The Way You Walk Will Reveal Your Identity To Surveillance Technology

China’s surveillance efforts have hit a new level with a technology that can apparently identify individuals based on their body shape and the way they walk. 

The “gait recognition” technology is already being used by police in Beijing and Shanghai where it can identify individuals even when their face is obscured or their back is turned.

The technology was developed by Chinese AI startup Watrix. The company claims that it can identify individuals at up to 50 meters (165 feet) which, in conjunction with existing facial recognition technology, can help police and surveillance systems operate more efficiently in busy areas.

Compared with other biometrics such as face, iris, palm print and finger print, gait features are still obtainable and recognisable at a distance with a low-resolution video. Therefore, with characteristics of non-contact, long distance (50 meters), cross-view (360°) recognition range and hard to disguise, gait recognition enables long-distance identification, using an ordinary 2K camera, according to Watrix website.

The average recognition rate can reach 94.1%, much better than the previous best result (less than 65%). The company also built the world’s largest gait database, whose capacity is dozens of times larger than the second. 

While the technology could help law enforcement find criminals, media reports have shown that China has deployed surveillance technology for more sinister purposes that include controlling its people, especially ethnic minorities.

China is already home to the world’s largest network of CCTV cameras, more than 170 million, and its police have adopted Google Glass-like “smart specs” to seek out suspects in crowds, as techcrunch.com 

iHLS:

You Might Also Read:

Surveillance Cameras That Spot Your Personality Type

« GRU: Spies Without Borders
UK Fails To Act Against Cyber Threats »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Infosecurity Europe

Infosecurity Europe

Infosecurity Europe is Europe’s number one information security conference and exhibition.

Markel International

Markel International

Markel International is an international insurance company which looks after the commercial insurance needs of businesses. Specialist services include Cyber Risk insurance.

Norton Rose Fulbright

Norton Rose Fulbright

Norton Rose Fulbright is a global business law firm. Practice areas include Data protection, Privacy and Cybersecurity.

IT Association of Slovakia (ITAS)

IT Association of Slovakia (ITAS)

ITAS is a professional association of domestic and foreign companies operating in the field of information and communication technologies

FixMeStick

FixMeStick

FixMeStick is a virus removal device, a USB key that removes malware conventional antivirus software often can’t detect.

Picus Security

Picus Security

Huge gaps often exists between the "perceived"​ and "actual"​ IT security level of an organization. Picus Security continuously assesses security controls and reveals deficient ones before hackers do.

Physec

Physec

Physec offers innovative security products and solutions for the Internet of Things ecosystem.

Information System Security Directorate (ISSD) - Afghanistan

Information System Security Directorate (ISSD) - Afghanistan

Information System Security Directorate (ISSD) is the Directorate of MCIT responsible for the security of critical information infrastructures in Afghanistan.

Johnson Controls International

Johnson Controls International

Johnson Controls is a global diversified technology company with a focus on smart cities, energy, infrastructure and transportation including the security of automation and control systems.

Griffiss Institute (GI)

Griffiss Institute (GI)

GI's primary role is to advocate and facilitate the co-operation of private industry, academia, and the Air Force Research Laboratory in developing solutions to critical cyber security problems.

Envieta

Envieta

Envieta is a leader in cryptographic solutions. From server to sensor, we design and implement powerful security into new or existing infrastructure.

LeadingIT

LeadingIT

Leading IT provides IT support, cloud computing, email support, cybersecurity, networking and firewall services to Chicagoland businesses.

ShardSecure

ShardSecure

ShardSecure Microshard technology eliminates data sensitivity, providing security, privacy and compliance beyond encryption.

FoxTech

FoxTech

FoxTech is an independent, friendly and deeply specialised cyber security company in the UK, with expertise spanning decades of Public Sector and Government services.

Cyber Chasse

Cyber Chasse

Cyber Chasse is an IT consulting and staffing company offering a full range of cybersecurity solutions, contract staffing services and online training courses.

Zilla Security

Zilla Security

Zilla combines identity governance with cloud security to deliver comprehensive access visibility, reviews, lifecycle management, and policy-based security remediation.