User identity authentication method and device and terminal equipment

文档序号:49277 发布日期:2021-09-28 浏览:10次 中文

阅读说明:本技术 用户身份认证方法、装置及终端设备 (User identity authentication method and device and terminal equipment ) 是由 梅臻 吕海峰 于 2020-03-24 设计创作,主要内容包括:本申请适用于图像处理技术领域,提供了用户身份认证方法、装置及终端设备,该用户身份认证方法包括:获取目标用户的护照图片和视频图像;其中,护照图片中包含目标用户的第一人脸图像和文字信息,视频图像中包含目标用户的第二人脸图像;对第一人脸图像进行防篡改检测,以及对文字信息进行合法性检测;在第一人脸图像未经过篡改且文字信息合法的情况下,提取第一人脸图像的多个第一关键点以及第二人脸图像的多个第二关键点;基于多个第一关键点和多个第二关键点,确定第一人脸图像和第二人脸图像是否对应同一用户。本申请能够实现基于护照图片进行身份认证,能够提高身份认证效率及准确率。(The application is applicable to the technical field of image processing, and provides a user identity authentication method, a device and terminal equipment, wherein the user identity authentication method comprises the following steps: acquiring a passport picture and a video image of a target user; the passport picture comprises a first face image and character information of a target user, and the video image comprises a second face image of the target user; carrying out tamper-proof detection on the first face image and carrying out legality detection on the character information; under the condition that the first face image is not tampered and the text information is legal, extracting a plurality of first key points of the first face image and a plurality of second key points of the second face image; and determining whether the first face image and the second face image correspond to the same user or not based on the plurality of first key points and the plurality of second key points. According to the method and the device, identity authentication can be performed based on the passport picture, and identity authentication efficiency and accuracy can be improved.)

1. A user identity authentication method is characterized by comprising the following steps:

acquiring a passport picture and a video image of a target user; the passport picture comprises a first face image and character information of the target user, and the video image comprises a second face image of the target user;

carrying out tamper-proof detection on the first face image and carrying out validity detection on the text information;

under the condition that the first face image is not tampered and the text information is legal, extracting a plurality of first key points of the first face image and a plurality of second key points of the second face image;

determining whether the first facial image and the second facial image correspond to the same user based on the first key points and the second key points.

2. The method for authenticating a user according to claim 1, wherein the tamper-proof detection of the first face image includes:

and carrying out anti-tampering detection on the first face image through a neural network comprising an RGB channel and a noise channel.

3. The method for authenticating user identity according to claim 1, wherein the detecting the validity of the text message includes:

extracting a plurality of key character information from the character information of the passport picture;

matching the plurality of key character information with a preset passport template;

after the matching is passed, verifying the key word information according to the field on the passport picture;

and if the verification is passed, the legality detection of the character information is passed.

4. The method of claim 1, wherein the extracting a plurality of first key points of the first face image and a plurality of second key points of the second face image comprises:

extracting a first preset number of first key points from the first face image, and extracting a second preset number of second key points from the second face image; and determining whether the first face image and the second face image correspond to the same user or not based on the corresponding first key point and the second key point.

5. The method of claim 4, wherein the extracting a second preset number of second key points from the second face image comprises:

sampling the video images to obtain a plurality of second face images;

and extracting second key points with a second preset number based on the plurality of second face images.

6. The method of claim 4, wherein the determining whether the first facial image and the second facial image correspond to the same user based on the first keypoints and the second keypoints comprises:

determining similarities between the plurality of first keypoints and the plurality of second keypoints based on L2 distances between the plurality of first keypoints and the plurality of second keypoints;

and when the similarity is larger than or equal to a threshold value, determining that the first face image and the second face image correspond to the same user.

7. A method of user identity authentication according to any one of claims 1 to 6, the method further comprising:

and generating prompt information for prompting the user to upload the video image again under the condition that the first face image and the second face image correspond to different users.

