High Performance Face Recognition

A new face recognition server software using deep learning technology will be released this year. This high-precision face recognition software can identify faces that are difficult to recognise with conventional technologies, including faces at an angle of up to 45 degrees to the left or right or 30 degrees up or down, and those partially hidden by sunglasses.

In April 2017, the technology, developed by Panasonic, achieved the highest level of face recognition performance in the world in a comparison test of the NIST (US National Institute of Standards and Technology), one of the most authoritative institutes in the world.

The Face Recognition Server Software WV-ASF950 and the Face Registration Expansion Kit WV-ASFE951W will be launched in July outside Japan and in August 2018 in Japan.

The new software features the “IA (Intelligent Auto) mode” that automatically adjusts settings for the camera to shoot optimal images best suited for face recognition. When it is used with Panasonic’s i-PRO EXTREME series network cameras only the “Best Shots” will be sent to the server for face recognition.

The combination of Panasonic core devices and the face recognition software maximizes the performance of the software’s core engine to achieve high-precision recognition, according to the company’s announcement on its website.

It is planned to add a function to recognise partially covered faces with a surgical mask, which is difficult with conventional systems, by the end of this year.

Using this software with cameras equipped with the IA function enables image analysis to be performed on the camera instead of the server to send only the best images to the server.

This will result in reducing server and network loads, which leads to overall system cost reductions. In the case of 10 or more network cameras are connected to the system, the costs can be reduced by about 40 to 50% compared to conventional systems that do not use the Best Shot function.

I-HLS

You Might Also Read:

Police Wearing Face Recognition Glasses:

Google's New AI System Unscrambles Pixelated Faces:

Facial Recognition Technologies:

 

« Cyber Attack On German Government
Preventing The Next Active Shooter Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Brookings Institution

Brookings Institution

The Brookings Institution is a nonprofit public policy organization. Cyber security is covered within the various study areas.

360Logica

360Logica

360Logica is a software testing company offering numerous kinds of testing services to improve the quality and performance of your software and IT systems.

CamCERT

CamCERT

CamCERT is the national Computer Emergency Response Team for Cambodia.

Thomas Miller Specialty

Thomas Miller Specialty

Thomas Miller Specialty is a commercial Managing General Agency providing specialty risks insurance including Cyber & e-crime insurance.

CyberOne

CyberOne

CyberOne (formerly Comtact) offer a full stack cybersecurity service to ensure our customers understand the cyber maturity of their organisation.

Vaulto Technologies

Vaulto Technologies

Vaulto protects critical business processes that are conducted via the cellular network.

Cognni

Cognni

Cognni (formerly Shieldox) will make your InfoSec think like a human, right out of the box, so you can focus on the bigger picture, keeping the information flow safe.

Defence Intelligence

Defence Intelligence

Defence Intelligence is an information security firm specializing in advanced malware protection.

Harel Mallac Technologies

Harel Mallac Technologies

Harel Mallac Technologies is a Mauritian organisation that has developed a strong network of ICT specialists with nodes across the African continent.

CSIRT Italia

CSIRT Italia

CSIRT Italia is the national Computer Security Incident Response Team for Italy.

Diaplous Group

Diaplous Group

Diaplous Group is a leading Maritime Risk Management (MRM) provider, delivering specialized services to an ever-broadening portfolio of shipping, oil & gas, energy and construction industries.

FastNetMon

FastNetMon

FastNetMon is a very high performance DDoS detection and mitigation tool which could detect malicious traffic in your network and immediately block it.

International Cyber Threat Task Force (ICTTF)

International Cyber Threat Task Force (ICTTF)

The International Cyber Threat Task Force is a not-for-profit initiative promoting the ecosystem of an International independent non-partisan cyber security community.

SGTech

SGTech

SGTech is the leading trade association for Singapore's tech industry, offering focused support and development to both strategic and emerging sectors in the industry.

SpectrumWise

SpectrumWise

SpectrumWise is a business technology specialist that provides Managed Services and Managed Security for small and medium IT Networks.

National Cybersecurity Competence Center (NC3) - Luxembourg

National Cybersecurity Competence Center (NC3) - Luxembourg

The purpose of the is to strengthen the Country's ecosystem facing cyber Luxembourg National Cybersecurity Competence Centerthreats and risks.