Monday, December 9, 2013

Inttelix FRS based Access Control System

More Secured and Automated FRS based Access Control System

  • Automatic access control & monitoring
  • Restrict personnel access as per business rules
  • Allow clocking-in the employees as well tracking the employees
  • Real-time reporting of Entry/Exit  of persons
  • Can stop Buddy punching and timing-manipulations
  • Reduce human errors and access to real-time accurate information
  • Detailed reports can be generated in few seconds
  • Provides valuable services to employees and management & employee/employer interests protected




Regards,
Inttelix

Wednesday, October 9, 2013

How Can You Make Your CCTV Surveillance System An Intelligent Application?

People spent a lot of money in CCTV Surveillance systems and most of them think that, as far as security is concerned, they have already done! But in my opinion, its a passive kind of system. if the control room guys are not doing diligent work, I think there is no benefit the organization is going to get from that investment. Secondly, you cannot store the data for over say one or two months, because of the storage limitations. So, if you want to diagnose an issue after a quarter or so, I don’t think any CCTV solution can give any clue to you.
Wherein, by scaling the same CCTV system with a Face Recognition Server, you can do wonders. In my opinion, the investment will be a few lac’s, but the outcome is really appreciable.

How you do that? You have to have just another PC based server for Facial Recognition solution (FRS). Give the CCTV video inputs to FRS system. FRS system is capable to identify the face images from the video streams and it can store it in a proper RDBMS as facial templates. This data can be used for any forensic purpose at a later date. This way you can store the images of all the persons appeared in front of your system for say any number of years and it needs very limited storage space. Since the image can be stored in a professional database with date and time stamp, this data can be queried as per your requirement.

Suppose you have another Suspect database of people who you never wanted as a visitor to your factory or office or shop, the same FRS system can scan the live face and match with the existing suspect database and throw the similarity level to your security personnel by SMS alerts or system pop-up in control room, you can take further course of action as the case may be. This way you can prevent an unwanted event for you yourself.

Another extension of the same system can give you Face Counts, Gender Detection, etc. this also can be a really a valuable information for you to do some research on your visitors, especially if you are from marketing research or a simple shop owners who want to know his customers.

Similarly, there are many applications that are today available which can really change the way you think on security. We can discuss about this topic more in my future articles.

Saturday, August 31, 2013

Long Range Facial Recognition Binoculars


The United States Navy is looking to procure a set of binoculars capable of reading faces from up to 650 feet away for identification purposes.
Department of the Navy, seeking a “Wireless 3D Binocular Face Recognition System,” the Navy is looking to aid stand-off identification of uncooperative subjects.



“High level, it’s a surveillance and identification system,”  “It’s using the ubiquitous binocular for real-time identification. The data point here is that this is to be used to add objectivity to an operation that’s highly subjective. So this is not intended for kinetic action to go arrest or detain someone. It’s more a tool to put other eyes on him or her.”

The technology essentially already exists as StereoVision has already developed a facial recognition binocular system, called 3DMobileID, which uses a three-dimensional recognition system, though it is only capable of scanning faces a maximum of 100 meters away

Long range identification systems are slowly making their way to the mainstream. AIRprint, a unique fingerprint scanner that can effectively scan fingerprints from as far as six meters away, recently saw a significant increase in demand following being listed in 2012′s “best of what’s new” list in Popular Science. 

Tuesday, August 20, 2013

Forensic technologies market to reach $17.7 billion by 2019!

According to a newly-published report, the forensic technologies market, which includes biometrics, has been valued at USD $8.3 billion in 2012 and is expected to grow at a CAGR of 12.4% from 2013-2019, to a total of US $17.7 billion in 2019.

Also, as the report notes, the DNA profiling segment is expected to grow at an 11% CAGR in the same period. Currently, in terms of geography, North America and Europe have a higher market share, but going forward, it’s expected that Asia Pacific and RoW regions are expected to gain about 60% of the global pie.

Currently, the market is dominated by the Government and as the report also indicates, publicly-funded forensic labs account for about 60% of the forensic technologies and services market share.

Friday, August 16, 2013

iPhone fingerprint speculation has positive impact on industry as a whole

Whether or not Apple integrates a fingerprint sensor that works has yet to be seen, but one thing’s for sure: all of this speculation has had a positive impact on the biometrics industry as a whole.

Since before the launch of the iPhone 5, the internet has been ripe with rumours that Apple was looking to integrate a sensor into its iPhone, and last year, that intent became pretty clear when the tech giant scooped up prevalent fingerprint sensor manufacturer Authentec for a cool US$356 million.

Fingerprint Cards, which manufactures small fingerprint sensors and has many customers in the mobile space, has also seen tremendous growth over the past year.

Another recent research report on the global multi-factor authentication market projects that the market will reach $5.45 billion by 2017, and gives a big nod to biometric identification technologies for its role in the space.

Thursday, August 8, 2013

LG puts buttons on back of G2 smartphone

LG is hoping to shake up smartphone design by placing the only physical buttons of its new flagship model on the rear of the handset. The firm says the G2 addresses the problem that mobiles become harder to control the bigger they get.

The South Korean company recently reported its strongest ever mobile phone figures. However, analysts are split over whether or not their latest innovation is a winner. The new device features a 5.2in (13.2cm) screen and is powered by Android. Its rear keys can be used to adjust its volume or - if pressed for a longer time - to activate the device's camera and note-taking software.



LG suggests that using a back-button to take a self-portrait with the front camera also makes it easier to take a steady shot. "Moving the main buttons to the back of the phone gave users more control since this place was where individuals' index fingers are naturally located," it said. "Researchers also found that moving the buttons also resulted in fewer dropped phones when adjusting the volume while talking."

LG overtook Huawei to become the world's third best-selling smartphone maker in the first three months of the year thanks to demand for its Nexus 4 and Optimus range, according to market research firm Gartner.
One of its researchers suggested the move could indeed help address issues consumers have with the design of bigger mobiles.  Research suggests LG is the world's third bestselling smartphone maker
 
"This is a potentially interesting concept for LG because as phones get larger, the position of the phone in the hand and how you use it is going to change," said analyst Brian Blau. "Whether the button on the back proves to be a winner long-term has yet to be determined, but it deserves some amount of consideration."

Thursday, August 1, 2013

Recognizing People by the Way They Walk



Recognizing people by the way they walk can have numerous applications in the fields of security, leisure or medicine. This new biometric technique that takes into account the way a person walks and his/her silhouette offers significant advantages as recognition can be done remotely and does not require the cooperation of the subject.

Detecting suspicious behavior (video surveillance), access control to buildings or to restricted areas and demographic analysis of a population in terms of gender and age range are just some of the possible applications of this technology.
Walking Pattern

The role of biometrics as an artificial intelligence field is the identification of an individual based on certain physical and non-transferable aspects of his/her body, such as fingerprint or facial recognition. These are just two of the most widely used and developed biometric sources because, as the researcher states, "they are very reliable and difficult to fake, although both require that the user is close to the sensor and collaborates in the recognition process, and we can not always count on that” Hence, the importance of advancing in complementary techniques.

Silhouette

We all have a very personal way of walking. "Although it is easy to manipulate and consciously change, each person walks in a different way" There are experiments in which a person has to recognize familiar people just watching his/her silhouette in motion and the success rate is very high,” It has to be kept in mind that there are several factors that influence so that each person has a unique way of walking. From a video of the subject walking, the developed system distinguishes the background silhouette and it becomes a sequence of silhouettes, placed one upon the other, resulting in a summary image. This final representation stores all physical appearance and movement of the person walking, thus getting a unique mark for each of them.

For now, due to the margin of error that gait recognition has in not controlled real scenarios, this technique would be much more effective if combined with facial recognition. "They are complementary methods: the way you walk can be detected from a distance and does not require a high-resolution image (it can be done even against a back-light and with poor lighting), while face recognition is performed close-up and with a high-resolution image. In this way, surveys could be carried out in a wider range of conditions or, if both methods are applicable, results could be more reliable thanks to contrasting hypotheses about the identity of an individual generated by two biometric systems."

Monday, July 29, 2013

Next round of smartphones to incorporate biometrics


Biometrics Research Group, Inc. expects that biometrics will become integrated within a wide number of mobile devices in the near future. 

Integration will be driven by smartphone and tablet manufacturers such as Apple and Samsung Electronics, which we expect will add both fingerprint and gesture recognition functionality to their mobile devices within the next year.

Tuesday, July 23, 2013

Eye-Tracking Could Outshine Passwords If Made User-Friendly

We forget our highly secretive combinations, so we frequently have them reset and sent to our cellphones and alternative email addresses. We come up with clever jumbles of letters and words, only to mess up the order. We sit there on the login screen, desperately punching in a code we should know by heart.

Despite their inefficiencies, passwords are still the most common electronic authentication systems, protecting everything from our bank accounts, laptops and email to health information, utility bills and, of course, our Facebook profiles. While fingerprint- and eye- and face-recognition authentication technology is progressing, these biometric security systems haven't yet gone mainstream.

It is found in a recent study that the user's experience could be the key to create a system that doesn't rely on passwords.

"How humans interact with biometric devices is critically important for their future success," "This is the beginning of looking at biometric authentication as a socio-technical system, where not only does it require that it be efficient and accurate, but also something that people trust, accept and don't get frustrated with."

A new biometric authentication technique that identifies people based on their eye movements has been developed. For instance, users simulated withdrawing money from an ATM. The prototype -- an ATM-lookalike computer screen with eye-tracking technology -- presented three separate types of authentication: a standard four-number PIN, a target-based game that tracks a person's gaze, and a reading exercise that follows how a user's eyes move past each word. With each, researchers measured how long it took and how often the system had to recalibrate.

Eye-tracking technology uses infrared light and cameras. The light reflects off the surface of the eyeball back to the camera when a user's eye is following a dot or words on the computer screen. The tracking device picks up the unique way each person's eye moves.

The ATM scenario has been chosen because it's familiar to most people and many machines already have a basic security camera installed.

The goal of eye-tracking signatures is to enable inexpensive cameras instead of specialized eye-tracking hardware. This system can be used by basically any technology that has a camera, even a low-quality webcam.

But when authentication failed, not recognizing the users during one trial made to lose faith in the eye-tracking systems. The future eye-tracking technology should give clear error messages or directions on how users should proceed if they get off track.

The researchers plan to look next at developing similar eye-tracking authentication for other systems that use basic cameras such as desktop computers. A similar design could be used to log in or gain access to a secure website.

Regards,

Saturday, July 20, 2013

Medical college in India pens proposal for universal biometric verification !



A medical college in India has struggled to ensure that its students are who they say they are, and that’s why it’s proposed that biometric verification be introduced widely across the country’s medical education institutions.

Authorities from a medical College have sent the proposal to the director general medical education, following the discovery of a number of ‘impostors’ at the school, the Times of India reports.
 
Specifically, in March of this year, the school discovered three students who weren’t present for entrance exams. Someone else came to write the test for them.

According to the report, if the director general approves the proposal and moves ahead with the biometric integration, students will have to go through a biometric verification process throughout their time at the medical colleges, but also during admissions.

India has adopted biometric attendance systems and workforce management systems for its schools faster than any other region. What sets this new proposal apart is that it is for identity verification, rather than attendance confirmation.

As of yet, it is unclear how this system will be received by students and the medical colleges as a whole, but school deployments aren’t always met with optimism.


Regards,