Facial recognition systems
Urban populations are expanding rapidly around the globe, with an expected growth of 1.56 billion by 2040. As the number of people living and working in cities continues to grow, the ability to keep everyone safe is an increasing challenge. However, technology companies are developing products and solutions with these futuristic cities in mind, as the reality is closer than you may think. Solutions that can help to watch over public places and share data insights with city workers and officials...
Thermal cameras can be used for rapid and safe initial temperature screening of staff, visitors and customers. Used the right way, the cameras can help prevent unnecessary spread of viruses like the novel coronavirus. During the global pandemic, use of thermal cameras has increased, but they have not always been used correctly, and therefore, not effectively. Hikvision’s temperature screening thermal products are currently assisting users in initial temperature screening across the global...
As an industry, we often speak in buzzwords. In addition to being catchy and easy to remember, these new and trendy industry terms can also reflect the state of the security market’s technology. In short, the latest buzzwords provide a kind of shorthand description of where the industry is - and where it’s going. We asked this week’s Expert Panel Roundtable: What new buzzword(s) rose to prominence in the security industry in 2020? (And how do they reflect industry trends?)
Several major players vigorously employ biometric recognition technologies around the globe. Governments use biometrics to control immigration, security, and create national databases of biometric profiles. Being one of the most striking examples, the Indian Aadhaar includes face photos, iris, and fingerprints of about 1.2 billion people. Financial institutions, on their part, make use of biometrics to protect transactions by confirming a client's identity, as well as develop and provide servi...
Johnson Controls, a provider of smart and sustainable buildings, and the architect of OpenBlue connected solutions, and Alcatraz AI have collaborated to provide a comprehensive suite of AI-powered security solutions and services to meet the growing need for frictionless entry and advanced building security. Leveraging its own data-powered access control technology combined with Alcatraz AI’s advanced facial authentication platform, the Alcatraz Rock, Johnson Controls offers comprehensive...
The explosion of artificial intelligence used to enhance business processes, propel innovative products, and further automation has touched essentially every industry to date. The security sector, notable for its maturity and complexity, is not exempt from the AI tidal wave. In fact, quite the opposite, the security sector and more specifically the domain of video surveillance have seen an emergence of AI-powered solutions both hardware and software. The widespread adoption of IP cameras, clou...
News
Facemasks are a critical tool for fighting the spread of COVID-19 virus and are proven to be most effective when face coverings are worn universally. As stores and businesses reopen, ensuring all occupants wear a facemask is essential. However, the additional resources required to monitor patrons can further strain businesses already struggling to meet other sanitation and social distancing guidelines. Deep Learning solutions are capable of automatically detecting anyone in violation of facemask guidelines, saving employee time and ensuring safer environments. Deploying Deep Learning solutions Deep learning is a form of machine learning that uses neural networks with many ‘deep’ layers between the input and output nodes. By training a network on a large data set, a model is created that can be used to make accurate predictions based on unseen data. In this case, the network can be trained to detect not only facemasks, but if a facemask is worn correctly on a person’s face. A fully functioning deep learning system can be developed and deployed in a matter of days A fully functioning deep learning system can be developed and deployed in a matter of days. Using a FLIR Firefly DL camera, FLIR Systems’ engineers developed a system for detecting compliance and flagging users who may be in violation of PPE (Personal Protection Equipment) guidelines. Facemask detection dataset The facemask detection dataset used 2 publicly available libraries with over 1000 images to provide examples of people with, without, and incorrectly wearing facemasks in different environments. Other cameras suited for this purpose include the Blackfly S GigE. Each image in the facemask dataset was annotated with bounding boxes showing object locations and class labels indicating which faces had the mask on, which did not, and if they were worn appropriately. Deep learning developers and solution integrators can easily expand this solution to cover more complex and robust use cases for deployment in the real world. For example, the neural network can be trained to detect face shields, gowns, gloves, and other PPE within high risk/high traffic environments like hospitals and airports.
Tavcom Training, one of the world’s pioneering provider of accredited security systems training courses and part of the Linx International Group, announced the addition of two one-day CCTV courses to its extensive online learning platform. The CCTV Control Room Refresher and CCTV Legislation courses are available now, with the option of accredited (BTEC) and non-accredited certificates, as well as CPD points available. The CCTV Control Room Refresher Course is essential for security practitioners that have completed the SIA training and want to keep up-to-date with the ever-changing issues affecting public space surveillance. Surveillance camera codes The course provides insight into the latest surveillance and patrolling techniques, new control room technology, incident and emergency handling, communications, ANPR, evidence sharing, as well as surveillance camera codes of practice and operational procedures, data protection, privacy and legislation. The CCTV Legislation course provides expert information and guidance surrounding data protection and privacy, including the GDPR and dealing with subject access requests, the freedom of information and human rights act, CCTV codes of practice, SIA regulations and licensing laws. The course also covers issues relating to the gathering of evidence, digital archiving and audit trails. Facial recognition technology Andrew Saywell, Business Development Manager for Tavcom Training says: “These two courses are ideal for every security practitioner involved in the use of CCTV. Not only is it important to keep pace with the application of the latest control room technology and surveillance techniques, it is essential to have an up-to-date working knowledge of what is and isn’t permissible from a legal perspective.” As the technology evolves, so to must the regulation and legislation" Andrew adds: “As the technology evolves, so to must the regulation and legislation. This was evident in the introduction of GDPR to govern data protection and, in his last month as Surveillance Camera Commissioner, Tony Porter, has shone a light on the governance surrounding the use of facial recognition technology.” Online learning platform The two courses are delivered through Tavcom Training’s bespoke online learning platform combine presentations, video and audio, to deliver an engaging, rewarding and productive learning experience. Each can be completed in one day, or at the learners own place, with online tutor support available. Learners can elect to have their training recognized with an accredited BTEC Level 2 Certificate for the CCTV Refresher course, and a BTEC Level 3 Certificate for the CCTV legislation course, or choose to receive the internationally recognized Tavcom Certificate if they choose to opt for the non-accredited route. CPD points are available to all learners on completion of the training. Courses cost £225+VAT accredited and £125 (excl.VAT) non-accredited. These courses can also be completed at Tavcom Training’s state-of-the-art training center in Bishop’s Waltham, Hampshire.
LenelS2 has announced a global distribution agreement to resell Invixium’s contactless biometric solutions through the LenelS2 OnGuard and NetBox value-added reseller (VAR) channels. The agreement also includes a new interface with the OnGuard and NetBox systems to enhance access control and proactive screening to help protect people and optimize building health and efficiency. The solutions are offered as part of Carrier’s Healthy Buildings Program, an expanded suite of advanced solutions to help deliver healthier, safer, more efficient and productive indoor environments. LenelS2, an internationally renowned company in advanced security systems and services, is a part of Carrier Corporation, a global provider of healthy, safe and sustainable building and cold chain solutions. IXM TITAN solution with Enhancement Kit LenelS2 will now offer the IXM TITAN solution with Enhancement Kit: an intelligent dual-camera biometric solution LenelS2 will now offer the IXM TITAN solution with Enhancement Kit: an intelligent dual-camera biometric solution that performs contactless facial recognition authentication with no mask removal required, and mask detection and elevated body temperature detection measured at the tear duct. The Invixium TITAN solution offers an API interface with the NetBox access control system and an interface with the OnGuard security management system through a certification in the LenelS2 OpenAccess Alliance Program (OAAP). Flexible configuration of workflows The interface enables flexible configuration of workflows utilizing any permutation combination of card, biometric fingerprint, facial recognition, temperature screening and mask detection access parameters. “The collaboration with Invixium provides our users with a versatile access control and proactive screening solution that can help them navigate today’s complex safety and security requirements,” said Jeff Stanek, President, LenelS2, adding “The advanced biometrics and built-in mask detection add new functionality to our Healthy Buildings portfolio.” TITAN solution and LenelS2 access integration “The powerful interface between the TITAN solution and LenelS2 access control systems provides very relevant biometric solutions that meet the world’s most pressing demands,” said Shiraz Kapadia, the Chief Executive Officer (CEO) and President of Invixium. Shiraz adds, “Our health-focused portfolio combines temperature screening with mask detection for contactless access control and workforce management in one elegant device, allowing businesses in key industries to easily create healthy business environments.” Touchless biometric security and access control TITAN solution delivers touchless biometric security through face recognition via a 21-megapixel camera The TITAN solution delivers touchless biometric security through face recognition via a 21-megapixel camera and adding the Enhancement Kit transforms the TITAN solution into a health kiosk capable of measuring temperature for biometric access control. Not only can the TITAN solution authenticate 12 to 18 users’ faces in one minute with high accuracy, but it can also screen each of those users’ temperatures at the tear duct in the same amount of time. Bolstering entrance controls The TITAN solution features an easy, one-piece installation and installs just like a traditional reader. In addition to its touchless access and proactive screening capabilities, the TITAN solution can be easily used to bolster entrance controls. These readers, purchased through LenelS2, do not require any additional licensing fees. TITAN readers and Enhancement Kits must be purchased individually or as part of a kit from LenelS2.
Having cost a cumulative number of over 65.8 million reported cases and 1.5 million deaths globally and the COVID-19 pandemic has casted a shadow on almost everyone in the world. The Coronavirus disease (COVID-19) Weekly Epidemiological Update and Weekly Operational Update by WHO gives us a hint that the situation might not recover any time soon. Compromising to the reality, people are doing everything to better protect themselves and the loved ones in the new normal. Aside from taking the general advices that authorities give to citizens, such as keeping social distance, meeting people in open space, wearing masks, etc., people are inclined to seeking help from high technologies. Touchless access control During work resumption, people need a way to reduce physical contact as much as possible, and that’s where face recognition enabled touchless access control comes in. Face recognition is unquestionably one technology that has gained so much awareness during the pandemic. The face recognition access control market will grow into US$377 million in 2025, at a CAGR of 11.4% 2018-2025 According to the report Access Control Market with COVID-19 Impact - Global Forecast to 2025 by Marketsandmarkets, the face recognition access control market will grow into US$377 million in 2025, at a CAGR of 11.4% 2018-2025. Dahua Technology, a renowned video-centric smart IoT solution and service provider, releases FACT series Face Recognition Access Control Terminal for people who need to enter premises regularly. Face recognition terminal Featuring fast, accurate, convenient and trusted, it can be installed in commercial buildings, hospitals, schools, etc. Fast - Deploying Dahua’s self-developed award-winning AI algorithms, Dahua FACT series Face Recognition Access Control Terminal features face recognition speed of less than 0.3 second per person. This enables a fast entrance of employees into premises, which comes in handy especially in rush hours. Accurate - Dahua FACT series Face Recognition Access Control Terminal guarantees a 99.5% accuracy and strong adaptability to a number of demanding situations, including intense light, dark night, beard, glasses, etc., enabling a stable performance in various environments. Reducing physical contact Convenient - Enabling touchless access functionality, Dahua FACT series Face Recognition Access Control Terminal delivers significant convenience to employees, faculty, students, medical workers, etc. It also provides an additional layer of protection by reducing their physical contacts in premises they work or attend to. Trusted - Tested according to TÜV Rheinland ETSI TS 103645 standard, Dahua FACT series Face Recognition Access Control Terminal is certified by TÜV Rheinland to be compliant with the General Data Protection Regulation (GDPR). This means Dahua FACT series Face Recognition Access Control Terminal is popular in information security and privacy protection. Access control products For security distributors and installers, traditional access control products are difficult to install and wire, and the configuration operations are complicated. Dahua FACT series Face Recognition Access Control Terminal, supporting standalone mode, saves wiring cost to the most extend. What’s more, the configuration can be done in the local GUI menu through the touch screen. Dahua Technology will continue to focus on “Innovation, Quality and Service” to serve partners and customers Dahua FACT series Face Recognition Access Control Terminal is suitable for applying in commercial buildings, schools, hospitals, etc., delivering convenience as well as an additional layer of protection during work resumption in the new normal. With a mission of “Safer Society, Smarter Living”, Dahua Technology will continue to focus on “Innovation, Quality and Service” to serve partners and customers around the world. Product launch date might be varied depends on countries. Video surveillance industry Zhejiang Dahua Technology Co., Ltd. is a renowned solution provider in the global video surveillance industry. In 2020, Dahua Technology was ranked 2nd in “Security 50” by a&s international. Dahua Technology is committed to providing the highest quality solutions and products with the latest technologies to enable the company’s end users to perform their business successfully. The company has a high-level group of R&D engineers and technical staff working on cutting-edge technologies in camera lens, image sensor, video encoding and transmission, embedded processor, graphic processing, video analytics, software reliability, network security and other technologies.
ISS, Intelligent Security Systems, a renowned provider of intelligent VMS and native analytics globally, announced a strategic partnership with Captis Intelligence. The partnership will leverage each company's area of expertise and introduce an automated face-matching solution connected to an exclusive criminal database of 35 million subjects provided by Captis Intelligence. The move will expand and capture further opportunities in the rapidly transforming facial recognition market, offering users the ability to access legal open-source criminal data in their face-matching operations while adhering to today's biometric data privacy concerns. Fusion of technologies The capability to alert if a registered sex offender has entered a school or identifying an international terrorist at a port-of-entry are examples of current applications where the fusion of technologies will be deployed. "We are continually evaluating our offering to ensure our products and alliances are effectively addressing the needs of our customers." stated Daniel Marino, Chief Operating Officer of ISS. "The Captis database provide extra tools for customers without a built database, providing information that empowers security teams to quickly and accurately identify subjects that can represent a potential risk" added Marino. Video analytics software Our strategic alliance with ISS is a perfect illustration of Captis' strategy in redefining subject identification solutions" ISS will continue to collaborate with Captis Intelligence on the development of technology aimed at transforming data into immediate security intelligence. "Our strategic alliance with ISS is a perfect illustration of Captis' strategy in redefining subject identification solutions" stated Kirk Brown, Vice President of Business Development for Captis. "Our alliance with ISS is rooted in innovation and a shared focus of solving today's most pressing issues with face-matching technology" added Brown. ISS, Intelligent Security Systems, headquartered in Woodbridge, NJ, and with offices worldwide, is a provider of video management and video analytics software. Surveillance video solutions ISS provides a comprehensive line of digital security and surveillance video solutions which are on the forefront of on-demand security, allowing for centralized command and control of an entire enterprise security network. Captis Intelligence's I-4 platform (Intelligence, Information, Investigation, Identification) provides an advanced cloud-based system for public and private sector applications. Captis unifies situational awareness, geographic crime intelligence, social media investigation, subject identification, criminal databases, and access to solveacrime.com. A global innovator, Captis is headquartered in Los Angeles and has offices in London and Singapore. Captis was founded on the principle of innovation and remains at the forefront of pioneering I-4 crime prevention/suspect identification technologies.
Interface Security Systems, a front runner in managed service provider delivering business security, managed network, UCaaS and business intelligence solutions to distributed enterprises, shared its top predictions for the physical security industry. 2021: Slow beginning followed by biggest demand shock 2021 could prove to be almost as turbulent for the security industry as 2020. In the earlier part of the year, every one expected the industry will continue to grapple with the fallout from COVID-19 with possible disruptions to the equipment supply chain. However, assuming one can keep their critical workforce healthy and an effective vaccine is successfully deployed in Q2, the situation could improve very quickly. Vacant commercial buildings The second half of 2021 could set the stage for the biggest demand shock the security industry has ever experienced If restaurants, retailers, sporting/ entertainment venues reopen en masse, and formerly vacant commercial buildings fill back up with workers in late Q2 and early Q3, the new challenge, particularly for systems integrators, will be to keep pace with the pent-up demand. The reopening of America will require the deployment of unprecedented security resources, from servicing and refreshing existing systems to the deployment of new solutions. The second half of 2021 could set the stage for the biggest demand shock the security industry has ever experienced. Physical security industry Yesterday’s security camera has finally become today’s intelligent sensor While the security industry’s initial foray into analytics is largely over-promised and under-delivered, today’s artificial intelligence (AI) and machine learning are about to fundamentally change the core value proposition of the physical security industry. Security technology is no longer seen as devices to keep people and property safe, but it is finally becoming a strategic tool to help improve business operations. AI-based security solutions and cameras are now able to go beyond security to capture valuable marketing and sales transaction data, analyzing customer patterns and behavior. AI enables the industry to “see” in new ways. It’s impossible for humans to consume and accurately monitor the vast amount of video streams and other data available at most businesses, so AI is arriving at a time when one needs it the most. Personal identifying information AI can take otherwise unmanageable reams of data, and turn it into actionable information. And that is nothing short of revolutionary for the security industry. The applications are limitless, and the ultimate beneficiary will be the customer. And at a time when organizations are having to be efficient with their budgets, it’s never been more important that the investment they’re making in their security systems should allow them to improve their overall business operations. Privacy concerns need to be taken seriously The patchwork of regulations at the state and local level is confusing and increasingly difficult to manage As cameras become increasingly more powerful and feature-rich, their ability to capture personal identifying information (PII) continues to grow. In 2021, the security industry along with Congress will begin in earnest to tackle the privacy implications of AI in general, and facial recognition technologies in particular. The patchwork of regulations at the state and local level is confusing and increasingly difficult to manage. Facial recognition technology The status quo risks stunting technology investment and putting us far behind advancements in other countries. The industry needs to strike a balance between innovation and privacy so facial recognition and other biometrics security technologies can flourish safely without compromising the privacy of individuals. As long as a privacy-by-design approach is taken where privacy features and functionality are built into the core design from inception and not simply an afterthought, there is no reason to slow the development of useful and exciting technologies like AI, face recognition, and others. Develop safe IoT devices Residential security providers to target the commercial sector Businesses should not be tempted to trade cybersecurity for the convenience and cost of these solutions 2021 could be the year the large, new security solution manufacturers set their sights on commercial security integrators and their customers. New entrants have essentially taken over the residential security space with slick new applications and easy DIY installs. They will seek out new markets. However, businesses should not be tempted to trade cybersecurity for the convenience and cost of these solutions. The complex technology requirements to develop safe IoT devices that are designed to effectively protect a commercial organization’s entire network from possible cyber attacks are not the same as what is required for a residential application. Commercial security integrators should prepare to demonstrate the unique value they bring to the table, and/ or partner with these new entrants to ensure the necessary steps are taken to protect their customers’ businesses. Existing security infrastructure 2021 could be the year security teams get a seat in the C-suite The security industry has been challenged in unpreceded ways during the pandemic and security professionals were pulled into the forefront during this crisis. The industry’s entire business is based on planning for the unexpected. Security leaders have shown extraordinary resilience and resourcefulness evidenced by so many of the customers quickly adapting to the new needs and challenges posed by the situation. They have been able to repurpose and adapt their business models and leverage their existing security infrastructure to meet some of the new challenges created by the pandemic with video analytics such as people counting, occupancy management, ensuring mask-wearing guidelines are being observed, and so much more. This crisis has given the security industry an opportunity to redefine its role and value proposition. Operational intelligence data By leveraging business and operational intelligence data that can pay for itself and directly affect the profitability of the organization, the security industry is on the cusp of morphing from a tactical application to a truly strategic enterprise-shaping role.


Expert commentary
As the multi-billion-dollar market for artificial-intelligence-based video analytics continues to grow, so does the number of video analytics solution providers. In Q3 of 2018, Stockholm-based consulting company Memoori identified 128 active companies in the supply chain for AI video analytics [i]. This list is far from exhaustive, considering how analytics has been gaining interest and becoming mainstream in 2020, with users expecting more accurate alerts based on object detection instead of motion detection, hardware providers developing more powerful but compact chip sets for deployment, and more startup solution providers carving out their niche in the market. Given so many choices, the question arises as to how a system integrator can evaluate and select the best solution for his customer. Although the criteria vary for each vertical, there are some key metrics to consider across the field: Open platform Ease of use Robustness and reliable performance Versatility Good support and integration Low total cost of ownership 1. Open platform Open platform allows the user to have complete flexibility, avoid being locked into any particular manufacturer, and utilize the best-of-breed solution available in each category. Analytics has been gaining interest and becoming mainstream in 2020 In 2019, an IPVM survey shows that 51% of system integrators always prefer an open platform to an end-to-end solution (i.e., all components including camera, VMS, analytics, etc. provided by one manufacturer), and 24% select open platform or end-to-end depending on customer requirements [ii]. For analytics, as the users commonly have an existing infrastructure, investing in a technology overhaul would be too expensive. An open-platform analytics product, i.e., a camera-agnostic, VMS-agnostic, and computer-server-agnostic product, will add value to the existing infrastructure within a reasonable budget. Open platform also makes it easier and more cost-efficient to upgrade each component when necessary. 2. Ease of use One of the main reasons and goals of applying AI to security is to help the user automate the process of watching hours and hours of surveillance videos, extract useful information and send alerts when necessary. In other words, AI should make it easier for the user to operate the security system. Thus, a good AI video analytics solution must be easy to set up and connect to the existing infrastructure, easy to use on a daily basis, and easy to scale with the expansion of the business. Let us examine each point in more details: Easy to set up: a turn-key, plug-and-play solution helps save time and money. The system integrator can spend a couple of hours instead of days to help the customer set up. In both 2018 and 2020, the most common reason that integrators cited for choosing a solution is that “it just works” [iii][iv]. Easy to use: an intuitive, no-learning-curve user interface allows the customer to make the solution second-nature, maximize its utility and gets the highest return on investment. The best-case scenario is that everyone in the user’s organization, e.g., every police officer in a city police department, can use the solution on a daily basis, not limited to a technical staff with rigorous training. Easy to scale: the solution must be designed to seamlessly scale in different ways: number of cameras (e.g., from a few to a few thousands); deployment locations (e.g., can we access data in our branch office in another city? how about another country?); types of device and deployment (e.g., body-worn cameras, in-vehicle, control center, cloud). 3. Robustness and reliable performance Traditional VMD (video motion detection) -based analytics have many limitations and false alarms, so AI-based analytics were developed, primarily to identify different objects in the videos with high accuracy. However, such accuracy must be achievable in different real-life environments. The best solution does not let low lighting, snow and rain, spider crawling in front of the cameras, etc., interfere with human intrusion detection or license plate recognition at night. In the case of temperature detection, users should be able to walk by the system at a normal pace without removing the mask to minimize disruption and maximize worker efficiency. A more robust solution means less time and resource spent on false alarms. 4. Versatility A versatile, feature-rich, multi-functionality video analytics is the most effective choice for system integrators in the long term. Not limited to only object detection, AI can be trained to recognize higher levels of details (e.g., faces, age, gender, license plates), track objects (including people and vehicles), and detect certain behaviours (e.g., loitering, theft). In other words, a more versatile analytics solution can recognize more types and behaviors of objects for more use cases. Most users have certain pain points today and are looking for only one or a few solutions. However, as the organization grows, new situations and requirements may arise, which call for new detection functions in video analytics. The costs and complexity will add up quickly if each solution has only one function. A few examples: An LPR camera may be perfect for the need to record all license plates today, but if the police wants to find a black Toyota Prius with “A23” in the plate number, a solution that can detect the plate number, vehicle make and model will save much more time and effort. Intrusion detection based on the ability to distinguish human from other moving objects (e.g., animals) is only the first step. What if the user needs an alert for people that enter a construction zone without a hard hat and safety vest? The answer is an AI solution that can grow its repertoire. In the current pandemic, business must adopt temperature screening, distancing detection, occupancy detection, and mask detection; a solution that can provide all four analytics in one platform is clearly more useful than four individual solutions, not to mention whether the solution can be repurposed after the pandemic has been resolved. 5. Good support and good integration One of the main reasons that system integrators might select an end-to-end solution instead of an open-platform one is technical support: more responsiveness and less finger-pointing. In terms of responsiveness, good technical support is a part of the ease of use, where the system integrator and the user can rest assured that any question can be answer via email or a phone call to the manufacturer. A more robust solution means less time and resource spent on false alarms In terms of having a one-stop-shop solution to reduce finger-pointing, good support means the manufacturer can provide easy integration to 3rd-party systems, which includes API interface support. One example is access control. Video analytics is a great tool to enhance access security (e.g., face recognition to open doors for employees; LPR for parking management; weapon detection linked to automatic locked-down system), but only 24% of video surveillance systems today are integrated with access control [v]. Two of the main reasons: (1) integration is expensive, and (2) the systems are not compatible. Both hurdles can be overcome if the analytics solution bridges the gap between cameras and access control system via its API. 6. Low total cost of ownership These six criteria help both the system integrator and the end-user save time, money, and effort Cost is always a determining factor, especially in the SMB market [vi]. Customers’ expectations are high, and higher-resolution cameras are decreasing in price and increasing in numbers, which means more data to process than ever. A good analytic software solution is not only capable of many functions, its algorithms are efficient enough to fit more into the same server specs, and it does not require expensive cameras to have good accuracy, thereby increasing cost saving for the entire system. In summary, these six criteria help both the system integrator and the end-user save time, money, and effort and get the most out of video analytics in the long run. A high-performance, versatile, turnkey solution is already a reality with today’s technology, and it will only continue to improve, so there is no reason to settle for less. [i] Memoori, The Global Market for Intelligent Video Analytics 2018 to 2023, 2018 [ii] IPVM, Open vs. End-to-End System: Statistics 2019, November 11, 2019 [iii] John Honovich, IPVM, Favorite Video Analytic Manufacturers 2018, April 2, 2018 [iv] IPVM, Favorite Video Analytic Manufacturers 2020, February 25, 2020 [v] Brian Rhodes, IPVM, Access Control and Video Integration Statistics 2020, October 8, 2020. [vi] Brian Karas, IPVM, Low Cost, Low End Competitors Challenge SMB Surveillance Market, September 1, 2017
Recently contacted by your credit card company because of a data breach or were you a victim of identity theft? Many of us have either been affected by identity theft or know someone who has been affected. Many consumers are seeking a secure environment that is also user-friendly. Businesses are seeking the same, with absolute certainty, that only valid users can access critical data. How can your company tackle these security and usability requirements while ensuring customer satisfaction? Today's three primary biometric modalities are fingerprint, facial and iris, and each has its own strengths and weaknesses but due to the global COVID-19 pandemic, touchless is highly preferred. Any company claiming their technology is best for all applications is likely being disingenuous. The key is to first prove a biometric is required, and once decided, the following five steps will help select the best biometric modality and supplier. Today's three primary biometric modalities are fingerprint, facial and iris, and each has its own strengths and weaknessesBiometrics can provide a mechanism to tackle these issues head-on by moving from what you know (password) and have (ID card) to who you are (your biometric), which dramatically increases the level of security while also being user-friendly. But how is the best biometric modality selected for an upcoming product? User interaction Start by defining the planned customer usage model, including the typical user, normal or desired interaction, and product in-field environment and placement, as well as any strategic plans. Think through the clothing the users will wear (e.g., face masks), the height of the users, hygiene requirements and opt-in requirements. Decide how quickly the biometric must respond and test this during the POC testing. The better the enrollment image (template), the better the matching performance and overall user experience. Biometric storage Start by defining the planned customer usage model, including the typical user, normal or desired interaction, and product in-field environment and placement, as Due to the global COVID-19 pandemic, touchless is highly preferredwell as any strategic plans. Think through the clothing the users will wear (e.g., face masks), the height of the users, hygiene requirements and opt-in requirements. Decide how quickly the biometric must respond and test this during the POC testing. The better the enrollment image (template), the better the matching performance and overall user experience. Cost and security Start by selecting which product lines will use the biometric and establishing the desired price point(s). Decide how the biometric will fit into the product and get bulk pricing to understand unit costs at volume. Software is typically handled as a license fee and often negotiable. The production cost per unit decreases as volumes increase. Choose the biometric modality that best meets functional and security requirements while hitting the targeted price. The biometric security level required depends on the assets being protected and the matching usage model. A 1:1 model, such as a cellphone, may be fine with a low-security biometric application. However, in a 1:N model, such as airport security, requires a more secure biometric such as iris. To select the best biometric for the product, compare each company's false acceptance rate (FAR) and false rejection rate (FRR). FAR indicates the biometrics ability to keep intruders out, while FRR indicates the biometrics ability to allow enrolled users in. Ensure that all biometric companies being considered can provide this information at a minimum. It is better to get each company's detection error trade-off (DET) curve, which shows how FAR and FRR vary relative to each other. Criminal activity Hackers and criminals are always trying to break technology, including biometrics. Be certain each technology has robust presentation attack detection (PAD), which ideally is third-party certified. Understand what if any personally identifiable information (PII) needs to be captured, and decide how the PII will be handled, including who will manage the data (i.e., your company, the biometric supplier or another third party). Be certain that whoever controls the PII uses the latest encryption standards and employs techniques to secure this data in memory, crossing the network and in the biometric database. Understanding the European GDPR Compliance standards if applicable will also be important. Supplier consideration Each supplier being considered should be evaluated throughout the POC testing process. Ensure the supplier is trustworthy, provides good customer support and meets its commitments. Evaluate the supplier's engineering capability and support model to ensure it can support any desired design changes and support your Be certain each technology has robust presentation attack detection (PAD)engineers to deliver the best functioning product. Selecting the best biometric for your exact use case will take some time and effort, but it has the potential to grow your business and delight your customers. Do not shortchange the process and go with the cheapest solution without doing some research. As the saying goes, you get what you pay for.