8. A user authentication apparatus, comprising:

the acquisition module is used for acquiring a passport picture and a video image of a target user; the passport picture comprises a first face image and character information of the target user, and the video image comprises a second face image of the target user;

the detection module is used for carrying out tamper-proof detection on the first face image and carrying out legality detection on the character information;

the key point extraction module is used for extracting a plurality of first key points of the first face image and a plurality of second key points of the second face image under the condition that the first face image is not tampered and the text information is legal;

a determining module, configured to determine whether the first facial image and the second facial image correspond to the same user based on the plurality of first key points and the plurality of second key points.

9. A terminal device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the method according to any of claims 1 to 7 when executing the computer program.

10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1 to 7.

Technical Field

The application belongs to the technical field of image processing, and particularly relates to a user identity authentication method, a user identity authentication device and terminal equipment.

Background

At present, the identity authentication of a user is realized by means of data comparison matching and the like on the basis of information such as an identity number, biological characteristics and the like, and the identity authentication of overseas users is realized by means of manual examination and verification, so that the identity authentication of the overseas users is inconvenient. With the rapid development of information science and technology, digital images have penetrated every corner of social life, so that the identity of overseas users can be authenticated based on the digital images, and the efficiency of authentication and audit is improved.

Disclosure of Invention

In order to overcome the problems in the related art, the embodiments of the present application provide a user identity authentication method, device and terminal device.

The application is realized by the following technical scheme:

in a first aspect, an embodiment of the present application provides a user identity authentication method, including:

acquiring a passport picture and a video image of a target user; the passport picture comprises a first face image and character information of the target user, and the video image comprises a second face image of the target user;

carrying out tamper-proof detection on the first face image and carrying out validity detection on the text information;

under the condition that the first face image is not tampered and the text information is legal, extracting a plurality of first key points of the first face image and a plurality of second key points of the second face image;

determining whether the first facial image and the second facial image correspond to the same user based on the first key points and the second key points.

In a possible implementation manner of the first aspect, the tamper-proofing detecting the first face image includes:

and performing tamper-proofing detection on the first face image through a neural network containing RGB channels and noise channels.

In a possible implementation manner of the first aspect, the performing validity detection on the text information includes:

extracting a plurality of key character information from the character information of the passport picture;

matching the plurality of key character information with a preset passport template;

after the matching is passed, verifying the key word information according to the field on the passport picture;

and if the verification is passed, the legality detection of the character information is passed.

In a possible implementation manner of the first aspect, the extracting a plurality of first key points of the first face image and a plurality of second key points of the second face image includes:

extracting a first preset number of first key points from the first face image, and extracting a second preset number of second key points from the second face image; and determining whether the first face image and the second face image correspond to the same user or not based on the corresponding first key point and the second key point.

In a possible implementation manner of the first aspect, the extracting a second preset number of second key points from the second face image includes:

sampling the video images to obtain a plurality of second face images;

and extracting a second preset number of second key points based on the plurality of second face images.

In a possible implementation manner of the first aspect, the determining, based on the plurality of first key points and the plurality of second key points, whether the first facial image and the second facial image correspond to the same user includes:

determining similarities between the plurality of first keypoints and the plurality of second keypoints based on L2 distances between the plurality of first keypoints and the plurality of second keypoints;

and when the similarity is larger than or equal to a threshold value, determining that the first face image and the second face image correspond to the same user.

In a possible implementation manner of the first aspect, the method further includes:

and generating prompt information for prompting the user to upload the video image again under the condition that the first face image and the second face image correspond to different users.

In a second aspect, an embodiment of the present application provides a user identity authentication apparatus, including:

the acquisition module is used for acquiring a passport picture and a video image of a target user; the image-protecting picture comprises a first face image and character information of the target user, and the video image comprises a second face image of the target user;

the detection module is used for carrying out tamper-proof detection on the first face image and carrying out legality detection on the character information;

the key point extraction module is used for extracting a plurality of first key points of the first face image and a plurality of second key points of the second face image under the condition that the first face image is not tampered and the text information is legal;

a determining module, configured to determine whether the first facial image and the second facial image correspond to the same user based on the plurality of first key points and the plurality of second key points.

In a third aspect, an embodiment of the present application provides a terminal device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the user identity authentication method according to any one of the first aspect when executing the computer program.

In a fourth aspect, the present application provides a computer readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the computer program implements the user identity authentication method according to any one of the first aspect.

In a fifth aspect, the present application provides a computer program product, which when run on a terminal device, causes the terminal device to execute the user identity authentication method according to any one of the above first aspects.

It is understood that the beneficial effects of the second aspect to the fifth aspect can be referred to the related description of the first aspect, and are not described herein again.

Compared with the prior art, the embodiment of the application has the advantages that:

in the embodiment of the application, a passport picture and a video image of a target user are obtained, a first face image in the passport picture is subjected to anti-tampering detection, text information in the passport picture is subjected to legality detection, a plurality of first key points of the first face image and a plurality of second key points of a second face image in the video image are extracted under the condition that the first face image is not tampered and the text information is legal, whether the first face image and the second face image correspond to the same user or not is determined based on the plurality of first key points and the plurality of second key points, so that the user can use the passport information to perform identity authentication, the identity authentication efficiency is improved, and the passport picture can be identified under the conditions that the passport picture is tampered by carrying out anti-tampering detection on the face of the passport and legality detection on the text information of the passport, the accuracy of identity authentication is guaranteed, and the passport is verified through the video image containing the face of the target user, so that the accuracy of identity authentication can be further improved.

It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the specification.

Drawings

In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.

Fig. 1 is a schematic view of an application scenario of a user identity authentication method according to an embodiment of the present application;

fig. 2 is a schematic flowchart of a user identity authentication method according to an embodiment of the present application;

fig. 3 is a schematic flowchart of a user identity authentication method according to an embodiment of the present application;

fig. 4 is a schematic diagram of 68 key points of a human face according to an embodiment of the present application;

fig. 5 is a schematic flowchart of a user identity authentication method according to an embodiment of the present application;

fig. 6 is a schematic flowchart of a user identity authentication method according to an embodiment of the present application;

fig. 7 is a schematic structural diagram of a user identity authentication apparatus according to an embodiment of the present application;

fig. 8 is a schematic structural diagram of a terminal device provided in an embodiment of the present application;

fig. 9 is a schematic structural diagram of a computer to which the user identity authentication method provided in the embodiment of the present application is applied.

Detailed Description

In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.

It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.

It should also be understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.

As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to" determining "or" in response to detecting ". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".

Furthermore, in the description of the present application and the appended claims, the terms "first," "second," "third," and the like are used for distinguishing between descriptions and not necessarily for describing or implying relative importance.

Reference throughout this specification to "one embodiment" or "some embodiments," or the like, means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," or the like, in various places throughout this specification are not necessarily all referring to the same embodiment, but rather "one or more but not all embodiments" unless specifically stated otherwise. The terms "comprising," "including," "having," and variations thereof mean "including but not limited to," unless expressly specified otherwise.

At present, the identity authentication of a user is realized by means of data comparison matching and the like on the basis of information such as an identity number, biological characteristics and the like, and the identity authentication of overseas users is realized by means of manual examination and verification, so that the identity authentication of the overseas users is inconvenient. With the rapid development of information science and technology, digital images have penetrated every corner of social life, so that the identity of overseas users can be authenticated based on the digital images, and the efficiency of authentication and audit is improved.

Based on the above problems, the user identity authentication method in the embodiment of the present application obtains a care picture and a video image of a target user, performs tamper-proof detection on a first face image in the passport picture, performs legitimacy detection on text information in the passport picture, extracts a plurality of first key points of the first face image and a plurality of second key points of a second face image in the video image under the condition that the first face image is not tampered and the text information is legitimate, determines whether the first face image and the second face image correspond to the same user based on the plurality of first key points and the plurality of second key points, so that the user can perform identity authentication using the passport information, improves identity authentication efficiency, and performs tamper-proof detection on a face on a passport and performs legitimacy detection on the text information on the passport, the method can identify the tampered condition of the passport picture, ensure the accuracy of identity authentication, and verify the passport through the video image containing the face of the target user, so that the accuracy of identity authentication can be further improved.

