CN114582031A - Living body detection auxiliary method and device for face recognition system - Google Patents
Living body detection auxiliary method and device for face recognition system Download PDFInfo
- Publication number
- CN114582031A CN114582031A CN202210151957.0A CN202210151957A CN114582031A CN 114582031 A CN114582031 A CN 114582031A CN 202210151957 A CN202210151957 A CN 202210151957A CN 114582031 A CN114582031 A CN 114582031A
- Authority
- CN
- China
- Prior art keywords
- attack
- suspect
- confidence
- live
- face
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 32
- 238000001514 detection method Methods 0.000 title claims abstract description 27
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 8
- 238000003062 neural network model Methods 0.000 claims abstract description 7
- 238000004590 computer program Methods 0.000 claims description 8
- 238000004364 calculation method Methods 0.000 claims description 5
- 238000000605 extraction Methods 0.000 claims description 3
- 230000036962 time dependent Effects 0.000 claims 1
- 230000008569 process Effects 0.000 abstract description 5
- 230000001815 facial effect Effects 0.000 description 13
- 230000007774 longterm Effects 0.000 description 4
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000007123 defense Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/22—Matching criteria, e.g. proximity measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/045—Combinations of networks
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Evolutionary Computation (AREA)
- Life Sciences & Earth Sciences (AREA)
- Artificial Intelligence (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Molecular Biology (AREA)
- Computing Systems (AREA)
- Biophysics (AREA)
- Biomedical Technology (AREA)
- Mathematical Physics (AREA)
- Computational Linguistics (AREA)
- Health & Medical Sciences (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Bioinformatics & Computational Biology (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Evolutionary Biology (AREA)
- Collating Specific Patterns (AREA)
Abstract
Description
技术领域technical field
本发明涉及计算机技术领域,尤其是涉及一种用于人脸识别系统的活体检测辅助方法及装置。The present invention relates to the field of computer technology, and in particular, to an auxiliary method and device for living body detection used in a face recognition system.
背景技术Background technique
在实时人脸识别过程中,需要谨防使用假人脸进行人脸识别,因此需要在进行人脸识别之前进行活体检测。In the process of real-time face recognition, it is necessary to be careful not to use fake faces for face recognition, so it is necessary to perform liveness detection before face recognition.
现有很多活体检测算法是基于单帧图像。其具体做法是,首先对图片进行人脸检测后裁剪下人脸区域,然后将人脸区域输入到活体检测模型中从而得到结果。由于单帧图像识别的结果往往无法有非常高的准确度,当攻击者在现场长时间不断地进行活体攻击,就有一定概率在某个时刻会突破检测,时间越长,突破的概率越高。Many existing live detection algorithms are based on single-frame images. The specific method is to first perform face detection on the picture and then crop the face area, and then input the face area into the living body detection model to obtain the result. Because the results of single-frame image recognition often cannot have very high accuracy, when an attacker continuously conducts live attacks on the scene for a long time, there is a certain probability that the detection will break through at a certain time. The longer the time, the higher the probability of breakthrough. .
因此,针对攻击者长时间攻击的情况,急需提出一个新的方法来解决长时间攻击的风险。Therefore, it is urgent to propose a new method to solve the risk of long-term attacks in response to the long-term attack by attackers.
发明内容SUMMARY OF THE INVENTION
本发明所要解决的技术问题在于提供一种用于人脸识别系统的活体检测辅助方法及装置,可以大大降低长时间攻击的风险。The technical problem to be solved by the present invention is to provide an auxiliary method and device for living body detection used in a face recognition system, which can greatly reduce the risk of long-term attacks.
第一方面,本发明提供了一种用于人脸识别系统的活体检测辅助方法,具体包括如下步骤:In a first aspect, the present invention provides an auxiliary method for living body detection for a face recognition system, which specifically includes the following steps:
步骤S1:建立“攻击嫌疑人”列表,每个攻击嫌疑人包含置信度Pattack和人脸特征两个字段,并进行初始化,初始为空;Step S1: establish a list of "attack suspects", each attack suspect contains two fields of confidence level P attack and face feature, and initializes it, which is initially empty;
步骤S2:用人脸检测算法提取人脸区域;Step S2: extracting the face area with a face detection algorithm;
步骤S3:用神经网络模型计算单帧人脸的活体概率,设为Plive;Step S3: use the neural network model to calculate the living probability of a single frame of face, and set it as P live ;
步骤S4:计算人脸特征值;Step S4: Calculate the facial feature value;
步骤S5:根据人脸特征值,匹配“攻击嫌疑人”;Step S5: match the "attack suspect" according to the facial feature value;
步骤S6:更新“当前攻击嫌疑人”的置信度Pattack,根据嫌疑人活体概率Plive与设定的阈值Plive_threshold之间进行比较,来调整置信度Pattack的值,从而判断当前嫌疑人为真或假;Step S6: Update the confidence level P attack of the "current attack suspect", and adjust the value of the confidence level P attack according to the comparison between the probability P live of the suspect's living body and the set threshold P live_threshold , so as to judge that the current suspect is true or false;
步骤S7:攻击嫌疑人置信度Pattack随时间衰减:每间隔一段时间T遍历所有“攻击嫌疑人”,置信度Pattack-衰减步长Δd2,直到0.0截止;当置信度Pattack为0,删除该“攻击嫌疑人”;转到步骤S2。Step S7: Attack suspect confidence P attack decays with time: traverse all "attack suspects" every time interval T, confidence P attack - decay step size Δd2, until the end of 0.0; when the confidence P attack is 0, delete The "attack suspect"; go to step S2.
进一步地,所述步骤S5,具体包括:Further, the step S5 specifically includes:
步骤S51:遍历“攻击嫌疑人”列表,对比人脸特征的相似度,高于阈值Plive_threshold,锁定为“当前攻击嫌疑人”;Step S51 : traverse the list of "attack suspects", compare the similarity of facial features, if it is higher than the threshold P live_threshold , lock it as "current attack suspect";
步骤S52:如果不存在,新增“攻击嫌疑人”,置信度Pattack为0,设置为“当前攻击嫌疑人”。Step S52: If it does not exist, add “attack suspect”, the confidence level P attack is 0, and set as “current attack suspect”.
进一步地,所述步骤S6,具体包括:Further, the step S6 specifically includes:
步骤S61:如果嫌疑人活体概率Plive小于阈值Plive_threshold,则嫌疑人置信度Pattack+更新步长Δd1,直到置信度Pattack到1.0时截止;如果当前嫌疑人置信度Pattack大于阈值Pattack_threshold,返回结果为假;Step S61: If the probability P live of the suspect is less than the threshold P live_threshold , the suspect confidence P attack + update step Δd1, until the confidence P attack reaches 1.0, and the deadline is reached; if the current suspect confidence P attack is greater than the threshold P attack_threshold , the return result is false;
步骤S62:如果嫌疑人活体概率Plive大于等于阈值Plive_threshold,则嫌疑人置信度Pattack-更新步长Δd1,直到置信度Pattack到0.0时截止;如果当前嫌疑人置信度Pattack小于阈值Pattack_threshold,返回结果为真,否则为假。Step S62: If the probability P live of the suspect alive is greater than or equal to the threshold P live_threshold , the suspect confidence P attack - update step Δd1, until the confidence P attack reaches 0.0; if the current suspect confidence P attack is less than the threshold P attack_threshold , returns true, otherwise false.
第二方面,本发明提供了一种用于人脸识别系统的活体检测辅助装置,包括:In a second aspect, the present invention provides a living body detection auxiliary device for a face recognition system, comprising:
“攻击嫌疑人”列表初始化模块,用于建立“攻击嫌疑人”列表,每个攻击嫌疑人包含置信度Pattack和人脸特征两个字段,并进行初始化,初始为空;The "attack suspect" list initialization module is used to establish a "attack suspect" list. Each attack suspect contains two fields, the confidence level P attack and the face feature, and is initialized. The initial value is empty;
人脸区域提取模块,用于采用人脸检测算法提取人脸区域;The face area extraction module is used to extract the face area by using the face detection algorithm;
单帧人脸的活体概率计算模块,用于采用神经网络模型计算单帧人脸的活体概率,设为Plive;The living body probability calculation module of a single-frame face is used to calculate the living body probability of a single-frame face by using a neural network model, and is set as P live ;
人脸特征值计算模块,用于计算人脸特征值;The face feature value calculation module is used to calculate the face feature value;
“攻击嫌疑人”匹配模块,用于实现根据人脸特征值,匹配“攻击嫌疑人”,The "attack suspect" matching module is used to match the "attack suspect" according to the facial feature value,
“当前攻击嫌疑人”置信度Pattack更新模块,用于实现根据嫌疑人活体概率Plive与设定的阈值Plive_threshold之间进行比较,来调整置信度Pattack的值,从而判断当前嫌疑人为真或假;The "current attack suspect" confidence level P attack update module is used to adjust the value of the confidence level P attack according to the comparison between the suspect's living probability P live and the set threshold P live_threshold , so as to judge the current suspect as true or false;
攻击嫌疑人置信度Pattack随时间衰减模块,用于实现每间隔一段时间T遍历所有“攻击嫌疑人”,置信度Pattack-0.1,直到0.0截止;当置信度Pattack置信度为0,删除该“攻击嫌疑人”。Attack suspect confidence level P attack decays with time module, used to traverse all "attack suspects" every time interval T, confidence level P attack -0.1 until 0.0 cut-off; when confidence level P attack confidence level is 0, delete The "attack suspect".
进一步地,所述“攻击嫌疑人”匹配模块,具体包括:Further, the "attack suspect" matching module specifically includes:
遍历“攻击嫌疑人”列表,对比人脸特征的相似度,高于阈值Plive_threshold,锁定为“当前攻击嫌疑人”;Traverse the list of "attack suspects", compare the similarity of facial features, if it is higher than the threshold P live_threshold , lock it as "current attack suspect";
如果不存在,新增“攻击嫌疑人”,置信度Pattack为0,设置为“当前攻击嫌疑人”。If it does not exist, add "attack suspect", the confidence level P attack is 0, and set it to "current attack suspect".
进一步地,“当前攻击嫌疑人”置信度Pattack更新模块,具体包括:Further, the "current attack suspect" confidence level P attack update module specifically includes:
如果嫌疑人活体概率Plive小于阈值Plive_threshold,则嫌疑人置信度Pattack+0.05,直到置信度Pattack到1.0时截止;如果当前嫌疑人置信度Pattack大于阈值Pattack_threshold,返回结果为假;If the suspect's living probability P live is less than the threshold P live_threshold , the suspect's confidence level P attack +0.05, until the confidence level P attack reaches 1.0; if the current suspect's confidence level P attack is greater than the threshold P attack_threshold , the return result is false;
如果嫌疑人活体概率Plive大于等于阈值Plive_threshold,则嫌疑人置信度Pattack-0.05,直到置信度Pattack到0.0时截止;如果当前嫌疑人置信度Pattack小于阈值Pattack_threshold,返回结果为真,否则为假。If the suspect's living probability P live is greater than or equal to the threshold P live_threshold , the suspect's confidence level P attack -0.05, until the confidence level P attack reaches 0.0; if the current suspect's confidence level P attack is less than the threshold P attack_threshold , the return result is true , otherwise false.
第三方面,本发明提供了一种电子设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现第一方面所述的方法。In a third aspect, the present invention provides an electronic device, including a memory, a processor, and a computer program stored in the memory and running on the processor, the processor implementing the program described in the first aspect when the processor executes the program method.
第四方面,本发明提供了一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时实现第一方面所述的方法。In a fourth aspect, the present invention provides a computer-readable storage medium on which a computer program is stored, which implements the method described in the first aspect when the program is executed by a processor.
本发明的优点在于:The advantages of the present invention are:
1、本发明基于人脸特征值匹配建立“攻击嫌疑人”列表,可过滤绝大部分长时间连续攻击。1. The present invention establishes a list of "attack suspects" based on facial feature value matching, which can filter most of the long-term continuous attacks.
2、本发明为“攻击嫌疑人”设置置信度,不是非黑即白。在匹配过程中动态调整,避免偶尔的误判产生的错误,判断结果更加稳定。2. The present invention sets the confidence level for the "attack suspect", which is not black or white. Dynamic adjustment during the matching process avoids errors caused by occasional misjudgments, and the judgment results are more stable.
3、本发明是基于时间衰减清理“攻击嫌疑人”列表,避免正常在没有攻击的情况下,增加额外的防范的成本。3. The present invention cleans up the list of "attack suspects" based on time decay, so as to avoid the extra cost of defense when there is no attack normally.
附图说明Description of drawings
下面参照附图结合实施例对本发明作进一步的描述。The present invention will be further described below with reference to the accompanying drawings and embodiments.
图1是本发明的方法流程示意图。FIG. 1 is a schematic flow chart of the method of the present invention.
具体实施方式Detailed ways
实施例一Example 1
如图1所示,一种用于人脸识别系统的活体检测辅助方法,具体包括如下步骤:As shown in Figure 1, an auxiliary method for living body detection for a face recognition system specifically includes the following steps:
步骤S1:建立“攻击嫌疑人”列表,每个攻击嫌疑人包含置信度Pattack和人脸特征两个字段,并进行初始化,初始为空;Step S1: establish a list of "attack suspects", each attack suspect contains two fields of confidence level P attack and face feature, and initializes it, which is initially empty;
步骤S2:用MTCNN人脸检测算法提取人脸区域;Step S2: extract the face region with the MTCNN face detection algorithm;
步骤S3:用神经网络模型计算单帧人脸的活体概率,设为Plive;Step S3: use the neural network model to calculate the living probability of a single frame of face, and set it as P live ;
步骤S4:计算人脸特征值;Step S4: Calculate the facial feature value;
步骤S5:根据人脸特征值,匹配“攻击嫌疑人”,具体匹配过程,包括:Step S5: Match the "attack suspect" according to the facial feature value. The specific matching process includes:
步骤S51:遍历“攻击嫌疑人”列表,对比人脸特征的相似度,高于阈值Plive_threshold,锁定为“当前攻击嫌疑人”;Step S51 : traverse the list of "attack suspects", compare the similarity of facial features, if it is higher than the threshold P live_threshold , lock it as "current attack suspect";
步骤S52:如果不存在,新增“攻击嫌疑人”,置信度Pattack为0,设置为“当前攻击嫌疑人”;Step S52: if it does not exist, add “attack suspect”, the confidence level P attack is 0, and set it as “current attack suspect”;
步骤S6:更新“当前攻击嫌疑人”置信度Pattack,具体包括:Step S6: Update the confidence level P attack of the "current attack suspect", which specifically includes:
步骤S61:如果嫌疑人活体概率Plive小于阈值Plive_threshold,则嫌疑人置信度Pattack+0.05(更新步长Δd1=0.05,但不限于该值),直到置信度Pattack到1.0时截止;如果当前嫌疑人置信度Pattack大于阈值Pattack_threshold,返回结果为假;Step S61: If the probability P live of the suspect alive is less than the threshold P live_threshold , the suspect confidence P attack +0.05 (update step Δd1 = 0.05, but not limited to this value), until the confidence P attack reaches 1.0; if The current suspect confidence P attack is greater than the threshold P attack_threshold , and the returned result is false;
步骤S62:如果嫌疑人活体概率Plive大于等于阈值Plive_threshold,则嫌疑人置信度Pattack-0.05,直到置信度Pattack到0.0时截止;如果当前嫌疑人置信度Pattack小于阈值Pattack_threshold,返回结果为真,否则为假;Step S62: If the probability P live of the suspect is greater than or equal to the threshold P live_threshold , the suspect’s confidence level P attack is -0.05, until the confidence level P attack reaches 0.0; if the current suspect’s confidence level P attack is less than the threshold P attack_threshold , return The result is true, otherwise false;
步骤S7:攻击嫌疑人置信度Pattack随时间衰减:每间隔一段时间(例如:一分钟)遍历所有“攻击嫌疑人”,置信度Pattack-0.1(衰减步长Δd2=0.1,但不限于该值),直到0.0截止;当置信度Pattack置信度为0,删除该“攻击嫌疑人”;转到步骤S2。Step S7: The attack suspect's confidence P attack decays with time: traverse all "attack suspects" at intervals (for example, one minute), the confidence P attack -0.1 (the decay step size Δd2 = 0.1, but not limited to this value), until the cutoff of 0.0; when the confidence degree P attack confidence degree is 0, delete the "attack suspect"; go to step S2.
基于同一发明构思,本申请还提供了与实施例一中的方法对应的装置,详见实施例二。Based on the same inventive concept, the present application also provides a device corresponding to the method in the first embodiment, and the details are in the second embodiment.
实施例二Embodiment 2
在本实施例中提供了一种用于人脸识别系统的活体检测辅助装置,包括:In this embodiment, a living body detection auxiliary device for a face recognition system is provided, including:
“攻击嫌疑人”列表初始化模块,用于建立“攻击嫌疑人”列表,每个攻击嫌疑人包含置信度Pattack和人脸特征两个字段,并进行初始化,初始为空;The "attack suspect" list initialization module is used to establish a "attack suspect" list. Each attack suspect contains two fields, the confidence level P attack and the face feature, and is initialized. The initial value is empty;
人脸区域提取模块,用于采用人脸检测算法提取人脸区域;The face area extraction module is used to extract the face area by using the face detection algorithm;
单帧人脸的活体概率计算模块,用于采用神经网络模型计算单帧人脸的活体概率,设为Plive;The living body probability calculation module of a single-frame face is used to calculate the living body probability of a single-frame face by using a neural network model, and is set as P live ;
人脸特征值计算模块,用于计算人脸特征值;The face feature value calculation module is used to calculate the face feature value;
“攻击嫌疑人”匹配模块,用于实现根据人脸特征值,匹配“攻击嫌疑人”,具体匹配过程,包括:The "attack suspect" matching module is used to match the "attack suspect" according to the facial feature value. The specific matching process includes:
遍历“攻击嫌疑人”列表,对比人脸特征的相似度,高于阈值Plive_threshold,锁定为“当前攻击嫌疑人”;Traverse the list of "attack suspects", compare the similarity of facial features, if it is higher than the threshold P live_threshold , lock it as "current attack suspect";
如果不存在,新增“攻击嫌疑人”,置信度Pattack为0,设置为“当前攻击嫌疑人”;If it does not exist, add "attack suspect", the confidence level P attack is 0, and set it to "current attack suspect";
“当前攻击嫌疑人”置信度Pattack更新模块,具体包括:"Current attack suspect" confidence level P attack update module, including:
如果嫌疑人活体概率Plive小于阈值Plive_threshold,则嫌疑人置信度Pattack+0.05(更新步长Δd1=0.05,但不限于该值),直到置信度Pattack到1.0时截止;如果当前嫌疑人置信度Pattack大于阈值Pattack_threshold,返回结果为假;If the suspect's living probability P live is less than the threshold P live_threshold , the suspect's confidence level P attack +0.05 (update step Δd1=0.05, but not limited to this value), until the confidence level P attack reaches 1.0; if the current suspect The confidence level P attack is greater than the threshold P attack_threshold , and the returned result is false;
如果嫌疑人活体概率Plive大于等于阈值Plive_threshold,则嫌疑人置信度Pattack-0.05,直到置信度Pattack到0.0时截止;如果当前嫌疑人置信度Pattack小于阈值Pattack_threshold,返回结果为真,否则为假;If the suspect's living probability P live is greater than or equal to the threshold P live_threshold , the suspect's confidence level P attack -0.05, until the confidence level P attack reaches 0.0; if the current suspect's confidence level P attack is less than the threshold P attack_threshold , the return result is true , otherwise false;
攻击嫌疑人置信度Pattack随时间衰减模块,用于实现每间隔一段时间T遍历所有“攻击嫌疑人”,置信度Pattack-0.1(衰减步长Δd2=0.1,但不限于该值),直到0.0截止;当置信度Pattack置信度为0,删除该“攻击嫌疑人”。Attack suspect confidence degree P attack decays with time module, used to traverse all "attack suspects" every time interval T, confidence degree P attack -0.1 (decay step size Δd2 = 0.1, but not limited to this value), until 0.0 cutoff; when the confidence level P attack confidence level is 0, delete the "attack suspect".
由于本发明实施例二所介绍的装置,为实施本发明实施例一的方法所采用的装置,故而基于本发明实施例一所介绍的方法,本领域所属人员能够了解该装置的具体结构及变形,故而在此不再赘述。凡是本发明实施例一的方法所采用的装置都属于本发明所欲保护的范围。Since the device introduced in the second embodiment of the present invention is the device used to implement the method in the first embodiment of the present invention, based on the method introduced in the first embodiment of the present invention, those skilled in the art can understand the specific structure and deformation of the device. , so it is not repeated here. All devices used in the method of Embodiment 1 of the present invention belong to the scope of protection of the present invention.
基于同一发明构思,本申请提供了实施例一对应的电子设备实施例,详见实施例三。Based on the same inventive concept, the present application provides an electronic device embodiment corresponding to the first embodiment. For details, refer to the third embodiment.
实施例三Embodiment 3
本实施例提供了一种电子设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,处理器执行计算机程序时,可以实现实施例一中任一实施方式。This embodiment provides an electronic device, including a memory, a processor, and a computer program stored in the memory and running on the processor. When the processor executes the computer program, any one of the embodiments in the first embodiment can be implemented.
由于本实施例所介绍的电子设备为实施本申请实施例一中方法所采用的设备,故而基于本申请实施例一中所介绍的方法,本领域所属技术人员能够了解本实施例的电子设备的具体实施方式以及其各种变化形式,所以在此对于该电子设备如何实现本申请实施例中的方法不再详细介绍。只要本领域所属技术人员实施本申请实施例中的方法所采用的设备,都属于本申请所欲保护的范围。Since the electronic device introduced in this embodiment is the device used to implement the method in the first embodiment of the present application, based on the method introduced in the first embodiment of the present application, those skilled in the art can understand the electronic device in this embodiment. The specific implementation manner and various modifications thereof, so how the electronic device implements the methods in the embodiments of the present application will not be described in detail here. As long as the devices used by those skilled in the art to implement the methods in the embodiments of the present application fall within the scope of the intended protection of the present application.
基于同一发明构思,本申请提供了实施例一对应的存储介质,详见实施例四。Based on the same inventive concept, the present application provides a storage medium corresponding to the first embodiment. For details, refer to the fourth embodiment.
实施例四Embodiment 4
本实施例提供一种计算机可读存储介质,其上存储有计算机程序,该计算机程序被处理器执行时,可以实现实施例一中任一实施方式。This embodiment provides a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, any one of the implementation manners in the first embodiment can be implemented.
本发明的主要思路是基于假脸攻击在时间轴上的连续性。而在实际场景中,假脸攻击通常会在一段时间内,不断的连续攻击。如果一段时间内存在连续攻击,那么接下来继续攻击的概率非常大。这时候,就可以暂时屏蔽该攻击,大大提高假脸攻击的成本。The main idea of the present invention is based on the continuity of the fake face attack on the time axis. In actual scenarios, fake face attacks usually continue to attack continuously for a period of time. If there are continuous attacks for a period of time, the probability of continuing attacks is very high. At this time, the attack can be temporarily blocked, greatly increasing the cost of fake face attack.
本发明的关键点是设计了“攻击嫌疑人”列表,基于人脸识别特征值相似度,筛选近期的攻击者。如果某人脸特征多次出现假脸攻击,该人脸特征值将被记录在案,简称“攻击嫌疑人”。列表中保存着可能是假人脸的人脸特征值和置信度。活体检测结果需要与“攻击嫌疑人”列表进行比对,确定不是“攻击嫌疑人”之后方可进行下一步人脸识别。The key point of the present invention is to design a list of "attack suspects", and screen recent attackers based on the similarity of face recognition feature values. If a person's facial features appear fake face attack for many times, the facial feature value will be recorded, referred to as "attack suspect". The list holds face feature values and confidences that may be fake faces. The results of the live detection need to be compared with the list of "attack suspects" to determine that they are not "attack suspects" before proceeding to the next step of face recognition.
“攻击嫌疑人”的概率随着环境变化:当单帧人脸活体判断为假,该“攻击嫌疑人”置信度上升;当单帧人脸识别判断为真,还需要和“攻击嫌疑人”列表对比。如果存在“攻击嫌疑人”列表而且置信度高于阈值,则活体不通过。同时,该“攻击嫌疑人”的置信等级也会下降。当下降到一个程度,则删除该“攻击嫌疑人”。“攻击嫌疑人”置信度随时间不断衰减。当一个时间不触发之后就删除该“攻击嫌疑人”。The probability of "attacking the suspect" changes with the environment: when a single-frame face is judged to be false, the confidence of the "attacking suspect" increases; List comparison. If there is a list of "attack suspects" and the confidence level is above the threshold, the live body does not pass. At the same time, the confidence level of the "attack suspect" will also drop. When it drops to a certain level, the "attack suspect" is deleted. The "attack suspect" confidence level decays over time. Delete the "attack suspect" when a time is not triggered.
以上所述仅为本发明的较佳实施用例而已,并非用于限定本发明的保护范围。凡在本发明的精神和原则之内,所作的任何修改、等同替换以及改进等,均应包含在本发明的保护范围之内。The above descriptions are only examples of preferred implementations of the present invention, and are not intended to limit the protection scope of the present invention. Any modifications, equivalent substitutions and improvements made within the spirit and principle of the present invention shall be included within the protection scope of the present invention.
