CITeR News
Smart phone video played a starring role in the investigation following the Boston Marathon bombing in 2013. The investigation also highlighted limitations in existing systems related to incorporating crowdsourced information, including video, audio, still images and other data. What's needed, and doesn't exist yet, is a system that can unify the information – the thousands of video snippets and still images from smart phone cameras – into a “big picture” that reflects th...
“Soft” biometric measurements, such as gait, gender, and ethnicity offer new possibility for biometric solutions What is the next wave of biometrics? The Center for Identification Technology and Research (CITeR) is looking at the possibilities. New developments include consideration of new “soft” biometric measurements, such as gait, gender, and ethnicity. Although not accurate enough to identify a specific person, the capture and analysis of such...
There are new biometrics on the horizon, but much of current biometrics research centres on improving the biometrics we have, especially the face, iris and fingerprint recognition systems commonly deployed in the field. These systems are effective and provide good accuracy, but their usefulness is often limited by the conditions under which data is captured. Research is looking for ways to make face, iris and fingerprint biometrics more accurate in more real-world situations....
Browse security news
- By event
- ISC West 2025
- The Health & Safety Event 2025
- The Security Event 2025
- 11th National Conference On CFIUS
- RSA Conference 2025
- RSAC USA 2025
- 19th Annual Flagship Conference on Economic Sanctions Enforcement and Compliance
- G2E Asia + Asian IR Expo 2025
- Airport Show 2025
- Secutech 2025
- 6th European Forum on Global FDI Reviews
- View more
Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)
Hikvision DeepinViewX AI Cameras for Perimeter Protection
Dahua 8MP AI WizSense TiOC Bullet Camera
Using artificial intelligence (AI) to automate physical security systems
DownloadA modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadThe truth behind 9 mobile access myths
DownloadAccess control system planning phase 2
Download