Face Recognition System

ABSTRACT

A face recognition system is provided. The face recognition system includes an electronic device and terminal server. The electronic device comprising: a camera, exposed outside the electronic device; and a scanning unit, scanning a user face through the camera to obtain a user face feature data. The terminal server communicated with the electronic device, comprising: a two-dimensional code generation unit, generating a user two-dimensional code according to the user face feature data; a two-dimensional code database, comprising a plurality of member two-dimensional codes; and a comparison unit, comparing the user two-dimensional code with each of the member two-dimensional codes.

FIELD OF THE INVENTION

The present disclosure relates to face recognition, in particular, a face recognition system using two-dimensional code and two-dimensional code for comparison.

BACKGROUND OF THE INVENTION

Face recognition refers to a technology that uses inherent face features to automatically perform personal identification and recognition through a computer. First, we will use a camera to capture photos of the face and perform various processing on the face to record the face features in the database. When this person is recognized and verified in the future, we will compare the face feature data from the database with the face feature data retrieved from the field for comparison. When the degree of similarity between the above two reaches a certain threshold, we may recognize or identify this person.

Therefore, face recognition can be applied to laptops, without worrying about forgetting the login password, and without worrying about anyone else logging into your computer by any means. A person's face is the only password and can be prevented from being faked to the greatest extent. Further, in addition to face recognition for access control, criminal investigation, railway stations, and airports, it can also be used for hotel services, bank withdrawals, and other services. Our faces will become the keys to access various scenes. However, the above face recognition method still has security loopholes. For example, if the database is hacked, leading to the theft of face feature data, it will pose a great threat to personal privacy and property security.

Thus, how to design a face recognition system that can prevent security loopholes is that those skilled in the art are worth thinking about.

SUMMARY OF THE INVENTION

In order to solve the above-mentioned problems, the technical scheme adopted by the present invention is as follows.

A face recognition system is provided. The face recognition system includes an electronic device and terminal server. The electronic device comprising: a camera, exposed outside the electronic device; and a scanning unit, scanning a user face through the camera to obtain a user face feature data. The terminal server communicated with the electronic device, comprising: a two-dimensional code generation unit, generating a user two-dimensional code according to the user face feature data; a two-dimensional code database, comprising a plurality of member two-dimensional codes; and a comparison unit, comparing the user two-dimensional code with each of the member two-dimensional codes.

Furthermore, the member two-dimensional code stores a two-dimensional face feature data, and the two-dimensional face feature data is generated by extracting according to a plurality of features of a face image.

Furthermore, the user two-dimensional code is a QR code, a High Capacity Color QR code, or a High Capacity Color Barcode (HCCB).

Furthermore, the member two-dimensional code is a QR code, a High Capacity Color QR code, or a High Capacity Color Barcode (HCCB).

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1A illustrates a view of a face recognition system 10 of the embodiment.

FIG. 1B illustrates a view showing the electronic device 12 scanning a face of a user 8.

FIG. 2A is a schematic diagram of a face image 9.

FIG. 2B is a schematic diagram of the two-dimensional face feature data 134D of the facial image 9.

FIG. 2C illustrates a view showing converting the primary face image 9 into the member two-dimensional code 132C.

DESCRIPTION OF THE PREFERRED EMBODIMENTS

The following invention provides many different embodiments, or examples, for implementing different features of the provided subject matter. Specific examples of components and arrangements are described below to simplify the present invention. These are, of course, merely examples and are not intended to be limiting. For example, the formation of a first feature over or on a second feature in the description that follows may include embodiments in which the first and second features are formed in direct contact, and may also include embodiments in which additional features may be formed between the first and second features, such that the first and second features may not be in direct contact. In addition, the present invention may repeat reference numerals and/or letters in the various examples. This repetition is for the purpose of simplicity and clarity and does not in itself dictate a relationship between the various embodiments and/or configurations discussed.

Further, spatially relative terms, such as “beneath,” “below,” “lower,” “above,” “upper” and the like, may be used herein for ease of description to describe one element or feature's relationship to another element(s) or feature(s) as illustrated in the figures. The spatially relative terms are intended to encompass different orientations of the device in use or operation in addition to the orientation depicted in the figures. The apparatus may be otherwise oriented (rotated 90 degrees or at other orientations) and the spatially relative descriptors used herein may likewise be interpreted accordingly.

With reference to FIG. 1A, FIG. 1A illustrates a view of a face recognition system 10 of the embodiment. The face recognition system 10 of the embodiment includes an electronic device 12 and a terminal server 13, wherein the terminal server 13 is a communication-connected electronic device 12; the electronic device 12 is, for example, a smart phone, a tablet computer, a notebook computer, or an upright advertising machine. Among them, the electronic device 12 includes a camera 120 and a scanning unit 121, and the terminal server 13 includes a two-dimensional code generation unit 131, a two-dimensional code database 132 and a comparison unit 133.

