Imagis Facial Recognition SDK Access control software
Technical Specification
- Make: Imagis
- Model code: Facial Recognition SDK
The biometric facial recognition technology enables one-to-many identification searches and one-to-one verification matches. The technology is most effective as an identification tool capable of distilling large databases down to a smaller gallery of possible matches. The technology consists of a series of components packaged within a Software Development Kit (SDK). These components find faces within a digital photograph or video stream and match those images to like-looking facial images stored within a database. Facial recognition involves three core steps - Create an Encode Array from any facial image, compare a Probe Encode Array to a Stored Encode Array in a database and present results.
Read moreMake | Imagis |
---|---|
Manufacturer | Imagis Technologies |
Category | Access Control>Access control software |
Model code | Facial Recognition SDK |
Additional info | The biometric facial recognition technology enables one-to-many identification searches and one-to-one verification matches. The technology is most effective as an identification tool capable of distilling large databases down to a smaller gallery of possible matches. The technology consists of a series of components packaged within a Software Development Kit (SDK). These components find faces within a digital photograph or video stream and match those images to like-looking facial images stored within a database. Facial recognition involves three core steps - Create an Encode Array from any facial image, compare a Probe Encode Array to a Stored Encode Array in a database and present results. |
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
Access and security in the age of hybrid working
Cybersecurity in keyless access management
The critical role of access control in K-12 school security
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadPhysical access control
Download5 surprising findings from OT vulnerability assessments
DownloadHoneywell GARD USB threat report 2024
Download