The term biometrics refers to biological measurements, some of which can be used to help establish personal identity, such as fingerprints or facial measurements.
The term predictive video analytics describes the process of using video reports and metrics to identify patterns and predict future trends.
Face Recognition Vendor Tests, or RFVT, are evaluations designed to provide the U.S. government and other agencies with emerging technologies that may help them decide how to deploy and face recognition applications.
A face recognition algorithm is built to identify various facial features by extracting identifying landmarks known as features on a person’s face. The algorithm detects and analyzes features based on their position relative to other features. Examples include the size, shape and placement of the nose, jaw and cheekbones. A sophisticated facial recognition algorithm can be used to identify an individual utilizing thousands of features on their face and then comparing those features against a database of photographs.
A retail surveillance system is a system that is designed to help retail companies identify incidents of retail crime including shoplifting, robberies and violence. Surveillance is one of the primary methods used by loss prevention teams to reduce retail crime. Retail surveillance systems began by using CCTV systems, but have recently evolved to leverage biometrics in order prevent more crime by instantly identifying known retail criminals.
Asset protection software refers to software that is specifically designed to help companies protect assets and prevent losses. Software might be used to help define, build or manage the execution of objectives in order to protect an individual or company’s physical and human assets.
The definition of biometric authentication is a process that is used to determine an individual’s identity based on that person’s unique biological characteristics. Biometric authentication is typically used in computer science as a way to establish identity and control individuals’ access to certain areas. Authentication occurs when biometric data that is captured is compared to stored biometric data and there is a match.
The term biometric surveillance, often used synonymously with the term “surveillance based facial recognition,” refers to surveillance that leverages biometrics to help establish personal identity.
The term closed-circuit television (CCTV) describes a video surveillance system, with the related term “CCTV Cameras” referring to the cameras that transmits visual signals within a limited system.
Compliance with The Criminal Justice Information Services (CJIS) division is necessary to keep networks aligned on matters of data security and encryption. It is also necessary to ensure that sensitive intelligence data doesn’t fall into the wrong hands.
The definition of face detection refers to a subset of computer technology that is able to identify people’s faces within digital images. Face detection applications employ algorithms focused on detecting human faces within larger images that might contain landscapes, objects and other parts of humans.
The term face recognition refers to a technology that can capture individual faces from photographs or video and identify the individual by matching faces to those on a secure database.
Feature recognition (also called automatic feature recognition) is the ability for computers to recognize geometric or topical entities and group them. These features often refer to the features on a face and might include the eyes, nose, chin, eyebrows and other facial features. Feature recognition methods are often used in biometrics and face recognition algorithms.
The term forensic video analysis describes a scientific process by which video is analyzed and compared, often for a criminal investigation.
The term geo-fencing refers to the use of technology to define geographical boundaries.
The term intelligent video (IV) refers to video that inherently automates video analysis, or at least includes technology that eliminates some manual processes.
The term IP Surveillance refers to an evolution in traditional CCTV surveillance systems in which video captured by digital cameras is transmitted over an internet protocol network.
Retail loss prevention technology refers to technology that is designed to help retail companies maximize profit by minimizing losses of profit. The practice of loss prevention operates under the framework that certain losses are preventable. Examples of preventable losses in retail might be due to fraud, internal shrink, shoplifting or organized retail crime (ORC).