Professional Documents
Culture Documents
FSD Face Surveillance 1.0
FSD Face Surveillance 1.0
FSD Face Surveillance 1.0
Face Surveillance
Doc version 1.0
December 2014
Disclaimers
PT Biomorf Lone Indonesia. Makes no representation or warranties, either expressed or implied, with respect to the contents of this
publication and specifically disclaims the implied warranties of merchantability or fitness for a particular purpose. PT Biomorf Lone Indonesia
shall not be liable for technical or editorial errors or omissions in this publication, or for incidental or consequential damages resulting from
the furnishing, performance, or use of this publication. We reserve the right to revise this publication and to make changes from time to time
in its contents without notification.
Confidentiality
This document contains proprietary information that is confidential to PT Biomorf Lone Indonesia. Disclosure of this document in full or in part,
may result in material damage to PT Biomorf Lone Indonesia. Written permission must be obtained from PT Biomorf Lone Indonesia. Prior to
disclosure of this document to third party.
Table of Contents
References......................................................................................................................................iv
Glossary...........................................................................................................................................v
Glossary of Terms/Abbreviations............................................................................................................v
1. Introduction...............................................................................................................................1
1.1 Scope..........................................................................................................................................1
1.2 High Level Architecture.............................................................................................................2
1.2.1 Image.....................................................................................................................................2
1.2.2 Description.............................................................................................................................2
1.3 Functional Requirements............................................................................................................3
1.3.1 BIG........................................................................................................................................3
1.3.2 BIG Architecture....................................................................................................................4
1.4 Face Surveillance........................................................................................................................5
1.4.1 Home......................................................................................................................................5
1.4.2 Enrolling................................................................................................................................6
1.4.2.1 Screen Capture – Enrolling from Recorded Video..............................................6
1.4.2.1.1 Process Flow..................................................................................................6
1.4.2.2 Screen Capture – Enrolling from Face Image......................................................7
1.4.2.2.1 Process Flow..................................................................................................7
1.4.2.2.2 Business Rule.................................................................................................7
1.4.3 Face Identification..................................................................................................................7
1.4.3.1 Screen Capture – Alert via Email........................................................................7
1.4.3.2 Screen Capture – Alert via Short Message Service.............................................8
1.4.3.2.1 Process Flow..................................................................................................9
1.4.3.2.2 Business Rule.................................................................................................9
1.4.3.3 Log.......................................................................................................................9
1.4.3.3.1 Screen Capture – Log...................................................................................10
1.4.3.3.1.1 Process Flow.........................................................................................19
1.4.3.3.1.2 Business Rule........................................................................................19
1.4.3.3.1.3 Process Flow.........................................................................................23
1.4.3.3.2 Evidence.......................................................................................................23
1.4.3.3.2.1 Screen Capture – Add New Evidence...................................................23
1.4.3.3.2.2 Process Flow.........................................................................................23
1.4.3.3.3 Suspect.........................................................................................................29
1.4.3.3.3.1 Screen Capture Search Suspect...........................................................29
1.4.3.3.3.1.1 Flow Process..................................................................................29
1.4.3.3.3.2 Screen Capture – Update Suspect.........................................................30
1.4.3.3.3.2.1 Flow Process..................................................................................31
1.4.3.3.3.2.2 Business Rule.................................................................................31
1.4.3.3.3.3 Screen Capture – Suspect Detail (ReadOnly Mode)............................33
1.4.3.3.3.4 Screen Capture – New Suspect.............................................................34
1.4.3.3.3.4.1 Flow Process..................................................................................34
1.4.3.3.3.4.2 Business Rule.................................................................................34
1.4.3.3.3.4.2.1 Flow Process...........................................................................34
1.4.4 Image Form..........................................................................................................................34
1.4.4.1 Screen Capture – Image Form...........................................................................34
1.4.4.1.1 Flow Process................................................................................................35
1.4.4.1.2 Business Rule...............................................................................................35
1.4.4.2 Screen Capture 3D Model...............................................................................35
1.4.4.3 Compare.............................................................................................................36
1.4.4.3.1 Screen Capture – Compare...........................................................................37
1.4.4.3.2 Flow Process................................................................................................37
1.4.4.4 Screen Capture 3D Compare...........................................................................37
1.4.5 Video Processing..................................................................................................................37
1.4.5.1 Screen Capture – Video Processing...................................................................37
i | P a g e
The document contains proprietary and confidential information, should not disseminate information
contained therein for any purpose without written permission from Biomorf.
1.4.5.2 Flow Process......................................................................................................38
1.4.5.3 Screen Capture – Capturing Face Result...........................................................39
1.4.5.3.1 Flow Process................................................................................................39
1.5 Face Report Generator..............................................................................................................40
1.5.1 Screen Capture – Case Report Generator.............................................................................40
1.5.1.1 Flow Process......................................................................................................41
1.5.1.2 Business Rules...................................................................................................41
1.5.1.3 Screen Capture – Report Format (Example)......................................................41
1.6 FEW Lite....................................................................................................................................43
1.6.1 Home....................................................................................................................................43
1.6.1.1 Screen Capture – My Cases list (Read only mode)...........................................43
1.6.1.2 Screen Capture Case Details (Read/Write mode)............................................43
1.6.1.3 Screen Capture Suspect Details (Read/Write only mode)...............................44
1.6.2 Face Search..........................................................................................................................44
1.6.2.1 Screen Capture – Face Search............................................................................44
1.6.2.2 Process Flow......................................................................................................46
1.6.2.3 Business Rule.....................................................................................................46
1.6.3 Case Management................................................................................................................46
1.6.3.1 Screen Capture – New Case...............................................................................47
1.6.3.2 Process Flow......................................................................................................48
1.6.3.3 Business Rule.....................................................................................................48
1.7 Database...................................................................................................................................48
1.7.1 Screen Capture – Secure Key...............................................................................................48
1.7.2 Process Flow........................................................................................................................49
1.8 Gallery......................................................................................................................................50
1.8.1 Transaction types.................................................................................................................50
1.8.2 Flow Process........................................................................................................................50
1.8.3 Business Rule.......................................................................................................................50
1.8.4 Gallery Architecture.............................................................................................................51
1.9 MIS Reporting...........................................................................................................................52
1.10 Localization...............................................................................................................................54
1.11 Stakeholders Approval.............................................................................................................55
ii | P a g e
The document contains proprietary and confidential information, should not disseminate information
contained therein for any purpose without written permission from Biomorf.
Revision History
Version Date Reason For Changes Author
1.0 23/12/2014 Initial Version Annisa
iii | P a g e
The document contains proprietary and confidential information, should not disseminate information
contained therein for any purpose without written permission from Biomorf.
References
Document Name Network Location or Document Link
SRS Vigilance 1.0 SRS Vigilance 1.0.doc
iv | P a g e
The document contains proprietary and confidential information, should not disseminate information
contained therein for any purpose without written permission from Biomorf.
Glossary
Glossary of Terms/Abbreviations
DB : Database
BIG : Biomorf Identity Grid
MIS : Management Information System
IP Camera: Internet Protocol Camera
v | P a g e
The document contains proprietary and confidential information, should not disseminate information
contained therein for any purpose without written permission from Biomorf.
1. Introduction
Face Surveillance® is a monitoring system with facial recognition technology run on PC. The
way this system works is firstly the system must enrolling a person image for a purpose. After
that, in real-time situation, the system can analyze facial data capturing from the camera,
then sends these real-time results to the server, in which the application compares this real-
time data with the data which was already enrolled before in the database. If match, then the
identity (such as: name) of this person will be attached into the face of that person that
appear in the real-time monitoring video.
This Face Surveillance® monitoring system also enable user to create blacklist data for certain
suspect, so if the suspect passing through this monitoring video, then data capturing result is
match each other with the blacklist data, then the alarm will be trigerred. And the notice will
be sent to user via email or sms, and stored in log as well. So that the user can take action
against the suspect without losing any time.
1.1 Scope
This system that will be implemented will have following features:
a. BIG
This will be the core of the system. It will handle all the facial biometric recognition
process.
b. Face Surveillance Application
This application use to handle and maintain real-time face recognition monitoring.
The function/feature of this application are:
Enrolling a person’s Image / from Video acquire along with his/her related-
data,
Facial Data Capture processing to recognize the person,
Sending Notification Alert.
c. Integrated Device – Video IP Camera
The external video camera device with IP so it will be connected to network and easily
accessed by any PC, it is integrated to the system for surveillance role, and to acquire
the image and monitoring people who passing through it.
1 | P a g e
The document contains proprietary and confidential information, should not disseminate information
contained therein for any purpose without written permission from Biomorf.
1.2 High Level Architecture
1.2.1 Image
1.2.2 Description
1. Access Layer
a. IP Camera – DVS Encoding Device – TCP / IP by using Ethernet TCP / IP
2. Management Layer
It contains Face Server and Network Video Server which are both connected to TCP /
IP network using Ethernet TCP / IP
a. Face Server connected to:
i. Database Aware
Face Surveillance application send Face Image record to Database
Aware. In this database, processing result of certain face image will
result an ID. Then the ID is sent to Database Oracle.
ii. Database Oracle
Database Oracle is used for Naming System. The ID obtained from
Database Aware will refer to certain data (such as: Name) for the Face
Image
b. Network Video Server connected to:
i. Video Storage Database
2 | P a g e
The document contains proprietary and confidential information, should not disseminate information
contained therein for any purpose without written permission from Biomorf.
1.3 Functional Requirements
1.3.1 BIG
BIG is the platform that will handle all the requests from Face Surveillance Application. BIG
can do search method based on the flagging. It is Local searching whre BIG search into local
database.
3 | P a g e
The document contains proprietary and confidential information, should not disseminate information
contained therein for any purpose without written permission from Biomorf.
1.3.2 BIG Architecture
Oracle DB
SS CC Instance
Instance Instance
Instance Instance
Instance
TCP
TCP // IP
IP –– Ethernet
Ethernet
HH EE TCP
TCP // IP
IP -1 -2 -3
-1 -2 -3
DD
UU LL
EE RR
Frontal Face Gallery Right Angle Face Gallery Left Angle Face Gallery
Face
Face Grid
Grid Face
Face Grid
Grid Face
Face Grid
Grid
Group
Group (Gender =Male)
(Gender =Male) Group
Group (Gender =Male)
(Gender =Male) Group
Group (Gender
(Gender =Male)
=Male)
(Gender
(Gender =Male)
=Male) (Gender
(Gender =Male)
=Male) (Gender
(Gender =Male)
=Male)
Age
Age << == 30
30 Age Age
Age << == 30
Age << == 30
30 30
Node 2 Node 10 Node 10
Node 3 Node 11 Node 11
Aware SDK Aware SDK Aware SDK
(Gender
(Gender =Male)
=Male) (Gender (Gender
(Gender =Male)
(Gender =Male)
=Male) =Male)
Age
Age >> 30
30 Age Age
Age >> 30
Age >> 30
30 30
Node 4 Node 12 Node 12
Node 5 Node 13 Node 13
Aware SDK Aware SDK
Aware SDK
Face
Face Grid
Grid Face
Face Grid
Grid Face
Face Grid
Grid
Group
Group (Gender
(Gender == Female)
Female) Group
Group (Gender == Female)
(Gender Female) Group
Group (Gender == Female)
(Gender Female)
(Gender=Female)
(Gender=Female) (Gender=Female)
(Gender=Female) (Gender=Female)
(Gender=Female)
Age
Age << == 30
30 Age
Age << == 30
30 Age
Age << == 30
30
(Gender=Female)
(Gender=Female) (Gender=Female)
(Gender=Female) (Gender=Female)
(Gender=Female)
Age
Age >> 30
30 Age
Age >> 30
30 Age
Age >> 30
30
Node 8 Node 16 Node 16
Node 9 Node 17 Node 17
Aware SDK Aware SDK Aware SDK
4 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained therein for any purpose
without written permission from Biomorf.
1.4 Face Surveillance
This application is use to maintain a face recognition case.
FEW have features such as Search Suspect, and Case Management with reliance function to
conduct suspect face editing in Image Form, Compare and Video Processing.
1.4.1 Home
5 | P a g e
The document contains proprietary and confidential information, should not disseminate information
contained therein for any purpose without written permission from Biomorf.
1.4.2 Enrolling
6 | P a g e
The document contains proprietary and confidential information, should not disseminate information
contained therein for any purpose without written permission from Biomorf.
1.4.2.2 Screen Capture – Enrolling from Face Image
7 | P a g e
The document contains proprietary and confidential information, should not disseminate information
contained therein for any purpose without written permission from Biomorf.
1.4.3.2 Screen Capture – Alert via Short Message Service
8 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained therein for any purpose without written
permission from Biomorf.
Image Description – Alert via Short Message Service
1.4.3.3 Log
9 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
1.4.3.3.1 Screen Capture – Log
10 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained therein for any purpose without written
permission from Biomorf.
Image Description – Log
19 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
22 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained therein for any purpose without written
permission from Biomorf.
Image Description – Update Case
1.4.3.3.2 Evidence
23 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
1.4.3.3.3 Suspect
29 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
1.4.3.3.3.2 Screen Capture – Update Suspect
30 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained therein for any purpose without written
permission from Biomorf.
Image Description – Update Suspect
31 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
1.4.3.3.3.3 Screen Capture – Suspect Detail (Read-Only Mode)
33 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained therein for any purpose without written
permission from Biomorf.
1.4.3.3.3.4 Screen Capture – New Suspect
New Suspect form opened by opening directly New Case form
New Suspect form opened by Create Case button in Compare form
This feature will helping user to do some modification of image with the provided tools and do
searching into BIG for finding the similar face with the suspected image.
1.4.4.1 Screen Capture – Image Form
Image Description – Image Form
Number Description
1 File Properties, this section contain of following file information :
Accessed, Created, Modified, Name, Path, Size, and Type
2 Image Properties, this section contain of :
Bit Depth, Dimension (Width, Height), Frames, Pixel/Format, Resolution
Image Processing Tab
3 Image Processing, user is able to modified the image with these tools provided :
Invert Color, RGB Filter, Edge Detection, Brightness, Contrast, Zoom In, Rotate,
Rotate Left 90 Degrees, Rotate Right 90 Degrees, Revert, Face and Eye
Detection, Flip Vertical, Flip Horizontal, Crop Image, Save Image
4 For Single Picture – Search function is to search the similar face of suspect using
BIG. There are 2 options for searching method (Local | e-KTP) and user can
select it using radio button
For Group Picture – the Search function is disabled, and the user must select
one of the cropped single pictures taken from this group picture
34 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
Button Description – Image Form
Number Description
6 Image Processing Tab
Button
3D To open ‘3D Model’ page and work on 3D modelling of single image
7 CMS Tab
Button
Create Case To create new case and open ‘New Case’ page
1.4.4.3 Compare
This is a result from searching process which done by access ‘Search’ button at Image Form
screen (Search button). The feature would compare of two or more faces as result from BIG.
35 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
1.4.4.3.1 Screen Capture – Compare
This menu used by user to capturing suspected face from video. The applications will
automatically capturing face from video played.
The capturing face can be placed at ‘Image Form’ for modification, searching, or archive.
1.4.5.1 Screen Capture – Video Processing
Number Description
1 Selected video from local directory
2 Timeline bar of video
3 Navigation tools which may take effect for video.
The navigation provide for :
a. Open : opening local directory window for selecting video process
b. Play : start to playing the selected video
c. Decrease Speed : decrease speed of currently playing video
Maximum decrease is, ¼ time from video total duration
d. Increase Speed : increase speed of currently playing video
e. Pause : pause the currently playing video
f. Stop : stop the currently playing video
g. Face Detection (Start & End) : set start and end time of capture
processing of video
h. Use Interval : Flag (Yes/No) for using Face Detection time
i. Start Capturing : start for capturing face from video
4 Video speed information
5 Video properties which following these information :
Audio Format, Bitrate, Duration, Height, Name, Path, Video Format, and Width
36 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
1.4.5.2 Flow Process
1. Open local drive, to select video from directory
2. Click Play button to start playing the video.
3. Click Start Capturing to start capturing face process.
If capturing face is using interval, than capturing process will start from interval time set,
the rules of use are:
a. Face detection value must be set with these condition :
- Start time cannot be less than minimum duration of video,
- End time cannot be bigger than maximum duration of video,
- Start time cannot be bigger than End time.
- End time cannot be less than Start time.
b. Use Interval = Yes.
37 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
1.4.5.3 Screen Capture – Capturing Face Result
Number Description
1 List of capturing face from video
2 Selected face information list, consist of Quality Item Name and Value. These
information are :
Left Eye Open, Right Eye Open, Exposure (value on number), Sharpness,
Compliant, Vertical Position, Horizontal Position, Width Of Head, Height Of
Head, Exposure (value on quality description), and Frontal.
3 Original image of selected face
38 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
1.5 Face Report Generator
User can download all cases with detail information into reporting format.
39 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
1.5.1.1 Flow Process
1. Select Case Report, by going through menu Report Case Management Case Report
2. Input criteria to search the case.
3. Select the found case from case list (double click)
4. After, the Case Report is shown, click Export icon to download Report (report format can
be chosen within Excel | PDF |Word)
1. For search criteria, at least one of any available fields must be filled
Picture 1 of 2
40 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
Picture 2 of 2 (this information obtained from Positive Match in Compare Form)
41 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
1.6 Database
For database, Face Surveillance will use aware database and oracle database.
1.7 Gallery
There are 4 galleries on vigilance system base on.
a. Male Frontal Face for ;<=30 years; and ;>30 years;
b. Female Frontal Face for ;<=30 years; and ;>30 years;
c. Male Right Angle Face for ;<=30 years; and ;>30 years;
d. Female Right Angle Face for ;<=30 years; and ;>30 years;
e. Male Left Angle Face for ;<=30 years; and ;>30 years;
f. Female Left Angle Face for ;<=30 years; and ;>30 years;
1. The Searching application into local database will be done automatically when the
parameters caught by system is found match ID and Name in the database. Then each of
the identified Face Image will be displayed in the Monitor Screen along with its own
tagged Name according to what is stored in the database.
1. The search transaction will specify the binning criteria (i.e. which gallery should the
search be conducted in).
2. The binning criteria should only be applicable in case of local matching.
If no criteria is specified all the galleries should be searched and results should be
combine based on scored in sorted order.
3. The search should be to specify one or more galleries (i.g search all males, the search
criteria would specify Male Frontal face <30 and >30 both).
4. In case of e-KTP search the binning criteria is not applicable.
5. During enrollment in local the binning information is required.
42 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
1.7.4 Gallery Architecture
Frontal Face Gallery Right Angle Face Gallery Left Angle Face Gallery
Face
Face Grid
Grid Face
Face Grid
Grid Face
Face Grid
Grid
Group
Group (Gender
(Gender =Male)
=Male) Group
Group (Gender =Male)
(Gender =Male) Group
Group (Gender
(Gender =Male)
=Male)
(Gender
(Gender =Male)
=Male) (Gender
(Gender =Male)
=Male) (Gender
(Gender
Age
Age << == 30
30 Age
Age << == 30
30 =Male)
=Male)
Age
Age << == 30
30
Node 2 Node 10 Node 10
(Gender
(Gender =Male)
=Male) (Gender
(Gender =Male)
=Male) (Gender
(Gender
Age
Age >> 30
30 Age
Age >> 30
30 =Male)
=Male)
Age
Age >> 30
30
Node 4 Node 12 Node 12
Face
Face Grid
Grid Face Face
Face Grid
Face Grid
Grid Grid
Group
Group (Gender
(Gender == Female)
Female) Group Group
Group (Gender
(Gender == Female)
Group (Gender
(Gender == Female)
Female) Female)
(Gender=Female)
(Gender=Female) (Gender=Female (Gender=Female)
(Gender=Female)
(Gender=Female
Age
Age << == 30
30 )) Age
Age << == 30
30
Age
Age << == 30
30
Node 6 Node 14 Node 14
Node 7 Node 15
Node 15
Aware SDK Aware SDK
Aware SDK
(Gender=Female)
(Gender=Female) (Gender=Female (Gender=Female)
(Gender=Female)
(Gender=Female
Age
Age >> 30
30 )) Age
Age >> 30
30
Node 8
Age
Age >> 30
30
Node 16 Node 16
Node 9 Node 17
Node 17
Aware SDK Aware SDK
Aware SDK
43 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
1.8 MIS Reporting
MIS have some following report, such as:
a. Case Management Report
Report will show periodically
- Show by Month in the same year
Period [Selected Month] – Current
Year
Case Status Number
New X
On-Going X
Resolve X
Unsolved X
Total X
- Show by Year
Period [From Year] – [To Year]
Case Status Number
New X
On-Going X
Resolve X
Unsolved X
Total X
44 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
- General Report
This report is to see All Active and Non Active User, by go to menu Reports
User management General report. See on this screen capture below.
45 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
1.9 Localization
A User is given an option to change the language of this application, by go to:
- Setting (in Menu bar) Change Language, or
- Home Menus Account Setting Change Language
Below is the Screen Captured of Change Language Tab.
46 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.
1.10 Stakeholders Approval
Approving this document confirms that you believe the document addresses the items identified
in the Approval Criteria. If you do not agree with any part of this document provide feedback to
the author.
Approvers
__________________________
Name in Text: Date
Title:
__________________________
Name in Text: Date
Title:
__________________________
Name in Text: Date
Title:
47 | P a g e
The document contains proprietary and confidential information, should not disseminate information contained
therein for any purpose without written permission from Biomorf.