当前位置:网站首页>To prevent "activation" photos from being muddled through, databao "live detection + face recognition" makes face brushing safer
To prevent "activation" photos from being muddled through, databao "live detection + face recognition" makes face brushing safer
2022-07-01 08:14:00 【? Anita Zhang】
With the development of face recognition technology , More and more commercial applications , Face login 、 Face payment 、 Face lift 、 Face gate, etc , In security 、 Finance 、 education 、 Widely used in medical and other fields , The intelligent and fast face recognition technology has developed rapidly in China .
But face recognition is easy to be photographed 、 video 、 Simulation mold and other ways to muddle through , The public security department has been in Shanghai in recent years 、 Zhejiang 、 anhui 、 Jiangsu and other places found , Several suspect use deep synthesis technology , Illegally stolen or paid for photos and audio “ activation ”、 Synthesize into dynamic video for illegal profit .
“ In vivo detection + Face recognition ” Become a confrontation “ activation ” Photo The key technology
To prevent “ activation ” Your photos muddle through , Data treasure is providing “ Face recognition ” Data service , It provides customers with “ In vivo detection ” Algorithm .
Based on data treasure " In vivo detection " The algorithm can judge the face captured by the camera , Is it a real face or a fake face , Generally, it is used in application scenarios with high security requirements , Can use face recognition + The method of combining living body detection to carry out identity verification , After using in vivo detection , It makes up for the deficiency of single face recognition , Can effectively identify photos 、 video 、 Mask and other fake human faces , Avoid fraud to the greatest extent .
Data treasure as “ Internet +” Trusted authentication platform (CTID platform ) Our first tier partner , Data resources are directly connected to the public security database , After obtaining the user's authorization , By name 、 ID number 、 Portrait photos 、 In vivo detection can verify the authenticity of user identity information in real time . Identity verification as a more secure standard , Data treasure “ Face recognition comparison interface + In vivo detection SDK” The verification process is as follows :
- Portrait information collection
adopt SDK、H5 page 、 Wechat applet and other application scenarios obtain the verified face information 、 ID information , Users upload ID photos , System use certificate OCR Recognition technology automatically extracts information , Users take live video and upload it for comparison and verification .
2. Living determination
By using speech recognition 、 Lip recognition 、 Technologies such as living body judgment automatically detect video , Judge whether you are a real living body and upload the human image in the video with high quality .
3. Public security big data verification
be based on https+MD5 Signature authentication + Symmetric encryption technology will portrait image 、 full name 、 The ID number information is encrypted and transmitted to the interface authorized by the Public Security Bureau , And then automatically connect with the portrait image in the public security big data 、 full name 、 Carry out authoritative comparison and verification of ID number .
4. Output verification results
After the verification of public security big data interface , Return the verification result , If the verification is consistent, it will be approved by default , If not, return to the certification homepage , Let the user re operate .
边栏推荐
猜你喜欢
Erreur de hauteur du clavier souple
谈谈数字化转型的几个关键问题
Access报表实现小计功能
Five combination boxing, solving six difficult problems on campus and escorting the construction of educational informatization
[untitled]
OJ input and output exercise
window c盘满了
P4 安装bmv2 详细教程
Latex formula code
Learn the knowledge you need to know about the communication protocol I2C bus
随机推荐
Aardio - Method of self constructed geticonhandle
Significance and measures of source code encryption
STM32 uses esp01s to go to the cloud, mqtt FX debugging
Provincial election + noi part I dynamic planning DP
How to prevent the other party from saying that he has no money after winning the lawsuit?
The difference between interceptors and filters
Embedded-c language-10-enumeration / (function) pointer (function) / multi-level pointer /malloc dynamic allocation / file operation
Connect timed out of database connection
2022.6.30 省赛+蓝桥国赛记录
Why are some Wills made by husband and wife invalid
Serial port oscilloscope software ns-scope
[website architecture] solve 90% of distributed transactions in one move, and introduce the working principles and application scenarios of database transactions and distributed transactions
Transaction method call @transactional
【入门】截取字符串
Five combination boxing, solving six difficult problems on campus and escorting the construction of educational informatization
slice扩容机制分析
Cmake I two ways to compile source files
軟鍵盤高度報錯
Latex table
使用beef劫持用戶瀏覽器