Personalized face biometric key generation method based on deep neural network coding

12056957 ยท 2024-08-06

Assignee

Inventors

Cpc classification

International classification

Abstract

The invention relates to a personalized face biometric key generation method based on deep neural network coding, comprising: preprocessing a face image; converting the preprocessed face image into a feature map with a stability greater than or equal to 80% through a personalized feature extractor Feature_Extraction; outputting a face biometric key with a stability greater than or equal to 99% through a stabilizer Stabilizer; and carrying out error correction with an error correction code on the output biometric key through an error correction coding module and then obtaining a face biometric key with a stability greater than 99.5% through fuzzy extraction by a combined method of error correction code and fuzzy extraction. The finally generated face biometric key has high bit strength and recognition accuracy, can be directly applied to a symmetric cryptographic system and a public key cryptographic system as a key, and satisfies revocability and non-linkability.

Claims

1. A personalized face biometric key generation method based on deep neural network coding, specifically comprising the following steps of: step 1: preprocessing of image: taking a public face data set as a pretraining data set, and preprocessing an image in the face data set; and segmenting a face region from the image, and scaling the segmented face region image to the same size to obtain a face feature map; step 2: pretraining: pretraining the image preprocessed in the step 1 by a deep neural network, wherein the pretrained network is capable of accurately recognizing a face in the pretraining data set; step 3: extraction of personalized feature: converting the face image into a face biometric key with a stability greater than or equal to 80% to improve a learning effect of the image on a stabilizer; step 3.1: construction of deep neural network module Fmap_E based on personalized training: preprocessing a personalized face image set to be trained in the step 1 and then inputting the preprocessed face image set into the pretrained deep neural network in the step 2 for transfer learning; and intercepting a part of the deep neural network after transfer learning to form the deep neural network module Fmap_E based on personalized training for extracting the personalized face feature map; step 3.2: screening of feature map: removing a common feature in feature maps according to all face feature maps, and selecting an exclusive feature in feature maps according to single-type face feature maps, wherein a stability of the feature map subjected to feature point screening is greater than or equal to 60%; and step 3.3: binary quantization: obtaining a single-type face average feature map through a single-type face feature map set, binarizing the single-type face average feature map to obtain a binarization matrix, and processing the single-type face feature map set according to the binarization matrix; and regarding the binarized single-type face average feature map as the face biometric key, wherein a stability of the quantized face biometric key is greater than or equal to 80%; step 4: learning by stabilizer: taking a feature stabilization convolution network with an encoder-decoder structure as the stabilizer, inputting the face biometric key with the stability greater than or equal to 80% output in the step 3 into the stabilizer for stable learning, and outputting a face biometric key with a stability greater than or equal to 99%; and step 5: fuzzy extraction: carrying out error correction with an error correction code on the biometric key output in the step 4 through an error correction coding module and then obtaining a face biometric key with a stability greater than 99.5% through fuzzy extraction by a combined method of error correction coding and fuzzy extraction.

2. The personalized face biometric key generation method based on deep neural network coding according to claim 1, wherein a residual network Resnet in the convolutional neural network is selected as the deep neural network in the step 2.

3. The personalized face biometric key generation method based on deep neural network coding according to claim 1, wherein the step 3.2 comprises global screening and local screening: in the global screening, all feature maps Faces_featuremap are used, and a global feature map all_Fm is obtained by cumulative average of each pixel: all_Fm = .Math. j .Math. i Faces_featuremap i len ( Faces_featuremap ) ; wherein, all_Fm is the global feature map, and len( ) is a number of images in the data set; in the local screening, a local feature map i_Fm is obtained by cumulative average of an i-type face feature map set Face_featuremap.sub.i: i_Fm = .Math. j Faces_featuremap i len ( Faces_featuremap i ) ; wherein, i_Fm is the i-type face local feature map, and len( ) is a number of images in the data set; selection of each feature map Face_featuremap.sub.i.sup.j in the i-type face feature map set Face_featuremap.sub.i simultaneously satisfies |Face_featuremap.sub.i.sup.j?all_Fm|>?.sub.1, a feature point of ??.sub.2? Face_featuremap.sub.i.sup.j?i_Fm??.sub.2 is taken as a preliminary screening point of the feature map, a feature point satisfying the selection requirement is a point m.sub.i(a, b)=1 with corresponding abscissa position a and ordinate position b in a feature point selection matrix m.sub.i, and a feature point not satisfying the selection requirement is a point m.sub.i(a, b)=0; wherein ?.sub.1 and ?.sub.2 are set thresholds; a screened feature map set F_m.sub.i and the feature point selection matrix m.sub.i are obtained after feature point selection; m.sub.i is a binary matrix with the same size as the Face_featuremap.sub.i; and choose( ) is a selection process of the feature point in the Face_featuremap.sub.i, feature point traversal is carried out on each image Face_featuremap.sub.i.sup.j in Face_featuremap.sub.i=[Face_featuremap.sub.i.sup.1, Face_featuremap.sub.i.sup.2,L Face_featuremap.sub.i.sup.n], when m.sub.i(a, b)=1, a feature point F_m.sub.i.sup.j(a,b) is reserved, and when m.sub.i(a, b)=0, a feature point Face_featuremap.sub.i.sup.j(a,b) is discarded; m i = ( 0 1 K 1 0 0 0 L 1 1 M M O M M 1 0 L 0 1 1 1 L 1 0 ) ; and F_m.sub.i=choose(Face_featuremap.sub.i, m.sub.i), wherein choose( ) is a feature point selection operation, F_m.sub.i is an i-type face feature point screening result, Face_featuremap.sub.i is the i-type face feature map set, and m.sub.i is the i-type face feature point selection matrix.

4. The personalized face biometric key generation method based on deep neural network coding according to claim 1, wherein the step 3.3 specifically comprises: carrying out weighted average on the feature map set F_m.sub.i=[F_m.sub.i.sup.1,F_m.sub.i.sup.2,L F_m.sub.i.sup.n] to obtain an average feature map avg i = .Math. j F_m i j len ( F_m i ) first before binary quantization; wherein avg.sub.i is the average feature map of the data set F_m.sub.i of i-type face subjected to feature point screening, and len(F_m.sub.i) is a number of face images in the F_m.sub.i, and carrying out a combined operation of global binarization and local binarization on the avg.sub.i to obtain a preliminary face biometric key B_K.sub.i; obtaining a global threshold T_all.sub.i by a global binarization OTSU method firstly, dividing the avg.sub.i into blocks according to a block size of s?s secondly, calculating an average value and a standard deviation of each block, and when the average value is less than a threshold ?.sub.3 and the standard deviation is less than a threshold ?.sub.4, locally binarizing the block; wherein a Gaussian filter is used to process the block in local binarization, a result of the Gaussian filter is a threshold matrix of the block, which is T.sub.s?s=Gauss filter (avg.sub.is?s), wherein Gauss filter is the Gaussian filter; and when the average value is greater than or equal to the threshold ?.sub.3 and the standard deviation is greater than or equal to the threshold ?.sub.4, binarizing the block with the global threshold T_all.sub.i, wherein the threshold matrix is T.sub.s?s=T_all.sub.i at this time; and traversing the avg.sub.i to obtain a binary threshold matrix T.sub.i, and binarizing the feature map in the F_m.sub.i by using the T.sub.i; and obtaining a to-be-stabilized biometric key b_k.sub.i after binarizing the F_m.sub.i after binary quantization; and calculating avg.sub.i>T.sub.i according to the feature binary threshold matrix T.sub.i, wherein when avg.sub.i(a, b)>T.sub.i(a, b), B_K.sub.i=225, and when avg.sub.i(a, b)?T.sub.i(a, b), B_K.sub.i=0; wherein a and b are an abscissa and an ordinate respectively;
B_K.sub.i=GLBinarization(avg.sub.i,T.sub.i);
b_k.sub.i=GLBinarization(F_m.sub.i,T.sub.i); wherein GLBinarization( ) is a binary quantization operation, and T.sub.i is the i-type face binary threshold matrix.

5. The personalized face biometric key generation method based on deep neural network coding according to claim 1, wherein the stabilizer in the step 4 is a deep neural network Unet with an encoder-decoder structure, a learning matrix W is added on a top layer of the UNet, and the W improves an effect of the stabilizer by learning a relationship between points; and a combination of Binary CrossEntropy and Sigmoid is taken as a loss function Loss=BCE(Sigmoid( ), B_K.sub.i), the to-be-stabilized biometric key b_k.sub.i is taken as an input of the stabilizer, and the preliminary face biometric key B_K.sub.i is taken as a target for learning.

6. The personalized face biometric key generation method based on deep neural network coding according to claim 1, wherein the step 5 specifically comprises: carrying out Reed-solomon error correction, wherein a Reed-solomon encoding process is as follows: the B_K.sub.i is divided into 8 blocks by 512 bits, each block is subjected to an exclusive-or operation of a random binary sequence Random binary sequence.sup.n of 512 bits first, and then each block is corrected by 64 bits for Reed-solomon encoding to obtain 8 blocks of N.sub.i.sup.n; and a Reed-solomon decoding process is as follows: block matching is also carried out in a matching process, B_K.sub.i generated after the b_k.sub.i passes through the stabilizer Stabilizer is also divided into 8 blocks, which are subjected to an exclusive-or operation with the 8 blocks of N.sub.i.sup.n generated in encoding for Reed-solomon decoding, and Random binary sequence.sup.n is obtained after decoding; N.sub.i.sup.n=Reed-solomon-recode(B_K.sub.i.sup.n?Random binary sequence.sup.n)), wherein B_K.sub.i.sup.n is a target biometric key, Random binary sequence.sup.n is a random binary code, and Reed-solomon-recode( ) is a Reed-solomon error correction coding operation;
Random binary sequence.sup.n=Reed?solomon?decode(B_K.sub.i.sup.n?N.sub.i.sup.n)); and matching Random binary sequence.sup.n with the original Random binary sequence.sup.n and then carrying out fuzzy extraction Fuzzy extraction( ) and extracting the target biometric key B_K.sub.i when a fuzzy extraction condition is met; wherein a number of completely matched blocks ? is a fuzzy extraction requirement, and when the number of matched blocks is ??n5, the fuzzy extraction requirement is considered to be met and the B_K.sub.i is extracted, and n5 is a set value:
B_K.sub.i=Fuzzy_extraction(Random binary sequence.sup.n, Random binary sequence.sup.n); wherein Random binary sequence.sup.n is the original random binary sequence, Random binary sequence.sup.n is the binary sequence after Reed-solomon decoding, and Fuzzy_extraction( ) is the fuzzy extraction operation.

Description

DESCRIPTION OF THE DRAWINGS

(1) FIG. 1 is a flow chart of face biometric key generation according to the present invention;

(2) FIG. 2 is a structural diagram of a deep neural network module Fmap_E based on personalized training;

(3) FIG. 3 is a flow chart of feature point screening;

(4) FIG. 4 is a diagram of results of different binarization methods of a feature map;

(5) FIG. 5 is a structural diagram of a network of a stabilizer;

(6) FIG. 6 shows error correction coding; and

(7) FIG. 7 shows error correction decoding and fuzzy extraction.

DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS

(8) In order to better understand the present invention, some detailed embodiments and specific operation procedures will be made for the present invention with reference to the drawings.

(9) As shown in FIG. 1, a personalized face biometric key generation method based on deep neural network coding specifically comprises the following steps.

(10) In step 1, a pretraining data set is preprocessed. A public face data set with a large amount of data is selected as the pretraining face data set. A face in the face data set is positioned by an MTCNN method, and finally unified into a face image with a size of N1?M1, and generally, N1=M1=160. The MTCNN method is a face image preprocessing method commonly used in the art.

(11) In step 2, a deep neural network E1 is pretrained, wherein E1 is a residual network Resnet in a convolutional neural network in this embodiment. The preprocessed pretraining face data set is used for pretraining on the Renset by the following loss function Loss, and the pretrained Resnet is capable of accurately recognizing the face in the public data set.

(12) Loss = 1 N i .Math. i - log e s ( cos ( ? y i , i ) - m ) e s ( cos ( ? y i , i ) - m ) + .Math. j ? y i e s ( cos ( ? y i , i ) )

(13) wherein, s and m are constants, s=30 and m=0.35 are selected in this embodiment, ?.sub.yi is an angle between a feature vector x.sub.i and a weight vector W.sub.j of x.sub.i, x.sub.i is a result feature vector of the E1, and i is a classification category.

(14) In step 3, a personalized feature extractor Feature_Extraction is constructed to extract a personalized feature, and the face image is converted into a feature map with a stability greater than or equal to 80%: the stability refers to a proportion of pixels with the same pixel value in the same position to a total of pixels in all samples of the same type of images, and an image with the stability greater than or equal to 80% has a better result after learning on the stabilizer:

(15) Stability ( img ) = num_equal ( img ) size_pixel ( img i ) , wherein stability is a stability of a set img of the same type of images, size pixel( ) is a number of pixels in the image, and num_equal( ) is a number of pixels with the same pixel value in the same position in all samples in the image set.

(16) In step 3.1, a deep neural network module Fmap_E based on personalized training is constructed for transfer learning of the pretrained deep neural network E1.

(17) A data set Faces (data in the Faces may be face images collected by a mobile phone or a camera) which actually needs to generate the face biometric key is preprocessed by the same preprocessing method as the pretraining data set, and then subjected to transfer learning on the pretrained deep neural network E1 (the Resnet in this embodiment). A transfer learning method used is a method commonly used in the art, so that the deep neural network may accurately recognize a face in the Faces, and a deep neural network E2 is obtained after learning.

(18) The E2 in this embodiment is a Resnet network with a structure of Resnet50. As shown in FIG. 2, the deep neural network E2 after transfer learning is intercepted to form the Fmap_E (the last two layers: an average pooling layer Avgpool and a full connection layer Liner, of the Resnet50 are separated, and the remaining part is taken as the feature extractor Fmap_E), and a face feature map in the Faces is extracted by the Fmap_E. The deep neural network E2 after transfer learning may recognize the face in the Faces more effectively, so that the Fmap_E may extract the face feature map with more personalized features.

(19) A feature map set Faces_featuremap is obtained from the Faces through the feature extractor Fmap_E:
Fmap_E=Resnet?Avgpool( )?Liner( )
Faces_featuremap=Fmap_E(Faces),

(20) wherein Fmap_E is the deep neural network module based on personalized training, Resnet is the network after transfer learning, Liner( ) is the last full connection layer of the Resnet, Avgpool( ) is the penultimate average pooling layer of the Resnet, Faces is the face data set of transfer learning, and Facs_featuremap is the face feature map set.

(21) In step 3.2, feature point screening is carried out to screen the feature map set Faces_featuremap.

(22) As shown in FIG. 3, feature point screening is carried out on the feature map set Faces_featuremap after extracting the feature map, which comprises global screening and local screening.

(23) In the global screening, all feature maps Faces_featuremap are used, and a global feature map all_Fm is obtained by cumulative average of each pixel:

(24) all_Fm = .Math. j .Math. i Faces_featuremap i len ( Faces_featuremap ) ;

(25) wherein, all_Fm is the global feature map, and len( ) is a number of images in the data set.

(26) In the local screening, a local feature map i_Fm is obtained by cumulative average of an i-type face feature map set Face_featuremap.sub.i.

(27) i_Fm = .Math. j Faces_featuremap i len ( Faces_featuremap i ) ;

(28) wherein, i_Fm is the i-type face local feature map, and len( ) is a number of images in the data set.

(29) Two thresholds ?.sub.1=n1 and ?.sub.2=n2 are selected, and in this embodiment, n1=2 and n2=50.

(30) Selection of each feature map Face_featuremap.sub.i.sup.j in the i-type face feature map set Face_featuremap.sub.i simultaneously satisfies |Face_featuremap.sub.i.sup.j?all_Fm|>?.sub.1, a feature point of ??.sub.2?Face_featuremap?i_Fm??.sub.2 is taken as a preliminary screening point of the feature map, a feature point satisfying the selection requirement is a point m.sub.i(a, b)=1 with corresponding abscissa position a and ordinate position b in a feature point selection matrix m.sub.i, and a feature point not satisfying the selection requirement is a point m.sub.i(a, b)=0.

