We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Face Recognition Software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Face Recognition Software - List of Manufacturers, Suppliers, Companies and Products

Face Recognition Software Product List

1~11 item / All 11 items

Displayed results

Adopted in "Weekly Robi 2"! High-speed facial recognition IP Stier EF1

Edge authentication, perfect for offline authentication! Fast, secure, compact embedded facial recognition software library.

■Fast High-speed facial recognition is possible in 190ms even with a general-purpose microcontroller operating at a frequency of 400MHz. ■Safe Facial feature data is encrypted, and even if it is leaked, it cannot be reverted to facial images. ■Compact In the case of a processor equipped with ARM(R) Cortex(R), ROM=460KB, RAM=720KB. It can operate on processors equipped with ARM Cortex and PCs running Windows 10. Customization for various microcontrollers and operating systems such as Linux is also available.

  • Other security and surveillance systems
  • Software (middle, driver, security, etc.)
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Deep Learning Facial Recognition "IP Stier GF1"

Embedded high-speed facial recognition IP Stier EF1, while maintaining high API compatibility, has enhanced the accuracy of facial recognition software [evaluation version available for free].

The "IP Stier GF1" is an AI facial recognition software that utilizes deep learning technology, and it is the third installment in our in-house brand software product "VINIE," focusing on "visualization." It can widely accommodate various customer usage environments (such as hardware, memory size, OS, etc.) and the required product specifications (such as operating speed and accuracy). You can choose suitable facial recognition software from "IP Stier EF1" and this product. Additionally, since we have enhanced compatibility with "IP Stier EF1" and the API (Application Programming Interface), program migration can be carried out smoothly. 【Features】 ■ Wide compatibility with usage environments and required product specifications ■ A demo and evaluation tool that operates on Windows 10 PCs is available ■ It is also possible to compare and evaluate with "IP Stier EF1" using the above tool *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems
  • Image Processing Software
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

We provide one-stop support from embedded devices to equipment.

We can provide one-stop solutions not only for the development of embedded hardware and software but also for small-lot prototyping and manufacturing at our own factory.

Please feel free to consult us on any style, whether it be software only, hardware only, or both hardware and software. We have hardware engineers who are well-versed in embedded microcontrollers, software engineers who excel at utilizing them to create fast and compact solutions, and system engineers who solve our customers' "troubles" with flexible thinking. Our entire team will support you in bringing your product to market.

  • Other embedded systems (software and hardware)
  • Circuit board design and manufacturing

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AimeFace

It is a facial recognition technology boasting 99% accuracy.

AimeFace is a face detection, face recognition, and eKYC (customer recognition) framework developed by AimeSoft. In addition to real-time face recognition and detection, AimeFace also includes a face registration feature that utilizes multimodal AI (patent pending). Furthermore, by combining it with voice recognition and speaker recognition, it is possible to improve the accuracy of customer recognition. We can flexibly accommodate customizations based on individual environments and requests. Please feel free to contact AimeSoft regarding multimodal AI.

  • Image Processing Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information] The reason why the facial recognition system FaceMe is world-class.

Designed to maximize authentication accuracy! Also available as a plug-and-play package.

Facial recognition software has not only reduced issues related to false detections by enhancing accuracy, but it has also added numerous powerful new features and improved flexibility. Additionally, many facial recognition software solutions have emerged in the market, with adoption progressing among large corporations and well-known brands. This document explains the reasons why the facial recognition system "FaceMe" is world-class. We invite you to read it. [Contents (partial)] ■ Innovators in facial recognition technology ■ Advantages of FaceMe facial recognition software ■ Extensive facial recognition features of FaceMe ■ Applications of facial recognition across various industries *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information] Features of Biometric Authentication and the "Impersonation Prevention" Function

"Biometric authentication and facial recognition" and "scenarios of 'impersonation' in facial recognition" are featured!

