Unisys ID technology can get a head

Powered by SC Magazine
 

Export potential for Unisys' SIMS face matching technology.

View larger image View larger image View larger image

See all pictures here »

Unisys is looking to export a facial recognition and imaging system developed for the NSW Police Force to law enforcement agencies in the UK, US and Hong Kong.

The vendor's Secure Image Management System (SIMS) technology uses CogniTech’s digital facial recognition technology to provide NSW Police with a 'digital vault' of stills and video data, the uses for which extend into the most gruesome aspects of law enforcement.

These include the identification of deceased victims from tattoos or even from a decapitated head.

“Heads of the deceased victims are very resilient and their features can be identified if it is photographed early enough,” said David Chadwick, director of Unisys' law enforcement program.

“You have up to two days usually to be able to photograph a face before it swells due to rigor mortis.”

The NSW Police can identify a face just as it might identify via finger prints, he said.

During a disaster scene, for example, Police can aid the identification of bodies by taking a regular photo of a face and geotagging it. Once cropped to size, Unisys’ SIMs technology can be used to search for all similar photos provided by families searching for missing relatives in the hope of find a series of matches.

A former police officer, Chadwick described how the driver of the car that bombed the Jakarta embassy in 2004 was decapitated, his head crashing through the window of an adjoining apartment block.

Even in this extreme situation, there were features on the head that helped to identify the perpetrator.

“The resilience of a head in an event makes facial recognition a worthwhile tool for investigators," Chadwick said. "You will do DNA or dental records to confirm identity."

Police are able to more quickly identify victims of plane crashes or other major tragedies, he said, to advise relatives and allow the grieving process to begin without the burden of uncertainty. This usually involves the use of the manifest of who was on the flight, and the matching of photos supplied by relatives with victims identified at the scene of the disaster.

Disaster victim identification is an important process where there are mass casualties, he said. The aim is to reunite deceased with their loved ones - and only their loved ones.

How SIMS works

Developed using Microsoft Silverlight, Unisys SIMS solution is a suite of products that permits the distribution, management and processing of images and multimedia in enterprise environments.

The NSW Police Force uses SIMS to upload digital images from any source and securely archive the original in a digital vault. Police can then attach metadata tags – such as case number, photograph time and date, photographer name – to a working copy of the image to enable easy retrieval. Once the original image is uploaded, it can’t be modified or deleted. To ensure forensic integrity, the system tracks changes during every step.

SIMS also supports digital videos in a wide variety of formats. To make it easier for investigators to use the video footage, it is passed through a transcoding engine that converts it into a common, easily accessible format.

Unisys integrates SIMS with operational policing and other law enforcement systems using an Enterprise Services Bus.

SIMS runs on the Microsoft Windows Server platform, whilst the principles of clustering and redundancy have been used in designing the solution, enabling load sharing and fail-over.

Copyright © iTnews.com.au . All rights reserved.


 
 
 
Top Stories
Time management tips for CIOs
[Blog post] How to get to the genba.
 
Making a case for collaboration
[Blog post] Tap into your company’s people power.
 
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
 
 
Unisys MIMS face-matching technology speeds up secure face recognition.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  69%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1108

Vote