-
公开(公告)号:US11468576B2
公开(公告)日:2022-10-11
申请号:US17178570
申请日:2021-02-18
Applicant: NEC Laboratories America, Inc.
Inventor: Kunal Rao , Utsav Drolia , Murugan Sankaradas , Srimat Chakradhar
Abstract: A method for tracing individuals through physical spaces that includes registering cameras in groupings relating a physical space. The method further includes performing local video monitoring including a video sensor input that outputs frames from inputs from recording with the cameras in the groupings, a face detection application for extracting faces from the output frames, and a face matching application for matching faces extracted from the output frames to a watchlist, and a local movement monitor that assigns tracks to the matched faces. The method further includes performing a global monitor including a biometrics monitor for preparing the watchlist of faces, the watchlist of faces being updated when a new face is detected by the cameras in the groupings, and a global movement monitor that combines the outputs from the assigned tracks to the matched faces to launch a report regarding individual population traveling to the physical spaces.
-
公开(公告)号:US20220114717A1
公开(公告)日:2022-04-14
申请号:US17496246
申请日:2021-10-07
Applicant: NEC Laboratories America, Inc.
Inventor: Utsav Drolia , Srimat Chakradhar , Sibendu Paul
Abstract: Methods and systems for image filtering include detecting a distortion level of input images, using a distortion detection model that is trained using confidence values generated by a pre-trained image classifier with a set of distorted training images. An analysis is performed on input images having a detected distortion level that is lower than a threshold, with input images having an above-threshold detected distortion level being filtered out.
-
公开(公告)号:US20200294339A1
公开(公告)日:2020-09-17
申请号:US16809147
申请日:2020-03-04
Applicant: NEC Laboratories America, Inc.
Inventor: Kunal Rao , Giuseppe Coviello , Srimat Chakradhar , Min Feng , Murugan Sankaradas , Utsav Drolia
Abstract: Methods and systems for authentication include determining, at a first worker system, that a master system that stores a current authentication-list cannot be reached by a first network. Authentication is performed on an authentication request using a previously stored copy of the authentication-list at the first worker system. The authentication includes facial recognition that is performed on detected face images for a first time window, before receiving the authentication request, and for a second time window, after receiving the authentication request. Authentication removes matching detected face images after completing an authentication request to prevent other individuals from using a same identifier. Access is granted to a secured area responsive to the authentication.
-
-