SlideShare una empresa de Scribd logo
1 de 14
Inttelix ® Security Solutions Pvt. Ltd. is an organization focuses on Face Recognition
Systems & Biometric Technologies. Inttelix ® specializes in Face Recognition
Algorithms, Biometric Hardware, Software Research & Development, OEM and ODM supplies.
Inttelix ® is headquartered in India and has subsidiary company in Brazil. We have marketing
and support offices in Delhi & Mumbai and have presence across India & Middle-East through
our Resellers Network
Face Recognition Technology
Face Recognition
Humans mostly use faces to recognize individuals.
Advances in computing capability now enables similar
recognition automatically. Early face recognition
algorithms used simple geometric models, but the
recognition process has now matured into a science of
sophisticated
mathematical
representations
and
matching processes. Major developments have propelled
face recognition technology into the spotlight.
Face recognition can be used for both verification (1:1),
and Identification (1:N) applications.

The heart of the facial recognition system is the Local
Feature Analysis (LFA) algorithm. This is the
mathematical technique the system uses to encode
faces. The system maps the face and creates a
"template", a unique numerical ID for that face.
Once the system has stored a "template", it can
compare it to the thousands or millions of "templates"
stored in a database.

© 2013 - Inttelix Security Solutions Pvt. Ltd.

www.inttelix.com

Face Template
Face Recognition Technology

Identification vs. Verification
Verification (1:1, one-to-one) - The process of determining a
person's identity by performing matches against one
biometric template that is located upon known ID. 1:1
verification usually uses tokens like: Card, code, or any other
key based indexing.
Identification (1:N, one-to-many) - The process of
determining a person's identity by performing matches
against multiple biometric templates. Identification systems
are designed to determine identity based solely on biometric
information. There are two types of identification systems:
positive identification and negative identification.

Recommended minimal image size
Multiple faces detection time
(using 640 x 480 image)

0.07 sec.

Single face processing time
(after detecting all faces)

0.13 sec.

Matching speed

100,000 faces/sec.

Maximum database size

© 2013 - Inttelix Security Solutions Pvt. Ltd.

640 x 480 pixels

unlimited

www.inttelix.com

Our advanced applications allow our customer full control
over recognition method. We support both 1:1 (verification)
an 1:N (identification) methods.
Face Recognition Technology
Why Choose Face Recognition over other Biometrics?
It is non-intrusive and requires no physical interaction on behalf of the user

•

It is accurate and allows for high enrolment and verification rates

•

It does not require an expert to interpret the comparisons

•

It can use your existing hardware infrastructure – existing cameras and image
capture devices will work smoothly

•

You can use existing images without having to re-enrol every user (For ID
cards, passports, driver’s licenses, etc.)

•

It is the ONLY biometric that allows you to perform passive identification in a oneto-many environment (e.g. Identifying a terrorist in a busy airport terminal)

www.inttelix.com

•

© 2013 - Inttelix Security Solutions Pvt. Ltd.
Face Recognition Technology

www.inttelix.com

Face Recognition Process Flow

© 2013 - Inttelix Security Solutions Pvt. Ltd.
www.inttelix.com
© 2013 - Inttelix Security Solutions Pvt. Ltd.
Over the past few years the world has
become highly aware of the threats
presented by terrorist activities.
Perimeter
and
video
security,
biometrics
and
face
recognition systems are at the
forefront of the world’s efforts to cope
with the threats at hand. The need to
accurately
detect,
in
real
time, suspects or suspicious behavior
has become evident in locations such
as
airports
and
railway
stations, government and public
buildings and gathering places as well
as around high security facilities such
as water and energy utilities.
© 2013 - Inttelix Security Solutions Pvt. Ltd.

www.inttelix.com

The Need
The Solution

With its intelligent face recognition
algorithms, FRS Suspect Detection
analyses the input from multiple
CCTV cameras at same time.
System matches the incoming face
images (templates) with existing
database and find the suspects and
send alerts!
© 2013 - Inttelix Security Solutions Pvt. Ltd.

www.inttelix.com

FRS Suspect Detection is an
advanced surveillance system that
has video analytics capabilities. It
can automatically detect faces Online or Offline using fast acquisition
methods.
Facial
Recognition

Surveillance

• FRS Suspect Detection is a realtime, constant face acquisition
system
• It continuously analyze the
video inputs and check for the
Suspects
• If a suspect found, it
automatically send alerts to a
pre-defined email ID or mobile
number or popup in controlroom screen
© 2013 - Inttelix Security Solutions Pvt. Ltd.

www.inttelix.com

System
Key Features
• Real-time multiple video stream analysis and
reconcile the evidence with the facts
• 1:N matching between live images with Suspect
database (facial templates)

• Real-time face comparison against watch list
• Enrolment from still image, still image camera
and live video stream
• High scalability in terms of watch list size, number
of video streams, and number of visible faces
• End-to-end security solution
© 2013 - Inttelix Security Solutions Pvt. Ltd.

www.inttelix.com

• Alarm notification and recordings
System layout
Alert

Switch
IP Camera - 1

Suspect Found !!!

IP Camera - 2

Database

IP Camera - 3

Local Enrollment Station

© 2013 - Inttelix Security Solutions Pvt. Ltd.

www.inttelix.com

Application
Server
Suitable for Airports

•

Railway Stations

•

Multiplexes

•

Theaters

•

Shopping Malls

•

Banks & Financial Institutions

•

Law Enforcement Agencies

•

Criminal Investigation Cell

•

or any other public gathering
places

© 2013 - Inttelix Security Solutions Pvt. Ltd.

www.inttelix.com

•
Inttelix® Security Solutions Pvt. Ltd. is an organization focuses on Face Recognition
Systems & Biometric Technologies. Inttelix® specializes in Face Recognition Algorithms,
Biometric Hardware, Software Research & Development, OEM and ODM supplies.

57A, Race Course Road, Coimbatore - 641 018
Tamil Nadu, India
Phone : +91 422 2220845, 2221539
Presence In : Ahmadabad | Baroda | Chennai | Mumbai | New Delhi
Overseas : Brazil | Hong Kong | U.S.A
© 2013 - Inttelix Security Solutions Pvt. Ltd.

www.inttelix.com

Inttelix® is headquartered in India and has subsidiary company in Brazil. We have
marketing and support offices in Delhi & Mumbai and have presence across India &
Middle-East through our Resellers Network

Más contenido relacionado

La actualidad más candente

Juvenile justice in India ppt prepared by Rajashree J Jawale
Juvenile justice in India ppt prepared by Rajashree J JawaleJuvenile justice in India ppt prepared by Rajashree J Jawale
Juvenile justice in India ppt prepared by Rajashree J Jawalesundarsasane
 
Protection of children from sexual offences act, India 2012
Protection of children from sexual offences act, India 2012Protection of children from sexual offences act, India 2012
Protection of children from sexual offences act, India 2012Hannah Udhaya
 
POCSO Act- forensic medicine perspective
POCSO Act- forensic medicine perspectivePOCSO Act- forensic medicine perspective
POCSO Act- forensic medicine perspectiveDr Nikita Prabhakaran
 
Forensic psychology detection of deception
Forensic psychology  detection of deceptionForensic psychology  detection of deception
Forensic psychology detection of deceptionRavinderKaur194
 
Vehicle Tracking System
Vehicle Tracking SystemVehicle Tracking System
Vehicle Tracking SystemSubhash Gupta
 
Pocso ppt adv.seena rajagopal
Pocso ppt adv.seena rajagopalPocso ppt adv.seena rajagopal
Pocso ppt adv.seena rajagopalSeena Rajagopal
 
Forensic psychology introduction
Forensic psychology   introductionForensic psychology   introduction
Forensic psychology introductionRavinderKaur194
 
Means end analysis, knowledge in learning
Means end analysis,  knowledge in learningMeans end analysis,  knowledge in learning
Means end analysis, knowledge in learningGaurav Chaubey
 
Juvenile justice act, 2015
Juvenile justice act, 2015Juvenile justice act, 2015
Juvenile justice act, 2015atho nyekha
 
Facial Expression Recognition System using Deep Convolutional Neural Networks.
Facial Expression Recognition  System using Deep Convolutional Neural Networks.Facial Expression Recognition  System using Deep Convolutional Neural Networks.
Facial Expression Recognition System using Deep Convolutional Neural Networks.Sandeep Wakchaure
 
Driver drowsiness monitoring system using visual behavior and Machine Learning.
Driver drowsiness monitoring system using visual behavior and Machine Learning.Driver drowsiness monitoring system using visual behavior and Machine Learning.
Driver drowsiness monitoring system using visual behavior and Machine Learning.AasimAhmedKhanJawaad
 
Brain electrical oscillation signature profiling(beos)
Brain electrical oscillation signature profiling(beos)Brain electrical oscillation signature profiling(beos)
Brain electrical oscillation signature profiling(beos)Nitesh Bhatia
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdarraihansikdar
 

La actualidad más candente (20)

Juvenile justice in India ppt prepared by Rajashree J Jawale
Juvenile justice in India ppt prepared by Rajashree J JawaleJuvenile justice in India ppt prepared by Rajashree J Jawale
Juvenile justice in India ppt prepared by Rajashree J Jawale
 
Protection of children from sexual offences act, India 2012
Protection of children from sexual offences act, India 2012Protection of children from sexual offences act, India 2012
Protection of children from sexual offences act, India 2012
 
POCSO Act- forensic medicine perspective
POCSO Act- forensic medicine perspectivePOCSO Act- forensic medicine perspective
POCSO Act- forensic medicine perspective
 
Emotion recognition
Emotion recognitionEmotion recognition
Emotion recognition
 
Forensic psychology detection of deception
Forensic psychology  detection of deceptionForensic psychology  detection of deception
Forensic psychology detection of deception
 
Vehicle Tracking System
Vehicle Tracking SystemVehicle Tracking System
Vehicle Tracking System
 
Ch 6 Homicide
Ch 6 HomicideCh 6 Homicide
Ch 6 Homicide
 
Pocso ppt adv.seena rajagopal
Pocso ppt adv.seena rajagopalPocso ppt adv.seena rajagopal
Pocso ppt adv.seena rajagopal
 
Forensic psychology introduction
Forensic psychology   introductionForensic psychology   introduction
Forensic psychology introduction
 
Pocso jnims
Pocso jnimsPocso jnims
Pocso jnims
 
Means end analysis, knowledge in learning
Means end analysis,  knowledge in learningMeans end analysis,  knowledge in learning
Means end analysis, knowledge in learning
 
Juvenile justice act, 2015
Juvenile justice act, 2015Juvenile justice act, 2015
Juvenile justice act, 2015
 
Facial Expression Recognition System using Deep Convolutional Neural Networks.
Facial Expression Recognition  System using Deep Convolutional Neural Networks.Facial Expression Recognition  System using Deep Convolutional Neural Networks.
Facial Expression Recognition System using Deep Convolutional Neural Networks.
 
Driver drowsiness monitoring system using visual behavior and Machine Learning.
Driver drowsiness monitoring system using visual behavior and Machine Learning.Driver drowsiness monitoring system using visual behavior and Machine Learning.
Driver drowsiness monitoring system using visual behavior and Machine Learning.
 
Brain electrical oscillation signature profiling(beos)
Brain electrical oscillation signature profiling(beos)Brain electrical oscillation signature profiling(beos)
Brain electrical oscillation signature profiling(beos)
 
Crime Prevention History And Theory
Crime Prevention History And TheoryCrime Prevention History And Theory
Crime Prevention History And Theory
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Narco analysis
Narco analysisNarco analysis
Narco analysis
 
Process of child custody
Process of child custodyProcess of child custody
Process of child custody
 
Broken window theory
Broken window theoryBroken window theory
Broken window theory
 

Similar a Inttelix Suspect Detection System

Inttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix
 
Security in Banks and ATM's
Security in Banks and ATM'sSecurity in Banks and ATM's
Security in Banks and ATM'sInttelix
 
Inttelix OnTime
Inttelix OnTimeInttelix OnTime
Inttelix OnTimeInttelix
 
Markus Paasovaara: Face recognition
Markus Paasovaara: Face recognitionMarkus Paasovaara: Face recognition
Markus Paasovaara: Face recognitionFuturice
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterNIDHI SHARMA
 
ABTO Software computer vision 2016
ABTO Software computer vision 2016ABTO Software computer vision 2016
ABTO Software computer vision 2016ABTO Software
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintSonuSawant
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensorsJeffrey Funk
 
How Cybersecurity Experts Use Artificial Intelligence.pdf
How Cybersecurity Experts Use Artificial Intelligence.pdfHow Cybersecurity Experts Use Artificial Intelligence.pdf
How Cybersecurity Experts Use Artificial Intelligence.pdfStaff Connect
 
Inttelix VisTrack - Intelligent Visitor Management System
Inttelix VisTrack - Intelligent Visitor Management SystemInttelix VisTrack - Intelligent Visitor Management System
Inttelix VisTrack - Intelligent Visitor Management SystemInttelix
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with aiBurhan Ahmed
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShashidhar Reddy
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Palak Pandoh
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition SystemStudentRocks
 
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdf
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdfTop 16 Applications of Computer Vision in Video Surveillance and Security.pdf
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdfSabhanayagham Thirugnanasambandam
 
AI-900 Slides.pptx
AI-900 Slides.pptxAI-900 Slides.pptx
AI-900 Slides.pptxkprasad8
 

Similar a Inttelix Suspect Detection System (20)

Inttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix Stranger Detection System
Inttelix Stranger Detection System
 
Security in Banks and ATM's
Security in Banks and ATM'sSecurity in Banks and ATM's
Security in Banks and ATM's
 
Inttelix OnTime
Inttelix OnTimeInttelix OnTime
Inttelix OnTime
 
Markus Paasovaara: Face recognition
Markus Paasovaara: Face recognitionMarkus Paasovaara: Face recognition
Markus Paasovaara: Face recognition
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
 
ABTO Software computer vision 2016
ABTO Software computer vision 2016ABTO Software computer vision 2016
ABTO Software computer vision 2016
 
Ayonix gen en_v1.4
Ayonix gen en_v1.4Ayonix gen en_v1.4
Ayonix gen en_v1.4
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
Biomatrics
BiomatricsBiomatrics
Biomatrics
 
Face recognition
Face recognitionFace recognition
Face recognition
 
How Cybersecurity Experts Use Artificial Intelligence.pdf
How Cybersecurity Experts Use Artificial Intelligence.pdfHow Cybersecurity Experts Use Artificial Intelligence.pdf
How Cybersecurity Experts Use Artificial Intelligence.pdf
 
Inttelix VisTrack - Intelligent Visitor Management System
Inttelix VisTrack - Intelligent Visitor Management SystemInttelix VisTrack - Intelligent Visitor Management System
Inttelix VisTrack - Intelligent Visitor Management System
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
SolusDeck
SolusDeckSolusDeck
SolusDeck
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
 
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdf
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdfTop 16 Applications of Computer Vision in Video Surveillance and Security.pdf
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdf
 
AI-900 Slides.pptx
AI-900 Slides.pptxAI-900 Slides.pptx
AI-900 Slides.pptx
 

Último

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Último (20)

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Inttelix Suspect Detection System

  • 1.
  • 2. Inttelix ® Security Solutions Pvt. Ltd. is an organization focuses on Face Recognition Systems & Biometric Technologies. Inttelix ® specializes in Face Recognition Algorithms, Biometric Hardware, Software Research & Development, OEM and ODM supplies. Inttelix ® is headquartered in India and has subsidiary company in Brazil. We have marketing and support offices in Delhi & Mumbai and have presence across India & Middle-East through our Resellers Network
  • 3. Face Recognition Technology Face Recognition Humans mostly use faces to recognize individuals. Advances in computing capability now enables similar recognition automatically. Early face recognition algorithms used simple geometric models, but the recognition process has now matured into a science of sophisticated mathematical representations and matching processes. Major developments have propelled face recognition technology into the spotlight. Face recognition can be used for both verification (1:1), and Identification (1:N) applications. The heart of the facial recognition system is the Local Feature Analysis (LFA) algorithm. This is the mathematical technique the system uses to encode faces. The system maps the face and creates a "template", a unique numerical ID for that face. Once the system has stored a "template", it can compare it to the thousands or millions of "templates" stored in a database. © 2013 - Inttelix Security Solutions Pvt. Ltd. www.inttelix.com Face Template
  • 4. Face Recognition Technology Identification vs. Verification Verification (1:1, one-to-one) - The process of determining a person's identity by performing matches against one biometric template that is located upon known ID. 1:1 verification usually uses tokens like: Card, code, or any other key based indexing. Identification (1:N, one-to-many) - The process of determining a person's identity by performing matches against multiple biometric templates. Identification systems are designed to determine identity based solely on biometric information. There are two types of identification systems: positive identification and negative identification. Recommended minimal image size Multiple faces detection time (using 640 x 480 image) 0.07 sec. Single face processing time (after detecting all faces) 0.13 sec. Matching speed 100,000 faces/sec. Maximum database size © 2013 - Inttelix Security Solutions Pvt. Ltd. 640 x 480 pixels unlimited www.inttelix.com Our advanced applications allow our customer full control over recognition method. We support both 1:1 (verification) an 1:N (identification) methods.
  • 5. Face Recognition Technology Why Choose Face Recognition over other Biometrics? It is non-intrusive and requires no physical interaction on behalf of the user • It is accurate and allows for high enrolment and verification rates • It does not require an expert to interpret the comparisons • It can use your existing hardware infrastructure – existing cameras and image capture devices will work smoothly • You can use existing images without having to re-enrol every user (For ID cards, passports, driver’s licenses, etc.) • It is the ONLY biometric that allows you to perform passive identification in a oneto-many environment (e.g. Identifying a terrorist in a busy airport terminal) www.inttelix.com • © 2013 - Inttelix Security Solutions Pvt. Ltd.
  • 6. Face Recognition Technology www.inttelix.com Face Recognition Process Flow © 2013 - Inttelix Security Solutions Pvt. Ltd.
  • 7. www.inttelix.com © 2013 - Inttelix Security Solutions Pvt. Ltd.
  • 8. Over the past few years the world has become highly aware of the threats presented by terrorist activities. Perimeter and video security, biometrics and face recognition systems are at the forefront of the world’s efforts to cope with the threats at hand. The need to accurately detect, in real time, suspects or suspicious behavior has become evident in locations such as airports and railway stations, government and public buildings and gathering places as well as around high security facilities such as water and energy utilities. © 2013 - Inttelix Security Solutions Pvt. Ltd. www.inttelix.com The Need
  • 9. The Solution With its intelligent face recognition algorithms, FRS Suspect Detection analyses the input from multiple CCTV cameras at same time. System matches the incoming face images (templates) with existing database and find the suspects and send alerts! © 2013 - Inttelix Security Solutions Pvt. Ltd. www.inttelix.com FRS Suspect Detection is an advanced surveillance system that has video analytics capabilities. It can automatically detect faces Online or Offline using fast acquisition methods.
  • 10. Facial Recognition Surveillance • FRS Suspect Detection is a realtime, constant face acquisition system • It continuously analyze the video inputs and check for the Suspects • If a suspect found, it automatically send alerts to a pre-defined email ID or mobile number or popup in controlroom screen © 2013 - Inttelix Security Solutions Pvt. Ltd. www.inttelix.com System
  • 11. Key Features • Real-time multiple video stream analysis and reconcile the evidence with the facts • 1:N matching between live images with Suspect database (facial templates) • Real-time face comparison against watch list • Enrolment from still image, still image camera and live video stream • High scalability in terms of watch list size, number of video streams, and number of visible faces • End-to-end security solution © 2013 - Inttelix Security Solutions Pvt. Ltd. www.inttelix.com • Alarm notification and recordings
  • 12. System layout Alert Switch IP Camera - 1 Suspect Found !!! IP Camera - 2 Database IP Camera - 3 Local Enrollment Station © 2013 - Inttelix Security Solutions Pvt. Ltd. www.inttelix.com Application Server
  • 13. Suitable for Airports • Railway Stations • Multiplexes • Theaters • Shopping Malls • Banks & Financial Institutions • Law Enforcement Agencies • Criminal Investigation Cell • or any other public gathering places © 2013 - Inttelix Security Solutions Pvt. Ltd. www.inttelix.com •
  • 14. Inttelix® Security Solutions Pvt. Ltd. is an organization focuses on Face Recognition Systems & Biometric Technologies. Inttelix® specializes in Face Recognition Algorithms, Biometric Hardware, Software Research & Development, OEM and ODM supplies. 57A, Race Course Road, Coimbatore - 641 018 Tamil Nadu, India Phone : +91 422 2220845, 2221539 Presence In : Ahmadabad | Baroda | Chennai | Mumbai | New Delhi Overseas : Brazil | Hong Kong | U.S.A © 2013 - Inttelix Security Solutions Pvt. Ltd. www.inttelix.com Inttelix® is headquartered in India and has subsidiary company in Brazil. We have marketing and support offices in Delhi & Mumbai and have presence across India & Middle-East through our Resellers Network