AI Will Find You In The Crowd

Some new deep learning techniques used on video footage of groups of animals might work for humans. Media and privacy advocates have devoted a lot of attention to facial recognition as a means to identify, and then surveil, specific individuals in public. But facial recognition works far better on mugshots than in crowded public spaces where lighting, camera angles, and obscuring objects can’t be controlled.

Yet the debate might soon be moot, thanks to Portuguese researchers who say artificial intelligence can detect and identify individuals without facial recognition. They know, because they tested it on zebrafish and flies.

Dubbed idtracker.ai, their approach uses a convolutional neural network, or CNN, a method of deep learning that mimics, somewhat, the way human and other mammal brains make sense of the world around them. 

The brain’s cortex divides the visual field the way a map is divided into grids. Cell groups in the cortex overlap in the portion of the visual field that they “see,” enabling the brain to track objects across the entire field, from one grid to the next. CNNs play a big role in many facial recognition programs, but there is less research applying the technique to video of moving objects.

Rather than apply the neural network to a face, dividing it up into regions, the researchers applied it to the collective behavior of groups of zebrafish and flies. 

They showed that the network could teach itself to recognise individuals by their movements. They were above 99 percent accuracy for both zebrafish and flies. Could you apply it to humans as easily? They describe the technique as “species agnostic,” so yes.

Defense One:

You Might Also Read: 

Trial Facial Recognition Technology In London:

 

 

« Singapore Upgrades Cybersecurity
Blockchain Applications For Identity Verification »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Research Institute in Science of Cyber Security (RISCS)

Research Institute in Science of Cyber Security (RISCS)

RISCS is focused on giving organisations more evidence, to allow them to make better decisions, aiding to the development of cybersecurity as a science.

MailGuard

MailGuard

MailGuard delivers a full suite of security solutions across email and web to protect your business before threats reach your environment.

Secret Double Octopus

Secret Double Octopus

Secret Double Octopus offers the world’s only keyless multi-shield authentication technology for users and things.

Securicon

Securicon

Securicon provides expert consulting for application, system and network security.

Nullcon

Nullcon

Nullcon provides an integrated platform for exchanging information on the latest attack vectors, zero-day vulnerabilities and unknown threats.

National Digital Exploitation Centre (NDEC) - United Kingdom

National Digital Exploitation Centre (NDEC) - United Kingdom

NDEC is a project to create a centre of cyber and digital development and education for the UK. It will offer training in digital practices, cyber security and research.

iProov

iProov

iProov delivers authentication and verification simply and securely, based on a genuine one-time biometric.

Axiomtek

Axiomtek

Axiomtek is a leading design and manufacturing company in the industrial computer and embedded field.

Anitian

Anitian

The Anitian Compliance Automation platform builds, configures, and monitors cloud environments to accelerate compliance for standards such as FedRAMP, PCI, ISO/GDPR and CJIS.

Astaara

Astaara

Astaara is an integrated insurance services and risk management advisory business incorporating cyber risk advisory, underwriting and analytics.

Lewis Brisbois

Lewis Brisbois

Lewis Brisbois offers legal practice in more than 40 specialties, and a multitude of sub-specialties including Data Privacy & Cybersecurity.

Neosecure

Neosecure

NeoSecure is a specialist Cybersecurity Solutions and Managed Services provider in Latin America.

Cyberagentur (Cyber Agency)

Cyberagentur (Cyber Agency)

Cyberagentur is the Federal Agency in Germany for innovation in cybersecurity. Our mission is to advance research and groundbreaking innovations in the field of cybersecurity and related technologies.

INT3L

INT3L

The INT3L group (formerly Defentek) is a provider of national security and intelligence solutions, systems and services.

SignPath

SignPath

SignPath provides leading-edge software and SaaS services that ensure code integrity from development to distribution.

EpicCyber

EpicCyber

Since 2011, Epic Cyber has pioneered the integration of enterprise cloud technology.