A multi-intelligent terminal shared face secret recognition method based on cloud environment
A recognition method and multi-intelligence technology, applied in the fields of cryptography and computer vision, can solve the problem that cryptographic tools are not efficient, and achieve the effect of protection security, simple process structure, and easy implementation.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0042] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.
[0043] A face detector has a strong classifier of the form:
[0044]
[0045] h n (x) is a threshold function of the type
[0046]
[0047] Among them, y n ∈F L is the threshold function h n (x) hyperplane. h n (x) parameter α n ∈F,β n ∈ F, θ n ∈F is determined during training; N is the number of weak classifiers, n∈(0,N-1).
[0048] The stealth inner product algorithm is described by formula (3), formula (4) and formula (5):
[0049] For the vector set Y=y 1 ,...y n , the third party converts each vector y i , i∈(1,n), decomposed into two vectors {y′ according to the following principle i ,y″ i}: for each y i,j ∈y i , if s j ∈S,s j =1, then y' i,j =y" i,j =y i,j ;otherwise, Among them, r∈R is a random number. Then, use (M 1 , M 2 ) encrypt {y′ i ,y′ A}for The output is:
[0050]
[0051] Among...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com