(31) A screened feature map set F_m.sub.i and the feature point selection matrix m.sub.i are obtained after feature point selection. The m.sub.i is a binary matrix with the same size as the Face_featuremap.sub.i; and choose( ) is a selection process of the feature point in the Face_featuremap.sub.i, feature point traversal is carried out on each image Face_featuremap.sub.i.sup.j in Face_featuremap.sub.i=[Face_featuremap.sub.i.sup.1, Face_featuremap.sub.i.sup.2,L Face_featuremap.sub.i.sup.n] when m.sub.i(a, b)=1, a feature point F_m.sub.i.sup.j(a,b) is reserved, and when m.sub.i(a, b)=0, a feature point of Face_featuremap.sub.i.sup.j(a,b) is discarded.

(32) m i = ( 0 1 K 1 0 0 0 L 1 1 M M O M M 1 0 L 0 1 1 1 L 1 0 ) ;
and

(33) F_m.sub.i=choose(Face_featuremap.sub.i, m.sub.i) wherein choose( ) is a feature point selection operation, F_m.sub.i is an i-type face feature point screening result, Face_featuremap.sub.i is the i-type face feature map set, and m.sub.i is the i-type face feature point selection matrix.

(34) In step 3.3, binary quantization is carried out:

(35) weighted average is carried out on the feature map set F_m.sub.i=[F_m.sub.i.sup.1,F_m.sub.i.sup.2,L F_m.sub.i.sup.n] (containing multiple different face samples of the same person) to obtain an average feature map

(36) 0 avg i = .Math. j F_m i j len ( F_m i )
first before binary quantization; wherein avg.sub.i is the average feature map of the data set F_m.sub.i of i-type face subjected to feature point screening, and len(F_m.sub.i) is a number of face images in the F_m.sub.i, and GLB binarization is carried out on the avg.sub.i to obtain a preliminary face biometric key B_K.sub.i.

(37) A combined method of global binarization and local binarization is used in GLB binarization, and as shown in FIG. 4, image points are sparsely distributed after global binarization, which can increase a false recognition rate of subsequent recognition, while the image points are too dense after local binarization, which can reduce a recognition accuracy. Therefore, the feature point may be better quantified by the combined method of global binarization and local binarization.

(38) A global threshold T_all.sub.i is obtained by a global binarization OTSU method firstly, wherein the OTSU method is a method commonly used in the field of global binarization of images. The avg.sub.i is divided into blocks according to a block size of s?s (s is generally 3 or 5) secondly, an average value and a standard deviation of each block are calculated, and when the average value is less than a threshold ?.sub.3=n3 (a set value) and the standard deviation is less than a threshold ?.sub.4=n4 (a set value), the block is locally binarized. A Gaussian filter is used to process the block in local binarization, a result of the Gaussian filter is a threshold matrix of the block, which is T.sub.s?s=Gauss filter(avg.sub.is?s), wherein Gauss filter is the Gaussian filter, and Gaussian filtering is a method commonly used in the art. When the average value is greater than or equal to the threshold ?.sub.3=n3 and the standard deviation is greater than or equal to the threshold ?.sub.4=n4, the block is binarized with the global threshold T_all.sub.i, wherein the threshold matrix is T.sub.s?s=T_all.sub.i at this time. The avg.sub.i is traversed to obtain a binary threshold matrix T.sub.i, and the feature map in the F_m.sub.i is binarized by using the T.sub.i.

(39) A to-be-stabilized biometric key b_k.sub.i after binarizing the F_m.sub.i may be obtained after binary quantization; and avg.sub.i>T.sub.i is calculated according to the feature binary threshold matrix T.sub.i, wherein when avg.sub.i(a, b)>T.sub.i(a, b), B_K.sub.i=225, and when avg.sub.i(a, b)?T.sub.i(a, b), B_K.sub.i=0; wherein a and b are an abscissa and an ordinate respectively.
B_K.sub.i=GLBinarization(avg.sub.i,T.sub.i);
b_k.sub.i=GLBinarization(F_m.sub.i,T.sub.i);

(40) wherein GLBinarization( ) is a binary quantization operation, and T.sub.i is the i-type face binary threshold matrix.

(41) The deep neural network module Fmap_E based on personalized training, the feature screening matrix m.sub.i and the binary quantization matrix T; obtained in the step 3.1 to the step 3.3 constitute the personalized feature extractor Feature_Extraction.

(42) In step 4, stabilization from b_k.sub.i to B_K.sub.i is learned by the stabilizer, and the B_K.sub.i is a preset biometric key target value.

(43) As shown in FIG. 5, the stabilizer Stabilizer is a deep neural network with an encoder-decoder structure, which is Unet in this embodiment, the UNet structure is different from other encoder-decoder structures in that the UNet uses down-sampled data in an up-sampling process, which is beneficial for better image restoration. However, the pure UNet cannot learn effective stabilization from b_k.sub.i to B_K.sub.i, so that a learning matrix W (a black filled box in FIG. 5) is added on a top layer of the Unet, the W improves an effect of the stabilizer by learning a relationship between points, and the addition of the W greatly improves a stabilization ability of the network. The b_k.sub.i is taken as an input of the stabilizer, and the B_K.sub.i is taken as a target for learning. A combination of Binary CrossEntropy (BCE) and Sigmoid is taken as a loss function Loss=BCE(Sigmoid( ), B_K.sub.i) The Binary CrossEntropy and Sigmoid function is a function commonly used in the art. The Binary CrossEntropy is calculated as a cross entropy between an output value of the stabilizer after Sigmod processing and a target value of the B_K.sub.i The output value of the stabilizer after learning is recorded as B_K.sub.i=Stabilizer(b_k.sub.i) the B_K.sub.i is generally not equal to the B_K.sub.i, and there is still a certain difference between the B_K.sub.i and the B_K.sub.i.

(44) In step 5, an error correction code and fuzzy extraction are used to stabilize the B_K.sub.i to the B_K.sub.i.

(45) Reed-solomon error correction is selected. As shown in FIG. 6, a block error correction method is selected, and a Reed-solomon decoding process is as follows:

(46) the B_K.sub.i is divided into 8 blocks by 512 bits, each block is subjected to an exclusive-or operation of a random binary sequence Random binary sequence.sup.n of 512 bits, and then each block is corrected by 64 bits for Reed-solomon encoding to obtain 8 blocks of N.sub.i.sup.n. The addition of the random binary code improves a randomness of the face biometric key.

(47) As shown in FIG. 7, a Reed-solomon decoding process is as follows: block matching is also carried out in a matching process, the B_K.sub.i generated after the b_k.sub.i passes through the stabilizer Stabilizer is also divided into 8 blocks, which are subjected to an exclusive-or operation with the 8 blocks of N.sub.i.sup.n generated in encoding for Reed-solomon decoding, and Random binary sequence.sup.n is obtained after decoding. N.sub.i.sup.n=Reed-solomon-recode(B_K.sub.i.sup.n?Random binary sequence.sub.n)), wherein B_K.sub.i.sup.n is a target biometric key, Random binary sequence.sup.n is a random binary code, and Reed-solomon-recode( ) is a Reed-solomon error correction coding operation.
Random binary sequence.sup.n=Reed-solomon-decode(B_K.sub.i.sup.n?N.sub.i.sup.n))

(48) Random binary sequence.sup.n is matched with the original Random binary sequence.sup.n and then fuzzy extraction Fuzzy_extraction( ) is carried out, and the target biometric key B_K is extracted when a fuzzy extraction condition is met. The fuzzy extraction is a method commonly used in the art, and the key may be obtained by allowing some errors. A number of completely matched blocks ? is a fuzzy extraction requirement, and when the number of matched blocks is ?n5, the fuzzy extraction requirement is considered to be met and the B_K.sub.i is extracted, and n5?6 is set in this embodiment:
B_K.sub.i=Fuzzy_extraction(Random binary sequence.sup.n,Random binary sequence.sup.n);
wherein Random binary sequence.sup.n is the original random binary sequence, Random binary sequence.sup.n is the binary sequence after Reed-solomon decoding, and Fuzzy_extraction( ) is the fuzzy extraction operation.