Fingerprint identification had once been the most widespread biometric technology around the world. However, many argue that this technology has quite a lot of shortcomings. For instance, even expensive fingerprint reading scanners have a hard time identifying dirty or wet fingers, plus, some people's fingerprints are unreadable. Furthermore, being vulnerable to the temperature and precipitation, such scanners consequently cannot be used outdoors. Plus, fingerprint reading scanners do not meet today’s demand for contactless biometric technology. According to a new comprehensive report 'Global Contactless Biometrics Technology Market 2020-2026', "the Global Contactless Biometrics Technology Market size is expected to reach $18.6 billion by 2026, rising at a market growth of 19.1% CAGR during the forecast period. The development and acceptance of contactless biometric technologies have been driven by demand for faster and easier authentication processes and boosted by demand generated by the COVID-19 pandemic." Thus, it is contactless biometric recognition technologies that meet the latest requirements. Too expensive? Until quite recently, face recognition technology was too expensive and poorly scalable. Nevertheless, a lot of factors have changed in recent years. To start with, facial biometric technologies have become more accessible for a large audience. Being affordable, reliable, and easy to use, facial recognition systems provide a high level of security. Furthermore, the facial recognition system allows you to instantly notify about facial identification cases.The market of biometric technology is continuously growing It is also important to emphasize that the system itself automatically updates biometric data. Photos in biometric profiles can be updated directly from the video stream. The data is stored in long-term storage and does not take up much memory. The reasons mentioned above provide all business fields with a competitive advantage. Since the market of biometric technology is continuously growing, contactless identification will be highly demanded in the long run. Impact of COVID-19 Plus, the contactless facial recognition system is especially relevant today due to the COVID-19 pandemic. Now wearing a mask is required almost in all public places. That is why those systems aimed at people's safety monitoring had to promptly develop their solutions according to the new requirements. Developers of facial biometric solutions have encountered an issue of face detection in masks. It was essential to adapt the software to such changes, more specifically update the face recognition algorithm. It may be illustrated by the case of RecFaces company. RecFaces developers have updated the facial biometric algorithm to ensure the most accurate recognition of people in masks that cover almost 50% of a person's face. Nonetheless, if the company forbids entering its territory without a mask, the system sends notifications (push or SMS notifications) to control people coming through the checkpoint with and without masks. The algorithm update has boosted face recognition accuracy and speed. Global transformation As a matter of fact, facial recognition algorithm has evolved around the world. According to the tests conducted by the National Institute of Standards and Technology (NIST), the top face identification algorithm of 2020 has an error rate of 0.08% compared to 4.1% for the best algorithm in 2014. Such improvements will reduce risks linked to misidentification, and expand the advantages that can come from proper use in the long run.Al and deep learning are key elements of the latest-generation algorithms According to the National Institute of Standards and Technology report recognition errors were caused mainly by image quality variations like pose, illumination and expression. In 2018 the software was at least 20 times more accurate than it was in 2014 and in 2019 finding “close to perfect” performance by high-performing algorithms. Such improvement has resulted from the integration or replacement of previous approaches with those based on deep convolutional neural networks, operating even with poor quality images. Artificial Intelligence (Al) and, more specifically, deep learning are key elements of the latest-generation algorithms. Facial recognition is reaching that of automated fingerprint comparison, which has been considered as the gold standard for identification for a long time. Therefore, there is no doubt that innovation drives the development of solutions, and biometric technologies also move with the times. The shift from fingerprints to facial recognition is a vivid example of such evolution!
Security beat
Artificial intelligence (AI) is more than a buzzword. AI is increasingly becoming part of our everyday lives, and a vital tool in the physical security industry. In 2020, AI received more attention than ever, and expanded the ways it can contribute value to physical security systems. This article will revisit some of those development at year-end, including links back to the originally published content. In the security market today, AI is expanding the use cases, making technologies more powerful and saving money on manpower costs - and today represents just the beginning of what AI can do for the industry. What it will never do, however, is completely take the place of humans in operating security systems. There is a limit to how much we are willing to turn over to machines - even the smartest ones. Beyond video analytics "Apply AI to security and now you have an incredibly powerful tool that allows you to operate proactively rather than reactively," said Jody Ross of AMAG Technology, one of our Expert Roundtable Panelists. AI made its initial splash in the physical security market by transforming the effectiveness of video analytics AI made its initial splash in the physical security market by transforming the effectiveness of video analytics. However, now there are many other applications, too, as addressed by our Expert Panel Roundtable in another article. Artificial intelligence (AI) and machine learning provide useful tools to make sense of massive amounts of Internet of Things (IoT) data. By helping to automate low-level decision-making, the technologies can make security operators more efficient. Biometrics with access control Intelligent capabilities can expand integration options such as increasing the use of biometrics with access control. AI can also help to monitor mechanics and processes. Intelligent systems can help end users understand building occupancy and traffic patterns and even to help enforce physical distancing. These are just a few of the possible uses of the technologies - in the end, the sky is the limit. AI is undoubtedly one of the bigger disrupters in the physical security industry, and adoption is growing at a rapid rate. And it’s not just about video analytics. Rather, it is data AI, which is completely untapped by the security industry. Bottom line: AI can change up your security game by automatically deciphering information to predict the future using a wide range of sources and data that have been collected, whether past, present, and future. That’s right. You can look into the future. Smarter perimeter protection Now, Intrusion Detection (Perimeter Protection) systems with cutting-edge, built-in AI algorithms to recognize a plethora of different object types, can distinguish objects of interest, thus significantly decreasing the false-positive intrusion rate. The more advanced AI-based systems enable the users to draw ROIs based on break-in points, areas of high-valuables, and any other preference to where alerts may be beneficial. AI Loitering Detection can be used to receive alerts on suspicious activity outside any given store Similarly, AI Loitering Detection can be used to receive alerts on suspicious activity outside any given store. The loitering time and region of interest are customizable in particular systems, which allows for a range of detection options. Smart security is advancing rapidly. As AI and 4K rise in adoption on smart video cameras, these higher video resolutions are driving the demand for more data to be stored on-camera. AI and smart video promise to extract greater insights from security video. Meeting urban needs Complex, extensive camera networks will already require a large amount of data storage, particularly if this is 24/7 monitoring from smart video-enabled devices. Newer edge computing will play an important role in capturing, collecting, and analyzing data. There are many more types of cameras being used today, such as body cameras, dashboard cameras, and new Internet of Things (IoT) devices and sensors. Video data is so rich nowadays, you can analyze it and deduce a lot of valuable information in real-time, instead of post-event. In smart cities applications, the challenge of identifying both physical and invisible threats to meet urban citizens’ needs will demand a security response that is proactive, adaptable and dynamic. Optimize security solutions As we look ahead to the future of public safety, it’s clear that new technologies, driven by artificial intelligence (AI), can dramatically improve the effectiveness of today’s physical security space. For smart cities, the use of innovative AI and machine learning technologies have already started to help optimize security solutions. In sports stadium applications, AI’s role in getting fans and spectators back after the COVID pandemic is huge, through capabilities such as social distance monitoring, crowd scanning/metrics, facial recognition, fever detection, track and trace and providing behavioral analytics. Technologies such as AI-powered collaboration platforms now work alongside National Leagues, Franchises and Governing Bodies to implement AI surveillance software into their CCTV/surveillance cameras. AI surveillance software In many ways, it’s the equivalent of a neighborhood watch program made far more intelligent through the use of AI This is now creating a more collaborative effort from the operations team in stadiums, rather than purely security. AI surveillance software, when implemented into the surveillance cameras can be accessed by designated users on any device and on any browser platform. One of the biggest advantages of using AI technology is that it’s possible to integrate this intelligent software into building smarter, safer communities and cities. Essentially, this means developing a layered system that connects multiple sensors for the detection of visible and invisible threats. Integrated systems mean that threats can be detected and tracked, with onsite and law enforcement notified faster, and possibly before an assault begins to take place. In many ways, it’s the equivalent of a neighborhood watch program made far more intelligent through the use of AI. Fighting illicit trade Using technology in this way means that thousands of people can be screened seamlessly and quickly, without invading their civil liberties or privacy. AI’s ability to detect visible or invisible threats or behavioral anomalies will prove enormously valuable to many sectors across our global economy. Revolutionary AI-driven technologies can help to fight illicit trade across markets. AI technologies in this specific application promise to help build safer and more secure communities in the future. AI can support the ongoing fight against illicit trade on a global scale in a tangible way. For financial transactions at risk of fraud and money laundering, for example, tracking has become an increasing headache if done manually. As a solution to this labor-intensive process, AI technology can be trained to follow all the compliance rules and process a large number of documents - often billions of pages of documents - in a short period of time.
The coronavirus pandemic had a monumental impact on all aspects of the business world, including the security industry. However, amid the gloom and doom, many security professionals also saw opportunity: New ways the industry’s products could be applied to address the challenges of coping with the virus. This article will review some of those opportunities, based on our reporting throughout the year and including links back to the original articles. During and after the pandemic, security systems are an important asset when it comes to helping to keep occupants and buildings safe as employees return to work. For example, video analytics can provide insight into how spaces have previously been used and can help to predict where and when occupants encounter each other or congregate. Role of thermal cameras These foot-traffic patterns can inform settings for a variety of devices - like ventilation and temperature controls - and even help owners create social distancing plans and monitor personal protective equipment (PPE) compliance. Thermal surveillance, a mainstay of traditional physical security and outdoor perimeter detection, began being deployed early in the pandemic to quickly scan employees, contractors and visitors as part of a first line of defense to detect COVID-19 symptoms. These systems provide flexibility and can offer integrations with multiple VMS platforms and access control devices These systems provide flexibility and can offer integrations with multiple VMS platforms and access control devices. Thermal cameras can be a tool for detecting fever, but any use of the technology for this purpose is full of qualifications and caveats. Importantly, how the camera system is configured makes all the difference in whether temperature readings are accurate, and the downside of inaccurate readings is obvious - and potentially deadly. Temperature detection systems FDA guidelines limit how the cameras are used, not to mention guidance from other regulatory/government bodies such as the CDC. One of our Expert Roundtable panelists compares the market to a “wild west scenario,” and almost all the panelists are clear about how customers should approach the market: Buyer beware. There are many companies jumping into selling temperature detection systems to the state, local governments, hospitals, airports and local businesses, but do they know how to drive one? Anyone can get behind a car and drive it into a wall by accident. The same can happen with a temperature detection system. Customers need to know what questions to ask to ensure they maximize the accuracy of body temperature detection systems. Rise of contactless Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads. No longer in favor are contact-based modalities including use of personal identification numbers (PINs) and keypads, and the shift has been sudden and long-term. Both customers and manufacturers were taken by surprise by this aspect of the virus’s impact and are therefore scrambling for solutions. Immediate impact of the change includes suspension of time and attendance systems that are touch-based Immediate impact of the change includes suspension of time and attendance systems that are touch-based. Some two-factor authentication systems are being downgraded to RFID-only, abandoning the keypad and/or biometric components that contributed to higher security, but are now unacceptable because they involve touching. "Users do not want to touch anything anymore,” says Alex Zarrabi, President of Touchless Biometrics Systems (TBS). Facial recognition system Another contactless system that benefits from concerns about spread of COVID-19 is facial recognition. New advancement in software, specifically in the areas of algorithms, neural networks and deep learning and/or artificial intelligence (AI), have all dramatically improved both the performance and accuracy of facial recognition systems, further expanding its use for an increasing number of applications. A low-tech solution - the face mask - became a leading preventative measure during the pandemic. But, a high-tech solution is necessary to ensure that everyone is wearing them. Cameras powered by artificial intelligence can now identify whether or not people entering a facility are wearing facemasks and help enforce adherence to mask mandates. This technology is proving to be a cost-effective solution that reduces risks of confrontations over masks policies and gives managers the data they need to document regulatory compliance and reduce liability. Smart video analytics Other technology approaches, including artificial intelligence (AI), were also brought to bear during the pandemic. The German data analytics powerhouse G2K, for example, has developed a Corona Detection and Containment System (CDCS) that is ready for immediate use in record time. Detection takes place in combination with AI-supported data analysis to specifically identify virus hotspots and distribution routes, as well as to identify other potentially infected persons. One specific AI application fuels the reopening of the world and successfully keeps the spread of the virus abated One specific AI application fuels the reopening of the world and successfully keeps the spread of the virus abated. A “collaborative security” application includes a synthesis of smart video analytics, facial recognition, object identification/detection, and thermal cameras that can support the reopening of businesses globally when installed within those facilities frequented by customers. Enforcing social distancing Several applications have been successful to date and will increase in usability in the foreseeable future, creating “smart cities” working together towards a safer, more secure world. The site of one pilot program is the 250,000-square-foot HID Global facility in Austin. For the pilot program, 80 HID Location Services readers were installed in a wide area in the facility, including a variety of environments. Initially 30 badges and 30 fobs, all BLE-enabled, were issued to employees. If a badge identifies another nearby beacon (suggesting a social distancing failure), it emits a blinking LED light, which can be seen by the offending co-worker. To ensure social distancing, a Bluetooth Low Energy (BLE) beacon is emitted from an employee’s fob (or from a badge that has the same functionality). The beacon communicates peer-to-peer with a beacon emitted by another employee’s fob or badge to alert if the location of the two employees is less than six feet apart. For contact tracing, the beacons communicate via a nearby “reader” (a BluFi BLE-to-Wi-Fi gateway) to the Bluzone cloud-based software-as-a-service. COVID-19 White Papers In addition, we published several White Papers in 2020 that addressed various aspects of the coronavirus pandemic. They included: The top five security lessons learned that apply across all industries navigating COVID-19. Using video analytics to keep staff, visitors and customers safe by enforcing social distancing. How antimicrobial treatment on door handles and levers can reduce disease spread. How companies can put in extra precautions that will continue to grow and adapt with their environment over the long-term. Determining the practicalities and capabilities of today's thermal cameras to accurately detect body temperature.
Facial recognition is becoming more popular in newer systems for access control — a shift that began before the pandemic and has intensified with a market shift toward “touchless” systems. A new facial recognition platform is emerging that responds to the access control industry’s increased interest in facial recognition by expanding the concept with a new higher level of technology. At the core of the new system is high-performance, true-3D sensing with facial depth map processing at low power consumption, which enriches the capabilities of small-footprint access control devices. New proficiencies include anti-spoofing (preventing the use of a 2D photo of an authorized user to gain entry) and anti-tailgating (preventing an unauthorized person from gaining entry by following an authorized user) in real time and in challenging lighting conditions. The system uses “true 3D sensing,” which incorporates single-camera structured-light 3D sensing—as opposed to dual-camera depth sensing or IR video imaging-based approaches. AI vision processing and 3D sensing technologies The new “Janus reference design” incorporates AI vision processing, 3D sensing technologies, and RGB-IR CMOS image sensor technologies from Ambarella, Lumentum and ON Semiconductor. Specifically, Lumentum’s high-reliability, high-density VCSEL projector for 3D sensing combines with ON Semiconductor’s RGB-IR CMOS image sensor and Ambarella’s powerful AI vision system on chip (SoC). The Ambarella, Lumentum, and ON Semiconductor engineering teams worked together to incorporate their complementary technologies into the reference design. A reference design offers OEM product and engineering teams a fully functional engineering reference implementation that they can use as the basis for their own product. Teams will often customize a reference design with their choice of various third-party hardware components to fit their product specifications and positioning. They might also integrate their own software, algorithms, and back-end system integrations. The advantage to this approach is that the manufacturer can get to market quickly with a next-generation product that emphasises their core strengths. 3D depth information for facial recognition Generally, it takes between nine months and a year for a manufacturer to get to market using a fully functional reference design, such as the one developed jointly by Ambarella, Lumentum and ON Semiconductor. The Janus platform leverages 3D depth information generated via structured light for facial recognition with a >99% recognition accuracy rate. Traditional 2D-based solutions are prone to false acceptance and presentation attacks, whereas 3D sensing delivers advanced security—just as mobile phones use true-depth cameras for facial recognition. 3D facial recognition also significantly reduces the gender and ethnic biases demonstrated by some 2D facial recognition solutions. The Janus reference design is also aimed at future smart locks for enterprise and residential use: its unique single-camera 3D sensing solution will help OEMs overcome cost and manufacturability barriers, while the ultra-low power edge AI capability can effectively extend the battery life, which in turn reduces maintenance cost. Video security and access control Ambarella sees touchless access control, as well as the convergence of video security and access control, as the mega-trends driving industry innovation and growth—using video, computer vision, and 3D sensing to not only address safety and security, but also to improve the user experience and public health, says William Xu, director of marketing for Ambarella. The convergence of video security cameras and access control readers has been widely discussed by leading access control OEMs. In many cases, they already integrate video security cameras, readers, door controllers, cloud-access, and the like. In most enterprise installations, one would typically find security cameras installed where there are access control readers. Combining the two devices significantly reduces the maintenance cost and system complexity. “In comparison to fingerprint or other contact-based approaches, Janus-based access control is touchless—requiring no physical contact with authentication hardware such as fingerprint sensors or keypads—reducing infection risk while enabling a seamless experience,” says Mr. Xu. “The Janus platform provides true 3D depth information to prevent unauthorized individuals from mimicking legitimate users, and the advanced embedded AI processor enables tracking and anti-tailgating algorithms. Janus-based devices perform well in challenging lighting conditions and they are capable of authenticating multiple users simultaneously, with imperceptible latency.” Access Control and public health What was once purely a security challenge—namely, how to prevent unauthorized entry into a restricted area—has evolved into a public health challenge as well. Many traditional access control methods, from number pads to fingerprint readers, require touch in order to function, and if the current global pandemic has made one thing evident, it’s that minimizing physical contact between users and surfaces is vital to community well-being. Janus was originally designed to facilitate the next generation of facial-recognition-based access control readers—enabling 3D sensing and high recognition speed for seamless authentication. COVID-19 has accelerated industry-wide research, development, and timelines for Janus-based solutions, says Mr. Xu. Deep learning and artificial intelligence drive all the new capabilities offered in Janus—capabilities that are only possible due to the platform’s high computational horsepower. The core deep learning and AI capabilities of Janus enable a wide range of advanced features only possible with an embedded vision SoC, says Mr. Xu. All are performed in real time, even when multiple users are being processed simultaneously. These include the extraction and comparison of facial depth maps with those registered in the system; 3D liveness detection, ensuring that the system can distinguish between real users and photo or video playback attacks; anti-tailgating, which relies on computer vision algorithms to detect and track when an unauthorized person follows a legitimate user inside; face mask detection; and people counting. VCSEL technology According to Ken Huang, Director of Product Line Management, 3D Sensing, Lumentum: “Lumentum’s VCSEL technology is one of the Janus design’s core strengths and differentiators. The process begins when Lumentum’s high-resolution dot projector projects thousands of dots onto the scene to create a unique 3D depth pattern of a user’s face. Most traditional biometric facial security systems rely on 2D images of users—simple photographs—which reduces authentication accuracy. In contrast, the 3D depth map generated by Lumentum’s technology provides the foundation of a more accurate, more secure, and more intelligent system overall. In addition, Lumentum’s VCSEL solutions incorporate a Class 1, eye-safe laser with zero field failures to date.” Adds Paige Peng, Product Marketing Manager, Commercial Sensing Division, ON Semiconductor: “If we think of Ambarella’s CV25 as the brain of the Janus design, the AR0237IR from ON Semiconductor is the eye. The AR0237IR image sensor captures the information, and the CV25 processes it. Other face recognition systems use two “eyes” – one to recognize RGB patterns to generate the viewing image stream, and another IR module to detect liveliness in motion. The Janus solution leverages a single “eye”—the AR0237IR—to obtain both visible and infrared images for depth sensing and advanced algorithms such as anti-spoofing and 3D recognition. AR0237IR also provides good sensitivity in various lighting conditions and supports high-dynamic-range (HDR) functions.” The single-camera 3D sensing solution for access control operates in three seamless steps: Step 1: Lumentum’s high-resolution dot projector creates a unique 3D depth map of a user’s face; Step 2: ON Semiconductor’s RGB-IR image sensor captures the high-resolution images from Step 1, even in low-light or high dynamic range conditions; Step 3: Ambarella’s advanced vision SoC takes the high-resolution images captured in Step 2 and uses deep neural networks (DNNs) for depth processing, facial recognition, anti-tailgating, and anti-spoofing while video encoding and network software run simultaneously.
Case studies
Ipsotek, a pioneer in artificial intelligence (AI) powered video analytics, has announced that it has been awarded a security systems project at the Katara Culture Village in Doha, Qatar, in partnership with Mannai Trading Co, a Qatari based company listed on the Qatar Stock Exchange. Ipsotek’s highly scalable VISuite AI platform and advanced VISuite FR facial recognition system have been selected and approved by the Qatar Ministry of Interior to improve the security and safety as well as provide business intelligence at the iconic cultural village of Katara. VISuite AI enables users to efficiently manage automatically generated alarms in real-time, resulting in reduced operator response times and the ability to track chosen behaviors of interest in complex environments. Security threat VISuite FR automatically detects and informs operators of people that have visited a site multiple times in a configurable timeframe and could pose a security threat. It is optimized for use in busy and security-sensitives scenarios where the highest level of recognition is required. In addition to the project at Katara in collaboration with Mannai ICT, Qatar’s renowned Systems Integrator and the Information & Communication Technology Division of Mannai Corporation, Ipsotek has a number of other major projects across Qatar. The company has also announced that it has appointed Mr Jihad Marei as Country Manager for Qatar and is in the process of opening a new office in one of Qatar’s Free Zones. Key strategic partners We are very proud to have been awarded the Katara Heritage Village project with Mannai Trading Co." Also known as ‘The Valley of Cultures’, Katara is one of the main cultural destinations in Qatar, featuring a museum, open amphitheatre, opera house, movie theater, conference hall, beach, Souq and multiple restaurants. Katara hosts hundreds of events and attracts over 10 million visitors each year. Charlie Bennett, Ipsotek Head of Sales for EMEA said: “We are very proud to have been awarded the Katara Heritage Village project with Mannai Trading Co. Mannai has become one of our key strategic partners in Qatar and we have enjoyed collaborating on several projects together this year, which is why we have also chosen to grow our presence in country further by employing Jihad Marei as Country Manager and open a dedicated office in Qatar.” Artificial intelligence video analytics Shamnad Karuvadi, Deputy Manager ELV Physical Security at Mannai Trading Co said: “We are very pleased to be working with Ipsotek as our solution partner for Artificial Intelligence Video Analytics. Ipsotek has added a great deal of value to the Mannai solution portfolio and together we look forward to providing the highest levels of safety and security to protect critical infrastructure. We would like to extend our sincere thanks to Charlie Bennet & Mr. Jihad Marei at Ipsotek for their extensive support.”
Boon Edam Inc., a globally renowned company in security entrances and architectural revolving doors, has announced that Dexus Wholesale Property Fund has upgraded the Gateway Building in Sydney’s Circular Quay to feature entry security measures to protect employees, visitors and valuable data. The ideal solution was found by integrating Boon Edam Speedlane Swing optical turnstiles, IDEMIA’s MorphoWave touchless fingerprint scanners, Schindler’s elevator dispatch and Honeywell’s access control technology. Integration with MorphoWave touchless reader MorphoWave scans and verifies four fingerprints through a simple hand wave gesture Gateway’s access solution allows authorized and registered tenants to simply wave their hand in the MorphoWave touchless fingerprint scanner reader to enter the secure area through the turnstiles. Guests can sign in and register their finger pattern to become authorized to enter. MorphoWave scans and verifies four fingerprints through a simple hand wave gesture, during which the sensor takes several 3D photos of the fingerprints to extract biometric data and compare with the authorized fingerprints stored in the device. If they match, the user is granted access. This process all happens in less than one second. Featuring Schindler’s PORT Technology Each MorphoWave reader is connected to Schindler’s PORT Technology, which then receives the user’s credential data and conducts a cross-check with the building’s access control database. If the user is valid, a command is sent to the Boon Edam Lifeline Speedlane Swing to open its barriers. This interaction is surprisingly quick, with limited latency. “Tenants have a duty of care to protect their employees and visitors as well as valuable data and intellectual property, and they need the cooperation and support of a responsible and innovative building manager such as Dexus to manage secure entry into the building,” said Michael Fisher, Managing Director, Boon Edam Australia. Seamless access control integration A major part of the solution involves elevator destination control, whereby a user’s credentials are automatically assigned an elevator as they are verified and allowed access through the turnstile. This seamless integration was facilitated by an existing global partnership between Boon Edam and Schindler. The partnership arranged for Schindler’s PORT 4 mini technology to be embedded into the Speedlane Swing optical turnstiles at the manufacturing stage in the Boon Edam factory. Using an advanced algorithm and the integrated Schindler PORT 4 mini elevator destination control for visual and audio feedback, an elevator is automatically assigned, at the same time the turnstile is opening, allowing for optimum efficiency. The security is controlled by Honeywell’s access control system, integrated with Schindler’s PORT Technology. Honeywell access control system Honeywell has managed the security and building management systems for the Gateway building since 1990 Honeywell has been managing the security and building management systems for the Gateway building since it was first opened in 1990. Honeywell Asia-Pacific Solution Architect Leader Rhys Crabb said “Early engagement at all stages and a commitment to a collaborative approach enabled Dexus to select the best available technologies. Dexus placed customer outcomes first and foremost in the project brief, ensuring the delivery of a product that provided tenants and visitors with a premium, modern and secure user experience that is flexible and easy to use.” Boon Edam optical turnstiles Mr. Stephen Hodge, Senior Project Manager, Dexus, said “With so many stakeholders, and a strong need for reliability and quality, it was important that everyone knew the goals of the project and worked well together. I’m pleased to say that it was like a perfect jigsaw and everything came together smoothly." Stephen adds, “What was important to Dexus is that we were pushing the boundaries to create better experiences, but we’re only doing so with proven products. Boon Edam’s optical turnstiles have been installed globally and locally, and this gave us added confidence that they were the right product for this forward-looking project.” Enhanced building security “Another significant help with this project was that the companies involved built a prototype, located at Schindler’s Head Office based in Sydney, so that the Dexus management and technical teams could test the solution well in advance of implementing it at Gateway,” Hodge continued. He further stated, “It gave us peace of mind that we’d selected the right suppliers. We have tenants in Gateway who requested ground floor security, so we went out to tender to seek the best combination of sophisticated security and elegance, without being obtrusive to the building’s users.” Touchless fingerprint scanners for privacy Touchless fingerprint scanners were chosen to control access to secured floors and areas of the building Touchless fingerprint scanners were chosen to control access to secured floors and areas of the building, because they provide an extra level of privacy that was attractive to tenants. “A computer algorithm converts each person’s unique fingerprint signature into binary code, zeroes and ones, and uses that code to grant access,” explained Mr. Hodge, adding “Boon Edam turnstiles have the ability to integrate facial recognition, which could be highly valuable in other projects, but the fingerprint scanners were the right fit for this building. Boon Edam made it simple to integrate the scanners with their optical turnstiles, which helped us meet project deadlines.” Effective management of system installations For such a complex project, installation always has its challenges, including managing installation work as people continue to use the building. Mr. Bill Garrett, Facility Manager at Gateway Building, was impressed by Boon Edam’s service and installation team. He said, “The Boon Edam installation team always ensured safety was the number one priority and they did a quality job, even with some very difficult-to-access areas.” Garrett adds, “I’m delighted with the result of the project. One of the major benefits of the new entry system is that there’s a dedicated underground entrance for tradespeople, couriers and deliveries, which removes congestion and bulky carts from the main lobby. It’s all about enhancing the user experience, and Gateway will set a new benchmark for a seamless, secure and aesthetically pleasing entry.” Staged approach towards system implementation The testing, combined with the staged approach, allowed for a smooth transition to the new security technology" Mr. Garrett explained that to get tenants used to a totally new system, they adopted a staged approach. At first, the turnstiles were put into place but left in the open position and after an initial period, some of the turnstiles were closed so that tenants could try entering using the new technology, if they wished. Finally, the entire system was fully implemented. “In addition to this staged approach, we met with key tenants and allowed them to test the system in advance. The testing, combined with the staged approach, allowed for a smooth transition to the new security technology,” said Garrett. Scope of touchless access control technologies Now that the technology has been successfully rolled out at Gateway, Dexus is looking at other locations that could utilize the same harmony of security technologies. “We are continuing to assess opportunities to implement touchless technologies in new developments as well as in our existing buildings,” said Mr. Hodge. “The stylish and secure entrance at Gateway has been ideal through the COVID-19 pandemic. It manages flow, queries guests on recent visits to pandemic hotspots, if they are feeling any symptoms, and can record all entrants to the building, helping us meet government requirements. And the same features will be beneficial in a broader context, too, to help mitigate against unauthorized entry,” concludes Hodge. Dexus is actively exploring the possibility of rolling out similar security entrance systems in other buildings, thereby delivering the seamless balance of security and elegance.
Security is the biggest concern for military facilities. Modern military facilities face a wide variety of risks, from cyber attacks to data theft to terrorist attacks. The Corpus Christi Naval Air Station in Corpus Christi, Texas for example, dealt with three separate attempted intrusions in a year and a half. In one incident, man driving a stolen SUV entered the base and attempted to exit through a separate entrance, but crashed his car and was then shot by security personnel. In another incident, just eight months later, the base went on lockdown again before an armed man was taken into custody. Then, in the third incident, seven months later, there was a third attempt to break into the base, this time by a man with known ties to terrorist groups. Protect sensitive facilities The man fired at the security guard at an entrance gate and struck her bulletproof vest before she raised the barrier to prevent the attacker from getting inside the base. The base’s security did a good job of preventing any serious damage during these attacks, but with the frequency of these incidents, more modern security may be needed to ensure that the next attack doesn’t end in catastrophe. Modern times call for modern security solutions, and Helios is the perfect option to protect sensitive facilities Modern times call for modern security solutions, and Helios by UVeye is the perfect option to protect sensitive facilities. Helios is safer, improves security, makes security officers’ jobs easier, works in extreme conditions, and can even identify vehicle passengers with high body temperatures to help prevent the spread of COVID-19. Helios UVIS uses machine learning and artificial intelligence to inspect the undercarriage of any vehicle that drives over its multiple high-resolution cameras. Improved safety for facilities It alerts the user on any irregularities or foreign objects hidden in the undercarriage. Inspecting the undercarriages of vehicles is very difficult for security personnel. Before Helios, there was never an effective solution for under-vehicle inspection, and even if security officers inspect the undercarriage, they may not know what to look for. They may not recognize a threat and allow a vehicle with a weapon, bomb, or other illicit or dangerous item to enter the facility. Security officers put themselves at great risk by manually inspecting vehicles, as evidenced by the attempted terrorist attack in Corpus Christi in May. With Helios, the security guard can inspect the vehicle from a safe distance by simply looking at the high-resolution images and checking for anything suspicious or unusual in the undercarriage. Detecting potential threats Scanning all vehicle types for undercarriage threats Automatic detection of illicit materials below the vehicle on the first pass Full integration to barriers, bollards and access control systems Driver and passenger fever detection capabilities No matter how well trained a security officer is, all humans make mistakes. However, with Helios, the chances of human error are greatly reduced. The system produces high-quality images of the undercarriages and alerts the security officer of any irregularities. It will even detect issues in the undercarriage of a vehicle passing through the system for the first time. Detecting potential threats is easy with UVIS. Works in extreme conditions The high-resolution images allow a security officer to see the entire undercarriage very clearly to determine whether there is anything suspicious. Instead of manually inspecting the vehicle and putting themselves at risk, security officers can inspect the vehicle from a more relaxed and safer environment and zoom in on the smallest details. Helios can withstand up to 20 tons per axle, meaning that it will survive being run over by massive vehicles Plus, Helios provides a side-by-side view of previous scans from the same vehicle if it has gone through the system before to make it easier for the officer to notice any differences. Helios can withstand up to 20 tons per axle, meaning that it will survive being run over by even massive vehicles. It is fully operational at temperatures between -20 and 40 degrees Celsius and is IP 68/54 compliant, meaning it offers full protection against sand, dust, or rain. Combat COVID-19 UVeye’s thermal sensor can also detect the body temperatures of vehicle passengers, which can identify visitors with potential fevers, improving the safety of everyone on the base. UVeye fully supports 3rd party integration and provides a multiple layer of security for any facility Integrations made in the past: ALPR Face Detection / Recognition Arm Barriers / Bollards VMS (Video Management System) Integrating to the centralized server provides the capability of connecting multiple systems or lanes across different sites while enabling central management and control via one screen. The centralized management system enables the client to access the different systems deployed and manage the different users and historical data. Access control systems The undercarriage of a vehicle is one of the most important parts of the vehicle to inspect, but also one of the most difficult areas to inspect. Helios is the perfect solution to prevent any weapons, bombs, drugs, or other illegal and dangerous items from entering military facilities. It can make everyone in the facility safer, including security officers, who will no longer need to manually inspect vehicles and put themselves in harm’s way. Integrating with other security and access control systems can provide a multi layer approach to tighten the entry and exit points to any sensitive site while keeping personnel and data safe.
The 100 Mount Street premium-grade office tower completed in May 2019, is the tallest (152m) building in North Sydney. With an innovative cross-braced exoskeleton structure and a soaring glass curtain wall, the tower celebrates Sydney‘s history of excellence in architecture and structural engineering. The 35-story office tower offers panoramic views of Sydney Harbor, Sydney Opera House, and Sydney Harbor Bridge, and is occupied by some of Sydney’s best-known companies. The site also benefits from its proximity to key transport infrastructures with a train station, bus stops, ferry wharf, and taxi stand all within walking distance. This high traffic location required a convenient and secure way to ensure controlled access for the 2,000 people entering the building everyday, while maintaining the aesthetics of the 8 meters-high ceiling lobby. Efficient control access to the building In order to efficiently control access to the building, the security contractor supplied top quality COMINFO EasyGate SPT entrance control gates equipped with IDEMIA’s MorphoWave™ Compact high-end biometric contactless devices. COMINFO is an experienced manufacturer of turnstiles and speed gates. EasyGate SPT models were installed, equipped with the latest MDD motor technology (Magnetic Direct Drive: no gearbox, no oil, no brush) and advanced infrared optical sensors which ensure safe passage and detect tailgating and cross-over, to ensure that only authorized people can pass through the gates. MorphoWave Compact™ is the flagship biometric device for physical access control from IDEMIA, the front-runner in Augmented Identity. The terminal performs a 3D scan and verification of 4 fingerprints in less than 1-second, in a quick and easy touchless wave gesture. Aesthetic integration The features of the product are particularly well-suited for high traffic locations with the capability to authenticate up to 50 people per minute thanks to advanced algorithms based on Artificial Intelligence. COMINFO carried out an aesthetical integration of MorphoWave™ Compact into EasyGate SPT, resulting in a powerful solution that brings the latest physical access control system using only a simple wave of a hand. This project was deployed by Centaman, COMINFO’s partner for Australia/New Zealand First to implement biometric technology Dexus and Dexus Wholesale Property Fund who owned the building were the first to implement this biometric technology in office buildings and have now more than 2,000 people registered with their biometrics, removing the need for physical access cards or touching anything when entering or leaving the secured premises. The installation is highly acclaimed by employees who appreciate the frictionless and hygienic use of MorphoWave™ Compact and EasyGate SPT.
In the fast-growing legalized cannabis industry, extensive security measures are a necessity. VIVOTEK, the pioneering IP surveillance provider has collaborated with Existo, a collective of cannabis industry professionals, to establish an IP surveillance solution for a cannabis cultivation facility in Northern Michigan, the United States. The results not only exceeded the state of Michigan’s expectations to allow for licensing at the state level but are also user friendly and add a level of comfort concerning building security to the owners. Why VIVOTEK? The state of Michigan has placed stringed demands on-camera coverage and recording quality for this industry, so a camera system is essential for the licensing of this business. Challenges in the project were related to distances within the building, coverage in unique spaces, and varying climates and light exposure within indoor grow rooms. Existo chose VIVOTEK and a total of 70 of its indoor and outdoor security solutions, network video recorders (NVR), and video management software (VMS) to monitor the cannabis cultivation facility. CC9381-HV Panoramic network camera In the grow room, which includes a long hallway with tight spaces and climate concerns, 7 VIVOTEK 180-degree panoramic network cameras, the CC9381-HV were installed to combat high contrast lighting environments and armed with WDR Pro function to ensure 24/7 surveillance coverage. SD9364-EHL Speed dome camera For exterior corners, 4 VIVOTEK SD9364-EHL speed dome cameras were utilized. The camera is adopted VIVOTEK's Smart IR II technology which is specifically designed to provide a superb low light image in the most challenging situations. FE9181-H Fisheye and FD9380-H Fixed dome cameras Due to its high-quality imagery at a cost-effective perspective, 14 FE9181-H fisheye cameras and 40 FD9380-H cameras were installed throughout the rest of the indoor and outdoor facility. ND9541 NVR and apps VIVOCloud and iViewer app provide users with an open, flexible, and intelligent NVR for video surveillance applications The facility is also utilizing VIVOTEK’s 16-CH ND9541 Linux-based embedded standalone NVR to set up and manage advanced IP surveillance systems with ease. It also supports remote and mobile access, via VIVOCloud and iViewer app, for both iOS and Android handheld devices, providing users with an open, flexible, and intelligent NVR for seamless use in small to medium-sized video surveillance applications. Marijuana Regulatory Agency (MRA) acclamation In the end, the outcome not only met but surpassed all expectations and goals. The system was complimented as the highest quality in terms of coverage and camera quality by the Marijuana Regulatory Agency (MRA) enforcement agent during the state licensing walkthrough. Surpass expectations “The flexibility we gain from the quality and variety that VIVOTEK offers pays off tenfold in our business because there is no standard building design for cannabis businesses,” said Chris Hernandez, Existo director of operations. “Unique buildings with unique layouts but with highly standardized expectations put forward by state licensing expectations can be a stumbling block for many cannabis businesses. Our ability to utilize VIVOTEK’s solutions allows us to create systems that exceed state expectations while still being used to achieve safety goals set internally by our customers.”
Security and surveillance systems have become a vital component of a casino management system enabling gaming club operators to monitor and manage security threats in real time. Apart from the original purpose of security measures, it helps raising concerns over card counting, advantage playing, and various other suspicious or prohibited activities. However, a typical casino atmosphere often involves great complexity in its environmental lighting, leading to high noise level in captured video images. Challenges: Inadequate lighting in casino making it difficult for cameras to distinguish colors and movement, resulting in blurry images. Lack of advanced video analytic functions in traditional surveillance systems presents difficulties to an effective monitoring process, with high labor cost needed for scanning live views and recorded footages manually. Access control system Different casino areas require different solutions to fulfill its demand. At gaming tables, it’s critical to capture the subtle movements of each players and dealers. Cameras with higher FPS, 3D DNR and super low lux image sensor gives a neater and brighter image under dim lighting, while 2-way audio provides additional audio information. Casino operations involve a multitude of monetary transactions in critical areas including cages, vaults and offices where cash, chips, and other valuables are circulated. An access control system integrated with facial recognition functions helps operators in strengthening the security level. Exceptional customer experience is the key to good customer loyalty. Facial recognition system Video analytics allows operators to filter videos recording smartly with object attributes With ANPR (Automated Number Plate Recognition) and facial recognition embedded into the management system of carparks and VIP lounges, customer entry and exit can be streamlined minimal interruptions. A modern video surveillance system complemented by top notch IP cameras can improve and simplify the entire operation. Modern video management software possesses features that are not offered by traditional systems. Video analytics such as human object detection allows operators to filter videos recording smartly with object attributes, e.g. colors of customer clothes. The architecture of modern video management provides scalability to accommodate the growing amount of video sources during business expansion. Standardized protocol offers higher interoperability in terms of 3rd party system integration with access control or alarm system. Cameras for centralized management Thanks to the internet, control center is now able to receive and group videos from dispersed cameras for a centralized management. The operators could access to the live views of different casino affiliates and receive real-time notification on cellphone devices when specific events are in action.


Products


Round table discussion
Artificial intelligence is more than just the latest buzzword in the security marketplace. In some cases, smarter computer technologies like AI and machine learning (ML) are helping to transform how security operates. AI is also expanding the industry’s use cases, sometimes even beyond the historic province of the security realm. It turns out that AI is also a timely tool in the middle of a global pandemic. We asked this week’s Expert Panel Roundtable: How is artificial intelligence (AI) changing the security market?
Facial recognition is the latest technology to be targeted because of concerns about privacy. If such concerns cloud the public perception, they can be harmful to technology markets. Whether the concerns are genuine or based on misinformation is often beside the point; the practical damage has already been done. But beyond market demand, what is the impact of privacy concerns on technology innovation? We asked this week’s Expert Panel Roundtable: Are privacy concerns stifling innovation in security and related markets?
A shift toward touchless devices during the coronavirus pandemic has been a boon to the biometrics sector. Another factor in the recent increase in use of biometrics is lower prices, which are a symptom of a maturing market and of new technology capabilities. Increasingly, integration of biometrics with access control and other security systems is expanding use cases and sales numbers. For additional insights, we asked this week’s Expert Panel Roundtable: What are the new trends and opportunities with biometrics (facial, fingerprint, iris and/or voice)?