SlideShare a Scribd company logo
AI Enabled Face Recognition System
FACE IS THE FUTURE
Identity & Access Management System
• The world is going through a massive
change
• COVID -19 has taught us many
lessons, the most important being
minimalism
• A change that has led to minimizing
contact to ensure that unwanted
touch to external sources could be
minimized for a healthy life
Current Scenario
• The fear of touching public surfaces sparked by the Covid -19 outbreak is spurring
a shift from fingerprint sensors to facial recognition systems for allowing access to
employees across offices in the world.
• Corporates, which at present use fingerprint recognition and touch-based
systems, want to install face recognition machines for attendance, access control
or boom barriers.
• Face recognition is a unique solution in the recent context, where touching a
surface by multiple people has emerged as a potential cause of infection.
• Facial biometric continues to be preferred biometric benchmark that is because it
is easy to deploy and implement. There is no physical interaction required by the
end users moreover, face detection and face match processes for verification /
identification are speedy.
• Since there is no contact required for facial recognition like there is with
fingerprinting or other security measures, facial recognition offers a quick,
automatic, and seamless verification experience. There is nothing such as a key or
I.D. that can be lost or stolen.
Current Scenario
FaceChk is a unique face recognition
product that leverages deep learning & AI
incorporating several custom algorithms
to provide high accuracy and portability
across variety of inexpensive devices such
as low-cost camera, smartphones & NPU
Devices. The technology has been
benchmarked with world’s best and has
proven to be one of the most accurate in
a global open challenge.
About FaceChk
FaceChk -Attendance Management System
• FaceChk AMS is a face recognition software
application for automated attendance marking
• It is powered by cutting edge artificial intelligence to
deliver accurate results for the most complex and real-
time face recognition, in milliseconds.
• FaceChk is a powerful high performance and scalable
software and can be deployed in different
environments effortlessly and effectively
Benefits to the management
Benefits to the staff
No queueing
required that
ensures social
distancing
Touch free
ensures
hygiene &
contactless
attendance
Mark
attendance
multiple times
in a day
Notification
sent to
employee and
HR
SOFTWARE CAPABILITIES
Handles variations in
Images
• Illumination
• Shadows
• Reflection
• Lighting Effects
• Children up to
7 years
• Adult upto
30 years
• Elders upto
20 years
• Yaw
• Pitch
• Roll
SOFTWARE CAPABILITIES
Handles different facial
variations
Accurate Recognition in
Different Poses
Recognizes persons with
varying skin tone
• Clean Shaven
• With Moustache
• With Beard
• Wig
• Makeup
• Cap
• Spectacles/sunglasses
• North Indian
• South Indian
• East Indian
• North Eastern
• Chinese
• Korean
• European
• African
• American
• Black
• White
Replace human eyes
with camera
Replace brain with
software and computer
Replace intelligence
with machine learning
HOW FACIAL RECOGNITION SYSTEM WORKS
Facial Recognition based Identity Management System Overview
FaceChk works effortlessly without interruption
Our Deployment Model - Attendance (Edge)
Mobile Device
Edge computing
Device
Facial Recognition is
happening locally at the device
level with data sync on server
for management
Internet
VPN Leased
Line//Secured
Internet
Data Center on
Premise
Cloud Servers Image Database
FaceChk Server
FaceChk Server
Segments and areas of usage
Heart of FaceChk
• Deep Learning
• Inspired by nervous systems
• DNN, CNN, DBN, RNN, LSTM
• Semi, Fully, Un-Supervised
• Deep Belief Networks
• Deep Boltzman Machines
• Micro-Architecture
HARDWARE
SPECIFICATIONS
PROCESSOR ARM PROCESSOR
RAM 1GB
STORAGE ROM 8GB
OPERATING SYSTEM LINUX
DISPLAY 5-inch LCD screen, resolution: 1024 * 600 @ 60HZ
CASING & COVER Aluminum alloy shell; organic glazed panel
PERFORMANCE
RECOGNITION HEIGHT 1.2-2.2 meters
RECOGNITION DISTANCE 0.5-4 meters
FACE ANGLE 35 degrees left and right, 35 degrees up and down
RECOGNITION TIME Within 100 milliseconds
STATUS DELIVERY Recognized name will be shown on the screen
FACE DATABASE SIZE 50,000 (expandable)
CAMERA SPECIFICATION
CAMERA HDR, auto/manual exposure
SENSOR 1 / 2.7” industrial Dual HD wide motion image sensor
FRAME RATE Up to 30 frames, no smear
LED SPECTRUM White
EFFECTIVE PIXELS 1920 * 1080
LENS M12 (f = 7MM)
Device with Specification
Other Application / Use case
• Contactless Visitor Management system
• Enhancing retail customer experience using Face Recognition
• Criminal identification using CCTV
• Face Authentication based payment system
• Proctoring & Impersonation Management for Online testing &
Examination
• De-Duplication & fraud identification for banks, insurance,
government ID etc.
• Covid-19 application for Quarantine, Mask Violation, Crowd & Social
Distancing
Attendance, Access
& Visitor Management
Visitor ManagementAttendance Management Access Management
Enhanced VIP/Premium Customer Experience
• VIP Facial Recognition system
helps you retain premium
customers and enhances service
level experience
• Helps deliver first-class customer
care
• Keep track of and identify high
value premium customers
Body Worn Camera MatchCriminal Database Identification & Matching
Criminal Identification & Matching
Online Proctoring: Prevents Test/Exam impersonation
Authenticate and Monitor Examinees Remote Test/Exam Invigilation Process
De-Duplicate from millions of Records
De-Duplication & Fraud Management
Identify & Match Fraudsters
Covid-19:Quarantine Management
Random & On Demand Geo-fenced Face based Covid-19 Suspect attendance & Monitoring
for Home/Covid-19 Isolation Centers
Crowd Count & Monitoring – Social Distancing
Face Mask Violation
Identify and Alert Face mask violations from Camera Feeds
Reach out to us
PRIME INFOSERV LLP
DL-124, 1st Floor, Salt Lake, Sector – II, Kolkata – 700091, West Bengal, India
Email : info@primeinfoserv.com Web : www.primeinfoserv.com
(AN ISO 9001:2015 AND 27001:2013 CERTIFIED ENTERPRISE)
Phone : 7890019076, 89611 82794, 98306 65397, 9830017040

More Related Content

What's hot

Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Shravan Halankar
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)
Herman Kurnadi
 
Face recognition
Face recognitionFace recognition
Face recognition
sandeepsharma1193
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptx
TanayChakraborty11
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
SYED HOZAIFA ALI
 
Face recognization
Face recognizationFace recognization
Face recognization
leenak770
 
Face Recognition
Face Recognition Face Recognition
Face Recognition nialler27
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
usha2016
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
Abhishek Kumar
 
Skinput Technology
Skinput TechnologySkinput Technology
Skinput Technology
vivek sagar
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
ShitanshuRanjanSriva2
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural networkSmriti Tikoo
 
Acne scar presentation
Acne scar presentationAcne scar presentation
Acne scar presentation
RINKU PANWAR
 
Recognition of Partially Occluded Face Using Gradientface and Local Binary Pa...
Recognition of Partially Occluded Face Using Gradientface and Local Binary Pa...Recognition of Partially Occluded Face Using Gradientface and Local Binary Pa...
Recognition of Partially Occluded Face Using Gradientface and Local Binary Pa...Win Yu
 
Automated attendance system based on facial recognition
Automated attendance system based on facial recognitionAutomated attendance system based on facial recognition
Automated attendance system based on facial recognition
Dhanush Kasargod
 
Facial powerpoint
Facial powerpointFacial powerpoint
Facial powerpoint12202843
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
Shashidhar Reddy
 
Face recognition
Face recognitionFace recognition
Face recognition
Avinash Prakash
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
JASHU JASWANTH
 

What's hot (20)

Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)Deep learning on face recognition (use case, development and risk)
Deep learning on face recognition (use case, development and risk)
 
Face recognition
Face recognitionFace recognition
Face recognition
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptx
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face recognization
Face recognizationFace recognization
Face recognization
 
Face Recognition
Face Recognition Face Recognition
Face Recognition
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
 
Skinput Technology
Skinput TechnologySkinput Technology
Skinput Technology
 
Face recognition system
Face recognition systemFace recognition system
Face recognition system
 
Detection and recognition of face using neural network
Detection and recognition of face using neural networkDetection and recognition of face using neural network
Detection and recognition of face using neural network
 
Acne scar presentation
Acne scar presentationAcne scar presentation
Acne scar presentation
 
Recognition of Partially Occluded Face Using Gradientface and Local Binary Pa...
Recognition of Partially Occluded Face Using Gradientface and Local Binary Pa...Recognition of Partially Occluded Face Using Gradientface and Local Binary Pa...
Recognition of Partially Occluded Face Using Gradientface and Local Binary Pa...
 
Automated attendance system based on facial recognition
Automated attendance system based on facial recognitionAutomated attendance system based on facial recognition
Automated attendance system based on facial recognition
 
Facial powerpoint
Facial powerpointFacial powerpoint
Facial powerpoint
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face recognition
Face recognitionFace recognition
Face recognition
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 

Similar to Face Chk - Face Recognition

Face Recognition under COVID19 crisis
Face Recognition under COVID19 crisisFace Recognition under COVID19 crisis
Face Recognition under COVID19 crisis
Prime Infoserv
 
Markus Paasovaara: Face recognition
Markus Paasovaara: Face recognitionMarkus Paasovaara: Face recognition
Markus Paasovaara: Face recognition
Futurice
 
Hotel Technologies
Hotel TechnologiesHotel Technologies
Hotel Technologiesbigbossman
 
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionFujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
M2SYS Technology
 
Project PPT.pptx
Project PPT.pptxProject PPT.pptx
Project PPT.pptx
2k22csds2212634
 
Face detection security system & setting raspberry pi (1)
Face detection security system & setting raspberry pi (1)Face detection security system & setting raspberry pi (1)
Face detection security system & setting raspberry pi (1)
satyamswet
 
Move your customer authentication to the next level!
Move your customer authentication to the next level!Move your customer authentication to the next level!
Move your customer authentication to the next level!
Ivona M
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
sbk50000
 
Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?
Ivona M
 
Adding Visuals to Voice Panel - SpeechTEK 2017
Adding Visuals to Voice Panel - SpeechTEK 2017Adding Visuals to Voice Panel - SpeechTEK 2017
Adding Visuals to Voice Panel - SpeechTEK 2017
Crispin Reedy
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
M2SYS Technology
 
Virtual Desktop Success in Healthcare
Virtual Desktop Success in HealthcareVirtual Desktop Success in Healthcare
Virtual Desktop Success in Healthcare
eG Innovations
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
arvind carpenter
 
Cognitive Insurance
Cognitive InsuranceCognitive Insurance
Cognitive Insurance
Kim Escherich
 
N check attendance-linked-in
N check attendance-linked-inN check attendance-linked-in
N check attendance-linked-in
Sandeep Mohanta
 
Face recognition
Face recognition Face recognition
Face recognition
Chandan A V
 
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610 Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
FinTech Belgium
 
Identidata pitch deck_en
Identidata pitch deck_enIdentidata pitch deck_en
Identidata pitch deck_en
Alejandro Simkievich
 
Insurance Industry Trends in 2015: #2 Mobility
Insurance Industry Trends in 2015: #2 Mobility Insurance Industry Trends in 2015: #2 Mobility
Insurance Industry Trends in 2015: #2 Mobility
Euro IT Group
 
J Schwan
J SchwanJ Schwan
J Schwan
daveGBE
 

Similar to Face Chk - Face Recognition (20)

Face Recognition under COVID19 crisis
Face Recognition under COVID19 crisisFace Recognition under COVID19 crisis
Face Recognition under COVID19 crisis
 
Markus Paasovaara: Face recognition
Markus Paasovaara: Face recognitionMarkus Paasovaara: Face recognition
Markus Paasovaara: Face recognition
 
Hotel Technologies
Hotel TechnologiesHotel Technologies
Hotel Technologies
 
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss PreventionFujitsu PalmSecure Biometric Technology for Retail Loss Prevention
Fujitsu PalmSecure Biometric Technology for Retail Loss Prevention
 
Project PPT.pptx
Project PPT.pptxProject PPT.pptx
Project PPT.pptx
 
Face detection security system & setting raspberry pi (1)
Face detection security system & setting raspberry pi (1)Face detection security system & setting raspberry pi (1)
Face detection security system & setting raspberry pi (1)
 
Move your customer authentication to the next level!
Move your customer authentication to the next level!Move your customer authentication to the next level!
Move your customer authentication to the next level!
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
 
Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?
 
Adding Visuals to Voice Panel - SpeechTEK 2017
Adding Visuals to Voice Panel - SpeechTEK 2017Adding Visuals to Voice Panel - SpeechTEK 2017
Adding Visuals to Voice Panel - SpeechTEK 2017
 
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
Fujitsu & M2SYS Webinar - How Palm Vein Biometrics Can Strengthen PCI and Wor...
 
Virtual Desktop Success in Healthcare
Virtual Desktop Success in HealthcareVirtual Desktop Success in Healthcare
Virtual Desktop Success in Healthcare
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Cognitive Insurance
Cognitive InsuranceCognitive Insurance
Cognitive Insurance
 
N check attendance-linked-in
N check attendance-linked-inN check attendance-linked-in
N check attendance-linked-in
 
Face recognition
Face recognition Face recognition
Face recognition
 
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610 Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
Tradetech Hybrid MeetUp_N.Jaure_Onespan_210610
 
Identidata pitch deck_en
Identidata pitch deck_enIdentidata pitch deck_en
Identidata pitch deck_en
 
Insurance Industry Trends in 2015: #2 Mobility
Insurance Industry Trends in 2015: #2 Mobility Insurance Industry Trends in 2015: #2 Mobility
Insurance Industry Trends in 2015: #2 Mobility
 
J Schwan
J SchwanJ Schwan
J Schwan
 

More from Prime Infoserv

Data Protection and E-contracting
Data Protection and E-contractingData Protection and E-contracting
Data Protection and E-contracting
Prime Infoserv
 
Remote Workforces Secure by Barracuda
Remote Workforces Secure by BarracudaRemote Workforces Secure by Barracuda
Remote Workforces Secure by Barracuda
Prime Infoserv
 
Trend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 marTrend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 mar
Prime Infoserv
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Prime Infoserv
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
Prime Infoserv
 
DLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH SituationsDLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH Situations
Prime Infoserv
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
Prime Infoserv
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
Prime Infoserv
 
Corporate Presentation - Netmagic
Corporate Presentation - NetmagicCorporate Presentation - Netmagic
Corporate Presentation - Netmagic
Prime Infoserv
 
Teamwork with Microsoft Teams
Teamwork  with Microsoft TeamsTeamwork  with Microsoft Teams
Teamwork with Microsoft Teams
Prime Infoserv
 
Microsoft Teams-flyer
Microsoft Teams-flyerMicrosoft Teams-flyer
Microsoft Teams-flyer
Prime Infoserv
 
Windows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefitsWindows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefits
Prime Infoserv
 
Email Security – Everyone is a Target
Email Security – Everyone is a TargetEmail Security – Everyone is a Target
Email Security – Everyone is a Target
Prime Infoserv
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
Prime Infoserv
 
BCM Webinar presentation
BCM Webinar presentationBCM Webinar presentation
BCM Webinar presentation
Prime Infoserv
 
FireEye Portfolio
FireEye PortfolioFireEye Portfolio
FireEye Portfolio
Prime Infoserv
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
Prime Infoserv
 
Phishing Simulation By Shield Alliance
Phishing Simulation By Shield AlliancePhishing Simulation By Shield Alliance
Phishing Simulation By Shield Alliance
Prime Infoserv
 
FireEye Solutions
FireEye SolutionsFireEye Solutions
FireEye Solutions
Prime Infoserv
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
Prime Infoserv
 

More from Prime Infoserv (20)

Data Protection and E-contracting
Data Protection and E-contractingData Protection and E-contracting
Data Protection and E-contracting
 
Remote Workforces Secure by Barracuda
Remote Workforces Secure by BarracudaRemote Workforces Secure by Barracuda
Remote Workforces Secure by Barracuda
 
Trend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 marTrend micro research covid19 threat brief summary 27 mar
Trend micro research covid19 threat brief summary 27 mar
 
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend MicroRoadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
Roadmap of Cyber-security from On-Prem to Cloud Journey - Trend Micro
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
 
DLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH SituationsDLP solution - InDefend in WFH Situations
DLP solution - InDefend in WFH Situations
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
 
Corporate Presentation - Netmagic
Corporate Presentation - NetmagicCorporate Presentation - Netmagic
Corporate Presentation - Netmagic
 
Teamwork with Microsoft Teams
Teamwork  with Microsoft TeamsTeamwork  with Microsoft Teams
Teamwork with Microsoft Teams
 
Microsoft Teams-flyer
Microsoft Teams-flyerMicrosoft Teams-flyer
Microsoft Teams-flyer
 
Windows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefitsWindows Virtual Desktop Customer benefits
Windows Virtual Desktop Customer benefits
 
Email Security – Everyone is a Target
Email Security – Everyone is a TargetEmail Security – Everyone is a Target
Email Security – Everyone is a Target
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 
BCM Webinar presentation
BCM Webinar presentationBCM Webinar presentation
BCM Webinar presentation
 
FireEye Portfolio
FireEye PortfolioFireEye Portfolio
FireEye Portfolio
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Phishing Simulation By Shield Alliance
Phishing Simulation By Shield AlliancePhishing Simulation By Shield Alliance
Phishing Simulation By Shield Alliance
 
FireEye Solutions
FireEye SolutionsFireEye Solutions
FireEye Solutions
 
IBM MaaS360 with watson
IBM MaaS360 with watsonIBM MaaS360 with watson
IBM MaaS360 with watson
 

Recently uploaded

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 

Recently uploaded (20)

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 

Face Chk - Face Recognition

  • 1. AI Enabled Face Recognition System FACE IS THE FUTURE Identity & Access Management System
  • 2. • The world is going through a massive change • COVID -19 has taught us many lessons, the most important being minimalism • A change that has led to minimizing contact to ensure that unwanted touch to external sources could be minimized for a healthy life Current Scenario
  • 3. • The fear of touching public surfaces sparked by the Covid -19 outbreak is spurring a shift from fingerprint sensors to facial recognition systems for allowing access to employees across offices in the world. • Corporates, which at present use fingerprint recognition and touch-based systems, want to install face recognition machines for attendance, access control or boom barriers. • Face recognition is a unique solution in the recent context, where touching a surface by multiple people has emerged as a potential cause of infection. • Facial biometric continues to be preferred biometric benchmark that is because it is easy to deploy and implement. There is no physical interaction required by the end users moreover, face detection and face match processes for verification / identification are speedy. • Since there is no contact required for facial recognition like there is with fingerprinting or other security measures, facial recognition offers a quick, automatic, and seamless verification experience. There is nothing such as a key or I.D. that can be lost or stolen. Current Scenario
  • 4. FaceChk is a unique face recognition product that leverages deep learning & AI incorporating several custom algorithms to provide high accuracy and portability across variety of inexpensive devices such as low-cost camera, smartphones & NPU Devices. The technology has been benchmarked with world’s best and has proven to be one of the most accurate in a global open challenge. About FaceChk
  • 5. FaceChk -Attendance Management System • FaceChk AMS is a face recognition software application for automated attendance marking • It is powered by cutting edge artificial intelligence to deliver accurate results for the most complex and real- time face recognition, in milliseconds. • FaceChk is a powerful high performance and scalable software and can be deployed in different environments effortlessly and effectively
  • 6. Benefits to the management
  • 7. Benefits to the staff No queueing required that ensures social distancing Touch free ensures hygiene & contactless attendance Mark attendance multiple times in a day Notification sent to employee and HR
  • 8. SOFTWARE CAPABILITIES Handles variations in Images • Illumination • Shadows • Reflection • Lighting Effects • Children up to 7 years • Adult upto 30 years • Elders upto 20 years • Yaw • Pitch • Roll
  • 9. SOFTWARE CAPABILITIES Handles different facial variations Accurate Recognition in Different Poses Recognizes persons with varying skin tone • Clean Shaven • With Moustache • With Beard • Wig • Makeup • Cap • Spectacles/sunglasses • North Indian • South Indian • East Indian • North Eastern • Chinese • Korean • European • African • American • Black • White
  • 10. Replace human eyes with camera Replace brain with software and computer Replace intelligence with machine learning HOW FACIAL RECOGNITION SYSTEM WORKS Facial Recognition based Identity Management System Overview
  • 11.
  • 12. FaceChk works effortlessly without interruption
  • 13. Our Deployment Model - Attendance (Edge) Mobile Device Edge computing Device Facial Recognition is happening locally at the device level with data sync on server for management Internet VPN Leased Line//Secured Internet Data Center on Premise Cloud Servers Image Database FaceChk Server FaceChk Server
  • 14. Segments and areas of usage
  • 15. Heart of FaceChk • Deep Learning • Inspired by nervous systems • DNN, CNN, DBN, RNN, LSTM • Semi, Fully, Un-Supervised • Deep Belief Networks • Deep Boltzman Machines • Micro-Architecture
  • 16. HARDWARE SPECIFICATIONS PROCESSOR ARM PROCESSOR RAM 1GB STORAGE ROM 8GB OPERATING SYSTEM LINUX DISPLAY 5-inch LCD screen, resolution: 1024 * 600 @ 60HZ CASING & COVER Aluminum alloy shell; organic glazed panel PERFORMANCE RECOGNITION HEIGHT 1.2-2.2 meters RECOGNITION DISTANCE 0.5-4 meters FACE ANGLE 35 degrees left and right, 35 degrees up and down RECOGNITION TIME Within 100 milliseconds STATUS DELIVERY Recognized name will be shown on the screen FACE DATABASE SIZE 50,000 (expandable) CAMERA SPECIFICATION CAMERA HDR, auto/manual exposure SENSOR 1 / 2.7” industrial Dual HD wide motion image sensor FRAME RATE Up to 30 frames, no smear LED SPECTRUM White EFFECTIVE PIXELS 1920 * 1080 LENS M12 (f = 7MM) Device with Specification
  • 17. Other Application / Use case • Contactless Visitor Management system • Enhancing retail customer experience using Face Recognition • Criminal identification using CCTV • Face Authentication based payment system • Proctoring & Impersonation Management for Online testing & Examination • De-Duplication & fraud identification for banks, insurance, government ID etc. • Covid-19 application for Quarantine, Mask Violation, Crowd & Social Distancing
  • 18. Attendance, Access & Visitor Management Visitor ManagementAttendance Management Access Management
  • 19. Enhanced VIP/Premium Customer Experience • VIP Facial Recognition system helps you retain premium customers and enhances service level experience • Helps deliver first-class customer care • Keep track of and identify high value premium customers
  • 20. Body Worn Camera MatchCriminal Database Identification & Matching Criminal Identification & Matching
  • 21. Online Proctoring: Prevents Test/Exam impersonation Authenticate and Monitor Examinees Remote Test/Exam Invigilation Process
  • 22. De-Duplicate from millions of Records De-Duplication & Fraud Management Identify & Match Fraudsters
  • 23. Covid-19:Quarantine Management Random & On Demand Geo-fenced Face based Covid-19 Suspect attendance & Monitoring for Home/Covid-19 Isolation Centers
  • 24. Crowd Count & Monitoring – Social Distancing
  • 25. Face Mask Violation Identify and Alert Face mask violations from Camera Feeds
  • 26. Reach out to us PRIME INFOSERV LLP DL-124, 1st Floor, Salt Lake, Sector – II, Kolkata – 700091, West Bengal, India Email : info@primeinfoserv.com Web : www.primeinfoserv.com (AN ISO 9001:2015 AND 27001:2013 CERTIFIED ENTERPRISE) Phone : 7890019076, 89611 82794, 98306 65397, 9830017040