Technology counts on AI to authenticate and identify people

Always Surrounded

Technology counts on AI to authenticate and identify people

Not long ago, artificial intelligence was viewed as science fiction. Today, it routinely makes our lives more secure and convenient. AI surrounds us in our everyday lives. Online entertainment providers use it to suggest movies, TV shows and music we might enjoy. Retailers try to influence our current buying decisions based on previous purchases. Chatbots help us make appointments with service providers.

The security industry also deploys artificial intelligence in many ways. Facial recognition counts on AI to authenticate and identify people by the shapes of their faces and features. Robots and drones patrol perimeters looking for anomalies, leaving human officers free to handle other potential threats and events. AI-based software checks feeds from central video monitoring stations to filter out false alarms.

Diving a Little Deeper into the Technology
In recent years, the use of artificial intelligence and its subsets, machine learning and deep learning, have increased exponentially. AI technology enables computers to mimic human intelligence using logic based on if-then rules and decision trees. Statistic techniques used in machine learning allows computers to improve at tasks with experience. Deep learning enables networks to train themselves to perform tasks such as speech and image recognition. There are two main ways of working with these technologies – rule-based algorithms and neural networks.

Rule-based algorithms have limitations. Even the most experienced computer engineer can't prepare for all potential situations that might arise within a camera's field of view or an employee arrives at a building entrance with his face covered with a mask and goggles. As a result, these algorithms offer reduced accuracy. While it's not accurate to say neural networks work like a human brain, they are inspired by it. Neural-node networks are computing systems that learn to perform tasks by considering examples rather than being programmed with task-specific rules. The machine-learning model memorizes its training data an makes predictions based on specific sets of situations.

For instance, it only recognizes human activity if it matches previous examples. That's why training software to identify human beings or vehicles reliably requires exposing the neural network to millions of images.

The network makes predictions about each presented image and is corrected by humans when it makes mistakes. Neural nodes are layered, each analyzing an image element. A prediction is made once the image passes through and is processed by the network.

Improving Accuracy
Network accuracy improves until it outperforms other methods. Over time, the network will reliably predict the presence of humans and vehicles or whatever else it is trained to recognize. What makes these networks so powerful is their ability to generalize concepts they've learned and then apply them to images they never before have seen.

An example I often use is that of a cat. Ask 10 people to think of a feline and most likely, you'll get 10 different answers based on distinct breeds, sizes, fur colors and many other features. However, all would recognize each person's visualization as some type of a cat.

Let's take a look at an everyday use of deep learning to understand better how it impacts the security industry. Video monitoring center operators are exposed to hundreds or thousands of alarm images per shift. Blowing leaves, lighting changes or a spider building a web in front of a camera lens may trigger a false alarm. Traditionally, 95% or more of incoming alarms are false. Today's deep learning networks can eliminate up to 99% of false alarms.

Improved security is one result. By reducing the false alarm noise, operators are less likely to miss genuine alerts. Operators' ability to focus on potentially criminal activity reduces response time if law enforcement or security guards must be dispatched.

Monitoring cameras for hours is a demanding job, made more so by dealing with false alarms. False alarm reduction software improves employee morale, reducing turnover in the process. By focusing on true alarms, operators become more productive, enabling a station to add more cameras or new customers without hiring new employees.

The cloud-based AI software requires no hardware devices to be installed at an end-user's site. Future upgrades are managed remotely by the service provider.

Predicting criminal behavior is likely the next big step in deep learning video analytics. Neural networks use the same training methods to learn actions likely to precede a crime. This is a big step as the software must recognize humans and identify things that people interact within their environment.

Tremendous advancements in computational power made artificial intelligence and deep learning possible. Now, these technologies' highly accurate decision-making enables us to do things better and faster than before. It is encouraging to know these platforms continue and learn and improve over time.

Featured

  • Tradeshow Work Can Be Fun

    While at ISC West last week, I ran into numerous friends and associates all of which was a pleasant experience. The first question always seemed to be, “How many does this make for you?” Read Now

    • Industry Events
    • ISC West
  • New Report Says 1 in 5 SMBs Would Be Forced to Shutter After Successful Cyberattack

    Small and medium-sized businesses (SMBs) play a crucial role in the U.S. economy, making up 99.9% of all businesses and contributing to half of the nation's GDP. However, these vital economic growth drivers face an escalating threat—cyberattacks that could put them out of business. Read Now

  • The Yellow Brick Road

    The road to and throughout Wednesday's and Thursday's ISC West was crowded but it was amazing. Read Now

    • Industry Events
    • ISC West
  • An Inside Look From Napco at ISC West

    Get a look into the excitement at ISC West 2025 from Napco. Hear from some of their top-tech executives live from the show floor. Read Now

    • Industry Events
    • ISC West
  • Upping the Ante

    I am not a betting man in terms of cards, dice, blackjack or that wheel with the black marble racing around the circumference of a spinning wheel, but I would bet on the success of ISC West this year. Read Now

    • Industry Events
    • ISC West

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.