Suspect Monitoring & Surveillance Technology

Monitoring and analysing suspicious behavior has become a pressing need for law enforcement teams. A new development offers a “remote gaze detection technology” that enables real-time detection of the direction an individual is looking, even when using existing cameras from remote locations.

Conventional technologies estimate an individual’s line-of-sight using specialised devices equipped with infrared lights and advanced cameras that detect light as it is reflected from an individual’s eye.

This new development uses face feature point detection technology, the core of NEC Corporation’s face recognition technology, to accurately identify characteristics in and around the eye, such as the pupil and the corners of the eye, from images taken with common cameras, including web, surveillance, tablet and smartphone cameras, without the need for specialised equipment.

These images and technology enable highly accurate detection of an individual’s line-of-sight, with a measurement error of less than 5 degrees from the left, right, top and bottom.

The technology was presented by NEC as part of its portfolio of artificial intelligence (AI) technologies, NEC the WISE.

According to the company’s statement on its website, this remote gaze detection technology’s advanced response to low resolution images and changes in brightness enable it to detect an individual’s line-of-sight, even when they are separated from the camera by 10 meters, making it well suited for automatically detecting products that draw the attention of shoppers at retail stores.

Furthermore, the high-speed computations of its “feature value extraction technology” enable it to simultaneously detect the line-of-sight of multiple individuals, without compromising the accuracy of its results.  

As a result, even when multiple persons appear in a camera, it is possible to simultaneously detect the line-of-sight of each individual.  “Based on this technology, NEC can evaluate the line-of-sight of pedestrians and help to optimise the placement of important announcements on public streets,” said Akio Yamada, general manager, Data Science Research Laboratories, NEC Corporation.

“Moreover, the technology can contribute to the safety and security of our communities by helping to monitor the behavior of suspicious individuals. This is in addition its business potential, where the technology can help retailers learn more about which products are attracting the most attention from visiting customers.”

I-HLS

Anti-Surveillance Clothing Thwarts Facial Recognition:

« Blockchain’s Brilliant Approach To Cybersecurity
Hologram Technology Is Finding Military Users »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Alert Logic

Alert Logic

Alert Logic delivers unrivaled security for any environment, delivering industry-leading managed detection and response (MDR) and web application firewall (WAF) solutions.

Saviynt

Saviynt

Saviynt is a leading provider of Cloud Security and Identity Governance solutions.

MBL Technologies

MBL Technologies

MBL Technologies specializes in information assurance, enterprise security, privacy, and program/project management.

Proteus

Proteus

Proteus is an Information Security consulting firm specialized in Risk Analysis and Executive Control.

Coalition

Coalition

Coalition combines comprehensive insurance and proprietary security tools to help businesses manage and mitigate cyber risk.

Specops Software

Specops Software

Specops Software is a leading password management and authentication solution vendor.

Base Cyber Security

Base Cyber Security

Base Cyber Security is an information and cyber security talent service provider and career specialist.

Option3

Option3

Option3 (formerly Option3Ventures - O3V) primarily seek control investments in the growing cybersecurity mid-market, seeking to build champions with the scale to bring cutting-edge products to market.

Censys

Censys

Our customers rely on Censys data to get the global visibility they need of their attack surfaces in order to proactively prevent nation-state attacks and emerging threats.

WebOrion

WebOrion

WebOrion is an All-in-One Web Security & Performance Suite. Fortify, accelerate and monitor your website today.

ramsac

ramsac

ramsac provide secure, resilient IT management, cybersecurity, 24 hour support and IT strategy to businesses in London and the South East.

Ciphertex Data Security

Ciphertex Data Security

Ciphertex is a leading data security company that specializes in portable data encryption and privacy protection storage systems.

Aravo Solutions

Aravo Solutions

Your Extended Enterprise is full of hidden risks – Aravo makes them visible, measurable, and manageable.

Sev1Tech

Sev1Tech

Sev1Tech is a leading provider of IT modernization, cloud, cybersecurity, engineering, fielding, training, and program support services.

Cybercentry

Cybercentry

Cybercentry is a specialist information security, data protection and cyber security consultancy.

Novem CS

Novem CS

Novem CS are bespoke cyber security specialists providing a highly effective and specialised approach to solving your cyber security challenges.