[go: up one dir, main page]

CN109657627A - Auth method, device and electronic equipment - Google Patents

Auth method, device and electronic equipment Download PDF

Info

Publication number
CN109657627A
CN109657627A CN201811578077.1A CN201811578077A CN109657627A CN 109657627 A CN109657627 A CN 109657627A CN 201811578077 A CN201811578077 A CN 201811578077A CN 109657627 A CN109657627 A CN 109657627A
Authority
CN
China
Prior art keywords
image
portrait image
portrait
identified
comparison diagram
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811578077.1A
Other languages
Chinese (zh)
Inventor
王晖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Megvii Technology Co Ltd
Original Assignee
Beijing Megvii Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Megvii Technology Co Ltd filed Critical Beijing Megvii Technology Co Ltd
Priority to CN201811578077.1A priority Critical patent/CN109657627A/en
Publication of CN109657627A publication Critical patent/CN109657627A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation
    • G06V40/171Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Image Processing (AREA)

Abstract

The embodiment of the present invention provides a kind of auth method, device and electronic equipment.Wherein, the auth method includes: the identification marking for reading the identity document of user to be identified, and to obtain the certificate information of the user to be identified, the certificate information includes the first portrait image of the user to be identified;Acquire the second portrait image of the user to be identified;Judge whether first portrait image meets setting condition;If it is not, then acquiring the image data of the identity document, third portrait image is obtained;The third portrait image and second portrait image are compared, obtain veritifying result.By the way that when the first portrait image is unsatisfactory for condition, the image on captured identity certificate, can be improved the effect for obtaining the image of identity document again, rate is proved to be successful to improve.

Description

Auth method, device and electronic equipment
Technical field
The present invention relates to field of computer technology, set in particular to a kind of auth method, device and electronics It is standby.
Background technique
It is directly using the information in card reader of ID card reading identity card chip that the current testimony of a witness, which veritifies technology, and face is known Other algorithm carries out recognition of face and parsing to the picture in information, and extracts characteristic value, the holder photo captured with scene into Row, which is veritified, to be compared.
But since the pixel of the identity card picture in identity card chip is particularly low, photo size is particularly small, so The certain probability of face recognition algorithms can not identify face, cause veritification process that can not continue, so as to will lead to identity The failure of veritification.
Summary of the invention
In view of this, the embodiment of the present invention is designed to provide a kind of auth method, device and electronic equipment.
In a first aspect, a kind of auth method provided in an embodiment of the present invention, comprising:
The identification marking of the identity document of user to be identified is read, it is described to obtain the certificate information of the user to be identified Certificate information includes the first portrait image of the user to be identified;
Acquire the second portrait image of the user to be identified;
Judge whether first portrait image meets setting condition;
If it is not, then acquiring the image data of the identity document, third portrait image is obtained;
The third portrait image and second portrait image are compared, obtain veritifying result.
It is optionally, described that the step of whether first portrait image meets setting condition judged, comprising:
Judge in first portrait image whether identifiable human face region, identifiable human face region if it exists, then It indicates that first portrait image meets to impose a condition.
Optionally, it is described judge in first portrait image whether identifiable human face region the step of, comprising:
First portrait image is identified using face recognition algorithms, obtains recognition result;
Judge whether to recognize human face region according to the recognition result, if recognizing human face region, then it represents that described One portrait image, which meets, to impose a condition.
Optionally, the image data of the acquisition identity document, the step of obtaining third portrait image, comprising:
Start the first image collecting device, the picture number of the identity document is acquired by the first image acquisition device According to obtaining third portrait image.
Optionally, the image data of the acquisition identity document, the step of obtaining third portrait image, comprising:
Image capture instruction is sent to external image capture device, so that external image acquisition equipment acquires the body The image data of part certificate;
Receive the image data that the external image acquisition equipment is sent.
Optionally, the method also includes:
Acquire the second portrait image of the user to be identified;
The third portrait image and second portrait image are compared, obtain veritifying result.
Optionally, described to compare the third portrait image and second portrait image, it obtains veritifying result The step of, comprising:
By the face portion intercepts in the third portrait image, the first comparison diagram is obtained;
By the face portion intercepts in second portrait image, the second comparison diagram is obtained;
First comparison diagram and second comparison diagram are compared, obtain veritifying result.
Optionally, described to compare first comparison diagram and second comparison diagram, obtain the step for veritifying result Suddenly, comprising:
The feature for extracting first comparison diagram, obtains the First Eigenvalue;
The feature for extracting second comparison diagram, obtains Second Eigenvalue;
The First Eigenvalue and Second Eigenvalue input face are judged to calculate in algorithm, obtained to score Value;
Judge whether the comparison score value is greater than the set value, if so, being judged to being proved to be successful, otherwise authentication failed.
Optionally, described that required portion intercepts will be compared in the third portrait image, obtain the first comparison diagram Step, comprising:
By the face portion intercepts in the third portrait image, the first comparison diagram is obtained;
It is described will be compared in second portrait image required for portion intercepts, the step of obtaining the second comparison diagram, packet It includes:
Optionally, by the face portion intercepts of second portrait image, the second comparison diagram is obtained.
After judging whether first portrait image meets setting condition, further includes:
If judging that first portrait image meets to impose a condition, by first portrait image and second portrait Image compares, and obtains veritifying result.
Second aspect, the embodiment of the present invention also provide a kind of authentication means, comprising:
Read module, the identification marking of the identity document for reading user to be identified, to obtain the user's to be identified Certificate information, the certificate information include the first portrait image of the user to be identified;
Judgment module, for judging whether first portrait image meets setting condition;
Second acquisition module acquires the image data of the identity document if being judged as NO for the judgment module, Obtain third portrait image;
First acquisition module, for acquiring the second portrait image of the user to be identified;
Contrast module obtains veritifying knot for comparing the third portrait image and second portrait image Fruit.
The third aspect, the embodiment of the present invention also provide a kind of electronic equipment, comprising: memory and processor, it is described to deposit Reservoir for storing computer program, the processor is used to that the computer program to be read and run from the memory, To execute the above method.
Fourth aspect, the embodiment of the present invention also provide a kind of computer readable storage medium, the computer-readable storage Computer program is stored on medium, the computer program executes above-mentioned method when being run by processor the step of.
Compared with prior art, the auth method, device and electronic equipment of the embodiment of the present invention.By to pass through read It takes identification marking to obtain the image in certificate information to be judged, if it is impossible to meet set for the image obtained by identification marking Fixed condition then can obtain the image on identity document again through the mode that image capture device acquires image, to obtain It can be used for the third portrait image verified.Further to carry out realization veritification using third portrait image, authentication is improved Success rate.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, special embodiment below, and appended by cooperation Attached drawing is described in detail below.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 is the block diagram of electronic equipment provided in an embodiment of the present invention.
Fig. 2 is the flow chart of auth method provided in an embodiment of the present invention.
Fig. 3 is the detail flowchart of the step S205 of auth method provided in an embodiment of the present invention.
Fig. 4 shows the flow diagram of testimony of a witness checking method according to an embodiment of the invention.
Fig. 5 is the functional block diagram of authentication means provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete Ground description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Usually exist The component of the embodiment of the present invention described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause This, is not intended to limit claimed invention to the detailed description of the embodiment of the present invention provided in the accompanying drawings below Range, but it is merely representative of selected embodiment of the invention.Based on the embodiment of the present invention, those skilled in the art are not doing Every other embodiment obtained under the premise of creative work out, shall fall within the protection scope of the present invention.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.Meanwhile of the invention In description, term " first ", " second " etc. are only used for distinguishing description, are not understood to indicate or imply relative importance.
The testimony of a witness veritifies all-in-one machine at present, supports that the identity information on live face and identity document is veritified, this side Case requires that identity card or other certificates need to be provided.The photo on certificate is obtained by reading additional clause chip, it then will card The portrait of image and collection in worksite on part compares, to realize that the testimony of a witness is veritified.It, may but in practical application scene It will appear that the image pixel read by additional clause chip is lower, the face in image can not be recognized, may result in Veritify failure.
Based on deficiency present in foregoing description, the application, which provides multiple embodiments, can efficiently solve above-mentioned deficiency, It is described in detail below.
Embodiment one
Firstly, describing the exemplary electronic device of the auth method for realizing the embodiment of the present invention referring to Fig.1 100.The exemplary electronic device 100 can be computer, be also possible to the mobile terminals such as smart phone, tablet computer.
As shown in Figure 1, electronic equipment 100 includes one or more processors 102, one or more storage devices 104.It can Selection of land, electronic equipment 100 can also include input unit 106, output device 108 and image collecting device 110, these components It is interconnected by bindiny mechanism's (not shown) of bus system 112 and/or other forms.It should be noted that electronic equipment shown in FIG. 1 100 component and structure be it is illustrative, and not restrictive, as needed, electronic equipment 100 also can have other groups Part and structure.
The processor 102 can be central processing unit (CPU), graphics processing unit (GPU) or have at data The processing unit of reason ability and/or the other forms of instruction execution capability, and can control its in the electronic equipment 100 Its component is to execute desired function.
The storage device 104 may include one or more computer program products, and the computer program product can To include various forms of computer readable storage mediums, such as volatile memory and/or nonvolatile memory.It is described easy The property lost memory for example may include random access memory (RAM) and/or cache memory (cache) etc..It is described non- Volatile memory for example may include read-only memory (ROM), hard disk, flash memory etc..In the computer readable storage medium On can store one or more computer program instructions, processor 102 can run described program instruction, to realize hereafter institute The client functionality (realized by processor) in the embodiment of the present invention stated and/or other desired functions.In the meter Can also store various application programs and various data in calculation machine readable storage medium storing program for executing, for example, the application program use and/or The various data etc. generated.
The input unit 106 can be the device that user is used to input instruction, and may include keyboard, mouse, wheat One or more of gram wind and touch screen etc..
The output device 108 can export various information (for example, image or sound) to external (for example, user), and It and may include one or more of display, loudspeaker etc..
Described image acquisition device 110 can shoot the desired image of user (such as photo, video etc.), and will be clapped The image taken the photograph is stored in the storage device 104 for the use of other components.Specifically, the electronic equipment in the present embodiment 100 may include multiple images acquisition device 110, and different image collecting devices 110 can be used for acquiring different picture numbers According to.
Illustratively, for realizing auth method according to an embodiment of the present invention, the exemplary electron of apparatus and system Each device in equipment can integrate setting, such as can also be filled processor 102, storage device 104, input with scattering device Set 106 and output device 108 it is integrally disposed in one, and it is image collecting device 110 is separately positioned.
In the present embodiment, electronic equipment 100 may be implemented as the above-mentioned testimony of a witness and veritify all-in-one machine.The testimony of a witness veritifies all-in-one machine It is connect by network with server communication, encryption data can be sent to server so that server is further tested Card.Certainly, server can also veritify all-in-one machine with one or more testimony of a witnesies by network and be communicatively coupled, to carry out data Communication or interaction.The server can be network server, database server etc..
Embodiment two
The present embodiment provides a kind of auth method, the auth method in the present embodiment can veritify one by the testimony of a witness Body machine executes.Specifically, referring to Fig. 2, being the flow chart of auth method provided in an embodiment of the present invention.It below will be to figure Detailed process shown in 2 is described in detail.
Step S201 reads the identification marking of the identity document of user to be identified, to obtain the certificate of the user to be identified Information.
Certificate information includes the first portrait image of user to be identified.The first above-mentioned portrait image can be portrait figure Piece, portrait video, portrait cardon etc..
In the present embodiment, the certificate information includes the first portrait image of the user to be identified.
Above-mentioned identification marking can be mounted in the chip on identity document.
Identification marking is also possible to be attached to the mark that the identification code etc. on identity document can store certificate information, for example, Two dimensional code, bar code, character string etc..
Step S202 acquires the second portrait image of the user to be identified.
The second acquisition device that electronic equipment can be used in the second above-mentioned portrait image collects.
Step S203, judges whether the first portrait image meets setting condition.
In the present embodiment, imposes a condition and can be the condition that there is the face that can be identified in image, be also possible to image The middle condition that there are the face such as human eye, nose, the mouth that can be identified, can also be there is the item for the pupil that can be identified in image Part or other conditions, as long as the first portrait image for meeting setting condition is sufficient for the comparison with the second portrait image. Algorithm used in subsequent contrast's step is different, and setting condition can also be different.For example, if comparison step uses face pair Than imposing a condition is the condition that there is the face that can be identified in image, if comparison step is compared using face, sets item Part is the condition that there are the face that can be identified in image.Meanwhile the condition of " recognizable " is also relied on subsequent contrast's step and is made Depending on the requirement of algorithm.
Specifically, step S203 may be implemented as: judge in first portrait image with the presence or absence of identifiable people Face region, if it exists identifiable human face region, then it represents that first portrait image, which meets, to impose a condition.
Further, specifically judging whether there is facial image can be used face recognition algorithms, described in above-mentioned judgement The step of whether there is identifiable human face region in first portrait image may be implemented as: using face recognition algorithms to institute It states the first portrait image to be identified, obtains recognition result;Judge whether to recognize human face region according to the recognition result, if Recognize human face region, then it represents that first portrait image, which meets, to impose a condition.
Face recognition algorithms can be the method based on geometrical characteristic, the method based on template and the method based on model. Wherein, the above-mentioned method based on geometrical characteristic is that the identification of progress front face is important generally by human eye, mouth, nose etc. is extracted The geometry of the vitals such as the position of characteristic point and eyes is as characteristic of division.Method based on template, which can be divided into, to be based on The method of relevant matches, linear discriminant analysis method, singular value decomposition method, neural network method, dynamically connects eigenface method Connect matching process etc..Method based on model then has based on hidden markov model, active shape model and active appearance models Method etc..The present embodiment will not carry out that explanation is unfolded one by one with regard to above-mentioned each face recognition algorithms, it is to be understood that this The technical staff in field is on the basis of the embodiment of the present application, the suitable face recognition algorithms of the selection of being adapted to property, thus Realize in the first portrait image whether include identifiable face judge.
It, can be according to the detection face used since the possible corresponding recognition capability of different face recognition algorithms is different Algorithm is different, and above-mentioned setting condition can also correspond to difference.
In one embodiment, the first above-mentioned portrait image is identified according to sorting algorithm, face classification Algorithm output the result is that about the first portrait image whether include face score, then above-mentioned setting condition can be score Whether the point threshold of face score is greater than.Specifically, face classification algorithm may include that network (Region is suggested in region Proposal Network, abbreviation RPN), region convolutional neural networks (Regions with CNN features, referred to as RCNN) scheduling algorithm.
The testimony of a witness, which is veritified, mainly realizes verifying with comparing by reading identification marking image obtained for living body, Meet preferentially using reading identification marking image obtained without in addition acquiring image when imposing a condition, therefore first determines whether Whether the image that the identity document recognized carries meets setting condition, and the efficiency that the subsequent testimony of a witness is veritified can be improved, and improves The accuracy rate that the testimony of a witness is veritified.
If judging that first portrait image meets to impose a condition, by first portrait image and second portrait Image compares, and obtains veritifying result.
If judging, first portrait image is unsatisfactory for imposing a condition, and thens follow the steps S204.
Step S204 acquires the image data of the identity document, obtains third portrait image.
In the present embodiment, when being unsatisfactory for imposing a condition in identification marking the first portrait image obtained by reading, Third portrait image is further then obtained by step S204.Wherein, third portrait image can pass through the figure of electronic equipment As acquisition device collects, can also be collected by the acquisition equipment communicated to connect with electronic equipment.Acquire the body The image data of part certificate, refers to the image data that captured identity document surface is printed on.
In a kind of possible embodiment, step S204 is implemented as: the first image collecting device of starting, passes through described the The image data of identity document described in one image acquisition device obtains third portrait image.First image collecting device can To start automatically when judging that the first portrait image is unsatisfactory for and imposing a condition.
Testimony of a witness core can be improved to avoid equipment is added by the first image acquisition device that electronic equipment carries Test the globality of all-in-one machine.Particularly, the first image collecting device can veritify the OCR integrated on all-in-one machine for the testimony of a witness (Optical Character Recognition, optical character identification) camera, OCR camera can be it is downward, specially For taking pictures to the certificate laid flat.
In a kind of possible embodiment, step S204 is implemented as: sending Image Acquisition to external image capture device Instruction, so that external image acquisition equipment acquires the image data of the identity document;Receive the external image acquisition The image data that equipment is sent.
Above-mentioned third portrait image is acquired by using external world's acquisition equipment, the original testimony of a witness can not be changed and veritify one The overall structure of body machine also can be realized the acquisition methods of the image in various identity cards.
The auth method of the embodiment of the present invention, by obtaining the image in certificate information to by reading identification marking Judged, it, can be again through Image Acquisition if it is impossible to meet setting conditions for the image obtained by identification marking The mode of equipment acquisition image obtains the image on identity document, to obtain the third portrait image that can be used for verifying.Pass through The image that the image that identification marking obtains is stored by identity document library, has that resolution ratio is too small to be not enough to compare sometimes The problem of step, the image that image capture device is acquired from identity document usually have it is higher be sufficient for subsequent contrast step Rapid resolution ratio.
Through the above steps in the available identity document of the step of S201, S203 and S204 including human face region the Three portrait images.Third portrait image it is possible to further obtain step S204 is used for testimony of a witness verifying, to realize effective The ground testimony of a witness is veritified.Therefore, on the basis of step S201, S203 and S204, can also include the following steps, to realize the testimony of a witness It veritifies.
The second portrait image of the above-mentioned acquisition user to be identified is to capture to obtain to the object to be identified scene of carrying out Candid photograph figure.
In the present embodiment, the sequence of step S202 and S201, S203 and S204 is not with flow chart shown in Fig. 2 signal Sequence is limited, and step S202 can be held in the arbitrary procedure node in tri- step S201, step S203, step S204 steps Row, as long as being executed before comparing step S205.For example, step S202 can be executed before step S201, step S202 It can also be executed after step S201 before step S203, step S202 can also be before step S204 after step S203 It executes;Step S202 can also be executed after step s 204.
Step S205 compares the third portrait image and second portrait image, obtains veritifying result.
Consider that the second portrait image and the size of third portrait image, length-width ratio may be different, and hence it is also possible to adjust the The size of portrait part in three portrait images and the second portrait image, comparison is better achieved.
In the present embodiment, portrait part, identity information section, the second portrait may include in above-mentioned third portrait image It may include the face of user to be identified, the face of other personnel and some other backgrounds in image, but by third Portrait image and the second portrait image carry out only needing part required for comparison algorithm therein when the 1:1 testimony of a witness is veritified.Wherein, The image on the image and identity document that indicate a collection in worksite is veritified in above-mentioned 1:1 comparison, and a collection in worksite image is to one The veritification of the image behavior of identity document.It therefore, can be first by the comparison algorithm in third portrait image and the second portrait image Required part is intercepted, and the first comparison of part (such as face, face, pupil) required for only including comparison is obtained Figure, the second comparison diagram.
In a kind of possible embodiment, step S205 then may include: needed for comparing in the third portrait image The portion intercepts wanted obtain the first comparison diagram;Portion intercepts required for comparing in second portrait image, obtain second Comparison diagram;First comparison diagram and second comparison diagram are compared, obtain veritifying result.
Wherein, only possible in third portrait image includes a facial image, then can by third portrait image into Row recognition of face, interception recognizes to be intercepted for the part of face.The recognition of face of third portrait image can be passed through The OCR face recognition algorithms integrated on OCR camera carry out.
It may include multiple faces in second portrait image, then need to the part for being identified as face in the second portrait image It is selected, then by the face portion intercepts in second portrait image, obtaining the second comparison diagram be may be implemented as: detection Face in second portrait image;Maximum face in the face detected is intercepted to be allocated as the second comparison diagram.
By being obtained according further to interception by the face portion intercepts in the second facial image and third portrait image Facial image carry out 1:1 comparison and veritify, the available other backgrounds reduced in third portrait image and the second portrait image Or the interference of face, the accuracy rate of testimony of a witness verifying can be improved.
In a kind of possible embodiment, as shown in figure 3, step S205 may include:
Step S2051 extracts the feature of the first comparison diagram, obtains the First Eigenvalue;
Step S2052 extracts the feature of the second comparison diagram, obtains Second Eigenvalue;
The First Eigenvalue and Second Eigenvalue input face are judged to calculate in algorithm by step S2053, Obtain comparison score value;
Step S2054, judges whether the comparison score value is greater than the set value, if so, otherwise testing being judged to being proved to be successful Card failure.
Above-mentioned comparison score value can be expressed as the similarity of the First Eigenvalue and Second Eigenvalue.
The sequencing of step S2051 and step S2052 are with no restrictions.
The similarity for obtaining two face characteristics is compared in the First Eigenvalue and Second Eigenvalue obtained by face, By verifying whether the two face characteristics belong to same people compared with setting value.Setting value can be set according to concrete condition It sets, in an example, setting value can be 70%, 75%, 80% equivalence.
It is unsatisfactory for being sufficient for the setting condition of subsequent contrast's step in the first portrait image obtained by identification marking When, then third portrait image is obtained by the image data of captured identity certificate, two ways obtains the portrait on identity document The probability for obtaining and meeting the portrait image that subsequent contrast's step uses can be improved in image, also further improves testimony of a witness veritification Success rate.
It should be noted that step shown in the flowchart of the accompanying drawings can be in such as a group of computer-executable instructions It is executed in computer system, although also, logical order is shown in flow charts, and it in some cases, can be with not The sequence being same as herein executes shown or described step.
The process of auth method is described so that identity document is identity card as an example below.Fig. 4 shows according to the present invention one The flow diagram of the testimony of a witness checking method of a embodiment.As shown in figure 4, the process of testimony of a witness checking method is as follows:
User holds identity card and carries out veritification of swiping the card;
The testimony of a witness veritifies the information in the card reader of ID card reading identity card chip of all-in-one machine, obtains the photograph in identity card Piece;
The camera that the testimony of a witness veritifies all-in-one machine captures the facial image (not shown) of user;
The face recognition algorithms on all-in-one machine, which are veritified, by the testimony of a witness judges whether the photo in identity card can recognize that people Face;
If the photo in identity card can recognize that face, by identity card photo and capture user image into Row comparison is veritified;
If the photo in identity card cannot recognize that face, the automatic OCR camera shooting started on testimony of a witness veritification all-in-one machine Head carries out people to gained photo of taking pictures to the photograph on identity card, with the OCR face recognition algorithms integrated on OCR camera Result after identification and the image for capturing user are compared veritification by face identification.
Embodiment three
