Successful Facial Surveillance Case

By John Honovich, Published Jan 07, 2013, 07:00pm EST (Info+)

Real time facial surveillance is hard to do - accuracy issues, false alerts, cost and deployment complexity all conspire against it. This is why, more than a decade after deployments started they still remain remarkably uncommon. However, one application - self exclusion list - offers great promise and at least one practical example. In this note, we examine what key features make it work where most others have failed.

Self Exclusions List

******* ************** ********* **** ********* ***** to ******* *** ****** *** **** gambling **********. *** **** ** ** help ***** ****** **** **** **** casinos ***, ** **** **, ***** their *****.

*** ********* *** ******* ** **** they **** **** ******* ** ******** plus ********* *** *** ** *** self ********* ****. **** ***** ** very **** *** **** ******* ********* to ***** ***** ** *** ****.

Ontario ****

********,******* ************ ****** ************ ****** ** ***** this. **** ******** **** *** ************, a *** ********** ******** ******* **** the ******** **** *** *** ****** in ***** *** *****:

******* ******** ********

****** *********, ****** *** *** ** the **** ********* **** *********** ****** into *** ****** ** ****:

**** ******* ******** ******** ** *** system *** ********, **** **, **** quality ******. ** ********, ****** ************ systems ***** ****** ** ******, ******** or *** ***** ******.

********** *********

*** ************ **** **** ***** ******* have *** ***** ***** *********. **** makes ** *** **** ********* ** deploy ******* / **************. ** ********, many ********* *** ****** ********** **** many ********, ******* ***** ** ************* and ******** ****** **** ****** **** in ** ****** ** *** ******.

** **** ** ***** ********

***** *** **** ** ****** * self-excluded ****** ***** *** ****** ** modest, ********** ******** ** * ********, the ****** **** *** **** ** catch ********. **** ** ** ********** some ******* ** **** ****, ** can ** ****** ** **********. **** allows ****** ** ****** *********** ******.

***** ******** *********

************, *** ************ ************ **** *** systems *** ***** *** ***** ***********, reducing *** ****** ** ***** ********* that ********** ***** ********* *****. ****** recognition *********** ** ****** ****** **********:

  • **** *********** ******* *** ******* ********** of ******** ** *** ***** **** are ******** *** ********* *** ****** of *** ******** ******* *******
  • *** *********** ******* *** ********** ** subjects ** *** ***** **** ******** but ********* *** ****** ** ***** alarms ********* (*.*., *** ******** *******)

******* ** *** '*********' ***** *********, the ****** ** ***** ** **** avoid *** ** *** **** ****** sources ** ****** *******.

**********

***** **** ** *** **** ******* security ***********, ** **** ********* * number ** ****** *********** ****** *** how **** *** ** ******* ** certain *** *****.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts reporting, tutorials and software funded by subscriber's payments enabling us to offer the most independent, accurate and in-depth information.
Loading Related Reports