Suspect Monitoring & Surveillance Technology

Monitoring and analysing suspicious behavior has become a pressing need for law enforcement teams. A new development offers a “remote gaze detection technology” that enables real-time detection of the direction an individual is looking, even when using existing cameras from remote locations.

Conventional technologies estimate an individual’s line-of-sight using specialised devices equipped with infrared lights and advanced cameras that detect light as it is reflected from an individual’s eye.

This new development uses face feature point detection technology, the core of NEC Corporation’s face recognition technology, to accurately identify characteristics in and around the eye, such as the pupil and the corners of the eye, from images taken with common cameras, including web, surveillance, tablet and smartphone cameras, without the need for specialised equipment.

These images and technology enable highly accurate detection of an individual’s line-of-sight, with a measurement error of less than 5 degrees from the left, right, top and bottom.

The technology was presented by NEC as part of its portfolio of artificial intelligence (AI) technologies, NEC the WISE.

According to the company’s statement on its website, this remote gaze detection technology’s advanced response to low resolution images and changes in brightness enable it to detect an individual’s line-of-sight, even when they are separated from the camera by 10 meters, making it well suited for automatically detecting products that draw the attention of shoppers at retail stores.

Furthermore, the high-speed computations of its “feature value extraction technology” enable it to simultaneously detect the line-of-sight of multiple individuals, without compromising the accuracy of its results.  

As a result, even when multiple persons appear in a camera, it is possible to simultaneously detect the line-of-sight of each individual.  “Based on this technology, NEC can evaluate the line-of-sight of pedestrians and help to optimise the placement of important announcements on public streets,” said Akio Yamada, general manager, Data Science Research Laboratories, NEC Corporation.

“Moreover, the technology can contribute to the safety and security of our communities by helping to monitor the behavior of suspicious individuals. This is in addition its business potential, where the technology can help retailers learn more about which products are attracting the most attention from visiting customers.”

I-HLS

Anti-Surveillance Clothing Thwarts Facial Recognition:

« Blockchain’s Brilliant Approach To Cybersecurity
Hologram Technology Is Finding Military Users »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Inspired eLearning

Inspired eLearning

Inspired eLearning deliver solutions that help clients nurture and enhance workforce skills, protect themselves against cyberattacks and regulatory violations.

Gradcracker

Gradcracker

Gradcracker is THE careers website for Science, Technology (including Cybersecurity), Engineering and Maths university students in the UK.

Renesas Electronics

Renesas Electronics

Renesas Electronics delivers trusted embedded design innovation with solutions that enable billions of connected, intelligent devices to enhance the way people work and live - securely and safely.

Sixgill

Sixgill

Sixgill, an IoT sensor platform company, builds the universal data service and smart process automation software allowing any organization to effectively govern its IoE assets.

ThreatSwitch

ThreatSwitch

ThreatSwitch a software platform for cleared federal contractors to get and stay compliant with NISPOM and Conforming Change 2.

Dynics

Dynics

The Dynics ICS-Defender is an Industrial Control System Security Appliance for OT or OT/IT convergent environments.

DataFleets

DataFleets

DataFleets is a privacy-preserving data engine that unifies distributed data for rapid access, agile analytics, and automated compliance.

Let's Encrypt

Let's Encrypt

Let’s Encrypt is a free, automated, and open digital certificate authority, run for the public’s benefit. It is a service provided by the Internet Security Research Group (ISRG).

UK Cyber Security Council (UKCSC)

UK Cyber Security Council (UKCSC)

The role of The UK Cyber Security Council is to champion the cybersecurity profession across the UK, provide representation for the industry, accelerate awareness and promote excellence.

Bytes Technology Group

Bytes Technology Group

Bytes is a leading provider of world-class IT solutions. Our growing portfolio of services includes cloud, security, licensing, SAM, storage, virtualisation and managed services.

StickmanCyber

StickmanCyber

At StickmanCyber we are on a mission to create a digital world that is safe for everyone - we are your trusted cybersecurity partner.

Devolutions

Devolutions

Devolutions make best-in-class Privileged Access Management, Password Management, and Remote Connection Management solutions available to ALL organizations — including SMBs.

KYND

KYND

KYND has created pioneering cyber risk technology that makes assessing, understanding, and managing business cyber risks easier and quicker than ever before.

EyBrids

EyBrids

As a forward-thinking cybersecurity consulting firm, we believe that robust security is the foundation for innovation and growth in today’s digital landscape.

Zynap

Zynap

Zynap is an Advanced AI-powered SaaS platform replicating cybercriminal tactics to predict, detect, and neutralize threats before they strike.

Leapfrog Services

Leapfrog Services

Leapfrog offers outsourced managed IT + cybersecurity services that are scalable, aligned, and fit easily into your business model.