SlideShare a Scribd company logo
1 of 8
IT3180 EmergingTrends andTechnologies
Assignment 4: Innovation project
Amped Five Software
Done By: Ramesh 115832B
Lam Zhen Le 116155U
Chan Ru Ai 115517Q
Daphne Ang 111512F
Background
EXAMPLE TEXT
Go ahead and replace
it with your own text.
Image
Processing
EXAMPLE TEXT
Go ahead and
replace it with
your own text.
Investigative
Forensics
EXAMPLE TEXT
Go ahead and
replace it with
your own text.
Security
Applications
Unique Selling Point
Report Fast
70 Different
Filters Multiple
Languages
Complete
Package
High Performance
Automatic Report
generation
(Sequence of all
operations applied)
Tools to target any
type of data from
cctv to latent
figerprint
Single Complete set
of tools for forensic
profesional
Security
Built-in security and fil
authentication to
detect tampering or
unauthorised changes
Who Uses It?
Why Use It?
Law Enforcement & Video
Survelliance
Improve Output to better see face,
licence Plate or anything useful for
investigation
Court Experts
Improve video or images to use as
evidence.
Automatically documents the used filters
Research
Used in several universities and research
institutes as a simple and fast way to
enhance images and video
Military & Inteligence
To stabilize full motion video survelliance
in hotile territories or enhance
surveliance images through fog and
sandstorms
Biometrics
Amped Five can improve fingetprint
image quality and measure height of
subjects from images
Strength Weakness Opportunity Threat
Tons of features and huge capabilities Very expensive and one needs to
undergo traning to use.
Vast opportunities available for
professionals from many different
fields
Threat only to criminals.
SWOT analysis
Camwhore
Extra
Skillset
CCTV at
home
How does it affect our work & lifestyle?
DEMO

More Related Content

What's hot

Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
Rahul Baghla
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
Hiren Selani
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
Milap Oza
 
Digitalización
DigitalizaciónDigitalización
Digitalización
ilypatico
 

What's hot (20)

Logitech Rally Bar and Rally Bar Mini Video Conferencing Appliance (Overview)
Logitech Rally Bar and Rally Bar Mini Video Conferencing Appliance (Overview)Logitech Rally Bar and Rally Bar Mini Video Conferencing Appliance (Overview)
Logitech Rally Bar and Rally Bar Mini Video Conferencing Appliance (Overview)
 
CSC103 Vector vs Raster Graphics
CSC103 Vector vs Raster GraphicsCSC103 Vector vs Raster Graphics
CSC103 Vector vs Raster Graphics
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
An introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensicsAn introduction to cyber forensics and open source tools in cyber forensics
An introduction to cyber forensics and open source tools in cyber forensics
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Lect 1 computer forensics
Lect 1 computer forensicsLect 1 computer forensics
Lect 1 computer forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Computer forensics toolkit
Computer forensics toolkitComputer forensics toolkit
Computer forensics toolkit
 
Deft
DeftDeft
Deft
 
Medidas.seguridad
Medidas.seguridadMedidas.seguridad
Medidas.seguridad
 
Wyposażenie stanowiska do naprawy komputera osobistego
Wyposażenie stanowiska do naprawy komputera osobistegoWyposażenie stanowiska do naprawy komputera osobistego
Wyposażenie stanowiska do naprawy komputera osobistego
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Intro to digital forensic imaging
Intro to digital forensic imagingIntro to digital forensic imaging
Intro to digital forensic imaging
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Digital forensic science and its scope manesh t
Digital forensic science and its scope manesh tDigital forensic science and its scope manesh t
Digital forensic science and its scope manesh t
 
Pericias
PericiasPericias
Pericias
 
Digitalización
DigitalizaciónDigitalización
Digitalización
 

Viewers also liked

Дисперсные системы. Золи. Коагуляция. Флокуляция. Седиментация
Дисперсные системы. Золи. Коагуляция. Флокуляция. СедиментацияДисперсные системы. Золи. Коагуляция. Флокуляция. Седиментация
Дисперсные системы. Золи. Коагуляция. Флокуляция. Седиментация
Петрова Елена Александровна
 

Viewers also liked (17)

Calicut university prospectus 2016 17 educationiconnect.com 7862004786
Calicut university prospectus 2016   17 educationiconnect.com 7862004786Calicut university prospectus 2016   17 educationiconnect.com 7862004786
Calicut university prospectus 2016 17 educationiconnect.com 7862004786
 
Understanding new digital economy
Understanding new digital economyUnderstanding new digital economy
Understanding new digital economy
 
ITS Business Card
ITS Business CardITS Business Card
ITS Business Card
 
Jammu university prospectus 2016 17 educationiconnect.com 7862004786
Jammu university prospectus 2016 17 educationiconnect.com 7862004786Jammu university prospectus 2016 17 educationiconnect.com 7862004786
Jammu university prospectus 2016 17 educationiconnect.com 7862004786
 
Portfolio2013lr
Portfolio2013lrPortfolio2013lr
Portfolio2013lr
 
Vidromecanica Catalogue
Vidromecanica Catalogue Vidromecanica Catalogue
Vidromecanica Catalogue
 
Дисперсные системы. Золи. Коагуляция. Флокуляция. Седиментация
Дисперсные системы. Золи. Коагуляция. Флокуляция. СедиментацияДисперсные системы. Золи. Коагуляция. Флокуляция. Седиментация
Дисперсные системы. Золи. Коагуляция. Флокуляция. Седиментация
 
IGTEC Presentation1
IGTEC Presentation1IGTEC Presentation1
IGTEC Presentation1
 
Maloccln & endocrine /certified fixed orthodontic courses by Indian dental ac...
Maloccln & endocrine /certified fixed orthodontic courses by Indian dental ac...Maloccln & endocrine /certified fixed orthodontic courses by Indian dental ac...
Maloccln & endocrine /certified fixed orthodontic courses by Indian dental ac...
 
Endovenous treatment for varicose veins – the first choice (laser, radiofre...
Endovenous treatment  for varicose veins – the first choice  (laser, radiofre...Endovenous treatment  for varicose veins – the first choice  (laser, radiofre...
Endovenous treatment for varicose veins – the first choice (laser, radiofre...
 
DeathNote of Microsoft Windows Kernel
DeathNote of Microsoft Windows KernelDeathNote of Microsoft Windows Kernel
DeathNote of Microsoft Windows Kernel
 
Ch 27 28 jeopardy
Ch 27 28 jeopardyCh 27 28 jeopardy
Ch 27 28 jeopardy
 
Reproduction jeopardy
Reproduction jeopardyReproduction jeopardy
Reproduction jeopardy
 
Ch 06_lecture_presentation
 Ch 06_lecture_presentation Ch 06_lecture_presentation
Ch 06_lecture_presentation
 
Routers Cisco rutas dinámicas rip
Routers Cisco rutas dinámicas ripRouters Cisco rutas dinámicas rip
Routers Cisco rutas dinámicas rip
 
Chapter 4 skin power point
Chapter 4 skin power pointChapter 4 skin power point
Chapter 4 skin power point
 
Varicose Vein dr Victor Jesron Nababan SpBTKV 160116
Varicose Vein dr Victor Jesron Nababan SpBTKV 160116Varicose Vein dr Victor Jesron Nababan SpBTKV 160116
Varicose Vein dr Victor Jesron Nababan SpBTKV 160116
 

Similar to Ett amped five

VoIPER: Smashing the VoIP stack while you sleep
VoIPER: Smashing the VoIP stack while you sleepVoIPER: Smashing the VoIP stack while you sleep
VoIPER: Smashing the VoIP stack while you sleep
guestad6e9e
 
TET Presentation
TET PresentationTET Presentation
TET Presentation
Videoguy
 
It's just a jump to the left (of boom): Prioritizing detection implementation...
It's just a jump to the left (of boom): Prioritizing detection implementation...It's just a jump to the left (of boom): Prioritizing detection implementation...
It's just a jump to the left (of boom): Prioritizing detection implementation...
MITRE ATT&CK
 
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
NoNameCon
 

Similar to Ett amped five (20)

Speeding Up the Dinosaur: Continuous Testing in Continuous Delivery - Martijn...
Speeding Up the Dinosaur: Continuous Testing in Continuous Delivery - Martijn...Speeding Up the Dinosaur: Continuous Testing in Continuous Delivery - Martijn...
Speeding Up the Dinosaur: Continuous Testing in Continuous Delivery - Martijn...
 
How pentesters and other infosec pros use Pentest tools.com
How pentesters and other infosec pros use Pentest tools.com How pentesters and other infosec pros use Pentest tools.com
How pentesters and other infosec pros use Pentest tools.com
 
VoIPER: Smashing the VoIP stack while you sleep
VoIPER: Smashing the VoIP stack while you sleepVoIPER: Smashing the VoIP stack while you sleep
VoIPER: Smashing the VoIP stack while you sleep
 
Butler
ButlerButler
Butler
 
TET Presentation
TET PresentationTET Presentation
TET Presentation
 
Step Into Security Webinar - Securing Your Facilities Using Technology
Step Into Security Webinar - Securing Your Facilities Using Technology Step Into Security Webinar - Securing Your Facilities Using Technology
Step Into Security Webinar - Securing Your Facilities Using Technology
 
Remote Guarding Vendor Tool
Remote Guarding Vendor ToolRemote Guarding Vendor Tool
Remote Guarding Vendor Tool
 
Introduction to Puppet Enterprise
Introduction to Puppet EnterpriseIntroduction to Puppet Enterprise
Introduction to Puppet Enterprise
 
It's just a jump to the left (of boom): Prioritizing detection implementation...
It's just a jump to the left (of boom): Prioritizing detection implementation...It's just a jump to the left (of boom): Prioritizing detection implementation...
It's just a jump to the left (of boom): Prioritizing detection implementation...
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
 
TensorFlow Lite for mobile & IoT
TensorFlow Lite for mobile & IoT   TensorFlow Lite for mobile & IoT
TensorFlow Lite for mobile & IoT
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
 
Web application Testing
Web application TestingWeb application Testing
Web application Testing
 
Securitarian
SecuritarianSecuritarian
Securitarian
 
tem7
tem7tem7
tem7
 
Lam Tuan
Lam TuanLam Tuan
Lam Tuan
 
Merge PPT G3 and G4.pptx
Merge PPT G3 and G4.pptxMerge PPT G3 and G4.pptx
Merge PPT G3 and G4.pptx
 
2016 Everfocus company profile
2016 Everfocus company profile2016 Everfocus company profile
2016 Everfocus company profile
 
Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...
Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...
Defcon Blue Team Village 2020: Purple On My Mind: Cost Effective Automated Ad...
 

More from Ramesh Maniam

More from Ramesh Maniam (6)

Case study presentation
Case study presentationCase study presentation
Case study presentation
 
Draft proposal presentation
Draft proposal presentationDraft proposal presentation
Draft proposal presentation
 
Proposal presentation
Proposal presentationProposal presentation
Proposal presentation
 
Comm skills show
Comm skills showComm skills show
Comm skills show
 
Proposal presentation
Proposal presentationProposal presentation
Proposal presentation
 
Proposal presentation
Proposal presentationProposal presentation
Proposal presentation
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Ett amped five

  • 1. IT3180 EmergingTrends andTechnologies Assignment 4: Innovation project Amped Five Software Done By: Ramesh 115832B Lam Zhen Le 116155U Chan Ru Ai 115517Q Daphne Ang 111512F
  • 2. Background EXAMPLE TEXT Go ahead and replace it with your own text. Image Processing EXAMPLE TEXT Go ahead and replace it with your own text. Investigative Forensics EXAMPLE TEXT Go ahead and replace it with your own text. Security Applications
  • 3. Unique Selling Point Report Fast 70 Different Filters Multiple Languages Complete Package High Performance Automatic Report generation (Sequence of all operations applied) Tools to target any type of data from cctv to latent figerprint Single Complete set of tools for forensic profesional Security Built-in security and fil authentication to detect tampering or unauthorised changes
  • 5. Why Use It? Law Enforcement & Video Survelliance Improve Output to better see face, licence Plate or anything useful for investigation Court Experts Improve video or images to use as evidence. Automatically documents the used filters Research Used in several universities and research institutes as a simple and fast way to enhance images and video Military & Inteligence To stabilize full motion video survelliance in hotile territories or enhance surveliance images through fog and sandstorms Biometrics Amped Five can improve fingetprint image quality and measure height of subjects from images
  • 6. Strength Weakness Opportunity Threat Tons of features and huge capabilities Very expensive and one needs to undergo traning to use. Vast opportunities available for professionals from many different fields Threat only to criminals. SWOT analysis
  • 7. Camwhore Extra Skillset CCTV at home How does it affect our work & lifestyle?