Facial Recognition

Facial Recognition

FACESEARCH Person

VIGILANT SOLUTIONS’ FACIAL RECOGNITION TOOL, PROVIDES PREPROCESSING CAPABILITIES AND ANALYZES FACES TO CONVERT IMAGES, BOTH HIGH AND POOR-QUALITY, INTO SUITABLE PROBE IMAGES FOR SEARCHING.

COMPARE YOUR IMAGES AGAINST VIGILANT’S GALLERY, WHICH CURRENTLY HOUSES OVER 15 MILLION IMAGES. START DEVELOPING LEADS AND SOLVING MORE CASES WITH FACESEARCH.

Request Your Demo Today!

  • This field is for validation purposes and should be left unchanged.

Images and Analytics Power Investigations

We support agencies of all sizes, providing more images, better recognition, and faster results:

What We Do

Your Open Cases & Actions

What We Do
What We Do

Our Analytics, Data & Insights

What We Do
What We Do

Investigative Leads

What We Do
What We Do

Closed Cases & Resolved Actions

1

Use on Any Platform:

In the field, snap photos with mobile devices to quickly identify individuals, upload images to the agency gallery to share as needed, and manage watchlists and receive alerts important to your assignment. Analysts use either Web browser–based or desktop applications to upload and process images, and then search against a gallery to identify matches.

2

Retain and Use Probe Images of Any Quality:

Breakthrough pre-processing tools give agencies the ability to use more images, even poor-quality probe images from social media, cell phone snaps and CCTV cameras.

3

Quickly Analyze Over 350 Facial Vectors:

We continue to refine and innovate to deliver more accurate recognition results.

4

Compare Images to Vigilant’s Gallery:

Our gallery continues to grow every day, now providing over 15 million images.

5

Share Data Nationwide with Other Agencies:

Easily share data among agencies nationwide with the touch of a button.

6

Host in the Cloud:

Eliminate the need for servers.

Terms to Know

This page will go into great detail on the facial recognition process and how you can leverage it to generate leads for your agency. For background, here are some important terms for you to know:

  • Facial Recognition: An application that uses biometric algorithms to detect multiple landmarks and measurements of a face that may be compared to a gallery of known images to find potential matches.
  • Facial Identification: The manual process (the human aspect) of examining potential matches from facial recognition, looking for similarities or differences.
  • Face Print: A digitally recorded representation of a person’s face that can be used for identification of the person based on unique characteristics. Also known as a Face Template.
  • Algorithm: A process or set of rules to be followed in calculations, or other operations, which is set by a computer. In facial recognition the algorithms are rules on how to read a face.
  • Gallery: Any database of known images. Gallery images can come from a number of sources, including mugshots, watchlists or hotlists.
  • Probe Image: Any unknown image captured for facial recognition. Probe images can be taken by an officer in the field using a camera or mobile phone or from other sources such as security and CCTV cameras.
  • Gallery Image: An image from an existing facial recognition database. Once a probe image is run through the facial recognition system, it is manually compared to gallery images to identify potential matches.
  • Controlled (Constrained) Images: Images with good lighting, frontal face positioning, high resolution, and acceptable distance from camera (examples: taken by a field officer, kiosk station, identification card photos). Controlled images are optimal for facial recognition matching.
  • Uncontrolled (Unconstrained) Images: Images with poor lighting, poor poses (looking down or up, and certain profile captures), low resolution, heavily pixelated, overexposed, underexposed, subject is too far away, fisheye camera captures, distorted or skewed images, pictures or recordings of a screen, photocopies with excessive noise, or occlusion (blocking any part of the face).

How Facial Recognition Works

How Facial Recognition Works
While our facial recognition solution and analytics deliver possible matches, it is up to the agency to examine the matches and apply standard investigative protocol to confirm a possible match.

1
Gallery created by capturing or uploading mugshots.

2
Probe image is uploaded to the facial recognition application.

3
The algorithm creates a face print of the probe image.

4
Facial recognition compares the probe image against the gallery.

5
Facial recognition application returns a list of possible matches.

Get the Tools and Answers You Need

computer

1

Facial Recognition for Video

Extract images from video clips acquired in your investigations. Select the best still image and import it directly into the software for searching against any gallery.

2

Reporting for Case Files

Output specialized reports detailing matches or other dispositions to include in your case files. Send images into your agency No Match Gallery and receive alerts when the image returns a possible match at a later time.

Facing the Facts About Biometric Facial Recognition Technology

I recently spoke at the Biometrics for Government and Law Enforcement conference in Washington, DC. The more I speak at these events and around the country at our Lunch and Learn events, the more...

Breakthrough Technology Improves Matching Capability

Enhancing images of lower quality is critical for successful matching in facial recognition. Having the right set of tools can generate better sets of leads for your investigations.

Introduce Missing Data:

At times, probe images have compromised data and do not meet the criteria for facial recognition searching. A few examples are an image of lower resolution, an image with occlusion to the face, or an image where the subject’s eyes are closed. Rarely will these probe images return a quality match. Our breakthrough image pre-processing technology enables you to graphically enhance the original probe image to increase the accuracy and quality of a possible match. Enhancement is done within the interface, allowing users to run facial recognition on low-quality images like CCTV stills, social media or cell phone video.

Eye Placement:

Eye positioning and placement are both critical to the facial recognition matching process, because the algorithms start with the eyes and then proceed to read other facial landmarks systematically. What if the subject in your image is not looking straight ahead? Our pre-processing tools allow a user to make the necessary adjustments to these problematic images.

original

Low Resolution and Other Poor Images:

These images are typically thrown out and not considered for facial recognition. However, Vigilant’s tools enable agencies to zoom, crop and edit images to produce a higher-quality probe image that is ready for search. Vigilant’s tools help enable agencies to edit the images for better-quality probe images, including creating a proxy image from a sketch artist or artist rendering.

Integrated Enhancement Tools Made Easy-to-Use:

Our specialized image enhancement tools were designed for the novice user. Enhance images effortlessly by sliding to the left or right or with only a few clicks of a mouse. Extract and select the best still images from your video clips and send them directly into a search. No difficult image editing applications to learn and no expensive yearly subscriptions are required. It’s all integrated into our software.

Breakthrough Technology

Look for Definitive Facial Features

1
1. Analyze the ears and hairline.

2
2. Divide the face into four quadrants.

3
3. Look for “locks” or certainties.

Once you have identified a candidate, conduct investigation and peer review.

Five Recommended Best Practices for Your Facial Recognition Investigative Workflow

Capturing good probe images, enhancing lower quality images, facial analysis, two-tier verifications, and identifying your possible match. During my tenure working as a lead detective in the New York City Police Department's first dedicated facial...

Best Practices to Prevent Facial Recognition Misuse and Bias

Combat False Narratives with These Investigative Processes The report issued by the Center on Privacy and Technology at Georgetown Law Center on October 18, 2016, makes alarmist claims about the use of facial recognition technology...

Facial Recognition: Racial Bias, Privacy & Misuse

Facts, Metrics, and Accountability Needed to Combat False Narratives about Misuse and Racial Bias Last week I read several articles which repeated misguided assertions regarding facial recognition technology. As someone who has been immersed in...

Password Reset

Please enter your e-mail address. You will receive a new password via e-mail.