The present disclosure relates to face recognition, in particular, a face recognition system using two-dimensional code and two-dimensional code for comparison.
Face recognition refers to a technology that uses inherent face features to automatically perform personal identification and recognition through a computer. First, we will use a camera to capture photos of the face and perform various processing on the face to record the face features in the database. When this person is recognized and verified in the future, we will compare the face feature data from the database with the face feature data retrieved from the field for comparison. When the degree of similarity between the above two reaches a certain threshold, we may recognize or identify this person.
Therefore, face recognition can be applied to laptops, without worrying about forgetting the login password, and without worrying about anyone else logging into your computer by any means. A person's face is the only password and can be prevented from being faked to the greatest extent. Further, in addition to face recognition for access control, criminal investigation, railway stations, and airports, it can also be used for hotel services, bank withdrawals, and other services. Our faces will become the keys to access various scenes. However, the above face recognition method still has security loopholes. For example, if the database is hacked, leading to the theft of face feature data, it will pose a great threat to personal privacy and property security.
Thus, how to design a face recognition system that can prevent security loopholes is that those skilled in the art are worth thinking about.
In order to solve the above-mentioned problems, the technical scheme adopted by the present invention is as follows.
A face recognition system is provided. The face recognition system includes an electronic device and terminal server. The electronic device comprising: a camera, exposed outside the electronic device; and a scanning unit, scanning a user face through the camera to obtain a user face feature data. The terminal server communicated with the electronic device, comprising: a two-dimensional code generation unit, generating a user two-dimensional code according to the user face feature data; a two-dimensional code database, comprising a plurality of member two-dimensional codes; and a comparison unit, comparing the user two-dimensional code with each of the member two-dimensional codes.
Furthermore, the member two-dimensional code stores a two-dimensional face feature data, and the two-dimensional face feature data is generated by extracting according to a plurality of features of a face image.
Furthermore, the user two-dimensional code is a QR code, a High Capacity Color QR code, or a High Capacity Color Barcode (HCCB).
Furthermore, the member two-dimensional code is a QR code, a High Capacity Color QR code, or a High Capacity Color Barcode (HCCB).
The following invention provides many different embodiments, or examples, for implementing different features of the provided subject matter. Specific examples of components and arrangements are described below to simplify the present invention. These are, of course, merely examples and are not intended to be limiting. For example, the formation of a first feature over or on a second feature in the description that follows may include embodiments in which the first and second features are formed in direct contact, and may also include embodiments in which additional features may be formed between the first and second features, such that the first and second features may not be in direct contact. In addition, the present invention may repeat reference numerals and/or letters in the various examples. This repetition is for the purpose of simplicity and clarity and does not in itself dictate a relationship between the various embodiments and/or configurations discussed.
Further, spatially relative terms, such as “beneath,” “below,” “lower,” “above,” “upper” and the like, may be used herein for ease of description to describe one element or feature's relationship to another element(s) or feature(s) as illustrated in the figures. The spatially relative terms are intended to encompass different orientations of the device in use or operation in addition to the orientation depicted in the figures. The apparatus may be otherwise oriented (rotated 90 degrees or at other orientations) and the spatially relative descriptors used herein may likewise be interpreted accordingly.
With reference to
With reference to
With continuous reference to
Further, the two-dimensional code database includes a plurality of member two-dimensional codes 132C. The generation method of the member two-dimensional codes 132C is described as follows:
First, a plurality of features are extracted through a face image 9 (see
Next, with continuous reference to
In addition, the comparison unit links the two-dimensional code generation unit 131 with the two-dimensional code database 132, and the comparison unit is configured to compare the user two-dimensional code 131C with each of the member two-dimensional codes 132C. Among them, when the user two-dimensional code 131C is similar to one of the member two-dimensional codes 132C to a certain threshold or completely the same, the user 8 may be authenticated as a member of the system. Therefore, compared with the known face recognition method, a photo uploaded by a member of this system (face image 9) will be converted into an identification symbol (in the form of two-dimensional code), and the terminal server 13 of this system may not save the photo and the two-dimensional face feature data 134D of the member, so the photo and two-dimensional face feature data 134D of this member may not be stolen by anyone with interest.
Moreover, if the terminal server 13 of this system is hacked, leading to theft of the user two-dimensional code 131C and the member two-dimensional code 132C, the user two-dimensional code 131C may not be restored to the image of the face of the user 8 and also the member two-dimensional code 132C may not be restored to the face image 9. Thus, this system may effectively prevent security loopholes and prevent theft of face feature data.
In above description, the user two-dimensional code 131C or the member two-dimensional code 132C is, for example, a QR code, a High Capacity Color QR code, or a High Capacity Color Barcode (HCCB).
In summary, this system uses two-dimensional code to compare with two-dimensional code, instead of using face feature data to compare with face feature data, so this system may effectively prevent security loopholes and prevent theft of face feature data.
The above embodiments are merely examples for convenience of description. Although arbitrarily modified by those skilled in the art, these will not depart from the scope of protection as claimed in the claims.
Number | Date | Country | |
---|---|---|---|
62842666 | May 2019 | US |