SourceSecurity.com US Edition
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs    Join SourceSecurity.com on LinkedIn
REGISTERTerms
Bringing the security industry into focus

Face Recognition from iOmniscient overtakes counting to become the most requested application

Published on 23 Apr, 2012

iOmniscient’s Face Recognition helps organisations to detect terrorists and criminals and imprve customer service
Face Recognition application is ideal for use in retail malls, airports and railways

For several years counting, especially in complex and crowded scenes was one of the most popular applications in available from iOmniscient’s extensive portfolio. The high verifiable accuracy and the sophisticated and comprehensive reporting made it very popular not just for retail malls but also for airports and railways keen on understanding traffic flows for both safety and marketing purposes.

This year, the new Face Recognition in a Crowd capability has now become the most requested application. Useful in surveillance environments where the traditional access control type systems do not work effectively, this “many-to-many” Face Recognition system can help organisations not just in detecting terrorists and criminals but also for improving customer service. Recognising its most loyal customers unintrusively as they enter the reception area and being able to greet them by name has enabled one hotel group to position itself as providing much better service than its competitors.

Another organization has used the Face Recognition system to authenticate whether a person taking key material out of inventory in a warehouse was authorized to do so.  The applications have multiplied based on the imagination of our users and we thank them for their innovativeness.

iOmniscient is the only video analytics supplier in the world that provides a “many-to-many” Face recognition that can cope with crowded scenes. This is due to its high intelligence and international patents. It is also able to perform under low resolution and at variable face angles.

Download PDF Version

Follow us for latest editorial and commercial opportunities


Please rate this article


Related videos
Featured White Paper

What Do I Need to Know to Successfully Deploy Mobile Access?

This white paper discusses what you need to know in preparation to deploy a mobile access solution. Using a mobile device to gain access to buildings is not only about solving a particular problem; it's also about doing things better.

Confidence and education in the use of contactless applications and technologies, such as Near Field Communications (NFC) and Bluetooth, are continuously growing. In the era of mobility and cloud computing, companies are increasingly concerned about the security and protection of their physical environment. Correctly implemented, mobile access has the potential to revolutionise the way we open doors.

HID have produced this guide to mobile access configuration to explore the underlying technologies which enable mobile access and discuss what you need to know to implement mobile access control.


See privacy and cookie policy
SourceSecurity.com
Browsing from the Americas? Looking for SourceSecurity.com US Edition?
View this content on SourceSecurity.com US Edition, our dedicated portal for our Americas audience.
Do not show me this again
International EditionUS Edition