Integrated portal helps crime-fighters link faces and names
Facial recognition technology helps investigators identify individuals in photos or videos.
Police often capture suspects in a photo or on surveillance video, but an image alone isn't enough to make an arrest; investigators need to put a name to the face.
More than 39,000 county, state and federal justice professionals were already using the Pennsylvania Justice Network (JNET) to conduct secure investigations in a Web-based environment. JNET is an integrated portal that provides authorized users with access to public safety and criminal justice information compiled by federal, state and local sources.
But JNET couldn't help investigators who only had a photo. So the Commonwealth of Pennsylvania Justice Network developed the JNET Facial Recognition System (JFRS) to help those investigators identify individuals in photos or videos.
JFRS uses the distinct measurements of each person's facial features to compare an image of an unknown individual with images stored in the Commonwealth Photo Imaging Network (CPIN), which has more than 3.5 million photos of individuals who have been arrested by police. The system creates a facial plate from each photo when it's entered into CPIN, which provides a uniform platform with centralized quality control for capturing, storing and processing images.
The plate detects and measures facial dimensions, which are documented for use within JFRS. The system then uses two distinct algorithms to compare faces to ensure that investigators receive a thorough set of results.
JFRS is accessed through JNET, so it's available to every law enforcement agency in Pennsylvania, regardless of its size or technological sophistication.
First deployed in 2006, JFRS has since been updated with features to improve its usability and accuracy. The system is now completely Web-based, so users can access the application from within JNET without needing to download any software as they had before. The new system also includes improved algorithms for more accurate image-matching. It now has 3D facial-comparison tools that allow users to generate 3D models of both suspect and CPIN images. New tools also allow investigators to enhance poor-quality images for use in JFRS, and a video extraction tool enables users to upload images from video footage.
JNET plans to complete its training of investigators in the use of the new JFRS platform by mid-2012. But the system has already proved its worth since it was first introduced; investigators have used it to solve numerous cases, including homicides, robberies, and fraud and identity-theft cases.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
If you use ‘password,’ one the worst passwords, as your password, fail to keep antivirus protection updated and don’t bother to deploy security patches to close critical vulnerabilities, then maybe you should consider working for the cybersecurity-clueless federal government; you’d fit right in, according to Senator Tom Coburn's cybersecurity and critical infrastructure report.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- The Critical Role of Support in Your Enterprise Mobility Management Strategy
- Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Separating Work and Personal at the Platform Level: How BlackBerry Balance Works
- BlackBerry® Balance™ separates work from personal on the same mobile device, right at a platform level. Find out how it can work for...
- Protection for Every Enterprise: How BlackBerry Security Works
- Get an IT-level review of BlackBerry® Security, addressing data leakage protection, certified encryption, containerization and much more.
- Future Focus: What's Coming in Enterprise Mobility Management (EMM)
- Find out why Enterprise Mobility Management (EMM) solutions that are truly future-ready must be designed to enable Machine-to-Machine (M2M) capabilities and much more. All Government IT White Papers
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of...
- Mobile Apps and Devices Slash Customer Cycle Time Consolidated Engineering Laboratories' field employees used to collect data on triplicate forms that were sometimes hard to read and difficult to manage. After...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources...
- All Government IT Webcasts