Interpretation: Intelligent face capture technology in IoT security applications

Publisher:cxx7848653Latest update time:2011-07-13 Source: 物联中国Keywords:IoT Reading articles on mobile phones Scan QR code
Read articles on your mobile phone anytime, anywhere
IoT security, as the name implies, is to combine the functional characteristics of IoT products and security products to achieve the role of security protection. That is, to use IoT technology to achieve security applications.

On the other hand, based on the needs of the development of the Internet of Things, the application of security products and technologies in the process of realizing the Internet of Things is an extension of the security application field. Its essence and most important thing is the intelligence of security products.

In the security industry, video surveillance applications account for the vast majority of the market, so the first thing to be solved in the intelligentization of security products is the intelligentization of video surveillance technology. Through intelligent video analysis technology, some key information worthy of attention can be separated from the video. In this way, video acquisition equipment with intelligent video analysis technology becomes an intelligent sensor for collecting key information and becomes the front-end core of the Internet of Things application. As a result, the application brought about is no longer just video surveillance application, but a series of new applications centered on video surveillance applications and surrounding video surveillance applications have been generated.

This article will focus on face capture technology and its applications to analyze its IoT security applications.

Face capture technology refers to the technology that uses intelligent video analysis technology to detect and locate appropriate faces from video sources and then capture them as face photos. This technology does not require the cooperation of the monitored person, and can quickly and easily obtain face photos, and can be deployed in large quantities.

Undoubtedly, human information is one of the most critical information that needs to be paid attention to in the security field. Face photos have the characteristics of small storage space and large information capacity, and can establish a relationship with personal identity, so capturing and storing face photos is of great significance. Capturing a large number of photos can bring about the retention of traces of human behavior and activities, which leads to at least four types of excellent applications: face retrieval, blacklist deployment, VIP recognition, and stranger recognition.

How to capture face

To capture a face, there are three main ways to do it:

The front-end face capture device analyzes and captures faces in the video source;

By connecting the video to the face capture device at the front end, the face capture function is realized on the front-end embedded device, and the captured face photos are transmitted to the face database through the network and other interfaces. This method is generally used for new projects, small projects, and decentralized projects.

Intelligent video analysis platform to separate and capture faces from the backend centralized video source;

By introducing video sources at the back end of the centralized video surveillance platform, face capture can be achieved on the back end intelligent video analysis platform. This method is most suitable for intelligent transformation of large centralized video surveillance platforms such as safe cities and safe campuses.

Use a handheld device to capture faces while moving.

Using handheld video acquisition equipment with intelligent processing capabilities, face photos are collected on site, and the captured faces are transmitted to the back-end face database for relevant real-time applications. This is the simplest and most effective way to collect faces when mobile collection and mobile law enforcement are required.

After the front-end of face capture application completes face capture and collection, it generally needs to cooperate with the front-end or back-end face photo recognition and comparison technology to complete the comprehensive application. There are four main types of applications.

Face retrieval

Face retrieval refers to searching for records where the face has appeared by inputting photos or other face information and searching for facial features in a large number of face photos and video sources.

Generally, this application is used in conjunction with the intelligent transformation of safe cities. When a large number of face photos are collected by the front end, the traces of the behavior and activities that the photos have retained in the system can be quickly located through face retrieval, which can easily locate the activity tracks and places where the person concerned has appeared, etc., and can be very effective in conjunction with the application of various technical investigation methods.

Blacklist defense

In some critical situations, it is necessary to quickly deploy alarms for blacklisted people, such as various ports, airports, and petition offices. When the faces of people on the blacklist appear in the video scene, they can be quickly identified and alarmed, prompting manual intervention.

The face captured by the front end is automatically compared with the blacklist database in real time. When the similarity reaches a certain threshold, the alarm linkage is automatically triggered, thus realizing the blacklist defense process. It has great deterrence and application effect for wanted criminals, smugglers, etc. Shenzhen Huanggang Port, supported by Shenzhen Feiruis Technology, has deployed a similar system.

VIP customer identification

Imagine a scenario: when a VIP customer enters a business premises, the system can automatically identify the customer without the customer actively showing proof, and provide personal information, consumption history, consumption preferences and other information to the service staff, who will then provide corresponding personalized services. This is VIP customer identification.

The main application occasions include luxury stores, high-end car service points, high-end clubs, bank key customer management centers, sales offices, etc.

Stranger Recognition Stranger recognition refers to a method of identifying and prompting strangers outside a certain range. The main applications are private gardens, private clubs, etc. By automatically comparing the captured face with the faces of all owners/members, strangers are automatically prompted for manual intervention by staff.

Application Analysis

Through the analysis of face capture and its industry applications, it is not difficult to find that its application occasions are very wide, involving large-scale government applications such as safe cities, safe campuses, and urban management, as well as corporate applications such as commerce and banks. It can also be used in general application fields such as property management, and has very obvious application prospects.

Summarize

Through intelligent video analysis technology, ordinary video acquisition equipment will be transformed into intelligent IoT sensors that can perceive a lot of key information. By reusing key information, many advanced applications that were previously unimaginable in the field of video surveillance can be completed. In this way, video acquisition has broken through the framework of ordinary applications such as video surveillance and gained a larger market space with both breadth and height.

Keywords:IoT Reference address:Interpretation: Intelligent face capture technology in IoT security applications

Previous article:Laboratory Intelligent Automatic Security System Based on GSM and Single Chip Microcomputer
Next article:Application of wireless mesh network technology in intelligent community security

Recommended ReadingLatest update time:2024-11-16 19:28

Deploy the Internet of Things and avoid these three pitfalls
The concept of the Internet of Things has been popularized enough, but due to the heterogeneity and fragmentation of IoT devices, the implementation process has brought many challenges. Ho Nguyen, product manager of BehrTech, introduced three things that need to be paid attention to in IoT deployment. Here are the de
[Internet of Things]
Create a highland for innovation in the construction and application of ubiquitous power Internet of Things
Si Weiguo, Deputy General Manager of State Grid Zhejiang Electric Power Co., Ltd. and General Manager of Hangzhou Power Supply Company Accelerating the construction of ubiquitous power Internet of Things is the company's most urgent and important task at present. Zhejiang Hangzhou Power Supply Company resolutel
[New Energy]
Haocheng Battery brings new products | 2020 IOTE International Internet of Things Exhibition
On July 29, the 14th IOTE International Internet of Things Exhibition was held as scheduled at the Shenzhen Convention and Exhibition Center. Wuhan Haocheng Energy Technology Co., Ltd. was invited to participate in the exhibition and brought the latest products and technological innovations to the exhibition venue -
[New Energy]
Silicon Labs Launches Ember ZigBee Enhanced IoT Solution
Silicon Laboratories today announced the addition of a new low-power wireless embedded product portfolio for the Internet of Things market - Ember ZigBee solutions. Available from Silicon Labs' global distributor channels, the EM35x system-on-chip (SoC) and network coprocessor (NCP) products and EmberZNet PRO softwa
[Security Electronics]
The performance of the IoT module leader Quectel Communications was lower than expected and its stock price fell to the limit for two consecutive days
Jiwei.com reported that on April 21, the leading IoT module company Quectel Communications opened at the limit down, with the share price at 187.76 yuan/share, down 10.00%. It should be pointed out that this is the second consecutive day that Quectel Communications has fallen to the limit down. Yesterday, the company
[Mobile phone portable]
The performance of the IoT module leader Quectel Communications was lower than expected and its stock price fell to the limit for two consecutive days
Shandong Economic Research Institute creates Shandong Model of Ubiquitous Power Internet of Things
When State Grid Shandong Electric Power Company listed "Research on the top-level design and demonstration project construction of ubiquitous power Internet of Things" as a major topic in 2019, the Economic and Technical Research Institute of State Grid Shandong Electric Power Company (hereinafter referred to as "St
[New Energy]
Give full play to advantages, explore innovations and support the construction of ubiquitous power Internet of Things
——Interview with Zhou Qun, Chairman and Party Secretary of Shandong Electric Power Group Co., Ltd. Special correspondents Wang Yugang and Zhu Jianfeng Reporter: How does Shandong Electric Power Group Co., Ltd. accurately grasp the responsibilities it shoulders in the construction of ubiquitous power Intern
[New Energy]
Design of mine oxygen concentration monitoring system based on Internet of Things
Toxic gases in coal mines are fatal to the life and safety of miners. Toxic gases may be produced in all production links underground in coal mines, such as drilling, blasting, tunneling, coal cutting by coal mining machines, coal loading, coal mining support and top caving, tunnel support, loading, transportation, rel
[Microcontroller]
Design of mine oxygen concentration monitoring system based on Internet of Things
Latest Security Electronics Articles
Change More Related Popular Components

EEWorld
subscription
account

EEWorld
service
account

Automotive
development
circle

About Us Customer Service Contact Information Datasheet Sitemap LatestNews


Room 1530, 15th Floor, Building B, No.18 Zhongguancun Street, Haidian District, Beijing, Postal Code: 100190 China Telephone: 008610 8235 0740

Copyright © 2005-2024 EEWORLD.com.cn, Inc. All rights reserved 京ICP证060456号 京ICP备10001474号-1 电信业务审批[2006]字第258号函 京公网安备 11010802033920号