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210151957.0A CN114582031A (en) | 2022-02-18 | 2022-02-18 | Living body detection auxiliary method and device for face recognition system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210151957.0A CN114582031A (en) | 2022-02-18 | 2022-02-18 | Living body detection auxiliary method and device for face recognition system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114582031A true CN114582031A (en) | 2022-06-03 |
Family
ID=81774850
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210151957.0A Pending CN114582031A (en) | 2022-02-18 | 2022-02-18 | Living body detection auxiliary method and device for face recognition system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114582031A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110532746A (en) * | 2019-07-24 | 2019-12-03 | 阿里巴巴集团控股有限公司 | Face method of calibration, device, server and readable storage medium storing program for executing |
CN110991231A (en) * | 2019-10-28 | 2020-04-10 | 支付宝(杭州)信息技术有限公司 | Living body detection method and device, server and face recognition equipment |
WO2020177226A1 (en) * | 2019-03-04 | 2020-09-10 | 平安科技(深圳)有限公司 | Improved resnet-based human face in-vivo detection method and related device |
CN111914626A (en) * | 2020-06-18 | 2020-11-10 | 北京迈格威科技有限公司 | Living body recognition/threshold adjustment method, device, electronic device and storage medium |
CN111985400A (en) * | 2020-08-20 | 2020-11-24 | 中国建设银行股份有限公司 | Face living body identification method, device, equipment and storage medium |
-
2022
- 2022-02-18 CN CN202210151957.0A patent/CN114582031A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020177226A1 (en) * | 2019-03-04 | 2020-09-10 | 平安科技(深圳)有限公司 | Improved resnet-based human face in-vivo detection method and related device |
CN110532746A (en) * | 2019-07-24 | 2019-12-03 | 阿里巴巴集团控股有限公司 | Face method of calibration, device, server and readable storage medium storing program for executing |
CN110991231A (en) * | 2019-10-28 | 2020-04-10 | 支付宝(杭州)信息技术有限公司 | Living body detection method and device, server and face recognition equipment |
CN111914626A (en) * | 2020-06-18 | 2020-11-10 | 北京迈格威科技有限公司 | Living body recognition/threshold adjustment method, device, electronic device and storage medium |
CN111985400A (en) * | 2020-08-20 | 2020-11-24 | 中国建设银行股份有限公司 | Face living body identification method, device, equipment and storage medium |
Non-Patent Citations (1)
Title |
---|
纪侨斌 等: "高效防伪人脸识别系统", 工业控制计算机, 25 May 2020 (2020-05-25) * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111666960B (en) | Image recognition method, device, electronic equipment and readable storage medium | |
WO2018099032A1 (en) | Target tracking method and device | |
WO2019136850A1 (en) | Risk behavior recognition method and system, and storage medium and device | |
CN108154080B (en) | Method for quickly tracing to source of video equipment | |
WO2022161397A1 (en) | Face image verification method and apparatus, electronic device and storage medium | |
US20220309627A1 (en) | Face image straight line processing method, terminal device and storage medium | |
WO2023071180A1 (en) | Authenticity identification method and apparatus, electronic device, and storage medium | |
CN114582031A (en) | Living body detection auxiliary method and device for face recognition system | |
CN109753886B (en) | Face image evaluation method, device and equipment | |
CN111914626B (en) | Living body identification and living body threshold adjustment method, device, electronic equipment and storage medium | |
CN118690365A (en) | Attack detection method and device | |
WO2024169261A9 (en) | Image processing method and apparatus, and electronic device, computer-readable storage medium and computer program product | |
CN107977628B (en) | Neural network training method, face detection method and face detection device | |
TWI844887B (en) | Character recognition method for dynamic images | |
WO2023024473A1 (en) | Living body detection method and apparatus, and electronic device, computer-readable storage medium and computer program product | |
WO2014050381A1 (en) | Biometric authentication device, biometric authentication method, and computer-readable recording medium | |
CN111353943B (en) | Face image recovery method and device and readable storage medium | |
CN112070819A (en) | Face depth image construction method and device based on embedded system | |
CN110991307A (en) | Face recognition method, device, equipment and storage medium | |
CN113779583B (en) | Behavior detection method and device, storage medium and electronic equipment | |
CN116343099B (en) | Computer screen information anti-theft system based on machine vision | |
CN113760664B (en) | A two-level threshold attack detection method, computer and storage medium | |
CN111401197A (en) | Picture risk identification method, device and equipment | |
CN116110133A (en) | Face silence living body detection method, face silence living body detection system, terminal equipment and storage medium | |
CN118400185A (en) | A detection method for model inversion attacks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |