Facial recognition is both a science as well as an art. While there are various theories available on getting it correct, it depends on real situation on ground to achieve the intended result. Apart from quality of enrolled and probe images, it is relatively important to consider other non-technical aspect which could be equally important. This guide does not gives you a special formula to cover all situation, but to provide sucient guidance to achieve optimum result. Many of it might be very minor that one could easily missed out and spend much time and resources to eventually rectify it.
Xeric is a multimodal surveillance platform that provides real-time operations, post-investigation capabilities, and scalability for various security scenarios. It integrates with different sensors and analytics. Xeric allows authorities to build border security systems modularly and expand capabilities incrementally. Some key applications of Xeric include immigration checkpoints, where it uses facial recognition to identify individuals in large crowds and databases, and mobile patrol, where officers can use Xeric on their phones to identify suspects. Xeric is designed to be flexible and adaptable to different operational needs through portable and modular components.
Xeric CloudFR forms a module of Xeric Suite which is a Multimodal Surveillance Platform. Xeric CloudFR enable both retailer and law enforcement agencies to benefit for their needs. This could also be a mean to expand coverage of city surveillance.
Face Recognition System for Door UnlockingHassan Tariq
This is age of Modern Technology and it's becoming necessity
for everyone. Our project is on one of the most basic
daily life security system. As there was a time, when you
had to open the door by yourself or u needed a key of
some sort or a person for guarding some room.
our project changes that view, as we have automated
that old method. It's user friendly and no human interaction
is needed.Door unlocking to provide essential security to our homes, bank lockers , server rooms , private chambers and offices etc.
Face Detection and Recognition System (FDRS) is a physical characteristics recognition technology, using the inherent physiological features of humans for ID recognition. The technology does not need to be carried about and will not be lost, so it is convenient and safe for use
This document outlines a project on face recognition. It discusses biometrics and why face recognition was chosen over other methods. Applications of face recognition are presented for law enforcement, security, immigration, residential security, banking, and mobile unlocking. The working process of face recognition involves inputting an image, detecting the face, and recognizing the face by matching it to a database. The current progress includes detecting faces and face parts using a modified Viola-Jones algorithm. Future work will involve matching detected faces to images in a created database for recognition. Advantages of face recognition include convenience and limitations include inability to distinguish identical twins.
This document discusses the history and development of facial recognition systems. It describes how pioneers in the 1960s began developing early systems using graphics tablets, and the challenges of accounting for variability in lighting, expression, and other factors. The document outlines different types of current facial recognition approaches, including traditional 2D recognition and emerging 3D recognition techniques. It provides examples of software using facial recognition and potential applications that have been developed or could be developed. A survey of Hong Kong citizens found facial recognition is not very common but many would be interested in using it on computers or for access control. The conclusion discusses both benefits and privacy concerns of the technology.
Xeric is a multimodal surveillance platform that provides real-time operations, post-investigation capabilities, and scalability for various security scenarios. It integrates with different sensors and analytics. Xeric allows authorities to build border security systems modularly and expand capabilities incrementally. Some key applications of Xeric include immigration checkpoints, where it uses facial recognition to identify individuals in large crowds and databases, and mobile patrol, where officers can use Xeric on their phones to identify suspects. Xeric is designed to be flexible and adaptable to different operational needs through portable and modular components.
Xeric CloudFR forms a module of Xeric Suite which is a Multimodal Surveillance Platform. Xeric CloudFR enable both retailer and law enforcement agencies to benefit for their needs. This could also be a mean to expand coverage of city surveillance.
Face Recognition System for Door UnlockingHassan Tariq
This is age of Modern Technology and it's becoming necessity
for everyone. Our project is on one of the most basic
daily life security system. As there was a time, when you
had to open the door by yourself or u needed a key of
some sort or a person for guarding some room.
our project changes that view, as we have automated
that old method. It's user friendly and no human interaction
is needed.Door unlocking to provide essential security to our homes, bank lockers , server rooms , private chambers and offices etc.
Face Detection and Recognition System (FDRS) is a physical characteristics recognition technology, using the inherent physiological features of humans for ID recognition. The technology does not need to be carried about and will not be lost, so it is convenient and safe for use
This document outlines a project on face recognition. It discusses biometrics and why face recognition was chosen over other methods. Applications of face recognition are presented for law enforcement, security, immigration, residential security, banking, and mobile unlocking. The working process of face recognition involves inputting an image, detecting the face, and recognizing the face by matching it to a database. The current progress includes detecting faces and face parts using a modified Viola-Jones algorithm. Future work will involve matching detected faces to images in a created database for recognition. Advantages of face recognition include convenience and limitations include inability to distinguish identical twins.
This document discusses the history and development of facial recognition systems. It describes how pioneers in the 1960s began developing early systems using graphics tablets, and the challenges of accounting for variability in lighting, expression, and other factors. The document outlines different types of current facial recognition approaches, including traditional 2D recognition and emerging 3D recognition techniques. It provides examples of software using facial recognition and potential applications that have been developed or could be developed. A survey of Hong Kong citizens found facial recognition is not very common but many would be interested in using it on computers or for access control. The conclusion discusses both benefits and privacy concerns of the technology.
