Monday, December 21, 2009

5 steps of Facial Recognition!

As a biometric, facial recognition is a form of computer vision that uses faces
to attempt to identify a person or verify a person’s claimed identity. Regardless
of specific method used, facial recognition is accomplished in a five step process.
















1. First, an image of the face is acquired. This acquisition can be accomplished
by digitally scanning an existing photograph or by using an electro-optical
camera to acquire a live picture of a subject. As video is a rapid sequence of
individual still images, it can also be used as a source of facial images.

2. Second, software is employed to detect the location of any faces in the
acquired image. This task is difficult, and often generalized patterns of what
a face “looks like” (two eyes and a mouth set in an oval shape) are employed
to pick out the faces.

3. Once the facial detection software has targeted a face, it can be analyzed. As
noted in slide three, facial recognition analyzes the spatial geometry of
distinguishing features of the face. Different vendors use different methods
to extract the identifying features of a face. Thus, specific details on the
methods are proprietary. The most popular method is called Principle
Components Analysis (PCA), which is commonly referred to as the eigenface
method. PCA has also been combined with neural networks and local feature
analysis in efforts to enhance its performance. Template generation is the
result of the feature extraction process. A template is a reduced set of data
that represents the unique features of an enrollee’s face. It is important to
note that because the systems use spatial geometry of distinguishing facial
features, they do not use hairstyle, facial hair, or other similar factors.

4. The fourth step is to compare the template generated in step three with those
in a database of known faces. In an identification application, this process
yields scores that indicate how closely the generated template matches each
of those in the database. In a verification application, the generated template
is only compared with one template in the database – that of the claimed
identity.

5. The final step is determining whether any scores produced in step four are
high enough to declare a match. The rules governing the declaration of a
match are often configurable by the end user, so that he or she can determine
how the facial recognition system should behave based on security and
operational considerations.

Examples of Biometrics (www.inttelix.com)





Biometric technologies may seem exotic, but their use is becoming increasingly common, and in 2001 MIT Technology Review named biometrics as one of the “top ten emerging technologies that will change the world.” While this briefing focuses on facial recognition, there are many different types of biometrics as Leonardo DaVinci’s Vitruvian Man makes clear. Examples include:
 


Iris Scan
Iris scanning measures the iris pattern in the colored part of the eye, although the iris color has nothing to do with the biometric. Iris patterns are formed randomly. As a result, the iris patterns in a person’s left and right eyes are different, and so are the iris patterns of identical twins. Iris scanning can be used quickly for both identification and verification applications because the iris is highly distinctive and robust.

Retinal Scan
Retinal scans measure the blood vessel patterns in the back of the eye. The device involves a light source shined into the eye of a user who must be standing very still within inches of the device. Because users perceive the technology to be somewhat intrusive, retinal scanning has not gained popularity;
currently retinal scanning devices are not commercially available.

Facial Recognition
Facial recognition records the spatial geometry of distinguishing features of the face. Different vendors use different methods of facial recognition, however, all focus on measures of key features of the face. Because a person’s face can be captured by a camera from some distance away, facial recognition has a clandestine or covert capability (i.e. the subject does not necessarily know he has been observed). For this reason, facial recognition has been used in projects to identify card counters or other undesirables in casinos, shoplifters in
stores, criminals and terrorists in urban areas.

Speaker / Voice Recognition
Voice or speaker recognition uses vocal characteristics to identify individuals using a pass-phrase. A telephone or microphone can serve as a sensor, which makes it a relatively cheap and easily deployable technology. However, voice recognition can be affected by environmental factors such as background noise. This technology has been the focus of considerable efforts on the part of the telecommunications industry and the U.S. government’s intelligence community, which continue to work on improving reliability.

Fingerprint
The fingerprint biometric is an automated digital version of the old inkand-paper method used for more than a century for identification, primarily by law enforcement agencies. The biometric device involves users placing their finger on a platen for the print to be electronically read. The minutiae are then extracted by the vendor’s algorithm, which also makes a fingerprint pattern analysis. Fingerprint biometrics currently have three main application arenas: large-scale Automated Finger Imaging Systems (AFIS) generally used for law enforcement purposes, fraud prevention in entitlement programs, and physical and computer access.

Hand/Finger Geometry
Hand or finger geometry is an automated measurement of many dimensions of the hand and fingers. Neither of these methods takes actual prints of the palm or fingers. Spatial geometry is examined as the user puts his hand on the sensor’s surface and uses guiding poles between the fingers to properly place the hand and initiate the reading. Finger geometry usually measures two or three fingers. Hand geometry is a well-developed technology that has been thoroughly field-tested and is easily accepted by users. Because hand and finger
geometry have a low degree of distinctiveness, the technology is not well-suited for identification applications.

Dynamic Signature Verification
We have long used a written signature as a means to acknowledge our identity. Dynamic signature verification is an automated method of measuring an individual’s signature. This technology examines such dynamics as speed, direction, and pressure of writing; the time that the stylus is in and out of contact with the “paper,” the total time taken to make the signature; and where the stylus is raised from and lowered onto the “paper.”

Keystroke Dynamics
Keystroke dynamics is an automated method of examining an individual’s keystrokes on a keyboard. This technology examines such dynamics as speed and pressure, the total time taken to type particular words, and the time elapsed between hitting certain keys. This technology’s algorithms are still being developed to improve robustness and distinctiveness. One potentially useful application that may emerge is computer access, where this biometric could be used to verify the computer user’s identity continuously.

Advantages of Face Recognition (In Surveillance)



Advantages of Facial Recognition in Surveillance

The concept of recognizing someone from facial features is intuitive, facial recognition, as a biometric, makes human recognition a more automated, computerized process. What sets apart facial recognition from other biometrics is that it can be used for surveillance purposes. For example, public safety authorities want to locate certain individuals such as wanted criminals, suspected terrorists, and missing children. Facial recognition may have the potential to help the authorities with this mission. Facial recognition offers several advantages.

The system captures faces of people in public areas, which minimizes legal concerns for reasons explained below. Moreover, since faces can be captured from some distance away, facial recognition can be done without any physical contact. This feature also gives facial recognition a clandestine or covert capability.

For any biometric system to operate, it must have records in its database against which it can search for matches. Facial recognition is able to leverage existing databases in many cases. For example, there are high quality mugshots of criminals readily available to law enforcement. Similarly, facial recognition is often able to leverage existing surveillance systems such as surveillance cameras or closed circuit television (CCTV).

To know more visit : www.inttelix.com

Friday, December 18, 2009

Face Recognition SDK


The FACEPORT.OCX ACTIVEX allows fast use, development and implementation of facial recognition capabilities in existing or newly designed applications. The component provides an easy to use Methods, Properties and Events that simplify the facial recognition development process.

The FACEPORT ActiveX was specially designed for embedded environments like Intel ATOM CPU, and runs very well on Low performance CPU as well as high performance CPUs. The component supports Web Cameras, IP or Analog cameras through external an injection mechanism. The component includes internal web camera management. The component contains an internal Database that provides fast yet reliable management of the matching subjects.

FACEPORT SDK

The FACEPORT FRS SDK allows third-party developers to implement our advanced facial biometric technology within their own security applications. The SDK provides tracking, enrollment, verification, classification, database, communication, and multimedia controls.

Applications

Security

  • Access Control
  • Suspect Detection
  • Time Attendance
  • Web Login
  • PC Login

Commercial

  • Repeated clients
  • Interactive Content
  • Customer counting
  • Graphical Applications

Licensing

  • PC based

SCREEN SHOT OF ACTIVEX RUNNING

Face Recognition Database

  • Jet 4.0 - MS Access database (Optional: ODBC)
  • Log Database : Jet 4.0 MS Access database
  • Provides all interfaces necessary to Add, Delete and Retrieve biometric templates, images and users from the central database.

Properties

Name of Property Description
NoOfFramesForValidation Min. number of frames for validation
NoOfFramesForEnrollment Min. number of frames for enrollment
FaceConfidenceThreshold 
MinimalIOD Min. Inner distance between 2 eyes (Default 60)
MaximalIOD Max. Inner distance between 2 eyes (Default 1500)
FaceQualityThreshold 
MatchingThreshold Min. value for matching
FAR Will be calculated from matching threshold (theoretical value)
MatchingAttempts number of matching attempts
AllowLiveness Boolean - will define if we need to use liveness test
LivenessThreshold how strict to check for Liveness in an image.(default 50)
MaxRecordsPerTemplate 
AllowAging Boolean - will define if we need to use aging+
AgingMinimalThreshold 
EnrolledFaceImagePath 
RejectedFaceImagePath 
ValidatedFaceImagePath 
LogDBPath 
FRSDBPath 
IsRegistered returns true if registered
FRR Will be calculated from matching threshold (theoretical value)
Camera Gets/Sets the currently selected Camera
VideoFormat Gets/Sets the Currently Selected Camera’s Video Format.
FlipImagesHorizontal Gets/Sets value whether to Flip the Images Horizontally
SaveEnrolledFaceImage Gets/Sets value Whether to Save the Learned/Enrlolled Face Image to harddisk
SaveRejectedFaceImage Gets/Sets value Whether to Save the Rejected Face Image to harddisk
SaveValidatedFaceImage Gets/Sets value Whether to Save the Validated/Matched Face Image to harddisk

Events

Name of Events Description
CameraOpened() 
CameraClosed() 
NewCameraFrame(bitmap image) for every new frame
ExceptionHappened(string Description, int ErrorNumber) 
FaceLearnt(int FaceQuality, float Similarity, float FaceConfidence, int IOD) after new enrollment
FaceValidated(int FaceQuality, float Similarity, float FaceConfidence, int IOD) after validation
FaceLearningFailed(int ErrorTypeID, String Description, int FaceQuality, float Similarity, float FaceConfidence, int IOD ) after failure of enrollment
FaceValidationFailed(int ErrorTypeID, String Description, int FaceQuality, float Similarity, float FaceConfidence, int IOD)after failure of validation
FaceDeleted() after deletion of face
LogOverflow() when log record number is above 500K records

Methods

Name of Method Description
InitializeFRS()  
OpenFRSSettingsDialog() open face recognition component configuration
Bool LearnFaceFromCamera(string FaceID) 
Bool LearnFaceFromImage(string FaceID, string ImagePath) 
Bool ValidateFace(string FaceId) 
Bool OpenCamera(string camera) 
String[] GetRejectedImagesByFaceID(string FaceID) 
String[] GetRejectedFaceIDsFromDate(string FromDate, string ToDate) 
DeleteRejecedImagesFromDate(string FaceID, string UpToDate) 
DeleteAllRejecedImagesFromDate(string UpToDate) 
String[] GetImagesByFaceID(string FaceID) 
DeleteFaceID(string FaceID) 
Bool DeleteFaceIDImages(string FaceID, string UpToDate) 
Float MatchImageWithFace(string filename, string FaceID) between the two faces
AddToLog(string timestamp, string type, string data) 
ClearLog() Clear Log db
String[] GetConnectedCameras() 
CloseCamera() 
ShowCameraPreviewDialog(int x,y)- -1,-1 center of screen
bool SaveSnapshot(string Filename) 
PlaceImageAnnotation(string TargetFilename, string Data) 
InjectImage(ByVal HImage As Long) Injects an Image using it HBITMAP or Image
HandleInjectImageFromFile(ByVal fileName As String) Injects an Image from a File

Face Recognition Time Attendance

compactlogo

Facial Recognition

Time Attendance

ontimetheme

Why OnTime Compact ?

  • Want to avoid buddy punching, clock padding and general inaccuracy of time capture?
  • Fed up with errors in capturing attendance time manually? Or spending time doing the difficult task of consolidating data from various sources?
  • Would you prefer to have a system as easy to use as fingerprint with more durability, accuracy and data usability?
  • Visual view of video input
  • Visual view of face detection
  • History / Enrolled / Suspects view
  • Voice alerts during system operation
  • Easy to use graphic interface
  • Fast and accurate face verification

Employee Verification

OnTime Compact is a Time & Attendance System with a Face recognition mechanism, specifically designed to provide irrefutable personal verification. It consists of a standard Camera and OnTime Software to enroll and verify employees, store their Face records, keep logs and interface with computers. OnTime Compact provides enhanced security and superior speed. Employee IN & OUT times are stored as Soft Data. This reduces the manual drudgery of Data Entry, Register maintenance and monthly requirement of Punch Cards for conventional Time Clocks to a minimum.

Software Specifications

  • Facial Recognition customizable engine
  • Generic video interface (Win 32 API)
  • Real time facial detection
  • Real time facial matching
  • Enhanced matching mechanism (Matching attempts)
  • Adjustable image processing
  • User Management / Time Zones
  • Time Attendance feature (In / Out) (Reasons)
  • Fully customizable Time Attendance
  • Log Browser including visual history
  • User Privacy mode - no image savings
Time Attendance preformance

Device

  • Device:7" LCD Display
  • Internal Video Camera
  • Internal Speaker
Time Attendance Camera
DEVICE

Employee database maintains information like..

  • Face Id
  • Full Name
  • Job Description
  • Supervisor Name
  • Validity Period
  • Shift Timing (customizable)
software Interface
SOFTWARE INTERFACE

Facial Recognition Adjustable Attributes

  • Minimal Similarity Level
  • Eye distance
  • Matching attempts
  • Face sample rate
Get more details @ www.inttelix.com

Facial Recognition for Network Security

supervisionlogo

Facial Recognition

Network Security

supervisionthemeFRS Supervision is a Cutting-Edge solution for remote facial recognition through Web / 3rd Generation (3G) Cellular and TCP/IP networks. The solution allows both local and remote recognition through fast and smart facial recognition engine. The system performs 24/7 supervision on user activities.
FRS Supervision is a revolutionary technology that facilitates secure log in to the Microsoft Windows Environment. The Software runs an automatic scan, then detects and matches the physical presence of the user, thereby eliminating the need for a username or password.
  • Hands Free Login using face detection
  • Constant search for the presence of the user
  • Automatic lock for unauthorized user
  • Unlimited number of users (subject to database size limitations)
  • Fast and Accurate face detection
  • Works with normal 640 x 480 pixels Web Camera (Interpolation cameras not required)
  • Supports LAN, WAN and VPNs
  • Manual Login with password
  • 1:N matching

Server Side

  • View list of connected users
  • User information & image acquisition available on request
  • User activity history available as log file
  • User image can be saved as acquisition data.
  • Possible to view users in multi view screen
  • The Server software allows to view users in multi view screen
  • 4/8/16 users at once (upon configuration).

Client Side

  • Allows up to 5 local users per machine
  • Software allows user managements.(Enroll/Delete/Username + Password)
  • System screen is locked when user is absent for a period of time (Interval)
  • The user can manually lock his PC
  • The user can select the relevant video source
  • The user can configure Video device up to his driver configuration

Supported Cameras

  • Full support for Analog Cameras
  • IP Cameras
  • Full support for USB Camera
  • Supports in Logitech®, Microsoft®, Vivotek®, Axis® Cameras 
Visit for more details : www.inttelix.com

FAQs on Facial Biometrics

1.What is biometrics?

Biometrics is the science of measuring and studying biological data. In I.T., biometrics refers to technologies that measure and analyze human body characteristics, such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes.

2.What is the most common biometrics?

Fingerprints have been using successfully in a law enforcement environment for over 100 years. New biometrics systems have emerged in recent years including Hand Geometry, Iris Recognition, Retina Recognition, Signature Verification, Vein Patterns, Facial Recognition and DNA.

3.What is a Facial Recognition System?

Facial Recognition system is a computer program that is used for identifying a person automatically. Research on this technology started in the mid 1960s. The technology works by using several facial features in a person's image and comparing these with existing images in the database. Facial recognition systems are used as an additional and mass security measure and are comparable to the other biometric security systems available today such as retina scanners, fingerprint scanners, etc.

4.How well do biometrics work?

Used in the right environment, biometrics can make a major contribution to improving security. It has to be understood that no single biometric that can be used in real-time is 100% accurate. However when used in conjunction with a personal identifier such as an ID card or PIN, it can be a very effective means for verifying one’s individuality. Its importance generally comes as an aid to recognition rather than guaranteeing someone's identity.

5.How are biometrics selected?

While the emphasis will differ in different applications, the following criteria are used to determine which biometric should be used in a specific application:
  • accuracy
  • speed
  • intrusiveness

6.How does biometrics work?

Almost all biometrics work essentially in the same way. The finger/face/iris is scanned and the locations of key features of the pattern relative to each other are determined. This information is transformed into a digital string and then it is added to the individual's record. When a match is undertaken, the process is repeated and a second string is generated. By matching this string with the one on the individual's record and comparing the result to a user-specified acceptance threshold,the system can establish the facts on the individual’s claim on his identity.

7.What is the Technology behind Facial Recognition Systems?

The most important factor in Facial Recognition systems is its ability to differentiate between the background and the face. This is very important when the system has to identify a face within a crowd. The system then makes use of a person's facial features - its peaks, valleys and landmarks - and treats these as nodes that can be measured and compared against those that are stored in the system database. There are approximately 80 nodes comprising the face print that the system makes use of and this includes the jaw line length, eye socket depth and distance between the eyes, cheekbone shape, and the width of the nose.

8.What is FAR, FRR ?

The accuracy of face recognition system is often defined in terms of two parameters, False Rejection Rate (FRR) and False Acceptance Rate (FAR).
FRR measures how often an authorized user, who should be granted access, is not recognized, while FAR measures how often non-authorized user, who should not be granted access, is falsely recognized.
The control of FRR and FAR through recognition threshold adjustment defines the accuracy of face recognition system. When the recognition threshold is increased, it will adversely cause FAR to decrease. At the same time however, the increase of recognition threshold will result in the increase of FRR. For example, when recognition threshold is set at 100%, FRR rate will increase to its highest level.

9.What is Live Detection?

Live Detection Technology detects and memorizes the background where the camera is facing as part of parameters for identification and verification process. It can effectively detect the difference between a photo and a person in order to prevent imposters to gain access using photos

10.What is Moving Detection?

Face Recognition System is equipped with moving detection function that analyzes the captured image periodically to identify the presence of a moving object and its position. The face detection function then analyzes images to detect a human face and its position.
These two functions can be integrated to provide automated surveillance for detecting moving faces, positioning and data recording. The records can be used in Face Recognition System for enrollment purpose.

11.Three-Dimensional facial Recognition Systems

The new facial recognition systems make use of three-dimensional images and are thus more accurate than their predecessors. Just like two-dimensional facial recognition systems, these systems make use of distinct features in a human face and use them as nodes to create a face print of a person. Unlike two-dimensional face recognition systems, however, they have the ability to recognize a face even when it is turned 90 degrees away from the camera. Moreover, they are not affected by the differences in lighting and facial expressions of the subject.

Facial Recognition for PC Security

logonlogo

Facial Recognition

PC Security

logontheme Most of the people store their personal or business information in computers. However, with the trend of increasing number of identity thefts, conventional way of using ID and password to protect access to computer involves lot of risks .
Logon provides a simple but effective option. The integration of Logon and PC camera provides access only when a live-fed face image of authorized user is detected, thus effectively preventing unauthorized access. Logon is a non-invasive technology that does not require physical contact.
  • Hands-free login using Facial Biometric Technology
  • Constant search for the presence of the user
  • Automatic lock, if an unauthorized user tries to use system
  • Options for 1 / 5 / unlimited users (up to database size limitations)
  • Very small Face template size: 2.3KB, thereby low disk usage
  • Works with all normal 640X480 pixels good quality Webcams (interpolation cameras are not recommended)
  • Fast & accurate face detection

Hands-Free Login

This is a revolutionary technology that facilitates secure and biometric login to a Microsoft Windows environment. The software runs an automatic scan and then detects and matches the physical presence of the user, thereby eliminating the need for user name and password. The process does not store any image of the user but uses only algorithm based calculation results.
In case the user is absent, the system locks the computer access until the FRS FaceLog Scan identifies the user through the physical data stored in the system

Advantages

  • Allows up to 5 local users per machine
  • Software allows user management
  • System screen is locked when user is absent for a period of time (Interval)
  • The user can manually lock his PC
  • The user can select the relevant video source
  • The user can configure Video device up to his driver configuration

Supported Cameras

  • Full support for Analog Cameras (through video grabber)
  • IP Cameras
  • Full support for USB Camera
  • Supports in Logitech®, Microsoft®,Vivotek®, Axis® Cameras 
Visit now www.inttelix.com 

Facial Recognition Surveillance System

suspectlogo

Facial Recognition

Surveillance System

suspecttheme The world faces a lot of threats and risks at this present era and for the same reason the need for upgrading and integrating the security needs at all levels are highly vital.
Video security, biometrics and face recognition systems are at the forefront of the world's efforts to cope up with the threats at hand. The need to accurately detect the suspects in real time or suspicious behavior has become evident in places such as airports and railway stations, government and public buildings as well as around high security facilities such as water and energy utilities.
  • Real time multiple video stream analysis and reconcile the evidence with the facts
  • 1:N Matching, database matching between live images, video images and database images
  • Real time face comparison against watch list
  • Alarm notification and recordings
  • Enrollment from still image, still image camera and live video stream
  • High scalability in terms of watch list size, number of video streams, and number of visible faces
  • End-to-end security solution
  • Web-based system administration
  • Comprehensive audit trails and reports

Whole face capture in surveillance area

FRS Suspect Detect acts as a surveillance system that has video recording capability.The system can automatically detect faces of people that appear in the surveillance area.
With its intelligent face recognition algorithms, FRS Suspect Detect analyses the input from numerous CCTV cameras, comparing the captured face images with database containing previously stored profiles and face templates.
As face images are detected, FRS Suspect Detect automatically captures and records those face images. At the same time as capturing face images, FRS Suspect Detect matches all those captured images with the face images pre-enrolled in the database.

Applicable For

  • Law Enforcement agencies, Airports & other high traffic areas
  • Criminal Investigation
  • Casinos, Clubs, Sport arenas
  • Banks & Buildings requiring high security.

System Targets

  • Improve Video Quality
  • Centralized Digital Suspect Album
  • Automatic Suspect Enrollment
  • Automatic Suspect Detection

System Workflow

  • Suspect are captured on the enrollment system
  • Stores faces in local database
  • Export to global database
  • Suspect Detect matches images with the pre-enrolled images in database.
Visit now : www.inttelix.com

Face Biometric Login Through Web

webaccesslogo

Face Biometric Login Through Web


webaccessthemeWeb Access is an innovative solution for remote facial authentication through Web and TCP/IP networks. The solution allows remote Face Authentication through a Web Component which could be embedded on any web page. The system does Face Recognition and allows to face-authenticate a user along with password authentication. WebAccess is a revolutionary mechanism that facilitates secure login to a remote site from a web page. Web Access component will be embedded in login authentication web page.
  • Embeddable in any web page
  • Global Face Authentication capability
  • Free version available
  • View of authenticated clients
  • Messaging to Clients possible
  • Remote Backup/Restore
Click here for Demo

Suitable For

  • Online banking
  • Organizational web sites
  • IT industry
  • Other sensitive web resources

Advantages

  • User can get authenticated from any where in the world with internet
  • Administrator can enroll a user from any where in the world using internet
  • Reliable authentication using Biometric feature (Face Recognition)
  • Centralized Authentication reduces maintenance costs
  • Client machine does not require any software installation (Apart from settings change)
  • Unlimited number of users (Depending on database size limitations)
  • Fast and accurate face detection (Depending on internet connectivity speed)
  • Works with normal 640 x 480 pixels Web Camera (Interpolation cameras not required)
  • 1:1 matching
  • Strengthens Password login with face recognition technology
Hardware Requirements
  • Microsoft® Windows XP/VISTA
  • Minimum Memory : 512 MB RAM
  • HD Free Space : 50 MB
  • Processor : at least 1.2 GHz

Server Side

  • View list of authenticated users
  • User information and image acquisition available on request
  • User authentication history available as log file
  • User images possible to be saved as acquisition data
  • Possible to view users in multi view screen

Supported Cameras

  • Full support for Analog Cameras
  • IP Cameras
  • Full support for USB Camera
  • Support in Logitech®, Microsoft®,Vivotek®, Axis® Cameras
www.inttelix.com

Features of Facial Recognition Systems.

www.inttelix.com

Commercial Security

Imaging Analysis is arguably one of the fastest growing sectors of the Surveillance market place. It is gaining a strong foothold within Commercial Security considerations. In Shopping Centers, Public Buildings, Campuses and even Commercial premises there is an increasing requirement to secure common areas to a reasonable level. Today, we see an overwhelming desire to install a greater number of CCTV cameras, but who monitors each of these cameras and how is one security guard able to identify the threat; a stalker, a murderer or a thief? This is where imaging analysis can assist in a series of measures to ensure that public places are thoroughly scanned and a strict vigil is in place to track the movement of unidentified persons.

Face Recognition Method

With advancement in image analysis, facial recognition system is rapidly gaining its significance. The greater the ability to match a series of points (dimensions & pixel points) on a face, the better the percentage success rate in face identification.

Face Recognition

Humans use faces to recognize individuals. Recent advances in computing technology and capability now enable similar recognition automatically. Early face recognition algorithms used simple geometric models, but the recognition process has now matured into a science of sophisticated mathematical representations and matching processes. Major developments have propelled face recognition technology into the spotlight. Face recognition can be used for both verification (1:1) and Identification (1: N) applications.

Face Template

The heart of the facial recognition system is the Local Feature Analysis (LFA) algorithm. This is the mathematical technique the system uses to encode faces. The system maps the face and creates a "template" as a unique numerical id for that face. Once the system has stored a "template" it can compare it to the thousands or millions of "templates" stored in a database; each template occupies only 2-3 KB of data.

Algorithm

The right algorithm will enable fast and accurate face localization for reliable detection of multiple faces in still images as well as in live video streams. This simultaneous multiple face processing and identification can happen in a single frame. The face needs to be detected in less than 0.1 seconds and then processed in less than 0.2 seconds. This rapid detection rate allows comparison of up to 100,000 faces per second, through the recorded frames generating the collection of the generalized face features from several images of the same subject and writing it to the database. In this way the enrolled feature templates are more reliable and the face recognition quality increases considerably over time.
video surveillance

Identification vs. Verification

Verification (1:1, one-to-one) – This is the process of determining a person's identity by performing matches against one biometric template that is located upon a known ID. 1:1 verification usually uses a manual interface like a card, RFID, code or any other similar key based indexing.
Identification (1:N, one-to-many) – This is the process of determining a person's identity by performing matches against multiple biometric templates. The identification system is designed to determine identity based solely on biometric information. There are two types of identification systems: positive identification and negative identification. Advanced applications allow our customers full control over recognition methods where we support both 1:1 (verification) and 1: N (identification) methods.

Product Solutions

We offer a range of Facial Recognition Solutions designed to provide verification (1:1) and identification (1: N). These start with the basic Logon system that monitors who is using your computer or laptop. Supervision is a solution for remote facial recognition through Web / 3rd Generation (3G) Cellulars and TCP/IP networks. This allows both local and remote recognition through fast and smart facial recognition engine. Access II and III provide access control support for verification and then combine with Vistrack as a Visitor Tracking system. We also provide identification solutions integrating Logon, Supervisor, Access and Vistrack into our Suspect and Observer packages. FRS Suspect and FRS Observer are advanced surveillance systems that can automatically detect faces both online or offline using the above fast acquisition methods. They analyze the inputs from numerous CCTV cameras, comparing the extracted face templates from the cameras with a database containing previously stored profiles and face templates. As each image is detected they automatically raise alarms through whatever interface is required including SMS, PDA, Email and Web.

Conclusion

Face Recognition Technology will be considered an inevitable part of the Public and Commercial Security Solutions. Through the integration of different biometric tools many industries and organizations will enhance their security situations to a higher level. Image analyzing systems will be extensively used in controlling access, time and attendance management, Management information systems etc. to provide a comprehensive measure to improve safe and peaceful working environment.

Visit for more details : www.inttelix.com 

Biometric Security in Hospitality Sector

Introduction

biometrics Hotels are the pillars of hospitality industry. A good hotel is identified by its good service offer. Good service includes security. A hotel with the best service but poor security would expose guests to crime risks and compromise reputation and goodwill. Hoteliers are responsible for the protection of property and well-being of their guests.

A crime can occur in any place at anytime when the elements of opportunity, target and offender coincide. Hotels have to assess the risks and place a comprehensive security system in place. Security is an essential investment and not an optional expenditure.

The Mumbai terror attack that targeted the country's premium hotels kept the hospitality industry on edge.
Managing security in hotels is a delicate balancing act. On one hand, guests want to know that their rooms and possessions are secure. They want to feel they're in a safe and secure place with an air of luxury
Hotel safety and security is a growing concern among travelers throughout the world. Nobody would like to be a victim of crime while being away from home. The world has changed a lot and the perception of security also.

biometrics

Security needed areas in Hotel

  • Guest Rooms
  • Lifts
  • Corridors
  • Lobbies
  • Meeting Halls
  • Lawns
  • Escalators
  • Entrances and exits leading to corridors
  • Restaurants
  • Parking Areas

Solutions for prevent crime in hotels

  • Visitor / Guest Registration using FRS (Face Template storage in database)
  • CCTV monitoring in public and non-public areas (Video Surveillance)
  • Detection of unauthorized / suspicious visitors (Access Control)
  • Access Control to entry restricted areas such as other rooms, premises.
  • Staff, Guests and Visitors Activity Monitoring
  • Electronically Controlled Door for Guest Rooms (Entry to rooms only after authentication)

Computer-assisted video surveillance

FRS Suspect Detect automatically scans incoming video streams, detects multiple faces and checks for possible "watch list" matches. If a match is found, operators are notified - in real time – allowing them to focus on the identified person instead of simultaneously observing multiple video screens.
Applications include not only the identification of unwanted people in public places, but also the identification of high-ranking customers.
The latest release of FRS Suspect Detect combines our leading face recognition technology with state-of-the art camera and computer equipment.

Features

  • Real time face tracking on multiple video streams
  • Real time face comparison probe against "watch list"
  • Interactive and batch enrollment
  • Enrollment from still image, still image camera and live video stream on manual and automatic mode
  • Real time alarm notification and recording
  • High scalability in terms of "watch list" size, number of video streams and number of visible faces
Visit now www.inttelix.com

Face Biometric Security in Financial Sector

Introduction

Financial Sector The banking and finance sectors have always been victims to robberies and fraud attempts. This poses a threat to both the employees and the customers. Fraud attempts are happening inside the tellers. People can be victims of robberies at ATMs where they withdraw cash from. It is therefore a high priority to ensure safety and security at these places to solve any incident quickly and accurately.
 
Inttelix Biometric Solutions help Banking and Finance sectors raise security levels and solve fraud attempts swiftly.
The use of biometric technology is increasingly being recognized in the banking industry as a viable means to prevent identity fraud, safeguard data, improve ease-of-use and save money without losing passwords. It is no surprise that many banks are turning to biometric technology for increased security & convenience.
As a proven innovator and biometrics research & development firm, Inttelix offers a host of facial biometric solutions that can help banks to reduce fraud and streamline operational processes by securing internal networks and / or integrating facial biometric functionality into existing in-house applications.
Banks can use our facial biometric solutions to safeguard enterprise data and reduce costs. Our solutions will enable banks to have a secure login to their network and replace user names & passwords with something that nobody can share, lose or forget, i.e. Your Face!

Fraud in Banking

Financial Sector
  • Internal fraud: Employees attempting to withdraw money from a customer’s account without their consent
  • External fraud: An individual assumes the identity of a customer of the bank in order to withdraw money from the account
  • Identity theft
  • Online transaction fraud (Most regulations for bank accounts, established before the age of cyber crime, don’t account for such activity.)
Internal fraud is an increasing threat to the financial security of businesses. Our Solutions add the security enhancement of facial biometrics to the existing financial management applications, ensuring that only authorized personnel can validate financial transactions.

Importance of Authentication in Financial Transactions

PINs and passwords are vulnerable to being forgotten, given away, observed by others or otherwise obtained. Cards can be stolen and /or forged. It's true that a biometric authentication can help against fraud. Combining the operations with a biometric system will improve both usability and security. This proves that the performance and capability of the biometric technology is sufficiently high.

Gateways for Facial Biometric Solutions in Banking Sector

Transaction Security

  • Secure customer transactions and protect their privacy either remotely or onsite
  • Enroll and authenticate bank employees before they can access the bank’s network to perform a transaction

Network Security

  • Controls or monitors individual’s specific activities in a network or regulates access to select infrastructure after authorization

Access Control

  • To protect the physical security of facilities (safety deposit boxes, lockers, cash chests and entry restricted area)
  • Access control for employees, visitors and clients at buildings and strategic points.

Remote Supervision

  • Protection against internal fraud and illegal transactions through Remote Supervision
  • Facilitates to monitor the productivity and efficiency of an employee

Time Attendance

  • Employees’ check-in/check-out events are marked automatically by recording the biometric credentials.
  • Work hours are tracked for each employee, division or organization as a whole

Benefits of Facial Biometrics Implementation

  • Provides user authentication
  • Allows non-duplicable transaction
  • Maximizes network security
  • Ensures user privacy
  • Protects institution’s physical assets
  • Prevents hackers and ID fraud
  • Eliminates password frustration
  • Cuts IT cost in password maintenance
  • Increases corporate image, productivity and profitability
Visit Now www.inttelix.com

Facial Recognition Authentication Solutions!

www.inttelix.com 


Authentication Solutions


Our Authentication Solutions prevent unauthorized access to your corporate information and secret resources with Facial Recognition technology. The solutions enable you to register your own face as proof-of-identity using Facial Recognition system.

With our Authentication solutions, your organization can keep proof-of-identity before granting users access to IT systems, valuable resources, restricted areas and information across your corporate infrastructure. For maximum return on investment (ROI), we provide biometric authentication solutions with excellent balance between quality and price.

Authentication for Workstation or Desktop – Our Authentication ensures only authorized users to access workstations and wired or wireless networks within an organization.

Authentication for Remote Access – Remote Access is the most vulnerable entry point to IT resources. It is open to attacks from outside of the organization's physical perimeter. Our solutions deliver the most advanced security solutions for remote facial recognition through web / 3G Mobile / TCP/IP Networks.

Authentication for Application Access – Usually the users require authentication to access the enterprise applications. In a typical situation, passwords are used. By the use of our authentication solutions you can ensure physical presence of user for specific business applications.

Recognition Systems

Recognition Systems Recognition system uses Biometrics- a person’s distinguishing traits- to auto-recognize a person.
Biometrics system is used for human recognition, i.e. for identification and verification. Biometric solutions are the new face of security in the corporate world. Facial Recognition system analyses characteristics of a person's face image inputs through a camera. It measures overall facial structure, distances between eyes, nose, mouth, and jaw edges. These measurements are retained in a database and used for comparison when a user stands before the camera.
One of the strongest positive aspects of facial recognition is that it is non-intrusive. Our facial recognition technology is based on neural computing principles, which combine the advantages of neural and elastic networks. Our surveillance platforms are able to extract faces from a moving or a static environment and run to verification checks against those on watch lists and central databases.

Advanced Automation

Automation We undertake research and development of Biometric-based projects at a consulting level. It includes designing, engineering, integration and implementation of customized biometric solutions. We provide biometric solutions with an excellent balance between quality and price, protecting corporate security and personal identity using smart biometric authentication algorithms. These solutions provide the best security with the latest technology. We also create embedded computing solutions and which can be integrated with the biometric solution too.

 visit now www.inttelix.com

Visitor Tracking with Facial Recognition!


www.inttelix.com introducing!
Visitor Management System which is specially designed to keep track of visitors coming and going out of the premises. With this system you will be able to expedite the visitor registration process, determine who is still inside your facility and notify the system users once any banned visitor intends to sign in or sign out.This system utilizes the latest technology which enhances the security in the facility. Employees and visitors will feel more secure and protected and it will create a great first impression on the corporate image. 

Key Features
  • Detects, identifies and captures visitor from remote
  • Updates visitor statistics
  • Meets and schedules appointments over website
  • Visitor kiosk creates photo affixed visitor cards
  • Stores the secrets of embedded facial features of visitor
  • Identifies visitor and lists out previous visit details
  • Restricts visitor engagements as and only scheduled by the host.
  • Ensures and records access to hosts only on prior appointment
Modules

Visitors Register facility:

The Visitor Register Facility offers a comfortable way for entering visitors and hosts details, purpose of visit etc. Details of appointments and previous visits of a visitor can be retrieved automatically. To create an air of courteousness, the visitor is welcomed by the system by calling his/her name, after identifying from the facial features recorded during previous visits. Details of the present visit also are fed into the system.

Visitor ID card Printing

  • Print Visitor ID card with photograph, name and other details regarding the visit.
  • Provide facility to confirm the visit only to the permitted person.
  • Visitor black listing
  • Facility to deny appointment for black listed visitors

The System Shall

  • See the status of appointments before accepting the registration.
  • Provide facility to schedule or re-schedule appointments
  • Record facial features of the first time visitor or retrieve the facial ID and record details of present visit.
  • Facility to deny appointment for black listed visitors

Advantages

  • Easily records visitor details and track their log data.
  • With automatic detection function, system can retrieve a specific date or time of each visit.
  • Visitor’s data contains visitor name, company name, reason for visit, visiting dept.etc.
  • Access area and time can be controlled by access group

Various reports given by the system include:

  • Visitor Statistics
  • Entertained Visitor statistics
  • Visitor frequency report
  • Department wise visitor report
  • Daily visitor report

Appointment Management

Vistrack provides innovative solution for Appointment Management. Web based appointment is an interesting option .Visitor can log in to the website of the organization by adding his/her photograph for obtaining the appointments. The officials in the organization can schedule the appointments recognizing the online visitor by the photograph. The system in turn recognizes the visitor when he reaches the organization.

Employee / Staff Recognition

The system’s intelligence recognizes the employee and staff of the organization and does not activate the routine for visitor, when an employee of the organization approaches the visitor kiosk.

visit now www.inttelix.com 

Access Control - with Face Recognition Technology [www.inttelix.com]


We provide solutions centered on special biometric platform which allow a cost-effective balance between easy-to-use technology and fast integrated mechanism. We have significant experience in handling and developing many biometric-based projects at consulting, designing, engineering, integration and implementation levels.


Concentrating on its proven expertise in biometric technology and its unique multi-factor authentication platform, Inttelix integrates all major secure authentication standards, helping organizations to bridge the gap between physical and logical access to create secure working environment.

Our biometric technologies are ranked among the highest performing. We understand the importance of addressing the authentication needs of customers to create a comprehensive and security-rich environment. Knowing this, we have maximized our capabilities in Research, Development and Manufacturing areas to offer customized end-to-end solutions to our customers according to their business requirements. Corporates, Financial Institutions, Government, Law Enforcement Agencies, Defence, Healthcare and Retail Markets etc. are potential entities where biometric solutions are highly imperative.

The following solutions are available for our customer with integrated facial biometrics

 To know more visit www.inttelix.com
pcsecurity

Authentication Solutions

Inttelix’s Authentication Solutions using Facial Recognition System (FRS) prevent unauthorized access to your corporate information and secret resources. FRS provides proof-of-identity through secure authentication with Facial Recognition.
With our tested and proven authentication solutions, your organization can establish undeniable proof-of-identity before granting users access to IT systems, valuable resources, restricted areas and information across corporate infrastructure. To ensure maximum ROI, we offer biometric authentication solutions with excellent balance between quality and price.
facerecognition

Recognition Systems

Our facial recognition technology is based on neural computing principles, which combines the advantages of neural and elastic networks. Our surveillance platforms are designed to capture faces from a moving or a static environment and given to verification checks against those on watch lists and central databases.
 
biometricattendance

Time Attendance Systems

Our solution provides effective cost savings for employers while being extraordinarily convenient for employees. With our solutions, there are no employee cards, physical maintenance of log books or punching. Employees can mark their attendance with all IN & OUT details simply showing their face.
 
accesscontrolfrs

Access Control Solutions

Our Access Control solutions enable you to control physical access of people to your premises, through the use of biometric verification. Inttelix has both the hardware and software solutions to incorporate the advanced security of biometric verification into your access control and security model.
 
lawenforcement

Law Enforcement

Face recognition technology can assist law enforcement agencies to identify suspects. Whenever a photograph or video footage of a suspect is available, the images can be compared to image databases of known criminals and show the most similar faces (match list). Similarly, the system can be applied to track the missing persons also. This capability has turned out to be a very useful tool in the criminal investigation process.
 
cctcsurveillance

Video Surveillance and Security

Our video surveillance platform has been specifically designed to enhance security, increase operational efficiency and improve ROI. It automatically scans incoming video streams, detects multiple faces and checks with ‘watch list’. The system offers a powerful search mechanism in the field of investigation. The enhanced video analytic techniques can also be used to reduce loss, fraud and keep a watch on suspicious/criminal activities.
 
civilidentity

Personal Identification Registers

Our Biometrics based system can provide a permanent solution for personal identification and verification, since it is non-invasive and irrefutable. Accordingly, we are able to provide personal identification register solutions such as ID Cards, Voters Cards and such unique identification cards using facial identity. Using face image itself as an identity helps minimize duplication or fake registration. Our solution is an answer to the challenge of duplication in large sea of photo databases. Our system is also ready to be concurrently integrated with the existing issuing processes.
 
retailsolution

Retail & Marketing

Our Interactive Digital Signage solution adds new meaning to the phrase “Window Shopping”. The window technology enables the customers by to interact with the signage-screen by simply pointing to it to access information. The sophisticated technology tracks the user’s movements through a combination of sensors and software. The users can intermingle with the screen display/menu using their finger points as a computer mouse.
 To know more visit www.inttelix.com

School Security & Automation


It is no more an aspiring imagination to offer the parents a real-time Bird watch on their children through advanced technology. Inttelix's secure technology helps keep a watch on the children to make them feel relaxed and secure, and give them a comfort level so far only heard of. Thanks to the Face Recognition System and Biometric Technology. Keeping informed of the whereabouts of the child to the parents and school is a smart idea idea that will eliminate worrisome moments from both the parents and school authorities alike.

Key Features
  • Student Demographics and Information
  • Parental Information and Family Details
  • Student Authentication (RFID & FRS)
  • Graphical Performance Analysis
  • Examination Module
  • Attendance & absence notification to parents / school
  • Bus boarding alerts
  • Event notification to parents
  • School Vehicle GPS tracking

Student Authentication

Each student will have his own RFID tag. The students are to scan it at readers and pose in front of the Face Recognition system while boarding the Bus, at School Gate & at each class room of the school to keep track of his movement and the system will automatically sends an SMS to the parents/guardian at each stage.
Employee Attendance
The school and parents can confirm what time students arrive and leave, and their attendance at each classroom session with Face Recognition & RFID (1:1) Authentication.

Automatic SMS Reporting

Campus Auto Attendance automatically notifies the parents of their students' attendance violations through SMS. At the prompt, the parents will have the option to leave a SMS back excusing the students' absences.

Important Modules

  • Student Admission System
  • Student Information System
  • Student Fee Management System
  • Staff Information System
  • Payroll Management System
  • Attendance Management System
  • Time Table Generation System
  • Financial Accounting System
  • Examination Management & Result Analysis System
  • Inventory Management System
  • Library Management & Automation System
  • Hostel Management System
  • Conveyance Management System

Advantages

Administration

Provides schools with an easy access to pupils, staff and manage school data in a secure and friendly environment without the need for having an extensive training or ICT experience. Single data entry and the automation of routine tasks and reports save much time.

Attendance

System will streamlines the collection, management and analysis of statutory attendance records. Easily supports electronic attendance, bringing the MIS into the classroom.

Assessment

Can access pupil performance data quickly and helps analyze statistical records, making parents & teachers easier to track a child's progress.

Reporting to Parents

Makes parental reporting very easy. Staff can quickly produce individual, subject, faculty wise and periodical reports easily.

Financial Accounting

Provides powerful and straightforward financial management for non-accountants. The easy use of this system will enable the smooth operation of financial matters with regard to the school management.
  • Flexible reporting - all the facts and figures at a glance
  • Better communication – presents data clearly in tables / graphs
  • Better control - accurate income and expenditure status at the press of a button
  • Designed for schools – addresses the day-to-day realities of school financial management.

Benefits to Parents

  • Instant report by SMS when child boards bus
  • On time SMS on School Attendance
  • Online Reports of Attendance
  • Mark list through Students/Parents online login
  • Emergency reporting through SMS
  • Parents meeting notice through SMS
  • Events of School through SMS
  • Absent reporting & Reply system through SMS
  • Student Performance Tracking through Website

Benefits to Teachers

  • Complete attendance automation.
  • Complete marks / grade management system.
  • Publish online exams.
  • Interact with parents efficiently and effectively.
  • Online assignment management.
  • Manage class information and analytical reports.
  • E-mail & Internal messaging system.
  • Lesson Planner 
To know more visit www.inttelix.com

What is Biometris?

www.inttelix.com
Biometrics refers to an automated system that can identify an individual by measuring their physical and behavioral uniqueness or patterns, and comparing it to those on record. In other words, instead of requiring personal identification cards, magnetic cards, keys or passwords, biometrics can identify fingerprints, face, iris, palm prints, signature, DNA, or retinas of an individual for easy and convenient verification. With the boom in Internet-based business and the increased need for accurate verification when accessing accounts, biometrics is the simplest and most convenient the solution. Its universal, unique, permanent and measurable features ensures security of information in E-commerce, such as on-line banking and shopping malls. Biometrics can also provide you with convenience and security, by enabling a machine to verify the individual by itself and to respond to the individual’s requests. Through the use of such physical controls as access control, and punch card maintenance, user restrictions on certain apparatus can be made possible with an automated verification system.

To know more login to www.inttelix.com

Biometric Advantages

  • No more forgotten or stolen passwords.
  • Positive and accurate Identification
  • Highest level of security
  • Offers mobility
  • Impossible to forge
  • Serves as a Key that cannot be transferred.
  • Safe & user friendly

Common Human Biometric Characteristics

Biometric characteristics can be divided in two main classes, as represented in figure on the right:

  • physiological are related to the shape of the body. The oldest traits, that have been used for more than 100 years, are fingerprints. Other examples are face recognition, hand geometry and iris recognition.
  • behavioral are related to the behavior of a person. The first characteristic to be used, still widely used today, is the signature. More modern approaches are the study of keystroke dynamics and of voice.

Facial Identification Technology

Facial biometrics is one of the fastest growing areas of biometrics. With growing technologies facial recognition can convert a photograph or a video image into a code that describes a face’s physical characterizes. This can be used to identify the common person from a distance, without intruding into their personal space. Computer software for facial identification reads the peaks and valleys of an individual’s facial features; these peaks and valleys are known as nodal points. There are 80 nodal points in a human face, but the software needs only 15-20 to make an identification. Specialists concentrate on the golden triangle region between the temples and the lips. This area of the face remains the same even if hair and a beard is grown, weight is gained, aging occurs, or glasses are put on.

To know more login to www.inttelix.com

Fingerprint Identification Technology

A fingerprint is made of a a number of ridges and valleys on the surface of the finger. Ridges are the upper skin layer segments of the finger and valleys are the lower segments. The ridges form so-called minutia points: ridge endings (where a ridge end) and ridge bifurcations (where a ridge splits in two). Many types of minutiae exist, including dots (very small ridges), islands (ridges slightly longer than dots, occupying a middle space between two temporarily divergent ridges), ponds or lakes (empty spaces between two temporarily divergent ridges), spurs (a notch protruding from a ridge), bridges (small ridges joining two longer adjacent ridges), and crossovers (two ridges which cross each other). The uniqueness of a fingerprint can be determined by the pattern of ridges and furrows as well as the minutiae points. There are five basic fingerprint patterns: arch, tented arch, left loop, right loop and whorl. Loops make up 60% of all fingerprints, whorls account for 30%, and arches for 10%. Fingerprints are usually considered to be unique, with no two fingers having the exact same dermal ridge characteristics.

To know more login to www.inttelix.com

Hand Geometry

Hand geometry is a biometric that identifies users by the shape of their hands. Hand geometry readers measure a user's hand along many dimensions and compare those measurements to measurements stored in a file. Viable hand geometry devices have been manufactured since the early 1980s, making hand geometry the first biometric to find widespread computerized use. It remains popular; common applications include access control and time-and-attendance operations.

Iris recognition

Iris recognition is a method of biometric authentication that uses pattern recognition techniques based on high-resolution images of the irides of an individual's eyes. Not to be confused with another less prevalent ocular-based technology, retina scanning, iris recognition uses camera technology, and subtle IR illumination to reduce specular reflection from the convex cornea to create images of the detail-rich, intricate structures of the iris. These unique structures converted into digital templates, provide mathematical representations of the iris that yield unambiguous positive identification of an individual.

Iris recognition efficacy is rarely impeded by glasses or contact lenses. Iris technology has the smallest outlier (those who cannot use/enroll) group of all biometric technologies. The only biometric authentication technology designed for use in a one-to many search environment, a key advantage of iris recognition is its stability, or template longevity as, barring trauma, a single enrollment can last a lifetime.

DNA Identification technology

Deoxyribonucleic acid (DNA) Biometrics could be the most exact form of identifying any given individual (Baird, S., 2002). Every human being has its own individual map for every cell made, and this map, or ‘blueprint’ as it more often is called, can be found in every body cell. Because DNA is the structure that defines who we are physically and intellectually, unless an individual is an identical twin, it is not likely that any other person will have the same exact set of genes (Philipkoski, K., 2004).

DNA can be collected from any number of sources: blood, hair, finger nails, mouth swabs, blood stains, saliva, straws, and any number of other sources that has been attached to the body at some time. DNA matching has become a popular use in criminal trials, especially in proving rape cases (Landers, E., 1992). The main problems surrounding DNA biometrics is that it is not a quick process to identify someone by their DNA. The process is also a very costly one (Baird, S., 2002).

DNA Biometrics is not a fool proof method of identification. If forensic scientists to not conduct a DNA test properly, a person’s identification code can be skewed. Another problem is matching prior DNA samples to new samples; this is a bigger problem in DNA fingerprinting.

To know more login to www.inttelix.com

What is Face Recognition Technology?

www.inttelix.com FACE RECOGNITION TECHNOLOGY

Face recognition technology is the least intrusive and fastest biometric technology. It works with the most obvious individual identifier – the human face.

Instead of requiring people to place their hand on a reader or precisely position their eyes in front of a scanner, Face Recognition systems silently take pictures of people's faces as they enter a defined area. There is no intrusion or delay, and in most cases the subjects are entirely unaware of the process. They do not feel "under surveillance" or that their privacy has been invaded.

FRS Technology

Facial Recognition analyzes the characteristics of a person's face images input through a digital video camera. It measures the overall facial structure, including distances between eyes, nose & mouth and jaw edges. These measurements are retained in a database and used for comparisons when a user stands before the camera. This biometric has been widely and perhaps wildly, touted as a fantastic system for recognizing potential threats. (Whether terrorist, scam artist or known criminal)but so far has been unproven in high-level usage. It is currently used only in verification systems with a good deal of success.

Every face has numerous, distinguishable landmarks and the different peaks and valleys- that make up one’s facial characteristics unique. Each human face has approximately 80 nodal points. Some of these features measured by the Facial Recognition Technology include distance between the eyes, width of the nose, depth of the eye sockets, shape of the cheekbones and length of the jaw line etc.

How it Works

The following four-stage process illustrates the way biometric systems operate:

Capture - : Physical or behavioral sample is captured by the system during enrollment

Extraction - Unique data is extracted from the sample and a template is created

Comparison - The template is then compared with a new sample

Matching - The system then decides if the features extracted from the new sample are matching or not

User faces the camera, standing about two feet from it. The system will locate the user's face and perform matches against the claimed identity or the facial database. It is possible that the user may need to move and re-attempt the verification based on his facial position. The system usually comes to a decision in less than 5 seconds.

To know more please visit www.inttelix.com

Use

Currently gaining support as a potential tool for averting terrorist crimes, facial recognition system is already in use in many law enforcement areas. Software has already been developed for computer networks and automated bank tellers that use facial recognition for user verification purposes.

Evaluation

One of the strongest positive aspects of facial Recognition is that it is non-invasive. Verification or identification can be accomplished from a distance of two feet or more without requiring the user to wait for a longer period of time or do anything more than look at the camera.

Face Recognition is also very difficult to dupe. It works by comparing facial landmarks - specific proportions and angles of defined facial features - which cannot easily be concealed by beards, eyeglasses or makeup.

The ideal solution

All of these makes face recognition ideal for high traffic areas open to the general public, such as:-

  • Airports & Railway Stations
  • Corporates
  • Cash-Points
  • Stadiums
  • Public Transportation
  • Financial Institutions
  • Government Offices
  • Businesses of All Kinds
To know more please visit www.inttelix.com

Access Control System (Face Recognition)

www.inttelix.com
Introducing!!!

Attacks on civil and institutional objects are potential threats in several parts of the world today. The target might be a bank or a company, and the attack might be motivated by money or ideological reasons, but the essential pattern is the same. To put an end to the increase in these types of attacks, it is high time that we have applied advanced scientific and technological solutions to real-life applications.


ACCESS uses a cutting-edge technology that facilitates secure and safe biometric access in electronically controlled doors.

Key Features

  • Convenient and secure method of controlling door entry
  • Authentication by Facial Biometrics to gain entry
  • Higher security than conventional systems
  • No keys or cards to carry
  • No need to issue keys or cards for every user
  • Accurate recording of arrivals and departures
  • Real time monitoring of door access
  • Intelligent access control by group or time schedule

Door Access Control

Access II is a door access control system that allows fast identification and smart access control for sensitive entrances where the speed and the security are vital. This system’s core supports both 1:1 & 1: N matching system, based on a stand-alone or networked database.

Software Features

  • Matching Speed: 100,000 Faces per second
  • Single Frame Processing Time: 0.15 Second
  • Enrollment Time = 1 Second
  • Identification Mode: 1:1, 1:N
  • Face Template Size: 2.3 KB per face
  • Log File Transactions: Up to 1,000,000 records
  • Basic license for 200 users

Supported Cameras

  • Full support for Analog Cameras
  • IP Cameras
  • Full support for USB Camera
  • Supports Logitech®, Microsoft®, Vivotek®, Axis® Cameras

Database Support

  • Microsoft Jet 4.0
  • Networked / Stand-alone
  • Dynamic location of database
  • Integral Import/Export feature
  • Integral reporting mechanism
  • Unlimited number of users (up to licensing steps)
  • Database Replication available through configuration (Optional)
  • Database customization to customer's needs(Optional)
  • Use of other databases such as: SQL Server, Oracle(Optional)
  • Connection to existing data-sources(Optional)
Hardware Requirements
  • Microsoft® Windows XP/VISTA
  • Minimum Memory : 512 MB RAM
  • HD Free Space : 50 MB
  • Processor : at least 1.2 GHz

Advantages

  • Hi-Tech Design
  • Event Transaction Logger
  • Remote door open
  • Fast and accurate face detection
  • Full remote control through network
  • Automatic door, output opening by time schedule

User Interface

  • Visual view of video input
  • Visual view of face detection
  • History / Enrolled / Suspects view
  • Voice alerts during system operation
  • Localization support exists for English, Spanish, French
  • Do-it-yourself localization available
  • Easy to use graphic interface

Facial Recognition Adjustable Attributes

  • Minimal Similarity Level
  • Eye distance
  • Matching attempts
  • Face sample rate