Integrated portal helps crime-fighters link faces and names
Facial recognition technology helps investigators identify individuals in photos or videos.
Police often capture suspects in a photo or on surveillance video, but an image alone isn't enough to make an arrest; investigators need to put a name to the face.
More than 39,000 county, state and federal justice professionals were already using the Pennsylvania Justice Network (JNET) to conduct secure investigations in a Web-based environment. JNET is an integrated portal that provides authorized users with access to public safety and criminal justice information compiled by federal, state and local sources.
But JNET couldn't help investigators who only had a photo. So the Commonwealth of Pennsylvania Justice Network developed the JNET Facial Recognition System (JFRS) to help those investigators identify individuals in photos or videos.
JFRS uses the distinct measurements of each person's facial features to compare an image of an unknown individual with images stored in the Commonwealth Photo Imaging Network (CPIN), which has more than 3.5 million photos of individuals who have been arrested by police. The system creates a facial plate from each photo when it's entered into CPIN, which provides a uniform platform with centralized quality control for capturing, storing and processing images.
The plate detects and measures facial dimensions, which are documented for use within JFRS. The system then uses two distinct algorithms to compare faces to ensure that investigators receive a thorough set of results.
JFRS is accessed through JNET, so it's available to every law enforcement agency in Pennsylvania, regardless of its size or technological sophistication.
First deployed in 2006, JFRS has since been updated with features to improve its usability and accuracy. The system is now completely Web-based, so users can access the application from within JNET without needing to download any software as they had before. The new system also includes improved algorithms for more accurate image-matching. It now has 3D facial-comparison tools that allow users to generate 3D models of both suspect and CPIN images. New tools also allow investigators to enhance poor-quality images for use in JFRS, and a video extraction tool enables users to upload images from video footage.
JNET plans to complete its training of investigators in the use of the new JFRS platform by mid-2012. But the system has already proved its worth since it was first introduced; investigators have used it to solve numerous cases, including homicides, robberies, and fraud and identity-theft cases.
- 18 Hot IT Certifications for 2014
- CIOs Opting for IT Contractors Over Hiring Full-Time Staff
- 12 Best Free iOS 7 Holiday Shopping Apps
- For CMOs Big Data Can Lead to Big Profits
- Slideshow: 5 ways to lock down your mobile device
- Slideshow: 10 mistakes companies make after a data breach
- How to rob a bank: A social engineering walk through
- Which smartphone is the most secure?
If you think getting it right from day one is always what matters, you probably haven't been following technology too closely.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Mitigating DDoS Attacks with F5 Technology
- This document examines various DDoS attack methods and the application of specific ADC technologies to block attacks in the DDoS threat spectrum while...
- The DDoS Threat Spectrum
- Bolstered by favorable economics, today's global botnets are using distributed denial-of-service (DDoS) attacks to target firewalls, web services, and applications, often simultaneously.
- Defending Against Denial of Service Attacks
- By utilizing end-user interviews, this whitepaper explores a deeper understanding of DDoS defense plans and reveals the knowledge gaps around the Denial of...
- Strategic Solutions for Government IT
- This paper outlines why F5 is the optimum partner to help achieve the levels of security, performance and availability that are vital to...
- Osterman White Paper: The Need for Enterprise-Grade File Transfer
- Key trends in file transfer All Government IT White Papers
- Modernizing SAP environments with minimum risk - a path to Big Data Hear from top IDC analyst, Richard Villars, about the path you can start taking now to enable your organization to get the benefits...
- The Power of the Citrix Mobility Solution, XenMobile Does everything become a smartphone? Or does the smartphone begin to do everything? How can we afford to support BYOD? Rather, how can...
- BYOD Happens: How to Secure Mobility How to navigate the journey of securing mobility, including the BYOD corruption of IT, the top ten mobility strategies, and the mobility management...
- Fighting Fraud Videos: IBM Intelligent Investigation Manager Short videos about IBM Intelligent Investigation Manager (IIM) for Fraud. IIM optimizes the investigation of fraud for customers across many industries in both...
- IBM Intelligent Investigation Manager: Online Product Demo Intelligent Investigation Manager optimizes fraud investigation and analysis and it dynamically coordinates and reports on cases, provides analysis and visualization, and enables more...
- All Government IT Webcasts
Does your organization offer extensive benefits, cool perks, competitive salaries, opportunities for training and advancement? Then get it recognized!
Nominate your company or another deserving organization for Computerworld's 2014 Best Places to Work in IT list now through Dec. 20, 2013.