SlideShare a Scribd company logo
Viseum UK
iVOS FaceRec
Viseum UK
iVOS FaceRec
Making people’s faces the world’s
greatest security weapon against
crime and terrorism.
• All types face recognition systems have proven to have a low success rate due to the complexity of this
technology, and an incompatibility between different cameras and recording media.
• The best face recognition systems can only recognise faces if their images are collected from the same CCTV
camera model that re-captures the face.
• The Viseum UK brand is well known for solving problems and with trusted technical performance and
reliability. The Viseum iVOS FaceRec Software Technology services:
• Has the highest success rate proven throughout the world, and
• Its images of faces are re-captured and collected independently of the make and model of any camera,
or recording devise.
Problems
Solution
Viseum iVOS FaceRec protects the Public, Police, Property, Community and Society through the
Technology of Facial Biometrics and Analytics in conjunction with the fully compliant use of Image
Management and Image Sharing under the UK Data Protection Act 1998.
Viseum Automated Person Recognition (VAPR) uses the most up-to-date technology to identify facial
features and to match them with facial features stored in relevant “Suspects” databases. Most people
have heard of ANPR Automated Number Plate recognition: this now brings that recognised and well-used
system to the recognition of human beings.
The surveillance camera captures images and “identifies” the facial images. The system temporarily
stores the facial image on a database for possible future use if an incident occurs , while simultaneously
comparing the newly collected facial image with those held on relevant database(s) – mainly “suspect”
databases of wanted or unsuitable persons in the case of Crime Prevention.
Through instant-matching capabilities, when a positive match occurs an alarm is automatically issued to
either a control room or to an individual on a hand-held device for them to take appropriate action.
Specific procedures are in place for the addition and removal of facial images to the database(s). The
system is totally transparent to those whose images are being captured and all relevant information
readily available as required by Data Protection legislation.
Vis-SEEK has been identified for many non security applications including vehicle immobilisation /
incapacitation and ATM security check of matching the facial image taken in the car or at the ATM with a
pre-registered facial image. If the match is not successful then the car will not start or the ATM will retain
the card for investigation.
Vis-SEARCH is used to search specific databases “post-event” using images collected as part of the
evidence gathering to be searched for. This is a particularly useful tool through use of stored images in
databases being used to match with persons captured in “evidence CCTV” – thus not relying on police
officers’ local knowledge and individual memory.
This allows post-incident identification to be carried out in a structured and strategic manner.
CAMERAS
LOCAL
SERVER
(in customers business)
Main
server
Central
server and
database
HANDSET
Relays
information
to hand set
Monitoring people
Stores images of
suspects, and
enables upload of
new suspects
Communicates and
possible positives
instantly
Continuous
connection
Stores 7 days of
full length footage
iVOS RacRec
Admin SystemUploads
information
to central
database
Receives
alerts from
database
Can investigate
main server to
retrieve images to
upload to central
Database unit
USER
Allows user to take
action and prevent crime
User can contact
SafetyWatch Admin 24/7
to interrogate system
Isolate Image (data)Live Footage
Video Content
Image
Automatically
Analyzed
Verify against
Database(s)
Upload to
Database(s)
Automatically Monitor
Identification
Alert end user:
“Prevent the Crime”
Face recognition-software-presentation
Face recognition-software-presentation

More Related Content

Similar to Face recognition-software-presentation

Face Recognition System using OpenCV
Face Recognition System using OpenCVFace Recognition System using OpenCV
Face Recognition System using OpenCV
IRJET Journal
 
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural NetworksIRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
IRJET Journal
 
attendence system face detection
attendence system face detectionattendence system face detection
attendence system face detection
StudentRocks
 
Do you know ai is making video surveillance systems smarter
Do you know ai is making video surveillance systems smarterDo you know ai is making video surveillance systems smarter
Do you know ai is making video surveillance systems smarter
rajpatel787077
 
iFalcon Face Control Mobile
iFalcon Face Control MobileiFalcon Face Control Mobile
iFalcon Face Control Mobile
NNTC Innovative Technology Company
 
smart security infrastructure
smart security infrastructuresmart security infrastructure
smart security infrastructure
Shreyas Satpute
 
VidSys Public Safety Solution Sheet
VidSys Public Safety Solution SheetVidSys Public Safety Solution Sheet
VidSys Public Safety Solution Sheet
VidSys, Inc.
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security Infrastructure
GAURAV. H .TANDON
 
Video Crime Monitoring
Video Crime MonitoringVideo Crime Monitoring
Video Crime Monitoring
ijtsrd
 
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET Journal
 
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdf
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdfTop 16 Applications of Computer Vision in Video Surveillance and Security.pdf
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdf
Sabhanayagham Thirugnanasambandam
 
Final PPT.pptx
Final PPT.pptxFinal PPT.pptx
Final PPT.pptx
GAMINGRBF
 
ATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural NetworksATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural Networks
IRJET Journal
 
IVS Presentation
IVS PresentationIVS Presentation
IVS Presentation
JB Online
 
Unlocking Security and Efficiency: The Advantages of Installing a CCTV System
Unlocking Security and Efficiency: The Advantages of Installing a CCTV SystemUnlocking Security and Efficiency: The Advantages of Installing a CCTV System
Unlocking Security and Efficiency: The Advantages of Installing a CCTV System
harryh79181267
 
karsof systems biometrics brochure
karsof systems biometrics brochurekarsof systems biometrics brochure
karsof systems biometrics brochure
Colin Valencia
 
Physical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the GovernmentPhysical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the Government
VidSys, Inc.
 
foot crime final for awareness site .pptx
foot crime final for awareness site .pptxfoot crime final for awareness site .pptx
foot crime final for awareness site .pptx
ImmanImman6
 

Similar to Face recognition-software-presentation (20)

Face Recognition System using OpenCV
Face Recognition System using OpenCVFace Recognition System using OpenCV
Face Recognition System using OpenCV
 
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural NetworksIRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
 
attendence system face detection
attendence system face detectionattendence system face detection
attendence system face detection
 
Do you know ai is making video surveillance systems smarter
Do you know ai is making video surveillance systems smarterDo you know ai is making video surveillance systems smarter
Do you know ai is making video surveillance systems smarter
 
april201629
april201629april201629
april201629
 
iFalcon Face Control Mobile
iFalcon Face Control MobileiFalcon Face Control Mobile
iFalcon Face Control Mobile
 
smart security infrastructure
smart security infrastructuresmart security infrastructure
smart security infrastructure
 
VidSys Public Safety Solution Sheet
VidSys Public Safety Solution SheetVidSys Public Safety Solution Sheet
VidSys Public Safety Solution Sheet
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security Infrastructure
 
Video Crime Monitoring
Video Crime MonitoringVideo Crime Monitoring
Video Crime Monitoring
 
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
 
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdf
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdfTop 16 Applications of Computer Vision in Video Surveillance and Security.pdf
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdf
 
Final PPT.pptx
Final PPT.pptxFinal PPT.pptx
Final PPT.pptx
 
ATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural NetworksATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural Networks
 
IVS Presentation
IVS PresentationIVS Presentation
IVS Presentation
 
Unlocking Security and Efficiency: The Advantages of Installing a CCTV System
Unlocking Security and Efficiency: The Advantages of Installing a CCTV SystemUnlocking Security and Efficiency: The Advantages of Installing a CCTV System
Unlocking Security and Efficiency: The Advantages of Installing a CCTV System
 
karsof systems biometrics brochure
karsof systems biometrics brochurekarsof systems biometrics brochure
karsof systems biometrics brochure
 
Physical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the GovernmentPhysical Security Information Management (PSIM) Solution for the Government
Physical Security Information Management (PSIM) Solution for the Government
 
ASISwhitepaper[2]
ASISwhitepaper[2]ASISwhitepaper[2]
ASISwhitepaper[2]
 
foot crime final for awareness site .pptx
foot crime final for awareness site .pptxfoot crime final for awareness site .pptx
foot crime final for awareness site .pptx
 

More from Stuart Thompson Viseum Group Owner & President

Viseum certified-technology-partner-program
Viseum certified-technology-partner-programViseum certified-technology-partner-program
Viseum certified-technology-partner-program
Stuart Thompson Viseum Group Owner & President
 
Uk cctv-viseum-strategy-recommendations
Uk cctv-viseum-strategy-recommendationsUk cctv-viseum-strategy-recommendations
Uk cctv-viseum-strategy-recommendations
Stuart Thompson Viseum Group Owner & President
 
Viseum security-project-management
Viseum security-project-managementViseum security-project-management
Viseum security-project-management
Stuart Thompson Viseum Group Owner & President
 
Thermal radar-perimeter-surveillance-systems
Thermal radar-perimeter-surveillance-systemsThermal radar-perimeter-surveillance-systems
Thermal radar-perimeter-surveillance-systems
Stuart Thompson Viseum Group Owner & President
 
Surveillance system-situational-awareness-people-surveillance
Surveillance system-situational-awareness-people-surveillanceSurveillance system-situational-awareness-people-surveillance
Surveillance system-situational-awareness-people-surveillance
Stuart Thompson Viseum Group Owner & President
 
Perimeter surveillance-systems
Perimeter surveillance-systemsPerimeter surveillance-systems
Perimeter surveillance-systems
Stuart Thompson Viseum Group Owner & President
 
People surveillance-systems-command-control-and-communications
People surveillance-systems-command-control-and-communicationsPeople surveillance-systems-command-control-and-communications
People surveillance-systems-command-control-and-communications
Stuart Thompson Viseum Group Owner & President
 
Panoramic security-camera
Panoramic security-cameraPanoramic security-camera
Baggage handling-innovation-examples
Baggage handling-innovation-examplesBaggage handling-innovation-examples
Baggage handling-innovation-examples
Stuart Thompson Viseum Group Owner & President
 
Viseum thermal-security-camera-comparison
Viseum thermal-security-camera-comparisonViseum thermal-security-camera-comparison
Viseum thermal-security-camera-comparison
Stuart Thompson Viseum Group Owner & President
 
Viseum technology-and-support-strengths
Viseum technology-and-support-strengthsViseum technology-and-support-strengths
Viseum technology-and-support-strengths
Stuart Thompson Viseum Group Owner & President
 
Viseum surveillance-technology-credentials
Viseum surveillance-technology-credentialsViseum surveillance-technology-credentials
Viseum surveillance-technology-credentials
Stuart Thompson Viseum Group Owner & President
 
Viseum security-site-survey
Viseum security-site-surveyViseum security-site-survey

More from Stuart Thompson Viseum Group Owner & President (17)

Viseum certified-technology-partner-program
Viseum certified-technology-partner-programViseum certified-technology-partner-program
Viseum certified-technology-partner-program
 
Uk cctv-viseum-strategy-recommendations
Uk cctv-viseum-strategy-recommendationsUk cctv-viseum-strategy-recommendations
Uk cctv-viseum-strategy-recommendations
 
Viseum security-project-management
Viseum security-project-managementViseum security-project-management
Viseum security-project-management
 
Thermal radar-perimeter-surveillance-systems
Thermal radar-perimeter-surveillance-systemsThermal radar-perimeter-surveillance-systems
Thermal radar-perimeter-surveillance-systems
 
Temporary CCTV redeployable-cctv
Temporary CCTV redeployable-cctvTemporary CCTV redeployable-cctv
Temporary CCTV redeployable-cctv
 
Surveillance system-situational-awareness-people-surveillance
Surveillance system-situational-awareness-people-surveillanceSurveillance system-situational-awareness-people-surveillance
Surveillance system-situational-awareness-people-surveillance
 
Safe city-people-vehicles
Safe city-people-vehiclesSafe city-people-vehicles
Safe city-people-vehicles
 
Rapid deployment-cctv-intelligent-cctv-trailer
Rapid deployment-cctv-intelligent-cctv-trailerRapid deployment-cctv-intelligent-cctv-trailer
Rapid deployment-cctv-intelligent-cctv-trailer
 
Police force
Police forcePolice force
Police force
 
Perimeter surveillance-systems
Perimeter surveillance-systemsPerimeter surveillance-systems
Perimeter surveillance-systems
 
People surveillance-systems-command-control-and-communications
People surveillance-systems-command-control-and-communicationsPeople surveillance-systems-command-control-and-communications
People surveillance-systems-command-control-and-communications
 
Panoramic security-camera
Panoramic security-cameraPanoramic security-camera
Panoramic security-camera
 
Baggage handling-innovation-examples
Baggage handling-innovation-examplesBaggage handling-innovation-examples
Baggage handling-innovation-examples
 
Viseum thermal-security-camera-comparison
Viseum thermal-security-camera-comparisonViseum thermal-security-camera-comparison
Viseum thermal-security-camera-comparison
 
Viseum technology-and-support-strengths
Viseum technology-and-support-strengthsViseum technology-and-support-strengths
Viseum technology-and-support-strengths
 
Viseum surveillance-technology-credentials
Viseum surveillance-technology-credentialsViseum surveillance-technology-credentials
Viseum surveillance-technology-credentials
 
Viseum security-site-survey
Viseum security-site-surveyViseum security-site-survey
Viseum security-site-survey
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 

Face recognition-software-presentation

  • 2. Making people’s faces the world’s greatest security weapon against crime and terrorism.
  • 3.
  • 4. • All types face recognition systems have proven to have a low success rate due to the complexity of this technology, and an incompatibility between different cameras and recording media. • The best face recognition systems can only recognise faces if their images are collected from the same CCTV camera model that re-captures the face. • The Viseum UK brand is well known for solving problems and with trusted technical performance and reliability. The Viseum iVOS FaceRec Software Technology services: • Has the highest success rate proven throughout the world, and • Its images of faces are re-captured and collected independently of the make and model of any camera, or recording devise. Problems Solution
  • 5.
  • 6. Viseum iVOS FaceRec protects the Public, Police, Property, Community and Society through the Technology of Facial Biometrics and Analytics in conjunction with the fully compliant use of Image Management and Image Sharing under the UK Data Protection Act 1998. Viseum Automated Person Recognition (VAPR) uses the most up-to-date technology to identify facial features and to match them with facial features stored in relevant “Suspects” databases. Most people have heard of ANPR Automated Number Plate recognition: this now brings that recognised and well-used system to the recognition of human beings.
  • 7. The surveillance camera captures images and “identifies” the facial images. The system temporarily stores the facial image on a database for possible future use if an incident occurs , while simultaneously comparing the newly collected facial image with those held on relevant database(s) – mainly “suspect” databases of wanted or unsuitable persons in the case of Crime Prevention. Through instant-matching capabilities, when a positive match occurs an alarm is automatically issued to either a control room or to an individual on a hand-held device for them to take appropriate action. Specific procedures are in place for the addition and removal of facial images to the database(s). The system is totally transparent to those whose images are being captured and all relevant information readily available as required by Data Protection legislation. Vis-SEEK has been identified for many non security applications including vehicle immobilisation / incapacitation and ATM security check of matching the facial image taken in the car or at the ATM with a pre-registered facial image. If the match is not successful then the car will not start or the ATM will retain the card for investigation.
  • 8. Vis-SEARCH is used to search specific databases “post-event” using images collected as part of the evidence gathering to be searched for. This is a particularly useful tool through use of stored images in databases being used to match with persons captured in “evidence CCTV” – thus not relying on police officers’ local knowledge and individual memory. This allows post-incident identification to be carried out in a structured and strategic manner.
  • 9.
  • 10. CAMERAS LOCAL SERVER (in customers business) Main server Central server and database HANDSET Relays information to hand set Monitoring people Stores images of suspects, and enables upload of new suspects Communicates and possible positives instantly Continuous connection Stores 7 days of full length footage iVOS RacRec Admin SystemUploads information to central database Receives alerts from database Can investigate main server to retrieve images to upload to central Database unit USER Allows user to take action and prevent crime User can contact SafetyWatch Admin 24/7 to interrogate system
  • 11. Isolate Image (data)Live Footage Video Content Image Automatically Analyzed Verify against Database(s) Upload to Database(s) Automatically Monitor Identification Alert end user: “Prevent the Crime”

Editor's Notes

  1. This presentation is about the innovative technology solutions that Viseum UK has brought to market to help governments deliver security services for their airports to make them safe and secure.
  2. The threats to everyday life cover many scenarios, which can be divided into categories, and run from the serious to what might be termed mundane – but all threaten the way of life for the citizens of a City: At one end, terrorist and / or insurgent attacks, which would encompass drive-by shootings using either small arms fire or rocket-propelled grenades… This would likely be linked to close-quarter assassination or kidnap, building assault, the placement of improvised explosive devices in a public place, suicide pedestrians or vehicle-born IEDs… Less violent, but nevertheless highly compromising of businesses and personnel, there’s opportunistic crime and low level spontaneous violence… Closely followed by public disorder, which may well compromise ordinary citizens as well as the police and government… And just as important to manage are highways road traffic and vehicle traffic flow. Viseum will work with you to provide a full analysis of all your needs and requirements – and meet them all.
  3. The threats to everyday life cover many scenarios, which can be divided into categories, and run from the serious to what might be termed mundane – but all threaten the way of life for the citizens of a City: At one end, terrorist and / or insurgent attacks, which would encompass drive-by shootings using either small arms fire or rocket-propelled grenades… This would likely be linked to close-quarter assassination or kidnap, building assault, the placement of improvised explosive devices in a public place, suicide pedestrians or vehicle-born IEDs… Less violent, but nevertheless highly compromising of businesses and personnel, there’s opportunistic crime and low level spontaneous violence… Closely followed by public disorder, which may well compromise ordinary citizens as well as the police and government… And just as important to manage are highways road traffic and vehicle traffic flow. Viseum will work with you to provide a full analysis of all your needs and requirements – and meet them all.
  4. The threats to everyday life cover many scenarios, which can be divided into categories, and run from the serious to what might be termed mundane – but all threaten the way of life for the citizens of a City: At one end, terrorist and / or insurgent attacks, which would encompass drive-by shootings using either small arms fire or rocket-propelled grenades… This would likely be linked to close-quarter assassination or kidnap, building assault, the placement of improvised explosive devices in a public place, suicide pedestrians or vehicle-born IEDs… Less violent, but nevertheless highly compromising of businesses and personnel, there’s opportunistic crime and low level spontaneous violence… Closely followed by public disorder, which may well compromise ordinary citizens as well as the police and government… And just as important to manage are highways road traffic and vehicle traffic flow. Viseum will work with you to provide a full analysis of all your needs and requirements – and meet them all.