black (1)

NIST FRVT: The Ultimate Guide to Face Recognition Evaluation

Are you curious about the capabilities and limitations of facial imagery recognition systems? These systems have the capability to analyze key fingerprints in mugshot images. The NIST FRVT (Face Recognition Vendor Test) is a technology evaluation that provides valuable insights on facial imagery. It involves participants who are evaluated using fmr technology. This comprehensive evaluation program conducts comparisons and benchmarks of face recognition algorithms using test data. It allows us to assess the performance and effectiveness of the participants.

The NIST FRVT aims to answer critical questions about the accuracy of face recognition technologies. This recognition performance test is essential for face recognition developers as it provides comparisons and insights into the accuracy of these technologies. Can they handle various scenarios and demographics? By evaluating different algorithms against standardized datasets, NIST FRVT offers objective measurements and benchmarks for developers and users alike in recognition performance tests. These tests allow for comparisons and validation of algorithms, measuring factors such as false match rate (FMR). It’s like having a litmus test for face recognition systems to determine the threshold of accuracy and validation. This test ensures that the system can successfully perform mated searches and display the results in a gallery format.

So buckle up as we embark on this journey to uncover the truth behind face recognition technology. In our gallery, we will showcase various fmr submissions and present them in a table for easy comparison.

Understanding the FRVT and FRTE

The NIST FRVT (Face Recognition Vendor Test) and FRTE (Face Recognition Technology Evaluation) are two important evaluations conducted by the National Institute of Standards and Technology (NIST) to assess the performance of face recognition technology. These evaluations help measure the accuracy and effectiveness of face recognition systems in various scenarios, such as identifying individuals in a crowded gallery or determining the threshold for matching faces. The NIST evaluations play a crucial role in advancing the capabilities of face recognition technology, ensuring its reliability and accuracy for applications like identifying twins or enhancing security measures. Let’s delve into these recognition performance tests to understand their purpose and focus. These evaluations involve setting a threshold for mated searches and analyzing the submissions.

FRVT: Evaluating Identification Performance

The FRVT primarily focuses on evaluating the identification performance of face recognition algorithms for mated searches. It sets a threshold for submission. In other words, the submission assesses how well these algorithms can accurately match a face image to a specific identity. This evaluation is crucial in determining the effectiveness and reliability of face recognition technologies in real-world scenarios.

During the evaluation, participants submit their algorithms for testing against large datasets containing millions of face images. The performance metrics used in the evaluation include accuracy, speed, storage requirements, and resource consumption. By analyzing these metrics, NIST aims to provide insights into the capabilities and limitations of different face recognition systems.

FRTE: Assessing Verification Performance

On the other hand, the FRTE assesses the verification performance of face recognition technologies. Verification involves confirming whether a given individual is who they claim to be by comparing their facial features with stored templates or reference images. This evaluation helps determine how well these technologies can accurately verify an individual’s identity.

Similar to the FRVT, participants in the FRTE submit their algorithms for testing against standardized datasets provided by NIST. These datasets consist of both genuine matches (where images belong to the same person) and impostor matches (where images belong to different people). The goal is to evaluate how well each algorithm can distinguish between genuine and impostor matches.

By conducting this evaluation, NIST provides valuable information about false acceptance rates (FAR), false rejection rates (FRR), precision-recall curves, and other relevant metrics. These metrics help quantify the accuracy and reliability of different face recognition technologies.

Both evaluations play a crucial role in advancing the field of face recognition technology. They help researchers, developers, and policymakers gain a deeper understanding of the strengths and weaknesses of various algorithms and systems. This knowledge is essential for making informed decisions about implementing face recognition technologies in different applications, such as security systems, law enforcement, and access control.

Delving into NIST FRVT’s Verification Performance

NIST FRVT, which stands for the National Institute of Standards and Technology Face Recognition Vendor Test, plays a crucial role in evaluating the accuracy and efficiency of face recognition systems. By conducting comprehensive tests, NIST FRVT provides objective measures of system effectiveness through its verification performance metrics.

The verification performance metrics used by NIST FRVT are designed to assess how well face recognition technologies can verify whether a person is who they claim to be. These metrics include the False Non-Match Rate (FNMR), which measures the rate at which an individual is falsely rejected by the system. A lower FNMR indicates a higher level of accuracy in correctly verifying individuals.

Another important metric evaluated by NIST FRVT is recognition performance test. This test focuses on assessing how well recognition algorithms perform in real-world scenarios. It helps identify areas where face recognition technologies excel or struggle.

By analyzing these metrics, NIST FRVT provides valuable insights into the strengths and weaknesses of different face recognition systems. For example, if a particular system consistently achieves low FNMR scores and performs well in real-world scenarios, it demonstrates a high level of accuracy and efficiency in verifying individuals’ identities.

On the other hand, if a system exhibits high FNMR scores or struggles with recognizing individuals accurately in various scenarios, it highlights areas for improvement. This information allows developers and researchers to refine their algorithms and enhance the overall performance of face recognition systems.

NIST FRVT’s evaluation process not only benefits developers but also ensures that end-users can have confidence in the reliability and effectiveness of face recognition technologies. The rigorous testing conducted by NIST enables users to make informed decisions about implementing these technologies for identity verification purposes.

For instance, government agencies responsible for border control or law enforcement can rely on NIST’s evaluations to select reliable face recognition systems that meet their specific needs. This helps in enhancing security measures and streamlining identity verification processes.

The Comprehensive Guide to Participating in FRVT

Step-by-Step Guide for Vendors

If you’re a vendor and want to participate in the NIST FRVT, here’s a step-by-step guide to help you get started.

  1. Understand the Protocols: Familiarize yourself with the protocols and guidelines set by NIST for participation in the FRVT. These protocols ensure fair evaluation and comparison of face recognition algorithms.

  2. Submit Your Algorithm: Prepare your face recognition algorithm according to the specifications provided by NIST. Ensure that your algorithm is compatible with the required formats and standards.

  3. Participation Agreement: Fill out the participation agreement form provided by NIST. This agreement outlines your commitment to follow the rules and guidelines of the FRVT.

  4. Submit Your Algorithm for Evaluation: Submit your algorithm to NIST for evaluation in the FRVT ongoing test series. Be sure to meet all submission deadlines specified by NIST.

  5. Benchmarking Your Technology: By participating in the FRVT, you have an opportunity to benchmark your face recognition technology against other vendors in the industry. This allows you to assess its performance and identify areas for improvement.

  6. Stay Updated: Join the mailing list provided by NIST to receive updates on important announcements, changes, and future test series of the FRVT.

Benefits of Participation

Participating in the NIST FRVT offers several benefits for vendors:

  1. Industry Recognition: By having your algorithm evaluated in a reputable test series like FRVT, you gain industry recognition and credibility.

  2. Performance Comparison: The FRVT allows you to compare your face recognition technology’s performance against other algorithms from various vendors. This comparison helps you understand how well your solution performs relative to others.

  3. Identifying Strengths and Weaknesses: Through participation, you can identify both strengths and weaknesses of your algorithm. This insight helps you focus on improving the weaker areas and enhancing the overall performance of your technology.

  4. Feedback from Experts: The evaluation process in FRVT involves expert analysis and feedback on your algorithm’s performance. This feedback can provide valuable insights for refining your face recognition solution.

  5. Improving Customer Confidence: By participating in a rigorous evaluation like FRVT, you demonstrate your commitment to delivering reliable and accurate face recognition technology. This helps build trust and confidence among potential customers.

  6. Driving Innovation:

NIST’s Involvement in Biometrics

NIST, the National Institute of Standards and Technology, plays a crucial role in evaluating and advancing biometric technologies. While the previous section focused on the FRVT (Face Recognition Vendor Test), it is important to note that NIST is involved in various other projects related to biometrics as well.

Evaluating Fingerprint and Iris Recognition

In addition to the FRVT, NIST conducts evaluations for fingerprint and iris recognition technologies. These evaluations help assess the performance of different algorithms and systems used for these biometric modalities. By analyzing large datasets and conducting rigorous testing, NIST provides valuable insights into the accuracy, reliability, and effectiveness of these technologies.

Other Evaluation Programs by NIST

Alongside the FRVT, NIST carries out several other evaluation programs that contribute to advancements in biometric technologies. One such program is the NIST Interagency Report (NIR) series, which focuses on evaluating algorithms for various biometric modalities.

Another notable project is the Iris Exchange (IREX) evaluation series, which specifically evaluates iris recognition algorithms. This program helps researchers and developers understand the strengths and limitations of different iris recognition systems.

Furthermore, NIST also conducts evaluations related to DNA matching technologies through its Forensic Science Program. These evaluations assist law enforcement agencies in accurately identifying suspects based on DNA evidence.

Broader Perspective on Advancements

Understanding NIST’s involvement in multiple projects related to biometrics provides us with a broader perspective on advancements in this field. The evaluations conducted by NIST not only ensure that these technologies meet certain standards but also drive innovation by encouraging researchers and developers to enhance their algorithms and systems.

By collaborating with various stakeholders including government agencies, academic communities, industry partners, and international organizations, NIST fosters an environment where ideas are exchanged freely. This collaboration facilitates knowledge sharing and encourages continuous improvement in biometric technologies.

For example, NIST’s evaluations have led to the development of more accurate and efficient fingerprint recognition algorithms, enabling law enforcement agencies to solve crimes more effectively. Similarly, advancements in iris recognition technologies have enhanced security measures at airports and other high-security facilities.

Investigating the Impact of Demographics and Masks in FRTE

How Demographic Factors Influence Face Recognition Performance

Demographic factors such as age, gender, and race can have a significant impact on the performance of face recognition systems. Researchers have found that certain demographics may be more accurately recognized than others due to variations in facial features and characteristics.

For instance, studies have shown that face recognition algorithms tend to perform better on younger individuals compared to older ones. This could be attributed to factors such as changes in skin elasticity and appearance that occur with aging. Similarly, gender can also influence face recognition accuracy, with some algorithms exhibiting higher error rates when identifying faces of one gender over the other.

Race is another important demographic factor that affects face recognition performance. Research has revealed that certain algorithms may exhibit lower accuracy rates when recognizing faces from racial minority groups compared to those from majority groups. This disparity highlights the need for continuous improvement and evaluation of these technologies to ensure fairness across different racial backgrounds.

The Challenges Faced by Face Recognition Systems with Masks

The widespread use of masks or other facial coverings poses unique challenges for face recognition systems. These technologies typically rely on capturing detailed facial imagery for accurate identification. However, when individuals wear masks, a significant portion of their face is obscured, making it difficult for the algorithms to extract key features necessary for identification.

This challenge becomes particularly pronounced when multiple faces are present in an image or video frame. The presence of masks can hinder the system’s ability to correctly identify each individual within a group setting. As a result, negative identification rates may increase, leading to potential misidentifications or false positives.

To address this issue, researchers and developers are actively exploring ways to enhance face recognition technology’s capability to handle masked faces effectively. Solutions include developing new algorithms that can adapt and recognize partially covered faces or leveraging additional contextual information such as body posture or gait analysis.

