Facial recognition

Ask a question

Facial recognition is already integrated in Sigur. To use this functionality, you do not need to have any special equipment: in most cases, almost any IP camera and an up-to-date PC will be enough.

Facial recognition technology

In recent years, facial recognition technology has changed drastically. Today, it is widely used in various areas of our lives. This technology is not resource-intensive and it is accurate enough to be used in security systems.
In Sigur, facial recognition functionality is implemented based on 2D recognition technology using neural networks.

How it works

Sigur uses facial recognition to automatically identify cardholders at access points. The facial recognition feature captures the cardholder’s face from the video and compares this picture with the database of cardholders’ photos stored in the ACS.

The video stream can be obtained from IP cameras directly connected to the system. The same cameras can be used as a video surveillance system of the site.

Supported modes

Identification In this case, the cardholder’s face is the only parameter that the system relies on in whether to grant access or not. It is the most convenient mode as it does not require any additional actions on the part of the cardholder.

Verification In this case, this biometric parameter serves as an additional identification means. Other credentials such as a proximity card can serve as the primary identification means. There are two types of the verification mode:

  • «Strict»: after the identification using the primary identifier, the system will compare the image obtained from the cameras with the cardholder’s photo. If the face has not been recognized or the cardholder has failed to appear on the screen within 5 seconds, the system will deny the access.
  • «Hard group verification» is a new verification feature in Sigur. When activated, this feature will, after the recognition of the primary credential, proceed to matching the face of the employee with one of the faces from the same group in the system to which this particular employee belongs.
  • «Soft»: the system will provide access in any case; however, if the face has not been recognized, this event will be prompted in the monitoring interface.

The system provides flexible configuration options in the identification mode with the option to set up:

  • individual access points and directions
  • specific groups of cardholders

Interaction with 3rd-party systems

Sigur provides development tools that allow you to configure the interaction of third-party face recognition algorithms with ACS. These tools are already used by Macroscop, Trassir, NtechLab, FacePRO, VisionLabs, Connecton, ISS, Forpost, and other systems working with Sigur.

Operation with face recognition terminals

Sigur can use Suprema, Hikvision, ZKTeco, and BIOSMART facial recognition terminals as biometric readers.

When you first set up the integration, photos from the Sigur database of employees who are authorized to pass through this access point, as well as their assigned pass code or generated biometric template, will be automatically uploaded to the terminal. Subsequently, all changes to photos or the list of employees are made in the Sigur interface and automatically transferred to the terminal.

Available operating modes (configurable on the terminal): 

  • verification (recognized face - additional feature to the main one, e.g., card);
  • identification by card or face (the access object must present any of the features - for terminals with a built-in reader).

The terminal transmits the recognition fact to Sigur, and the system makes a decision on access in accordance with the specified conditions. A number of terminals can also transmit temperature data (terminals with a temperature measurement function). All access events are logged in the ACS.

Integration works with all Suprema terminals that support BioStar 2, Hikvision terminals that support the ISAPI protocol, ZKTeco, and BioSmart Quasar, including the additional option of measuring the temperature of the access object. A complete list of devices that support this protocol can be found on the manufacturer's website.

The models listed below have undergone internal testing by Sigur and are recommended for use:

  • Hikvision DS-K1TA70MI-T (with temperature measurement capability)
  • Hikvision DS-K5671-3XF/ZU (with temperature measurement capability)
  • Hikvision DS-K5604A-3XF/V (with temperature measurement capability)
  • Hikvision DS-K1T671M
  • Hikvision DS-K1T341AM
  • Hikvision DS-K1T642MW
  • Hikvision DS-K1T671TMW
  • Hikvision DS-K5671-ZU
  • ZKTeco ProFaceX and its possible models -TI, -RFID, -P
  • ZKTeco SpeedFace-V5L/V4L and its possible models -TI, -RFID, -P
  • ZKTeco SpeedFace-M4 and its possible models -TI, -RFID, -P
  • BioSmart Quasar
  • Suprema BioEntry W3, BioStation 3, FaceStation 2, FaceStation F2

Supported operating systems:

  • Hikvision - supports Windows, Astra Linux, Red Hat Linux;
  • ZKTeco - supports Windows, Astra Linux;
  • BioSmart Quasar - supports Windows.

Operating requirements

As with any other biometric identification technology, facial recognition is not 100% accurate and has a number of limitations of use. The identification mode will operate accurately only with a limited number of faces in the PACS database — up to 1,000. The accuracy of the system also depends on:

  • face positioning relative to the camera
  • quality of the photos and video stream
  • quality of lighting at the scanning area
  • face image resolution (min 100px)

System requirements

For the recognition system to work, any up-to-date PC and any IP camera will suffice. E.g. the system operating in a 4-channel mode requires Intel Core i7 and at least 8GB RAM.

Licensing

Licensing for working with Hikvision, ZKTeco, and BioSmart Quasar facial recognition terminals is based on the number of connected devices. To increase the number of connected devices, you need to purchase the appropriate license package extension.