Conceived based on same application, additionally provides identity corresponding with above-mentioned auth method in the embodiment of the present application Device is verified, the principle and the above-mentioned auth method embodiment of the application solved the problems, such as due to the device in the embodiment of the present application It is similar, therefore the implementation of device may refer to the implementation of method, overlaps will not be repeated.Specifically, referring to Fig. 5, being this The functional block diagram for the authentication means that inventive embodiments provide.It is each in authentication means in the present embodiment Module is used to execute each step in above method embodiment.The authentication means include: read module 301, first Acquisition module 302, judgment module 303, the second acquisition module 304 and contrast module 305, wherein
Read module 301, the identification marking of the identity document for reading user to be identified, to obtain the user to be identified Certificate information, the certificate information includes the first portrait image of the user to be identified;
First acquisition module 302, for acquiring the second portrait image of the user to be identified;
Judgment module 303, for judging whether first portrait image meets setting condition;
Second acquisition module 304 acquires the figure of the identity document if being judged as NO for the judgment module 303 As data, third portrait image is obtained;
Contrast module 305 compares the third portrait image and second portrait image, obtains veritifying knot Fruit.
A kind of optional embodiment, judgment module 303 are also used to:
Judge in first portrait image whether identifiable human face region, identifiable human face region if it exists, then It indicates that first portrait image meets to impose a condition.
A kind of optional embodiment, judgment module 303 are also used to:
First portrait image is identified using face recognition algorithms, obtains recognition result;
Judge whether to recognize human face region according to the recognition result, if recognizing human face region, then it represents that described One portrait image, which meets, to impose a condition.
A kind of optional embodiment, the second acquisition module 304, is also used to:
Start the first image collecting device, the picture number of the identity document is acquired by the first image acquisition device According to obtaining third portrait image.
A kind of optional embodiment, the second acquisition module 304, is also used to:
Image capture instruction is sent to external image capture device, so that external image acquisition equipment acquires the body The image data of part certificate;
Receive the image data that the external image acquisition equipment is sent.
A kind of optional embodiment, contrast module 305 are also used to:
Portion intercepts required for comparing in the third portrait image, obtain the first comparison diagram;
Portion intercepts required for comparing in second portrait image, obtain the second comparison diagram;
First comparison diagram and second comparison diagram are compared, obtain veritifying result.
A kind of optional embodiment, contrast module 305 are also used to:
By the face portion intercepts in the third portrait image, the first comparison diagram is obtained;
By the face portion intercepts in second portrait image, the second comparison diagram is obtained;
First comparison diagram and second comparison diagram are compared, obtain veritifying result.
A kind of optional embodiment, contrast module 305 are also used to:
The feature for extracting first comparison diagram, obtains the First Eigenvalue;
The feature for extracting second comparison diagram, obtains Second Eigenvalue;
The First Eigenvalue and Second Eigenvalue input face are judged to calculate in algorithm, obtained to score Value;
Judge whether the comparison score value is greater than the set value, if so, being judged to being proved to be successful, otherwise authentication failed.
A kind of optional embodiment, contrast module 305 are also used to:
If the judgment module 303 is judged as YES, first portrait image and second portrait image are carried out Comparison obtains veritifying result.
The authentication means of the embodiment of the present invention, by obtaining the image in certificate information to by reading identification marking Judged, it, can be again through Image Acquisition if it is impossible to meet setting conditions for the image obtained by identification marking The mode of equipment acquisition image obtains the image on identity document, to obtain the third portrait image that can be used for verifying.
The embodiment of the present invention also provides a kind of computer readable storage medium, stores on the computer readable storage medium There is computer program, the step in above method embodiment is executed when the computer program is run by processor.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through Other modes are realized.The apparatus embodiments described above are merely exemplary, for example, flow chart and block diagram in attached drawing Show the device of multiple embodiments according to the present invention, the architectural framework in the cards of method and computer program product, Function and operation.In this regard, each box in flowchart or block diagram can represent the one of a module, section or code Part, a part of the module, section or code, which includes that one or more is for implementing the specified logical function, to be held Row instruction.It should also be noted that function marked in the box can also be to be different from some implementations as replacement The sequence marked in attached drawing occurs.For example, two continuous boxes can actually be basically executed in parallel, they are sometimes It can execute in the opposite order, this depends on the function involved.It is also noted that every in block diagram and or flow chart The combination of box in a box and block diagram and or flow chart can use the dedicated base for executing defined function or movement It realizes, or can realize using a combination of dedicated hardware and computer instructions in the system of hardware.
In addition, each functional module in each embodiment of the present invention can integrate one independent portion of formation together Point, it is also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention. And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.It needs Illustrate, herein, relational terms such as first and second and the like be used merely to by an entity or operation with Another entity or operation distinguish, and without necessarily requiring or implying between these entities or operation, there are any this realities The relationship or sequence on border.Moreover, the terms "include", "comprise" or its any other variant are intended to the packet of nonexcludability Contain, so that the process, method, article or equipment for including a series of elements not only includes those elements, but also including Other elements that are not explicitly listed, or further include for elements inherent to such a process, method, article, or device. In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including the element Process, method, article or equipment in there is also other identical elements.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.It should also be noted that similar label and letter exist Similar terms are indicated in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, are then not required in subsequent attached drawing It is further defined and explained.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.

