HD Camera / Face Rec / Door Controller All-in-One

Author: Brian Rhodes, Published on Apr 30, 2014

Is it a security camera, face recognition reader, or a door controller?

Stand aside people: BioCam 300 claims to be all three, and more.

Should you consider this device for your systems? What are the downsides?

We take a look at the key features, pricing and competitive positioning inside.

** ** * ******** ******,*************** ******, ** * **** **********?

***** ***** ******: ****** *** ****** ** ** *** *****, and ****.

****** *** ******** **** ****** *** **** *******? **** *** the *********?

** **** * **** ** *** *** ********, ******* *** competitive *********** ******.

[***************]

********

*************** ** ** "*** *****'* ***** ** ** ****** **** embedded ****** *********** *** ******* ** * ****** ****" *** if *** ****, ********* *** *** **** ****** ******. *** ~8"x8"x8" **** *********** ** * *****-****** ******-***** ******, **** ***** IR *** ****, *** * *" *** ******* ******* **********:

*** ************* ****** ****** ** ***** ************ ******, * ****-*** ****** ******, * ****** **** monitor, *** * ********** **** ********** ** * ****** ****. When *** ***** **** ** ***** ******, *** ****** ******** surveillance ****** ** *** *****

*** ********

  • **** ******: *** **** ** ******** ** ** ******* **** ***** so ** *** ******* ******** ** *****, *** **** ******* those ***** ******* *** ******** ** '****** ********' ***********. ** to *** ***** *** ** ****** ** *** **** (** templates *** ****), ***** ** ****** ** ***** *** ******** in **** **** * *******. *** **** ****** ** *** scan ** ** ** **** ****, *** *** ******** ** LEDs ********* ******** **** ** **** *********.
  • ** ************ ******: *** **** **** ******** * **** ****, ** ***, day/night ****** **** ******** *****. *** **** *** ** ********** to ****** ** ****** ******* ** *** ******, ******** ********/******, ***** *** **********, *** **** *.***.
  • **** **********: ******, *** **** *********** ******** ** *** ****, *** has************ ***** *** ***** *******, *******, ** *** *******. ********* is ******** ** **** ** * '**********' ****** ******, *** while **** ********* *** *********** *** ** ****** **********, *** unit ****** ** ********** **** ****** *** ***** ****** *********.
  • *** ***: ***********, **** *** *** ******* ******** ** *** ****, it **** *** *** ***** **** ********, *** ******* ******** a ***** @ *.** ***** ******.

****

***** *** ****** *** ** ***, ** ** ******** ** have * ~$*,*** ****** *****. *** ********************** ******** *** ****** ** *** *********, *** *** ******* may ********** ** ********* ***** ********* *****, *** ********************.

*** * **** **** **********, ***** *** ****** *******, *** price ** ********** ********** ****** ***** *** **** ** ***********, one ** ****** ** **** ** * ***** ***** **** entry ******. ** *** ******** / *********** ****, ******* **'***' - * **** *********** / ******** *******.

***************

***** *** **** ** ******** ** ****** ***** ****, ** does *** **** *** ****** **** ** *** *** ***. Absent ** ****** ******* *** ************ ** *******, ********* ****** should ** **** ** ***** ******:

  • *****:******* *** *********, *** *** ************ ******** ***** *************** ******* ******** ****** ******* * ** '********* **************'. ***** *** **** with ***** ******, *** ****** ******** ***** *** ********* ** a ************ ****** **** *******.
  • **** *** ********:*****, ******* ******* *** **** *** **************************** *** *****, ****** ****** ** **** ***** ** *******. While ******* ************* **** *********** ****** ** *** ***** ** less, ***** ** ** ********** ** *** ******** ***** ******** are **** **** * *** *****.
  • ******* ***********:***** ********* ** ***** **** * ****, **** ******** ******** and ***** ****, ** ** ******* ******* *****, ***** *********, nor ****** ***** *****. ***** **** ****, ************** ** ********** components ** *** ********, *** ** *** **** **** ***, the ****** ****** **** ** ********.

Unit *********** / *********** ********

*******, ** ****** *** ************* ** ********** ** *** *******, one ******* ******** ** *** **** ************** ** *** ********* to *******: ******** ********.

*** *******'***************** *** ******** ********** *****:

*** ****** **** ** ******* *** ****** **** ** ******** good ****** ** *****, *** **** *** ***** ** ********** to ********* ** *****. ***** ************* **********, **** *** ******** of *** *** ** ***** ******* *********** **** ****** ** hats *** ********************* **** **********. ******* ******** ******** ** *** ********* **** ** *** **** leaves **** ****** ********** ** ******* *********, ******* **** ********.

*** **** ** ***** ** ********'* ********* ********* *****?****, *** ********* ******* ** ******* ****** ***** ******* ***** potentially **** ** **** ******. ******** * ***** ** ******** in * *** *** *** ** ****, *** ** ******* difficult ** ***** **** **** ** ******** **** *** ****** in ***** ** *** ***** ***** **.

Comments (10)

If the system is running in a verification mode (1:1) as it should for access control applications, then the number of faces in the database will have no bearing on matching accuracy and false alarm rates.

... the number of faces in the database will have no bearing on matching accuracy and false alarm rates.

So are you saying if it doesn't work with ~400 faces don't expect it to work any better with ~40? That's too bad because the latter is probably closer to the SOHO sweetspot...

I may have expressed myself poorly. While running in verification mode the number of users enrolled in the database will have no bearing on 1:1 verification matching performance, because the user presumably asserts his/her identity and the live image(s) is compared to the database image(s) corresponding to that user only. The number of images captured during runtime and enrollment for each user will likely have a bearing on matching accuracy. However, the technical matching performance for each user may either improve or degrade with the nature and number of images used depending on how the system makes use of them.

Skip - I'm not sure I totally follow your post. Are you saying that facial ID should be used as a sort of secondary verification mechanism, instead of being the primary/only verification mechanism?

With regards to FR accuracy: The product does have provision for wiegand inputs, so it could run in a two factor verification mode: User asserts identity with a possession factor (e.g., card) and FR camera verifies identity with biometrics (1:1 match). The accuracy of this mode will be much higher than identification mode (1:Many). In ID mode, the user looks at the camera, and his/her face is compared to every other image in the database (up to 400 users @ several images / user). Achieving good technical performance in this mode requires much stronger biometric performance as the probability for false match is much higher.

What I don't get about the recent burst of face-recognition access control products is where the real application is.

It seems like there are two primary cases:

1) Face-as-credential. This one still seems way to prone to false reads and delays, negating the ease-of-use factor when users get locked out or spend 10+ seconds at the door trying to get through.

2) Face-as-secondary credential. This one seems more practical because you're comparing the face read at the door to a known set of profile images, but it's still generally more costly and time consuming that something like an iris scan or fingerprint scan. The hardware is also bulky and ugly (for a door ornament) relative to other options.

I can't help but feel like facial recognition access control and 3D printers have a lot in common as that "gee whiz" thing that just can't really find a feasible fit in the marketplace just yet. This limits it to novelty and niche applications, which slows down overall adoption and R&D.

Are you seeing facial recognition applications that are truly viable and practical for a mainstream deployment?

Shouldn't the door controller be on the secure side of the door?

What if I take a full sized picture of an authorized person and hold it up in front of my face? At least it would be cleaner than chopping their head off!

Ken - I actually tried that, didn't work. I am guessing the facial geometry stored as the credential doesn't work when you have a flat 2D image.

What if the spoofed face was 3d?

Shades of Brian's Frankenfinger...;)

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Camera Course Winter 2019 - Last Chance on Jan 24, 2019
Today, Thursday Jan 24th is the last chance to register for the Winter 2019 Camera Course. This is the only independent surveillance camera...
The IP Camera Lock-In Trend: Meraki and Verkada on Jan 18, 2019
Open systems and interoperability have become core features of video surveillance systems, as virtually all professional IP cameras integrate with...
Access Control Records Maintenance Guide on Jan 16, 2019
Weeding out old entries, turning off unused credentials, and updating who carries which credentials is as important as to maintaining security as...
Access Control Cabling Tutorial on Jan 15, 2019
Access Control is only as reliable as its cables. While this aspect lacks the sexiness of other components, it remains a vital part of every...
Avigilon Favorability Results 2019 on Jan 15, 2019
Since IPVM's 2017 Avigilon favorability results, the company was acquired by Motorola and has shifted from being an aggressive startup to a more...
Wavelynx Access Control Manufacturer Profile on Jan 10, 2019
Denver-based WaveLynx is not well known as an access reader manufacturer, but OEMs for big industry brands including Amag, Isonas (Allegion),...
H.265 / HEVC Codec Tutorial on Jan 08, 2019
H.265 support improved significantly in 2018, with H.265 camera/VMS compatibility increased compared to only a year ago, and most manufacturers...
Surveillance Codec Guide on Jan 03, 2019
Codecs are core to surveillance, with names like H.264, H.265, and MJPEG commonly cited. How do they work? Why should you use them? What issues may...
Combating Vaping Epidemic - Halo Smart Sensor Profile on Dec 21, 2018
Youth vaping has become an epidemic, according to the US Surgeon General, while the market leader, Juul, just received a $12.8 billion investment...
ONVIF Profile T Examined on Dec 21, 2018
Despite ONVIF's overall success (11,000+ devices supported), ONVIF has been criticized for its limitations and problems, including VMD and video...

Most Recent Industry Reports

Testing Bandwidth vs. Frame Rate on Jan 23, 2019
Selecting frame rate has a major impact on surveillance bandwidth and storage consumption. But with smart codecs now common and cameras more...
Camera Course January 2019 on Jan 23, 2019
This is the only independent surveillance camera course, based on in-depth product and technology testing. Lots of manufacturer training exists...
Bosch Favorability Results 2019 on Jan 23, 2019
Bosch's favorability moderately strengthed, in new IPVM integrator statistics over their results from 2017, with 2019 results showing strong net...
Intersec 2019 Show Report on Jan 23, 2019
The 2019 Intersec show, held annually in Dubai, is now complete. IPVM attended for 3 days, interviewing numerous Chinese and Western video...
2019 Camera Book Released on Jan 22, 2019
This is the best, most comprehensive security camera training in the world, based on our unprecedented testing. Now, all IPVM PRO Members can get...
Milesight Company Profile on Jan 22, 2019
Milesight Technology, a Chinese company building an International branded business, says they are slowly building their presence through a series...
Cable Trenching for Surveillance on Jan 21, 2019
Trenching cable for surveillance is surprisingly complex. While using shovels, picks, and hoes is not advanced technology, the proper planning,...
Milestone Favorability Results 2019 on Jan 21, 2019
Milestone's favorability moderately strengthed, in new IPVM integrator statistics over their results from 2016. While the industry has been...
The IP Camera Lock-In Trend: Meraki and Verkada on Jan 18, 2019
Open systems and interoperability have become core features of video surveillance systems, as virtually all professional IP cameras integrate with...
NYPD Refutes False SCMP Hikvision Story on Jan 18, 2019
The NYPD has refuted the SCMP Hikvision story, the Voice of America has reported. On January 11, 2018, the SCMP alleged that the NYPD was using...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact