SlideShare uma empresa Scribd logo
1 de 14
Inttelix ® Security Solutions Pvt. Ltd. is an organization focuses on Face Recognition
Systems & Biometric Technologies. Inttelix ® specializes in Face Recognition
Algorithms, Biometric Hardware, Software Research & Development, OEM and ODM supplies.
Inttelix ® is headquartered in India and has subsidiary company in Brazil. We have marketing
and support offices in Delhi & Mumbai and have presence across India & Middle-East through
our Resellers Network
Face Recognition Technology
Face Recognition
Humans mostly use faces to recognize individuals.
Advances in computing capability now enables similar
recognition automatically. Early face recognition
algorithms used simple geometric models, but the
recognition process has now matured into a science of
sophisticated
mathematical
representations
and
matching processes. Major developments have propelled
face recognition technology into the spotlight.
Face recognition can be used for both verification (1:1),
and Identification (1:N) applications.

The heart of the facial recognition system is the Local
Feature Analysis (LFA) algorithm. This is the
mathematical technique the system uses to encode
faces. The system maps the face and creates a
"template", a unique numerical ID for that face.
Once the system has stored a "template", it can
compare it to the thousands or millions of "templates"
stored in a database.

© 2013 - Inttelix Security Solutions Pvt. Ltd.

www.inttelix.com

Face Template
Face Recognition Technology

Identification vs. Verification
Verification (1:1, one-to-one) - The process of determining a
person's identity by performing matches against one
biometric template that is located upon known ID. 1:1
verification usually uses tokens like: Card, code, or any other
key based indexing.
Identification (1:N, one-to-many) - The process of
determining a person's identity by performing matches
against multiple biometric templates. Identification systems
are designed to determine identity based solely on biometric
information. There are two types of identification systems:
positive identification and negative identification.

Recommended minimal image size
Multiple faces detection time
(using 640 x 480 image)

0.07 sec.

Single face processing time
(after detecting all faces)

0.13 sec.

Matching speed

100,000 faces/sec.

Maximum database size

© 2013 - Inttelix Security Solutions Pvt. Ltd.

640 x 480 pixels

unlimited

www.inttelix.com

Our advanced applications allow our customer full control
over recognition method. We support both 1:1 (verification)
an 1:N (identification) methods.
Face Recognition Technology
Why Choose Face Recognition over other Biometrics?
It is non-intrusive and requires no physical interaction on behalf of the user

•

It is accurate and allows for high enrolment and verification rates

•

It does not require an expert to interpret the comparisons

•

It can use your existing hardware infrastructure – existing cameras and image
capture devices will work smoothly

•

You can use existing images without having to re-enrol every user (For ID
cards, passports, driver’s licenses, etc.)

•

It is the ONLY biometric that allows you to perform passive identification in a oneto-many environment (e.g. Identifying a terrorist in a busy airport terminal)

www.inttelix.com

•

© 2013 - Inttelix Security Solutions Pvt. Ltd.
Face Recognition Technology

www.inttelix.com

Face Recognition Process Flow

© 2013 - Inttelix Security Solutions Pvt. Ltd.
www.inttelix.com
© 2013 - Inttelix Security Solutions Pvt. Ltd.
Over the past few years the world has
become highly aware of the threats
presented by terrorist activities.
Perimeter
and
video
security,
biometrics
and
face
recognition systems are at the
forefront of the world’s efforts to cope
with the threats at hand. The need to
accurately
detect,
in
real
time, suspects or suspicious behavior
has become evident in locations such
as
airports
and
railway
stations, government and public
buildings and gathering places as well
as around high security facilities such
as water and energy utilities.
© 2013 - Inttelix Security Solutions Pvt. Ltd.

www.inttelix.com

The Need
The Solution

With its intelligent face recognition
algorithms, FRS Suspect Detection
analyses the input from multiple
CCTV cameras at same time.
System matches the incoming face
images (templates) with existing
database and find the suspects and
send alerts!
© 2013 - Inttelix Security Solutions Pvt. Ltd.

www.inttelix.com

FRS Suspect Detection is an
advanced surveillance system that
has video analytics capabilities. It
can automatically detect faces Online or Offline using fast acquisition
methods.
Facial
Recognition

Surveillance

• FRS Suspect Detection is a realtime, constant face acquisition
system
• It continuously analyze the
video inputs and check for the
Suspects
• If a suspect found, it
automatically send alerts to a
pre-defined email ID or mobile
number or popup in controlroom screen
© 2013 - Inttelix Security Solutions Pvt. Ltd.

www.inttelix.com

System
Key Features
• Real-time multiple video stream analysis and
reconcile the evidence with the facts
• 1:N matching between live images with Suspect
database (facial templates)

• Real-time face comparison against watch list
• Enrolment from still image, still image camera
and live video stream
• High scalability in terms of watch list size, number
of video streams, and number of visible faces
• End-to-end security solution
© 2013 - Inttelix Security Solutions Pvt. Ltd.

www.inttelix.com

• Alarm notification and recordings
System layout
Alert

Switch
IP Camera - 1

Suspect Found !!!

IP Camera - 2

Database

IP Camera - 3

Local Enrollment Station

© 2013 - Inttelix Security Solutions Pvt. Ltd.

www.inttelix.com

Application
Server
Suitable for Airports

•

Railway Stations

•

Multiplexes

•

Theaters

•

Shopping Malls

•

Banks & Financial Institutions

•

Law Enforcement Agencies

•

Criminal Investigation Cell

•

or any other public gathering
places

© 2013 - Inttelix Security Solutions Pvt. Ltd.

www.inttelix.com

•
Inttelix® Security Solutions Pvt. Ltd. is an organization focuses on Face Recognition
Systems & Biometric Technologies. Inttelix® specializes in Face Recognition Algorithms,
Biometric Hardware, Software Research & Development, OEM and ODM supplies.

57A, Race Course Road, Coimbatore - 641 018
Tamil Nadu, India
Phone : +91 422 2220845, 2221539
Presence In : Ahmadabad | Baroda | Chennai | Mumbai | New Delhi
Overseas : Brazil | Hong Kong | U.S.A
© 2013 - Inttelix Security Solutions Pvt. Ltd.

www.inttelix.com

Inttelix® is headquartered in India and has subsidiary company in Brazil. We have
marketing and support offices in Delhi & Mumbai and have presence across India &
Middle-East through our Resellers Network

Mais conteúdo relacionado

Mais procurados

Brain Fingerprinting PPT
Brain Fingerprinting PPTBrain Fingerprinting PPT
Brain Fingerprinting PPTVishnu Mysterio
 
Driver drowsinees detection and alert.pptx slide
Driver drowsinees detection and alert.pptx slideDriver drowsinees detection and alert.pptx slide
Driver drowsinees detection and alert.pptx slidekavinakshi
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyShubhamLamichane
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic pptPriya Manik
 
FAKE CURRENCY DETECTION PDF NEW PPT.pptx
FAKE CURRENCY DETECTION PDF NEW PPT.pptxFAKE CURRENCY DETECTION PDF NEW PPT.pptx
FAKE CURRENCY DETECTION PDF NEW PPT.pptxBasavaPrabhu14
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYJASHU JASWANTH
 
Google Driverless Car PPT (Latest Report)
Google Driverless Car PPT (Latest Report)Google Driverless Car PPT (Latest Report)
Google Driverless Car PPT (Latest Report)Shailesh Thakran
 
Thesis presentation ist
Thesis presentation istThesis presentation ist
Thesis presentation istdeep sharma
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognitionMazin Alwaaly
 
Drowsiness Detection Presentation
Drowsiness Detection PresentationDrowsiness Detection Presentation
Drowsiness Detection PresentationSaurabh Kawli
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentationAlexandru Dorobantu
 
Face Chk - Face Recognition
Face Chk - Face RecognitionFace Chk - Face Recognition
Face Chk - Face RecognitionPrime Infoserv
 
Brain Finger Printing
Brain Finger PrintingBrain Finger Printing
Brain Finger PrintingGarima Singh
 

Mais procurados (20)

Narco & beos
Narco & beosNarco & beos
Narco & beos
 
Brain Fingerprinting PPT
Brain Fingerprinting PPTBrain Fingerprinting PPT
Brain Fingerprinting PPT
 
Driver drowsinees detection and alert.pptx slide
Driver drowsinees detection and alert.pptx slideDriver drowsinees detection and alert.pptx slide
Driver drowsinees detection and alert.pptx slide
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Narco analysis
Narco analysisNarco analysis
Narco analysis
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Brain fingerprinting
Brain fingerprintingBrain fingerprinting
Brain fingerprinting
 
FAKE CURRENCY DETECTION PDF NEW PPT.pptx
FAKE CURRENCY DETECTION PDF NEW PPT.pptxFAKE CURRENCY DETECTION PDF NEW PPT.pptx
FAKE CURRENCY DETECTION PDF NEW PPT.pptx
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Retina scan
Retina scanRetina scan
Retina scan
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
Google Driverless Car PPT (Latest Report)
Google Driverless Car PPT (Latest Report)Google Driverless Car PPT (Latest Report)
Google Driverless Car PPT (Latest Report)
 
Thesis presentation ist
Thesis presentation istThesis presentation ist
Thesis presentation ist
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
Drowsiness Detection Presentation
Drowsiness Detection PresentationDrowsiness Detection Presentation
Drowsiness Detection Presentation
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentation
 
Face Chk - Face Recognition
Face Chk - Face RecognitionFace Chk - Face Recognition
Face Chk - Face Recognition
 
Brain Finger Printing
Brain Finger PrintingBrain Finger Printing
Brain Finger Printing
 

Semelhante a Inttelix Suspect Detection System

Inttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix
 
Security in Banks and ATM's
Security in Banks and ATM'sSecurity in Banks and ATM's
Security in Banks and ATM'sInttelix
 
Inttelix OnTime
Inttelix OnTimeInttelix OnTime
Inttelix OnTimeInttelix
 
Markus Paasovaara: Face recognition
Markus Paasovaara: Face recognitionMarkus Paasovaara: Face recognition
Markus Paasovaara: Face recognitionFuturice
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterNIDHI SHARMA
 
ABTO Software computer vision 2016
ABTO Software computer vision 2016ABTO Software computer vision 2016
ABTO Software computer vision 2016ABTO Software
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintSonuSawant
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensorsJeffrey Funk
 
How Cybersecurity Experts Use Artificial Intelligence.pdf
How Cybersecurity Experts Use Artificial Intelligence.pdfHow Cybersecurity Experts Use Artificial Intelligence.pdf
How Cybersecurity Experts Use Artificial Intelligence.pdfStaff Connect
 
Inttelix VisTrack - Intelligent Visitor Management System
Inttelix VisTrack - Intelligent Visitor Management SystemInttelix VisTrack - Intelligent Visitor Management System
Inttelix VisTrack - Intelligent Visitor Management SystemInttelix
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with aiBurhan Ahmed
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShashidhar Reddy
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Palak Pandoh
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition SystemStudentRocks
 
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdf
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdfTop 16 Applications of Computer Vision in Video Surveillance and Security.pdf
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdfSabhanayagham Thirugnanasambandam
 
AI-900 Slides.pptx
AI-900 Slides.pptxAI-900 Slides.pptx
AI-900 Slides.pptxkprasad8
 

Semelhante a Inttelix Suspect Detection System (20)

Inttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix Stranger Detection System
Inttelix Stranger Detection System
 
Security in Banks and ATM's
Security in Banks and ATM'sSecurity in Banks and ATM's
Security in Banks and ATM's
 
Inttelix OnTime
Inttelix OnTimeInttelix OnTime
Inttelix OnTime
 
Markus Paasovaara: Face recognition
Markus Paasovaara: Face recognitionMarkus Paasovaara: Face recognition
Markus Paasovaara: Face recognition
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
 
ABTO Software computer vision 2016
ABTO Software computer vision 2016ABTO Software computer vision 2016
ABTO Software computer vision 2016
 
Ayonix gen en_v1.4
Ayonix gen en_v1.4Ayonix gen en_v1.4
Ayonix gen en_v1.4
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Face recognition
Face recognitionFace recognition
Face recognition
 
How Cybersecurity Experts Use Artificial Intelligence.pdf
How Cybersecurity Experts Use Artificial Intelligence.pdfHow Cybersecurity Experts Use Artificial Intelligence.pdf
How Cybersecurity Experts Use Artificial Intelligence.pdf
 
Inttelix VisTrack - Intelligent Visitor Management System
Inttelix VisTrack - Intelligent Visitor Management SystemInttelix VisTrack - Intelligent Visitor Management System
Inttelix VisTrack - Intelligent Visitor Management System
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
SolusDeck
SolusDeckSolusDeck
SolusDeck
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
 
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdf
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdfTop 16 Applications of Computer Vision in Video Surveillance and Security.pdf
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdf
 
AI-900 Slides.pptx
AI-900 Slides.pptxAI-900 Slides.pptx
AI-900 Slides.pptx
 

Último

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Último (20)

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Inttelix Suspect Detection System

  • 1.
  • 2. Inttelix ® Security Solutions Pvt. Ltd. is an organization focuses on Face Recognition Systems & Biometric Technologies. Inttelix ® specializes in Face Recognition Algorithms, Biometric Hardware, Software Research & Development, OEM and ODM supplies. Inttelix ® is headquartered in India and has subsidiary company in Brazil. We have marketing and support offices in Delhi & Mumbai and have presence across India & Middle-East through our Resellers Network
  • 3. Face Recognition Technology Face Recognition Humans mostly use faces to recognize individuals. Advances in computing capability now enables similar recognition automatically. Early face recognition algorithms used simple geometric models, but the recognition process has now matured into a science of sophisticated mathematical representations and matching processes. Major developments have propelled face recognition technology into the spotlight. Face recognition can be used for both verification (1:1), and Identification (1:N) applications. The heart of the facial recognition system is the Local Feature Analysis (LFA) algorithm. This is the mathematical technique the system uses to encode faces. The system maps the face and creates a "template", a unique numerical ID for that face. Once the system has stored a "template", it can compare it to the thousands or millions of "templates" stored in a database. © 2013 - Inttelix Security Solutions Pvt. Ltd. www.inttelix.com Face Template
  • 4. Face Recognition Technology Identification vs. Verification Verification (1:1, one-to-one) - The process of determining a person's identity by performing matches against one biometric template that is located upon known ID. 1:1 verification usually uses tokens like: Card, code, or any other key based indexing. Identification (1:N, one-to-many) - The process of determining a person's identity by performing matches against multiple biometric templates. Identification systems are designed to determine identity based solely on biometric information. There are two types of identification systems: positive identification and negative identification. Recommended minimal image size Multiple faces detection time (using 640 x 480 image) 0.07 sec. Single face processing time (after detecting all faces) 0.13 sec. Matching speed 100,000 faces/sec. Maximum database size © 2013 - Inttelix Security Solutions Pvt. Ltd. 640 x 480 pixels unlimited www.inttelix.com Our advanced applications allow our customer full control over recognition method. We support both 1:1 (verification) an 1:N (identification) methods.
  • 5. Face Recognition Technology Why Choose Face Recognition over other Biometrics? It is non-intrusive and requires no physical interaction on behalf of the user • It is accurate and allows for high enrolment and verification rates • It does not require an expert to interpret the comparisons • It can use your existing hardware infrastructure – existing cameras and image capture devices will work smoothly • You can use existing images without having to re-enrol every user (For ID cards, passports, driver’s licenses, etc.) • It is the ONLY biometric that allows you to perform passive identification in a oneto-many environment (e.g. Identifying a terrorist in a busy airport terminal) www.inttelix.com • © 2013 - Inttelix Security Solutions Pvt. Ltd.
  • 6. Face Recognition Technology www.inttelix.com Face Recognition Process Flow © 2013 - Inttelix Security Solutions Pvt. Ltd.
  • 7. www.inttelix.com © 2013 - Inttelix Security Solutions Pvt. Ltd.
  • 8. Over the past few years the world has become highly aware of the threats presented by terrorist activities. Perimeter and video security, biometrics and face recognition systems are at the forefront of the world’s efforts to cope with the threats at hand. The need to accurately detect, in real time, suspects or suspicious behavior has become evident in locations such as airports and railway stations, government and public buildings and gathering places as well as around high security facilities such as water and energy utilities. © 2013 - Inttelix Security Solutions Pvt. Ltd. www.inttelix.com The Need
  • 9. The Solution With its intelligent face recognition algorithms, FRS Suspect Detection analyses the input from multiple CCTV cameras at same time. System matches the incoming face images (templates) with existing database and find the suspects and send alerts! © 2013 - Inttelix Security Solutions Pvt. Ltd. www.inttelix.com FRS Suspect Detection is an advanced surveillance system that has video analytics capabilities. It can automatically detect faces Online or Offline using fast acquisition methods.
  • 10. Facial Recognition Surveillance • FRS Suspect Detection is a realtime, constant face acquisition system • It continuously analyze the video inputs and check for the Suspects • If a suspect found, it automatically send alerts to a pre-defined email ID or mobile number or popup in controlroom screen © 2013 - Inttelix Security Solutions Pvt. Ltd. www.inttelix.com System
  • 11. Key Features • Real-time multiple video stream analysis and reconcile the evidence with the facts • 1:N matching between live images with Suspect database (facial templates) • Real-time face comparison against watch list • Enrolment from still image, still image camera and live video stream • High scalability in terms of watch list size, number of video streams, and number of visible faces • End-to-end security solution © 2013 - Inttelix Security Solutions Pvt. Ltd. www.inttelix.com • Alarm notification and recordings
  • 12. System layout Alert Switch IP Camera - 1 Suspect Found !!! IP Camera - 2 Database IP Camera - 3 Local Enrollment Station © 2013 - Inttelix Security Solutions Pvt. Ltd. www.inttelix.com Application Server
  • 13. Suitable for Airports • Railway Stations • Multiplexes • Theaters • Shopping Malls • Banks & Financial Institutions • Law Enforcement Agencies • Criminal Investigation Cell • or any other public gathering places © 2013 - Inttelix Security Solutions Pvt. Ltd. www.inttelix.com •
  • 14. Inttelix® Security Solutions Pvt. Ltd. is an organization focuses on Face Recognition Systems & Biometric Technologies. Inttelix® specializes in Face Recognition Algorithms, Biometric Hardware, Software Research & Development, OEM and ODM supplies. 57A, Race Course Road, Coimbatore - 641 018 Tamil Nadu, India Phone : +91 422 2220845, 2221539 Presence In : Ahmadabad | Baroda | Chennai | Mumbai | New Delhi Overseas : Brazil | Hong Kong | U.S.A © 2013 - Inttelix Security Solutions Pvt. Ltd. www.inttelix.com Inttelix® is headquartered in India and has subsidiary company in Brazil. We have marketing and support offices in Delhi & Mumbai and have presence across India & Middle-East through our Resellers Network