High Performance Face Recognition

A new face recognition server software using deep learning technology will be released this year. This high-precision face recognition software can identify faces that are difficult to recognise with conventional technologies, including faces at an angle of up to 45 degrees to the left or right or 30 degrees up or down, and those partially hidden by sunglasses.

In April 2017, the technology, developed by Panasonic, achieved the highest level of face recognition performance in the world in a comparison test of the NIST (US National Institute of Standards and Technology), one of the most authoritative institutes in the world.

The Face Recognition Server Software WV-ASF950 and the Face Registration Expansion Kit WV-ASFE951W will be launched in July outside Japan and in August 2018 in Japan.

The new software features the “IA (Intelligent Auto) mode” that automatically adjusts settings for the camera to shoot optimal images best suited for face recognition. When it is used with Panasonic’s i-PRO EXTREME series network cameras only the “Best Shots” will be sent to the server for face recognition.

The combination of Panasonic core devices and the face recognition software maximizes the performance of the software’s core engine to achieve high-precision recognition, according to the company’s announcement on its website.

It is planned to add a function to recognise partially covered faces with a surgical mask, which is difficult with conventional systems, by the end of this year.

Using this software with cameras equipped with the IA function enables image analysis to be performed on the camera instead of the server to send only the best images to the server.

This will result in reducing server and network loads, which leads to overall system cost reductions. In the case of 10 or more network cameras are connected to the system, the costs can be reduced by about 40 to 50% compared to conventional systems that do not use the Best Shot function.

I-HLS

You Might Also Read:

Police Wearing Face Recognition Glasses:

Google's New AI System Unscrambles Pixelated Faces:

Facial Recognition Technologies:

 

« Cyber Attack On German Government
Preventing The Next Active Shooter Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DCL Search & Select

DCL Search & Select

DCL Search & Selection connect candidates to the best companies in the IT Security, Telco, UC, Outsourcing, ERP, Audit & Control markets.

TitanFile

TitanFile

TitanFile is an award-winning, easy and secure way for professionals to communicate without having to worry about security and privacy.

Deductive Labs

Deductive Labs

Deductive Labs consulting services help customers with their technology, security and automation challenges.

Cybellum

Cybellum

Cybellum brings the entire product security workflow into one dedicated platform, allowing device manufacturers to keep the connected products they build cyber-secure and cyber-compliant.

e2e-assure

e2e-assure

e2e Protective Monitoring and Security Operations Centre (SOC) Service is a complete cyber defence service to protect your critical assets from cyber attacks and GDPR breaches.

Neowave

Neowave

Neowave designs, manufactures and markets strong authentication solutions based on smart card components and digital certificates.

AKATI Sekurity

AKATI Sekurity

AKATI Sekurity is a security-focused consulting firm providing services specializing in Information Security and Information Forensics.

Assystem

Assystem

Assystem delivers a comprehensive security approach for the industrial and service sectors that integrates physical security systems, industrial cyber-security, functional safety and dependability.

Syskode Technologies

Syskode Technologies

Sykode Technologies is a next-generation global technology company offering an integrated portfolio of advisory services, products and solutions in areas including AI, IoT and Cyber Security.

Hubraum

Hubraum

Hubraum is Deutsche Telekom’s tech incubator, helping startups to create new business opportunities in areas including data analytics, AI, robot process automation and cyber security.

Cloudsine

Cloudsine

Cloudsine (formerly Banff Cyber Technologies) is a cloud technology company specializing in cloud adoption, security and innovation.

KDM Analytics

KDM Analytics

KDM Analytics software products automate the NIST risk management framework (RMF) assessment for operational technology (OT) systems.

Nucleus Security

Nucleus Security

Nucleus is a leading Vulnerability Management platform for Large Enterprises, MSPs/MSSPs, and Application Security Teams that want more from their vulnerability management tools.

Stanley Reid & Company (SRC)

Stanley Reid & Company (SRC)

Stanley Reid & Co is an Executive and Technical Search Firm serving the commercial market and the US Intelligence & Defense community. Our areas of expertise include Cybersecurity.

Aite-Novarica Group

Aite-Novarica Group

Aite-Novarica's Cybersecurity practice provides ongoing research and advisory services to chief information security officers focused on protecting their companies’ assets.

Cybertech Nepal

Cybertech Nepal

Cybertech Nepal is committed to provide high-quality cyber security solutions, including server assessment and hardening, forensics and malware analysis, end-point threat analysis, and VAPT.