrait image whether
The step of identifiable human face region, comprising:
First portrait image is identified using face recognition algorithms, obtains recognition result;
Judge whether to recognize human face region according to the recognition result, if recognizing human face region, then it represents that described the first
It imposes a condition as image meets.
4. auth method as described in claim 1, which is characterized in that the picture number of the acquisition identity document
According to the step of obtaining third portrait image, comprising:
Start the first image collecting device, the image data of the identity document acquired by the first image acquisition device,
Obtain third portrait image.
5. auth method as described in claim 1, which is characterized in that the picture number of the acquisition identity document
According to the step of obtaining third portrait image, comprising:
Image capture instruction is sent to external image capture device, so that external image acquisition equipment acquires the identity card
The image data of part;
Receive the image data that the external image acquisition equipment is sent.
6. auth method as described in claim 1, which is characterized in that by the third portrait image and second people
As image compares, veritified as a result, obtaining the step of veritifying result, comprising:
Portion intercepts required for comparing in the third portrait image, obtain the first comparison diagram;
Portion intercepts required for comparing in second portrait image, obtain the second comparison diagram;
First comparison diagram and second comparison diagram are compared, obtain veritifying result.
7. auth method as claimed in claim 6, which is characterized in that described by first comparison diagram and described second
Comparison diagram compares, and obtains the step of veritifying result, comprising:
The feature for extracting first comparison diagram, obtains the First Eigenvalue;
The feature for extracting second comparison diagram, obtains Second Eigenvalue;
The First Eigenvalue and Second Eigenvalue input face are judged to calculate in algorithm, obtain comparison score value;
Judge whether the comparison score value is greater than the set value, if so, be judged to being proved to be successful, otherwise authentication failed.
8. auth method as claimed in claims 6 or 7, which is characterized in that it is described will be right in the third portrait image
Than required portion intercepts, the step of obtaining the first comparison diagram, comprising:
By the face portion intercepts in the third portrait image, the first comparison diagram is obtained;
It is described will be compared in second portrait image required for portion intercepts, the step of obtaining the second comparison diagram, comprising:
By the face portion intercepts of second portrait image, the second comparison diagram is obtained.
9. auth method as described in claim 1, which is characterized in that judging whether first portrait image meets
After setting condition, further includes:
If judging that first portrait image meets to impose a condition, by first portrait image and second portrait image
It compares, obtains veritifying result.
10. a kind of authentication means characterized by comprising
Read module, the identification marking of the identity document for reading user to be identified, to obtain the certificate of the user to be identified
Information, the certificate information include the first portrait image of the user to be identified;
First acquisition module, for acquiring the second portrait image of the user to be identified;
Judgment module, for judging whether first portrait image meets setting condition;
Second acquisition module acquires the image data of the identity document, obtains if being judged as NO for the judgment module
Third portrait image;
Contrast module obtains veritifying result for comparing the third portrait image and second portrait image.
11. a kind of electronic equipment characterized by comprising memory and processor, the memory is for storing computer
Program, the processor require 1~9 for the computer program to be read and run from the memory, with perform claim
Any one the method.
12. a kind of computer readable storage medium, computer program, feature are stored on the computer readable storage medium
It is, the computer program executes the step of above-mentioned method according to any one of claims 1 to 9 when being run by processor
Suddenly.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811578077.1A CN109657627A (en) | 2018-12-20 | 2018-12-20 | Auth method, device and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811578077.1A CN109657627A (en) | 2018-12-20 | 2018-12-20 | Auth method, device and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109657627A true CN109657627A (en) | 2019-04-19 |
Family
ID=66115926
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811578077.1A Pending CN109657627A (en) | 2018-12-20 | 2018-12-20 | Auth method, device and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109657627A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110490039A (en) * | 2019-05-30 | 2019-11-22 | 福建知鱼科技有限公司 | A kind of intelligence portrait Compare System |
CN112115748A (en) * | 2019-06-21 | 2020-12-22 | 腾讯科技(深圳)有限公司 | Certificate image identification method, certificate image identification device, terminal and storage medium |
