SlideShare a Scribd company logo
1 of 14
Tomorrow’s Technology,
Today!
Facial Recognition Visitor Management

What is FRS VisTrack ?
 A Complete Visitor Management
Solution
 An Intelligent Application that can
recognize your visitors
 FRS VisTrack is backed-up by Facial
Biometric Technology
 Can identify the Black-listed persons
 Send alerts in case of any anticipated
security threats
 Visitor Pass (with photograph) in few
seconds
Facial Recognition Visitor Management

Other features …
 FRS VisTrack is available in both as PC
based solution as well stand-alone Kiosk
 Can integrate with RFID/Smart Cards &
Barcodes for Quick Visitor Pass as well
Visitor Tracking
 Can integrate with EM Locks & Turnstiles
for Access Control mechanism
 System can also be extended for
Temporary Workers & Project based
employees
 System provides statutory reports for
Security Audit purpose
Facial Recognition Visitor Management

Unique Advantages
 Work with standard Webcam for Facial
Recognition features
 Business card data will automatically pushed to
the Visitor's profile (Card Scanner required)
 Option to scan any specific document and map
it to the visitor profile (Ex: Driving lenience and
Pan card )
 Sufficient text fields to enter the material
carrying by the visitor
 Automatic exit punch (Optional)
 Ergonomic Design of Kiosk for maximum
comfort to users
 Supports all popular RDBMS (MySQL, MSSQL,
Oracle, etc.)
 Can integrate with any other applications
(customization)
Print Visitor pass with
Photograph with basic
information.
Business Card Scanner will
automatically push the data
into the fields.
Facility to reschedule
priorities to entertain
Important Visitors

Visitor Pass

Facial Recognition Visitor Management
 Basic information about Visitor details
and appointment details.

Facial Recognition Visitor Management
Facial Recognition Visitor Management

Visitor data is stored centrally, hence
the visitor can use any gate for exit
Exit punch is automated by the Bar
Codes

Visitor Pass
Facial Recognition Visitor Management

REPORTS
 Registered Visitors List with images
 Host-wise Visitor history report
 Visitor Company-wise report
 Pre-appointment List
 Appointment history report
 Missed appointment history report
 Exception report – Visitor IN but not OUT
 Feature to export all reports to PDF/CSV
Facial Recognition Visitor Management

Technology Behind
Face Recognition
Humans mostly use faces to recognize individuals.
Advances in computing capability now enables similar
recognition automatically. Early face recognition
algorithms used simple geometric models, but the
recognition process has now matured into a science of
sophisticated mathematical representations and matching
processes. Major developments have propelled face
recognition technology into the spotlight.
Face recognition can be used for both verification (1:1)
and Identification (1:N) applications.

Face Template
The heart of the facial recognition system is the Local
Feature Analysis (LFA) algorithm. This is the
mathematical technique the system uses to encode
faces. The system maps the face and creates a
"template“.
Once the system has stored a "template", it can compare
it to the thousands or millions of "templates" stored in a
database.
Facial Recognition Visitor Management

Identification vs. Verification
Verification (1:1, one-to-one) - The process of determining a
person's identity by performing matches against one biometric
template that is located upon known ID. 1:1 verification usually
uses tokens like: Card, code, or any other key based indexing.
Identification (1:N, one-to-many) - The process of determining
a person's identity by performing matches against multiple
biometric templates. Identification systems are designed to
determine identity based solely on biometric information. There
are two types of identification systems: positive identification and
negative identification.
Our advanced applications allow our customer full control over
recognition method. We support both 1:1 (verification) an 1:N
(identification) methods.

Performance
Recommended minimal image size

640 x 480 pixels

Multiple faces detection time
(using 640 x 480 image)
Single face processing time
(after detecting all faces)
Matching speed

0.07 sec.

Maximum database size

unlimited

0.13 sec.
100,000 faces/sec.
Facial Recognition Visitor Management

Why Choose Face Recognition over other Biometrics?
•It is non-intrusive and requires no physical interaction on behalf of the user
•It is accurate and allows for high enrolment and verification rates
•It does not require an expert to interpret the comparisons
•It can use your existing hardware infrastructure – existing cameras and image
capture devices will work smoothly
•You can use existing images without having to re-enrol every user (For ID cards,
passports, driver’s licenses, etc.)
•It is the ONLY biometric that allows you to perform passive identification in a oneto-many environment (e.g. Identifying a terrorist in a busy airport terminal)
Facial Recognition Visitor Management

Face Recognition Process Flow
Facial Recognition Visitor Management

System Requirements
 Microsoft Windows: Windows 7 or above
 Minimum Memory : 2 GB RAM
 HD free space: 100 GB
 Processor: Intel Core I3 Processor or better

 Web cam (1MP or Above)
 Deskjet / Lazerjet / Label Printer
 Barcode/RFID reader (Optional)
 Flatbed Scanner (Optional)
 Business Card Scanner(Optional)
Facial Recognition Visitor Management

Inttelix® Security Solutions Pvt. Ltd. is an organization focuses on Face
Recognition Systems & Biometric Technologies. Inttelix® specializes in Face
Recognition Algorithms, Biometric Hardware, Software Research &
Development, OEM and ODM supplies.
Inttelix® is headquartered in India and has subsidiary company in Brazil. We
have marketing and support offices in Delhi & Mumbai and have presence
across India & Middle-East through our Resellers Network

57A, Race Course Road, Coimbatore - 641 018
Tamil Nadu, India
Phone : +91 422 2220845, 2221539
Presence In : Ahmadabad | Baroda | Chennai | Mumbai | New Delhi
Overseas : Brazil | Hong Kong | U.S.A

More Related Content

Similar to Inttelix VisTrack - Intelligent Visitor Management System

Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShashidhar Reddy
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Palak Pandoh
 
megamind technosoft biometric device
megamind technosoft biometric device megamind technosoft biometric device
megamind technosoft biometric device megamind technosoft
 
Facial recognition
Facial recognitionFacial recognition
Facial recognitionDhimankomal
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterNIDHI SHARMA
 
Introducing Dynatrace DPM 1v0
Introducing Dynatrace DPM 1v0Introducing Dynatrace DPM 1v0
Introducing Dynatrace DPM 1v0Nelli Kertész
 
Internet of Things - An Architectural Perspective
Internet of Things - An Architectural PerspectiveInternet of Things - An Architectural Perspective
Internet of Things - An Architectural PerspectiveGaurav Awasthi
 
Facial login System ppt in computr science and information technology
Facial login System ppt in computr science and information  technologyFacial login System ppt in computr science and information  technology
Facial login System ppt in computr science and information technologyrajeevs54785
 
Biometry Presentation in Riga, Werner Blessing
Biometry Presentation in Riga, Werner BlessingBiometry Presentation in Riga, Werner Blessing
Biometry Presentation in Riga, Werner BlessingMobileMonday Estonia
 
Face Recognition Proposal Presentation
Face Recognition Proposal PresentationFace Recognition Proposal Presentation
Face Recognition Proposal PresentationMd. Atiqur Rahman
 
Horizon_Brochure
Horizon_BrochureHorizon_Brochure
Horizon_BrochureOmar Tarish
 
Fingerprint Attendance System
Fingerprint Attendance SystemFingerprint Attendance System
Fingerprint Attendance Systemsandeep pawar
 
EEEN10034 Electronics Project.docx
EEEN10034 Electronics Project.docxEEEN10034 Electronics Project.docx
EEEN10034 Electronics Project.docx4934bk
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition SystemStudentRocks
 
Foreigners Authentication Based on Multi-Biometric System for Iraq
Foreigners Authentication Based on  Multi-Biometric System for IraqForeigners Authentication Based on  Multi-Biometric System for Iraq
Foreigners Authentication Based on Multi-Biometric System for IraqA. Shamel
 

Similar to Inttelix VisTrack - Intelligent Visitor Management System (20)

Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
 
real time attendance system
real time attendance systemreal time attendance system
real time attendance system
 
megamind technosoft biometric device
megamind technosoft biometric device megamind technosoft biometric device
megamind technosoft biometric device
 
Ayonix gen en_v1.4
Ayonix gen en_v1.4Ayonix gen en_v1.4
Ayonix gen en_v1.4
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
Face recognition
Face recognitionFace recognition
Face recognition
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
 
Introducing Dynatrace DPM 1v0
Introducing Dynatrace DPM 1v0Introducing Dynatrace DPM 1v0
Introducing Dynatrace DPM 1v0
 
Internet of Things - An Architectural Perspective
Internet of Things - An Architectural PerspectiveInternet of Things - An Architectural Perspective
Internet of Things - An Architectural Perspective
 
Facial login System ppt in computr science and information technology
Facial login System ppt in computr science and information  technologyFacial login System ppt in computr science and information  technology
Facial login System ppt in computr science and information technology
 
Biometry Presentation in Riga, Werner Blessing
Biometry Presentation in Riga, Werner BlessingBiometry Presentation in Riga, Werner Blessing
Biometry Presentation in Riga, Werner Blessing
 
Face Recognition Proposal Presentation
Face Recognition Proposal PresentationFace Recognition Proposal Presentation
Face Recognition Proposal Presentation
 
Horizon_Brochure
Horizon_BrochureHorizon_Brochure
Horizon_Brochure
 
Fingerprint Attendance System
Fingerprint Attendance SystemFingerprint Attendance System
Fingerprint Attendance System
 
Fawad Ahmed2
Fawad Ahmed2Fawad Ahmed2
Fawad Ahmed2
 
EEEN10034 Electronics Project.docx
EEEN10034 Electronics Project.docxEEEN10034 Electronics Project.docx
EEEN10034 Electronics Project.docx
 
Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
 
Face Recognition System
Face Recognition SystemFace Recognition System
Face Recognition System
 
Foreigners Authentication Based on Multi-Biometric System for Iraq
Foreigners Authentication Based on  Multi-Biometric System for IraqForeigners Authentication Based on  Multi-Biometric System for Iraq
Foreigners Authentication Based on Multi-Biometric System for Iraq
 

Recently uploaded

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Recently uploaded (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Inttelix VisTrack - Intelligent Visitor Management System

  • 2. Facial Recognition Visitor Management What is FRS VisTrack ?  A Complete Visitor Management Solution  An Intelligent Application that can recognize your visitors  FRS VisTrack is backed-up by Facial Biometric Technology  Can identify the Black-listed persons  Send alerts in case of any anticipated security threats  Visitor Pass (with photograph) in few seconds
  • 3. Facial Recognition Visitor Management Other features …  FRS VisTrack is available in both as PC based solution as well stand-alone Kiosk  Can integrate with RFID/Smart Cards & Barcodes for Quick Visitor Pass as well Visitor Tracking  Can integrate with EM Locks & Turnstiles for Access Control mechanism  System can also be extended for Temporary Workers & Project based employees  System provides statutory reports for Security Audit purpose
  • 4. Facial Recognition Visitor Management Unique Advantages  Work with standard Webcam for Facial Recognition features  Business card data will automatically pushed to the Visitor's profile (Card Scanner required)  Option to scan any specific document and map it to the visitor profile (Ex: Driving lenience and Pan card )  Sufficient text fields to enter the material carrying by the visitor  Automatic exit punch (Optional)  Ergonomic Design of Kiosk for maximum comfort to users  Supports all popular RDBMS (MySQL, MSSQL, Oracle, etc.)  Can integrate with any other applications (customization)
  • 5. Print Visitor pass with Photograph with basic information. Business Card Scanner will automatically push the data into the fields. Facility to reschedule priorities to entertain Important Visitors Visitor Pass Facial Recognition Visitor Management
  • 6.  Basic information about Visitor details and appointment details. Facial Recognition Visitor Management
  • 7. Facial Recognition Visitor Management Visitor data is stored centrally, hence the visitor can use any gate for exit Exit punch is automated by the Bar Codes Visitor Pass
  • 8. Facial Recognition Visitor Management REPORTS  Registered Visitors List with images  Host-wise Visitor history report  Visitor Company-wise report  Pre-appointment List  Appointment history report  Missed appointment history report  Exception report – Visitor IN but not OUT  Feature to export all reports to PDF/CSV
  • 9. Facial Recognition Visitor Management Technology Behind Face Recognition Humans mostly use faces to recognize individuals. Advances in computing capability now enables similar recognition automatically. Early face recognition algorithms used simple geometric models, but the recognition process has now matured into a science of sophisticated mathematical representations and matching processes. Major developments have propelled face recognition technology into the spotlight. Face recognition can be used for both verification (1:1) and Identification (1:N) applications. Face Template The heart of the facial recognition system is the Local Feature Analysis (LFA) algorithm. This is the mathematical technique the system uses to encode faces. The system maps the face and creates a "template“. Once the system has stored a "template", it can compare it to the thousands or millions of "templates" stored in a database.
  • 10. Facial Recognition Visitor Management Identification vs. Verification Verification (1:1, one-to-one) - The process of determining a person's identity by performing matches against one biometric template that is located upon known ID. 1:1 verification usually uses tokens like: Card, code, or any other key based indexing. Identification (1:N, one-to-many) - The process of determining a person's identity by performing matches against multiple biometric templates. Identification systems are designed to determine identity based solely on biometric information. There are two types of identification systems: positive identification and negative identification. Our advanced applications allow our customer full control over recognition method. We support both 1:1 (verification) an 1:N (identification) methods. Performance Recommended minimal image size 640 x 480 pixels Multiple faces detection time (using 640 x 480 image) Single face processing time (after detecting all faces) Matching speed 0.07 sec. Maximum database size unlimited 0.13 sec. 100,000 faces/sec.
  • 11. Facial Recognition Visitor Management Why Choose Face Recognition over other Biometrics? •It is non-intrusive and requires no physical interaction on behalf of the user •It is accurate and allows for high enrolment and verification rates •It does not require an expert to interpret the comparisons •It can use your existing hardware infrastructure – existing cameras and image capture devices will work smoothly •You can use existing images without having to re-enrol every user (For ID cards, passports, driver’s licenses, etc.) •It is the ONLY biometric that allows you to perform passive identification in a oneto-many environment (e.g. Identifying a terrorist in a busy airport terminal)
  • 12. Facial Recognition Visitor Management Face Recognition Process Flow
  • 13. Facial Recognition Visitor Management System Requirements  Microsoft Windows: Windows 7 or above  Minimum Memory : 2 GB RAM  HD free space: 100 GB  Processor: Intel Core I3 Processor or better  Web cam (1MP or Above)  Deskjet / Lazerjet / Label Printer  Barcode/RFID reader (Optional)  Flatbed Scanner (Optional)  Business Card Scanner(Optional)
  • 14. Facial Recognition Visitor Management Inttelix® Security Solutions Pvt. Ltd. is an organization focuses on Face Recognition Systems & Biometric Technologies. Inttelix® specializes in Face Recognition Algorithms, Biometric Hardware, Software Research & Development, OEM and ODM supplies. Inttelix® is headquartered in India and has subsidiary company in Brazil. We have marketing and support offices in Delhi & Mumbai and have presence across India & Middle-East through our Resellers Network 57A, Race Course Road, Coimbatore - 641 018 Tamil Nadu, India Phone : +91 422 2220845, 2221539 Presence In : Ahmadabad | Baroda | Chennai | Mumbai | New Delhi Overseas : Brazil | Hong Kong | U.S.A