With reference to FIG. 1B, FIG. 1B illustrates a view showing the electronic device 12 scanning a face of a user 8. The camera 120 is exposed outside the electronic device, and the scanning unit scans a face of a user 8 through the camera 120 to obtain a user face feature data 121D. In detail, the face of the user 8 has a plurality of different features, each feature has its own position coordinates, and these position coordinates belong to the user face feature data 121D of the user 8.

With continuous reference to FIG. 1A, the two-dimensional code generation unit 131 forms a user two-dimensional code 131C according to the user face feature data so the user two-dimensional code 131C belongs to an encrypted personalized identification (ID). In detail, the position coordinates of the plurality of features of the face of the user 8 are stored in the user two-dimensional code 131C. In this way, since the user two-dimensional code 131C is transformed from the features of the face of the user 8, the user two-dimensional code 131C also retains the uniqueness and recognizability of the face of the user 8.

Further, the two-dimensional code database includes a plurality of member two-dimensional codes 132C. The generation method of the member two-dimensional codes 132C is described as follows:

First, a plurality of features are extracted through a face image 9 (see FIG. 2A) to generate a two-dimensional face feature data 134D. In detail, the face image 9 is usually a photo of a member of the system or an image of a member's face, and the face image 9 is characterized by the pupils of both eyes and the corners of the lips (see FIG. 2B), wherein the coordinates of the two eyes are (2.8, 9) and (8, 9), and the coordinates of the corners of the face are (3, 3.2) and (8.5, 3), which all belong to the two-dimensional face feature data 134D of the face image 9.

Next, with continuous reference to FIG. 1A and also FIG. 2C (FIG. 2C illustrates a view showing converting the primary face image 9 into the member two-dimensional code 132C), the two-dimensional code generation unit 131 forms one of the member two-dimensional codes 132C according to the two-dimensional face feature data 134D. Since the member two-dimensional code 132C is transformed from the features of the face of the member, the member two-dimensional code 132C also retains the uniqueness and recognizability of the face of the member. Thus, the member two-dimensional code 132C is also an encrypted personalized ID.

In addition, the comparison unit links the two-dimensional code generation unit 131 with the two-dimensional code database 132, and the comparison unit is configured to compare the user two-dimensional code 131C with each of the member two-dimensional codes 132C. Among them, when the user two-dimensional code 131C is similar to one of the member two-dimensional codes 132C to a certain threshold or completely the same, the user 8 may be authenticated as a member of the system. Therefore, compared with the known face recognition method, a photo uploaded by a member of this system (face image 9) will be converted into an identification symbol (in the form of two-dimensional code), and the terminal server 13 of this system may not save the photo and the two-dimensional face feature data 134D of the member, so the photo and two-dimensional face feature data 134D of this member may not be stolen by anyone with interest.

Moreover, if the terminal server 13 of this system is hacked, leading to theft of the user two-dimensional code 131C and the member two-dimensional code 132C, the user two-dimensional code 131C may not be restored to the image of the face of the user 8 and also the member two-dimensional code 132C may not be restored to the face image 9. Thus, this system may effectively prevent security loopholes and prevent theft of face feature data.

In above description, the user two-dimensional code 131C or the member two-dimensional code 132C is, for example, a QR code, a High Capacity Color QR code, or a High Capacity Color Barcode (HCCB).

In summary, this system uses two-dimensional code to compare with two-dimensional code, instead of using face feature data to compare with face feature data, so this system may effectively prevent security loopholes and prevent theft of face feature data.

The above embodiments are merely examples for convenience of description. Although arbitrarily modified by those skilled in the art, these will not depart from the scope of protection as claimed in the claims. 

What is claimed is:
 1. A face recognition system, comprising: an electronic device, comprising: a camera, exposed outside the electronic device; and a scanning unit, scanning a user face through the camera to obtain a user face feature data; and a terminal server, communicated with the electronic device, comprising: a two-dimensional code generation unit, generating a user two-dimensional code according to the user face feature data; a two-dimensional code database, comprising a plurality of member two-dimensional codes; and a comparison unit, comparing the user two-dimensional code with each of the member two-dimensional codes.
 2. The face recognition system according to claim 1, wherein the member two-dimensional code stores a two-dimensional face feature data, and the two-dimensional face feature data is generated by extracting according to a plurality of features of a face image.
 3. The face recognition system according to claim 1, wherein the user two-dimensional code is a QR code, a High Capacity Color QR code, or a High Capacity Color Barcode (HCCB).
 4. The face recognition system according to claim 1, wherein the member two-dimensional code is a QR code, a High Capacity Color QR code, or a High Capacity Color Barcode (HCCB).
 5. The face recognition system according to claim 1, wherein the electronic device is a smart phone, a tablet computer, a notebook computer, or an upright advertising machine. 