For example, the embodiment of the present application can be applied to the exemplary scenario shown in fig. 1. In this scenario, the user may upload a passport picture and a self-portrait video image to the server 20 through the terminal 10 when performing identity authentication; the server 20 performs tamper-proof detection on the first face image in the passport picture, performs validity detection on the text information in the passport picture, extracts a plurality of first key points of the first face image and a plurality of second key points of the second face image in the video image under the condition that the first face image is not tampered and the text information is valid, and determines whether the first face image and the second face image correspond to the same user based on the plurality of first key points and the plurality of second key points.

The terminal 10 may be a mobile phone, a tablet computer, a wearable device, a vehicle-mounted device, a tablet computer, a notebook computer, a netbook, a personal digital assistant, and the like, and the specific type of the terminal 10 is not limited in this embodiment of the application.

The user identity authentication method of the present application is described in detail below with reference to fig. 1.

Fig. 2 is a schematic flow chart of a user identity authentication method according to an embodiment of the present application, and with reference to fig. 2, the user identity authentication method is described in detail as follows:

in step 101, a passport picture and a video image of a target user are acquired.

The passport picture can contain a first face image and character information of a target user, and the video image contains a second face image of the target user.

For example, the above process of obtaining the passport picture of the target user may be: the user can select a passport picture prestored in the terminal to be uploaded to the server based on the operation prompt; alternatively, the server may invoke a photographing function of the terminal to guide the user to photograph the passport and upload the passport to the server, which is not limited in the embodiment of the present application.

For example, the process of acquiring the video image of the target user may be: the user can select a video image prestored in the terminal to upload to the server based on the operation prompt; alternatively, the server may invoke a camera function of the terminal, and guide the user to shoot a short video of the face of the user and upload the shot short video to the server. The video image may be a video image with a preset time length, for example, the video image may be a video image with a time length of 5 seconds.

Specifically, in the process that the server calls the camera function of the terminal to collect the video image of the user, the client can be guided to do at least one facial action, such as a blinking action, a head nodding action, a head shaking action and the like. In this embodiment, in a manner that the server invokes the camera function of the terminal to capture the video image of the face of the user, it can be ensured that the obtained video image is the video image captured by the user in real time, and accuracy of passport information authentication in the subsequent step can be improved.

In step 102, tamper-proof detection is performed on the first face image, and validity detection is performed on the text information.

In an embodiment, the tamper-proofing detection on the first face image may specifically be:

and carrying out anti-tampering detection on the first face image through a neural network comprising an RGB channel and a noise channel.

Specifically, the anti-tampering detection may be performed on the first face image by using an Faster R-CNN network artificial intelligence network, where the network detects the image by using two channels (also called dual channels), which refer to an RGB channel and a noise channel. The purpose of the RGB channel is to extract features from the RGB image input to find tamper features such as strong contrast differences, unnatural tamper boundaries, etc.; the noise channel detects the tampered area by finding the noise inconsistency between the real and the tampered area by using the noise characteristics extracted from the model filter (SRM) layer rich in steganalysis.

The RPN (Region pro-active Network) is part of the fast R-CNN for proposing image regions that may contain objects of interest and making them suitable for image manipulation detection. In order to distinguish the tampered region, the characteristics extracted from the RGB channel can be used to capture the visual inconsistency at the tampered boundary, the contrast difference between the tampered region and the real region, and other clues.

The noise channel analyzes local noise features in the image: when an object is removed from one image and then pasted into another image, the noise characteristics between the original image and the target image may not match, and the user may then compress the tampered image to partially mask the difference. To take advantage of these features, the RGB image is converted to the noise domain and local noise features are used as input to the noise channel, where the noise features can be generated using SRM (steganalysis rich model) filter kernel. The RGB channel and the noise channel share the same region to generate region propofol. The pooling layer RoI posing layer of the region of interest then selects spatial (spatial) features from the RGB channel and the noise channel, generates a predicted bounding box from RoI features of the RGB channel, combines spatial co-occurrence features of the noise channel and the RGB channel by bilinear posing.

In addition, a CNN module, namely a 3x3 convolution layer, is added to the last layer of neural network of the traditional Faster R-CNN network, so that the CNN module can carry out deep learning and detection on the characteristics of an RGB channel and a noise channel; and adding a full connection layer and a softmax layer after the CNN module to transfer results, generating a prediction label by the network and judging whether the prediction area is tampered.