Claims (12)

1. a kind of auth method characterized by comprising
The identification marking of the identity document of user to be identified is read, to obtain the certificate information of the user to be identified, the certificate Information includes the first portrait image of the user to be identified;
Acquire the second portrait image of the user to be identified;
Judge whether first portrait image meets setting condition;
If it is not, then acquiring the image data of the identity document, third portrait image is obtained;
The third portrait image and second portrait image are compared, obtain veritifying result.
2. auth method as described in claim 1, which is characterized in that described to judge whether first portrait image is full The step of foot imposes a condition, comprising:
Judge in first portrait image whether identifiable human face region, identifiable human face region if it exists, then it represents that First portrait image, which meets, to impose a condition.
3. auth method as claimed in claim 2, which is characterized in that it is described judge in first portrait image whether The step of identifiable human face region, comprising:
First portrait image is identified using face recognition algorithms, obtains recognition result;
Judge whether to recognize human face region according to the recognition result, if recognizing human face region, then it represents that described the first It imposes a condition as image meets.
4. auth method as described in claim 1, which is characterized in that the picture number of the acquisition identity document According to the step of obtaining third portrait image, comprising:
Start the first image collecting device, the image data of the identity document acquired by the first image acquisition device, Obtain third portrait image.
5. auth method as described in claim 1, which is characterized in that the picture number of the acquisition identity document According to the step of obtaining third portrait image, comprising:
Image capture instruction is sent to external image capture device, so that external image acquisition equipment acquires the identity card The image data of part;
Receive the image data that the external image acquisition equipment is sent.
6. auth method as described in claim 1, which is characterized in that by the third portrait image and second people As image compares, veritified as a result, obtaining the step of veritifying result, comprising:
Portion intercepts required for comparing in the third portrait image, obtain the first comparison diagram;
Portion intercepts required for comparing in second portrait image, obtain the second comparison diagram;
First comparison diagram and second comparison diagram are compared, obtain veritifying result.
7. auth method as claimed in claim 6, which is characterized in that described by first comparison diagram and described second Comparison diagram compares, and obtains the step of veritifying result, comprising:
The feature for extracting first comparison diagram, obtains the First Eigenvalue;
The feature for extracting second comparison diagram, obtains Second Eigenvalue;
The First Eigenvalue and Second Eigenvalue input face are judged to calculate in algorithm, obtain comparison score value;
Judge whether the comparison score value is greater than the set value, if so, be judged to being proved to be successful, otherwise authentication failed.
8. auth method as claimed in claims 6 or 7, which is characterized in that it is described will be right in the third portrait image Than required portion intercepts, the step of obtaining the first comparison diagram, comprising:
By the face portion intercepts in the third portrait image, the first comparison diagram is obtained;
It is described will be compared in second portrait image required for portion intercepts, the step of obtaining the second comparison diagram, comprising:
By the face portion intercepts of second portrait image, the second comparison diagram is obtained.
9. auth method as described in claim 1, which is characterized in that judging whether first portrait image meets After setting condition, further includes:
If judging that first portrait image meets to impose a condition, by first portrait image and second portrait image It compares, obtains veritifying result.
10. a kind of authentication means characterized by comprising
Read module, the identification marking of the identity document for reading user to be identified, to obtain the certificate of the user to be identified Information, the certificate information include the first portrait image of the user to be identified;
First acquisition module, for acquiring the second portrait image of the user to be identified;
Judgment module, for judging whether first portrait image meets setting condition;
Second acquisition module acquires the image data of the identity document, obtains if being judged as NO for the judgment module Third portrait image;
Contrast module obtains veritifying result for comparing the third portrait image and second portrait image.
11. a kind of electronic equipment characterized by comprising memory and processor, the memory is for storing computer Program, the processor require 1~9 for the computer program to be read and run from the memory, with perform claim Any one the method.
12. a kind of computer readable storage medium, computer program, feature are stored on the computer readable storage medium It is, the computer program executes the step of above-mentioned method according to any one of claims 1 to 9 when being run by processor Suddenly.
CN201811578077.1A 2018-12-20 2018-12-20 Auth method, device and electronic equipment Pending CN109657627A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811578077.1A CN109657627A (en) 2018-12-20 2018-12-20 Auth method, device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811578077.1A CN109657627A (en) 2018-12-20 2018-12-20 Auth method, device and electronic equipment