(49) An extraction process of the face biometric key is as follows: an i-type new face F; belonging to the data set Faces passes through the trained personalized feature extractor Feature_Extraction in sequence to obtain a personalized feature map. Then, the personalized feature map provided by the Feature_Extraction is stabilized by the trained stabilizer Stabilizer, and finally subjected to Reed-solomon decoding and fuzzy extraction to obtain a face biometric key. The Feature_Extraction comprises providing the face feature map by the Fmap_E, carrying out the feature point selection by the feature point selection matrix m.sub.i, and carrying out the binary quantization by the binarization threshold matrix T.sub.i, Formal representation is as follows:
B_K.sub.i=Fuzzy_extraction(Reed?solomon(Stabilizer(Feature_Extraction(F.sub.i))))
Feature_Extraction(F.sub.i)=GLBinarization(choose(Fmap_E(F.sub.i),m.sub.i),T.sub.i)

(50) By the above method, the transfer learning method is used, the convolution network learns the face feature by pretraining a large number of face data image sets, and then the pretrained network is subjected to transfer learning on an actually needed face database, so that the convolution network may learn features of a target face more accurately. An exclusive feature of each person is selected by feature screening and binarization. Then, the face biometric key is extracted by feature extraction after screening and quantization, and stabilized by the stabilizer with the decoder-encoder structure, and finally, a biometric key meeting a target is extracted by combining the error correction code with the fuzzy extraction.

(51) Finally, an end-to-end direct biometric key generation method is compared. There are currently three end-to-end generation methods, comprising an end-to-end biometric key generation method based on SeNet, an end-to-end biometric key generation method based on VGGNet and an end-to-end biometric key generation method based on binary fault-tolerance, and the three methods are all known in the art. In the end-to-end biometric key generation method based on SeNet, mapping between a network result feature vector and a random binary code is learned by superimposing multiple SeNet network modules and full connection layers, and the SeNet is a network commonly used in the art. In the end-to-end learning method based on VGGnet, mapping between a result feature vector and a random binary code is learned by adding several full connection layers behind the VGGnet, and the VGGnet is a network commonly used in the art. The mapping between the feature vector and the random binary code is learned in both the two methods, and in fact, results of the two methods are poor due to a randomness of the key itself and an approximate randomness of the biometric feature. In the end-to-end generation method based on binary fault-tolerance, a Sigmoid layer and a binarization layer with p as a threshold are directly added behind the feature extraction network, wherein p is generally 0.5. Experimental data of the three end-to-end methods are the same as those of the present invention, which are all the Faces. Experimental results are compared as follows:

(52) TABLE-US-00001 Method Accuracy SeNet (end-to-end) 49.13% VGGNet (end-to-end) 50.28% End-to-end generation based on binary fault- 85.61% tolerance Personalized face biometric key generation based on 99.71% deep neural network coding (combination of feature extractor and stabilizer)

(53) Many feature points are provided in a process of personalized feature extraction, a bit strength of the generated face biometric key is greater than or equal to 4,096 bits, which is better than a result of the end-to-end direct face biometric key generation method in which fuzzy extraction is directly carried out on the result feature vector of the convolutional network, and an accuracy of the end-to-end biometric key generation method is less than 85%. The combination of the feature extractor and the stabilizer has an accuracy greater than 99.5% and a false recognition rate less than 0.1% in experiment. The generated biometric key is a binary sequence, without biometric information of an original face, so that a risk of privacy leakage is effectively prevented. The generated biometric key may be directly applied to a symmetric key system (such as AES) and a public key cryptosystem (such as RSA), and the combination with the key system may ensure revocability and unlinkability of the biometric key. Finally, the deep neural network and the matrix operation in a process of key extraction are both irreversible, so that the face biometric key satisfies irreversibility. The face biometric key method provided effectively improves safety and flexibility of the face feature.

(54) The foregoing shows and describes the basic principles and main features of the present invention and the advantages of the present invention. Those skilled in the art should understand that the present invention is not limited by the above embodiments, the descriptions in the above embodiments and the specification only illustrate the principles of the present invention, the present invention may have various changes and improvements without departing from the spirit and scope of the present invention, and the changes and improvements fall within the scope sought to be protected by the present invention. The scope of protection claimed by the present invention is defined by the appended claims and their equivalents.