FSD Face Surveillance 1.0

You might also like

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 38

Functional Specification Document

Face Surveillance
Doc version 1.0

December 2014

PT.BIOMORF LONE INDONESIA


Menara BCA, 41st floor , Grand Indonesia
Jalan MH. Thamrin No.1 Jakarta 10310
Indonesia
www.biomorf.co.id
Copyright and Other Intellectual Property Rights
Copyright and other Intellectual property rights in any original programs, specifications, reports or other items rising in the course of, or
resulting from the project shall remain the property of PT Biomorf Lone Indonesia although the organization mentioned above shall have a
non-exclusive and non-transferable license to all such items for its own purposes. Nothing in this agreement shall enable either party to make
use of any intellectual property rights vested in the other party prior to the commencement of this assignment.

Copyright © 2013 by PT Biomorf Lone Indonesia. All rights reserved.

Disclaimers
PT Biomorf Lone Indonesia. Makes no representation or warranties, either expressed or implied, with respect to the contents of this
publication and specifically disclaims the implied warranties of merchantability or fitness for a particular purpose. PT Biomorf Lone Indonesia
shall not be liable for technical or editorial errors or omissions in this publication, or for incidental or consequential damages resulting from
the furnishing, performance, or use of this publication. We reserve the right to revise this publication and to make changes from time to time
in its contents without notification.

Confidentiality
This document contains proprietary information that is confidential to PT Biomorf Lone Indonesia. Disclosure of this document in full or in part,
may result in material damage to PT Biomorf Lone Indonesia. Written permission must be obtained from PT Biomorf Lone Indonesia. Prior to
disclosure of this document to third party.
Table of Contents
References......................................................................................................................................iv
Glossary...........................................................................................................................................v
Glossary of Terms/Abbreviations............................................................................................................v
1. Introduction...............................................................................................................................1
1.1 Scope..........................................................................................................................................1
1.2 High Level Architecture.............................................................................................................2
1.2.1 Image.....................................................................................................................................2
1.2.2 Description.............................................................................................................................2
1.3 Functional Requirements............................................................................................................3
1.3.1 BIG........................................................................................................................................3
1.3.2 BIG Architecture....................................................................................................................4
1.4 Face Surveillance........................................................................................................................5
1.4.1 Home......................................................................................................................................5
1.4.2 Enrolling................................................................................................................................6
1.4.2.1 Screen Capture – Enrolling from Recorded Video..............................................6
1.4.2.1.1 Process Flow..................................................................................................6
1.4.2.2 Screen Capture – Enrolling from Face Image......................................................7
1.4.2.2.1 Process Flow..................................................................................................7
1.4.2.2.2 Business Rule.................................................................................................7
1.4.3 Face Identification..................................................................................................................7
1.4.3.1 Screen Capture – Alert via Email........................................................................7
1.4.3.2 Screen Capture – Alert via Short Message Service.............................................8
1.4.3.2.1 Process Flow..................................................................................................9
1.4.3.2.2 Business Rule.................................................................................................9
1.4.3.3 Log.......................................................................................................................9
1.4.3.3.1 Screen Capture – Log...................................................................................10
1.4.3.3.1.1 Process Flow.........................................................................................19
1.4.3.3.1.2 Business Rule........................................................................................19
1.4.3.3.1.3 Process Flow.........................................................................................23
1.4.3.3.2 Evidence.......................................................................................................23
1.4.3.3.2.1 Screen Capture – Add New Evidence...................................................23
1.4.3.3.2.2 Process Flow.........................................................................................23
1.4.3.3.3 Suspect.........................................................................................................29
1.4.3.3.3.1 Screen Capture ­ Search Suspect...........................................................29
1.4.3.3.3.1.1 Flow Process..................................................................................29
1.4.3.3.3.2 Screen Capture – Update Suspect.........................................................30
1.4.3.3.3.2.1 Flow Process..................................................................................31
1.4.3.3.3.2.2 Business Rule.................................................................................31
1.4.3.3.3.3 Screen Capture – Suspect Detail (Read­Only Mode)............................33
1.4.3.3.3.4 Screen Capture – New Suspect.............................................................34
1.4.3.3.3.4.1 Flow Process..................................................................................34
1.4.3.3.3.4.2 Business Rule.................................................................................34
1.4.3.3.3.4.2.1 Flow Process...........................................................................34
1.4.4 Image Form..........................................................................................................................34
1.4.4.1 Screen Capture – Image Form...........................................................................34
1.4.4.1.1 Flow Process................................................................................................35
1.4.4.1.2 Business Rule...............................................................................................35
1.4.4.2 Screen Capture ­ 3D Model...............................................................................35
1.4.4.3 Compare.............................................................................................................36
1.4.4.3.1 Screen Capture – Compare...........................................................................37
1.4.4.3.2 Flow Process................................................................................................37
1.4.4.4 Screen Capture ­ 3D Compare...........................................................................37
1.4.5 Video Processing..................................................................................................................37
1.4.5.1 Screen Capture – Video Processing...................................................................37
i | P a g e
The document contains proprietary and confidential information, should not disseminate information 
contained therein for any purpose without written permission from Biomorf.
1.4.5.2 Flow Process......................................................................................................38
1.4.5.3 Screen Capture – Capturing Face Result...........................................................39
1.4.5.3.1 Flow Process................................................................................................39
1.5 Face Report Generator..............................................................................................................40
1.5.1 Screen Capture – Case Report Generator.............................................................................40
1.5.1.1 Flow Process......................................................................................................41
1.5.1.2 Business Rules...................................................................................................41
1.5.1.3 Screen Capture – Report Format (Example)......................................................41
1.6 FEW Lite....................................................................................................................................43
1.6.1 Home....................................................................................................................................43
1.6.1.1 Screen Capture – My Cases list (Read only mode)...........................................43
1.6.1.2 Screen Capture ­ Case Details (Read/Write mode)............................................43
1.6.1.3 Screen Capture ­ Suspect Details (Read/Write only mode)...............................44
1.6.2 Face Search..........................................................................................................................44
1.6.2.1 Screen Capture – Face Search............................................................................44
1.6.2.2 Process Flow......................................................................................................46
1.6.2.3 Business Rule.....................................................................................................46
1.6.3 Case Management................................................................................................................46
1.6.3.1 Screen Capture – New Case...............................................................................47
1.6.3.2 Process Flow......................................................................................................48
1.6.3.3 Business Rule.....................................................................................................48
1.7 Database...................................................................................................................................48
1.7.1 Screen Capture – Secure Key...............................................................................................48
1.7.2 Process Flow........................................................................................................................49
1.8 Gallery......................................................................................................................................50
1.8.1 Transaction types.................................................................................................................50
1.8.2 Flow Process........................................................................................................................50
1.8.3 Business Rule.......................................................................................................................50
1.8.4 Gallery Architecture.............................................................................................................51
1.9 MIS Reporting...........................................................................................................................52
1.10 Localization...............................................................................................................................54
1.11 Stakeholders Approval.............................................................................................................55

ii | P a g e
The document contains proprietary and confidential information, should not disseminate information 
contained therein for any purpose without written permission from Biomorf.
Revision History
Version Date Reason For Changes Author
1.0 23/12/2014 Initial Version Annisa

iii | P a g e
The document contains proprietary and confidential information, should not disseminate information 
contained therein for any purpose without written permission from Biomorf.
References
Document Name Network Location or Document Link
SRS Vigilance 1.0 SRS Vigilance 1.0.doc

iv | P a g e
The document contains proprietary and confidential information, should not disseminate information 
contained therein for any purpose without written permission from Biomorf.
Glossary

Glossary of Terms/Abbreviations
DB : Database
BIG : Biomorf Identity Grid
MIS : Management Information System
IP Camera: Internet Protocol Camera

v | P a g e
The document contains proprietary and confidential information, should not disseminate information 
contained therein for any purpose without written permission from Biomorf.
1. Introduction
Face Surveillance® is a monitoring system with facial recognition technology run on PC. The
way this system works is firstly the system must enrolling a person image for a purpose. After
that, in real-time situation, the system can analyze facial data capturing from the camera,
then sends these real-time results to the server, in which the application compares this real-
time data with the data which was already enrolled before in the database. If match, then the
identity (such as: name) of this person will be attached into the face of that person that
appear in the real-time monitoring video.

This Face Surveillance® monitoring system also enable user to create blacklist data for certain
suspect, so if the suspect passing through this monitoring video, then data capturing result is
match each other with the blacklist data, then the alarm will be trigerred. And the notice will
be sent to user via email or sms, and stored in log as well. So that the user can take action
against the suspect without losing any time.

1.1 Scope
This system that will be implemented will have following features:
a. BIG
This will be the core of the system. It will handle all the facial biometric recognition
process.
b. Face Surveillance Application
This application use to handle and maintain real-time face recognition monitoring.
The function/feature of this application are:
 Enrolling a person’s Image / from Video acquire along with his/her related-
data,
 Facial Data Capture processing to recognize the person,
 Sending Notification Alert.
c. Integrated Device – Video IP Camera
The external video camera device with IP so it will be connected to network and easily
accessed by any PC, it is integrated to the system for surveillance role, and to acquire
the image and monitoring people who passing through it.

1 | P a g e
The document contains proprietary and confidential information, should not disseminate information 
contained therein for any purpose without written permission from Biomorf.
1.2 High Level Architecture

1.2.1 Image

1.2.2 Description

1. Access Layer
a. IP Camera – DVS Encoding Device – TCP / IP by using Ethernet TCP / IP
2. Management Layer
It contains Face Server and Network Video Server which are both connected to TCP /
IP network using Ethernet TCP / IP
a. Face Server connected to:
i. Database Aware
Face Surveillance application send Face Image record to Database
Aware. In this database, processing result of certain face image will
result an ID. Then the ID is sent to Database Oracle.
ii. Database Oracle
Database Oracle is used for Naming System. The ID obtained from
Database Aware will refer to certain data (such as: Name) for the Face
Image
b. Network Video Server connected to:
i. Video Storage Database

2 | P a g e
The document contains proprietary and confidential information, should not disseminate information 
contained therein for any purpose without written permission from Biomorf.
1.3 Functional Requirements

1.3.1 BIG

BIG is the platform that will handle all the requests from Face Surveillance Application. BIG
can do search method based on the flagging. It is Local searching whre BIG search into local
database.

3 | P a g e
The document contains proprietary and confidential information, should not disseminate information 
contained therein for any purpose without written permission from Biomorf.
1.3.2 BIG Architecture

Client Applications Aware DB

Oracle DB

Node 1 ORACLE CLUSTER

TCP/ IP Interface Node


Node 20
20 Node
Node 21
21 Node
Node 22
22

SS CC Instance
Instance Instance
Instance Instance
Instance
TCP
TCP // IP
IP –– Ethernet
Ethernet
HH EE TCP
TCP // IP
IP -1 -2 -3
-1 -2 -3
DD
UU LL
EE RR

Frontal Face Gallery Right Angle Face Gallery Left Angle Face Gallery

Face
Face Grid
Grid Face
Face Grid
Grid Face
Face Grid
Grid
Group
Group (Gender =Male)
(Gender =Male) Group
Group (Gender =Male)
(Gender =Male) Group
Group (Gender
(Gender =Male)
=Male)

(Gender
(Gender =Male)
=Male) (Gender
(Gender =Male)
=Male) (Gender
(Gender =Male)
=Male)
Age
Age << == 30
30 Age Age
Age << == 30
Age << == 30
30 30
Node 2 Node 10 Node 10
Node 3 Node 11 Node 11
Aware SDK Aware SDK Aware SDK

(Gender
(Gender =Male)
=Male) (Gender (Gender
(Gender =Male)
(Gender =Male)
=Male) =Male)
Age
Age >> 30
30 Age Age
Age >> 30
Age >> 30
30 30
Node 4 Node 12 Node 12
Node 5 Node 13 Node 13
Aware SDK Aware SDK
Aware SDK

Face
Face Grid
Grid Face
Face Grid
Grid Face
Face Grid
Grid
Group
Group (Gender
(Gender == Female)
Female) Group
Group (Gender == Female)
(Gender Female) Group
Group (Gender == Female)
(Gender Female)

(Gender=Female)
(Gender=Female) (Gender=Female)
(Gender=Female) (Gender=Female)
(Gender=Female)
Age
Age << == 30
30 Age
Age << == 30
30 Age
Age << == 30
30

Node 6 Node 14 Node 14


Node 7 Node 15 Node 15
Aware SDK Aware SDK Aware SDK

(Gender=Female)
(Gender=Female) (Gender=Female)
(Gender=Female) (Gender=Female)
(Gender=Female)
Age
Age >> 30
30 Age
Age >> 30
30 Age
Age >> 30
30
Node 8 Node 16 Node 16
Node 9 Node 17 Node 17
Aware SDK Aware SDK Aware SDK

4 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained therein for any purpose 
without written permission from Biomorf.
1.4 Face Surveillance
This application is use to maintain a face recognition case.
FEW have features such as Search Suspect, and Case Management with reliance function to
conduct suspect face editing in Image Form, Compare and Video Processing.

1.4.1 Home

Home screen when user successfully login into application.

5 | P a g e
The document contains proprietary and confidential information, should not disseminate information 
contained therein for any purpose without written permission from Biomorf.
1.4.2 Enrolling

1.4.2.1 Screen Capture – Enrolling from Recorded Video

Image Description – Enrolling from Recorded Video

Button Description – Enrolling from Recorded Video


1.4.2.1.1 Process Flow

6 | P a g e
The document contains proprietary and confidential information, should not disseminate information 
contained therein for any purpose without written permission from Biomorf.
1.4.2.2 Screen Capture – Enrolling from Face Image

Image Description – Enrolling from Face Image

Button Description – Enrolling from Face Image


1.4.2.2.1 Process Flow

1.4.2.2.2 Business Rule

1.4.3 Face Identification

1.4.3.1 Screen Capture – Alert via Email

Image Description – Alert via Email

Button Description – Alert via Email

7 | P a g e
The document contains proprietary and confidential information, should not disseminate information 
contained therein for any purpose without written permission from Biomorf.
1.4.3.2 Screen Capture – Alert via Short Message Service

8 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained therein for any purpose without written 
permission from Biomorf.
Image Description – Alert via Short Message Service

Button Description – Alert via Short Message Service

1.4.3.2.1 Process Flow

1.4.3.2.2 Business Rule

1.4.3.3 Log

9 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
1.4.3.3.1 Screen Capture – Log

10 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained therein for any purpose without written 
permission from Biomorf.
Image Description – Log

Button Description – Log


1.4.3.3.1.1 Process Flow

1.4.3.3.1.2 Business Rule

19 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
22 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained therein for any purpose without written 
permission from Biomorf.
Image Description – Update Case

Button Description – Update Case

1.4.3.3.1.3 Process Flow

1.4.3.3.2 Evidence

1.4.3.3.2.1 Screen Capture – Add New Evidence

Image Description – Add New Evidence

Button Description – Add New Evidence


1.4.3.3.2.2 Process Flow

23 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
1.4.3.3.3 Suspect

1.4.3.3.3.1 Screen Capture - Search Suspect

Image Description – Search Suspect

Button Description – Search Suspect


1.4.3.3.3.1.1 Flow Process

29 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
1.4.3.3.3.2 Screen Capture – Update Suspect

30 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained therein for any purpose without written 
permission from Biomorf.
Image Description – Update Suspect

Button Description – Update Suspect


1.4.3.3.3.2.1 Flow Process

1.4.3.3.3.2.2 Business Rule

31 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
1.4.3.3.3.3 Screen Capture – Suspect Detail (Read-Only Mode)

Button Description – Suspect Detail – Read Only Mode

33 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained therein for any purpose without written 
permission from Biomorf.
1.4.3.3.3.4 Screen Capture – New Suspect
New Suspect form opened by opening directly New Case form 
New Suspect form opened by Create Case button in Compare form

Image Description – New Suspect

Button Description – New Suspect


1.4.3.3.3.4.1 Flow Process

1.4.3.3.3.4.2 Business Rule

Image Description – Add Face

Button Description – Add Face

1.4.3.3.3.4.2.1 Flow Process


1. Open existing suspect file.
2. Click Add Face button to open upload window.
3. Select Source File
1. Local Drive
Open local directory window. Format file: *.bmp, *.jpeg, *.jpg, *.png.
4. Click Add to save the face record into suspect.

1.4.4 Image Form

This feature will helping user to do some modification of image with the provided tools and do
searching into BIG for finding the similar face with the suspected image.
1.4.4.1 Screen Capture – Image Form
Image Description – Image Form

Number Description
1 File Properties, this section contain of following file information :
Accessed, Created, Modified, Name, Path, Size, and Type
2 Image Properties, this section contain of :
Bit Depth, Dimension (Width, Height), Frames, Pixel/Format, Resolution
Image Processing Tab
3 Image Processing, user is able to modified the image with these tools provided :
Invert Color, RGB Filter, Edge Detection, Brightness, Contrast, Zoom In, Rotate,
Rotate Left 90 Degrees, Rotate Right 90 Degrees, Revert, Face and Eye
Detection, Flip Vertical, Flip Horizontal, Crop Image, Save Image
4 For Single Picture – Search function is to search the similar face of suspect using
BIG. There are 2 options for searching method (Local | e-KTP) and user can
select it using radio button
For Group Picture – the Search function is disabled, and the user must select
one of the cropped single pictures taken from this group picture

5 The selected image from local directory

34 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
Button Description – Image Form
Number Description
6 Image Processing Tab
Button
3D To open ‘3D Model’ page and work on 3D modelling of single image
7 CMS Tab
Button
Create Case To create new case and open ‘New Case’ page

1.4.4.1.1 Flow Process


1. Open existing Case
2. Select image from Evidence List or Suspected Face from suspect file at Cases.
Types of images are: *.bmp;*.jpeg;*.jpg;*.png;
3. Do modification of image (if necessary) using navigation tools at Image Processing tab.
4. After that, user can do these following:
a. Click Save icon to save the image
b. Search to start searching process  then Search Results will completely showing
at Compare form
c. Click 3D button to open ‘3D Model’ page  then start working on 3D modelling of
that selected single image
d. Click Create Case button to create new case  then it will direct user into ‘New
Case’ page
1.4.4.1.2 Business Rule
1. User can do Searching process of the suspect image, either without saving the image or
already save the image first
2. If user want to search the image, users have to select searching method first using radio
button:
a. Local. If user select local, then user can enter following search criteria (optional).
Age : [Drop list : <= 30 | > 30 years]
Gender : [Drop list: Female | Male]
b. E-KTP.
3. If user want to Save the Suspected Face image, the process will be as follow:
a. The pop up window will appear to edit filename and add Description and the
following information would be default as rules below.
i. The image would be record into Suspected Face list
ii. Extension : BMP
iii. Data Source : Surveillance
iv. Quality Source : ISO
v. Create Date : [the save date]
vi. Create By : [user name of operator]
1.4.4.2 Screen Capture - 3D Model

1.4.4.3 Compare

This is a result from searching process which done by access ‘Search’ button at Image Form
screen (Search button). The feature would compare of two or more faces as result from BIG.

35 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
1.4.4.3.1 Screen Capture – Compare

1.4.5 Video Processing

This menu used by user to capturing suspected face from video. The applications will
automatically capturing face from video played.
The capturing face can be placed at ‘Image Form’ for modification, searching, or archive.
1.4.5.1 Screen Capture – Video Processing

Image Description – Video Processing

Number Description
1 Selected video from local directory
2 Timeline bar of video
3 Navigation tools which may take effect for video.
The navigation provide for :
a. Open : opening local directory window for selecting video process
b. Play : start to playing the selected video
c. Decrease Speed : decrease speed of currently playing video
Maximum decrease is, ¼ time from video total duration
d. Increase Speed : increase speed of currently playing video
e. Pause : pause the currently playing video
f. Stop : stop the currently playing video
g. Face Detection (Start & End) : set start and end time of capture
processing of video
h. Use Interval : Flag (Yes/No) for using Face Detection time
i. Start Capturing : start for capturing face from video
4 Video speed information
5 Video properties which following these information :
Audio Format, Bitrate, Duration, Height, Name, Path, Video Format, and Width

36 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
1.4.5.2 Flow Process
1. Open local drive, to select video from directory
2. Click Play button to start playing the video.
3. Click Start Capturing to start capturing face process.
If capturing face is using interval, than capturing process will start from interval time set,
the rules of use are:
a. Face detection value must be set with these condition :
- Start time cannot be less than minimum duration of video,
- End time cannot be bigger than maximum duration of video,
- Start time cannot be bigger than End time.
- End time cannot be less than Start time.
b. Use Interval = Yes.

37 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
1.4.5.3 Screen Capture – Capturing Face Result

Image Description – Capture Image

Number Description
1 List of capturing face from video
2 Selected face information list, consist of Quality Item Name and Value. These
information are :
Left Eye Open, Right Eye Open, Exposure (value on number), Sharpness,
Compliant, Vertical Position, Horizontal Position, Width Of Head, Height Of
Head, Exposure (value on quality description), and Frontal.
3 Original image of selected face

1.4.5.3.1 Flow Process


1. Continue from Video Processing step.
2. Select one of face image (#1) to see detail information.
The application will gather the similar face image from capturing face list.
Select one of face image (#2) to see the original image.
3. Double click on the selected face image (#2) to go to ‘Image Form’ workspace (next,
follow the process flow at Image Form menu). When user may want to create a new case
from Image Form (please see on the process flow at New Case menu, a guidance to
complete this process)

38 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
1.5 Face Report Generator
User can download all cases with detail information into reporting format.

1.5.1 Screen Capture – Case Report Generator

Image Description – Case Download Report


Fields Description Data Type Mandatory
Case Search
Case Number Case id Text Field -
Case Type Case type Drop List -
Case Status Case status Drop List -
Owner Owner of case (user Read­Only Text Field -
creation)
From Case Creation Date From Date Picker -
(dd/MM/yyyy), within a
time-range
To Case Creation Date To Date Picker -
(dd/MM/yyyy), within a
time-range
List of Cases
Case_Id Case Number Label -
Owner_Username Username of Owner Label -
Participant_User Participant Username Label -
Case_Type Case Type Label -
Case_Status Case Status Label -
Incident_Date Date of Incident Label -
Incident_Location Incident Location Label -
Incident_City Incident City Label -
Incident_Province Incident Province Label -
Incident_ZIP Incident ZIP Label -
Notes Additional Notes Label -
Last_Updated Date of Last Update Label -

Button Description – Case Download Report


Button Description
Search To do searching
Clear To clear up the fields

39 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
1.5.1.1 Flow Process
1. Select Case Report, by going through menu Report  Case Management  Case Report
2. Input criteria to search the case.
3. Select the found case from case list (double click)
4. After, the Case Report is shown, click Export icon to download Report (report format can
be chosen within Excel | PDF |Word)

1.5.1.2 Business Rules

1. For search criteria, at least one of any available fields must be filled

1.5.1.3 Screen Capture – Report Format (Example)

Picture 1 of 2

40 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
Picture 2 of 2 (this information obtained from Positive Match in Compare Form)

41 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
1.6 Database
For database, Face Surveillance will use aware database and oracle database.
1.7 Gallery
There are 4 galleries on vigilance system base on.
a. Male Frontal Face for ;<=30 years; and ;>30 years;
b. Female Frontal Face for ;<=30 years; and ;>30 years;
c. Male Right Angle Face for ;<=30 years; and ;>30 years;
d. Female Right Angle Face for ;<=30 years; and ;>30 years;
e. Male Left Angle Face for ;<=30 years; and ;>30 years;
f. Female Left Angle Face for ;<=30 years; and ;>30 years;

1.7.1 Transaction types


1. Enroll Local Gallery (Parameters: Gallery Name, Returns: ID Number)
2. Search Local Gallery (Parameters: Gallery Name, Returns: Result with Name)

1.7.2 Flow Process

1. The Searching application into local database will be done automatically when the
parameters caught by system is found match ID and Name in the database. Then each of
the identified Face Image will be displayed in the Monitor Screen along with its own
tagged Name according to what is stored in the database.

