Feeds

Grampian police trial facial biometrics

If the face fits, you're nicked

  • alert
  • submit to reddit

The Essential Guide to IT Transformation

Grampian Police are to use a biometric facial recognition systems to help identify and process suspects more rapidly.

The system is supplied by Steria and integrates Imagis' ID-2000 face recognition technology to confirm the identities of suspects by cross-checking against photographic records.

ID-2000 is designed to identify an individual using 692 facial descriptors to capture and identify a face. The system, which works with all races and genders, can identify suspects from images such as video, CCTV, photographs, artists' composite drawing and police e-fits.

Changes in hairstyles, or the growth/shaving of beards can be accommodated using the system.

ID-2000 uses a combination of "spectral analysis and 3-D modelling" to locate and fit a face.

Head of Information Technology at Grampian Police, Chief Inspector Carl Ashcroft explained that the system enables rapid identification of people taken into custody.

"We're adding it to our existing fingerprint identification system. Essentially, its a belt and braces approach," Chief Inspector Ashcroft told us.

Grampian Pilot is currently piloting the facial recognition technology, and integrated it with its existing systems. It hopes to go live with the technology in custody suites within the next six weeks.

In the future, Grampian hopes to link the system to process CCTV footage. During major police inquiries many police hours can be spent going through CCTV tapes and its hoped the system with save a great deal of time. With the introduction of digital CCTV, facial recognition will become more reliable.

Facial recognition in crowd settings, used in conjunction with analogue systems, is far from perfect.

Chief Inspector Ashcroft conceded this point but said that the Imagis system was around 70 per cent reliable in crowd situations, far better than the 50 per cent or less reliability attached to earlier systems.

Using facial recognition technology in a controlled settings, for verification, is more reliable, he says: "We're very comfortable using the technology in controlled settings.".

Imagis' facial recognition software will be integrated into Steria's CellFile "nominal search" mechanism to search Grampian's existing database of images. A nominal file is a text and photograph record of an individual. By integrating with Imagis' software, the system will be able to identify a face by searching 15 million records within one minute, according to Steria.

The system is much quicker than manual alternatives.

Grampian Police hang out in Aberdeen and the surrounding countryside - home to 520,000 people. The new system should save police time, as it's much quicker than manual options, police say.

Grampian Police joins the UK's National Criminal Intelligence Service (NCIS), the Scottish Criminal Records Office (SCRO), West Midlands Police and Customs and Excise, in buying a Steria 'imaging' system.

The Eurodac Fingerprint Identification System, which Steria implemented for the EU, supplies 16 European countries with access to an asylum seekers' fingerprint database. ®

Related Stories

Biometric sensors beaten senseless in tests
Face recognition fails in Boston airport
Face recognition useless for crowd surveillance
Iris recognition is best biometric system
Feds use biometrics against Super Bowl fans

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.