We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byMauricio Hammer
Modified about 1 year ago
© VR Security, Inc. 1 Stephen Russell CEO & Founder 3VR Security, Inc. Search in Surveillance: A NewTool for Information Warriors
© VR Security, Inc million cameras 200 billion video hours
© VR Security, Inc. 3 Information Overload: Security manufacturers continually improve our ability to collect information … Proprietary and Confidential © VR Security, Inc. 3
4 … but our ability to “collect” has long since outstripped our ability to “analyze”, resulting in catastrophic human and economic loss. Proprietary and Confidential © VR Security, Inc. 4
5 The Security Gap
© VR Security, Inc. 6 Failure to close this gap has resulted in catastrophic human and economic loss Proprietary and Confidential © VR Security, Inc. 6
7 July 7, 2005 Proprietary and Confidential © VR Security, Inc. 7
8 How do you track 4 suspects among millions of hours of video?
© VR Security, Inc. 9 Recognizing Suspects Under Surveillance Khalid Al-MidharMohamed Atta 9/10 (Gas Station) 9/11 (ATM) Known Al-Qaeda affiliate on INS watchlist since 2000 Proprietary and Confidential © VR Security, Inc. 9
10 Surveillance –Innovation & Standards Holdout Security manufacturers have failed to leverage commercials useful innovations from information technology and management. Scalable Computing Computer Vision Search Databases SOAP/ XML
© VR Security, Inc. 11 3VR uses SEARCH technology to structure security data and connect security professionals. Proprietary and Confidential © VR Security, Inc. 11 Innovations in search and intelligent video are helping to close the information gap.
© VR Security, Inc. 12 SEARCH: Using technology to “structure” security data and “connect” security professionals is critical to transforming security industry. Proprietary and Confidential © VR Security, Inc. 12
© VR Security, Inc. 13 Proprietary and Confidential © VR Security, Inc. 13 “O’Reilly’s Internet Guide” Google Search brought “structure” to the Internet... …and in turn connected internet users.
© VR Security, Inc. 14 “Google for Surveillance” Proprietary and Confidential © VR Security, Inc. 14
© VR Security, Inc. 15 Face Recognition Restricted Area Motion Direction Abandoned/Removed Objects Use Video Analysis to Turn Video into Events
© VR Security, Inc. 16 Make Event Based Monitoring Possible
© VR Security, Inc. 17 Searchable Events Speed Investigations Conventional DVR Search Results 1.Review text lists 2.Wait for video downloads 3.Watch numerous videos, one by one Typical Investigation: 15 minutes 1.Scan storyboard to isolate event 2.Only download one video 3.Single click export to case management Typical Investigation: 2 minutes 3VR Search Results in EventStoryboard™
© VR Security, Inc. 18 Use Relevance to Enhance Quality Selectively compress face images to keep high quality evidence while still maximizing storage DVR Face Image3VR Face Image
© VR Security, Inc. 19 Use Relevance to Extend Storage Use intelligent recording and dynamic, user determined durations for key events to reduce storage and bandwidth by over 90% compared to conventional DVRs DVR
© VR Security, Inc. 20 Structured Information Optimized for the Network DVR or NVR3VR Distributes heavyweight video files Distributes lightweight metadata + key frames 2MB per transaction120K per transaction Searches only by transaction information, requires manual review of video. Searches across branches by face or transaction, easily scanned event cards
© VR Security, Inc. 21 Video Search Video Analysis Video Management … One Product 3VR SmartRecorder™
© VR Security, Inc. 22 About 3VR » Best Product –Fastest growth in commercial sector –Fastest rate of product innovation –Won nearly every industry award » Leading Company –Funded by IT and Security Leaders (Kleiner Perkins, In-Q-Tel, VantagePoint, DAG) –Led by Search and Video Visionaries (Inktomi, TiVo, USWeb) Top 25
© VR Security, Inc. 23 Search: A Disruptive Idea
© VR Security, Inc. 24 Banking $5B Check Fraud ($5B) Banking DVRs ($200M) Organized Theft ($31B) $31B Retail DVRs ($300M) Proprietary and Confidential © VR Security, Inc. 24 Search transforms security market with value-driven applications to address huge vertical problems… Economic impact of 9/11 alone: $1 Trillion RetailGovernment
© VR Security, Inc. 25 Proprietary and Confidential © VR Security, Inc. 25 Text Files + Mainframes Databases + Enterprise Software We saw something similar when databases made the enterprise searchable...
© VR Security, Inc. 26 Proprietary and Confidential © VR Security, Inc. 26 … as the market or databases expanded, the market for enterprise applications exploded.
© VR Security, Inc. 27 Proprietary and Confidential © VR Security, Inc. 27 » Purpose-built word processor » Sold bolt-on office applications (mail, spreadsheets, etc) » Killed by cheaper, more flexible, extensible software system (PC) » Purpose-built video recorder » Trying to bolt-on analytics (face, object, LPR, etc) » Killed by cheaper, more flexible, extensible software system (3VR) DVRs will be security’s Wang Computer DVR
© VR Security, Inc. 28 Example: Addressing Fraud in Retail Banks
© VR Security, Inc. 29 » Sample Text Proprietary and Confidential © VR Security, Inc. 29 » In 2005, banks lost $64 million to robbery » Those same banks lost $5 billion to fraud » Fraud is “the number one way criminals are attacking our financial system” – Chief of Financial Crimes, US Secret Service Fraud: Banking’s Biggest Problem Proprietary and Confidential © VR Security, Inc. 29
© VR Security, Inc. 30 CrimeGuard™ - Facial Surveillance to Stop Fraud CrimeGuard™ automatically indexes branch video with biometrics assigning a unique template to every face. Proprietary and Confidential © VR Security, Inc. 30
© VR Security, Inc. 31 SimilaritySearch™ Face templates can be remotely searched to link a fraudster’s activity across both time and branches » Solves previously unsolvable cases » Searches are instant and reduce investigation time » Proactively identifies even unreported fraud events » Robust to false identities Proprietary and Confidential © VR Security, Inc. 31
© VR Security, Inc. 32 PeopleShare™ With a single-click, PeopleShare™ publishes faces and alerts to watchlists within every branch across user-defined regions » Automates intelligence distribution » Prevents fraudsters from serially targeting branches » Centralized alert management PeopleShare™ Proprietary and Confidential © VR Security, Inc. 32
© VR Security, Inc. 33 SimilarityAlerts™ CrimeGuard™ performs real-time comparison of individuals in branches against regional watchlists. Matches trigger real-time alerts at teller windows, manager desks, or remote monitoring centers. » Stops fraud attempts and reduce losses » Increase deterrence to reduce future attempts » Stopping and deterring attempts means less investigations AlertViewer™ Proprietary and Confidential © VR Security, Inc. 33
© VR Security, Inc. 34 Fraud – Big Opportunity for Impactful ROI Example Scenario$ at RiskResult 1 st attempt$4,000Suspect in Database 2 nd attempt$4,000Attempt Detected and Stopped 3 rd attempt$4,000Attempt Deterred or Stopped 4 th attempt$4,000Attempt Deterred or Stopped $16,000 potential loss is reduced to $4,000 Proprietary and Confidential © VR Security, Inc. 34
© VR Security, Inc. 35 Demonstration
© VR Security, Inc. 36 Case Study Fighting Fraud in Los Angeles
© VR Security, Inc. 37 Pilot Program Overview » 15 3VR systems deployed across branches in an area recognized for high fraud activity » Multiple tests conducted to measure accuracy, false positives, investigative productivity, and effectiveness. » Tests conducted jointly by 3VR and customer
© VR Security, Inc. 38 Real-Time Watchlist Test - Results Metric Branches with Poor Conditions (Class 1 and 2) Branches with Good Conditions (Class 3, 4, and 5) Matching Accuracy9%94% Nuisance Alert Rate.005%.04% Number of Sites2 branches13 branches Total Faces Analyzed2,88585,724 With basic system tuning, 3VR accurately identified 94% of test subjects in branches with appropriate environmental conditions.
© VR Security, Inc. 39 Investigation Test Results (Post-Tuning) MetricDVR3VR Investigation Speed70 min44 min Quality of Evidence Images2 CIF4 CIF Number of New Events Found 528 Test Methodology » Two investigators given same fraud case. » One investigator used legacy DVR, one used 3VR » Investigators instructed to find additional instances of a suspect within the same bank branch.
© VR Security, Inc. 40 Proprietary and Confidential © VR Security, Inc. 40 Searchable Surveillance™ Disruptive innovation transforming traditional surveillance operations 1 Enabling new value-driven applications to expand government effectiveness using video 2 Platform for ongoing innovation and integration 3
© VR Security, Inc. 41
BIOMETRICS CONSORTIUM CONFERENCE BALTIMORE, MARYLAND September 19 – 21, 2006 Bill Wipprecht EVP/Chief Security Officer Corporate Security Wells Fargo &
Transforming video & photo collections into valuable resources John Waugaman President - Tygart Technology, Inc.
The Future. What will Change Fraud will not go away It will become more sophisticated and clever We have to step up to beat it June 16Caribbean Electronic.
Safeguarding Financial Institutions with Pixim ® ’s Digital Pixel System ® Technology July 2008.
CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Remote Surveillance System Presented by: Robarin Holdings Limited Telephone: Facsimile:
XProtect ® Express Integration made easy. With support for up to 48 cameras, XProtect Express is easy and affordable IP video surveillance software with.
XProtect ® Professional Efficient solutions for mid-sized installations.
CCTV AND IT’S FUTURE SAMPLEPRESENTATION CCTV What are we doing with CCTV? What will CCTV be like in 10 Years? How about tomorrow?
What Is Desktop Virtualization? How Does Application Virtualization Help? How does V3 Systems help? Getting Started AGENDA.
LOSS PREVENTION AND RETURN ON INVESTMENT Point of Sale Software and Video Integration.
MOTOROLA and the Stylized M Logo are registered in the US Patent and Trademark Office. All other product or service names are the property of their respective.
... M A K E Y O U R N E T W O R K S M A R T E R AXIS Camera Station Flexible surveillance software for your Axis network video products Sales Presentation.
1 © 2007 Avaya Inc. All rights reserved. Avaya – Proprietary & Confidential. Under NDA Avaya - Proprietary & Confidential. For Internal Use Only. Avaya.
Acquisition of NetScaler Mark Templeton, Citrix President and CEO B.V. Jagadeesh, NetScaler President and CEO June 2, 2005.
ATM Surveillance Solution. LIST Outline & Key Point 1 Solution 1, 2, 3 2 ATM Surveillance Program – E-MAP 33 Conclusion 44.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
LOSS PREVENTION SOLUTIONS USING VIDEO ANALYTICS reduce shrinkage, protect profits A Bikal Distribution GKB Ltd Company © All Rights Reserved.
Profits, Right Before Your Eyes. Instant Image Verification.
Accelerating Development Using Open Source Software Black Duck Software Company Presentation.
Overview Presentation MKT-DSRV-P- 001E. Product Overview Network based video transmission product with on-board digital recording Allows analogue fixed/PTZ.
© 2007 IBM Corporation IBM Information Management Accelerate information on demand with dynamic warehousing April 2007.
Fault Tolerant Sensor Network for Border Activity Detection B. Cukic, V. Kulathumani, A. Ross Lane Department of CSEE West Virginia University NC-BSI,
Digital Investigations of Any Kind ONE COMPANY Cyber Intelligence Response Technology (CIRT)
Nexidia Confidential “Searching Audio and Video Sources On the Web” SpeechTEK West 2007.
Making Search Relevant SchemaLogic Gary Carlson Chief Taxonomist
First Choice for Security Professionals
XProtect ® Essential Brilliant simplicity. With support for up to 26 cameras, XProtect Essential is cost-efficient and easy to use IP video surveillance.
Intelligent Performance Management Empowering Your Enterprise Duane E. Presti, CEO PARIS Technologies, Inc.
AxxonSoft Company Profile Products overview References.
Kaspersky Small Office Security INTRODUCING New for 2014!
© Paradigm Publishing Inc. 9-1 Chapter 9 Database and Information Management.
Central Monitoring Station Marketing Dept. July 2005.
CLEARSPACE Digital Document Archiving system INTRODUCTION Digital Document Archiving is the process of capturing paper documents through scanning and.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
XProtect ® Expert 2013 Product presentation. Milestone Systems Confidential New member in the XProtect ® family Milestone Systems Confidential.
Supplied on \web site. on January 10 th, 2008 Customer Security Management Reducing Internet fraud June 1 st, 2008 eSAC Walk Thru © Copyright Prevx Limited.
Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission _.
An Integrated Approach SEM and SEO Solutions. Agenda Company Overview Why enquisite? Case Example SEM/SEO Life Cycle Management This document and information.
Bharat Book Bureau Your One Stop Shop For Business Information Market Research Report The report on Global Video Surveillance and VSaaS Market.
Database Market By Ann Seidu, Keith McCoy, and Ty Christler.
NV V5.7 Product Presentation. Brand New Professional GUI Multiple User Interface for different look and feel Audio indicator on camera (play audio.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
White Master Replace with a graphic 5.5” Tall & 4.3” Wide © 2010 Adobe Systems Incorporated. All Rights Reserved. Video Distribution Philippe Degery DMO.
See it. Click it. Get it. INTERACTIVE VIDEO “Where Psychology Meets Technology” THE FUTURE IS NOW.
Facial Recognition https://store.theartofservice.com/the-facial-recognition-toolkit.html.
Image Recognition Technology How Smartphones can be Utilized for Mass Customization.
A new Network Concept for transporting and storing digital video…………
August Video Management Software ViconNet Enterprise Video Management Software Hybrid DVR Kollector Strike Kollector Force Plug & Play NVR HDExpress.
© 2017 SlidePlayer.com Inc. All rights reserved.