ID and password are always advised to "not be reused," "not be written down," and "to increase password strength," but it is practically impossible to change and remember passwords for every site and service. Smartphones come equipped with features that allow for automatic management of ID and passwords by registering one's fingerprint or face, which I believe is now an essential function of smartphones. However, how safe is this biometric authentication that is supposed to be "usable only by the individual"? In this document, we will explain the features of biometric authentication and its "anti-spoofing" capabilities. Please take a moment to read it. [Contents (partial)] ■ Biometric authentication is convenient, isn't it? ■ General discussion on biometric authentication and facial recognition ■ Biometric authentication does not actually determine "whether someone is human" ■ Scenarios of "spoofing" in facial recognition *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Arrival of a New Era? The World Focuses on the Potential of ChatGPT

Introducing in a column format the gathered attention, expanding possibilities, and points of concern!

On November 30, 2022, OpenAI, based in San Francisco, released "ChatGPT." In just two months since its launch, it gained 100 million users, continued to grow, and has attracted attention worldwide. This time, we will explore the background of this service, which is said to have brought about the same or even greater shock as when computers were first introduced to the world, and consider the possibilities and concerns surrounding ChatGPT. *For more details on the column, please refer to the related links. Feel free to contact us for more information.*

  • Other operation management software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What is the difference between "DX" and digitalization that you can't ask about now?

The DX Promotion Office will reintroduce what the term "DX" refers to in a column!

First, I would like to start with an explanation of the abbreviation "DX," which is fundamental. In daily life, we come across various English abbreviations, and there are quite a few that include "X." For example, there are "FX" (Foreign Exchange: foreign exchange margin trading) and "CX" (Customer Experience: customer experience). In traditional abbreviations, "X" often represented "ex." Alternatively, in the case of "CXO," which collectively refers to CEO, CFO, etc., the "X" serves as a wildcard that can represent various letters. *For more detailed content of the column, you can view it through the related links. If you have any questions, please feel free to contact us.*

  • Technical and Reference Books

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

DX Progress "Hōsei Timeline"

Introducing a timeline of Wakai Fellow's and HOUSEI's journey in a column format!

As a special edition of the DX column, we have created a timeline of the journey of Wakai Fellow and HOUSEI. It is composed of four axes, with the left two axes representing the movements of Wakai Fellow and HOUSEI, and the right two axes reflecting the IT and telecommunications landscape surrounding our company, as well as societal movements. Wakai Fellow has been practicing DX through research since the 1970s, and in future columns, he will also discuss his work from that time. *For detailed content of the column, please refer to the related links. For more information, feel free to contact us.*

  • Technical and Reference Books

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study of Facial Recognition System Implementation] Facilities and Offices

Preventing impersonation! Introducing examples of solutions for issues such as facility security.

We would like to introduce examples of problem-solving in facilities and offices using the facial recognition system handled by MyStia Inc. We want to ensure security in the facility. We want to manage entry and exit without burden. As a solution, we have implemented our facial recognition system, integrating multiple surveillance camera feeds to prevent impersonation through ID card borrowing and lending with high-precision facial matching. Additionally, entry and exit information can be managed smoothly and contactlessly through facial recognition. 【Case Overview】 ■Challenges - Ensuring security - Managing entry and exit ■Solutions - Preventing impersonation through ID card borrowing and lending with surveillance cameras - Managing entry and exit information smoothly and contactlessly with facial recognition *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Latest Version] A Comprehensive Explanation from the Mechanism of Facial Recognition to Installation Methods

Introducing the mechanisms of facial recognition and methods for optimizing installation! Content that can be understood from the basics is available for free download!

The demand for facial recognition has been increasing in recent years, with many consumers around the world experiencing this technology through unlocking smartphones and making payments, which are essential devices in their daily lives. However, the potential of facial recognition extends beyond its use on smartphones; it is already providing numerous advantages in various industries for applications such as safety, security, and operational efficiency. This document introduces the mechanisms of facial recognition, methods for installation and optimization, specifications and practical use cases to consider from a technical perspective, and future possibilities, in order to utilize facial recognition technology more effectively. [Contents (partial)] ■ What is facial recognition and how to implement it ■ Considerations in building edge devices ■ Edge-based facial recognition: on-premises devices and workstations ■ Other design elements: security, encryption, and privacy *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration