Suspect Monitoring & Surveillance Technology

Monitoring and analysing suspicious behavior has become a pressing need for law enforcement teams. A new development offers a “remote gaze detection technology” that enables real-time detection of the direction an individual is looking, even when using existing cameras from remote locations.

Conventional technologies estimate an individual’s line-of-sight using specialised devices equipped with infrared lights and advanced cameras that detect light as it is reflected from an individual’s eye.

This new development uses face feature point detection technology, the core of NEC Corporation’s face recognition technology, to accurately identify characteristics in and around the eye, such as the pupil and the corners of the eye, from images taken with common cameras, including web, surveillance, tablet and smartphone cameras, without the need for specialised equipment.

These images and technology enable highly accurate detection of an individual’s line-of-sight, with a measurement error of less than 5 degrees from the left, right, top and bottom.

The technology was presented by NEC as part of its portfolio of artificial intelligence (AI) technologies, NEC the WISE.

According to the company’s statement on its website, this remote gaze detection technology’s advanced response to low resolution images and changes in brightness enable it to detect an individual’s line-of-sight, even when they are separated from the camera by 10 meters, making it well suited for automatically detecting products that draw the attention of shoppers at retail stores.

Furthermore, the high-speed computations of its “feature value extraction technology” enable it to simultaneously detect the line-of-sight of multiple individuals, without compromising the accuracy of its results.  

As a result, even when multiple persons appear in a camera, it is possible to simultaneously detect the line-of-sight of each individual.  “Based on this technology, NEC can evaluate the line-of-sight of pedestrians and help to optimise the placement of important announcements on public streets,” said Akio Yamada, general manager, Data Science Research Laboratories, NEC Corporation.

“Moreover, the technology can contribute to the safety and security of our communities by helping to monitor the behavior of suspicious individuals. This is in addition its business potential, where the technology can help retailers learn more about which products are attracting the most attention from visiting customers.”

I-HLS

Anti-Surveillance Clothing Thwarts Facial Recognition:

« Blockchain’s Brilliant Approach To Cybersecurity
Hologram Technology Is Finding Military Users »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

iTrinegy

iTrinegy

iTrinegy is a world leader in Application Risk Management offering solutions to mitigate all networked application deployment risks

MarQuest

MarQuest

MarQuest provides services and systems to enhance network reliability and security.

Xcitium

Xcitium

Xcitium (formerly Comodo) is and industry leading provider of state-of-the-art endpoint protection solutions. Our Zero threat platform isolates and removes all ransomware & malware infectictions.

CyberWarrior

CyberWarrior

CyberWarrior deliver training and consulting for some of the world’s top brands and also partner with national systems integrators to augment their teams with our expertise.

Metrarc

Metrarc

Metrarc has developed a ground-breaking technology called ICMetrics™ for deriving secure encryption keys from the properties of digital systems without the need to store any of the encryption keys.

R3

R3

R3 is an enterprise blockchain software firm working with a broad ecosystem of more than 300 participants across multiple industries to develop blockchain applications.

Dutch Innovation Park

Dutch Innovation Park

Dutch Innovation Park in Zoetermeer is a breeding ground for applied IT solutions in the field of cyber security, e-health, smart mobility and big data.

Crypsis

Crypsis

Crypsis was built based on a shared vision of creating a more secure digital world by providing the highest quality incident response, risk management, and digital forensic services.

Noventiq

Noventiq

Noventiq (the brandname of Softline Holding plc) is a leading global solutions and services provider in digital transformation and cybersecurity.

Liquid Intelligent Technologies

Liquid Intelligent Technologies

Liquid Intelligent Technologies is a leading communications solutions provider across Africa, providing reliable connectivity, hosting, co-location, and digital services including cyber security.

SynSaber

SynSaber

SynSaber is a data collection, detection, and visibility solution that forms the foundation of industrial cybersecurity.

Shorebreak Security

Shorebreak Security

Shorebreak Securioty specialize in conducting highly accurate, safe, and reliable Information Security tests to determine the risks posed to your business.

SolidRun

SolidRun

SolidRun is a leading provider of computing and network technology designed to streamline the deployment of edge computing infrastructure and support embedded and IoT markets.

Eurotech

Eurotech

Eurotech provides Edge Computers and IoT solutions. We help to connect your assets and make them smarter through secure and agnostic hardware and software technologies.

Prikus Tech

Prikus Tech

Prikus is a full-fledged Cyber Security Company helping organizations worldwide to manage cyber risks. We offer Risk & Compliance Services, Security Testing & Managed Security Services.

Ultima

Ultima

Ultima are on a mission to help businesses unlock their true potential by using the right IT to protect your company’s revenue and reputation – 24/7.