Suspect Monitoring & Surveillance Technology

Monitoring and analysing suspicious behavior has become a pressing need for law enforcement teams. A new development offers a “remote gaze detection technology” that enables real-time detection of the direction an individual is looking, even when using existing cameras from remote locations.

Conventional technologies estimate an individual’s line-of-sight using specialised devices equipped with infrared lights and advanced cameras that detect light as it is reflected from an individual’s eye.

This new development uses face feature point detection technology, the core of NEC Corporation’s face recognition technology, to accurately identify characteristics in and around the eye, such as the pupil and the corners of the eye, from images taken with common cameras, including web, surveillance, tablet and smartphone cameras, without the need for specialised equipment.

These images and technology enable highly accurate detection of an individual’s line-of-sight, with a measurement error of less than 5 degrees from the left, right, top and bottom.

The technology was presented by NEC as part of its portfolio of artificial intelligence (AI) technologies, NEC the WISE.

According to the company’s statement on its website, this remote gaze detection technology’s advanced response to low resolution images and changes in brightness enable it to detect an individual’s line-of-sight, even when they are separated from the camera by 10 meters, making it well suited for automatically detecting products that draw the attention of shoppers at retail stores.

Furthermore, the high-speed computations of its “feature value extraction technology” enable it to simultaneously detect the line-of-sight of multiple individuals, without compromising the accuracy of its results.  

As a result, even when multiple persons appear in a camera, it is possible to simultaneously detect the line-of-sight of each individual.  “Based on this technology, NEC can evaluate the line-of-sight of pedestrians and help to optimise the placement of important announcements on public streets,” said Akio Yamada, general manager, Data Science Research Laboratories, NEC Corporation.

“Moreover, the technology can contribute to the safety and security of our communities by helping to monitor the behavior of suspicious individuals. This is in addition its business potential, where the technology can help retailers learn more about which products are attracting the most attention from visiting customers.”

I-HLS

Anti-Surveillance Clothing Thwarts Facial Recognition:

« Blockchain’s Brilliant Approach To Cybersecurity
Hologram Technology Is Finding Military Users »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Get Cyber Safe

Get Cyber Safe

Get Cyber Safe is a national public awareness campaign created to educate Canadians about Internet security and the simple steps they can take to protect themselves online.

Cybertrust Japan

Cybertrust Japan

Cybertrust Japan provides a comprehensive security certification and digital authentication service, enabling customers to build and manage highly secure IT infrastructures.

Disklabs

Disklabs

Disklabs are industry leaders in data recovery, digital forensics and data erasure.

Sentropi

Sentropi

Sentropi is an online protection solution against charge backs, account takeovers, identity thefts and online scams.

Horangi

Horangi

Horangi provides security products and services that enable the rapid delivery of Incident Response and threat detection for our customers who lack the scale, expertise, or time to do it themselves.

AlAnsari Technical Solutions (ATS)

AlAnsari Technical Solutions (ATS)

ATS is a Kuwait based company specialised in delivering hardware/software, Virtualisation, IP Telephony / Unified Communication, Networking and professional IT services and solutions.

Fyde

Fyde

Fyde helps companies with an increasingly distributed workforce mitigate breach risk by enabling secure access to critical enterprise resources.

Salient Law

Salient Law

Salient Law is a virtual law firm that specialises in advising providers and users of technology on contracts involving technology.

R3I Ventures - House of DeepTech

R3I Ventures - House of DeepTech

The House of DeepTech is an incubator for deeptech entrepreneurs that are transforming global industries. Areas of interest include cybersecurity.

NorthRow

NorthRow

NorthRow provides digital transformation compliance solutions to help businesses manage regulatory and financial crime risks.

Akto

Akto

Akto, the plug & play API security platform. Discover your APIs, run tests and find business logic vulnerabilities at ludicrous speed.

Trustaira

Trustaira

Trustaira is the first deep tech solution and service company in Bangladesh.

Jera IT

Jera IT

Jera IT provide fully managed IT support, cybersecurity services, telecoms systems, and IT strategy consultancy to businesses based in Aberdeen and the surrounding area.

Secuvy

Secuvy

Secuvy leads in data security, privacy, compliance, and governance, offering a unified platform for proactive data discovery, management, protection, and enhanced data value.

Trickest

Trickest

Trickest enables Enterprises, MSSPs, and Ethical Hackers to build automated offensive security workflows from prototype to production.

DRT Cyber

DRT Cyber

DRT Cyber deploys technology solutions to support the functions of cybersecurity, privacy, and risk management.