Monday, December 21, 2009
5 steps of Facial Recognition!
to attempt to identify a person or verify a person’s claimed identity. Regardless
of specific method used, facial recognition is accomplished in a five step process.
1. First, an image of the face is acquired. This acquisition can be accomplished
by digitally scanning an existing photograph or by using an electro-optical
camera to acquire a live picture of a subject. As video is a rapid sequence of
individual still images, it can also be used as a source of facial images.
2. Second, software is employed to detect the location of any faces in the
acquired image. This task is difficult, and often generalized patterns of what
a face “looks like” (two eyes and a mouth set in an oval shape) are employed
to pick out the faces.
3. Once the facial detection software has targeted a face, it can be analyzed. As
noted in slide three, facial recognition analyzes the spatial geometry of
distinguishing features of the face. Different vendors use different methods
to extract the identifying features of a face. Thus, specific details on the
methods are proprietary. The most popular method is called Principle
Components Analysis (PCA), which is commonly referred to as the eigenface
method. PCA has also been combined with neural networks and local feature
analysis in efforts to enhance its performance. Template generation is the
result of the feature extraction process. A template is a reduced set of data
that represents the unique features of an enrollee’s face. It is important to
note that because the systems use spatial geometry of distinguishing facial
features, they do not use hairstyle, facial hair, or other similar factors.
4. The fourth step is to compare the template generated in step three with those
in a database of known faces. In an identification application, this process
yields scores that indicate how closely the generated template matches each
of those in the database. In a verification application, the generated template
is only compared with one template in the database – that of the claimed
identity.
5. The final step is determining whether any scores produced in step four are
high enough to declare a match. The rules governing the declaration of a
match are often configurable by the end user, so that he or she can determine
how the facial recognition system should behave based on security and
operational considerations.
Examples of Biometrics (www.inttelix.com)
Biometric technologies may seem exotic, but their use is becoming increasingly common, and in 2001 MIT Technology Review named biometrics as one of the “top ten emerging technologies that will change the world.” While this briefing focuses on facial recognition, there are many different types of biometrics as Leonardo DaVinci’s Vitruvian Man makes clear. Examples include:
Iris Scan
Iris scanning measures the iris pattern in the colored part of the eye, although the iris color has nothing to do with the biometric. Iris patterns are formed randomly. As a result, the iris patterns in a person’s left and right eyes are different, and so are the iris patterns of identical twins. Iris scanning can be used quickly for both identification and verification applications because the iris is highly distinctive and robust.
Retinal Scan
Retinal scans measure the blood vessel patterns in the back of the eye. The device involves a light source shined into the eye of a user who must be standing very still within inches of the device. Because users perceive the technology to be somewhat intrusive, retinal scanning has not gained popularity;
currently retinal scanning devices are not commercially available.
Facial Recognition
Facial recognition records the spatial geometry of distinguishing features of the face. Different vendors use different methods of facial recognition, however, all focus on measures of key features of the face. Because a person’s face can be captured by a camera from some distance away, facial recognition has a clandestine or covert capability (i.e. the subject does not necessarily know he has been observed). For this reason, facial recognition has been used in projects to identify card counters or other undesirables in casinos, shoplifters in
stores, criminals and terrorists in urban areas.
Speaker / Voice Recognition
Voice or speaker recognition uses vocal characteristics to identify individuals using a pass-phrase. A telephone or microphone can serve as a sensor, which makes it a relatively cheap and easily deployable technology. However, voice recognition can be affected by environmental factors such as background noise. This technology has been the focus of considerable efforts on the part of the telecommunications industry and the U.S. government’s intelligence community, which continue to work on improving reliability.
Fingerprint
The fingerprint biometric is an automated digital version of the old inkand-paper method used for more than a century for identification, primarily by law enforcement agencies. The biometric device involves users placing their finger on a platen for the print to be electronically read. The minutiae are then extracted by the vendor’s algorithm, which also makes a fingerprint pattern analysis. Fingerprint biometrics currently have three main application arenas: large-scale Automated Finger Imaging Systems (AFIS) generally used for law enforcement purposes, fraud prevention in entitlement programs, and physical and computer access.
Hand/Finger Geometry
Hand or finger geometry is an automated measurement of many dimensions of the hand and fingers. Neither of these methods takes actual prints of the palm or fingers. Spatial geometry is examined as the user puts his hand on the sensor’s surface and uses guiding poles between the fingers to properly place the hand and initiate the reading. Finger geometry usually measures two or three fingers. Hand geometry is a well-developed technology that has been thoroughly field-tested and is easily accepted by users. Because hand and finger
geometry have a low degree of distinctiveness, the technology is not well-suited for identification applications.
Dynamic Signature Verification
We have long used a written signature as a means to acknowledge our identity. Dynamic signature verification is an automated method of measuring an individual’s signature. This technology examines such dynamics as speed, direction, and pressure of writing; the time that the stylus is in and out of contact with the “paper,” the total time taken to make the signature; and where the stylus is raised from and lowered onto the “paper.”
Keystroke Dynamics
Keystroke dynamics is an automated method of examining an individual’s keystrokes on a keyboard. This technology examines such dynamics as speed and pressure, the total time taken to type particular words, and the time elapsed between hitting certain keys. This technology’s algorithms are still being developed to improve robustness and distinctiveness. One potentially useful application that may emerge is computer access, where this biometric could be used to verify the computer user’s identity continuously.
Advantages of Face Recognition (In Surveillance)
For any biometric system to operate, it must have records in its database against which it can search for matches. Facial recognition is able to leverage existing databases in many cases. For example, there are high quality mugshots of criminals readily available to law enforcement. Similarly, facial recognition is often able to leverage existing surveillance systems such as surveillance cameras or closed circuit television (CCTV).
Friday, December 18, 2009
Face Recognition SDK
The FACEPORT ActiveX was specially designed for embedded environments like Intel ATOM CPU, and runs very well on Low performance CPU as well as high performance CPUs. The component supports Web Cameras, IP or Analog cameras through external an injection mechanism. The component includes internal web camera management. The component contains an internal Database that provides fast yet reliable management of the matching subjects.
FACEPORT SDK
The FACEPORT FRS SDK allows third-party developers to implement our advanced facial biometric technology within their own security applications. The SDK provides tracking, enrollment, verification, classification, database, communication, and multimedia controls.Applications
Security
- Access Control
- Suspect Detection
- Time Attendance
- Web Login
- PC Login
Commercial
- Repeated clients
- Interactive Content
- Customer counting
- Graphical Applications
Licensing
- PC based

SCREEN SHOT OF ACTIVEX RUNNING
Face Recognition Database
- Jet 4.0 - MS Access database (Optional: ODBC)
- Log Database : Jet 4.0 MS Access database
- Provides all interfaces necessary to Add, Delete and Retrieve biometric templates, images and users from the central database.
Properties
Name of Property | Description |
---|---|
NoOfFramesForValidation | Min. number of frames for validation |
NoOfFramesForEnrollment | Min. number of frames for enrollment |
FaceConfidenceThreshold | |
MinimalIOD | Min. Inner distance between 2 eyes (Default 60) |
MaximalIOD | Max. Inner distance between 2 eyes (Default 1500) |
FaceQualityThreshold | |
MatchingThreshold | Min. value for matching |
FAR | Will be calculated from matching threshold (theoretical value) |
MatchingAttempts | number of matching attempts |
AllowLiveness | Boolean - will define if we need to use liveness test |
LivenessThreshold | how strict to check for Liveness in an image.(default 50) |
MaxRecordsPerTemplate | |
AllowAging | Boolean - will define if we need to use aging+ |
AgingMinimalThreshold | |
EnrolledFaceImagePath | |
RejectedFaceImagePath | |
ValidatedFaceImagePath | |
LogDBPath | |
FRSDBPath | |
IsRegistered | returns true if registered |
FRR | Will be calculated from matching threshold (theoretical value) |
Camera | Gets/Sets the currently selected Camera |
VideoFormat | Gets/Sets the Currently Selected Camera’s Video Format. |
FlipImagesHorizontal | Gets/Sets value whether to Flip the Images Horizontally |
SaveEnrolledFaceImage | Gets/Sets value Whether to Save the Learned/Enrlolled Face Image to harddisk |
SaveRejectedFaceImage | Gets/Sets value Whether to Save the Rejected Face Image to harddisk |
SaveValidatedFaceImage | Gets/Sets value Whether to Save the Validated/Matched Face Image to harddisk |
Events
Name of Events | Description |
---|---|
CameraOpened() | |
CameraClosed() | |
NewCameraFrame(bitmap image) | for every new frame |
ExceptionHappened(string Description, int ErrorNumber) | |
FaceLearnt(int FaceQuality, float Similarity, float FaceConfidence, int IOD) | after new enrollment |
FaceValidated(int FaceQuality, float Similarity, float FaceConfidence, int IOD) | after validation |
FaceLearningFailed(int ErrorTypeID, String Description, int FaceQuality, float Similarity, float FaceConfidence, int IOD ) | after failure of enrollment |
FaceValidationFailed(int ErrorTypeID, String Description, int FaceQuality, float Similarity, float FaceConfidence, int IOD) | after failure of validation |
FaceDeleted() | after deletion of face |
LogOverflow() | when log record number is above 500K records |
Methods
Name of Method | Description |
---|---|
InitializeFRS() | |
OpenFRSSettingsDialog() | open face recognition component configuration |
Bool LearnFaceFromCamera(string FaceID) | |
Bool LearnFaceFromImage(string FaceID, string ImagePath) | |
Bool ValidateFace(string FaceId) | |
Bool OpenCamera(string camera) | |
String[] GetRejectedImagesByFaceID(string FaceID) | |
String[] GetRejectedFaceIDsFromDate(string FromDate, string ToDate) | |
DeleteRejecedImagesFromDate(string FaceID, string UpToDate) | |
DeleteAllRejecedImagesFromDate(string UpToDate) | |
String[] GetImagesByFaceID(string FaceID) | |
DeleteFaceID(string FaceID) | |
Bool DeleteFaceIDImages(string FaceID, string UpToDate) | |
Float MatchImageWithFace(string filename, string FaceID) | between the two faces |
AddToLog(string timestamp, string type, string data) | |
ClearLog() | Clear Log db |
String[] GetConnectedCameras() | |
CloseCamera() | |
ShowCameraPreviewDialog(int x,y)- -1,-1 | center of screen |
bool SaveSnapshot(string Filename) | |
PlaceImageAnnotation(string TargetFilename, string Data) | |
InjectImage(ByVal HImage As Long) | Injects an Image using it HBITMAP or Image |
HandleInjectImageFromFile(ByVal fileName As String) | Injects an Image from a File |
Face Recognition Time Attendance

Facial Recognition
Time Attendance

Why OnTime Compact ?
- Want to avoid buddy punching, clock padding and general inaccuracy of time capture?
- Fed up with errors in capturing attendance time manually? Or spending time doing the difficult task of consolidating data from various sources?
- Would you prefer to have a system as easy to use as fingerprint with more durability, accuracy and data usability?
- Visual view of video input
- Visual view of face detection
- History / Enrolled / Suspects view
- Voice alerts during system operation
- Easy to use graphic interface
- Fast and accurate face verification
Employee Verification
OnTime Compact is a Time & Attendance System with a Face recognition mechanism, specifically designed to provide irrefutable personal verification. It consists of a standard Camera and OnTime Software to enroll and verify employees, store their Face records, keep logs and interface with computers. OnTime Compact provides enhanced security and superior speed. Employee IN & OUT times are stored as Soft Data. This reduces the manual drudgery of Data Entry, Register maintenance and monthly requirement of Punch Cards for conventional Time Clocks to a minimum.Software Specifications
- Facial Recognition customizable engine
- Generic video interface (Win 32 API)
- Real time facial detection
- Real time facial matching
- Enhanced matching mechanism (Matching attempts)
- Adjustable image processing
- User Management / Time Zones
- Time Attendance feature (In / Out) (Reasons)
- Fully customizable Time Attendance
- Log Browser including visual history
- User Privacy mode - no image savings

Device
- Device:7" LCD Display
- Internal Video Camera
- Internal Speaker

DEVICE
Employee database maintains information like..
- Face Id
- Full Name
- Job Description
- Supervisor Name
- Validity Period
- Shift Timing (customizable)

SOFTWARE INTERFACE
Facial Recognition Adjustable Attributes
- Minimal Similarity Level
- Eye distance
- Matching attempts
- Face sample rate
Facial Recognition for Network Security

Facial Recognition
Network Security

FRS Supervision is a revolutionary technology that facilitates secure log in to the Microsoft Windows Environment. The Software runs an automatic scan, then detects and matches the physical presence of the user, thereby eliminating the need for a username or password.
- Hands Free Login using face detection
- Constant search for the presence of the user
- Automatic lock for unauthorized user
- Unlimited number of users (subject to database size limitations)
- Fast and Accurate face detection
- Works with normal 640 x 480 pixels Web Camera (Interpolation cameras not required)
- Supports LAN, WAN and VPNs
- Manual Login with password
- 1:N matching
Server Side
- View list of connected users
- User information & image acquisition available on request
- User activity history available as log file
- User image can be saved as acquisition data.
- Possible to view users in multi view screen
- The Server software allows to view users in multi view screen
- 4/8/16 users at once (upon configuration).
Client Side
- Allows up to 5 local users per machine
- Software allows user managements.(Enroll/Delete/Username + Password)
- System screen is locked when user is absent for a period of time (Interval)
- The user can manually lock his PC
- The user can select the relevant video source
- The user can configure Video device up to his driver configuration
Supported Cameras
- Full support for Analog Cameras
- IP Cameras
- Full support for USB Camera
- Supports in Logitech®, Microsoft®, Vivotek®, Axis® Cameras
FAQs on Facial Biometrics
1.What is biometrics?
Biometrics is the science of measuring and studying biological data. In I.T., biometrics refers to technologies that measure and analyze human body characteristics, such as fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes.2.What is the most common biometrics?
Fingerprints have been using successfully in a law enforcement environment for over 100 years. New biometrics systems have emerged in recent years including Hand Geometry, Iris Recognition, Retina Recognition, Signature Verification, Vein Patterns, Facial Recognition and DNA.3.What is a Facial Recognition System?
Facial Recognition system is a computer program that is used for identifying a person automatically. Research on this technology started in the mid 1960s. The technology works by using several facial features in a person's image and comparing these with existing images in the database. Facial recognition systems are used as an additional and mass security measure and are comparable to the other biometric security systems available today such as retina scanners, fingerprint scanners, etc.4.How well do biometrics work?
Used in the right environment, biometrics can make a major contribution to improving security. It has to be understood that no single biometric that can be used in real-time is 100% accurate. However when used in conjunction with a personal identifier such as an ID card or PIN, it can be a very effective means for verifying one’s individuality. Its importance generally comes as an aid to recognition rather than guaranteeing someone's identity.5.How are biometrics selected?
While the emphasis will differ in different applications, the following criteria are used to determine which biometric should be used in a specific application:- accuracy
- speed
- intrusiveness
6.How does biometrics work?
Almost all biometrics work essentially in the same way. The finger/face/iris is scanned and the locations of key features of the pattern relative to each other are determined. This information is transformed into a digital string and then it is added to the individual's record. When a match is undertaken, the process is repeated and a second string is generated. By matching this string with the one on the individual's record and comparing the result to a user-specified acceptance threshold,the system can establish the facts on the individual’s claim on his identity.7.What is the Technology behind Facial Recognition Systems?
The most important factor in Facial Recognition systems is its ability to differentiate between the background and the face. This is very important when the system has to identify a face within a crowd. The system then makes use of a person's facial features - its peaks, valleys and landmarks - and treats these as nodes that can be measured and compared against those that are stored in the system database. There are approximately 80 nodes comprising the face print that the system makes use of and this includes the jaw line length, eye socket depth and distance between the eyes, cheekbone shape, and the width of the nose.8.What is FAR, FRR ?
The accuracy of face recognition system is often defined in terms of two parameters, False Rejection Rate (FRR) and False Acceptance Rate (FAR).FRR measures how often an authorized user, who should be granted access, is not recognized, while FAR measures how often non-authorized user, who should not be granted access, is falsely recognized.
The control of FRR and FAR through recognition threshold adjustment defines the accuracy of face recognition system. When the recognition threshold is increased, it will adversely cause FAR to decrease. At the same time however, the increase of recognition threshold will result in the increase of FRR. For example, when recognition threshold is set at 100%, FRR rate will increase to its highest level.
9.What is Live Detection?
Live Detection Technology detects and memorizes the background where the camera is facing as part of parameters for identification and verification process. It can effectively detect the difference between a photo and a person in order to prevent imposters to gain access using photos10.What is Moving Detection?
Face Recognition System is equipped with moving detection function that analyzes the captured image periodically to identify the presence of a moving object and its position. The face detection function then analyzes images to detect a human face and its position.These two functions can be integrated to provide automated surveillance for detecting moving faces, positioning and data recording. The records can be used in Face Recognition System for enrollment purpose.
11.Three-Dimensional facial Recognition Systems
The new facial recognition systems make use of three-dimensional images and are thus more accurate than their predecessors. Just like two-dimensional facial recognition systems, these systems make use of distinct features in a human face and use them as nodes to create a face print of a person. Unlike two-dimensional face recognition systems, however, they have the ability to recognize a face even when it is turned 90 degrees away from the camera. Moreover, they are not affected by the differences in lighting and facial expressions of the subject.Facial Recognition for PC Security

Facial Recognition
PC Security

Logon provides a simple but effective option. The integration of Logon and PC camera provides access only when a live-fed face image of authorized user is detected, thus effectively preventing unauthorized access. Logon is a non-invasive technology that does not require physical contact.
- Hands-free login using Facial Biometric Technology
- Constant search for the presence of the user
- Automatic lock, if an unauthorized user tries to use system
- Options for 1 / 5 / unlimited users (up to database size limitations)
- Very small Face template size: 2.3KB, thereby low disk usage
- Works with all normal 640X480 pixels good quality Webcams (interpolation cameras are not recommended)
- Fast & accurate face detection
Hands-Free Login
This is a revolutionary technology that facilitates secure and biometric login to a Microsoft Windows environment. The software runs an automatic scan and then detects and matches the physical presence of the user, thereby eliminating the need for user name and password. The process does not store any image of the user but uses only algorithm based calculation results.In case the user is absent, the system locks the computer access until the FRS FaceLog Scan identifies the user through the physical data stored in the system
Advantages
- Allows up to 5 local users per machine
- Software allows user management
- System screen is locked when user is absent for a period of time (Interval)
- The user can manually lock his PC
- The user can select the relevant video source
- The user can configure Video device up to his driver configuration
Supported Cameras
- Full support for Analog Cameras (through video grabber)
- IP Cameras
- Full support for USB Camera
- Supports in Logitech®, Microsoft®,Vivotek®, Axis® Cameras
Facial Recognition Surveillance System

