High Performance Face Recognition

A new face recognition server software using deep learning technology will be released this year. This high-precision face recognition software can identify faces that are difficult to recognise with conventional technologies, including faces at an angle of up to 45 degrees to the left or right or 30 degrees up or down, and those partially hidden by sunglasses.

In April 2017, the technology, developed by Panasonic, achieved the highest level of face recognition performance in the world in a comparison test of the NIST (US National Institute of Standards and Technology), one of the most authoritative institutes in the world.

The Face Recognition Server Software WV-ASF950 and the Face Registration Expansion Kit WV-ASFE951W will be launched in July outside Japan and in August 2018 in Japan.

The new software features the “IA (Intelligent Auto) mode” that automatically adjusts settings for the camera to shoot optimal images best suited for face recognition. When it is used with Panasonic’s i-PRO EXTREME series network cameras only the “Best Shots” will be sent to the server for face recognition.

The combination of Panasonic core devices and the face recognition software maximizes the performance of the software’s core engine to achieve high-precision recognition, according to the company’s announcement on its website.

It is planned to add a function to recognise partially covered faces with a surgical mask, which is difficult with conventional systems, by the end of this year.

Using this software with cameras equipped with the IA function enables image analysis to be performed on the camera instead of the server to send only the best images to the server.

This will result in reducing server and network loads, which leads to overall system cost reductions. In the case of 10 or more network cameras are connected to the system, the costs can be reduced by about 40 to 50% compared to conventional systems that do not use the Best Shot function.

I-HLS

You Might Also Read:

Police Wearing Face Recognition Glasses:

Google's New AI System Unscrambles Pixelated Faces:

Facial Recognition Technologies:

 

« Cyber Attack On German Government
Preventing The Next Active Shooter Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

National Cyber Security Centre (NCSC) - Netherlands

National Cyber Security Centre (NCSC) - Netherlands

NCSC Netherlands coordinates enhancing the cyber resilience of the Netherlands in the digital domain.

AllClear ID

AllClear ID

AllClear ID provides products and services that help protect people and their personal information from threats related to identity theft.

ESTsoft

ESTsoft

ESTsoft Securedisk is an enterprise-wide file security solution that stores and manages all data in a central file server.

ISGroup (Information Security Group)

ISGroup (Information Security Group)

ISGroup services include network penetration testing, Web application penetration testing, ethical hacking, vulnerability assessments, code review and associated training.

Wind River

Wind River

Wind River delivers the technology and expertise that enables the deployment of safe, secure, and reliable intelligent connected systems.

Threat Intelligence

Threat Intelligence

Threat Intelligence is a specialist security company providing penetration testing, threat intelligence, incident response and training services.

TruNarrative

TruNarrative

TruNarrative provides a unified solution for Identity Verification, Fraud Detection, eKYC, Risk Assessment, AML Compliance and Account Monitoring.

CybeReady

CybeReady

CybeReady’s Autonomous Platform offers continuous adaptive training to all employees and guarantees significant reduction in organizational risk of phishing attacks.

Slovenska Akreditacija (SA)

Slovenska Akreditacija (SA)

Slovenska Akreditacija is the national accreditation body for Slovenia. The directory of members provides details of organisations offering certification services for ISO 27001.

ChainSecurity

ChainSecurity

ChainSecurity provides products and services for securing smart contracts and blockchain protocols and conducts R&D in the areas of security, program analysis, and machine learning.

US-Africa Cybersecurity Group (USAFCG)

US-Africa Cybersecurity Group (USAFCG)

USAFCG provides cybersecurity consulting services and delivers training programs for capacity building in Africa.

Rogers Cybersecure Catalyst

Rogers Cybersecure Catalyst

Rogers Cybersecure Catalyst helps Canadians and Canadian companies seize the opportunities and tackle the challenges of cybersecurity.

Noetic Cyber

Noetic Cyber

Noetic provides a proactive approach to cyber asset and controls management, empowering security teams to see, understand, and optimize their cybersecurity posture.

N2K Networks

N2K Networks

N2K Networks is the world’s first “news to knowledge” network. The news to knowledge network is how you stay at the cutting edge in a rapidly changing world.

ISSQUARED

ISSQUARED

ISSQUARED is a leading provider of Cyber Security, Cloud, Infrastructure, Consulting and Digital Transformation services.

BBS Technology

BBS Technology

BBS Technology is a company that develops and delivers next-generation cyber security technologies worldwide.