What Is Face Detection?

Biometrics (biometrics) technology refers to a technology that uses a computer's inherent and unique physiological and behavioral characteristics to identify or verify individuals. Facial authentication based on facial features has the advantages of non-contact, good stability, and difficult to counterfeit, and has become the most acceptable authentication method for people.

Facial authentication design background

With the continuous development of the information society, the electronicization of documents has become the general trend. While electronic documents provide us with convenience, they also bring many security risks due to their easy to copy and difficult to control. In particular, the leakage of confidential electronic documents of important units will bring huge losses to national security. How to securely and efficiently control confidential electronic documents has become an urgent problem. On the one hand, while various organizations have issued corresponding policies, regulations and standards, many products have emerged to ensure the security of electronic documents. However, most products only authenticate users before accessing confidential documents, and no longer perform authentication during the access process, creating blind spots for identity authentication, which makes it difficult for the leaked subject to track down. On the other hand, when the user terminal does not take any security measures, confidential documents are easily cross-propagated between different user terminals, leading to problems such as the loss of control of confidential documents and the expansion of the scope of knowledge.

Facial authentication design

The overall design of the confidential document reader is shown in the figure.
Schematic diagram of the overall design
Secret document reader is a hardware platform for reading secret documents, which realizes authorized reading of secret documents and real-time authentication of user identity. The confidential documents are transmitted unidirectionally to the reader through a dedicated interface.
Confidential document readers achieve reliable access control through facial authentication technology. Face authentication technology captures human faces in real time through a camera and compares the captured face information with a database to achieve identity authentication. Facial authentication consists of two parts: face detection and recognition. Face detection is used to determine and locate the face in the image frame, and face recognition is used to determine whether the detected face is in the face database. The overall process of facial authentication is shown in the figure.
Schematic diagram of facial authentication process
The reader automatically enters the protection mode when there is unauthorized user use, peeping, etc., or when the user looks away from the screen. In combination with eye tracking technology, the reader's eyeballs are detected and calibrated in real time to determine whether the line of sight is on the screen and make corresponding operations. In order to realize one-way data transmission, a special interface circuit is also designed for the reader, and its structure is shown in Figure 3. The dedicated interface is the only interface provided by the reader. The circuit provides USB Device and USB Host interfaces. The USB Device interface is connected to the reader. Users can only import confidential documents to the reader through the USB Host on the circuit.
The main control chip in the dedicated interface circuit implements a read-only mode by filtering the READ_10 and WRITE_10 command processing functions of the SCSI protocol layer, so that the data in the storage carrier can be written into the reader, and the data in the reader can be realized. Unable to write function of storage carrier. [4]

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?