Improving Fairness and Accuracy in Face Recognition Technologies

Understanding the impact of demographics and masks is crucial for improving the fairness and accuracy of face recognition technologies. By identifying and addressing biases associated with age, gender, race, and facial coverings, developers can work towards creating more inclusive systems that perform consistently across different populations.

Efforts are underway to collect diverse datasets that encompass a wide range of demographic factors to ensure better representation during algorithm development.

FATE Projects and Their Evaluation Methods

Ethical Concerns Addressed by FATE Projects

FATE (Fairness, Accountability, Transparency, and Ethics) projects are dedicated to addressing the ethical concerns surrounding face recognition technologies. These projects recognize the potential biases and risks associated with facial recognition algorithms and strive to ensure that these technologies are developed and deployed responsibly. By focusing on fairness, accountability, transparency, and ethics, FATE projects aim to create a more equitable and trustworthy environment for the use of face recognition systems.

Evaluating Fairness and Transparency

One of the key aspects discussed in this section is the evaluation methods employed by FATE projects to assess the fairness and transparency of face recognition algorithms. These evaluation methods play a crucial role in determining how well these algorithms perform in real-world scenarios.

To evaluate fairness, FATE projects consider various demographic factors such as age, gender, race, and ethnicity. By analyzing how well an algorithm performs across different demographic groups, they can identify any disparities or biases that may exist. This evaluation helps ensure that face recognition technology does not disproportionately impact certain individuals or communities.

Transparency is another important aspect evaluated by FATE projects. They examine how transparent an algorithm’s decision-making process is by assessing its documentation, model architecture, training data sources, and disclosure of potential limitations. This evaluation ensures that users have a clear understanding of how the algorithm operates and can trust its outcomes.

Algorithm Submissions for Evaluation

FATE projects encourage algorithm submissions from researchers and developers worldwide to participate in their evaluations. These submissions provide valuable insights into the performance of different face recognition algorithms under diverse conditions. By evaluating multiple algorithms from various sources, FATE projects can gain a comprehensive understanding of the strengths and weaknesses within existing technologies.

During the evaluation process, match rates and error rates are carefully analyzed to determine algorithm performance. Match rates measure how accurately an algorithm matches faces against a database or other images provided. Error rates, on the other hand, assess the algorithm’s ability to correctly identify or reject faces. These metrics help evaluate the effectiveness and reliability of face recognition algorithms.

Ensuring Responsible Development and Deployment

FATE projects play a crucial role in ensuring responsible development and deployment of face recognition systems. By evaluating fairness and transparency, these projects aim to address biases and promote accountability within the field of facial recognition technology. They provide valuable insights into algorithm performance while considering demographic factors, ultimately contributing to more equitable and trustworthy face recognition systems.

Breaking Down FRVT Results and Performance Metrics

The NIST FRVT evaluations provide valuable insights into the performance of face recognition systems. By analyzing the results and understanding the performance metrics used by NIST, we can identify areas for improvement in these technologies.

Analysis of Results

The NIST FRVT evaluations involve testing numerous face recognition algorithms to measure their accuracy and efficiency. These evaluations assess various aspects of system performance, such as identification accuracy, verification accuracy, and speed. The results obtained from these evaluations help researchers and developers gain a better understanding of how well their systems perform compared to others in the field.

One important metric that is commonly used in evaluating face recognition systems is the false match rate (FMR). The FMR measures the likelihood of a system incorrectly matching two different individuals. A lower FMR indicates a higher level of accuracy in distinguishing between different faces. By analyzing the FMR values obtained during the evaluation process, researchers can gauge how well a particular algorithm performs in terms of false matches.

Another crucial metric used in evaluating face recognition systems is the genuine match rate (GMR). The GMR measures how often a system correctly matches two images of the same individual. A higher GMR indicates better accuracy in recognizing individuals correctly. Evaluating both FMR and GMR provides a comprehensive view of a system’s overall performance.

Performance Metrics Used by NIST

NIST employs several performance metrics to evaluate face recognition systems thoroughly. One commonly used metric is known as rank-1 identification accuracy. This metric measures how often an algorithm correctly identifies an individual among multiple candidates when presented with their image. Higher rank-1 identification accuracy signifies better overall performance.

Another important metric utilized by NIST is verification accuracy, which measures how accurately a system verifies whether two images belong to the same person or not. High verification accuracy ensures that only legitimate matches are accepted while minimizing false positives.

Speed is yet another critical aspect evaluated by NIST. Face recognition systems need to perform efficiently, especially in real-time applications. By measuring the speed at which a system processes and matches images, NIST can assess the efficiency of different algorithms.

Identifying Areas for Improvement

Understanding the FRVT results and performance metrics allows us to identify areas where face recognition technologies can be improved. For instance, if a system exhibits a high false match rate or low identification accuracy, developers can focus on refining their algorithms to reduce errors and enhance overall performance.

Paperless Travel Initiatives and Their Evaluation in FRVT

Utilization of Face Recognition Technologies in Paperless Travel Initiatives

In recent years, face recognition technologies have been increasingly utilized in paperless travel initiatives to enhance airport security and streamline the passenger experience. These initiatives leverage the power of biometric data, specifically facial images, to automate various processes throughout the travel journey.

By capturing and analyzing visa images or other biometric data at different checkpoints, such as check-in counters, security screening areas, and immigration controls, airports can expedite the verification process while maintaining robust security measures. This technology enables passengers to move through these checkpoints seamlessly without the need for physical documents or manual identification checks.

NIST’s Evaluation of Face Recognition Technologies

The National Institute of Standards and Technology (NIST) plays a crucial role in evaluating the effectiveness of face recognition technologies used in paperless travel initiatives. NIST conducts evaluations through its Face Recognition Vendor Test (FRVT) program, which assesses the performance and accuracy of various algorithms and systems.