Publications (1)

Publication Number Publication Date
CN109657627A true CN109657627A (en) 2019-04-19

Family

ID=66115926

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811578077.1A Pending CN109657627A (en) 2018-12-20 2018-12-20 Auth method, device and electronic equipment

Country Status (1)

Country Link
CN (1) CN109657627A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110490039A (en) * 2019-05-30 2019-11-22 福建知鱼科技有限公司 A kind of intelligence portrait Compare System
CN112115748A (en) * 2019-06-21 2020-12-22 腾讯科技(深圳)有限公司 Certificate image identification method, certificate image identification device, terminal and storage medium
CN112906741A (en) * 2019-05-21 2021-06-04 北京嘀嘀无限科技发展有限公司 Image processing method, image processing device, electronic equipment and storage medium
CN113920752A (en) * 2021-09-28 2022-01-11 云南思立耐特信息系统工程有限公司 Intelligent transportation infrastructure monitoring management system
CN114266267A (en) * 2021-12-20 2022-04-01 武汉烽火众智智慧之星科技有限公司 Automatic identification method and device for collecting two-dimensional codes, documents, certificates and human faces and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100079243A1 (en) * 2008-03-26 2010-04-01 Yasushi Hamada Authentication system, authentication method, and authentication program
CN104112114A (en) * 2013-10-30 2014-10-22 北京安捷天盾科技发展有限公司 Identity verification method and device
CN207264409U (en) * 2017-10-17 2018-04-20 北京旷视科技有限公司 The testimony of a witness veritifies device
CN108875495A (en) * 2017-10-17 2018-11-23 北京旷视科技有限公司 The testimony of a witness veritifies device and testimony of a witness checking method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100079243A1 (en) * 2008-03-26 2010-04-01 Yasushi Hamada Authentication system, authentication method, and authentication program
CN104112114A (en) * 2013-10-30 2014-10-22 北京安捷天盾科技发展有限公司 Identity verification method and device
CN207264409U (en) * 2017-10-17 2018-04-20 北京旷视科技有限公司 The testimony of a witness veritifies device
CN108875495A (en) * 2017-10-17 2018-11-23 北京旷视科技有限公司 The testimony of a witness veritifies device and testimony of a witness checking method

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112906741A (en) * 2019-05-21 2021-06-04 北京嘀嘀无限科技发展有限公司 Image processing method, image processing device, electronic equipment and storage medium
CN110490039A (en) * 2019-05-30 2019-11-22 福建知鱼科技有限公司 A kind of intelligence portrait Compare System
CN112115748A (en) * 2019-06-21 2020-12-22 腾讯科技(深圳)有限公司 Certificate image identification method, certificate image identification device, terminal and storage medium
CN112115748B (en) * 2019-06-21 2023-08-25 腾讯科技(深圳)有限公司 Certificate image recognition method, device, terminal and storage medium
CN113920752A (en) * 2021-09-28 2022-01-11 云南思立耐特信息系统工程有限公司 Intelligent transportation infrastructure monitoring management system
CN114266267A (en) * 2021-12-20 2022-04-01 武汉烽火众智智慧之星科技有限公司 Automatic identification method and device for collecting two-dimensional codes, documents, certificates and human faces and storage medium
CN114266267B (en) * 2021-12-20 2024-03-19 武汉烽火众智智慧之星科技有限公司 Automatic identification method, device and storage medium for integrating two-dimension codes, documents, certificates and faces

Similar Documents

Publication Publication Date Title
Fathy et al. Face-based active authentication on mobile devices
CN109657627A (en) Auth method, device and electronic equipment
CN107844748B (en) Auth method, device, storage medium and computer equipment
Feng et al. Integration of image quality and motion cues for face anti-spoofing: A neural network approach
Kähm et al. 2d face liveness detection: An overview
da Silva Pinto et al. Video-based face spoofing detection through visual rhythm analysis
WO2018086543A1 (en) Living body identification method, identity authentication method, terminal, server and storage medium
Schwartz et al. Face spoofing detection through partial least squares and low-level descriptors
CN112651348B (en) Identity authentication method and device and storage medium
CN103426016B (en) Method and device for authenticating second-generation identity card
US9436883B2 (en) Collaborative text detection and recognition
CN102375970B (en) A kind of identity identifying method based on face and authenticate device
CN109325933A (en) A kind of reproduction image-recognizing method and device
US20180034852A1 (en) Anti-spoofing system and methods useful in conjunction therewith
WO2019061658A1 (en) Method and device for positioning eyeglass, and storage medium
CN107451510A (en) Biopsy method and In vivo detection system
CN108573202A (en) Identity identifying method, device and system and terminal, server and storage medium
CN110458063B (en) Human face living body detection method for preventing video and photo cheating
CN105844206A (en) Identity authentication method and identity authentication device
JP6351243B2 (en) Image processing apparatus and image processing method
CN105574509B (en) A kind of face identification system replay attack detection method and application based on illumination
CN107480586B (en) Detection method of biometric photo counterfeiting attack based on facial feature point displacement
JP2016031679A (en) Object identification device, object identification method, and program
CN107911643A (en) Show the method and apparatus of scene special effect in a kind of video communication
CN107992845A (en) A kind of face recognition the method for distinguishing and device, computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190419

WD01 Invention patent application deemed withdrawn after publication