Facial Recognition
Surveillance System

Video security, biometrics and face recognition systems are at the forefront of the world's efforts to cope up with the threats at hand. The need to accurately detect the suspects in real time or suspicious behavior has become evident in places such as airports and railway stations, government and public buildings as well as around high security facilities such as water and energy utilities.
- Real time multiple video stream analysis and reconcile the evidence with the facts
- 1:N Matching, database matching between live images, video images and database images
- Real time face comparison against watch list
- Alarm notification and recordings
- Enrollment from still image, still image camera and live video stream
- High scalability in terms of watch list size, number of video streams, and number of visible faces
- End-to-end security solution
- Web-based system administration
- Comprehensive audit trails and reports
Whole face capture in surveillance area
FRS Suspect Detect acts as a surveillance system that has video recording capability.The system can automatically detect faces of people that appear in the surveillance area.With its intelligent face recognition algorithms, FRS Suspect Detect analyses the input from numerous CCTV cameras, comparing the captured face images with database containing previously stored profiles and face templates.
As face images are detected, FRS Suspect Detect automatically captures and records those face images. At the same time as capturing face images, FRS Suspect Detect matches all those captured images with the face images pre-enrolled in the database.
Applicable For
- Law Enforcement agencies, Airports & other high traffic areas
- Criminal Investigation
- Casinos, Clubs, Sport arenas
- Banks & Buildings requiring high security.
System Targets
- Improve Video Quality
- Centralized Digital Suspect Album
- Automatic Suspect Enrollment
- Automatic Suspect Detection
System Workflow
- Suspect are captured on the enrollment system
- Stores faces in local database
- Export to global database
- Suspect Detect matches images with the pre-enrolled images in database.
Face Biometric Login Through Web

Face Biometric Login Through Web

- Embeddable in any web page
- Global Face Authentication capability
- Free version available
- View of authenticated clients
- Messaging to Clients possible
- Remote Backup/Restore

Suitable For
- Online banking
- Organizational web sites
- IT industry
- Other sensitive web resources
Advantages
- User can get authenticated from any where in the world with internet
- Administrator can enroll a user from any where in the world using internet
- Reliable authentication using Biometric feature (Face Recognition)
- Centralized Authentication reduces maintenance costs
- Client machine does not require any software installation (Apart from settings change)
- Unlimited number of users (Depending on database size limitations)
- Fast and accurate face detection (Depending on internet connectivity speed)
- Works with normal 640 x 480 pixels Web Camera (Interpolation cameras not required)
- 1:1 matching
- Strengthens Password login with face recognition technology
Hardware Requirements
- Microsoft® Windows XP/VISTA
- Minimum Memory : 512 MB RAM
- HD Free Space : 50 MB
- Processor : at least 1.2 GHz
Server Side
- View list of authenticated users
- User information and image acquisition available on request
- User authentication history available as log file
- User images possible to be saved as acquisition data
- Possible to view users in multi view screen
Supported Cameras
- Full support for Analog Cameras
- IP Cameras
- Full support for USB Camera
- Support in Logitech®, Microsoft®,Vivotek®, Axis® Cameras
Features of Facial Recognition Systems.
www.inttelix.com
Commercial Security
Imaging Analysis is arguably one of the fastest growing sectors of the Surveillance market place. It is gaining a strong foothold within Commercial Security considerations. In Shopping Centers, Public Buildings, Campuses and even Commercial premises there is an increasing requirement to secure common areas to a reasonable level. Today, we see an overwhelming desire to install a greater number of CCTV cameras, but who monitors each of these cameras and how is one security guard able to identify the threat; a stalker, a murderer or a thief? This is where imaging analysis can assist in a series of measures to ensure that public places are thoroughly scanned and a strict vigil is in place to track the movement of unidentified persons.Face Recognition Method
With advancement in image analysis, facial recognition system is rapidly gaining its significance. The greater the ability to match a series of points (dimensions & pixel points) on a face, the better the percentage success rate in face identification.Face Recognition
Humans use faces to recognize individuals. Recent advances in computing technology and capability now enable similar recognition automatically. Early face recognition algorithms used simple geometric models, but the recognition process has now matured into a science of sophisticated mathematical representations and matching processes. Major developments have propelled face recognition technology into the spotlight. Face recognition can be used for both verification (1:1) and Identification (1: N) applications.Face Template
The heart of the facial recognition system is the Local Feature Analysis (LFA) algorithm. This is the mathematical technique the system uses to encode faces. The system maps the face and creates a "template" as a unique numerical id for that face. Once the system has stored a "template" it can compare it to the thousands or millions of "templates" stored in a database; each template occupies only 2-3 KB of data.Algorithm
The right algorithm will enable fast and accurate face localization for reliable detection of multiple faces in still images as well as in live video streams. This simultaneous multiple face processing and identification can happen in a single frame. The face needs to be detected in less than 0.1 seconds and then processed in less than 0.2 seconds. This rapid detection rate allows comparison of up to 100,000 faces per second, through the recorded frames generating the collection of the generalized face features from several images of the same subject and writing it to the database. In this way the enrolled feature templates are more reliable and the face recognition quality increases considerably over time.
Identification vs. Verification
Verification (1:1, one-to-one) – This is the process of determining a person's identity by performing matches against one biometric template that is located upon a known ID. 1:1 verification usually uses a manual interface like a card, RFID, code or any other similar key based indexing.Identification (1:N, one-to-many) – This is the process of determining a person's identity by performing matches against multiple biometric templates. The identification system is designed to determine identity based solely on biometric information. There are two types of identification systems: positive identification and negative identification. Advanced applications allow our customers full control over recognition methods where we support both 1:1 (verification) and 1: N (identification) methods.
Product Solutions
We offer a range of Facial Recognition Solutions designed to provide verification (1:1) and identification (1: N). These start with the basic Logon system that monitors who is using your computer or laptop. Supervision is a solution for remote facial recognition through Web / 3rd Generation (3G) Cellulars and TCP/IP networks. This allows both local and remote recognition through fast and smart facial recognition engine. Access II and III provide access control support for verification and then combine with Vistrack as a Visitor Tracking system. We also provide identification solutions integrating Logon, Supervisor, Access and Vistrack into our Suspect and Observer packages. FRS Suspect and FRS Observer are advanced surveillance systems that can automatically detect faces both online or offline using the above fast acquisition methods. They analyze the inputs from numerous CCTV cameras, comparing the extracted face templates from the cameras with a database containing previously stored profiles and face templates. As each image is detected they automatically raise alarms through whatever interface is required including SMS, PDA, Email and Web.Conclusion
Face Recognition Technology will be considered an inevitable part of the Public and Commercial Security Solutions. Through the integration of different biometric tools many industries and organizations will enhance their security situations to a higher level. Image analyzing systems will be extensively used in controlling access, time and attendance management, Management information systems etc. to provide a comprehensive measure to improve safe and peaceful working environment.Visit for more details : www.inttelix.com
Biometric Security in Hospitality Sector
Introduction

A crime can occur in any place at anytime when the elements of opportunity, target and offender coincide. Hotels have to assess the risks and place a comprehensive security system in place. Security is an essential investment and not an optional expenditure.
The Mumbai terror attack that targeted the country's premium hotels kept the hospitality industry on edge.
Managing security in hotels is a delicate balancing act. On one hand, guests want to know that their rooms and possessions are secure. They want to feel they're in a safe and secure place with an air of luxury
Hotel safety and security is a growing concern among travelers throughout the world. Nobody would like to be a victim of crime while being away from home. The world has changed a lot and the perception of security also.

Security needed areas in Hotel
- Guest Rooms
- Lifts
- Corridors
- Lobbies
- Meeting Halls
- Lawns
- Escalators
- Entrances and exits leading to corridors
- Restaurants
- Parking Areas
Solutions for prevent crime in hotels
- Visitor / Guest Registration using FRS (Face Template storage in database)
- CCTV monitoring in public and non-public areas (Video Surveillance)
- Detection of unauthorized / suspicious visitors (Access Control)
- Access Control to entry restricted areas such as other rooms, premises.
- Staff, Guests and Visitors Activity Monitoring
- Electronically Controlled Door for Guest Rooms (Entry to rooms only after authentication)
Computer-assisted video surveillance
FRS Suspect Detect automatically scans incoming video streams, detects multiple faces and checks for possible "watch list" matches. If a match is found, operators are notified - in real time – allowing them to focus on the identified person instead of simultaneously observing multiple video screens.Applications include not only the identification of unwanted people in public places, but also the identification of high-ranking customers.
The latest release of FRS Suspect Detect combines our leading face recognition technology with state-of-the art camera and computer equipment.
Features
- Real time face tracking on multiple video streams
- Real time face comparison probe against "watch list"
- Interactive and batch enrollment
- Enrollment from still image, still image camera and live video stream on manual and automatic mode
- Real time alarm notification and recording
- High scalability in terms of "watch list" size, number of video streams and number of visible faces
Face Biometric Security in Financial Sector
Introduction

Inttelix Biometric Solutions help Banking and Finance sectors raise security levels and solve fraud attempts swiftly.
The use of biometric technology is increasingly being recognized in the banking industry as a viable means to prevent identity fraud, safeguard data, improve ease-of-use and save money without losing passwords. It is no surprise that many banks are turning to biometric technology for increased security & convenience.
As a proven innovator and biometrics research & development firm, Inttelix offers a host of facial biometric solutions that can help banks to reduce fraud and streamline operational processes by securing internal networks and / or integrating facial biometric functionality into existing in-house applications.
Banks can use our facial biometric solutions to safeguard enterprise data and reduce costs. Our solutions will enable banks to have a secure login to their network and replace user names & passwords with something that nobody can share, lose or forget, i.e. Your Face!
Fraud in Banking

- Internal fraud: Employees attempting to withdraw money from a customer’s account without their consent
- External fraud: An individual assumes the identity of a customer of the bank in order to withdraw money from the account
- Identity theft
- Online transaction fraud (Most regulations for bank accounts, established before the age of cyber crime, don’t account for such activity.)
Importance of Authentication in Financial Transactions
PINs and passwords are vulnerable to being forgotten, given away, observed by others or otherwise obtained. Cards can be stolen and /or forged. It's true that a biometric authentication can help against fraud. Combining the operations with a biometric system will improve both usability and security. This proves that the performance and capability of the biometric technology is sufficiently high.Gateways for Facial Biometric Solutions in Banking Sector
Transaction Security
- Secure customer transactions and protect their privacy either remotely or onsite
- Enroll and authenticate bank employees before they can access the bank’s network to perform a transaction
Network Security
- Controls or monitors individual’s specific activities in a network or regulates access to select infrastructure after authorization
Access Control
- To protect the physical security of facilities (safety deposit boxes, lockers, cash chests and entry restricted area)
- Access control for employees, visitors and clients at buildings and strategic points.
Remote Supervision
- Protection against internal fraud and illegal transactions through Remote Supervision
- Facilitates to monitor the productivity and efficiency of an employee
Time Attendance
- Employees’ check-in/check-out events are marked automatically by recording the biometric credentials.
- Work hours are tracked for each employee, division or organization as a whole
Benefits of Facial Biometrics Implementation
- Provides user authentication
- Allows non-duplicable transaction
- Maximizes network security
- Ensures user privacy
- Protects institution’s physical assets
- Prevents hackers and ID fraud
- Eliminates password frustration
- Cuts IT cost in password maintenance
- Increases corporate image, productivity and profitability
Facial Recognition Authentication Solutions!
Authentication Solutions
Our Authentication Solutions prevent unauthorized access to your corporate information and secret resources with Facial Recognition technology. The solutions enable you to register your own face as proof-of-identity using Facial Recognition system.
With our Authentication solutions, your organization can keep proof-of-identity before granting users access to IT systems, valuable resources, restricted areas and information across your corporate infrastructure. For maximum return on investment (ROI), we provide biometric authentication solutions with excellent balance between quality and price.
Authentication for Workstation or Desktop – Our Authentication ensures only authorized users to access workstations and wired or wireless networks within an organization.
Authentication for Remote Access – Remote Access is the most vulnerable entry point to IT resources. It is open to attacks from outside of the organization's physical perimeter. Our solutions deliver the most advanced security solutions for remote facial recognition through web / 3G Mobile / TCP/IP Networks.
Authentication for Application Access – Usually the users require authentication to access the enterprise applications. In a typical situation, passwords are used. By the use of our authentication solutions you can ensure physical presence of user for specific business applications.
Recognition Systems

Biometrics system is used for human recognition, i.e. for identification and verification. Biometric solutions are the new face of security in the corporate world. Facial Recognition system analyses characteristics of a person's face image inputs through a camera. It measures overall facial structure, distances between eyes, nose, mouth, and jaw edges. These measurements are retained in a database and used for comparison when a user stands before the camera.
One of the strongest positive aspects of facial recognition is that it is non-intrusive. Our facial recognition technology is based on neural computing principles, which combine the advantages of neural and elastic networks. Our surveillance platforms are able to extract faces from a moving or a static environment and run to verification checks against those on watch lists and central databases.
Advanced Automation

visit now www.inttelix.com
Visitor Tracking with Facial Recognition!
Visitor Management System which is specially designed to keep track of visitors coming and going out of the premises. With this system you will be able to expedite the visitor registration process, determine who is still inside your facility and notify the system users once any banned visitor intends to sign in or sign out.This system utilizes the latest technology which enhances the security in the facility. Employees and visitors will feel more secure and protected and it will create a great first impression on the corporate image.
Key Features
- Detects, identifies and captures visitor from remote
- Updates visitor statistics
- Meets and schedules appointments over website
- Visitor kiosk creates photo affixed visitor cards
- Stores the secrets of embedded facial features of visitor
- Identifies visitor and lists out previous visit details
- Restricts visitor engagements as and only scheduled by the host.
- Ensures and records access to hosts only on prior appointment
Visitors Register facility:
The Visitor Register Facility offers a comfortable way for entering visitors and hosts details, purpose of visit etc. Details of appointments and previous visits of a visitor can be retrieved automatically. To create an air of courteousness, the visitor is welcomed by the system by calling his/her name, after identifying from the facial features recorded during previous visits. Details of the present visit also are fed into the system.Visitor ID card Printing
- Print Visitor ID card with photograph, name and other details regarding the visit.
- Provide facility to confirm the visit only to the permitted person.
- Visitor black listing
- Facility to deny appointment for black listed visitors
The System Shall
- See the status of appointments before accepting the registration.
- Provide facility to schedule or re-schedule appointments
- Record facial features of the first time visitor or retrieve the facial ID and record details of present visit.
- Facility to deny appointment for black listed visitors
Advantages
- Easily records visitor details and track their log data.
- With automatic detection function, system can retrieve a specific date or time of each visit.
- Visitor’s data contains visitor name, company name, reason for visit, visiting dept.etc.
- Access area and time can be controlled by access group
Various reports given by the system include:
- Visitor Statistics
- Entertained Visitor statistics
- Visitor frequency report
- Department wise visitor report
- Daily visitor report
Appointment Management
Vistrack provides innovative solution for Appointment Management. Web based appointment is an interesting option .Visitor can log in to the website of the organization by adding his/her photograph for obtaining the appointments. The officials in the organization can schedule the appointments recognizing the online visitor by the photograph. The system in turn recognizes the visitor when he reaches the organization.Employee / Staff Recognition
The system’s intelligence recognizes the employee and staff of the organization and does not activate the routine for visitor, when an employee of the organization approaches the visitor kiosk.visit now www.inttelix.com
Access Control - with Face Recognition Technology [www.inttelix.com]
- Authentication Solutions
- Recognition Systems
- Time and Attendance Systems
- Access Control Systems
- Law Enforcement
- Security & Surveillance
- Personal Identification Registers
- Retail & Marketing

Authentication Solutions
Inttelix’s Authentication Solutions using Facial Recognition System (FRS) prevent unauthorized access to your corporate information and secret resources. FRS provides proof-of-identity through secure authentication with Facial Recognition.With our tested and proven authentication solutions, your organization can establish undeniable proof-of-identity before granting users access to IT systems, valuable resources, restricted areas and information across corporate infrastructure. To ensure maximum ROI, we offer biometric authentication solutions with excellent balance between quality and price.

Recognition Systems
Our facial recognition technology is based on neural computing principles, which combines the advantages of neural and elastic networks. Our surveillance platforms are designed to capture faces from a moving or a static environment and given to verification checks against those on watch lists and central databases.
Time Attendance Systems
Our solution provides effective cost savings for employers while being extraordinarily convenient for employees. With our solutions, there are no employee cards, physical maintenance of log books or punching. Employees can mark their attendance with all IN & OUT details simply showing their face.
Access Control Solutions
Our Access Control solutions enable you to control physical access of people to your premises, through the use of biometric verification. Inttelix has both the hardware and software solutions to incorporate the advanced security of biometric verification into your access control and security model.
Law Enforcement
Face recognition technology can assist law enforcement agencies to identify suspects. Whenever a photograph or video footage of a suspect is available, the images can be compared to image databases of known criminals and show the most similar faces (match list). Similarly, the system can be applied to track the missing persons also. This capability has turned out to be a very useful tool in the criminal investigation process.
Video Surveillance and Security
Our video surveillance platform has been specifically designed to enhance security, increase operational efficiency and improve ROI. It automatically scans incoming video streams, detects multiple faces and checks with ‘watch list’. The system offers a powerful search mechanism in the field of investigation. The enhanced video analytic techniques can also be used to reduce loss, fraud and keep a watch on suspicious/criminal activities.
Personal Identification Registers
Our Biometrics based system can provide a permanent solution for personal identification and verification, since it is non-invasive and irrefutable. Accordingly, we are able to provide personal identification register solutions such as ID Cards, Voters Cards and such unique identification cards using facial identity. Using face image itself as an identity helps minimize duplication or fake registration. Our solution is an answer to the challenge of duplication in large sea of photo databases. Our system is also ready to be concurrently integrated with the existing issuing processes.
Retail & Marketing
Our Interactive Digital Signage solution adds new meaning to the phrase “Window Shopping”. The window technology enables the customers by to interact with the signage-screen by simply pointing to it to access information. The sophisticated technology tracks the user’s movements through a combination of sensors and software. The users can intermingle with the screen display/menu using their finger points as a computer mouse.To know more visit www.inttelix.com
School Security & Automation
Key Features
- Student Demographics and Information
- Parental Information and Family Details
- Student Authentication (RFID & FRS)
- Graphical Performance Analysis
- Examination Module
- Attendance & absence notification to parents / school
- Bus boarding alerts
- Event notification to parents
- School Vehicle GPS tracking
Student Authentication
Each student will have his own RFID tag. The students are to scan it at readers and pose in front of the Face Recognition system while boarding the Bus, at School Gate & at each class room of the school to keep track of his movement and the system will automatically sends an SMS to the parents/guardian at each stage.
Automatic SMS Reporting
Campus Auto Attendance automatically notifies the parents of their students' attendance violations through SMS. At the prompt, the parents will have the option to leave a SMS back excusing the students' absences.Important Modules
- Student Admission System
- Student Information System
- Student Fee Management System
- Staff Information System
- Payroll Management System
- Attendance Management System
- Time Table Generation System
- Financial Accounting System
- Examination Management & Result Analysis System
- Inventory Management System
- Library Management & Automation System
- Hostel Management System
- Conveyance Management System
Advantages
Administration
Provides schools with an easy access to pupils, staff and manage school data in a secure and friendly environment without the need for having an extensive training or ICT experience. Single data entry and the automation of routine tasks and reports save much time.Attendance
System will streamlines the collection, management and analysis of statutory attendance records. Easily supports electronic attendance, bringing the MIS into the classroom.Assessment
Can access pupil performance data quickly and helps analyze statistical records, making parents & teachers easier to track a child's progress.Reporting to Parents
Makes parental reporting very easy. Staff can quickly produce individual, subject, faculty wise and periodical reports easily.Financial Accounting
Provides powerful and straightforward financial management for non-accountants. The easy use of this system will enable the smooth operation of financial matters with regard to the school management.- Flexible reporting - all the facts and figures at a glance
- Better communication – presents data clearly in tables / graphs
- Better control - accurate income and expenditure status at the press of a button
- Designed for schools – addresses the day-to-day realities of school financial management.
Benefits to Parents
- Instant report by SMS when child boards bus
- On time SMS on School Attendance
- Online Reports of Attendance
- Mark list through Students/Parents online login
- Emergency reporting through SMS
- Parents meeting notice through SMS
- Events of School through SMS
- Absent reporting & Reply system through SMS
- Student Performance Tracking through Website
Benefits to Teachers
- Complete attendance automation.
- Complete marks / grade management system.
- Publish online exams.
- Interact with parents efficiently and effectively.
- Online assignment management.
- Manage class information and analytical reports.
- E-mail & Internal messaging system.
- Lesson Planner
What is Biometris?

To know more login to www.inttelix.com
Biometric Advantages
- No more forgotten or stolen passwords.
- Positive and accurate Identification
- Highest level of security
- Offers mobility
- Impossible to forge
- Serves as a Key that cannot be transferred.
- Safe & user friendly
Common Human Biometric Characteristics
Biometric characteristics can be divided in two main classes, as represented in figure on the right:
- physiological are related to the shape of the body. The oldest traits, that have been used for more than 100 years, are fingerprints. Other examples are face recognition, hand geometry and iris recognition.
- behavioral are related to the behavior of a person. The first characteristic to be used, still widely used today, is the signature. More modern approaches are the study of keystroke dynamics and of voice.
Facial Identification Technology
Facial biometrics is one of the fastest growing areas of biometrics. With growing technologies facial recognition can convert a photograph or a video image into a code that describes a face’s physical characterizes. This can be used to identify the common person from a distance, without intruding into their personal space. Computer software for facial identification reads the peaks and valleys of an individual’s facial features; these peaks and valleys are known as nodal points. There are 80 nodal points in a human face, but the software needs only 15-20 to make an identification. Specialists concentrate on the golden triangle region between the temples and the lips. This area of the face remains the same even if hair and a beard is grown, weight is gained, aging occurs, or glasses are put on.
To know more login to www.inttelix.com
Fingerprint Identification Technology
A fingerprint is made of a a number of ridges and valleys on the surface of the finger. Ridges are the upper skin layer segments of the finger and valleys are the lower segments. The ridges form so-called minutia points: ridge endings (where a ridge end) and ridge bifurcations (where a ridge splits in two). Many types of minutiae exist, including dots (very small ridges), islands (ridges slightly longer than dots, occupying a middle space between two temporarily divergent ridges), ponds or lakes (empty spaces between two temporarily divergent ridges), spurs (a notch protruding from a ridge), bridges (small ridges joining two longer adjacent ridges), and crossovers (two ridges which cross each other). The uniqueness of a fingerprint can be determined by the pattern of ridges and furrows as well as the minutiae points. There are five basic fingerprint patterns: arch, tented arch, left loop, right loop and whorl. Loops make up 60% of all fingerprints, whorls account for 30%, and arches for 10%. Fingerprints are usually considered to be unique, with no two fingers having the exact same dermal ridge characteristics.
To know more login to www.inttelix.com
Hand Geometry
Hand geometry is a biometric that identifies users by the shape of their hands. Hand geometry readers measure a user's hand along many dimensions and compare those measurements to measurements stored in a file. Viable hand geometry devices have been manufactured since the early 1980s, making hand geometry the first biometric to find widespread computerized use. It remains popular; common applications include access control and time-and-attendance operations.
Iris recognition
Iris recognition is a method of biometric authentication that uses pattern recognition techniques based on high-resolution images of the irides of an individual's eyes. Not to be confused with another less prevalent ocular-based technology, retina scanning, iris recognition uses camera technology, and subtle IR illumination to reduce specular reflection from the convex cornea to create images of the detail-rich, intricate structures of the iris. These unique structures converted into digital templates, provide mathematical representations of the iris that yield unambiguous positive identification of an individual.
Iris recognition efficacy is rarely impeded by glasses or contact lenses. Iris technology has the smallest outlier (those who cannot use/enroll) group of all biometric technologies. The only biometric authentication technology designed for use in a one-to many search environment, a key advantage of iris recognition is its stability, or template longevity as, barring trauma, a single enrollment can last a lifetime.
DNA Identification technology
Deoxyribonucleic acid (DNA) Biometrics could be the most exact form of identifying any given individual (Baird, S., 2002). Every human being has its own individual map for every cell made, and this map, or ‘blueprint’ as it more often is called, can be found in every body cell. Because DNA is the structure that defines who we are physically and intellectually, unless an individual is an identical twin, it is not likely that any other person will have the same exact set of genes (Philipkoski, K., 2004).
DNA can be collected from any number of sources: blood, hair, finger nails, mouth swabs, blood stains, saliva, straws, and any number of other sources that has been attached to the body at some time. DNA matching has become a popular use in criminal trials, especially in proving rape cases (Landers, E., 1992). The main problems surrounding DNA biometrics is that it is not a quick process to identify someone by their DNA. The process is also a very costly one (Baird, S., 2002).
DNA Biometrics is not a fool proof method of identification. If forensic scientists to not conduct a DNA test properly, a person’s identification code can be skewed. Another problem is matching prior DNA samples to new samples; this is a bigger problem in DNA fingerprinting.
To know more login to www.inttelix.com
What is Face Recognition Technology?

Instead of requiring people to place their hand on a reader or precisely position their eyes in front of a scanner, Face Recognition systems silently take pictures of people's faces as they enter a defined area. There is no intrusion or delay, and in most cases the subjects are entirely unaware of the process. They do not feel "under surveillance" or that their privacy has been invaded.
FRS Technology
Facial Recognition analyzes the characteristics of a person's face images input through a digital video camera. It measures the overall facial structure, including distances between eyes, nose & mouth and jaw edges. These measurements are retained in a database and used for comparisons when a user stands before the camera. This biometric has been widely and perhaps wildly, touted as a fantastic system for recognizing potential threats. (Whether terrorist, scam artist or known criminal)but so far has been unproven in high-level usage. It is currently used only in verification systems with a good deal of success.
Every face has numerous, distinguishable landmarks and the different peaks and valleys- that make up one’s facial characteristics unique. Each human face has approximately 80 nodal points. Some of these features measured by the Facial Recognition Technology include distance between the eyes, width of the nose, depth of the eye sockets, shape of the cheekbones and length of the jaw line etc.
How it Works
The following four-stage process illustrates the way biometric systems operate:
Capture - : Physical or behavioral sample is captured by the system during enrollment
Extraction - Unique data is extracted from the sample and a template is created
Comparison - The template is then compared with a new sample
Matching - The system then decides if the features extracted from the new sample are matching or not
User faces the camera, standing about two feet from it. The system will locate the user's face and perform matches against the claimed identity or the facial database. It is possible that the user may need to move and re-attempt the verification based on his facial position. The system usually comes to a decision in less than 5 seconds.
To know more please visit www.inttelix.com
Use
Currently gaining support as a potential tool for averting terrorist crimes, facial recognition system is already in use in many law enforcement areas. Software has already been developed for computer networks and automated bank tellers that use facial recognition for user verification purposes.
Evaluation
One of the strongest positive aspects of facial Recognition is that it is non-invasive. Verification or identification can be accomplished from a distance of two feet or more without requiring the user to wait for a longer period of time or do anything more than look at the camera.
Face Recognition is also very difficult to dupe. It works by comparing facial landmarks - specific proportions and angles of defined facial features - which cannot easily be concealed by beards, eyeglasses or makeup.
The ideal solution
All of these makes face recognition ideal for high traffic areas open to the general public, such as:-
- Airports & Railway Stations
- Corporates
- Cash-Points
- Stadiums
- Public Transportation
- Financial Institutions
- Government Offices
- Businesses of All Kinds
Access Control System (Face Recognition)

Introducing!!!
Attacks on civil and institutional objects are potential threats in several parts of the world today. The target might be a bank or a company, and the attack might be motivated by money or ideological reasons, but the essential pattern is the same. To put an end to the increase in these types of attacks, it is high time that we have applied advanced scientific and technological solutions to real-life applications.
ACCESS uses a cutting-edge technology that facilitates secure and safe biometric access in electronically controlled doors.
Key Features
- Convenient and secure method of controlling door entry
- Authentication by Facial Biometrics to gain entry
- Higher security than conventional systems
- No keys or cards to carry
- No need to issue keys or cards for every user
- Accurate recording of arrivals and departures
- Real time monitoring of door access
- Intelligent access control by group or time schedule
Door Access Control
Access II is a door access control system that allows fast identification and smart access control for sensitive entrances where the speed and the security are vital. This system’s core supports both 1:1 & 1: N matching system, based on a stand-alone or networked database.
Software Features
- Matching Speed: 100,000 Faces per second
- Single Frame Processing Time: 0.15 Second
- Enrollment Time = 1 Second
- Identification Mode: 1:1, 1:N
- Face Template Size: 2.3 KB per face
- Log File Transactions: Up to 1,000,000 records
- Basic license for 200 users
Supported Cameras
- Full support for Analog Cameras
- IP Cameras
- Full support for USB Camera
- Supports Logitech®, Microsoft®, Vivotek®, Axis® Cameras
Database Support
- Microsoft Jet 4.0
- Networked / Stand-alone
- Dynamic location of database
- Integral Import/Export feature
- Integral reporting mechanism
- Unlimited number of users (up to licensing steps)
- Database Replication available through configuration (Optional)
- Database customization to customer's needs(Optional)
- Use of other databases such as: SQL Server, Oracle(Optional)
- Connection to existing data-sources(Optional)
Hardware Requirements
- Microsoft® Windows XP/VISTA
- Minimum Memory : 512 MB RAM
- HD Free Space : 50 MB
- Processor : at least 1.2 GHz
Advantages
- Hi-Tech Design
- Event Transaction Logger
- Remote door open
- Fast and accurate face detection
- Full remote control through network
- Automatic door, output opening by time schedule
User Interface
- Visual view of video input
- Visual view of face detection
- History / Enrolled / Suspects view
- Voice alerts during system operation
- Localization support exists for English, Spanish, French
- Do-it-yourself localization available
- Easy to use graphic interface
Facial Recognition Adjustable Attributes
- Minimal Similarity Level
- Eye distance
- Matching attempts
- Face sample rate