Through comprehensive testing protocols, NIST evaluates how well these technologies perform across different scenarios, such as varying lighting conditions, pose variations, age differences, and image quality. The goal is to ensure that face recognition technologies are reliable and effective in real-world applications.

NIST’s evaluations provide valuable insights into the strengths and limitations of different face recognition systems. This information helps policymakers, airport authorities, and technology developers make informed decisions about deploying these technologies within paperless travel initiatives.

Contributions to Streamlining Airport Processes

Paperless travel initiatives evaluated by NIST FRVT contribute significantly to streamlining airport processes and improving border control. By leveraging face recognition technologies at various stages of the travel journey, airports can achieve several benefits:

  1. Enhanced Security: The use of biometric data ensures a high level of accuracy in identifying individuals compared to traditional identification methods. This enhances security by reducing instances of identity fraud and unauthorized access.

  2. Efficient Passenger Experience: Paperless travel initiatives eliminate the need for passengers to present physical documents repeatedly, reducing wait times and enhancing the overall travel experience. Passengers can move through checkpoints swiftly, leading to improved efficiency and reduced congestion.

  3. Increased Automation: By automating identification processes using face recognition technologies, airports can achieve higher levels of automation in their operations. This reduces the reliance on manual interventions, resulting in cost savings and improved resource allocation.

  4. Improved Border Control:

Recognito is NIST FRVT Top 1 Algorithm Provider

Recognito: A Leading Algorithm Provider

Recognito has established itself as the top algorithm provider in the National Institute of Standards and Technology (NIST) Face Recognition Vendor Test (FRVT). This prestigious recognition highlights the exceptional capabilities and performance of Recognito’s facial recognition technology.

NIST FRVT: The Standard for Evaluation

The NIST FRVT serves as the benchmark for evaluating facial recognition algorithms. It rigorously tests various algorithms against a set of standardized metrics, ensuring accuracy, efficiency, and reliability. Being recognized as the top algorithm provider in this evaluation demonstrates Recognito’s commitment to excellence and innovation.

Unparalleled Accuracy and Performance

Recognito’s achievement as the NIST FRVT Top 1 Algorithm Provider can be attributed to its unparalleled accuracy and performance. The algorithm consistently delivers outstanding results in terms of identification accuracy, speed, and robustness. Its advanced features enable it to handle diverse scenarios with ease, making it a reliable choice for various applications.

Robust Against Challenging Conditions

One of the key strengths of Recognito’s algorithm is its ability to perform well under challenging conditions. It excels in scenarios involving low-quality images, occlusions, variations in lighting conditions, or changes in facial expressions. This robustness ensures that Recognito’s technology can effectively handle real-world situations where other algorithms may struggle.

Versatile Applications

Recognito’s algorithm finds applications across a wide range of industries and sectors. Its versatility allows it to be used for identity verification in airports, access control systems for secure facilities, surveillance systems for public safety, or even customer authentication in financial institutions. The reliability and accuracy provided by Recognito make it an invaluable tool for organizations seeking robust facial recognition solutions.

Ethical Considerations

While recognizing Recognito’s achievements in the field of facial recognition technology, it is crucial to address ethical considerations associated with its use. As facial recognition becomes more prevalent, it is essential to ensure that privacy and data protection are upheld. Recognito is committed to adhering to strict ethical guidelines, prioritizing user consent, and implementing secure data management practices.

Continued Innovation

Recognito’s success as the NIST FRVT Top 1 Algorithm Provider serves as a testament to its dedication to continuous innovation. The company remains at the forefront of research and development in facial recognition technology, constantly striving to improve accuracy, efficiency, and user experience.

Conclusion

Congratulations! You have now gained a comprehensive understanding of the NIST FRVT and its various aspects. From exploring the verification performance to delving into related projects, you have witnessed the power and potential of facial recognition technology. The results and performance metrics have shed light on the capabilities and limitations of different algorithms, while the evaluation methods have provided insights into the fairness and transparency of these systems.

As you reflect on the impact of demographics and masks in FRTE, as well as the evaluation of paperless travel initiatives, you realize the far-reaching implications of this technology in our society. Facial recognition has the potential to revolutionize security measures, streamline processes, and enhance convenience. However, it also raises important ethical considerations that must be addressed to ensure fairness, privacy, and accountability.

Now armed with this knowledge, it is up to you to engage in further exploration and critical thinking. Consider how facial recognition technology can be responsibly utilized in various domains. Advocate for policies that prioritize transparency, accountability, and inclusivity. By actively participating in discussions surrounding facial recognition technology, you can contribute to shaping a future where this powerful tool is used for the greater good.

Frequently Asked Questions

FAQ

What is NIST FRVT?

NIST FRVT stands for National Institute of Standards and Technology Face Recognition Vendor Test. It is a benchmarking program that evaluates the performance of face recognition algorithms provided by different vendors.

How does NIST FRVT assess verification performance?

NIST FRVT assesses verification performance by measuring the accuracy of face recognition algorithms in correctly verifying whether two images belong to the same person or not.

Can I participate in FRVT?

Yes, you can participate in FRVT as a vendor by following the guidelines provided by NIST. The comprehensive guide to participating in FRVT will provide you with all the necessary information and steps to join the evaluation.

What are FATE projects in relation to NIST FRVT?

FATE projects refer to evaluations conducted under Fairness, Accountability, Transparency, and Ethics considerations. These projects aim to ensure that face recognition technologies are unbiased, transparent, and ethical.

Is Recognito the top algorithm provider for NIST FRVT?

Yes, Recognito is recognized as one of the top algorithm providers in NIST FRVT. Their face recognition algorithm has demonstrated exceptional performance and accuracy in various evaluations conducted by NIST.

photo_2022-12-13_14-02-37

Video analytics for combatting medical and environmental crises

High performance biometric data provides the knowledge required to manage and control the movement of individuals and people in medical and environmental crises.

The COVID-19 pandemic has demonstrated that face recognition can play a key role in stopping the spread of epidemics in cities and large enterprises, such as commercial areas and industrial facilities. The technology has shown a great deal of effectiveness in identifying those who violate quarantines, essential to preventing the spread of the virus, while tracking their social interactions and providing notifications to respective authorities. This identifying and flagging has undoubtedly prevented infections and saved lives.

The main challenge faced by every country exposed to medical crises is the sudden surge of infected people placing immense pressure on the healthcare system and risking total shutdowns of over-burdened infrastructure. Being able to set up an intelligent surveillance system that decreases manpower and person-to-person contact requirements is crucial in fighting infection rates.

Face recognition technology offers an unprecedented capability to cities, and local authorities to ensure quarantine is maintained, and infection spread curtailed, by employing face recognition along with a number of associated technologies. CCTV cameras detect and identify people in the streets in real time allowing their identification for an immediate relevant response, while AI analyses social connections.

Face recognition software is the only system in the world that can reliably track and trace contact’s made by infected persons. Apps that use the geolocation and Bluetooth functions have many flaws, as the geolocation function can be extremely inaccurate, Bluetooth function can be turned off, and in many cases mobile phones are shared by multiple users or simply left at home. Our system has a social connections analysis feature that can precisely detect contacts between individuals of less than two metres. This function alone can sufficiently reduce the number of people put under the stresses of quarantine and medical examination, as it can effectively illuminate their chances of being contaminated when proximate to someone who is known to have it.

The convergence of massive volumes and variety of images with advances in computer vision software made affordable for cities to deploy video intelligence capabilities on a variety of architectures, from core datacenters, to cloud to embedding computer vision in edge computing. As a result, cities have been able to expand the public safety use cases, in which they can surveil, detect, recognize people, objects and events, interpret patterns, and empower better decisions with high accuracy and speed. These use cases include crowd monitoring, searching for criminals, identifying missing people in case of emergencies, improving access control, enhancing physical security in schools, hospitals, airports, and sport arenas, and, of course in the COVID-19 aftermath, monitoring behavior that could increase the risk of spreading of viruses.

photo_2022-12-13_14-02-36

Video analytics for retail stores

Video surveillance systems have ceased to be just cameras monitored by security officers making sure that someone who ‘forgot’ to pay does not take something out of the store or a negligent cashier does not cheat the customer. Today, these platforms use big data and machine learning, neural networks, and much more.

What is video analytics? It’s far more than shoplifting prevention

Video analytics today is a complex layer of technologies based on computer vision and machine learning. And this technology is becoming increasingly commonplace. For instance, four out of every ten (41%) of England-based medium and large-sized businesses which are running CCTV systems have already deployed facial recognition analytics in their systems to capture human faces and compare images to databases with a view to identifying matches for access control, event security or for public safety purposes.

Retail is one of the business fields that makes successful use of video analytics systems and you can argue with conviction needs it the most. The pace of adoption in retail allows us to say with confidence that video analytics will become an integral part of our life and are likely to be ubiquitous within three or four years.

Many retail uses, many benefits

The main use of video analytics in retail is to combat loss and theft. In the US, retailers’ losses due to theft, fraud, and other causes totalled nearly $62 billion in 2019, up from nearly $51 billion the previous year said the National Retail Federation, the world’s largest retail trade association.

Video analytics helps not only to register a deliberate theft but also to identify a forgetful buyer, when a person accidentally passes by the cash register without paying for a purchase. A security officer stops him at the exit and asks him to pay. At this point, the forgetful customer gets watchlisted, this is a basic function in some video analytics systems. When this customer comes to the store again, security receives an alert monitors the customer closely.

The use of video analytics with overhead CCTV observation of the sales counter can be a real-time deterrent to incidents of internal shrink according to the National Retail Federation. Video analytics is the capability of automatically analyzing video to detect and determine if an anomaly has taken place based on a set of instructions built into the video software. However, its use can go far beyond identifying theft.

Keep customers coming back

For instance, modern algorithms can identify someone who forgot something in the store. The system sees when a customer enters, for example, with a bag, puts it down and leaves without it.

In video analytics systems, there are also «whitelists» that can be used to improve loyalty programs. The client uploads a photo for his account and at the checkout or the entrance, the system recognizes the customers and sends a notification to staff. VIP customers can be greeted by name and then offered tailored product recommendations.

In addition, video analytics systems enable the creation of an ID for personalized advertising in the area near the cash register for a loyalty program participant. Retail is not actively using this idea yet, but restaurants already have, for example, the CaliBurger chain in California allows registered customer to pay using their face. In a step further, face recognition also enables personalized offers and speeds up ordering.

Farewell to plastic

In the medium term, the use of video analytics will likely allow us to completely abandon plastic cards. In 2020, in Russia, a Koshelek application (which stores loyalty cards) led to over 300 million cards being transferred to this method. Plastic cards were willingly abandoned.

Video analytics systems also make it easier to keep track of employees’ working hours and also their location in a particular department, at lunch or other breaks. At a general level this may have slightly sinister connotations but for companies who suffer from poor productivity it can be a great leveller allowing the retailer to ‘reclaim’ its workforce. The data from this system can be combined with information from ERP platforms.

Queue no more

Video analytics is also useful when it comes to queues. For instance, a system can notify employees when people are unattended and stacking up at the checkout, in the fitting room, and so on. At the same time, it can collect information about queues, such as the number of people in the queue. This enables more effective resource management and can also increase average daily revenue by attending to people up were set to leave without making a purchase because of queues. A UK study by Honeywell revealed the queue prevention also increases customer loyalty by 35%.

Video analytics also helps deliver sophisticated, revenue-increasing management of products on the shelves. According to IHL Group, global retail loses approximately €900 billion a year because goods are not on shelves when customers are looking for them. A video analytics monitors shelves and sends notifications when products are running short, or a shelf has been emptied. In addition, the system also recognises when a product is in the wrong place.

Sophisticated planning

Another potential use is crowd analytics to create market reports to inform better management and planning based on data obtained from cameras. The system determines gender, age (with an accuracy of up to two years), calculates total number of visitors, including unique and returning ones, and helps to create a customer load schedule. It enables customer behavior tracking for movement through a store. This helps create store planning for customers. This idea can be scaled up for an entire shopping center.
IBM, in a study Video Analytics for Retail, spelt out clearly the benefits for retailers. It said store operations encompasses a wide variety of activities, many of which can be aided by video analytics, from planning store layouts based on customer path statistics to staff planning based on historical and instantaneous customer counts, at store entrances, departments and check-out queues. Merchandising activities can also be planned based on similar analytics choosing the location of a display based on customer paths, as well as measuring the effectiveness of a display based on customer counts coupled with sales figures.
A number of high profile retailers are already well down this route. Using audience analysis and advertising communication through strategically located media players they’ve increased sales substantially. Retail giant WalMart is going even further and building its own advertising platform to improve the user experience of customers, partly through video analytics. The company’s strategy includes media activity via TV sets in stores and outdoor screens, improving digital advertising in partnership with third-party agencies, and much more.

The roadblocks for retail

The main difficulties of using big data-powered analytics are related to the lack of the infrastructure for collecting information and the lack of historical data. For example, in video analytics, many retail projects were implemented during the COVID-19 pandemic, and the customer behavior model may change when retail returns to pre-pandemic levels of shopping.

Further incomplete or insufficient coverage of shopping areas due to the lack of cameras is an issue. That said, the cost of video cameras is set to decrease in the next five years, and solutions based on video analytics will become increasingly ubiquitous.

Of course, data protection is of supreme importance. It’s extremely important to ensure the security and confidentiality of customer data. As such camera information must remain on a store’s local server and be well protected. And face images should not be stored as images but rather as a digital description, that is, a type of code that corresponds to the image. Further, to comply with data regulations the system should be configured so that collected data is deleted every day and only summary reports are saved.
The introduction of video analytics into retail is growing, consumer trust in smart solutions and the spread of cameras and sensors are increasing, and the requisite back-office infrastructure is improving. Retailers are also recognizing that video analytics technology helps reduce the number of customers who leave a store without buying and when used for planning can not only reduce losses but also grow revenue. As such within the next five years expect to see retail video analytics platforms become the norm and not the exception.

3 tips for the introduction of video analytics in retail

  • Decide on the budget and key tasks you want video analytics to perform. A golden rule of thumb is that the bigger the feature set, the faster the return on investment especially when used to boost sales.
  • Consider the activity segments. In grocery chains it is important to work with queues, analyze visitor data and use loyalty programs at the checkout. In food only retailers there can be an acute problem with customers forgetting to pay for goods. Non-food retailers benefit from personalized offers, sales area analytics and automation of marketing tools.
  • Inform customers about the introduction of video analytics and ensure you are complying with the relevant data protection laws. The consumer has the right to know that a store, for example, is running a facial recognition system.
photo_2022-12-13_14-02-33-3

Video analytics for law enforcement

There are already over 700 million CCTV cameras installed in cities worldwide, with 20 cities having over 10 cameras installed per every 1,000 residents. Furthermore, video data captured by privately owned cameras, body-worn cameras, smartphones, drones, and dashcams offer additional precious sources of intelligence that cities can use to improve efficiency, effectiveness, and safety of policing.

The fast technological evolution, widespread adoption, and affordability of video hardware – including CCTV, IP cameras, HD 4K cameras, 360° cameras, drone cameras, dash cams, smartphone cameras, wearable cameras – provide a broad variety and high volume of data that national and city public safety agencies use as a force multiplier, to radically rethink workflows and operations to increase productivity. However, the huge volume of camera feeds must be monitored continuously to improve the productivity of policing, an activity that human cannot carry out effectively. As a result, it is crucial that public safety authorities invest in video intelligence. That is not only the ability to capture more video surveillance images, faster and in a more accurate manner, but most importantly to apply advanced artificial intelligence capabilities to:

  • Detect people, objects, and events with high accuracy and speed.
  • Recognize people, objects, and events even in challenging conditions.
  • Organize data and consistently apply appropriate governance policies.
  • Analyze and interpret data to find trends, patterns, and correlations.
  • Deliver 360° intelligent insights to improve public safety outcomes.

Advances in video analytics and artificial intelligence have drastically improved the accuracy and speed of detection and recognition of people’s characteristics, such as faces, body attributes, gender, age, as well as objects, such as vehicle make, body type, and color. Increasingly, the performance of humans in recognizing and interpreting images is being surpassed by computer vision. In essence, city public safety authorities can let the software do the heavy lifting and alert human operators when it detects anomalies, thus reducing the lag time needed to dispatch first responders. Or it can flag suspects by matching millions of images with criminal records, thus speeding up the work of case investigators on the thousands of petty crimes that consume most of police time and resources and instead free up their time to focus on more complex investigation. For instance, Beijing Public Security Bureau estimated that thanks to surveillance cameras, officers detained 5 percent more suspects in 2015, compared with 2014.