1.7.3 Business Rule

1. The search transaction will specify the binning criteria (i.e. which gallery should the
search be conducted in).
2. The binning criteria should only be applicable in case of local matching.
If no criteria is specified all the galleries should be searched and results should be
combine based on scored in sorted order.
3. The search should be to specify one or more galleries (i.g search all males, the search
criteria would specify Male Frontal face <30 and >30 both).
4. In case of e-KTP search the binning criteria is not applicable.
5. During enrollment in local the binning information is required.

42 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
1.7.4 Gallery Architecture

Frontal Face Gallery Right Angle Face Gallery Left Angle Face Gallery

Face
Face Grid
Grid Face
Face Grid
Grid Face
Face Grid
Grid
Group
Group (Gender
(Gender =Male)
=Male) Group
Group (Gender =Male)
(Gender =Male) Group
Group (Gender
(Gender =Male)
=Male)

(Gender
(Gender =Male)
=Male) (Gender
(Gender =Male)
=Male) (Gender
(Gender
Age
Age << == 30
30 Age
Age << == 30
30 =Male)
=Male)
Age
Age << == 30
30
Node 2 Node 10 Node 10

Node 3 Node 11 Node 11


Aware SDK Aware SDK Aware SDK

(Gender
(Gender =Male)
=Male) (Gender
(Gender =Male)
=Male) (Gender
(Gender
Age
Age >> 30
30 Age
Age >> 30
30 =Male)
=Male)
Age
Age >> 30
30
Node 4 Node 12 Node 12

Node 5 Node 13 Node 13


Aware SDK Aware SDK Aware SDK

Face
Face Grid
Grid Face Face
Face Grid
Face Grid
Grid Grid
Group
Group (Gender
(Gender == Female)
Female) Group Group
Group (Gender
(Gender == Female)
Group (Gender
(Gender == Female)
Female) Female)

(Gender=Female)
(Gender=Female) (Gender=Female (Gender=Female)
(Gender=Female)
(Gender=Female
Age
Age << == 30
30 )) Age
Age << == 30
30
Age
Age << == 30
30
Node 6 Node 14 Node 14

Node 7 Node 15
Node 15
Aware SDK Aware SDK
Aware SDK

(Gender=Female)
(Gender=Female) (Gender=Female (Gender=Female)
(Gender=Female)
(Gender=Female
Age
Age >> 30
30 )) Age
Age >> 30
30
Node 8
Age
Age >> 30
30
Node 16 Node 16
Node 9 Node 17
Node 17
Aware SDK Aware SDK
Aware SDK

43 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
1.8 MIS Reporting
MIS have some following report, such as:
a. Case Management Report
Report will show periodically
- Show by Month in the same year
Period [Selected Month] – Current
Year
Case Status Number
New X
On-Going X
Resolve X
Unsolved X
Total X

- Show by Year
Period [From Year] – [To Year]
Case Status Number
New X
On-Going X
Resolve X
Unsolved X
Total X

b. User Management Report


- Show by selected month and year
Period [From Month] [Year] – [To
Month] [Year]
User Status Number
Create X
Active X
In-Active X

44 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
- General Report
This report is to see All Active and Non Active User, by go to menu Reports 
User management  General report. See on this screen capture below.

c. Searching Type Report by Period


Period [From Month] [Year] – [To
Month] [Year]
Searching Type Number
Local X
e-KTP X
Total X

d. Searching Result by Period


Period [From Month] [Year] – [To
Month] [Year]
Searching Type Number
Match X
Not Match X
Total X
Match = match count for all searching activity
Not Match = discard action for all searching activity

45 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
1.9 Localization
A User is given an option to change the language of this application, by go to:
- Setting (in Menu bar)  Change Language, or
- Home Menus  Account Setting  Change Language
Below is the Screen Captured of Change Language Tab.

46 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
1.10 Stakeholders Approval
Approving this document confirms that you believe the document addresses the items identified
in the Approval Criteria. If you do not agree with any part of this document provide feedback to
the author.

Approvers

__________________________
Name in Text: Date
Title:

__________________________
Name in Text: Date
Title:

__________________________
Name in Text: Date
Title:

47 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.

You might also like