Professional Documents
Culture Documents
Face Recognition
BIOMETRICS
Face
Recognition
Biometrics technology has Due to recent advances in the reliability, accuracy and
performance, face recognition is the latest biometric
matured rapidly over recent years, technology to ‘come of age’. Unlike other forms of
and the use of it for security and biometric solutions, face recognition requires no physical
authentication purposes has become or deliberate interaction by the subject, making it one of
the more passive and less intrusive forms of biometrics.
increasingly common. Biometrics
Speed, accuracy and reliability are the main features
technology uses biological data to required of a face recognition solution. Identifying
identify an individual by analyzing people on a pre-defined watch list needs to happen
and measuring characteristics such without delay every time there is a near precise match.
But a successful deployment of face recognition needs
as fingerprints, DNA, iris and other to consider a number of factors beyond the physical
unique attributes of a person. hardware and software. Lighting conditions, angles,
aging, facial expressions and obstructions such as
hats and facial hair, all need to be taken into account,
along with calculating the required processing power
and capture rates particularly if being used in a busy or
crowded environment.
VIP IDENTIFICATION QUEUE MONITORING BUSINESS DETECTION OF ACCESS CONTROL SECURE AREA
INTELLIGENCE UNWANTED Face recognition can also be used MONITORING
In some businesses, identifying Queues are an annoyance to those in them,
VIP’s is important, whether it and a potential issue for responsible for the INDIVIDUALS for access control solutions. This can Secure area monitoring works
Face recognition can also be
is to simply alert personnel to immediate environment around them. include physical building entry where in identifying individuals within
used to monitor, measure and One of the most common applications
their presence or to automate face recognition is used as a pass or a specific area. The solution
The queue management solution measures collect data about people in a is identifying individuals in an open
access to a specific area a part of the entry process and linked monitors faces and positively
the flow of individuals between multiple specific area to gather priceless environment who provide a risk to public
for the VIP to improve the directly with a door or turnstile. A matches them against a
points, providing information on the number of intelligence to improve business safety or a security risk or possibly are
customer experience. positive match in the database database which can include
individuals and the time between points. The activities and operations. For known trouble makers or offenders. triggers the opening of the door staff, contractors and visitors.
In other instances, the system is configured with certain parameters, example, this can include
Using a watch-list database, face or turnstile, allowing the individual
identification of a VIP in the enabling it to monitor queuing times and counting people, age, gender,
recognition can be used to identify these entry. It can also be integrated into In this application, if an
database can trigger an alert or estimate waiting times. facial expressions and time in the
individuals quickly from the live CCTV an automated registration kiosk for individual is not matched in
work process for personnel to area. This data can be collated
footage or security surveillance cameras visitors. the database, then they are
perhaps provide some degree The solution can then trigger alerts to key and analyzed retrospectively or
instantly identified as a risk
of special attention. The personnel who can take remedial action such can even be used dynamically to In addition, access control can be
The face recognition software does a or threat. Alerts can then be
solution works by matching as opening new access or check points to help trigger a real time event such as applied to other items which require
quick look up in the black list database made to security personnel or
the captured image in the VIP reduce queue lengths and times, improving the changing a message or content on restricted access, including for
and where a match is found, alerts can other staff either on a central
database. Alerts can then be customer experience. digital signage. example drugs cupboards.
be made to security personnel or staff control room screen or in the
sent to key personnel, along Understanding more about the both on screen in the control room as form a message sent to the
The solution can also help with monitoring In some instances, access control
with enhanced data on the people in a specific area can help well as sending the information to the most appropriate personnel
public areas to alert when the area becomes solutions can be combined with a
individual. organisations to tailor activities most appropriate personnel best placed best placed to react, enabling a
too busy or overcrowded. Again alerts can be second monitoring system to identify
triggered to relevant personnel to take action to to gain both commercial and to react, enabling a quick response to any other people trying to enter on quick response to the threat.
perhaps open more entry points or divert people customer experience benefits. the threat. the back of an approved individual.
to other areas, reducing the risk to public safety.
ABOUT NEC’S
Facе
Recognition
NEC’s Face recognition is independently recognized as
among the fastest and most accurate Face recognition
software on the market place according the latest tests
done by the National Institute of Standards and Technology
(NIST). The tests positioned NEC’s face recognition software
as the most accurate facial recognition software. These
tests also demonstrated that NEC provides the fastest
matching capability that is the most resistant to variants in
angle, age and race.
Face
Recognition
Capture Match
SCAN TO FIND
OUR MORE Assess React