SlideShare a Scribd company logo
1 of 6
Download to read offline
Xeric Multimodal Surveillance Platform provides customer with unparallel performance in realtime operations, post investigation
and scalability to suit for various scenarios. Xeric is able to integrate with various sensors and analytics, making it an ideal platform
that works for your needs. Xeric enable the authority to build border security system modularly, determine the impact, adjust
operational flow and expand capabilities incrementally. Xeric are being classified under category of Stand-off Biometric, where
we are seeing more system being used in such configuration.
Stand-off Biometric is solution that provide capabilities to operate at further than usual distance between subject and sensor with
less-constrained subject behaviour. While biometric surveillance systems can be considered as a stand-off biometric system, the
two terms are not synonymous. Some standoff systems call for cooperative subjects since these will always produce improved
performance metrics. In actual field application, non-cooperative subjects are what we usually saw. Identification of cooperative
subjects in stand-off applications is relevant in various public safety applications. This ranges from employee access control to
visitor identification and positive and/or negative identification of travellers at an airport environment.
The stand-off aspect of field study remained central to the concept of operations for several reasons:
1. Distance between operator and imaging unit may be relevant to operator safety.
2. Covert operations.
3. Queuing and process flow design.
4. Usage of multimodal sensors to perform additional security checks while biometric identification is taking place.
As compared to any usual stand-off biometric, Xeric is a solution-based platform that have wide application potential. Application
ranges from fixed point installation such as immigration checkpoint to mobile application which uses smart phone. This
application note aims to provide few cases which Xeric could support your operational needs.
Immigration Checkpoint
One of the most widely used application for facial recognition is at immigration checkpoint. It is a challenging task for officer to
remember faces of wanted people while performing their duties in such a high traffic flow environment. Xeric uses fixed point box
camera with varifocal lens to capture and index faces into its database. While faces are being indexed, they are being stored and
searchable in the future for post investigation. Authority just need to use an image of someone who they like to search and Xeric
will be able to search across the entire database and present those similar faces. In an immigration checkpoint environment, the
most important aspect is to perform realtime alerting for authority to take immediate action.
There are various challenges being faced in this specific application. We are looking at high human traffic flow, huge amount of
watchlist database, large number of cameras, availability of legacy facial database. How can Xeric help to tackle all these matters?
1. High Human Traffic Flow and Huge Amount of Watchlist Database
Xeric is able to search across a million records per second based on a single core. This enable the authority to take
action while subject is still within their facility shall this be a wanted person. Xeric is able to work with potentially
tens of millions of database and with proper hardware configuration to achieve high response speed.
It is also important for instant watchlist update to be make available. There could be situation where authority is
looking for people who committed criminal acts and attempting to leave the country immediately. Xeric houses its
database in a central cloud-based architecture to enable secured single point access for instant update and quick
retrieval.
Application Notes - Security Page 1
2. Large Number of Cameras
We could be seeing tens of cameras to hundreds of cameras in a single location. Based on conventional system
architecture, total cost of ownership is potentially high. Apart from hardware and software cost, we must also look
into cooling, electricity, maintenance and potential point of failure.
Xeric works differently by placing much lighter server as Front End Server and hzving server(s) that does the heavy
lifting at the backend. There is no limit to the number of cameras that Xeric is able to connect as long as hardware
are being scaled properly. Some facilities could be having upgrade and having existing IP cameras, Xeric could
potentially use them if they meet the minimum requirement.
If authority is able to enforce process to compliment system, Xeric can even use a HD webcam to achieve similar
result. In this configuration, authority benefitted from using COTS product with can be replace easily and at more
affordable cost.
3. Availability of Legacy Facial Database
Almost all mugshot and passport images stored by law enforcement are 2D images. In order to replace this to any
new template format is a very tedious task. Xeric bridges this gap in using existing 2D images, converted it to
wireframe and pose correct it to frontal image. This increases accuracy of engine by comparing frontal enrolled
image against frontal probe image.
Immigration Check Post
Unlike Singapore, many countries could be having hundreds or even thousands of kilometre of border shared with neighbouring
countries. Considering many of these could be located in mountainous area, an immigration check post could be used instead of
a checkpoint. In this scenario, consideration will be totally different as compared to a checkpoint.
Challenges include database security, network connection and implementation effort. The entire solution need to be cost
effective and time efficient, especially during installation.
1. Database Security
Physical security of computer equipment, which houses the database, pose one huge challenge and security risk.
Database located in this server could be compromised if someone stole this server from check post.
While Xeric is able to run everything locally on the server, Xeric is setup to house its watchlist database remotely.
Front End Server located at remote location perform only extraction of facial image and sending this image back
to Xeric Database & Process Server (XPro Server) for processing. Watchlist database do not physically located at
remote server and this architecture safeguard authority’s information. If this server is being stolen, it contains only
image extraction algorithm and does not point to any specific person who authority is interested in.
2. Network Connection
Another concern is connectivity of remote server to XPro server at HQ and information security of information on
transit. Xeric is able to work with VPN on 3G and internet connection. For location with intranet connectivity, Xeric
works with authority’s network policy to send information back to XPro server.
In conventional system, video might be stream back for processing and viewing. This resulted in either heavy
bandwidth usage or poor video quality to lighten load on bandwidth. What Xeric does is to extract 5 images from
each person and sending approximately 50kb of information per person for indexing and matching. Xeric do not
required video storage but we understand the need to view video clips of event instances. Thus Xeric uses the
concept of GIF to enable authority to view moving image without heavy burden on bandwidth.
Application Notes - Security Page 2
3. Implementation Effort
During project implementation, time spend travelling to each remote check post could be lengthy and resulted in
much longer project duration. Condition at site could varies significantly and it is difficult gathering and working
out cabling and installation solution.
Xeric uses portable equipment, where possible, to reduce significantly the time taken to deploy it at remote
location. Below are some changes that Xeric does to support such installation:
• Instead of full server, Xeric uses laptop that is portable with keyboard and mouse integrated. Laptop has its
own power to buffer unstable power supply.
• Instead of IP Camera, Xeric uses HD webcam to provide flexibility and quick installation. It is connected
directly to USB port of laptop which provide information transfer and power.
• Instead of fixed camera LPR, Xeric uses android mobile phone to capture image and send back to server to
process LPR information. This reduces installation time, cabling and potential excavation cost for each
location.
Xeric is a solution that aims to support authority not only on their specific needs but to consider overall deployability and total
cost of ownership.
Mobile Patrol
When law enforcement officers are moving around, there could be situations which they need to verify a person’s identity.
Traditionally, what they could have done is to ask for one’s identification document and verify that they are the correct person.
However, with improvement in technology and readily available of technology to general public, one can also fake their
identification document.
Xeric enable law enforcement officer to run an application on their mobile device and capture a suspect’s facial image using their
mobile phone camera. Facial image of the suspect will be send back to XPro Server where their identity will be search across
databases. Database could be arranged in order or priority, where wanted person comes first follow by target of interest and
normal citizen.
A list of result will be provided to law enforcement officer, based on similarity score, to enable law enforcement officer to correct
identify a person. Geo-location as well as other information collected by law enforcement officer can also be tagged to this
person for record. Other enhancement could potentially be explore using mobile fingerprint scanner to offer multimodal mobile
surveillance.
Xeric can also be configure to perform facial alert and indexing during national event where people may gather at a venue during
this period. It might not be viable for authority to provide permanent fixed camera and server at this location, where it tends to
be underutilised. This portable system will be housed in a portable enclosure, such as pelican case, to be bought around. Due to
potential lack of power, this enclosure will be able to provide continuous operation for approximately 4~5 hours, depending on
configuration and requirement.
In terms of mobility, Xeric can also be deployed in a convert operation to support identification of unknown subject using
wearable or conceal camera. Information can be stored and process when the person carrying this system is back. It is also
possible to configure for stream to be send back wirelessly for realtime matching.
Application Notes - Security Page 3
Offline Database
In some cases, law enforcement authority might require ability to search through large amount of information. We are looking at
tens or hundreds of millions of record such as national identity. Xeric is able to configure our platform based on authority’s
requirement depending on database size and speed which they expect to have the result.
There could be someone who law enforcement spotted at a particular location or in certain public event and they do not want to
approach this person. This could be for criminal investigation or this person could lead them to a group or cell which they want
to apprehend.
Law enforcement could capture this person’s face from afar and using this image to search through large amount of database,
attempt to get positive identity of this person. There are many challenges such as target is generally non-cooperative and
movement of both target and capturing sensor. In many cases, this is based on opportunity basis.
Conclusion
Such stand-off biometric solution differ from biometric systems used in traditional application such as close-interaction access
control. The following characteristics are most often associated with stand-off biometric applications.
• Stand-off biometric applications are predicated on identification of individuals, rather than verification of their
identity – the subject does not claim an identity, and the system either returns an ID or an unknown result. In
addition to being an exponentially more difficult matching problem than verification, by removing the identity
claim, identification systems remove the element of culpability associated with a false identity claim
• Stand-off biometric applications require limited subject’s cooperation, to non-cooperative subject in certain
applications. Non-cooperation means that the subject is neither cooperative nor uncooperative - they behave as
if the device were not present. This may apply to subject orientation, movement, and engagement with the device.
• Stand-off biometric systems eliminate complex device-subject interactions such as those that require the subject
to manually align themselves with devices, find their eyes in mirrors or visual overlays, or position themselves within
a limited capture volume. The current study does not consider uncooperative subjects – those who deliberately
attempt to evade, undermine, or interfere with biometric acquisition.
• Stand-off biometric applications may entail covert operation, in which systems are positioned such that the
subject cannot see the capture device.
• Stand-off biometric applications may be deployed in conjunction with derogatory watch lists, where the costs
associated with false negative identifications (e.g. potential security breach) are significantly higher than costs
associated with false positive identification (e.g. additional effort for security staff)
v
• Stand-off biometric applications may be deployed in mobile wearable environments.
With the above example and illustrations, you can see that Xeric is very flexible and able to adapt to various operational needs of
law enforcement. One of the most distinctive differences that Xeric brings to law enforcement is that it is a solution that can
accommodate their process instead of a product that one needs to get used to. Learning curve in deploying Xeric is relatively low
as it tends not to interfere in their daily routine but to be an enabler to support their daily operation.
v
Application Notes - Security Page 4
Sunny Tan | MSc, MCiiSCM, CCSMP
https://sg.linkedin.com/in/sunnytan30
May 2016
International Trade & Technologies Korea, Inc.
2nd Floor, Goryeo Building
48 Nonhyeon-Dong, Gangnam-Gu
Seoul 135-814 South Korea
Xeric@inter2tkorea.com

More Related Content

Viewers also liked

Incident reporting system presentation
Incident reporting system   presentationIncident reporting system   presentation
Incident reporting system presentationNasir Khan
 
Incident Reporting and Management System
Incident Reporting and Management SystemIncident Reporting and Management System
Incident Reporting and Management SystemSunny Tan
 
Useful Linux and Unix commands handbook
Useful Linux and Unix commands handbookUseful Linux and Unix commands handbook
Useful Linux and Unix commands handbookWave Digitech
 
Internet theory and practical
Internet theory and practicalInternet theory and practical
Internet theory and practicalmaruthi vardhan
 
Useful linux-commands
Useful linux-commandsUseful linux-commands
Useful linux-commandsHimani Singh
 
Cisco ccna-security note
Cisco ccna-security noteCisco ccna-security note
Cisco ccna-security notejihad nader
 

Viewers also liked (12)

Incident reporting system presentation
Incident reporting system   presentationIncident reporting system   presentation
Incident reporting system presentation
 
Incident Reporting and Management System
Incident Reporting and Management SystemIncident Reporting and Management System
Incident Reporting and Management System
 
CCNA Notes
CCNA NotesCCNA Notes
CCNA Notes
 
Report Management System
Report Management SystemReport Management System
Report Management System
 
Useful Linux and Unix commands handbook
Useful Linux and Unix commands handbookUseful Linux and Unix commands handbook
Useful Linux and Unix commands handbook
 
Firewall notes
Firewall notesFirewall notes
Firewall notes
 
Internet theory and practical
Internet theory and practicalInternet theory and practical
Internet theory and practical
 
Useful linux-commands
Useful linux-commandsUseful linux-commands
Useful linux-commands
 
CCNA Quick Notes
CCNA Quick NotesCCNA Quick Notes
CCNA Quick Notes
 
Ccna notes
Ccna notesCcna notes
Ccna notes
 
Ccna complete notes
Ccna complete notesCcna complete notes
Ccna complete notes
 
Cisco ccna-security note
Cisco ccna-security noteCisco ccna-security note
Cisco ccna-security note
 

Similar to Xeric Security Application Notes

Indoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual SignsIndoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual SignsShekhar Vimalendu
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureeSAT Publishing House
 
Bandit framework for systematic learning in wireless video based face recogni...
Bandit framework for systematic learning in wireless video based face recogni...Bandit framework for systematic learning in wireless video based face recogni...
Bandit framework for systematic learning in wireless video based face recogni...ieeepondy
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityEditor IJCATR
 
Kalix: Tackling the The Cloud to Edge Continuum
Kalix: Tackling the The Cloud to Edge ContinuumKalix: Tackling the The Cloud to Edge Continuum
Kalix: Tackling the The Cloud to Edge ContinuumJonas Bonér
 
Dynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based MethodDynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based MethodIRJET Journal
 
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET Journal
 
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmData Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmIRJET Journal
 
Offline and Online Bank Data Synchronization System
Offline and Online Bank Data Synchronization SystemOffline and Online Bank Data Synchronization System
Offline and Online Bank Data Synchronization Systemijceronline
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
 
Ch1 traditional it and cloud
Ch1 traditional it and cloudCh1 traditional it and cloud
Ch1 traditional it and cloudsawsan slii
 
Ch1 traditional it and cloud
Ch1 traditional it and cloudCh1 traditional it and cloud
Ch1 traditional it and cloudsawsan slii
 
Android Application For Decentralized Family Locator
Android Application For Decentralized Family LocatorAndroid Application For Decentralized Family Locator
Android Application For Decentralized Family LocatorIRJET Journal
 
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mumbai Academisc
 
Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek chan
 

Similar to Xeric Security Application Notes (20)

G017424448
G017424448G017424448
G017424448
 
htcia-5-2015
htcia-5-2015htcia-5-2015
htcia-5-2015
 
Indoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual SignsIndoor localization Leveraging Human Perception of Textual Signs
Indoor localization Leveraging Human Perception of Textual Signs
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructure
 
Bandit framework for systematic learning in wireless video based face recogni...
Bandit framework for systematic learning in wireless video based face recogni...Bandit framework for systematic learning in wireless video based face recogni...
Bandit framework for systematic learning in wireless video based face recogni...
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data Security
 
Kalix: Tackling the The Cloud to Edge Continuum
Kalix: Tackling the The Cloud to Edge ContinuumKalix: Tackling the The Cloud to Edge Continuum
Kalix: Tackling the The Cloud to Edge Continuum
 
Dynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based MethodDynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based Method
 
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
 
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmData Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA Algorithm
 
Offline and Online Bank Data Synchronization System
Offline and Online Bank Data Synchronization SystemOffline and Online Bank Data Synchronization System
Offline and Online Bank Data Synchronization System
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
Ch1 traditional it and cloud
Ch1 traditional it and cloudCh1 traditional it and cloud
Ch1 traditional it and cloud
 
Ch1 traditional it and cloud
Ch1 traditional it and cloudCh1 traditional it and cloud
Ch1 traditional it and cloud
 
Android Application For Decentralized Family Locator
Android Application For Decentralized Family LocatorAndroid Application For Decentralized Family Locator
Android Application For Decentralized Family Locator
 
Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)Mobile agents in a distributed multimedia dabase system(synopsis)
Mobile agents in a distributed multimedia dabase system(synopsis)
 
Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant
 
fog&Edge computing
fog&Edge computingfog&Edge computing
fog&Edge computing
 
Fog computing
Fog computing Fog computing
Fog computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 

More from Sunny Tan

Unity Suite - Converge the Diverse
Unity Suite - Converge the DiverseUnity Suite - Converge the Diverse
Unity Suite - Converge the DiverseSunny Tan
 
Pseudoscops Introduction
Pseudoscops IntroductionPseudoscops Introduction
Pseudoscops IntroductionSunny Tan
 
End-to-End Solution for Food Industry
End-to-End Solution for Food IndustryEnd-to-End Solution for Food Industry
End-to-End Solution for Food IndustrySunny Tan
 
Acquire & Engage
Acquire & EngageAcquire & Engage
Acquire & EngageSunny Tan
 
Printed Media Tracking
Printed Media TrackingPrinted Media Tracking
Printed Media TrackingSunny Tan
 
Zoliao Visitor Management System
Zoliao Visitor Management SystemZoliao Visitor Management System
Zoliao Visitor Management SystemSunny Tan
 
Consumer's PRIVACY comes FIRST
Consumer's PRIVACY comes FIRSTConsumer's PRIVACY comes FIRST
Consumer's PRIVACY comes FIRSTSunny Tan
 
Layered City Surveillance
Layered City SurveillanceLayered City Surveillance
Layered City SurveillanceSunny Tan
 
Recognising Dementia Person using Facial Recognition
Recognising Dementia Person using Facial RecognitionRecognising Dementia Person using Facial Recognition
Recognising Dementia Person using Facial RecognitionSunny Tan
 
Pixels in FR
Pixels in FRPixels in FR
Pixels in FRSunny Tan
 
Xeric Multimodal Surveillance Platform
Xeric Multimodal Surveillance PlatformXeric Multimodal Surveillance Platform
Xeric Multimodal Surveillance PlatformSunny Tan
 

More from Sunny Tan (11)

Unity Suite - Converge the Diverse
Unity Suite - Converge the DiverseUnity Suite - Converge the Diverse
Unity Suite - Converge the Diverse
 
Pseudoscops Introduction
Pseudoscops IntroductionPseudoscops Introduction
Pseudoscops Introduction
 
End-to-End Solution for Food Industry
End-to-End Solution for Food IndustryEnd-to-End Solution for Food Industry
End-to-End Solution for Food Industry
 
Acquire & Engage
Acquire & EngageAcquire & Engage
Acquire & Engage
 
Printed Media Tracking
Printed Media TrackingPrinted Media Tracking
Printed Media Tracking
 
Zoliao Visitor Management System
Zoliao Visitor Management SystemZoliao Visitor Management System
Zoliao Visitor Management System
 
Consumer's PRIVACY comes FIRST
Consumer's PRIVACY comes FIRSTConsumer's PRIVACY comes FIRST
Consumer's PRIVACY comes FIRST
 
Layered City Surveillance
Layered City SurveillanceLayered City Surveillance
Layered City Surveillance
 
Recognising Dementia Person using Facial Recognition
Recognising Dementia Person using Facial RecognitionRecognising Dementia Person using Facial Recognition
Recognising Dementia Person using Facial Recognition
 
Pixels in FR
Pixels in FRPixels in FR
Pixels in FR
 
Xeric Multimodal Surveillance Platform
Xeric Multimodal Surveillance PlatformXeric Multimodal Surveillance Platform
Xeric Multimodal Surveillance Platform
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

Xeric Security Application Notes

  • 1.
  • 2. Xeric Multimodal Surveillance Platform provides customer with unparallel performance in realtime operations, post investigation and scalability to suit for various scenarios. Xeric is able to integrate with various sensors and analytics, making it an ideal platform that works for your needs. Xeric enable the authority to build border security system modularly, determine the impact, adjust operational flow and expand capabilities incrementally. Xeric are being classified under category of Stand-off Biometric, where we are seeing more system being used in such configuration. Stand-off Biometric is solution that provide capabilities to operate at further than usual distance between subject and sensor with less-constrained subject behaviour. While biometric surveillance systems can be considered as a stand-off biometric system, the two terms are not synonymous. Some standoff systems call for cooperative subjects since these will always produce improved performance metrics. In actual field application, non-cooperative subjects are what we usually saw. Identification of cooperative subjects in stand-off applications is relevant in various public safety applications. This ranges from employee access control to visitor identification and positive and/or negative identification of travellers at an airport environment. The stand-off aspect of field study remained central to the concept of operations for several reasons: 1. Distance between operator and imaging unit may be relevant to operator safety. 2. Covert operations. 3. Queuing and process flow design. 4. Usage of multimodal sensors to perform additional security checks while biometric identification is taking place. As compared to any usual stand-off biometric, Xeric is a solution-based platform that have wide application potential. Application ranges from fixed point installation such as immigration checkpoint to mobile application which uses smart phone. This application note aims to provide few cases which Xeric could support your operational needs. Immigration Checkpoint One of the most widely used application for facial recognition is at immigration checkpoint. It is a challenging task for officer to remember faces of wanted people while performing their duties in such a high traffic flow environment. Xeric uses fixed point box camera with varifocal lens to capture and index faces into its database. While faces are being indexed, they are being stored and searchable in the future for post investigation. Authority just need to use an image of someone who they like to search and Xeric will be able to search across the entire database and present those similar faces. In an immigration checkpoint environment, the most important aspect is to perform realtime alerting for authority to take immediate action. There are various challenges being faced in this specific application. We are looking at high human traffic flow, huge amount of watchlist database, large number of cameras, availability of legacy facial database. How can Xeric help to tackle all these matters? 1. High Human Traffic Flow and Huge Amount of Watchlist Database Xeric is able to search across a million records per second based on a single core. This enable the authority to take action while subject is still within their facility shall this be a wanted person. Xeric is able to work with potentially tens of millions of database and with proper hardware configuration to achieve high response speed. It is also important for instant watchlist update to be make available. There could be situation where authority is looking for people who committed criminal acts and attempting to leave the country immediately. Xeric houses its database in a central cloud-based architecture to enable secured single point access for instant update and quick retrieval. Application Notes - Security Page 1
  • 3. 2. Large Number of Cameras We could be seeing tens of cameras to hundreds of cameras in a single location. Based on conventional system architecture, total cost of ownership is potentially high. Apart from hardware and software cost, we must also look into cooling, electricity, maintenance and potential point of failure. Xeric works differently by placing much lighter server as Front End Server and hzving server(s) that does the heavy lifting at the backend. There is no limit to the number of cameras that Xeric is able to connect as long as hardware are being scaled properly. Some facilities could be having upgrade and having existing IP cameras, Xeric could potentially use them if they meet the minimum requirement. If authority is able to enforce process to compliment system, Xeric can even use a HD webcam to achieve similar result. In this configuration, authority benefitted from using COTS product with can be replace easily and at more affordable cost. 3. Availability of Legacy Facial Database Almost all mugshot and passport images stored by law enforcement are 2D images. In order to replace this to any new template format is a very tedious task. Xeric bridges this gap in using existing 2D images, converted it to wireframe and pose correct it to frontal image. This increases accuracy of engine by comparing frontal enrolled image against frontal probe image. Immigration Check Post Unlike Singapore, many countries could be having hundreds or even thousands of kilometre of border shared with neighbouring countries. Considering many of these could be located in mountainous area, an immigration check post could be used instead of a checkpoint. In this scenario, consideration will be totally different as compared to a checkpoint. Challenges include database security, network connection and implementation effort. The entire solution need to be cost effective and time efficient, especially during installation. 1. Database Security Physical security of computer equipment, which houses the database, pose one huge challenge and security risk. Database located in this server could be compromised if someone stole this server from check post. While Xeric is able to run everything locally on the server, Xeric is setup to house its watchlist database remotely. Front End Server located at remote location perform only extraction of facial image and sending this image back to Xeric Database & Process Server (XPro Server) for processing. Watchlist database do not physically located at remote server and this architecture safeguard authority’s information. If this server is being stolen, it contains only image extraction algorithm and does not point to any specific person who authority is interested in. 2. Network Connection Another concern is connectivity of remote server to XPro server at HQ and information security of information on transit. Xeric is able to work with VPN on 3G and internet connection. For location with intranet connectivity, Xeric works with authority’s network policy to send information back to XPro server. In conventional system, video might be stream back for processing and viewing. This resulted in either heavy bandwidth usage or poor video quality to lighten load on bandwidth. What Xeric does is to extract 5 images from each person and sending approximately 50kb of information per person for indexing and matching. Xeric do not required video storage but we understand the need to view video clips of event instances. Thus Xeric uses the concept of GIF to enable authority to view moving image without heavy burden on bandwidth. Application Notes - Security Page 2
  • 4. 3. Implementation Effort During project implementation, time spend travelling to each remote check post could be lengthy and resulted in much longer project duration. Condition at site could varies significantly and it is difficult gathering and working out cabling and installation solution. Xeric uses portable equipment, where possible, to reduce significantly the time taken to deploy it at remote location. Below are some changes that Xeric does to support such installation: • Instead of full server, Xeric uses laptop that is portable with keyboard and mouse integrated. Laptop has its own power to buffer unstable power supply. • Instead of IP Camera, Xeric uses HD webcam to provide flexibility and quick installation. It is connected directly to USB port of laptop which provide information transfer and power. • Instead of fixed camera LPR, Xeric uses android mobile phone to capture image and send back to server to process LPR information. This reduces installation time, cabling and potential excavation cost for each location. Xeric is a solution that aims to support authority not only on their specific needs but to consider overall deployability and total cost of ownership. Mobile Patrol When law enforcement officers are moving around, there could be situations which they need to verify a person’s identity. Traditionally, what they could have done is to ask for one’s identification document and verify that they are the correct person. However, with improvement in technology and readily available of technology to general public, one can also fake their identification document. Xeric enable law enforcement officer to run an application on their mobile device and capture a suspect’s facial image using their mobile phone camera. Facial image of the suspect will be send back to XPro Server where their identity will be search across databases. Database could be arranged in order or priority, where wanted person comes first follow by target of interest and normal citizen. A list of result will be provided to law enforcement officer, based on similarity score, to enable law enforcement officer to correct identify a person. Geo-location as well as other information collected by law enforcement officer can also be tagged to this person for record. Other enhancement could potentially be explore using mobile fingerprint scanner to offer multimodal mobile surveillance. Xeric can also be configure to perform facial alert and indexing during national event where people may gather at a venue during this period. It might not be viable for authority to provide permanent fixed camera and server at this location, where it tends to be underutilised. This portable system will be housed in a portable enclosure, such as pelican case, to be bought around. Due to potential lack of power, this enclosure will be able to provide continuous operation for approximately 4~5 hours, depending on configuration and requirement. In terms of mobility, Xeric can also be deployed in a convert operation to support identification of unknown subject using wearable or conceal camera. Information can be stored and process when the person carrying this system is back. It is also possible to configure for stream to be send back wirelessly for realtime matching. Application Notes - Security Page 3
  • 5. Offline Database In some cases, law enforcement authority might require ability to search through large amount of information. We are looking at tens or hundreds of millions of record such as national identity. Xeric is able to configure our platform based on authority’s requirement depending on database size and speed which they expect to have the result. There could be someone who law enforcement spotted at a particular location or in certain public event and they do not want to approach this person. This could be for criminal investigation or this person could lead them to a group or cell which they want to apprehend. Law enforcement could capture this person’s face from afar and using this image to search through large amount of database, attempt to get positive identity of this person. There are many challenges such as target is generally non-cooperative and movement of both target and capturing sensor. In many cases, this is based on opportunity basis. Conclusion Such stand-off biometric solution differ from biometric systems used in traditional application such as close-interaction access control. The following characteristics are most often associated with stand-off biometric applications. • Stand-off biometric applications are predicated on identification of individuals, rather than verification of their identity – the subject does not claim an identity, and the system either returns an ID or an unknown result. In addition to being an exponentially more difficult matching problem than verification, by removing the identity claim, identification systems remove the element of culpability associated with a false identity claim • Stand-off biometric applications require limited subject’s cooperation, to non-cooperative subject in certain applications. Non-cooperation means that the subject is neither cooperative nor uncooperative - they behave as if the device were not present. This may apply to subject orientation, movement, and engagement with the device. • Stand-off biometric systems eliminate complex device-subject interactions such as those that require the subject to manually align themselves with devices, find their eyes in mirrors or visual overlays, or position themselves within a limited capture volume. The current study does not consider uncooperative subjects – those who deliberately attempt to evade, undermine, or interfere with biometric acquisition. • Stand-off biometric applications may entail covert operation, in which systems are positioned such that the subject cannot see the capture device. • Stand-off biometric applications may be deployed in conjunction with derogatory watch lists, where the costs associated with false negative identifications (e.g. potential security breach) are significantly higher than costs associated with false positive identification (e.g. additional effort for security staff) v • Stand-off biometric applications may be deployed in mobile wearable environments. With the above example and illustrations, you can see that Xeric is very flexible and able to adapt to various operational needs of law enforcement. One of the most distinctive differences that Xeric brings to law enforcement is that it is a solution that can accommodate their process instead of a product that one needs to get used to. Learning curve in deploying Xeric is relatively low as it tends not to interfere in their daily routine but to be an enabler to support their daily operation. v Application Notes - Security Page 4 Sunny Tan | MSc, MCiiSCM, CCSMP https://sg.linkedin.com/in/sunnytan30 May 2016
  • 6. International Trade & Technologies Korea, Inc. 2nd Floor, Goryeo Building 48 Nonhyeon-Dong, Gangnam-Gu Seoul 135-814 South Korea Xeric@inter2tkorea.com