Suspect Monitoring & Surveillance Technology

Monitoring and analysing suspicious behavior has become a pressing need for law enforcement teams. A new development offers a “remote gaze detection technology” that enables real-time detection of the direction an individual is looking, even when using existing cameras from remote locations.

Conventional technologies estimate an individual’s line-of-sight using specialised devices equipped with infrared lights and advanced cameras that detect light as it is reflected from an individual’s eye.

This new development uses face feature point detection technology, the core of NEC Corporation’s face recognition technology, to accurately identify characteristics in and around the eye, such as the pupil and the corners of the eye, from images taken with common cameras, including web, surveillance, tablet and smartphone cameras, without the need for specialised equipment.

These images and technology enable highly accurate detection of an individual’s line-of-sight, with a measurement error of less than 5 degrees from the left, right, top and bottom.

The technology was presented by NEC as part of its portfolio of artificial intelligence (AI) technologies, NEC the WISE.

According to the company’s statement on its website, this remote gaze detection technology’s advanced response to low resolution images and changes in brightness enable it to detect an individual’s line-of-sight, even when they are separated from the camera by 10 meters, making it well suited for automatically detecting products that draw the attention of shoppers at retail stores.

Furthermore, the high-speed computations of its “feature value extraction technology” enable it to simultaneously detect the line-of-sight of multiple individuals, without compromising the accuracy of its results.  

As a result, even when multiple persons appear in a camera, it is possible to simultaneously detect the line-of-sight of each individual.  “Based on this technology, NEC can evaluate the line-of-sight of pedestrians and help to optimise the placement of important announcements on public streets,” said Akio Yamada, general manager, Data Science Research Laboratories, NEC Corporation.

“Moreover, the technology can contribute to the safety and security of our communities by helping to monitor the behavior of suspicious individuals. This is in addition its business potential, where the technology can help retailers learn more about which products are attracting the most attention from visiting customers.”

I-HLS

Anti-Surveillance Clothing Thwarts Facial Recognition:

« Blockchain’s Brilliant Approach To Cybersecurity
Hologram Technology Is Finding Military Users »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IPCopper

IPCopper

IPCopper specializes in network packet capture appliances for cybersecurity, cybersurveillance and network monitoring, and encrypted data storage.

SERMA Safety & Security (S3)

SERMA Safety & Security (S3)

SERMA Safety & Security provides a comprehensive cybersecurity offering incorporating Expertise, Evaluation, Consultancy and Training, covering hardware, software and information systems.

World Wide Technology (WWT)

World Wide Technology (WWT)

WWT is a technology solution provider in the areas of big data, collaboration, computing and cloud, mobility, networking, security and storage.

CompliancePoint

CompliancePoint

We design and implement strategies, processes & procedures to mitigate risk, reach compliance goals, protect data assets, and meet industry standards.

The Data Privacy Group

The Data Privacy Group

The Data Privacy Group provide expert professional services underpinned by world leading automation tools and a consulting team specialized in privacy and data protection.

Total Defense

Total Defense

Total Defense solutions include anti-malware, anti-virus, intrusion prevention & mobile security.

ExpressVPN

ExpressVPN

ExpressVPN is a Virtual Private Network services provider offering secure encrypted access to the internet.

Blackpoint Cyber

Blackpoint Cyber

Blackpoint’s mission is to provide effective, affordable real-time threat detection and response to organizations of all sizes around the world.

Snowflake

Snowflake

Empower your cybersecurity and compliance teams with Snowflake. Gain full visibility into security logs, at massive scale, while reducing costs of Security Information and Event Management systems.

LogicalTrust

LogicalTrust

LogicalTrust security testing specialists find the weakest points in your company and show you how to fix them step-by-step, as well as how to improve your security.

Tego Cyber

Tego Cyber

Tego Cyber delivers a state-of-the-art threat intelligence platform that helps enterprises deploy the proper resolution to an identified threat before the enterprise is compromised.

MTI

MTI

MTI is a solutions and service provider, specialising in data & cyber security, datacentre modernisation, modern workplace, IT managed services and IT transformation services.

BrainStorm

BrainStorm

BrainStorm Threat Defense takes a new human-focused approach to security awareness that traditional training lacks. It’s a cutting-edge platform to make your users more security savvy.

Theos Cyber Solutions

Theos Cyber Solutions

Theos Cyber provides service-first cybersecurity solutions to digital businesses in Asia.

Keystrike

Keystrike

Keystrike secures remote connections. Our technology ensures that commands made by an employee were physically made on their computer, rather than by a remote attacker.

DefensX

DefensX

DefensX turns your go-to browser into a secure digital workspace paired with robust Web Data Loss Protection and AI Data Protection.