当前位置:网站首页>To prevent "activation" photos from being muddled through, databao "live detection + face recognition" makes face brushing safer
To prevent "activation" photos from being muddled through, databao "live detection + face recognition" makes face brushing safer
2022-07-01 08:14:00 【? Anita Zhang】
With the development of face recognition technology , More and more commercial applications , Face login 、 Face payment 、 Face lift 、 Face gate, etc , In security 、 Finance 、 education 、 Widely used in medical and other fields , The intelligent and fast face recognition technology has developed rapidly in China .
But face recognition is easy to be photographed 、 video 、 Simulation mold and other ways to muddle through , The public security department has been in Shanghai in recent years 、 Zhejiang 、 anhui 、 Jiangsu and other places found , Several suspect use deep synthesis technology , Illegally stolen or paid for photos and audio “ activation ”、 Synthesize into dynamic video for illegal profit .
“ In vivo detection + Face recognition ” Become a confrontation “ activation ” Photo The key technology
To prevent “ activation ” Your photos muddle through , Data treasure is providing “ Face recognition ” Data service , It provides customers with “ In vivo detection ” Algorithm .
Based on data treasure " In vivo detection " The algorithm can judge the face captured by the camera , Is it a real face or a fake face , Generally, it is used in application scenarios with high security requirements , Can use face recognition + The method of combining living body detection to carry out identity verification , After using in vivo detection , It makes up for the deficiency of single face recognition , Can effectively identify photos 、 video 、 Mask and other fake human faces , Avoid fraud to the greatest extent .
Data treasure as “ Internet +” Trusted authentication platform (CTID platform ) Our first tier partner , Data resources are directly connected to the public security database , After obtaining the user's authorization , By name 、 ID number 、 Portrait photos 、 In vivo detection can verify the authenticity of user identity information in real time . Identity verification as a more secure standard , Data treasure “ Face recognition comparison interface + In vivo detection SDK” The verification process is as follows :
- Portrait information collection
adopt SDK、H5 page 、 Wechat applet and other application scenarios obtain the verified face information 、 ID information , Users upload ID photos , System use certificate OCR Recognition technology automatically extracts information , Users take live video and upload it for comparison and verification .
2. Living determination
By using speech recognition 、 Lip recognition 、 Technologies such as living body judgment automatically detect video , Judge whether you are a real living body and upload the human image in the video with high quality .
3. Public security big data verification
be based on https+MD5 Signature authentication + Symmetric encryption technology will portrait image 、 full name 、 The ID number information is encrypted and transmitted to the interface authorized by the Public Security Bureau , And then automatically connect with the portrait image in the public security big data 、 full name 、 Carry out authoritative comparison and verification of ID number .
4. Output verification results
After the verification of public security big data interface , Return the verification result , If the verification is consistent, it will be approved by default , If not, return to the certification homepage , Let the user re operate .
边栏推荐
- Why are some Wills made by husband and wife invalid
- Provincial selection + noi Part II string
- On June 30, 2022, the record of provincial competition + national competition of Bluebridge
- Codeforces Round #803 (Div. 2) VP补题
- How to use layui to display the data in the database in the form of tables
- 手工挖XSS漏洞
- Learn the knowledge you need to know about the communication protocol I2C bus
- Keithley 2100 software 𞓜 Keithley2400 test software ns SourceMeter
- SharePoint - modify web application authentication using PowerShell
- [redis] it takes you through redis installation and connection at one go
猜你喜欢
随机推荐
Rk3399 platform development series explanation (network debugging) 7.30. What will affect the sending process of TCP packets?
Serial port oscilloscope software ns-scope
OJ输入输出练习
STM32 uses esp01s to go to the cloud, mqtt FX debugging
Koltin35, headline Android interview algorithm
事务方法调用@Transactional
Practice and Thinking on the architecture of a set of 100000 TPS im integrated message system
[introduction] approximate value
Li Kou daily question - day 31 -1790 Can a string exchange be performed only once to make two strings equal
On June 30, 2022, the record of provincial competition + national competition of Bluebridge
Provincial election + noi Part III tree problems
【入门】提取不重复的整数
7-26 word length (input and output in the loop)
Anddroid 文本合成语音TTS实现
【Redis】一气呵成,带你了解Redis安装与连接
How to check ad user information?
php laravel微信支付
slice扩容机制分析
Teach you how to apply for domestic trademark online step by step
Airsim radar camera fusion to generate color point cloud
![[untitled]](/img/be/3523d0c14d555b293673af2b6fbcff.jpg)



![[introduction] approximate value](/img/6b/597178d848dd21110f36601fc31092.png)

![[batch dos-cmd command - summary and summary] - Common operators in the CMD window (<, < <, & <,>, > >, & >, & >, & &, ||, (),;, @)](/img/48/de19e8cc007b93a027a906d4d423b2.png)
