Cognitec has released the superior face recognition engine B9 and incorporated the algorithm in its market-leading face recognition product, FaceVACS-DBScan.

Research and development for the B9 algorithm focused on significant performance improvement for images with low resolution or taken in less controlled environments, often found in police databases. The matching accuracy also increased for images with non-frontal poses, with faces turned upward, downward or to the side.

FaceVACS-DBScan enables users to compare still images from various sources to those stored in multi-million image databases and instantly view match lists. The application has proven an invaluable tool for ID management, allowing passport, visa and national ID agencies to compare new facial images to existing databases, find duplicates and errors, and avert identity fraud.

For law enforcement applications, Cognitec recently introduced a mobile version of the Examiner tool within FaceVACS-DBScan. Police officers and other agents can take photos in the field, compare them to central mug shot repositories or other databases, and instantly receive candidate lists on their mobile devices.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...