Technology counts on AI to authenticate and identify people

Always Surrounded

Technology counts on AI to authenticate and identify people

Not long ago, artificial intelligence was viewed as science fiction. Today, it routinely makes our lives more secure and convenient. AI surrounds us in our everyday lives. Online entertainment providers use it to suggest movies, TV shows and music we might enjoy. Retailers try to influence our current buying decisions based on previous purchases. Chatbots help us make appointments with service providers.

The security industry also deploys artificial intelligence in many ways. Facial recognition counts on AI to authenticate and identify people by the shapes of their faces and features. Robots and drones patrol perimeters looking for anomalies, leaving human officers free to handle other potential threats and events. AI-based software checks feeds from central video monitoring stations to filter out false alarms.

Diving a Little Deeper into the Technology
In recent years, the use of artificial intelligence and its subsets, machine learning and deep learning, have increased exponentially. AI technology enables computers to mimic human intelligence using logic based on if-then rules and decision trees. Statistic techniques used in machine learning allows computers to improve at tasks with experience. Deep learning enables networks to train themselves to perform tasks such as speech and image recognition. There are two main ways of working with these technologies – rule-based algorithms and neural networks.

Rule-based algorithms have limitations. Even the most experienced computer engineer can't prepare for all potential situations that might arise within a camera's field of view or an employee arrives at a building entrance with his face covered with a mask and goggles. As a result, these algorithms offer reduced accuracy. While it's not accurate to say neural networks work like a human brain, they are inspired by it. Neural-node networks are computing systems that learn to perform tasks by considering examples rather than being programmed with task-specific rules. The machine-learning model memorizes its training data an makes predictions based on specific sets of situations.

For instance, it only recognizes human activity if it matches previous examples. That's why training software to identify human beings or vehicles reliably requires exposing the neural network to millions of images.

The network makes predictions about each presented image and is corrected by humans when it makes mistakes. Neural nodes are layered, each analyzing an image element. A prediction is made once the image passes through and is processed by the network.

Improving Accuracy
Network accuracy improves until it outperforms other methods. Over time, the network will reliably predict the presence of humans and vehicles or whatever else it is trained to recognize. What makes these networks so powerful is their ability to generalize concepts they've learned and then apply them to images they never before have seen.

An example I often use is that of a cat. Ask 10 people to think of a feline and most likely, you'll get 10 different answers based on distinct breeds, sizes, fur colors and many other features. However, all would recognize each person's visualization as some type of a cat.

Let's take a look at an everyday use of deep learning to understand better how it impacts the security industry. Video monitoring center operators are exposed to hundreds or thousands of alarm images per shift. Blowing leaves, lighting changes or a spider building a web in front of a camera lens may trigger a false alarm. Traditionally, 95% or more of incoming alarms are false. Today's deep learning networks can eliminate up to 99% of false alarms.

Improved security is one result. By reducing the false alarm noise, operators are less likely to miss genuine alerts. Operators' ability to focus on potentially criminal activity reduces response time if law enforcement or security guards must be dispatched.

Monitoring cameras for hours is a demanding job, made more so by dealing with false alarms. False alarm reduction software improves employee morale, reducing turnover in the process. By focusing on true alarms, operators become more productive, enabling a station to add more cameras or new customers without hiring new employees.

The cloud-based AI software requires no hardware devices to be installed at an end-user's site. Future upgrades are managed remotely by the service provider.

Predicting criminal behavior is likely the next big step in deep learning video analytics. Neural networks use the same training methods to learn actions likely to precede a crime. This is a big step as the software must recognize humans and identify things that people interact within their environment.

Tremendous advancements in computational power made artificial intelligence and deep learning possible. Now, these technologies' highly accurate decision-making enables us to do things better and faster than before. It is encouraging to know these platforms continue and learn and improve over time.

Featured

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

  • Street Smarts

    The ongoing acceptance of AI and advanced data analytics has allowed surveillance camera technology to shift from being a tactical tool to a strategic business solution. Combining traditional surveillance technology with AI-based data-driven insights can streamline transportation systems, enhance traffic management, improve situational awareness, optimize resource allocation and streamline emergency response procedures. Read Now

  • The Progress of Biometrics

  • Next-Gen AI for Smart Cities

    The future of smart city technology is not being shaped in Silicon Valley — it is taking root in Dubuque, Iowa. With a population of about 60,000, this mid-sized city has become a live testbed for AI-driven traffic management thanks to a unique public-private collaboration led by Milestone Systems. Project Hafnia demonstrates how cities can transform urban mobility and safety through Responsible Technology—without costly infrastructure overhauls. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.