In an embodiment, referring to fig. 3, the detecting the validity of the text message may include:

in step 201, a plurality of key character information is extracted from the character information of the passport picture.

In step 202, the plurality of pieces of key text information are matched with a preset passport template.

In step 203, after the matching is passed, the key word information is verified according to the field on the passport picture.

In step 204, if the verification is passed, the validity detection of the text message is passed.

The method comprises the steps of extracting a plurality of key character information in key character information such as first name, last name, sex, passport No., code, date of birthday and the like from character information of a passport picture through tesseract, opencv and template technologies, then determining a structural body range of an area where real key character information is located through a preset overseas passport template, intercepting structural body range (x, y, w, h) information and text extraction of the area, wherein x is an abscissa of the area, y is an ordinate of the area, w is a width of the area, and h is a height of the area, and verifying key elements of a number type in the key character information through numbers of a random bit number segment to match the plurality of key character information with the preset passport template.

And if the plurality of pieces of key word information are matched with the preset passport template, matching verification is carried out on the extracted key word information and a certain bit field on the passport picture, and if the extracted key word information is matched with the certain bit field on the passport picture, the reliability of the field is higher, so that bidirectional verification is completed. For example, effective check is carried out on the month and day of the birth date on the passport, the month number and the day number can be verified through fields such as passport number, validity period and the like, and the passport picture is legal if the verification is passed; otherwise, it is an illegal passport picture. If the passport picture is not legal, the user is prompted to be an illegal passport, and the user is allowed to upload the overseas passport and the self-portrait video again.

In step 103, under the condition that the first face image is not tampered and the text information is legal, a plurality of first key points of the first face image and a plurality of second key points of the second face image are extracted.

As a possible implementation manner, step 103 may specifically be:

extracting a first preset number of first key points from the first face image, and extracting a second preset number of second key points from the second face image; and determining whether the first face image and the second face image correspond to the same user or not based on the corresponding first key point and the second key point.

The first preset number and the second preset number may be the same or different. Under the condition that the first preset number is different from the second preset number, the step 104 may be performed on the first key points and the second key points corresponding to the positions of the first key points and the second key points extracted in the step. The following description will be given by taking the first predetermined number and the second predetermined number as an example, but the invention is not limited thereto.

For example, 68 first key points may be extracted from the first face image by opencv in combination with dlib, and 68 second key points may be extracted from the second face image, where there is a one-to-one correspondence between the 68 first key points and the 68 second key points. As shown in fig. 4, the distribution of 68 first keypoints and 68 second keypoints is shown in fig. 4.

For example, the above process of extracting a second preset number of second key points from the second face image may include:

sampling the video images to obtain a plurality of second face images;

and extracting a second preset number of second key points based on the plurality of second face images.

The video images uploaded by the user can be video images with a certain time length, and the plurality of second face images can be obtained by sampling the video images. For example, the video image may be sampled at a fixed sampling frequency to obtain a plurality of second face images; or sampling the video image according to an unfixed sampling frequency to obtain a plurality of second face images, which is not limited in the embodiment of the present application.

Specifically, the video images uploaded by the user for a certain time length can be randomly sampled to obtain a plurality of second face images. For example, a video image uploaded by a user for a certain time period may be randomly sampled to obtain N1 pictures containing second face images, and then N2 second face images are extracted from N1 pictures, where N2 is not greater than N1.

Illustratively, in the plurality of second face images, a second preset number of second key points are respectively extracted for each second face image, and then averaging is performed according to the second key points corresponding to the positions in each second face image, so as to determine a second preset number of second key points of the second face image.

For example, one second face image may be selected from the plurality of second face images, a second preset number of second key points may be extracted from the selected second face image, and the second preset number of second key points of the second face image may be determined.

In step 104, it is determined whether the first facial image and the second facial image correspond to the same user based on the plurality of first key points and the plurality of second key points.

Referring to fig. 5, in some embodiments, step 104 may include the steps of:

in step 301, similarity between the plurality of first keypoints and the plurality of second keypoints is determined based on L2 distances between the plurality of first keypoints and the plurality of second keypoints.

In step 302, when the similarity is greater than or equal to a threshold, it is determined that the first facial image and the second facial image correspond to the same user.

Specifically, after obtaining the plurality of first keypoints and the plurality of second keypoints in step 103, the similarity between the plurality of first keypoints and the plurality of second keypoints may be determined by L2 distance, and if the similarity between the plurality of first keypoints and the plurality of second keypoints is greater than or equal to a threshold, it may be determined that the first face image and the second face image correspond to the same user. For example, the threshold may be a value such as 80%, 90%, 92%, 94%, and the like, and may be specifically set according to actual needs, which is not limited in the embodiment of the present application.

Referring to fig. 6, in some embodiments, based on the embodiment shown in fig. 2, the user identity authentication method may further include:

in step 105, in a case where it is determined that the first facial image and the second facial image correspond to different users, prompt information for prompting the users to upload the video image again is generated.

Specifically, in step 104, if the similarity between the first key points and the second key points is smaller than the threshold, it is determined that the first facial image and the second facial image correspond to the same user, the user may be required to upload the video image again, and the second key point of the newly uploaded video image is extracted, so as to verify whether the similarity between the second key point of the newly uploaded video image and the first key point is greater than or equal to the threshold again.

The user identity authentication method comprises the steps of obtaining a passport picture and a video image of a target user, carrying out anti-tampering detection on a first face image in the passport picture, carrying out legality detection on character information in the passport picture, extracting a plurality of first key points of the first face image and a plurality of second key points of a second face image in the video image under the condition that the first face image is not tampered and the character information is legal, and determining whether the first face image and the second face image correspond to the same user or not based on the plurality of first key points and the plurality of second key points, so that the user can carry out identity authentication by using the passport information, the identity authentication efficiency is improved, and the situation that the passport picture is tampered can be identified by carrying out anti-tampering detection on the face of the passport and legality detection on the character information on the passport, the accuracy of identity authentication is guaranteed, and the passport is verified through the video image containing the face of the target user, so that the accuracy of identity authentication can be further improved.

It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application.

Fig. 7 shows a structural block diagram of the user identity authentication apparatus provided in the embodiment of the present application, corresponding to the user identity authentication method described in the foregoing embodiment, and for convenience of description, only the relevant portions of the embodiment of the present application are shown.

Referring to fig. 7, the user identity authentication apparatus in the embodiment of the present application may include an obtaining module 401, a detecting module 402, a key point extracting module 403, and a determining module 404.

The acquiring module 401 is configured to acquire a passport picture and a video image of a target user; the passport picture comprises a first face image and character information of the target user, and the video image comprises a second face image of the target user;

a detection module 402, configured to perform tamper-proof detection on the first face image and perform validity detection on the text information;

a key point extracting module 403, configured to extract a plurality of first key points of the first face image and a plurality of second key points of the second face image when the first face image is not tampered and the text information is legal;

a determining module 404, configured to determine whether the first facial image and the second facial image correspond to the same user based on the plurality of first key points and the plurality of second key points.

Optionally, the detection module 402 may be specifically configured to:

and performing tamper-proofing detection on the first face image through a neural network containing RGB channels and noise channels.

Optionally, the detection module 402 may be specifically configured to:

extracting a plurality of key character information from the character information of the passport picture;

matching the plurality of key character information with a preset passport template;

after the matching is passed, verifying the key word information according to the field on the passport picture;

and if the verification is passed, the legality detection of the character information is passed.

Optionally, the key point extracting module 403 may specifically be configured to:

extracting a first preset number of first key points from the first face image, and extracting a second preset number of second key points from the second face image; and determining whether the first face image and the second face image correspond to the same user or not based on the corresponding first key point and the second key point.

Optionally, the extracting a second preset number of second key points from the second face image includes:

sampling the video images to obtain a plurality of second face images;

and extracting a second preset number of second key points from the plurality of second face images.

Optionally, the determining module 404 may be specifically configured to:

determining similarities between the plurality of first keypoints and the plurality of second keypoints based on L2 distances between the plurality of first keypoints and the plurality of second keypoints;

and when the similarity is larger than or equal to a threshold value, determining that the first face image and the second face image correspond to the same user.

Optionally, the apparatus may further include:

and the prompting module is used for generating prompting information for prompting the user to upload the video image again under the condition that the first face image and the second face image correspond to different users.

It should be noted that, for the information interaction, execution process, and other contents between the above-mentioned devices/units, the specific functions and technical effects thereof are based on the same concept as those of the embodiment of the method of the present application, and specific reference may be made to the part of the embodiment of the method, which is not described herein again.

It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned functional units and modules are illustrated as being divided, and in practical applications, the above-mentioned functions may be distributed as different functional units and modules according to needs, that is, the internal structure of the apparatus may be divided into different functional units or modules to complete all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit, and the integrated unit may be implemented in the form of a hardware or a software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. For the specific working processes of the units and modules in the system, reference may be made to the corresponding processes in the foregoing method embodiments, which are not described herein again.

An embodiment of the present application further provides a terminal device, and referring to fig. 8, the terminal device 500 may include: at least one processor 510, a memory 520, and a computer program stored in the memory 520 and executable on the at least one processor 510, wherein the processor 510 executes the computer program to implement the steps of any of the above-mentioned method embodiments, such as the steps S101 to S104 in the embodiment shown in fig. 2. Alternatively, the processor 510, when executing the computer program, implements the functions of the modules/units in the above-described device embodiments, such as the functions of the modules 401 to 404 shown in fig. 7.

Illustratively, the computer program may be divided into one or more modules/units, which are stored in the memory 520 and executed by the processor 510 to accomplish the present application. The one or more modules/units may be a series of computer program segments capable of performing specific functions, which are used to describe the execution of the computer program in the terminal device 500.

Those skilled in the art will appreciate that fig. 8 is merely an example of a terminal device and is not intended to be limiting and may include more or fewer components than shown, or some components may be combined, or different components such as input output devices, network access devices, buses, etc.

The Processor 510 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.

The memory 520 may be an internal storage unit of the terminal device, or may be an external storage device of the terminal device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like. The memory 520 is used for storing the computer programs and other programs and data required by the terminal device. The memory 520 may also be used to temporarily store data that has been output or is to be output.

The bus may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, the buses in the figures of the present application are not limited to only one bus or one type of bus.

The user identity authentication method provided by the embodiment of the application can be applied to terminal devices such as computers, mobile phones, wearable devices, vehicle-mounted devices, tablet computers, notebook computers, netbooks, Personal Digital Assistants (PDAs), Augmented Reality (AR)/Virtual Reality (VR) devices, and mobile phones, and the embodiment of the application does not limit the specific types of the terminal devices at all.

Take the terminal device as a computer as an example. Fig. 9 is a block diagram showing a partial structure of a computer provided in an embodiment of the present application. Referring to fig. 9, the computer includes: communication circuit 610, memory 620, input unit 630, display unit 640, audio circuit 650, wireless fidelity (WiFi) module 660, processor 670, and power supply 680. Those skilled in the art will appreciate that the computer architecture shown in FIG. 9 is not intended to be limiting of computers, and may include more or fewer components than those shown, or some components in combination, or a different arrangement of components.

The following describes each component of the computer in detail with reference to fig. 9:

the communication circuit 610 may be used for receiving and transmitting signals during a message transmission or communication process, and in particular, receives and processes an image sample transmitted by the image capturing device to the processor 670; in addition, an image acquisition instruction is sent to the image acquisition apparatus. Typically, the communication circuit includes, but is not limited to, an antenna, at least one Amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, the communication circuit 610 may also communicate with networks and other devices via wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to Global System for Mobile communications (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE)), e-mail, Short Message Service (SMS), and the like.

The memory 620 may be used to store software programs and modules, and the processor 670 executes various functional applications of the computer and data processing by operating the software programs and modules stored in the memory 620. The memory 620 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program (such as a sound playing function, an image playing function, etc.) required for at least one function, and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the computer, etc. Further, the memory 620 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.

The input unit 630 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the computer. Specifically, the input unit 630 may include a touch panel 631 and other input devices 632. The touch panel 631, also referred to as a touch screen, may collect touch operations of a user on or near the touch panel 631 (e.g., operations of the user on the touch panel 631 or near the touch panel 631 by using any suitable object or accessory such as a finger or a stylus), and drive corresponding connection devices according to a preset program. Alternatively, the touch panel 631 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 670, and can receive and execute commands sent by the processor 670. In addition, the touch panel 631 may be implemented using various types, such as resistive, capacitive, infrared, and surface acoustic wave. The input unit 630 may include other input devices 632 in addition to the touch panel 631. In particular, other input devices 632 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.

The display unit 640 may be used to display information input by the user or information provided to the user and various menus of the computer, and to project the avatar model of the target user transmitted from other computers. The Display unit 640 may include a Display panel 641 and a projection device, and optionally, the Display panel 641 may be configured by a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. Further, the touch panel 631 can cover the display panel 641, and when the touch panel 631 detects a touch operation thereon or nearby, the touch operation is transmitted to the processor 670 to determine the type of the touch event, and then the processor 670 provides a corresponding visual output on the display panel 641 according to the type of the touch event. Although in fig. 9, the touch panel 631 and the display panel 641 are two separate components to implement the input and output functions of the computer, in some embodiments, the touch panel 631 and the display panel 641 may be integrated to implement the input and output functions of the computer.

The audio circuit 650 may provide an audio interface between a user and a computer. The audio circuit 650 may transmit the received electrical signal converted from the audio data to a speaker, and convert the electrical signal into an audio signal for output; on the other hand, the microphone converts the collected sound signal into an electrical signal, which is received by the audio circuit 650 and converted into audio data, which is then processed by the audio data output processor 670 and transmitted to, for example, another computer via the communication circuit 610, or the audio data is output to the memory 620 for further processing.

WiFi belongs to short-distance wireless transmission technology, and the computer can help a user to receive and send e-mails, browse webpages, access streaming media and the like through the WiFi module 660, and provides wireless broadband internet access for the user. Although fig. 9 shows the WiFi module 660, it is understood that it does not belong to the essential constitution of the computer, and may be omitted entirely as needed within the scope not changing the essence of the invention.

The processor 670 is a control center of the computer, connects various parts of the entire computer using various interfaces and lines, performs various functions of the computer and processes data by operating or executing software programs and/or modules stored in the memory 620, and calls data stored in the memory 620, thereby monitoring the computer as a whole. Alternatively, processor 670 may include one or more processing units; alternatively, processor 670 may integrate an application processor that handles primarily the operating system, user interface, and applications, etc., and a modem processor that handles primarily wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 670.

The computer may also include a power supply 680 (e.g., a battery) to provide power to the various components, where the power supply 680 may be logically coupled to the processor 670 via a power management system to provide management of charging, discharging, and power consumption via the power management system.

An embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the computer program can implement the steps in the embodiments of the user identity authentication method described above.

The embodiment of the present application provides a computer program product, which when running on a mobile terminal, enables the mobile terminal to implement the steps in the embodiments of the user identity authentication method when executed.

The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, all or part of the processes in the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium and can implement the steps of the embodiments of the methods described above when the computer program is executed by a processor. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer readable medium may include at least: any entity or device capable of carrying computer program code to a photographing apparatus/terminal apparatus, a recording medium, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), an electrical carrier signal, a telecommunications signal, and a software distribution medium. Such as a usb-disk, a removable hard disk, a magnetic or optical disk, etc. In certain jurisdictions, computer-readable media may not be an electrical carrier signal or a telecommunications signal in accordance with legislative and patent practice.

In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described or recited in detail in a certain embodiment, reference may be made to the descriptions of other embodiments.

Those of ordinary skill in the art would appreciate that the elements and algorithm steps of the various embodiments described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.

In the embodiments provided in the present application, it should be understood that the disclosed apparatus/network device and method may be implemented in other ways. For example, the above-described apparatus/network device embodiments are merely illustrative, and for example, the division of the modules or units is only one logical division, and there may be other divisions when actually implemented, for example, multiple units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.

The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.

The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the present disclosure, and are intended to be included within the scope thereof.

20页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:基于X光射线的在役GIS电站智能云检测系统

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类