Face recognition completes the bayonet security monitoring system

SaveSavedRemoved 0
Deal Score0
Deal Score0

[ad_1]

At present, important checkpoints such as airports, customs, ports, border defenses, etc., because of the country’s constant emphasis on security, surveillance has become more and more popular in the promotion and application, but most of them are still at the stage of traditional monitoring, and it is difficult to meet the requirements of the checkpoints. The actual need for security. Due to the lack of intelligent analysis of the video, it is generally still in a passive state where it can only be “supervised” but not “controlled”. Most of them only have the function of collecting evidence after the fact, and cannot play a preventive or early warning function for suspicious and abnormal behaviors that occur. . The use of face recognition technology can solve this problem and enable the bayonet security system to give full play to its monitoring capabilities.

Face recognition completes the bayonet security monitoring system

1. Current status of bayonet security

The international anti-terrorism situation continues to be severe, and society’s demand for security has become even stronger. Airports, customs, border defenses, etc., have always been areas where emergencies frequently occur due to their wide regional distribution and large flow of people.

However, the current security systems for various bayonet ports are still in the traditional monitoring stage, and it is difficult to meet the actual requirements for security. Due to the lack of intelligent analysis of the video, it is generally still in a passive state where it can only be “supervised” but not “controlled”. Most of them only have the function of collecting evidence after the fact, and cannot play a preventive or early warning function for suspicious and abnormal behaviors that occur. . Face recognition is adopted to actively extract and record the faces that appear in surveillance videos in real time, to achieve the purpose of promptly alarming and using stored information to effectively retrieve video data, which can effectively assist security personnel in dealing with crises and minimize The phenomenon of false positives and under-reports can effectively help the bayonet respond to attacks and deal with emergencies.

The emergence and maturity of face recognition technology provides a good technical means to solve this problem. But how to develop applications that meet the needs according to the actual situation, realize the linkage of monitoring and alarming and control equipment is our main task.

2. Introduction to Face Recognition Technology

Face recognition is a kind of biometric identification technology based on the facial feature information of people. Use a camera or camera to collect images or video streams containing human faces, and automatically detect and track human faces in the images, and then perform a series of face related technologies on the detected faces. The process is mainly facial image acquisition and detection, Face image preprocessing, face image feature extraction, matching and recognition.

For the collection and monitoring of facial images, in the dynamic monitoring environment of the airport, the facial recognition technology must be able to meet the dynamic recognition, because in the real environment, except for the mandatory stay at the security check, people basically It is fluid, so in order not to miss the capture of the face, the algorithm requirements for face recognition are correspondingly high to ensure the operating speed and detection and capture speed of the face recognition system. Therefore, for many manufacturers currently providing face recognition technology, whether they have advanced algorithms and their own intellectual property rights is an important criterion for distinguishing the company’s technical strength. Currently, manufacturers with independent intellectual property rights mainly have Ruiwei technology. , Yinchen Technology, Chongqing Green Intelligence Research Institute of Chinese Academy of Sciences, etc.

In addition to snapshots, the background needs to be combined with the face comparison server for face comparison. For example, during customs clearance, the system will quickly compare the captured faces with the backend server to determine that the person who clears the customs is a blacklisted person. (Including terrorists, criminals, suspects) or whitelisted people, if they are whitelisted people, they will be allowed to pass the customs, if they are blacklisted people, the system will immediately issue a warning to deny the other party entry and exit. In order to ensure the efficiency of customs clearance, the speed and accuracy of comparison are very high. For example, the comparison speed provided by Ruiwei technology is that a single face matching server can complete 20 million real-time comparisons per second. It takes less than 0.2 seconds to detect the face recognition, which ensures the efficiency of customs clearance.

The system operation flow chart is shown in the figure below:

Face recognition completes the bayonet security monitoring system

1

[ad_2]

We will be happy to hear your thoughts

Leave a reply

RFID made in China
Logo
Enable registration in settings - general
Compare items
  • Cameras (0)
  • Phones (0)
Compare