This document discusses a face identification system to identify criminals. The system stores images of known criminals along with their details in a database. Eyewitnesses can then help construct a face using image slices from the database, which is compared to stored images. If a match of 99% or more is found, the person is identified as the criminal. The objectives, advantages, and disadvantages of the system are provided. Technical, economic, and operational feasibility of the system are also analyzed.
The document provides guidance on selecting the best industrial camera for a system. It recommends a 3-step process: 1) Identify key camera parameters and prioritize requirements, 2) Compare specifications of existing cameras and develop a shortlist, 3) Evaluate top cameras by measuring image quality and system performance. The process aims to find the camera best matching needs within budget and supplier considerations.
Facial recognition systems use computer applications to identify or verify people from images or video by comparing facial features to a database. They analyze over 80 nodal points on faces, such as eye distance and nose width. 3D modeling provides more accuracy by measuring curves and creating unique templates to match against databases. While useful for security and IDs, facial recognition raises privacy issues if misused due to its ability to identify people without consent.
Biometrics refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.
Biometrics refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.
This document discusses key concepts around video surveillance resolution:
1. Resolution traditionally referred to the ability to resolve details, but now usually refers to pixel count in surveillance cameras. Pixel count determines the potential quality, but other factors like low light performance also impact image quality.
2. Common resolutions for surveillance cameras include 1080p, 720p, 5MP, and 4K. Higher resolutions can capture more details but performance can vary depending on lighting conditions.
3. The sensor resolution may be higher than the maximum stream resolution available. Integrators also sometimes set cameras to stream at lower resolutions than maximum.
4. Compression greatly impacts resolution - high compression can significantly reduce bandwidth needs but also impact visible image quality
Basic Concepts in Photo Editing
Explore and examine the basic concepts and underlying principles of Photo Editing specifically using the Adobe Photoshop
This document provides an overview of facial recognition technology. It begins with an introduction to biometrics and how facial recognition works as a biometric method. It then describes the process of facial recognition which includes image acquisition, processing, locating distinctive facial characteristics, template creation, and template matching. The document discusses implementations, strengths, weaknesses and applications of facial recognition technology. It concludes by noting some of the challenges but also potential of the technology.
This document summarizes face recognition technology. It discusses how face recognition works by measuring facial landmarks and creating a face print for identification and verification purposes. Recent advances include 3D facial recognition, which can identify faces from different angles. The document outlines the history of facial recognition and discusses current and potential uses, such as border security and airport passenger screening. It also notes some limitations, such as the potential for privacy issues and identity theft if the data is compromised.
This document summarizes face recognition technology. It discusses how face recognition works by measuring facial landmarks and creating a face print for identification and verification purposes. Recent advances include 3D facial recognition, which can identify faces from different angles. The document outlines the history of facial recognition and discusses current and potential uses, such as border security and ATM verification. However, it also notes privacy and security concerns about the use of facial recognition without consent.
Enhance Example-Based Super Resolution to Achieve Fine Magnification of Low ...IJMER
This paper proposes an enhanced example-based super resolution method to achieve fine magnification of low resolution images using a neighbor embedding method. The proposed method has two phases: 1) A dictionary construction phase that extracts patch pairs from high and low resolution images and stores them in a dictionary. K-means trees are used to organize the patches. 2) A super resolution phase that searches the dictionary using neighbor embedding to find the best matching high resolution patch to synthesize the output image. Non-local mean filtering is then applied to remove blurring. Experimental results on text images show the proposed method improves image quality over other techniques by reducing blurring and artifacts.
IRJET- Human Face Recognition in Video using Convolutional Neural Network (CNN)IRJET Journal
This document describes a method for human face recognition in videos using convolutional neural networks (CNNs). It involves preprocessing video frames to grayscale, detecting faces using Viola-Jones detection, extracting features using BRISK, and classifying faces using a CNN. The CNN approach improves efficiency and accuracy in detecting faces under varying poses and illumination conditions compared to previous methods. The goal is to develop a system that can accurately recognize faces in videos despite challenges like illumination changes, poses, occlusions, etc.
A facial recognition system uses computer applications to identify or verify a person from images or video by comparing facial features to a database. It can be used for security systems and is similar to other biometrics like fingerprints. Some key parts of faces used for comparison include the distance between the eyes, width of the nose, and structure of cheek bones. Algorithms continue improving to account for challenges like changes in lighting or facial expressions. Facial recognition has various applications and is expected to become more widespread and integrated into security and social networks in the future.
This slide can help you to enter the world of match moving or 3D tracking. before start any tracking work you need to know these basics. Here you can learn types of tracking, camera, lens, Survey Data etc which are require for Match moving.
The document discusses face recognition technology as a biometric authentication method. It describes how face recognition works by detecting nodal points on faces and creating unique faceprints. The advantages are that face recognition is convenient, socially acceptable and inexpensive compared to other biometrics. However, face recognition has difficulties with identical twins and environmental/appearance changes reducing accuracy over time. The document also outlines applications in security, law enforcement, banking, and commercial access control.
IRJET- Survey on Face Recognition using BiometricsIRJET Journal
This document describes a survey on face recognition using biometrics. It discusses using the Haar cascade algorithm with OpenCV in Python to detect faces in images and video. The algorithm involves selecting Haar features, creating integral images for rapid calculation of features, training classifiers with AdaBoost, and cascading the classifiers. It trains on positive and negative image datasets to detect faces and then recognizes faces by extracting principal components and comparing to trained data. The system fulfills basic face detection and recognition needs at low cost for applications like security and real-time analysis. Improving the algorithm involves adding more training images to increase accuracy.
IRJET- Biometric Eye Recognition using Alex-NetIRJET Journal
This document presents a framework for eye recognition using deep learning. The framework takes whole eye images as input rather than segmented iris images. It uses the pre-trained AlexNet convolutional neural network to extract features from the eye images. These features are then classified using a support vector machine algorithm. The framework is tested on two eye image datasets and achieved high accuracy rates. Key advantages of the framework include that it relaxes the need for precise iris segmentation and improves upon traditional iris recognition systems.
Here are Important things about Image and Video Annotation that you should know for machine learning and to make your annotation project well & good your vision our thoughts.
Unity Suite - a unified platform that provides you with business tools to run your business and subscribe to the features when you need it. Unity Suite converges your business tools, enabling you to run your business and make critical decisions on the move, giving you the control to your business anytime, anywhere. Unity Suite also unites your Offline & Online presences, managing them as a single entity.
What are we really doing as a company? While we started off wanting to work on Facial Recognition, we realised that we are also good to solve customer's problem. Focusing on the Human, we understand their Process, what they want and leveraging on Technology to help them.
This document discusses a face identification system to identify criminals. The system stores images of known criminals along with their details in a database. Eyewitnesses can then help construct a face using image slices from the database, which is compared to stored images. If a match of 99% or more is found, the person is identified as the criminal. The objectives, advantages, and disadvantages of the system are provided. Technical, economic, and operational feasibility of the system are also analyzed.
The document provides guidance on selecting the best industrial camera for a system. It recommends a 3-step process: 1) Identify key camera parameters and prioritize requirements, 2) Compare specifications of existing cameras and develop a shortlist, 3) Evaluate top cameras by measuring image quality and system performance. The process aims to find the camera best matching needs within budget and supplier considerations.
Facial recognition systems use computer applications to identify or verify people from images or video by comparing facial features to a database. They analyze over 80 nodal points on faces, such as eye distance and nose width. 3D modeling provides more accuracy by measuring curves and creating unique templates to match against databases. While useful for security and IDs, facial recognition raises privacy issues if misused due to its ability to identify people without consent.
Biometrics refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.
Biometrics refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.
This document discusses key concepts around video surveillance resolution:
1. Resolution traditionally referred to the ability to resolve details, but now usually refers to pixel count in surveillance cameras. Pixel count determines the potential quality, but other factors like low light performance also impact image quality.
2. Common resolutions for surveillance cameras include 1080p, 720p, 5MP, and 4K. Higher resolutions can capture more details but performance can vary depending on lighting conditions.
3. The sensor resolution may be higher than the maximum stream resolution available. Integrators also sometimes set cameras to stream at lower resolutions than maximum.
4. Compression greatly impacts resolution - high compression can significantly reduce bandwidth needs but also impact visible image quality
Basic Concepts in Photo Editing
Explore and examine the basic concepts and underlying principles of Photo Editing specifically using the Adobe Photoshop
This document provides an overview of facial recognition technology. It begins with an introduction to biometrics and how facial recognition works as a biometric method. It then describes the process of facial recognition which includes image acquisition, processing, locating distinctive facial characteristics, template creation, and template matching. The document discusses implementations, strengths, weaknesses and applications of facial recognition technology. It concludes by noting some of the challenges but also potential of the technology.
This document summarizes face recognition technology. It discusses how face recognition works by measuring facial landmarks and creating a face print for identification and verification purposes. Recent advances include 3D facial recognition, which can identify faces from different angles. The document outlines the history of facial recognition and discusses current and potential uses, such as border security and airport passenger screening. It also notes some limitations, such as the potential for privacy issues and identity theft if the data is compromised.
This document summarizes face recognition technology. It discusses how face recognition works by measuring facial landmarks and creating a face print for identification and verification purposes. Recent advances include 3D facial recognition, which can identify faces from different angles. The document outlines the history of facial recognition and discusses current and potential uses, such as border security and ATM verification. However, it also notes privacy and security concerns about the use of facial recognition without consent.
Enhance Example-Based Super Resolution to Achieve Fine Magnification of Low ...IJMER
This paper proposes an enhanced example-based super resolution method to achieve fine magnification of low resolution images using a neighbor embedding method. The proposed method has two phases: 1) A dictionary construction phase that extracts patch pairs from high and low resolution images and stores them in a dictionary. K-means trees are used to organize the patches. 2) A super resolution phase that searches the dictionary using neighbor embedding to find the best matching high resolution patch to synthesize the output image. Non-local mean filtering is then applied to remove blurring. Experimental results on text images show the proposed method improves image quality over other techniques by reducing blurring and artifacts.
IRJET- Human Face Recognition in Video using Convolutional Neural Network (CNN)IRJET Journal
This document describes a method for human face recognition in videos using convolutional neural networks (CNNs). It involves preprocessing video frames to grayscale, detecting faces using Viola-Jones detection, extracting features using BRISK, and classifying faces using a CNN. The CNN approach improves efficiency and accuracy in detecting faces under varying poses and illumination conditions compared to previous methods. The goal is to develop a system that can accurately recognize faces in videos despite challenges like illumination changes, poses, occlusions, etc.
A facial recognition system uses computer applications to identify or verify a person from images or video by comparing facial features to a database. It can be used for security systems and is similar to other biometrics like fingerprints. Some key parts of faces used for comparison include the distance between the eyes, width of the nose, and structure of cheek bones. Algorithms continue improving to account for challenges like changes in lighting or facial expressions. Facial recognition has various applications and is expected to become more widespread and integrated into security and social networks in the future.
This slide can help you to enter the world of match moving or 3D tracking. before start any tracking work you need to know these basics. Here you can learn types of tracking, camera, lens, Survey Data etc which are require for Match moving.
The document discusses face recognition technology as a biometric authentication method. It describes how face recognition works by detecting nodal points on faces and creating unique faceprints. The advantages are that face recognition is convenient, socially acceptable and inexpensive compared to other biometrics. However, face recognition has difficulties with identical twins and environmental/appearance changes reducing accuracy over time. The document also outlines applications in security, law enforcement, banking, and commercial access control.
IRJET- Survey on Face Recognition using BiometricsIRJET Journal
This document describes a survey on face recognition using biometrics. It discusses using the Haar cascade algorithm with OpenCV in Python to detect faces in images and video. The algorithm involves selecting Haar features, creating integral images for rapid calculation of features, training classifiers with AdaBoost, and cascading the classifiers. It trains on positive and negative image datasets to detect faces and then recognizes faces by extracting principal components and comparing to trained data. The system fulfills basic face detection and recognition needs at low cost for applications like security and real-time analysis. Improving the algorithm involves adding more training images to increase accuracy.
IRJET- Biometric Eye Recognition using Alex-NetIRJET Journal
This document presents a framework for eye recognition using deep learning. The framework takes whole eye images as input rather than segmented iris images. It uses the pre-trained AlexNet convolutional neural network to extract features from the eye images. These features are then classified using a support vector machine algorithm. The framework is tested on two eye image datasets and achieved high accuracy rates. Key advantages of the framework include that it relaxes the need for precise iris segmentation and improves upon traditional iris recognition systems.
Here are Important things about Image and Video Annotation that you should know for machine learning and to make your annotation project well & good your vision our thoughts.
Similar to Xeric Facial Recognition Whitepaper (20)
Unity Suite - a unified platform that provides you with business tools to run your business and subscribe to the features when you need it. Unity Suite converges your business tools, enabling you to run your business and make critical decisions on the move, giving you the control to your business anytime, anywhere. Unity Suite also unites your Offline & Online presences, managing them as a single entity.
What are we really doing as a company? While we started off wanting to work on Facial Recognition, we realised that we are also good to solve customer's problem. Focusing on the Human, we understand their Process, what they want and leveraging on Technology to help them.
Traditional businesses can also benefit from technology implementation when it's customised for their unique operation. Customised solution eases the steep learning curve, enable the team and reduces the overall cost of ownership.
#SGSunnyDay | #PseudoscopsSG | #FacialRecognition | #DisruptiveNotDisruptions | #PMASingapore
#pointofsale
#smesector
#retailsector
#retailsolutions
#retailtechnology
#businesstechnology
#technologyintegration
#integratedsolutions
We are in the world were information overload is a daily event. It's getting more difficult to engage potential customer, not to mention getting in contact with them. In the mist of breach of data around us, we are getting more cautions of our personal information.
Customer Acquisition and Engagement, with privacy in mind, becomes the key.
It's hard to track the source of 1st impression of consumer shall your marketing campaign runs on traditional printed media. We might have a solution for this and it's really simple.
The document describes a visitor management system called Zoliao that provides benefits like enabling pre-registration, shortening verification times, using QR codes for authentication, cloud storage of records, and accountability of visitors. It outlines the general workflow which involves visitors preregistering using the app or at a kiosk before proceeding to security for verification. Security can then view visitor information on a tablet to check visitors in. The interfaces are designed to be simple for both visitors and security staff. Visitor information is verified through SMS PIN and options are available for enhanced security like facial recognition.
Just ONE App to manage News Broadcast, Voucher Management and Queue Management for Merchant. Consumer will feel more comfortable to engage with merchant when specific information that can pin-point to them are not required.
Does cameras for city surveillance confined to only cameras on the street? With increase depth of coverage, authority increases the probabilities of getting the people they want.
What's Layered City Surveillance? It's the deployment of sensors in conventional and non-conventional locations to increase probability of intercepting POI and track their movement around the city for the purpose of realtime alert, investigation and pattern analysis.
Recognising Dementia Person using Facial RecognitionSunny Tan
Facial recognition is commonly used in law enforcement as well as retail and VIP identification. However, more can be done with such technology for the community. Having such technology can save large amount of time taken to identify someone with dementia and helping them get in contact with their family and bring them back together.
Dots per inch (DPI) refers to printed image resolution while pixels per inch (PPI) refers to on-screen image resolution. However, these metrics alone do not determine if an image is suitable for facial recognition as they do not indicate the number of pixels between the eyes. Using examples, the document shows that images with the same DPI and total pixel dimensions can have very different pixel values between the eyes depending on factors like face size in the image. Therefore, specifying the actual pixel value between the eyes provides a better measure of whether an image can be effectively used for facial recognition purposes.
Creative Inventory & Asset Management System that enable logistic to track items, finance to know depreciation, owners to know where items are and who to contact for maintenance.
Cloud-based solution that enable companies to perform inventory audit efficiently and effectively.
As compared to Unimodal biometric system, multimodal surveillance platform enable use of various biometric and non-biometric sensors to authenticate an individual. It reduces possibilties illegal entry/access and compliment limitation of individual sensor
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Zilliz
Join us to introduce Milvus Lite, a vector database that can run on notebooks and laptops, share the same API with Milvus, and integrate with every popular GenAI framework. This webinar is perfect for developers seeking easy-to-use, well-integrated vector databases for their GenAI apps.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Xeric Facial Recognition Whitepaper
1.
2. Facial recognition is both a science as well as an art. While there are various theories available on getting it correct, it depends
on real situation on ground to achieve the intended result. Apart from quality of enrolled and probe images, it is relatively
important to consider other non-technical aspect which could be equally important. This guide does not gives you a special
formula to cover all situation, but to provide sufficient guidance to achieve optimum result. Many of it might be very minor that
one could easily missed out and spend much time and resources to eventually rectify it.
Introduction
Once those essential considerations are being taken care during design and installation, you will be able to:
• Set and manage the appropriate level of expectations with customers.
• Design and proposal the most suitable solution that deals with real onsite conditions.
• Achieved the highest probability of intercept with best quality face indexes with given conditions.
What can be achieved?
This guide will illustrate and explain various key considerations that are critical to achieving optimum result with Xeric. There
are few fundamental principles on CCTV that will still be applicable while using Xeric. On top of those, we will also need to
consider quality of images, camera installations, lighting, etc. We will also be introduction COMAH concept, which represents
few important critical of consideration while designing the solution onsite.
These factors are inter-related and they should not be considered individually. Instead, they must be examined holistically
onsite to know how each impact the other and the entire solution as a whole.
Key Considerations
Xeric Facial Recognition Whitepaper Page 1
3. In this section, we will first exam the quality of images and they are broadly classified into 2 categories. Enrolled images refer
to those images that are being imported into Xeric as watchlist database. These images formed the watchlist which are stored
on Xeric and being used to make comparison against those live images. Images that are being captured by cameras are usually
being referred to as probe image or live images.
Quality differences between enrolled and probe images will affect Xeric’s accuracy. Facial recognition is fundamentally pattern
matching algorithm at work. It evolves from matching algorithm using simple geometric models to sophisicated mathematical
computations and matching processes. Thus the differences does contributed to overall performance of Xeric. In this section,
we will examine recommended quality of both enrolled and probe image.
Image Quality
Enrolled images are those images that are being imported into Xeric watchlist database. They formed the database which
probe images will be used to search against it for similar faces. There are few ways to obtain images for importing into Xeric,
following are some of those common means:-
1. Passport Photographs / Mugshots
Usually these photos will comply to a standard, such as ICAO, to ensure those images are of good
quality. It is recommended to have a higher resolution image as high resolution images are able to resize
to input it into the database.
2. Live video feeds
Xeric will indexed all the faces that are correctly presented in front of cameras. These indexed images
often provide the best form of enroll images as they are obtained from a source which will also be used
to capture probe images.
3. Images from Identity card, newspaper, magazine
There might be requirement for some user, such as law enforcement, to provide images that are not of
high quality. They can be images from an identity card, faces that appear in newspaper or magazine. If
the photo are of decent size and quality, these images can still be used as enrolled images.
Identity Card such as one on the
left can be used to extract the
photo of the person as enroll
image. However, the quality of
the photo play a part in the
accurancy.
This image is an example of
passport photo or mugshot that
can be used as enrolled image.
Live video feed, such as above, can be used to input into Xeric and extract face images which can be used as enrolled image.
Enrolled Images
Xeric Facial Recognition Whitepaper Page 2
4. Probe images are images that are being used to compare or match against those enrolled images in the database. Typically, a
probe image are being obtained using live video feed when a face are being presented in front of camera. Xeric’s algorithm
provide face tracking and face extraction, and putting the face as an indexed image within Xeric. All indexed images are being
searched against watchlist database to determine if there are any match. Apart from using live video feed, facial image or
recorded video can also be input into Xeric to compare against watchlist database.
You will noticed that differences between enrolled images and probe images are in the way that they are being used. Both
image types need to fulfill certain minimum requirement in order to provide optimal performance. This is due to
fundamentally, facial recognition are pattern matching between 2 images and similarity scores are being provided. Thus the
higher the level of similarity between 2 images, the higher the accurancy of match.
Good lighting level is essential to capture details on a face clearly for analysis purpose to achieve the aim of facial recognition.
A good lighting level should evenly lit a face, clearly show facial details of a person. It should balance between having an image
that is either too bright or too dark, where details are lost or hidden. This affects the level of accuracy of facial recognition
engine.
