SlideShare a Scribd company logo
1 of 11
IMPROVING AIRPORT SECURITY
USING ARTIFICIAL INTELLIGENCE
CONTENT
 Introduction
 Importance of AI in Airport Security
 How Airports are using AI to improve security
1. Identify risky behaviour
2. Detecting weapons
3. Facial recognition
 Conclusion
INTRODUCTION
 Artificial intelligence (AI) is a wide-ranging branch of computer science concerned with
building smart machines capable of performing tasks that typically require human intelligence.
 Artificial intelligence is the simulation of human intelligence processes by machines,
especially computer systems.
 The artificial intelligence is the process in which machine can act like a human. This robust
feature allows working in various fields easily. Some of primary application areas where the AI
can massively used is Military, Antiterrorism, Airport Security, Automobile Industry, Internet
Search Engines and Robotics etc
IMPORTANCE OF AI IN SECURITY
The following diagram shows the formal security system and the security based on Artificial intelligence
techniques:
Formal security system:
Security system based on AI:
Data from security devices Human Knowledge
Formal Security
System
Data from security devices AI based techniques
Enhanced
security system
AI IN AIRPORT
SECURITY
How Airports Are Using AI
to Improve Security
IDENTIFY RISKY BEHAVIOURS
 Currently Humans are responsible for
detecting risky behavior in passengers,
which have big room for errors.
 This could be done by collecting data
from security screenings, behavior
tracking, booking and travel history, and
more. So, the security of passengers and
the public wouldn’t only rely on a person’s
judgment, rather risky behavior could be
identified with end-to-end data.
DETECTING WEAPONS
Security cameras recognize in real-time if
someone holds a gun and automatically
triggers alarm.
 AI Video analytics integrated in the camera
app is able to distinguish weapons from
harmless objects like smartphones, keys,
pens or umbrellas.
HOW DOES IT
WORK?
It captures 3D radar images.
Then, the tool analyzes those images and video.
Detect any kind weapons.
If any, then alert
Hexwave can also detect weapons in bags and
luggage as well. These Hexwave units will be placed
outside of airport terminals so that threats can be
detected before they even get inside.
FACIAL RECOGNITION
 It deals with the high-level understanding
of digital images or videos.
 Software reads the geometry of your face.
 Key factors include the distance between
your eyes and the distance from forehead
to chin.
 Prevent terrorism and protect borders.
HOW DOES IT
WORKS?
Face Recognition Operations:
1. Face Detection : The camera will detect and recognize a
face.
2. Face Analysis: The photo of the face is captured and
analyzed.
3. Image to Data Conversion: Now it is converted to a
mathematical formula and these facial features become
numbers.
4. Match Finding: Then the code is compared against a
database of other face prints.
CONCLUSION
 While AI-powered security tools like full-body scanners, behavior analysis, and face
recognition may be unnerving to some, they’re necessary tools to prevent threats and keep
passengers safe. With the power of artificial intelligence, airports and airlines will soon be able
to improve security and provide a better customer experience to travelers at the same time.
And AI-powered security tools are constantly advancing, so there’s no telling what more
they’ll be able to do in the near future.

More Related Content

What's hot

Future Warfare
Future WarfareFuture Warfare
Future Warfare
Vapula
 
The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact Us
PECB
 

What's hot (20)

“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19
 
Cyber Security in Bangladesh
Cyber Security in Bangladesh Cyber Security in Bangladesh
Cyber Security in Bangladesh
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 
Artificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for CybersecurityArtificial Intelligence and Machine Learning for Cybersecurity
Artificial Intelligence and Machine Learning for Cybersecurity
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical Systems
 
Smart Cities – The Security Aspects
Smart Cities – The Security AspectsSmart Cities – The Security Aspects
Smart Cities – The Security Aspects
 
3 Military Applications of the Internet of Things
3 Military Applications of the Internet of Things3 Military Applications of the Internet of Things
3 Military Applications of the Internet of Things
 
An overview of embedded systems in automobiles(With instructional videos)
An overview of embedded systems in automobiles(With instructional videos)An overview of embedded systems in automobiles(With instructional videos)
An overview of embedded systems in automobiles(With instructional videos)
 
Cyber security and AI
Cyber security and AICyber security and AI
Cyber security and AI
 
Internet of vehicles, vehicular social networks and cybersecurity
Internet of vehicles, vehicular social networks and cybersecurityInternet of vehicles, vehicular social networks and cybersecurity
Internet of vehicles, vehicular social networks and cybersecurity
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Threat Intelligence
Threat IntelligenceThreat Intelligence
Threat Intelligence
 
IOT for Smart City
IOT for Smart CityIOT for Smart City
IOT for Smart City
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Artificial Intelligence for Policing
Artificial Intelligence for PolicingArtificial Intelligence for Policing
Artificial Intelligence for Policing
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crime
 
Future Warfare
Future WarfareFuture Warfare
Future Warfare
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
The Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact UsThe Future of Security: How Artificial Intelligence Will Impact Us
The Future of Security: How Artificial Intelligence Will Impact Us
 

Similar to Improving security at airports using AI

Similar to Improving security at airports using AI (20)

Ai presentation on using of Artificial intelligence in smart cities
Ai presentation on using of Artificial intelligence in smart citiesAi presentation on using of Artificial intelligence in smart cities
Ai presentation on using of Artificial intelligence in smart cities
 
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdf
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdfTop 16 Applications of Computer Vision in Video Surveillance and Security.pdf
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdf
 
Computer vision ppt
Computer vision pptComputer vision ppt
Computer vision ppt
 
Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technology
 
Do you know ai is making video surveillance systems smarter
Do you know ai is making video surveillance systems smarterDo you know ai is making video surveillance systems smarter
Do you know ai is making video surveillance systems smarter
 
AUTOMATIC NUMBER PLATE RECOGNITION and Violation processing
AUTOMATIC NUMBER PLATE RECOGNITION and Violation processing AUTOMATIC NUMBER PLATE RECOGNITION and Violation processing
AUTOMATIC NUMBER PLATE RECOGNITION and Violation processing
 
Sixth sense
Sixth senseSixth sense
Sixth sense
 
Smart Surveillance System through Computer Vision
Smart Surveillance System through Computer VisionSmart Surveillance System through Computer Vision
Smart Surveillance System through Computer Vision
 
Controlling Computer using Hand Gestures
Controlling Computer using Hand GesturesControlling Computer using Hand Gestures
Controlling Computer using Hand Gestures
 
DOC-20230723-WA0000..pptx
DOC-20230723-WA0000..pptxDOC-20230723-WA0000..pptx
DOC-20230723-WA0000..pptx
 
Artificial intelligence for cctv cameras, video surveillance
Artificial intelligence for cctv cameras, video surveillanceArtificial intelligence for cctv cameras, video surveillance
Artificial intelligence for cctv cameras, video surveillance
 
Sixth sense technology,veenit
Sixth sense technology,veenitSixth sense technology,veenit
Sixth sense technology,veenit
 
Apple Face ID
Apple Face IDApple Face ID
Apple Face ID
 
AI Technology Is Making Us Safer: Is That So?
AI Technology Is Making Us Safer: Is That So?AI Technology Is Making Us Safer: Is That So?
AI Technology Is Making Us Safer: Is That So?
 
Mobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An IntroductionMobile Apps and Security Attacks: An Introduction
Mobile Apps and Security Attacks: An Introduction
 
How AI is Changing the World of Cybersecurity.pdf
How AI is Changing the World of Cybersecurity.pdfHow AI is Changing the World of Cybersecurity.pdf
How AI is Changing the World of Cybersecurity.pdf
 
Technological trends 2017
Technological trends 2017Technological trends 2017
Technological trends 2017
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
IRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing Review
IRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing ReviewIRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing Review
IRJET- Sixth Sense Technology: A Gesture-Based Wearable Computing Review
 
Malware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault AnalysisMalware Bytes – Advanced Fault Analysis
Malware Bytes – Advanced Fault Analysis
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Improving security at airports using AI

  • 1. IMPROVING AIRPORT SECURITY USING ARTIFICIAL INTELLIGENCE
  • 2. CONTENT  Introduction  Importance of AI in Airport Security  How Airports are using AI to improve security 1. Identify risky behaviour 2. Detecting weapons 3. Facial recognition  Conclusion
  • 3. INTRODUCTION  Artificial intelligence (AI) is a wide-ranging branch of computer science concerned with building smart machines capable of performing tasks that typically require human intelligence.  Artificial intelligence is the simulation of human intelligence processes by machines, especially computer systems.  The artificial intelligence is the process in which machine can act like a human. This robust feature allows working in various fields easily. Some of primary application areas where the AI can massively used is Military, Antiterrorism, Airport Security, Automobile Industry, Internet Search Engines and Robotics etc
  • 4. IMPORTANCE OF AI IN SECURITY The following diagram shows the formal security system and the security based on Artificial intelligence techniques: Formal security system: Security system based on AI: Data from security devices Human Knowledge Formal Security System Data from security devices AI based techniques Enhanced security system
  • 5. AI IN AIRPORT SECURITY How Airports Are Using AI to Improve Security
  • 6. IDENTIFY RISKY BEHAVIOURS  Currently Humans are responsible for detecting risky behavior in passengers, which have big room for errors.  This could be done by collecting data from security screenings, behavior tracking, booking and travel history, and more. So, the security of passengers and the public wouldn’t only rely on a person’s judgment, rather risky behavior could be identified with end-to-end data.
  • 7. DETECTING WEAPONS Security cameras recognize in real-time if someone holds a gun and automatically triggers alarm.  AI Video analytics integrated in the camera app is able to distinguish weapons from harmless objects like smartphones, keys, pens or umbrellas.
  • 8. HOW DOES IT WORK? It captures 3D radar images. Then, the tool analyzes those images and video. Detect any kind weapons. If any, then alert Hexwave can also detect weapons in bags and luggage as well. These Hexwave units will be placed outside of airport terminals so that threats can be detected before they even get inside.
  • 9. FACIAL RECOGNITION  It deals with the high-level understanding of digital images or videos.  Software reads the geometry of your face.  Key factors include the distance between your eyes and the distance from forehead to chin.  Prevent terrorism and protect borders.
  • 10. HOW DOES IT WORKS? Face Recognition Operations: 1. Face Detection : The camera will detect and recognize a face. 2. Face Analysis: The photo of the face is captured and analyzed. 3. Image to Data Conversion: Now it is converted to a mathematical formula and these facial features become numbers. 4. Match Finding: Then the code is compared against a database of other face prints.
  • 11. CONCLUSION  While AI-powered security tools like full-body scanners, behavior analysis, and face recognition may be unnerving to some, they’re necessary tools to prevent threats and keep passengers safe. With the power of artificial intelligence, airports and airlines will soon be able to improve security and provide a better customer experience to travelers at the same time. And AI-powered security tools are constantly advancing, so there’s no telling what more they’ll be able to do in the near future.