CN112906741A (en) * | 2019-05-21 | 2021-06-04 | 北京嘀嘀无限科技发展有限公司 | Image processing method, image processing device, electronic equipment and storage medium |
CN113920752A (en) * | 2021-09-28 | 2022-01-11 | 云南思立耐特信息系统工程有限公司 | Intelligent transportation infrastructure monitoring management system |
CN114266267A (en) * | 2021-12-20 | 2022-04-01 | 武汉烽火众智智慧之星科技有限公司 | Automatic identification method and device for collecting two-dimensional codes, documents, certificates and human faces and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100079243A1 (en) * | 2008-03-26 | 2010-04-01 | Yasushi Hamada | Authentication system, authentication method, and authentication program |
CN104112114A (en) * | 2013-10-30 | 2014-10-22 | 北京安捷天盾科技发展有限公司 | Identity verification method and device |
CN207264409U (en) * | 2017-10-17 | 2018-04-20 | 北京旷视科技有限公司 | The testimony of a witness veritifies device |
CN108875495A (en) * | 2017-10-17 | 2018-11-23 | 北京旷视科技有限公司 | The testimony of a witness veritifies device and testimony of a witness checking method |
-
2018
- 2018-12-20 CN CN201811578077.1A patent/CN109657627A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100079243A1 (en) * | 2008-03-26 | 2010-04-01 | Yasushi Hamada | Authentication system, authentication method, and authentication program |
CN104112114A (en) * | 2013-10-30 | 2014-10-22 | 北京安捷天盾科技发展有限公司 | Identity verification method and device |
CN207264409U (en) * | 2017-10-17 | 2018-04-20 | 北京旷视科技有限公司 | The testimony of a witness veritifies device |
CN108875495A (en) * | 2017-10-17 | 2018-11-23 | 北京旷视科技有限公司 | The testimony of a witness veritifies device and testimony of a witness checking method |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112906741A (en) * | 2019-05-21 | 2021-06-04 | 北京嘀嘀无限科技发展有限公司 | Image processing method, image processing device, electronic equipment and storage medium |
CN110490039A (en) * | 2019-05-30 | 2019-11-22 | 福建知鱼科技有限公司 | A kind of intelligence portrait Compare System |
CN112115748A (en) * | 2019-06-21 | 2020-12-22 | 腾讯科技(深圳)有限公司 | Certificate image identification method, certificate image identification device, terminal and storage medium |
CN112115748B (en) * | 2019-06-21 | 2023-08-25 | 腾讯科技(深圳)有限公司 | Certificate image recognition method, device, terminal and storage medium |
CN113920752A (en) * | 2021-09-28 | 2022-01-11 | 云南思立耐特信息系统工程有限公司 | Intelligent transportation infrastructure monitoring management system |
CN114266267A (en) * | 2021-12-20 | 2022-04-01 | 武汉烽火众智智慧之星科技有限公司 | Automatic identification method and device for collecting two-dimensional codes, documents, certificates and human faces and storage medium |
CN114266267B (en) * | 2021-12-20 | 2024-03-19 | 武汉烽火众智智慧之星科技有限公司 | Automatic identification method, device and storage medium for integrating two-dimension codes, documents, certificates and faces |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fathy et al. | Face-based active authentication on mobile devices | |
CN109657627A (en) | Auth method, device and electronic equipment | |
CN107844748B (en) | Auth method, device, storage medium and computer equipment | |
Feng et al. | Integration of image quality and motion cues for face anti-spoofing: A neural network approach | |
Kähm et al. | 2d face liveness detection: An overview | |
da Silva Pinto et al. | Video-based face spoofing detection through visual rhythm analysis | |
WO2018086543A1 (en) | Living body identification method, identity authentication method, terminal, server and storage medium | |
Schwartz et al. | Face spoofing detection through partial least squares and low-level descriptors | |
CN112651348B (en) | Identity authentication method and device and storage medium | |
CN103426016B (en) | Method and device for authenticating second-generation identity card | |
US9436883B2 (en) | Collaborative text detection and recognition | |
CN102375970B (en) | A kind of identity identifying method based on face and authenticate device | |
CN109325933A (en) | A kind of reproduction image-recognizing method and device | |
US20180034852A1 (en) | Anti-spoofing system and methods useful in conjunction therewith | |
WO2019061658A1 (en) | Method and device for positioning eyeglass, and storage medium | |
CN107451510A (en) | Biopsy method and In vivo detection system | |
CN108573202A (en) | Identity identifying method, device and system and terminal, server and storage medium | |
CN110458063B (en) | Human face living body detection method for preventing video and photo cheating | |
CN105844206A (en) | Identity authentication method and identity authentication device | |
JP6351243B2 (en) | Image processing apparatus and image processing method | |
CN105574509B (en) | A kind of face identification system replay attack detection method and application based on illumination | |
CN107480586B (en) | Detection method of biometric photo counterfeiting attack based on facial feature point displacement | |
JP2016031679A (en) | Object identification device, object identification method, and program | |
CN107911643A (en) | Show the method and apparatus of scene special effect in a kind of video communication | |
CN107992845A (en) | A kind of face recognition the method for distinguishing and device, computer equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190419 |
|
WD01 | Invention patent application deemed withdrawn after publication |