Photo 1 below shows an example of Good Lighting. The face is evenly lit without any burnout or shadow zone. There is a
distinct different between foreground, which is the face, and background, which could be a wall. Ideally, all photos should be
enrolled or indexed as such to provide optimal performance.
Photo 2 below shows an example of Overexposed image. There are no or very little shadow areas and many parts of the face
are being burned out or with glare. As compared to Photo 1, the glare erased the boundary of spectacles and other details
around the cheeks, nose and forehead area.
Photo 3 below shows another extreme contrast to overexposed, Underexposed. An underexposed image does not have
sufficient lighting and thus a lot of details are being hidden.
This image on the left shows an outcome of a
successful match. The left most image is the
indexed image from a live video feed. This
image is being matched against a watchlist
database, which contains this enrolled image.
This enrolled image is the same person close
to 20 years ago.
Photo 1 - Good Lighting Photo 2 - Overexposed Photo 3 - Underexposed
Probe Images
Lighting Level
Xeric Facial Recognition Whitepaper Page 3
5. Camera is the sensor that captures facial image for facial recognition engine to perform its analytic task. Customer might want
a CCTV camera to perform multiple role, whereby saving the number of cameras that they need to install. Many existing
cameras are not suitable for facial recognition due to resolution, field of view (FoV) and camera angle. We will be covering more
on these aspect at later section.
The most versatile camera type that we always recommend is the box camera, which enable one to fit with a telephoto lens.
This provide the flexibility of installation as well as getting the required pixel between eyes and FoV needed for facial
recognition. Xeric do not limit itself from using just box camera but match the type of camera based on customer’s
requirement. In extreme cases, Xeric uses webcam or built-in camera on laptop to perform its role.
Camera Selection
Photo 2 and Photo 3 could be the resultant of improper lighting condition or camera settings. In most cases, IP cameras are
able to cater to relatively wide range of lighting. It is highly recommended to leave the exposure setting of the camera to the
camera itself. One might just indicator a specific zone or area which need to be properly exposed to cater for various lighting
conditions. Lighting, apart from fixed lighting, could also mean sun rise, sun set, overcast, reflection, etc. In most cases, lighting
level of an image falls between Good Lighting condition and both extreme of over and under exposed image.
Resolution can be defined as level of visual detail or clarity in an image. In term of CCTV terminology, it is defining the
horizontal and vertical pixel count of a camera. Take for an example, a typical IP camera could be 720p, 1080p or 3.1 megapixels
or 5.2 megapixel. It is also further divided into whether the aspect ratio is 4:3 or 16:9. In a typical 720p 16:9 format, one will get
1280 pixels horizontally and 720 pixels vertically.
So what is a pixel? Pixel means “Picture Element” and they are the smallest unit of element that makes up of a picture.
Translating this into 720p resolution, we will be 1280 picture elements laying horizontally and 720 picture elements laying
vertically to form an image. The table below shows different resolution level of a CCTV camera.
How does resolution affects facial recognition? Xeric required a minimum of 30 pixels between eyes, recommended 120, to
perform accurate facial recognition. A high-resolution camera is able to produce higher pixel count, which equate to index and
match more people as compared to camera with lower resolution within a common FoV.
Resolution, together with frame per second, activites level and duration of activities determine your network bandwidth and
required storage. In Xeric’s case, Xeric do not really required huge amount of storage as Xeric do not need to store videos.
Images are being processed at the front end and sending those processed images of a single person required approximately
10kB per image. By default, Xeric captured 5 images per person which make it 50kB per person.
The Resolution Table on the next page illustrate to you various common resolution that you encounter, the number of pixels
and their common term. We will also show you the relationship between resolution, frame rate, duration and computing the
video size.
Resolution
Xeric Facial Recognition Whitepaper Page 4
6. Field of View (FoV) refers to an area that can be seen through a CCTV camera, which is in direct relationship to the lens
attached. The 2 images below are example of same scene taken with 2 different horizontal FoV.
From the look of it, the differences in FoV do not seem to be very significant. Image on the left is approximately 4 feet wider
than image on the right. However, this slight difference does make significant differences if this image is suitable for facial
recognition. When we look at the image on the left, we are achieving approximately 32 pixels between eyes on a 720p image.
This image just managed to meet the minimum requirement for facial recognition. Using same camera setting and by just
having a more narrow FoV, we are able to achieve 65 pixels between eyes. This is illustrated in the below images.
Wide Field of View Narrow Field of View
Field of View
Xeric Facial Recognition Whitepaper Page 5
7. The images above further illustrate the differences of using a suitable lens for getting the appropriate FoV. While a camera is
looking at a particular scene, a varifocal len will be able to bring your zone of focus “closer” to you.
Using this principal, facial recognition requires a narrow FoV where we are able to achieve good pixel count between eyes.
Apart from good pixel count, it is important to get the image to be in good focus, which is easier to achieve in narrower FoV. By
controlling the pixel count between eyes, we are also able to define our “capture zone” where faces of people within the zone
will be indexed.
There is another term which one will need to take note as this affects your object focus, Depth of Field (DoF). DoF is a zone
defines within a minimum distance and maximum distance away from the lens where object within it will be in focus. This zone
is affected by iris setting of the camera, which deals with the amount of light that enters the lens.
You can see from the previous example that having an appropriate FoV increases pixels between eyes. This can be achieved
using a varifocal lens, that gives you the flexibility to zoom into your Area of Interest (AOI). Many people mixed up between
optical zoom and digital zoom and while they enable you to focus on your AOI, it does not bring the same result.
Optical zoom is achieved using a physical zoom lens. There is no change in resolution and you achieved the same pixel count
both horizontally and vertically. Digital zoom is achieved using in-camera processing to enlarge the AOI and cropping away
those edges. While you can maintain the same aspect ratio, this AOI enlarges the pixels and reduces both resolution and image
quality.
3.0mm lens
10.0mm lens
40.0mm lens
Resolution + Field of View
Xeric Facial Recognition Whitepaper Page 6
8. Using same settings of the images above, what would be the result of using a higher resolution camera? You must have gotten
it correct! Yes, you can expect to have higher pixel between eyes even with wide FoV. However, look at the pixel between eyes
when appropriate FoV is being achieved, a whopping 99 pixel between eyes! You can see the illustration at the images below.
A good rule of thumb to follow is to fit the face into a box estimating 800 x 600 as shown in the image below. While using a
1080p camera, the FoV should only fit approximately 3-4 people within the view. These recommendations enable you to obtain
optimal pixel count between eyes to enable Xeric to achieve its best performance. However, there are other factors at work,
which include enrolled images and COMAH. We will cover what is COMAH at later section, which presents to you field issues and
you might be facing too.
Xeric Facial Recognition Whitepaper Page 7
9. Having a good facial recognition engine, good lighting and good camera configuration only solve part of the equation of good
facial recognition. If your camera is not being installed at appropriate position, your rate of indexed and accuracy will be
affected. This section provides recommendations to physically install your cameras at position that increases probability for
facial recognition.
The best place to place a camera is directly in front of the person at eye level. This gives you direct frontal face image that is the
best for facial recognition. Realistically, this is often not possible without obstructing human movement. On another aspect,
this could be a covert operation which general public cannot be alarmed and will be non-cooperative. Before looking at how
cameras could be mounted, let’s see what are the limitations that we are addressing.
Facial recognition works fundamentally by comparing both images and provide the result on their similarity. Probe
image that looks similar to enroll image yield better result as compared to those images that looked different. Pose
differences played a significant part in matching same person in different images that looked at different direction.
Laboratory studies show that when templating error is taken out of consideration, most facial recognition engine give
similar performance in terms of accuracy. Xeric’s engine taken this into consideration and automatically perform pose
correction on probe images prior to matching them against enrolled images. What’s even better is that current JPEG
image database can also be pose corrected before enrolling them, ensuring legacy databases can be use.
Even with good algorithm, it is important to take Pitching, Rolling and Yawing of faces into consideration when
planning out where to position facial cameras. This ensures offset of each axis are kept within tolerance in order for
algorithm to accept and index a face before rejecting it. The images below illustrate to you what are the differences
between pitch, roll and yaw.
Pitch Down Pitch Up
Roll Right Roll Left
Yaw Right Yaw Left
Camera Installation
Angle of Capture
Pitch, Roll & Yaw
Xeric Facial Recognition Whitepaper Page 8
10. The best position to capture face for a facial recognition camera is right in front of the person. However, this is not possible in
most cases where people could be moving around freely and without obstruction. Another alternative is to mount the camera
at a higher position, achieving approximately 20% Vertical Angle of Incidence. There is a simple formula that you can use to
determine the recommended capture distance when given mounting height of camera.
Example 1:
You have a ceiling height of 3.5m and you need to determine how far away from the camera to setup a chokepoint. A typical
Asian Male has his eye level at approximately 1.5m. Applying these information into the formula gets the following:-
(3.5m - 1.5m) / 0.2 = 10m
In this example, you can setup the chokepoint approximately 10m away from camera mounting point.
Example 2:
You will need to setup a chokepoint 8m away from camera mounting point and the ceiling height is 3.5m. How can you apply
this information to the formula?
Restructuring the above formula brings you to (CD * 0.2) + EL = CH
(8.0m * 0.2) + 1.5m = 3.1m
Recommended mounting height is 3.1m, which is slightly lower the ceiling. You can consider having a dropdown pole to bring
camera height to 3.1m for best performance.
Position for mounting the camera put your understanding of FoV, Resolution and Pixels between eyes at test. A good
installation takes into consideration all of the factors to determine appropriate camera, lens, location and height.
(CH - EL) / 0.2 = CD
Where CH = Ceiling Height, CD = Capture Distance and EL = Eye Level
Placement of camera must always take consideration of achieving frontal facial view as much as possible. However, in
real situation, this is hard to achieve especially with covert cameras and uncooperative people. It is thus important to
consider COMAH for each camera in relation to overall objectives of your deployment. The next section provides a
rule of thumb and simple formula to calculate where could you mount your cameras.
Camera Mounting Formula
Xeric Facial Recognition Whitepaper Page 9
11. Performance of facial recognition system involved much more than having a very accurate engine. Primary function of facial
recognition is to capture facial image of human for matching against database. In this case, one need to take into considerations
both human and environmental aspect to optimise opportunity and quality to achieve accuracy. In order to do that, it is
recommended to consider COMAH (read “coma”). COMAH stands for Chokepoint, Obstruction, Movement, Attraction and
Human.
Obstruction could be a permanent or temporary object placement that impedes or prevent passage. Obstruction in our
context could mean a pillar, wall, plants or people who could be standing between our subject and camera. Besides looking at
the floor plan to determine placement of camera, it is even more critical to visit the site.
Visiting the site during different time of the day, different days of the week enable one to know if there could possibility of
temporary obstruction. Talking to customer on their future plan of the area able us to know potential permanent obstruction.
Obstruction might divert people away from the area or reduces probability of getting facial images of subject.
Chokepoint can be defined as a narrow passage where one need to pass through to reach their destination. A chokepoint can
be a gantry, metal detector or gate, etc. as it depends on customer’s requirement. Capturing of faces in this zone provide many
advantages:-
1. Walking speed of people will be reduced to increase probabilities of getting image on people looking straight
and level. Stationary subject or subject with slower pace reduces motion blur without need to increase frame
rate. Higher frame rate could resulted in higher storage requirement which equals to higher cost for customer.
2. Infrastructure can be enhanced over this region to provide evenly diffused lighting to improve quality of
images. Uneven lighting, backlighting and natural lighting could reduces accuracy of facial recognition.
3. This zone enable camera to focus on a specific wide to achieve optimal pixel count between eyes. Taking this
into consideration, the setup might require only a 720p or 1080p camera. Comparing this to wide FoV that
might require much higher MegaPixel camera and resulted in high processing requirement.
Chokepoint
Obstruction
COMAH
Xeric Facial Recognition Whitepaper Page 10
12. Having camera looking over an area with more people increases probability of getting their faces as compared to an area with
lesser crowd. Studying movement of people in that area is important to position camera at the most appropriate location. Usual
peak movement occur before working & school hours, after working & school hours, major event as well as holidays. In some
circumstances, people might be taking short cut to save on time or to avoid a detour.
In order to know all these, it is important to visit the site over varies period to get better understanding on these matters.
Depending on the requirement, changes to site could be proposed to create natural flow of human to where you want them to
be.
Attraction could be anything that draws attention of people by looking at the attraction or physically moving towards it.
Subject could already be in chokepoint and something draws their view away from the front and look towards it. Depending
on the angle of pitch, roll and yaw, accuracy of match could be lower. It could also be falling out of the limit and no face being
indexed.
However, we could be using attraction to our advantage. Instead of looking towards another zone or place, we could
“encourage” subject to be looking straight in front of them. There could be some interesting features that enable them to look
directly ahead, capturing their best pose. One point to note is that this attraction needs to be constantly changing to keep the
subject engaged or interested to continue looking at it.
Besides being an art and science, Facial Recognition also deals with culture and human behaviour. Without taking this aspect
into consideration, effectiveness of capturing faces of people could be limiting.
In some countries, ladies might need to wear veil and men might need to keep their beard for religious reason. However, with
increase in global travel, similar situation could happen anywhere when people move around. Human behave differently when
they are approaching a swinging door, escalator, elevator, obstruction, etc. Prior to fixing camera directly in front of their
walking path according to placement formula, it is important to study how do they move to determine the capture area.
Another bigger phenomenon is what we known as “Mobile Zombie”, people who keep staring down to their mobile phone. In
order to capture their faces, you might need to think of creative ways to capture their attention and lift their head.
Movement
Attraction
Human
Xeric Facial Recognition Whitepaper Page 11
13. While it is important to have an accurate, effective and efficient facial recognition engine, it is equally important to put other
factors into consideration. A physically challenging installation with comprehensive considerations could achieve high
probability of indexed and high accuracy. A relative simple installation without much consideration could put one in situation
wondering why performance is not up to par.
Below summaries all the major considerations that had been discussed in this whitepaper:
1. Facial Recognition is matching 2 images together to product the result. Quality differences between Enrolled and
Probe image has to be as close as possible.
2. Lighting on both enrolled and probe image affects clarity of facial details to achieve high accuracy.
3. Consideration on camera type, resolution and lens are important. Depending on each physical requirement and its
affect on storage system, different combination of camera + resolution + lens are being used. It is not recommended
to stick to a permanent configuration for every scenario.
4. Chokepoint, Obstruction, Movement, Attraction and Human affects various considerations. Height of camera,
location of mounting, etc. are being affected by COMAH to give the best facial angle, evenly distributed lights and
maximum frontal facing path.
5. Most importantly, it is highly recommended to test all your assumption onsite to eliminate those issues that cannot
be uncovered during tabletop planning.
This whitepaper is never meant to be exhausive and not a “must follow” rule. This is a guideline based on situations we saw on
the field and experienced that we accumulated after spending many nights working on installations. This whitepaper aims to
enable you to leverage on what we have already know and jump-start to provide an effective, efficient and accuracy solution
for your customer.
Conclusion
Sunny Tan | MSc, MCiiSCM, CCSMP
https://sg.linkedin.com/in/sunnytan30
May 2016
Xeric Facial Recognition Whitepaper Page 12