What should I do if the facial recognition camera cannot see the face? Since 2015, when facial recognition surpassed human accuracy, the recognition accuracy has jumped 100,000 times in four years. In the future, it will unlock more complex application scenarios and improve efficiency by several orders of magnitude. However, in current actual application scenarios, a single camera cannot cover all areas, and the detection ranges of multiple cameras rarely overlap. Moreover, due to the installation height and density of video surveillance probes, more pedestrians’ side faces, the top of their heads, or the back of their heads are captured.
Before face recognition is realized, there is another problem: cameras are everywhere in the city. Except for the bayonet cameras and the snapshot cameras used by the electronic police, there are very few cameras that meet the face collection standards: the existing front-end equipment is difficult to meet the requirements of the installation height and angle required for face recognition, and needs to be replaced or renovated, which involves a long period of high investment. To maximize the potential of the cameras installed in the Safe City and Snow Bright Project, other technologies need to be added.
The leading players in the AI + security industry are beginning to focus on the combined application of ReID (pedestrian re-identification) technology and face recognition. ReID technology does not have high requirements for the environment and equipment, and can make full use of existing equipment and infrastructure. As long as certain pedestrian features are identified, it can achieve continuous tracking and trajectory restoration of the search object across cameras. Once facial information is found in this process, the identity of the person can be determined. This is an ideal technology for social public security.
For example, if you know a suspect's photo and want to obtain the video segment in which he appears in the surveillance, ReID can collect data from the surveillance video library based on the photo and connect the suspect's trajectory in each camera, which will be of great help to criminal investigation work.
In general, in the field of surveillance, manufacturers hope to use ReID technology to associate and find the same object in different videos. Only when this level is achieved can the entire surveillance operation be considered complete and the overall situation can be seen.
It should be pointed out that ReID itself is a very difficult technology. To identify the same person from different videos, video lighting conditions, monitoring area resolution and angle, target occlusion, and even people wearing similar clothes can all make identification difficult. The difficulty in obtaining data will pose a greater challenge to the algorithm. The industry is now trying to work on the algorithm level to improve ReID recognition results.
Established security companies such as Hikvision and Dahua, the four AI unicorns, Huawei, and traditional Internet giants such as BAT all have their own layout and accumulation in the field of ReID. CloudWalk's ReID technology has surpassed Alibaba, Tencent, and the Chinese Academy of Sciences, breaking three world records and pushing the ReID recognition rate to a commercially viable level.
Conclusion: "Face recognition" as an important application in the field of computer vision has swept the entire industry, and "recognizing people" will push the computer vision industry into a new stage of development. At present, ReID technology is mainly used in the security field. The security industry has conducted in-depth research in many sub-fields of ReID, such as pedestrian detection, posture estimation, behavior recognition, and pedestrian structured information extraction. In the future, the combination of ReID and face recognition can be applied to more and richer scenarios, allowing everyone to more quickly experience the upgrade of intelligent technology in security, autonomous driving, home life and other aspects.
Previous article:Israel's cyber war once again sounded the alarm for global cyber security
Next article:eNFC technology leverages the 10 billion market for access control and urban renewal
- Popular Resources
- Popular amplifiers
- Mir T527 series core board, high-performance vehicle video surveillance, departmental standard all-in-one solution
- Akamai Expands Control Over Media Platforms with New Video Workflow Capabilities
- Tsinghua Unigroup launches the world's first open architecture security chip E450R, which has obtained the National Security Level 2 Certification
- Pickering exhibits a variety of modular signal switches and simulation solutions at the Defense Electronics Show
- Parker Hannifin Launches Service Master COMPACT Measuring Device for Field Monitoring and Diagnostics
- Connection and distance: A new trend in security cameras - Wi-Fi HaLow brings longer transmission distance and lower power consumption
- Smartway made a strong appearance at the 2023 CPSE Expo with a number of blockbuster products
- Dual-wheel drive, Intellifusion launches 12TOPS edge vision SoC
- Toyota receives Japanese administrative guidance due to information leakage case involving 2.41 million pieces of user data
- LED chemical incompatibility test to see which chemicals LEDs can be used with
- Application of ARM9 hardware coprocessor on WinCE embedded motherboard
- What are the key points for selecting rotor flowmeter?
- LM317 high power charger circuit
- A brief analysis of Embest's application and development of embedded medical devices
- Single-phase RC protection circuit
- stm32 PVD programmable voltage monitor
- Introduction and measurement of edge trigger and level trigger of 51 single chip microcomputer
- Improved design of Linux system software shell protection technology
- What to do if the ABB robot protection device stops
- Huawei's Strategic Department Director Gai Gang: The cumulative installed base of open source Euler operating system exceeds 10 million sets
- Download from the Internet--ARM Getting Started Notes
- Learn ARM development(22)
- Learn ARM development(21)
- Learn ARM development(20)
- Learn ARM development(19)
- Learn ARM development(14)
- Learn ARM development(15)
- Analysis of the application of several common contact parts in high-voltage connectors of new energy vehicles
- Wiring harness durability test and contact voltage drop test method
- FPGA Advanced Timing Synthesis Tutorial.pdf
- [GD32L233C-START Review] 6. Fingerprint Management System (2) - Added brightness adjustment
- [Sipeed LicheeRV 86 Panel Review] 15. lvgl calendar control and weather display
- Can RTthread be ported to nrf51822?
- A bug solution for CH548/CH549 ADC routine
- [Project source code] BMP2mif file software, convenient for using ROM to store image data and display
- I want to control the on and off of NMOS through a 3.3V microcontroller
- Domestic FPGA brand Anlu
- The load is a 3000W heating plate, controlled by two 16A relays
- "Detailed Explanation of Embedded Linux System Development Technology--Based on ARM (Full Version)" e-book free