The convergence of massive volumes and variety of images with advances in computer vision software made affordable for cities to deploy video intelligence capabilities on a variety of architectures, from core datacenters, to cloud to embedding computer vision in edge computing. As a result, cities have been able to expand the public safety use cases, in which they can surveil, detect, recognize people, objects and events, interpret patterns, and empower better decisions with high accuracy and speed. These use cases include crowd monitoring, searching for criminals, identifying missing people in case of emergencies, improving access control, enhancing physical security in schools, hospitals, airports, and sport arenas, and, of course in the COVID-19 aftermath, monitoring behavior that could increase the risk of spreading of viruses.

There are three main usage scenarios in which artificial intelligence algorithms improve the productivity of day-by-day policing in cities:

  • Recognize faces (or body attributes) rapidly by processing video streams from the city’s CCTV system at a fast rate, rather than waste time of human operators staring at millions of frames. The computer-recognized face’s feature vector and metadata (e.g. time, location) can then be stored as an object in a database for future usage. The stored object is totally anonymous and cannot be used to reconstruct the original video frame, thus inherently protects individuals’ privacy.
  • Match faces captured by the city CCTV system with video footage from criminal records to establish identity and involvement of suspects in a crime, hence speed up criminal investigations. In fact, academic research demonstrates that when video footage is used, crime clearance rates improve14. Besides matching a face (or body shape) of a known criminal to identify him/her as the person that committed a crime at a certain location and time, the face recognition metadata also allows for more complex investigations, such as placing a certain person near (in time and space) other people that may be involved in the crime. These analyses must take place in compliance with regulation on police investigative power and authorizations granted by magistrates, thus it is important that the matching algorithms are processed within police-protected IT systems.
  • Conduct real-time searches of suspects to identify their current location to enforce arrests. Accurate and current information on the location of the suspect is important to ensure not only the efficacy of the arrest, but also the safety of officers. Similar real-time searches can be used to identify individuals that, for example, have been banned from entering certain facilities, such as sports arenas, thus block them before they do so, while not imposing burdensome personal inspections to every legitimate spectator.
    The combination of massive amount of video with these artificial intelligence capabilities bears the potential for city public safety authorities to work much more efficiently and effectively, thus reducing criminal behavior, by showing how much faster police can punish bad behavior.

Furthermore, cities that have invested in face, body shape, vehicle recognition can use the capabilities in other city domains, such as traffic intelligence to identify congested roads and recommend alternative routes, infrastructure condition monitoring for preventive maintenance, and flood or other natural disaster monitoring to enhance safety and search of missing persons.

What we offer:

  • Off-the-shelf face, body attributes, and object, in particular vehicle, recognition capabilities that are primarily applied to public safety use cases, and the agility to extend and re-train algorithms for other use cases, such as traffic intelligence.
  • High-performing algorithms that can work with data from real-time video streams or large video databases.
  • Beyond object detection and recognition, the software can carry out analysis finding trends, incidents, and correlations to build video intelligence solutions.
photo_2022-12-13_14-02-36-3

7 tips for city leaders to leverage the power of video analytics

Advances in video analytics and artificial intelligence have drastically improved the accuracy and speed of detection and recognition of people’s characteristics, such as faces, body attributes, gender, age, as well as objects, such as vehicle make, body type, and color. Increasingly, the performance of humans in recognizing and interpreting images is being surpassed by computer vision.

City public safety leaders, such as chief investigators, real-time crime centers commanders, and traffic management operation center managers that want to leverage the power of video intelligence must:

  • Inventory existing video surveillance cameras and video management systems to assess their costs and their connectivity, data transmission, archiving, and cybersecurity capabilities. The inventory should be matched against the city historical data of crime patterns to understand which cameras need to be upgraded to feed data into advanced video intelligence AI systems, which ones can be discarded to save money to be invested in new hardware and software.
  • Prioritize investment in people/object detection AI algorithms that can increase the productivity and effectiveness of police officers in charge of analyzing video footage. The investment in AI must align technology innovation with key public safety goals, such as crowd safety at mass events, search and find of criminals, search and find of missing people, time to respond to emergencies, perimeter control in critical locations.
  • Select video AI software platforms that offer best-in-class performance in people/object detection and recognition, including in challenging conditions (e.g. people wearing face masks) to avoid false positives that can create an overload of activities for public safety officers and investigators and, of course, avoid false negatives that put citizens and officers at risk. Procure solutions that are open and interoperable so that they can ingest data from multiple sources, including legacy cameras.
  • Invest in GPU processing and video management software and storage capabilities to optimize the performance of face/object recognition AI software platforms.
  • Leverage the modularity of video AI software platforms to configure, deploy, and administer them in a way that secures compliance with data protection regulation. For instance, face recognition software must archive only objects with feature vectors and metadata, and not the actual images, the processing of objects to match them against video archived in criminal records must take place in police-protected systems and can only be carried out by authorized officers, and the queries that enable to intake the data from the face recognition object database for matching purposes must also be logged only in police-protected systems.
  • Deploy video intelligence capabilities in combination with adequate change management resources, including engaging and training public safety officers that will eventually have to make the critical decisions, based on the insights from the AI algorithms.
  • Combine video intelligence with a holistic approach to improving the city safety, such as engaging with community organizations that take care of neighborhood watch activities or collaborating with correctional and social service agencies that work to reduce re-offending rates.

Ongoing research and innovation constantly enhance our expertise to better support our customers and deliver 360° intelligent insights to improve public safety outcomes.

photo_2022-12-13_14-02-33-2

How to increase safety and security with video analytics

The world is urban. According to the UN, almost 70 percent of people will live in cities by 2050. City leaders that want to deliver on the promise of UN Sustainable Development Goal 11 to «Make cities and human settlements inclusive, safe, resilient and sustainable» must make the city economic growth inclusive, the infrastructure more resilient, the mobility of people and goods more convenient, affordable, and environmentally sustainable, and, last but not least, their communities safe.

In fact, according to studies like the EIU Safe City Index, there is a virtuous cycle between economic growth that depends on a secure environment and higher income that makes it affordable for cities to make safety-increasing investments. Studies conducted across U.S. cities proved, for example, that cutting homicides by 10 percent increases housing values by 0.83 percent.

Increasing investment in public safety personnel can improve city safety; for instance, estimates indicate that an additional 10 to 17 officers hired prevented one new homicide per year and more officers and investigators can reduce the time that is required to solve a violent crime such as homicide. But cities and public safety authorities are always dealing with resource constraints. So, increasing the number of police officers is not affordable, or not enough. Cities need to improve productivity of the public safety officers that they have available. One of the keys to improve productivity is to invest in technology innovation to extract intelligent insights from data that empower city leaders to improve public safety policies, services, and operations.

According to INTERPOL, «data is at the heart of international policing. When the right data is in the right hands, it can give law enforcement a comprehensive global picture of crime trends to help them tackle emerging crimes more effectively.»

City safety globally is undergoing a process of digital reinvention, some facets of which have been further catalyzed by the impact of COVID-19. City leaders across the globe are working with police forces and other first respondents to realize the benefits of next-generation 911 systems, early warning systems, real-time crime centers, digital evidence management, digital forensic and intelligence, and data sharing platforms. For instance:

  • Data must not only be collected from CCTV cameras, radiation, chemical and gunshot detection sensors, 911 logs and fed into integrated command centers, but must also be analyzed with advanced AI algorithms to recognize people, objects and events, detect anomalies, and promptly alert command center operators. Cities and police forces that do not integrate multiple sources of data will have a siloed view of the risks. Those that do not apply advance analytics will overwhelm operators with visual information that is impossible to interpret, hence paralyzes their ability to respond to real emergencies.
  • Data sharing platforms are also providing investigators with digital evidence management and analysis capabilities to speed up forensic investigation and capture wanted criminals. Investigators that do not have access to easy-to-use archival, search, and analysis of evidence are slowed down by a backlog of cases and run higher risks of breaking chain of custody that must be auditable from ingestion to case closure.
  • Public safety authorities are also investing to deliver relevant information at the fingertip of officers in the field. Mobile policing gives officers access to portable command centers, investigative databases, and notification capabilities that provide real-time information on location of emergencies and suspect criminals, which increases operational efficiency, effectiveness, and officer safety.

Research and innovation to develop new automated systems for surveillance, such as drone fleets that can fly automatically, acquire data, detect and locate people, objects, hazards, events, and provide real-time reports along with suggested actions, such as the number of required police patrols, ambulances, or fire trucks to be mobilized, are continuing. Therefore, city public safety authorities must invest in advanced analytical and AI capabilities that enable them to interpret the data that they have today to promptly capture criminals, and easily integrate and interpret new sources of data in the near future.

photo_2022-12-13_14-02-36-2

How to prevent misuse of face recognition technology

As a team of engineers, we are firm believers in technology for good, however face recognition companies must actively monitor the deployment of their technologies to ensure that that value is upheld, irrespective its deployment.

In consideration of smart cities – it is generally the police who would use face recognition software. The criminal databases they check video sources against shall remain entirely within the police systems and are not shared with any third parties. In this capacity, the software is a hyper-efficient update to the traditional policing methods that police camera operators would have been manually doing for a number of years.

At a software level, the algorithms must work with unique face features which makes it impossible to restore the original image of the face; something that is of distinct importance in protecting privacy. This means that when a person passes a camera linked to a system running our software, the image of their face is transformed into a digital imprint consisting of several lines of code, and only this digital imprint is compared against a database of similar digital imprints. It is impossible to restore the original image of the face from this digital imprint.

In a scenario where the software is being used for crime prevention, once a match is found between a database of wanted criminals, and the digital imprint of someone passing a camera, then the designated police officers receive an alert. Digital imprints of other people passing cameras are deleted once cross referenced against databases.

For commercial applications face recognition software collects anonymised data, limited to relative age and gender in order to generate consumer data and insight that enables businesses to improve brand communication and customer journeys. In cases where a business is required to react to certain people (for example, the VIP-scenario, where businesses use the system to recognise special guests to offer them VIP services) we expect businesses to receive written confirmation from individuals authorising the use of their images for such purposes.

Face recognition companies invest a lot of resource into maintaining a system that is both fully reliable and secure from vulnerabilities. The software becomes highly configurable and modular, which allows to make substantial additions or turn some features off for different markets – for example, customers can blur the faces of unknown people in the system, so that the operators will never receive any of their footage.

How do we ensure your software is not being misused

In every country we work in strict compliance with local laws and regulations, and we thoroughly check and vet our clients. Once our software is deployed, it is imperative that we ensure privacy by having no contact with the process of ongoing implementation, and clients do not need to use servers owned or operated by Recognito, allowing them to operate our software on their own secure servers.

Questions have been raised around misidentification and bias, and we are aware that other face recognition systems have displayed such issues in the past. However, unlike organisations that have encountered this problem, we trained our software’s neural networks with stimuli from different ethnicities, skin tones, and genders in equal proportions. The distinct way our neural network is built, combined with our engineering talent has ensured we mitigate against biases.

We are strong supporters of the deployment of face recognition, as long as it is done in a controlled and responsible manner that serves the public good first and foremost.