CN117975610A - Identity recognition method and system based on linkage of two tickets and entrance guard of wind power plant - Google Patents

Identity recognition method and system based on linkage of two tickets and entrance guard of wind power plant Download PDF

Info

Publication number
CN117975610A
CN117975610A CN202410389631.0A CN202410389631A CN117975610A CN 117975610 A CN117975610 A CN 117975610A CN 202410389631 A CN202410389631 A CN 202410389631A CN 117975610 A CN117975610 A CN 117975610A
Authority
CN
China
Prior art keywords
face
data
images
feature
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410389631.0A
Other languages
Chinese (zh)
Inventor
张子勤
曾桉
姚万灿
周卿
席志刚
陆志繁
周琅
钟舒婷
叶昌荣
张振翔
谢杨
齐江波
习伯泉
谢鸿慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangxi United Energy Co ltd
Original Assignee
Jiangxi United Energy Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangxi United Energy Co ltd filed Critical Jiangxi United Energy Co ltd
Priority to CN202410389631.0A priority Critical patent/CN117975610A/en
Publication of CN117975610A publication Critical patent/CN117975610A/en
Pending legal-status Critical Current

Links

Landscapes

  • Collating Specific Patterns (AREA)

Abstract

The invention provides an identity recognition method and system based on linkage of two tickets and an entrance guard of a wind power plant, wherein the method comprises the steps of disassembling a target video frame by frame; performing target detection and screening on a plurality of disassembled images; extracting face features of a plurality of target images; encrypting and transmitting the face characteristic data to a cloud end, and decrypting and verifying the encrypted face characteristic data; if the face recognition result is that the identity verification is passed, indexing is carried out in a two-ticket database in a corresponding time period, if the corresponding two-ticket data are existed, the access control equipment is controlled to be in an open state, if the corresponding two-ticket data are not existed or the face recognition result is that the identity verification is not passed, the access control equipment is controlled to be in a closed state.

Description

Identity recognition method and system based on linkage of two tickets and entrance guard of wind power plant
Technical Field
The invention belongs to the technical field of identity recognition, and particularly relates to an identity recognition method and system based on linkage of two tickets and an entrance guard of a wind power plant.
Background
The wind power plant generally adopts a two-ticket (working ticket and operation ticket) system as a management and control means to manage on-site operation and maintenance personnel, guides and supervises the safe and compliant execution of related operation and maintenance operations of the operation and maintenance personnel, corresponds to actual operation and maintenance operations of the wind power plant, and operators generally check that the two tickets enter the wind power plant to carry out the operation and maintenance operations by means of manual inspection, but the management is easy to cause negligence, thereby influencing the operation safety, and the operation personnel identity is also identified in the prior art by adopting a face identification mode, but the risk is easy to exist, meanwhile, the existing face identification precision is not high, the operation personnel identity cannot be effectively identified, and the wind power plant operation has great hidden trouble.
Disclosure of Invention
In order to solve the technical problems, the invention provides an identity recognition method and system based on linkage of two tickets and an entrance guard of a wind power plant, which are used for solving the technical problems in the prior art.
In one aspect, the invention provides the following technical scheme, namely an identity recognition method based on linkage of two tickets and an entrance guard of a wind power plant, which comprises the following steps:
Acquiring a target video in real time through access control equipment, and disassembling the target video frame by frame to obtain a plurality of continuous single-frame disassembled images;
Performing target detection and screening on a plurality of disassembled images to obtain a plurality of target images;
extracting facial features of a plurality of target images to obtain facial feature data;
The access control equipment is controlled to encrypt and transmit the face feature data to the cloud, and the encrypted face feature data is decrypted and authenticated through the cloud to output a face recognition result;
and if the face recognition result is that the identity verification passes, indexing the face recognition result in a two-ticket database in a corresponding time period, if the two-ticket data corresponding to the face recognition result exists, controlling the access control equipment to be in an open state, and if the two-ticket data corresponding to the face recognition result does not exist or the face recognition result is that the identity verification does not pass, controlling the access control equipment to be in a closed state.
Compared with the prior art, the invention has the beneficial effects that: firstly, acquiring a target video in real time through access control equipment, and disassembling the target video frame by frame to obtain a plurality of continuous single-frame disassembled images; then carrying out target detection and screening on a plurality of disassembled images to obtain a plurality of target images; then extracting face features of a plurality of target images to obtain face feature data; then controlling the access control equipment to encrypt and transmit the face feature data to a cloud end, and decrypting and verifying the encrypted face feature data through the cloud end to output a face recognition result; finally, if the face recognition result is that the identity verification passes, indexing is carried out in a two-ticket database in a corresponding time period based on the face recognition result, if two-ticket data corresponding to the face recognition result exists, the entrance guard equipment is controlled to be in an open state, if the two-ticket data corresponding to the face recognition result does not exist or the face recognition result is that the identity verification does not pass, the entrance guard equipment is controlled to be in a closed state.
Preferably, the step of performing object detection and screening on the plurality of disassembled images to obtain a plurality of object images includes:
Sequentially storing a plurality of disassembled images into a disassembled image set, selecting a first frame of disassembled image in the disassembled image set, and carrying out pixel point selection on any pixel point in the first frame of disassembled image Sampling the neighborhood points to obtain a background pixel point set/>
In the method, in the process of the invention,Is pixel/>Pixel points obtained by random sampling in 8 neighborhood of (1)/>The number of the pixels in the background pixel set;
Based on the background pixel point set Determining a first judgment threshold/>
In the method, in the process of the invention,Is a first threshold,/>Is a second threshold,/>Is an adjustment factor;
Calculating pixel points And the background pixel point set/>Color difference between middle pixels/>
In the method, in the process of the invention,、/>、/>Pixel dot/>, respectivelyRGB three channel component values,/>、/>、/>Respectively background pixel point set/>RGB three channel component values for the middle pixel point;
based on the first judgment threshold value And the color difference/>Judging pixel points/>And outputting a plurality of foreground images which are background points or foreground points based on the judging result, and performing target differential processing based on the plurality of foreground images to obtain a plurality of target images.
Preferably, the first judgment threshold valueAnd the color difference/>Judging pixel points/>Outputting a plurality of foreground images for background points or foreground points based on a judging result, and performing target differential processing based on the plurality of foreground images to obtain a plurality of target images, wherein the step of obtaining the plurality of target images comprises the following steps of:
if the pixel points And the background pixel point set/>The absolute value of the difference value between the middle pixel points is smaller than a first judgment threshold value/>And color difference/>Less than the color threshold, the pixel/>For background spots, if the pixel spots/>And the background pixel point set/>The absolute value of the difference value between the middle pixel points is not less than a first judgment threshold value/>And/or color difference/>Not less than the color threshold, the pixel/>Is a foreground point;
performing frame-by-frame iterative updating of the background pixel point set on the images in the disassembled image set based on the output background points so as to output a plurality of foreground images;
extracting foreground images of three adjacent frames and respectively performing differential processing to obtain a first differential image and a second differential image;
Binarizing the first differential image and the second differential image and reserving a common part of the first differential image and the second differential image to output an undetermined target image;
And sequentially performing contour filling and corrosion operation on the target images to be determined to output a plurality of positioning target images, calculating the image areas of the positioning target images, storing the positioning target images with the image areas larger than the preset area into a positioning target image set, and screening out disassembled images corresponding to the images in the positioning target image set in the disassembled image set to obtain a plurality of target images.
Preferably, the step of extracting facial features from the plurality of target images to obtain facial feature data includes:
Storing a plurality of target images into a target image set, dividing the target image set into M face image sets, wherein each face image set comprises M images;
calculating a sample mean sequence of the target image set
In the method, in the process of the invention,For the mth image in the mth face image set,/>Is the total sample mean value,/>Is the Mth face image set;
based on the sample mean sequence Determination of the Nuclear transformation matrix/>
In the method, in the process of the invention,For nuclear transformation matrix/>First/>Line/>Column element,/>、/>Sample mean sequences/>, respectivelyMiddle/>Person, 5/>One-dimensional vector,/>Is a nuclear parameter;
For the nuclear transformation matrix And sequentially carrying out centering treatment and feature solving, and determining a feature matrix based on a solving result to obtain face feature data.
Preferably, the pair of the nuclear transformation matricesSequentially carrying out centering processing and feature solving, and determining a feature matrix based on a solving result to obtain face feature data, wherein the step of obtaining the face feature data comprises the following steps:
For the nuclear transformation matrix Performing centering treatment to obtain a treatment matrix/>
In the method, in the process of the invention,For centering matrices,/>Processing the size for centering;
For the processing matrix Feature vector/>And eigenvalues/>Solving:
in the method, in the process of the invention, For/>An order orthogonal matrix;
The characteristic value is set Performing descending process to obtain descending feature sequences, selecting the first M feature values in the descending feature sequences to obtain screening feature sequences, and calculating feature matrix/>, based on the screening feature sequencesTo obtain face feature data:
,/>
in the method, in the process of the invention, To screen the Mth eigenvalue in the eigenvalue,/>For the/>, in descending order of characteristic sequencesAnd characteristic values.
Preferably, the step of controlling the access control device to encrypt and transmit the face feature data to the cloud, and decrypting and verifying the encrypted face feature data through the cloud to output a face recognition result includes:
Controlling the access control equipment to perform binarization processing on the face feature data to obtain binarization feature numbers;
encrypting the binarized feature number through the access control equipment to obtain first encrypted data And second encrypted data/>
;/>
In the method, in the process of the invention,Is a public key/>Is a random number,/>、/>Index of 0 and 1 in the binarization feature number;
controlling the access control equipment to encrypt the first encrypted data And second encrypted data/>Sending to the cloud, and carrying out/>, on the first encrypted dataSaid second encrypted data/>Performing distance calculation to obtain distance ciphertext/>
In the method, in the process of the invention,Is Haiming distance,/>Is the number of 1 in the binarized feature number,/>For ciphertext multiplication operation,/>For ciphertext division operation,/>A public key encryption process;
For the distance ciphertext And sequentially performing adjustment and decryption processing to obtain decryption data, and searching in a face database based on the decryption data to output a face recognition result.
Preferably, the pair of distance ciphertextsSequentially performing adjustment and decryption processing to obtain decrypted data, and searching in a face database based on the decrypted data to output a face recognition result, wherein the step of outputting the face recognition result comprises the following steps:
Controlling the cloud to generate random coefficients Based on the random coefficient/>And processing threshold/>For the distance ciphertextPerforming adjustment processing to obtain adjustment ciphertext/>
For the adjustment ciphertextPerforming decryption processing to obtain decrypted data/>
In the method, in the process of the invention,For decrypting functions,/>Is a private key;
Decrypting the data And carrying out data recovery to obtain recovered face data, searching whether the face data corresponding to the recovered face data exists in a face database, if the face data corresponding to the recovered face data exists in the face database, passing the identity verification, and if the face data corresponding to the recovered face data does not exist in the face database, not passing the identity verification.
In a second aspect, the present invention provides the following technical solutions, and an identification system based on linkage of two tickets and an entrance guard in a wind farm, where the system includes:
The processing module is used for acquiring a target video in real time through access control equipment, and disassembling the target video frame by frame to obtain a plurality of continuous single-frame disassembled images;
The detection module is used for carrying out target detection and screening on the plurality of disassembled images so as to obtain a plurality of target images;
the extraction module is used for extracting facial features of a plurality of target images to obtain facial feature data;
The security module is used for controlling the access control equipment to encrypt and transmit the face characteristic data to the cloud, and decrypting and verifying the encrypted face characteristic data through the cloud so as to output a face recognition result;
And the access control module is used for indexing in a two-ticket database in a corresponding time period based on the face recognition result if the face recognition result is that the identity verification passes, controlling the access control equipment to be in an open state if the two-ticket data corresponding to the face recognition result exists, and controlling the access control equipment to be in a closed state if the two-ticket data corresponding to the face recognition result does not exist or the face recognition result is that the identity verification does not pass.
In a third aspect, the present invention provides a computer, including a memory, a processor, and a computer program stored in the memory and capable of running on the processor, where the processor implements the above-mentioned identification method based on linkage of two tickets and an entrance guard of a wind farm when executing the computer program.
In a fourth aspect, the present invention provides a storage medium, where a computer program is stored on the storage medium, and when the computer program is executed by a processor, the method for identifying an identity based on linkage between two tickets and an entrance guard in a wind farm is implemented.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the embodiments or the description of the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings can be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flowchart of an identification method based on linkage of two tickets and an entrance guard in a wind farm according to a first embodiment of the present invention;
FIG. 2 is a block diagram of a system for identifying identities based on linkage of two tickets and an entrance guard in a wind farm according to a second embodiment of the present invention;
fig. 3 is a schematic hardware structure of a computer according to another embodiment of the invention.
Embodiments of the present invention will be further described below with reference to the accompanying drawings.
Detailed Description
Embodiments of the present invention are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are exemplary and intended to illustrate embodiments of the invention and should not be construed as limiting the invention.
In the description of the embodiments of the present invention, it should be understood that the terms "length," "width," "upper," "lower," "front," "rear," "left," "right," "vertical," "horizontal," "top," "bottom," "inner," "outer," and the like indicate orientations or positional relationships based on the orientation or positional relationships shown in the drawings, merely to facilitate description of the embodiments of the present invention and simplify description, and do not indicate or imply that the devices or elements referred to must have a specific orientation, be configured and operated in a specific orientation, and thus should not be construed as limiting the present invention.
Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more such feature. In the description of the embodiments of the present invention, the meaning of "plurality" is two or more, unless explicitly defined otherwise.
In the embodiments of the present invention, unless explicitly specified and limited otherwise, the terms "mounted," "connected," "secured" and the like are to be construed broadly and include, for example, either permanently connected, removably connected, or integrally formed; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communicated with the inside of two elements or the interaction relationship of the two elements. The specific meaning of the above terms in the embodiments of the present invention will be understood by those of ordinary skill in the art according to specific circumstances.
Example 1
In a first embodiment of the present invention, as shown in fig. 1, an identification method based on linkage of two tickets and an entrance guard in a wind farm includes:
S1, acquiring a target video in real time through access control equipment, and disassembling the target video frame by frame to obtain a plurality of continuous single-frame disassembled images;
Specifically, a video acquisition device can be installed on the access control device, a target video is acquired through the video acquisition device according to a preset time interval, and then the target video is subjected to frame-by-frame differential processing according to the frame number, so that a plurality of continuous single-frame disassembled images can be obtained.
S2, carrying out target detection and screening on a plurality of disassembled images to obtain a plurality of target images;
Specifically, the step S2 includes:
s21, sequentially storing a plurality of disassembled images into a disassembled image set, selecting a first frame of disassembled image in the disassembled image set, and carrying out pixel point selection on any pixel point in the first frame of disassembled image Sampling the neighborhood points to obtain a background pixel point set/>
In the method, in the process of the invention,Is pixel/>Pixel points obtained by random sampling in 8 neighborhood of (1)/>The number of the pixels in the background pixel set;
specifically, in this step, for any pixel in the disassembled image, the pixel point can be randomly sampled in the 8 neighborhood range, and in this embodiment, the sampling number is 20, namely 20.
S22, based on the background pixel point setDetermining a first judgment threshold/>
In the method, in the process of the invention,Is a first threshold,/>Is a second threshold,/>Is an adjustment factor;
Specifically, a first judgment threshold value The method can be used for judging whether the pixel point is a foreground point or a background point, wherein the foreground point is the pixel point of the target object in the image, and in the embodiment, the first threshold value is 20, and the second threshold value is 40.
S23, calculating pixel pointsAnd the background pixel point set/>Color difference between middle pixels/>
In the method, in the process of the invention,、/>、/>Pixel dot/>, respectivelyRGB three channel component values,/>、/>、/>Respectively background pixel point set/>RGB three channel component values for the middle pixel point;
Specifically, the color difference value is a color distortion degree, which can be used to determine the matching degree between the current pixel point and the pixels in the background pixel point set.
S24, based on the first judgment threshold valueAnd the color difference/>Judging pixel points/>Outputting a plurality of foreground images for background points or foreground points based on a judging result, and performing target differential processing based on the plurality of foreground images to obtain a plurality of target images;
Wherein, the step S24 includes:
s241, if pixel point And the background pixel point set/>The absolute value of the difference value between the middle pixel points is smaller than a first judgment threshold value/>And color difference/>Less than the color threshold, the pixel/>For background spots, if the pixel spots/>And the background pixel point set/>The absolute value of the difference value between the middle pixel points is not less than a first judgment threshold value/>And/or color difference/>Not less than the color threshold, the pixel/>Is a foreground point;
specifically, the absolute value of the difference here is specifically the pixel point And the background pixel point set/>And obtaining the difference value between the middle pixel points, and then carrying out absolute value taking processing on the difference value to obtain the absolute value of the difference value.
S242, carrying out frame-by-frame iterative updating on the background pixel point set on the images in the disassembled image set based on the output background points so as to output a plurality of foreground images;
specifically, after the foreground point and the background point in the first frame image are determined, the background point obtained in the first frame is compared with the background pixel point set Adding update, and then updating the obtained background pixel point set/>The process is repeated until all the images of the second frame pass through the processes of the steps S21-S23 and S241 until a plurality of foreground images are output, and the foreground images output through the steps can avoid the situation of ghosting.
S243, extracting foreground images of three adjacent frames and respectively performing differential processing to obtain a first differential image and a second differential image.
S244, binarizing the first differential image and the second differential image and reserving a common part of the first differential image and the second differential image to output a pending target image.
Specifically, the above steps S243 and S244 are specifically three-frame differential algorithm, so that the image of the undetermined target with the moving target can be extracted rapidly.
S245, sequentially performing contour filling and corrosion operation on the to-be-determined target images to output a plurality of positioning target images, calculating the image areas of the positioning target images, storing the positioning target images with the image areas larger than a preset area in a positioning target image set, and screening out disassembled images corresponding to the images in the positioning target image set in the disassembled image set to obtain a plurality of target images;
specifically, contour filling and corrosion operations are sequentially performed on the to-be-determined target images, so that corresponding targets can be screened out, but in a practical situation, an operator may possibly go to the access control device from a distance, and for the image of the operator at the distance, the area of the image of the face is smaller, so that in a subsequent feature extraction process, features are difficult to extract, the preset area of each positioning target image is 15% of the area of an original dismantling image, and then the original dismantling image is extracted according to the frame number corresponding to the selected positioning target image set, so that a plurality of target images can be obtained.
S3, extracting face features of the target images to obtain face feature data;
Wherein, the step S3 includes:
s31, storing a plurality of target images into a target image set, dividing the target image set into M face image sets, wherein each face image set comprises M images.
S32, calculating a sample mean value sequence of the target image set
In the method, in the process of the invention,For the mth image in the mth face image set,/>Is the total sample mean value,/>Is the Mth face image set;
Specifically, for sample mean sequences Can be seen as a combination of several one-dimensional vectors.
S33, based on the sample mean value sequenceDetermination of the Nuclear transformation matrix/>
In the method, in the process of the invention,For nuclear transformation matrix/>First/>Line/>Column element,/>、/>Sample mean sequences/>, respectivelyMiddle/>Person, 5/>One-dimensional vector,/>Is a nuclear parameter;
specifically, the kernel transformation matrix herein employs radial basis functions.
S34, performing kernel transformation on the kernel transformation matrixSequentially carrying out centering treatment and feature solving, and determining a feature matrix based on a solving result to obtain face feature data;
Wherein, the step S34 includes:
S341, converting the kernel transformation matrix Performing centering treatment to obtain a treatment matrix/>
In the method, in the process of the invention,For centering matrices,/>The size is processed for centralization.
S342, for the processing matrixFeature vector/>And eigenvalues/>Solving:
in the method, in the process of the invention, For/>An order orthogonal matrix.
S343, the characteristic value is processedPerforming descending process to obtain descending feature sequences, selecting the first M feature values in the descending feature sequences to obtain screening feature sequences, and calculating feature matrix/>, based on the screening feature sequencesTo obtain face feature data:
,/>
in the method, in the process of the invention, To screen the Mth eigenvalue in the eigenvalue,/>For the/>, in descending order of characteristic sequencesA characteristic value;
Specifically, after orthogonal transformation, a plurality of characteristic values can be obtained, and then the characteristics are sequentially arranged from large to small, so that a descending order characteristic sequence can be obtained Wherein/>,/>Is far larger than a symbol, and then the first M characteristic values are selected from the descending order characteristic sequences and combined to obtain a screening characteristic sequence/>The feature matrix can be obtained by calculation according to the screening feature sequence, and can be used as face feature data, the feature matrix obtained by calculation can ensure the feature information of the image, greatly reduce the dimension, reduce the difficulty and improve the recognition precision.
S4, controlling the access control equipment to encrypt and transmit the face feature data to the cloud, decrypting and verifying the encrypted face feature data through the cloud so as to output a face recognition result;
Wherein, the step S4 includes:
s41, controlling the access control equipment to perform binarization processing on the face feature data to obtain binarization feature numbers;
specifically, the binarization processing is specifically that feature data larger than 0 is set as 1, and the rest data is set as 0, so that the binarization feature number can be obtained in sequence.
S42, encrypting the binarized feature number through the access control equipment to obtain first encrypted dataAnd second encrypted data/>
;/>
In the method, in the process of the invention,Is a public key/>Is a random number,/>、/>Index of 0 and 1 in the binarization feature number;
in particular, the encryption algorithm here is in particular the Paillier cryptographic algorithm, and among others Satisfy the following requirements,/>Wherein/>Is the private key in the subsequent step,/>Is a decryption function, and/>,/>Respectively two independent large prime numbers,/>For maximum common divisor operation,/>And (5) calculating the least common multiple.
S43, controlling the access control equipment to encrypt the first encrypted dataAnd second encrypted data/>Sending to the cloud, and carrying out/>, on the first encrypted dataSaid second encrypted data/>Performing distance calculation to obtain distance ciphertext
In the method, in the process of the invention,Is Haiming distance,/>Is the number of 1 in the binarized feature number,/>For ciphertext multiplication operation,/>For ciphertext division operation,/>Is a public key encryption process.
Specifically, the public key encryption process in this step S42 is the encryption process.
S44, for the distance ciphertextSequentially performing adjustment and decryption processing to obtain decryption data, and searching in a face database based on the decryption data to output a face recognition result;
Wherein, the step S44 includes:
S441, controlling the cloud to generate random coefficients Based on the random coefficient/>And processing threshold/>For the distance ciphertext/>Performing adjustment processing to obtain adjustment ciphertext/>
Specifically, in this step, the random coefficient and the processing threshold are both data after binarization processing, and the encrypted hamming distance and the encrypted processing threshold are multiplied by a random coefficient respectively, then the hamming distance with the coefficient is added with a sign bit 1, the sign of the processing threshold is 0, and then subtraction operation is performed to obtain the adjustment ciphertext.
S442, adjusting ciphertextPerforming decryption processing to obtain decrypted data/>
In the method, in the process of the invention,For decrypting functions,/>Is a private key;
Specifically, the adjustment ciphertext is decrypted, and decrypted data can be obtained.
S443, decrypting the dataPerforming data recovery to obtain recovered face data, searching whether the face data corresponding to the recovered face data exists in a face database, if the face data corresponding to the recovered face data exists in the face database, passing the identity verification, and if the face data corresponding to the recovered face data does not exist in the face database, failing the identity verification;
Specifically, the face database can be acquired when an employee enters the office, wherein the face database only comprises face data of an operator with authority, decrypted data is restored to feature data, then whether the face data corresponding to the restored face data exists or not is searched in the face database in the cloud server, the searching process can be a similarity calculation process, the identity verification is passed through by calculating the similarity between the restored face data and each face data in the face database one by one, namely, the face with the similarity larger than a similarity threshold value is used as a recognition result, namely, the face database has data corresponding to the restored face data, the similarity threshold value is more than 95%, if the similarity between the restored face data and each face data in the face database is not larger than the similarity threshold value, the face database is considered to have no data corresponding to the restored face data, and therefore, if the face data corresponding to the restored face data does not exist in the face database, the identity verification is passed if the face data corresponding to the restored face data does not exist in the face database.
S5, if the face recognition result is that the identity verification passes, indexing is carried out in a two-ticket database in a corresponding time period based on the face recognition result, if the two-ticket data corresponding to the face recognition result exists, the access control equipment is controlled to be in an open state, and if the two-ticket data corresponding to the face recognition result does not exist or the face recognition result is that the identity verification does not pass, the access control equipment is controlled to be in a closed state;
Specifically, after the authentication is passed, it indicates that the operator is face data existing in the face database, the operator has operation authority, but for the current moment, the operator may not receive two tickets, so the operator should not pass through the access control device at the current moment, and therefore after the authentication is passed, two ticket information of the operator needs to be determined, so it is determined whether the operator has operations such as overhaul, work or maintenance in the time period, if there is two ticket information corresponding to the operator in the corresponding time period, the operator should be allowed to pass through the access control, if the authentication is not passed, the operator is not allowed to pass through the access control, and if the corresponding two ticket data is not retrieved, it is indicated that the operator does not have a corresponding task in the time period, and therefore the operator is not allowed to pass through the access control.
According to the identification method based on the linkage of the two tickets of the wind power plant and the access control, firstly, a target video is obtained in real time through access control equipment, and the target video is disassembled frame by frame to obtain a plurality of continuous single-frame disassembled images; then carrying out target detection and screening on a plurality of disassembled images to obtain a plurality of target images; then extracting face features of a plurality of target images to obtain face feature data; then controlling the access control equipment to encrypt and transmit the face feature data to a cloud end, and decrypting and verifying the encrypted face feature data through the cloud end to output a face recognition result; finally, if the face recognition result is that the identity verification passes, indexing is carried out in a two-ticket database in a corresponding time period based on the face recognition result, if two-ticket data corresponding to the face recognition result exists, the entrance guard equipment is controlled to be in an open state, if the two-ticket data corresponding to the face recognition result does not exist or the face recognition result is that the identity verification does not pass, the entrance guard equipment is controlled to be in a closed state.
Example two
As shown in fig. 2, in a second embodiment of the present invention, there is provided an identification system based on linkage of two tickets and an entrance guard in a wind farm, where the system includes:
The processing module 1 is used for acquiring a target video in real time through access control equipment, and disassembling the target video frame by frame to obtain a plurality of continuous single-frame disassembled images;
the detection module 2 is used for carrying out target detection and screening on a plurality of disassembled images so as to obtain a plurality of target images;
The extraction module 3 is used for extracting facial features of a plurality of target images to obtain facial feature data;
The security module 4 is used for controlling the access control equipment to encrypt and transmit the face feature data to the cloud, and decrypting and verifying the encrypted face feature data through the cloud so as to output a face recognition result;
And the entrance guard control module 5 is used for indexing in a two-ticket database in a corresponding time period based on the face recognition result if the face recognition result is that the identity verification passes, controlling the entrance guard equipment to be in an open state if the two-ticket data corresponding to the face recognition result exists, and controlling the entrance guard equipment to be in a closed state if the two-ticket data corresponding to the face recognition result does not exist or the face recognition result is that the identity verification does not pass.
The detection module 2 includes:
the sampling sub-module is used for sequentially storing a plurality of disassembled images into a disassembled image set, selecting a first frame of disassembled image in the disassembled image set, and carrying out pixel point selection on any pixel point in the first frame of disassembled image Sampling the neighborhood points to obtain a background pixel point set/>
In the method, in the process of the invention,Is pixel/>Pixel points obtained by random sampling in 8 neighborhood of (1)/>The number of the pixels in the background pixel set;
a threshold value determining sub-module for determining a threshold value based on the background pixel point set Determining a first judgment threshold/>
In the method, in the process of the invention,Is a first threshold,/>Is a second threshold,/>Is an adjustment factor;
A difference calculation sub-module for calculating pixel points And the background pixel point set/>Color difference between middle pixels/>
In the method, in the process of the invention,、/>、/>Pixel dot/>, respectivelyRGB three channel component values,/>、/>、/>Respectively background pixel point set/>RGB three channel component values for the middle pixel point;
a difference molecular module for determining a threshold value based on the first determination And the color difference/>Judging pixel points/>And outputting a plurality of foreground images which are background points or foreground points based on the judging result, and performing target differential processing based on the plurality of foreground images to obtain a plurality of target images.
The differential submodule includes:
a background judging unit for judging if the pixel point is And the background pixel point set/>The absolute value of the difference value between the middle pixel points is smaller than a first judgment threshold value/>And color difference/>Less than the color threshold, the pixel/>As background point, if the pixel pointAnd the background pixel point set/>The absolute value of the difference value between the middle pixel points is not less than a first judgment threshold value/>And/or color difference/>Not less than the color threshold, the pixel/>Is a foreground point;
the updating unit is used for carrying out frame-by-frame iterative updating on the image in the disassembled image set based on the output background points so as to output a plurality of foreground images;
the difference unit is used for extracting foreground images of three adjacent frames and respectively carrying out difference processing so as to obtain a first difference image and a second difference image;
A retaining unit, configured to perform binarization processing on the first differential image and the second differential image and retain a common portion of the first differential image and the second differential image, so as to output a target image to be determined;
And the screening unit is used for sequentially carrying out contour filling and corrosion operation on the to-be-determined target images so as to output a plurality of positioning target images, calculating the image areas of the positioning target images, storing the positioning target images with the image areas larger than the preset area into a positioning target image set, and screening out disassembled images corresponding to the images in the positioning target image set in the disassembled image set so as to obtain a plurality of target images.
The extraction module 3 comprises:
the image set determining submodule is used for storing a plurality of target images into a target image set, dividing the target image set into M face image sets, wherein each face image set comprises M images;
A sequence calculation sub-module for calculating a sample mean sequence of the target image set
In the method, in the process of the invention,For the mth image in the mth face image set,/>Is the total sample mean value,/>Is the Mth face image set;
a matrix calculation sub-module for calculating a matrix based on the sample mean sequence Determination of the Nuclear transformation matrix/>
In the method, in the process of the invention,For nuclear transformation matrix/>First/>Line/>Column element,/>、/>Sample mean sequences/>, respectivelyMiddle/>Person, 5/>One-dimensional vector,/>Is a nuclear parameter;
a solving submodule for converting the kernel transformation matrix And sequentially carrying out centering treatment and feature solving, and determining a feature matrix based on a solving result to obtain face feature data.
The solving submodule comprises:
a centralizing unit for converting the nuclear transformation matrix Performing centering treatment to obtain a treatment matrix/>
In the method, in the process of the invention,For centering matrices,/>Processing the size for centering;
A solving unit for processing the matrix Feature vector/>And eigenvalues/>Solving:
in the method, in the process of the invention, For/>An order orthogonal matrix;
A feature matrix unit for combining the feature values Performing descending process to obtain descending feature sequences, selecting the first M feature values in the descending feature sequences to obtain screening feature sequences, and calculating feature matrix/>, based on the screening feature sequencesTo obtain face feature data:
,/>
in the method, in the process of the invention, To screen the Mth eigenvalue in the eigenvalue,/>For the/>, in descending order of characteristic sequencesAnd characteristic values.
The security module 4 comprises:
the binarization sub-module is used for controlling the access control equipment to carry out binarization processing on the face characteristic data so as to obtain binarization characteristic numbers;
the encryption submodule is used for carrying out encryption processing on the binarization feature number through the access control equipment so as to obtain first encrypted data And second encrypted data/>
;/>
In the method, in the process of the invention,Is a public key/>Is a random number,/>、/>Index of 0 and 1 in the binarization feature number;
the distance calculation sub-module is used for controlling the access control equipment to encrypt the first encrypted data And second encrypted dataSending to the cloud, and carrying out/>, on the first encrypted dataSaid second encrypted data/>Performing distance calculation to obtain distance ciphertext/>
In the method, in the process of the invention,Is Haiming distance,/>Is the number of 1 in the binarized feature number,/>For ciphertext multiplication operation,/>For ciphertext division operation,/>A public key encryption process;
A result submodule for obtaining the distance ciphertext And sequentially performing adjustment and decryption processing to obtain decryption data, and searching in a face database based on the decryption data to output a face recognition result.
The result submodule includes:
the adjusting unit is used for controlling the cloud to generate random coefficients Based on the random coefficient/>And processing threshold/>For the distance ciphertext/>Performing adjustment processing to obtain adjustment ciphertext/>
A decryption unit for adjusting the ciphertextPerforming decryption processing to obtain decrypted data/>
In the method, in the process of the invention,For decrypting functions,/>Is a private key;
An identity verification unit for decrypting the data And carrying out data recovery to obtain recovered face data, searching whether the face data corresponding to the recovered face data exists in a face database, if the face data corresponding to the recovered face data exists in the face database, passing the identity verification, and if the face data corresponding to the recovered face data does not exist in the face database, not passing the identity verification.
In other embodiments of the present invention, a computer is provided in the embodiments of the present invention, which includes a memory 102, a processor 101, and a computer program stored in the memory 102 and capable of running on the processor 101, where the processor 101 implements the identification method based on two tickets and gate inhibition linkage of a wind farm as described above when executing the computer program.
In particular, the processor 101 may include a Central Processing Unit (CPU), or an Application SPECIFIC INTEGRATED Circuit (ASIC), or may be configured as one or more integrated circuits that implement embodiments of the present invention.
Memory 102 may include, among other things, mass storage for data or instructions. By way of example, and not limitation, memory 102 may comprise a hard disk drive (HARD DISK DRIVE, abbreviated HDD), a floppy disk drive, a Solid state drive (Solid STATE DRIVE, abbreviated SSD), flash memory, an optical disk, a magneto-optical disk, a magnetic tape, or a universal serial bus (Universal Serial Bus, abbreviated USB) drive, or a combination of two or more of these. Memory 102 may include removable or non-removable (or fixed) media, where appropriate. The memory 102 may be internal or external to the data processing apparatus, where appropriate. In a particular embodiment, the memory 102 is a Non-Volatile (Non-Volatile) memory. In particular embodiments, memory 102 includes Read-Only Memory (ROM) and random access Memory (Random Access Memory, RAM). Where appropriate, the ROM may be a mask-programmed ROM, a programmable ROM (Programmable Read-Only Memory, abbreviated PROM), an erasable PROM (Erasable Programmable Read-Only Memory, abbreviated EPROM), an electrically erasable PROM (ELECTRICALLY ERASABLE PROGRAMMABLE READ-Only Memory, abbreviated EEPROM), an electrically rewritable ROM (ELECTRICALLY ALTERABLE READ-Only Memory, abbreviated EAROM), or a FLASH Memory (FLASH), or a combination of two or more of these. The RAM may be a Static Random-Access Memory (SRAM) or a dynamic Random-Access Memory (Dynamic Random Access Memory DRAM), where the DRAM may be a fast page mode dynamic Random-Access Memory (Fast Page Mode Dynamic Random Access Memory, FPMDRAM), an extended data output dynamic Random-Access Memory (Extended Date Out Dynamic Random Access Memory, EDODRAM), a synchronous dynamic Random-Access Memory (Synchronous Dynamic Random-Access Memory, SDRAM), or the like, as appropriate.
Memory 102 may be used to store or cache various data files that need to be processed and/or communicated, as well as possible computer program instructions for execution by processor 101.
The processor 101 reads and executes the computer program instructions stored in the memory 102 to implement the identification method based on the linkage of the wind farm two tickets and the entrance guard.
In some of these embodiments, the computer may also include a communication interface 103 and a bus 100. As shown in fig. 3, the processor 101, the memory 102, and the communication interface 103 are connected to each other by the bus 100 and perform communication with each other.
The communication interface 103 is used to implement communications between modules, devices, units, and/or units in embodiments of the invention. The communication interface 103 may also enable communication with other components such as: and the external equipment, the image/data acquisition equipment, the database, the external storage, the image/data processing workstation and the like are used for data communication.
Bus 100 includes hardware, software, or both, coupling components of a computer device to each other. Bus 100 includes, but is not limited to, at least one of: data Bus (Data Bus), address Bus (Address Bus), control Bus (Control Bus), expansion Bus (Expansion Bus), local Bus (Local Bus). By way of example, and not limitation, bus 100 may comprise a graphics acceleration interface (ACCELERATED GRAPHICS Port, abbreviated as AGP) or other graphics Bus, an enhanced industry standard architecture (Extended Industry Standard Architecture, abbreviated as EISA) Bus, a Front Side Bus (Front Side Bus, abbreviated as FSB), a HyperTransport (abbreviated as HT) interconnect, an industry standard architecture (Industry Standard Architecture, abbreviated as ISA) Bus, a wireless bandwidth (InfiniBand) interconnect, a Low Pin Count (LPC) Bus, a memory Bus, a micro channel architecture (Micro Channel Architecture, abbreviated as MCA) Bus, a peripheral component interconnect (PERIPHERAL COMPONENT INTERCONNECT, abbreviated as PCI) Bus, a PCI-Express (PCI-X) Bus, a serial advanced technology attachment (SERIAL ADVANCED Technology Attachment, abbreviated as SATA) Bus, a video electronics standards Association local (Video Electronics Standards Association Local Bus, abbreviated as VLB) Bus, or other suitable Bus, or a combination of two or more of these. Bus 100 may include one or more buses, where appropriate. Although embodiments of the invention have been described and illustrated with respect to a particular bus, the invention contemplates any suitable bus or interconnect.
The computer can execute the identification method based on the linkage of the two tickets of the wind power plant and the entrance guard based on the acquired identification system based on the linkage of the two tickets of the wind power plant and the entrance guard, thereby realizing the identification based on the linkage of the two tickets of the wind power plant and the entrance guard.
In still other embodiments of the present invention, in combination with the above-mentioned identification method based on the linkage of two tickets in a wind farm and an entrance guard, the embodiments of the present invention provide the following technical solutions, a storage medium, where a computer program is stored on the storage medium, where the computer program when executed by a processor implements the above-mentioned identification method based on the linkage of two tickets in a wind farm and an entrance guard.
Those of skill in the art will appreciate that the logic and/or steps represented in the flow diagrams or otherwise described herein, e.g., a ordered listing of executable instructions for implementing logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
More specific examples (a non-exhaustive list) of the readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). In addition, the computer readable medium may even be paper or other suitable medium on which the program is printed, as the program may be electronically captured, via, for instance, optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner, if necessary, and then stored in a computer memory.
It is to be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above-described embodiments, the various steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, may be implemented using any one or combination of the following techniques, as is well known in the art: discrete logic circuits having logic gates for implementing logic functions on data signals, application specific integrated circuits having suitable combinational logic gates, programmable Gate Arrays (PGAs), field Programmable Gate Arrays (FPGAs), and the like.
The technical features of the above-described embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above-described embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples illustrate only a few embodiments of the invention, which are described in detail and are not to be construed as limiting the scope of the invention. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the invention, which are all within the scope of the invention. Accordingly, the scope of protection of the present invention is to be determined by the appended claims.

Claims (10)

1. The utility model provides an identity recognition method based on linkage of wind power plant two tickets and entrance guard, which is characterized by comprising the following steps:
Acquiring a target video in real time through access control equipment, and disassembling the target video frame by frame to obtain a plurality of continuous single-frame disassembled images;
Performing target detection and screening on a plurality of disassembled images to obtain a plurality of target images;
extracting facial features of a plurality of target images to obtain facial feature data;
The access control equipment is controlled to encrypt and transmit the face feature data to the cloud, and the encrypted face feature data is decrypted and authenticated through the cloud to output a face recognition result;
and if the face recognition result is that the identity verification passes, indexing the face recognition result in a two-ticket database in a corresponding time period, if the two-ticket data corresponding to the face recognition result exists, controlling the access control equipment to be in an open state, and if the two-ticket data corresponding to the face recognition result does not exist or the face recognition result is that the identity verification does not pass, controlling the access control equipment to be in a closed state.
2. The identification method based on the linkage of two tickets and an entrance guard in a wind farm according to claim 1, wherein the step of performing target detection and screening on the plurality of disassembled images to obtain a plurality of target images comprises:
Sequentially storing a plurality of disassembled images into a disassembled image set, selecting a first frame of disassembled image in the disassembled image set, and carrying out pixel point selection on any pixel point in the first frame of disassembled image Sampling the neighborhood points to obtain a background pixel point set/>
In the method, in the process of the invention,Is pixel/>Pixel points obtained by random sampling in 8 neighborhood of (1)/>The number of the pixels in the background pixel set;
Based on the background pixel point set Determining a first judgment threshold/>
In the method, in the process of the invention,Is a first threshold,/>Is a second threshold,/>Is an adjustment factor;
Calculating pixel points And the background pixel point set/>Color difference between middle pixels/>
In the method, in the process of the invention,、/>、/>Pixel dot/>, respectivelyRGB three channel component values,/>、/>、/>Respectively background pixel point setsRGB three channel component values for the middle pixel point;
based on the first judgment threshold value And the color difference/>Judging pixel points/>And outputting a plurality of foreground images which are background points or foreground points based on the judging result, and performing target differential processing based on the plurality of foreground images to obtain a plurality of target images.
3. The identification method based on the linkage of two tickets and an entrance guard in a wind farm according to claim 2, wherein the identification method is based on the first judgment threshold valueAnd the color difference/>Judging pixel points/>Outputting a plurality of foreground images for background points or foreground points based on a judging result, and performing target differential processing based on the plurality of foreground images to obtain a plurality of target images, wherein the step of obtaining the plurality of target images comprises the following steps of:
if the pixel points And the background pixel point set/>The absolute difference value between the middle pixel points is smaller than a first judgment threshold valueAnd color difference/>Less than the color threshold, the pixel/>For background spots, if the pixel spots/>And the background pixel point setThe absolute value of the difference value between the middle pixel points is not less than a first judgment threshold value/>And/or color difference/>Not less than the color threshold, the pixel/>Is a foreground point;
performing frame-by-frame iterative updating of the background pixel point set on the images in the disassembled image set based on the output background points so as to output a plurality of foreground images;
extracting foreground images of three adjacent frames and respectively performing differential processing to obtain a first differential image and a second differential image;
Binarizing the first differential image and the second differential image and reserving a common part of the first differential image and the second differential image to output an undetermined target image;
And sequentially performing contour filling and corrosion operation on the target images to be determined to output a plurality of positioning target images, calculating the image areas of the positioning target images, storing the positioning target images with the image areas larger than the preset area into a positioning target image set, and screening out disassembled images corresponding to the images in the positioning target image set in the disassembled image set to obtain a plurality of target images.
4. The method for identifying the identity based on the linkage of two tickets and an entrance guard in a wind farm according to claim 1, wherein the step of extracting face features from the plurality of target images to obtain face feature data comprises the following steps:
Storing a plurality of target images into a target image set, dividing the target image set into M face image sets, wherein each face image set comprises M images;
calculating a sample mean sequence of the target image set
In the method, in the process of the invention,For the mth image in the mth face image set,/>Is the total sample mean value,/>Is the Mth face image set;
based on the sample mean sequence Determination of the Nuclear transformation matrix/>
In the method, in the process of the invention,For nuclear transformation matrix/>First/>Line/>Column element,/>、/>Sample mean sequences/>, respectivelyMiddle/>Person, 5/>One-dimensional vector,/>Is a nuclear parameter;
For the nuclear transformation matrix And sequentially carrying out centering treatment and feature solving, and determining a feature matrix based on a solving result to obtain face feature data.
5. The identification method based on two-ticket and entrance guard linkage of a wind farm according to claim 4, wherein the pair of nuclear transformation matricesSequentially carrying out centering processing and feature solving, and determining a feature matrix based on a solving result to obtain face feature data, wherein the step of obtaining the face feature data comprises the following steps:
For the nuclear transformation matrix Performing centering treatment to obtain a treatment matrix/>
In the method, in the process of the invention,For centering matrices,/>Processing the size for centering;
For the processing matrix Feature vector/>And eigenvalues/>Solving:
in the method, in the process of the invention, For/>An order orthogonal matrix;
The characteristic value is set Performing descending process to obtain descending feature sequences, selecting the first M feature values in the descending feature sequences to obtain screening feature sequences, and calculating feature matrix/>, based on the screening feature sequencesTo obtain face feature data:
,/>
in the method, in the process of the invention, To screen the Mth eigenvalue in the eigenvalue,/>For the/>, in descending order of characteristic sequencesAnd characteristic values.
6. The method for identifying the identity based on the linkage of two tickets and an entrance guard in a wind farm according to claim 1, wherein the step of controlling the entrance guard device to encrypt and transmit the face feature data to a cloud terminal, and decrypting and verifying the encrypted face feature data through the cloud terminal to output a face recognition result comprises the following steps:
Controlling the access control equipment to perform binarization processing on the face feature data to obtain binarization feature numbers;
encrypting the binarized feature number through the access control equipment to obtain first encrypted data And second encrypted data/>
;/>
In the method, in the process of the invention,Is a public key/>Is a random number,/>、/>Index of 0 and 1 in the binarization feature number;
controlling the access control equipment to encrypt the first encrypted data And second encrypted data/>Sending to the cloud, and carrying out/>, on the first encrypted dataSaid second encrypted data/>Performing distance calculation to obtain distance ciphertext/>
In the method, in the process of the invention,Is Haiming distance,/>Is the number of 1 in the binarized feature number,/>For ciphertext multiplication operation,/>For ciphertext division operation,/>A public key encryption process;
For the distance ciphertext And sequentially performing adjustment and decryption processing to obtain decryption data, and searching in a face database based on the decryption data to output a face recognition result.
7. The identification method based on the linkage of two tickets and an entrance guard in a wind farm according to claim 6, wherein the distance ciphertext is obtained by the methodSequentially performing adjustment and decryption processing to obtain decrypted data, and searching in a face database based on the decrypted data to output a face recognition result, wherein the step of outputting the face recognition result comprises the following steps:
Controlling the cloud to generate random coefficients Based on the random coefficient/>And processing threshold/>For the distance ciphertextPerforming adjustment processing to obtain adjustment ciphertext/>
For the adjustment ciphertextPerforming decryption processing to obtain decrypted data/>
In the method, in the process of the invention,For decrypting functions,/>Is a private key;
Decrypting the data And carrying out data recovery to obtain recovered face data, searching whether the face data corresponding to the recovered face data exists in a face database, if the face data corresponding to the recovered face data exists in the face database, passing the identity verification, and if the face data corresponding to the recovered face data does not exist in the face database, not passing the identity verification.
8. An identification system based on linkage of two tickets and an entrance guard in a wind power plant, which is characterized by comprising:
The processing module is used for acquiring a target video in real time through access control equipment, and disassembling the target video frame by frame to obtain a plurality of continuous single-frame disassembled images;
The detection module is used for carrying out target detection and screening on the plurality of disassembled images so as to obtain a plurality of target images;
the extraction module is used for extracting facial features of a plurality of target images to obtain facial feature data;
The security module is used for controlling the access control equipment to encrypt and transmit the face characteristic data to the cloud, and decrypting and verifying the encrypted face characteristic data through the cloud so as to output a face recognition result;
And the access control module is used for indexing in a two-ticket database in a corresponding time period based on the face recognition result if the face recognition result is that the identity verification passes, controlling the access control equipment to be in an open state if the two-ticket data corresponding to the face recognition result exists, and controlling the access control equipment to be in a closed state if the two-ticket data corresponding to the face recognition result does not exist or the face recognition result is that the identity verification does not pass.
9. A computer comprising a memory, a processor and a computer program stored on the memory and operable on the processor, wherein the processor when executing the computer program implements the method for identifying identities based on linkage of two tickets and an access portal for a wind farm according to any one of claims 1 to 7.
10. A storage medium, wherein a computer program is stored on the storage medium, and when the computer program is executed by a processor, the method for identifying the identity based on the linkage of two tickets and an entrance guard of a wind farm according to any one of claims 1 to 7 is realized.
CN202410389631.0A 2024-04-02 2024-04-02 Identity recognition method and system based on linkage of two tickets and entrance guard of wind power plant Pending CN117975610A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410389631.0A CN117975610A (en) 2024-04-02 2024-04-02 Identity recognition method and system based on linkage of two tickets and entrance guard of wind power plant

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410389631.0A CN117975610A (en) 2024-04-02 2024-04-02 Identity recognition method and system based on linkage of two tickets and entrance guard of wind power plant

Publications (1)

Publication Number Publication Date
CN117975610A true CN117975610A (en) 2024-05-03

Family

ID=90865010

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410389631.0A Pending CN117975610A (en) 2024-04-02 2024-04-02 Identity recognition method and system based on linkage of two tickets and entrance guard of wind power plant

Country Status (1)

Country Link
CN (1) CN117975610A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180350171A1 (en) * 2017-06-02 2018-12-06 Hospitality Engagement Corporation Method and systems for event entry with facial recognition
CN115565216A (en) * 2022-07-26 2023-01-03 汪磊 Face recognition entrance guard security method and device based on image processing
CN116580490A (en) * 2023-04-03 2023-08-11 蒙东协合开鲁风力发电有限公司 Wind power operation safety detection method and system
CN116612570A (en) * 2023-05-23 2023-08-18 苏州允鸿资通信息科技有限公司 Personnel circulation management system and management method based on intelligent face recognition

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180350171A1 (en) * 2017-06-02 2018-12-06 Hospitality Engagement Corporation Method and systems for event entry with facial recognition
CN115565216A (en) * 2022-07-26 2023-01-03 汪磊 Face recognition entrance guard security method and device based on image processing
CN116580490A (en) * 2023-04-03 2023-08-11 蒙东协合开鲁风力发电有限公司 Wind power operation safety detection method and system
CN116612570A (en) * 2023-05-23 2023-08-18 苏州允鸿资通信息科技有限公司 Personnel circulation management system and management method based on intelligent face recognition

Similar Documents

Publication Publication Date Title
US9961077B2 (en) System and method for biometric authentication with device attestation
CN105450411B (en) The method, apparatus and system of authentication are carried out using card feature
US8103050B2 (en) Method for computing a fingerprint of a video sequence
US9710631B2 (en) Method for enrolling data in a base to protect said data
US9633261B2 (en) Salting system and method for cancelable iris biometric
CN104823203A (en) Biometric template security and key generation
CN111738349B (en) Detection effect evaluation method and device of target detection algorithm, storage medium and equipment
Le et al. An improved algorithm for digital image authentication and forgery localization using demosaicing artifacts
CN113904861B (en) Encryption traffic safety detection method and device
Thai et al. Camera model identification based on DCT coefficient statistics
CN116776386B (en) Cloud service data information security management method and system
CN111932270B (en) Bank customer identity verification method and device
WO2020167655A1 (en) Fixed length fingerprint representation
CN114998080A (en) Face tamper-proof watermark generation method, tamper detection method and attribute detection method
CN113821807A (en) Encryption method and device, decryption method and device and security system of RFID asset information
CN117975610A (en) Identity recognition method and system based on linkage of two tickets and entrance guard of wind power plant
CN116956350A (en) Face authentication method, device, terminal equipment and storage medium
US20100046805A1 (en) Registration-free transforms for cancelable iris biometrics
CN115761837A (en) Face recognition quality detection method, system, device and medium
Nazli et al. Comparison between image forgery detection algorithms
CN111444815B (en) Substation identity authentication method, system, device and computer equipment
CN117708806B (en) Security authentication risk detection method, system, electronic equipment and storage medium
Harmer et al. Direct template-free encryption key generation from palm-veins
Chhikara et al. SBHCS: Spike based Histogram Comparison Steganalysis Technique
Wu et al. Detecting Adversarial Examples Using Rich Residual Models to Improve Data Security in CNN Models

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination