SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Downloaden Sie, um offline zu lesen
FACIAL RECOGNITION

Evolving Detection to Support
   Voluntary Self-Exclusion
      Canadian Gaming Summit
       Vancouver, April 2011
Contents

 1. Defining the Program Requirements           PAUL
 2. Facial Recognition & Biometric Encryption   KLAUS
 3. The Human Side of Detection                 PAUL
 4. Future Direction                            KLAUS




RG Overview   Page 2
Defining Program
                       Requirements



RG Overview   Page 3
Defining Program Requirements
     Self-Exclusion
        Option to take a break from slot/casino gambling
        Self-help tool for players who are working to control behaviour

      OLG Role:
       Provide clear information, implications for entering

       Effectively deliver systems, policies, procedures

       Stop direct marketing

       Provide referrals as a “gateway” to a system of
        community service that are “individually tailored”

                        Applies to slots/casino sites in Ontario
                        Does NOT apply to lottery, bingo, horse racing
RG Overview   Page 4
Defining Program Requirements
  What Self-Exclusion is Not
      Determination/judgement about a gambling problem
      A policing program
      A way to prevent people from gambling

   Dr. Howard J. Shaffer
      Harvard Medical              “… responsibility for self-exclusion and
         School –                   ultimately gambling remains with the
        Division on               patron… Even the name, self-exclusion,
        Addictions                 should serve to remind patrons, policy
                                  makers and industry observers that the
                                    responsibility for the behaviour of the
                                    gamblers who enroll in self-exclusion
                                        programs remains with them.”



RG Overview   Page 5
Defining Program Requirements
  Why Attempt to Detect Self-Excluders at
  All?
Deterrent to Breaching NOT                             Policing


      If a self-excluded person is detected, s/he will be escorted
       from site, and can be trespassed
      Support by operator includes creating disincentives to
       breaching


  FR is not the answer on its own… it is on part of
  an overall perimeter of support for Self-Excluders



RG Overview   Page 6
Defining Program Requirements
  Context for Facial Recognition
Objectives: To support players, evolve practices, build
 corporate reputation
OLG decisions must consider:

Vulnerable Player
                       Most Self-Excluders have significant problems
    Segment


Program Standards      International dialogue on best practices


   Brand Integrity     OLG is highly scrutinized


RG Overview   Page 7
Defining Program Requirements
  Program Priorities
Decision to implement FR required the following criteria:

                       • Sufficient “true hit” rate
    SYSTEM             • Acceptable “false positive” rate
 PERFORMANCE           • Defensible cost


                       • “Privacy by design” approach
     RESPECT for       • Protection of images/data to exceed industry standards
      PRIVACY          • Images of non-self-excluders had to be deleted

                       • Security officers use terminals at podium
      EASE of          • System allows officers to review images that
     OPERATION           appear with a “hit”, in order to “make call”
                       • Operate seamlessly with surveillance systems
RG Overview   Page 8
Defining Program Requirements
 Partners in Facial Recognition


 Information
                                   AGCO
   Privacy
                                  Regulator
Commissioner




University of                      iView
  Toronto                         Systems

RG Overview   Page 9
Facial Recognition
                        &
                        Biometric
                        Encryption


RG Overview   Page 10
Self Exclusion Technology Timeline
     Overall Approach

Online and                                Privacy                           FR+BE              Build          Rollout
                            FR+BE
centralized                            requirements       FR+BE             solution        production        FR+BE
                            proven
SE system                                finalized         tuned           confirmed         FR+BE          technology
                             viable
 (no FR)                                                                    by IPC            system          at OLG

»live April      »minor reduction »meetings with   »80% to 90% CIR       »proposal             »rollout results are
2009             in CIR           IPC staff        for OLG volunteer     vetted by iView,      consistent with POC tests
                 »~50% reduction                   group                 UofT, IPC and
                 in false alarms                   »detecting 30 times   OLG Exec
                                                   more SE than the
                                                   current process



                     • Measured approach to developing the system
                     • Privacy by Design
                     • Used staff control groups to measure system performance
                     • Lighting and pose are key to facial recognition success
                     • Field trial at Woodbine to validate system performance
                     • Rollout to all sites

   RG Overview    Page 11
Privacy by by Design:
  Privacy Design                Privacy + Security

  We are discarding all
 captured images except
correctly recognized alerts

                                     HASH

                         FR                              PI
                                                               IMAGE
                                                 NAME
                         TMPL


                                                        ADDR




                                      BE




 RG Overview   Page 12
Face Recognition Performance
     Control Group Results


                                               Correct Identification Rate



  30%             Lighting
               Improvements
                                49% Improvements 80%
                                      Entrance                        Additional
                                                                       Lighting
                                                                                      88%         Camera
                                                                                                 Positioning
                                                                                                                     91%

»baseline at                »test at                 »test at                      »test at                      »test at
Casino SSM                  Foster Drive             Woodbine Slots                Woodbine Slots                Woodbine Slots
Apr. 2009                   Oct. 2009                Oct. 2009                     Oct. 2009                     Mar. 2010



     Note: All tests were controlled by using volunteer OLG employees to determine the Correct Identification Rate




   RG Overview    Page 13
Human
                        Side
                        of
                        Detection


RG Overview   Page 14
Human Side
Role of Security Officers

  Must capture image correctly             DATA
  Carry out registration accurately       INPUT



  Potential “hits” appear on terminal    REVIEW
  Review and decide                      “HITS”

  Confirm identity on gaming floor
  Complete the breach
                                         INTERCEPT
  Appropriate reporting
RG Overview   Page 15
Human Side
  Duty of Care Implications?
      Detecting SE who breach is a requirement of SE
       program–a support to discourage return to gaming sites
      Photos in binders is one way to do this, FR is another
      Duty of Care/Standard of Care




RG Overview   Page 16
Future Direction




RG Overview   Page 17
Ensuring Performance

      Mystery Shop program with credible independent 3rd
       party
      Technology and pattern reviews to augment the
       technology base
      Product upgrades to implement industry FR
       enhancements




RG Overview   Page 18
Rollout and other Options

      Approximately 20 sites remaining
      Scheduled for completion Q2 of this fiscal



      Off-site registration Process
      Facial recognition can be extended to other areas of the
       casino – for example kiosks, non entrance locations, etc
      Extend the facial recognition technology to other populations
      Optimize the application for mobile platforms



RG Overview   Page 19
FR/BE Health Check and Enhancements

      Post rollout review and tuning is an ongoing task
      Privacy audit to validate the system design and
       implementation
      Site adjustments – optimized and/or additional cameras
      As detection levels fluctuate, understand why – SE program
       success versus system performance problems
      Analysis, analytics and trending for RG and addiction research




RG Overview   Page 20
Additional Sources

      OLG/IPC paper:
      Privacy-Protective Facial Recognition: Biometric Encryption Proof of Concept
      http://www.ipc.on.ca/images/Resources/pbd-olg-facial-recog.pdf

      IEEE pub:
      Martin, K., Lu, H., Bui, F., Plataniotis, K. N. and Hatzinakos, D.: A biometric encryption system
       for the self-exclusion scenario of face recognition. IEEE Systems Journal: Special Issue on
       Biometrics Systems 3(4), 440-450 (2009)

      IEEE pub:
      Lu, H., Martin, K., Bui, F., Plataniotis, K. N. and Hatzinakos, D.: Face recognition with
       biometric encryption for privacy-enhancing self-exclusion. (2009)

      IEEE pub:
       Bui, F.M., Martin, K., Lu, H., Plataniotis, K.N., and Hatzinakos, D.: Fuzzy Key Binding
       Strategies Based on Quantization Index Modulation (QIM) for biometric Encryption (BE)
       Applications. IEEE Transactions On Information Forensics and Security 5(1), 118-132 (2010)




RG Overview   Page 21

Weitere ähnliche Inhalte

Ähnlich wie Leg2a facial-recognition cga-april-2011-final

Allied Intro (Short)
Allied Intro (Short)Allied Intro (Short)
Allied Intro (Short)Chris Colson
 
GovLoop training analytics
GovLoop training analyticsGovLoop training analytics
GovLoop training analyticsGovLoop
 
11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)Jeremiah Grossman
 
Touchcom Sales Presentation
Touchcom Sales PresentationTouchcom Sales Presentation
Touchcom Sales Presentationewickline
 
Biometric Authentication for J2EE applications - JavaONE 2005
Biometric Authentication for J2EE applications - JavaONE 2005Biometric Authentication for J2EE applications - JavaONE 2005
Biometric Authentication for J2EE applications - JavaONE 2005Ramesh Nagappan
 
Faster apps. faster time to market. faster mean time to repair
Faster apps. faster time to market. faster mean time to repairFaster apps. faster time to market. faster mean time to repair
Faster apps. faster time to market. faster mean time to repairCompuware ASEAN
 
A brief overview of operational risk
A brief overview of operational riskA brief overview of operational risk
A brief overview of operational riskDiane Christina
 
How to make money out of open source software?
How to make money out of open source software?How to make money out of open source software?
How to make money out of open source software?SANGHEE SHIN
 
Digiop Marketing Presentation
Digiop Marketing PresentationDigiop Marketing Presentation
Digiop Marketing Presentationrmellott
 
Detailed Total Enrollment
Detailed  Total  EnrollmentDetailed  Total  Enrollment
Detailed Total Enrollmenttreyreeves1953
 
eMetrics SF 2011 - Integrating Analytics and Testing at Dell
eMetrics SF 2011 - Integrating Analytics and Testing at DelleMetrics SF 2011 - Integrating Analytics and Testing at Dell
eMetrics SF 2011 - Integrating Analytics and Testing at Delljoel_wright
 
Slow Cool 20081009 Final
Slow Cool 20081009 FinalSlow Cool 20081009 Final
Slow Cool 20081009 Finalrajivmordani
 
Motorola Report: State of Mobility in Healthcare
Motorola Report: State of Mobility in HealthcareMotorola Report: State of Mobility in Healthcare
Motorola Report: State of Mobility in Healthcare3GDR
 
IBM Confidently Provide Guidance with IBM Cognos TM1 and What-if Analysis
IBM Confidently Provide Guidance with IBM Cognos TM1 and What-if AnalysisIBM Confidently Provide Guidance with IBM Cognos TM1 and What-if Analysis
IBM Confidently Provide Guidance with IBM Cognos TM1 and What-if AnalysisIBM Sverige
 
Addressing Fraud Risk Management with Facts
Addressing Fraud Risk Management with FactsAddressing Fraud Risk Management with Facts
Addressing Fraud Risk Management with FactsInfosys BPM
 
Tapjoy mob crete_struggle with analytics
Tapjoy mob crete_struggle with analyticsTapjoy mob crete_struggle with analytics
Tapjoy mob crete_struggle with analyticsNae-won Park
 
Cloud Service Providers and OpenStack
Cloud Service Providers and OpenStackCloud Service Providers and OpenStack
Cloud Service Providers and OpenStackOpen Stack
 

Ähnlich wie Leg2a facial-recognition cga-april-2011-final (20)

Allied Intro (Short)
Allied Intro (Short)Allied Intro (Short)
Allied Intro (Short)
 
GovLoop training analytics
GovLoop training analyticsGovLoop training analytics
GovLoop training analytics
 
11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)
 
Touchcom Sales Presentation
Touchcom Sales PresentationTouchcom Sales Presentation
Touchcom Sales Presentation
 
Biometric Authentication for J2EE applications - JavaONE 2005
Biometric Authentication for J2EE applications - JavaONE 2005Biometric Authentication for J2EE applications - JavaONE 2005
Biometric Authentication for J2EE applications - JavaONE 2005
 
Faster apps. faster time to market. faster mean time to repair
Faster apps. faster time to market. faster mean time to repairFaster apps. faster time to market. faster mean time to repair
Faster apps. faster time to market. faster mean time to repair
 
A brief overview of operational risk
A brief overview of operational riskA brief overview of operational risk
A brief overview of operational risk
 
How to make money out of open source software?
How to make money out of open source software?How to make money out of open source software?
How to make money out of open source software?
 
Digiop Marketing Presentation
Digiop Marketing PresentationDigiop Marketing Presentation
Digiop Marketing Presentation
 
Detailed Total Enrollment
Detailed  Total  EnrollmentDetailed  Total  Enrollment
Detailed Total Enrollment
 
eMetrics SF 2011 - Integrating Analytics and Testing at Dell
eMetrics SF 2011 - Integrating Analytics and Testing at DelleMetrics SF 2011 - Integrating Analytics and Testing at Dell
eMetrics SF 2011 - Integrating Analytics and Testing at Dell
 
Aaci & fac64 sales presentation v1
Aaci & fac64 sales presentation v1Aaci & fac64 sales presentation v1
Aaci & fac64 sales presentation v1
 
Slow Cool 20081009 Final
Slow Cool 20081009 FinalSlow Cool 20081009 Final
Slow Cool 20081009 Final
 
Motorola Report: State of Mobility in Healthcare
Motorola Report: State of Mobility in HealthcareMotorola Report: State of Mobility in Healthcare
Motorola Report: State of Mobility in Healthcare
 
2012 Safety Academy: Compliance Overview
2012 Safety Academy: Compliance Overview2012 Safety Academy: Compliance Overview
2012 Safety Academy: Compliance Overview
 
IBM Confidently Provide Guidance with IBM Cognos TM1 and What-if Analysis
IBM Confidently Provide Guidance with IBM Cognos TM1 and What-if AnalysisIBM Confidently Provide Guidance with IBM Cognos TM1 and What-if Analysis
IBM Confidently Provide Guidance with IBM Cognos TM1 and What-if Analysis
 
Addressing Fraud Risk Management with Facts
Addressing Fraud Risk Management with FactsAddressing Fraud Risk Management with Facts
Addressing Fraud Risk Management with Facts
 
Tapjoy mob crete_struggle with analytics
Tapjoy mob crete_struggle with analyticsTapjoy mob crete_struggle with analytics
Tapjoy mob crete_struggle with analytics
 
Safety Score Card
Safety Score CardSafety Score Card
Safety Score Card
 
Cloud Service Providers and OpenStack
Cloud Service Providers and OpenStackCloud Service Providers and OpenStack
Cloud Service Providers and OpenStack
 

Mehr von brock55

Fng1 canadian-gaming-summit-110412-final
Fng1 canadian-gaming-summit-110412-finalFng1 canadian-gaming-summit-110412-final
Fng1 canadian-gaming-summit-110412-finalbrock55
 
Mkt2 building youronlinemktgpresence
Mkt2 building youronlinemktgpresenceMkt2 building youronlinemktgpresence
Mkt2 building youronlinemktgpresencebrock55
 
Mkt3 canadian-gaming-summit-importance-of-branding
Mkt3 canadian-gaming-summit-importance-of-brandingMkt3 canadian-gaming-summit-importance-of-branding
Mkt3 canadian-gaming-summit-importance-of-brandingbrock55
 
Fng5 impact-i gaming-on-landbased-april-2011
Fng5 impact-i gaming-on-landbased-april-2011Fng5 impact-i gaming-on-landbased-april-2011
Fng5 impact-i gaming-on-landbased-april-2011brock55
 
Sec2 on-line-gaming-presentation
Sec2 on-line-gaming-presentationSec2 on-line-gaming-presentation
Sec2 on-line-gaming-presentationbrock55
 
Ops5 building-a-new-entertainment-brand
Ops5 building-a-new-entertainment-brandOps5 building-a-new-entertainment-brand
Ops5 building-a-new-entertainment-brandbrock55
 

Mehr von brock55 (8)

Fng1 canadian-gaming-summit-110412-final
Fng1 canadian-gaming-summit-110412-finalFng1 canadian-gaming-summit-110412-final
Fng1 canadian-gaming-summit-110412-final
 
Mkt2 building youronlinemktgpresence
Mkt2 building youronlinemktgpresenceMkt2 building youronlinemktgpresence
Mkt2 building youronlinemktgpresence
 
Leg4
Leg4 Leg4
Leg4
 
Mkt3 canadian-gaming-summit-importance-of-branding
Mkt3 canadian-gaming-summit-importance-of-brandingMkt3 canadian-gaming-summit-importance-of-branding
Mkt3 canadian-gaming-summit-importance-of-branding
 
Fng5 impact-i gaming-on-landbased-april-2011
Fng5 impact-i gaming-on-landbased-april-2011Fng5 impact-i gaming-on-landbased-april-2011
Fng5 impact-i gaming-on-landbased-april-2011
 
Sec2 on-line-gaming-presentation
Sec2 on-line-gaming-presentationSec2 on-line-gaming-presentation
Sec2 on-line-gaming-presentation
 
Mkt5
Mkt5Mkt5
Mkt5
 
Ops5 building-a-new-entertainment-brand
Ops5 building-a-new-entertainment-brandOps5 building-a-new-entertainment-brand
Ops5 building-a-new-entertainment-brand
 

Kürzlich hochgeladen

[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 

Kürzlich hochgeladen (20)

[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 

Leg2a facial-recognition cga-april-2011-final

  • 1. FACIAL RECOGNITION Evolving Detection to Support Voluntary Self-Exclusion Canadian Gaming Summit Vancouver, April 2011
  • 2. Contents 1. Defining the Program Requirements PAUL 2. Facial Recognition & Biometric Encryption KLAUS 3. The Human Side of Detection PAUL 4. Future Direction KLAUS RG Overview Page 2
  • 3. Defining Program Requirements RG Overview Page 3
  • 4. Defining Program Requirements Self-Exclusion Option to take a break from slot/casino gambling Self-help tool for players who are working to control behaviour OLG Role:  Provide clear information, implications for entering  Effectively deliver systems, policies, procedures  Stop direct marketing  Provide referrals as a “gateway” to a system of community service that are “individually tailored” Applies to slots/casino sites in Ontario Does NOT apply to lottery, bingo, horse racing RG Overview Page 4
  • 5. Defining Program Requirements What Self-Exclusion is Not  Determination/judgement about a gambling problem  A policing program  A way to prevent people from gambling Dr. Howard J. Shaffer Harvard Medical “… responsibility for self-exclusion and School – ultimately gambling remains with the Division on patron… Even the name, self-exclusion, Addictions should serve to remind patrons, policy makers and industry observers that the responsibility for the behaviour of the gamblers who enroll in self-exclusion programs remains with them.” RG Overview Page 5
  • 6. Defining Program Requirements Why Attempt to Detect Self-Excluders at All? Deterrent to Breaching NOT Policing  If a self-excluded person is detected, s/he will be escorted from site, and can be trespassed  Support by operator includes creating disincentives to breaching FR is not the answer on its own… it is on part of an overall perimeter of support for Self-Excluders RG Overview Page 6
  • 7. Defining Program Requirements Context for Facial Recognition Objectives: To support players, evolve practices, build corporate reputation OLG decisions must consider: Vulnerable Player Most Self-Excluders have significant problems Segment Program Standards International dialogue on best practices Brand Integrity OLG is highly scrutinized RG Overview Page 7
  • 8. Defining Program Requirements Program Priorities Decision to implement FR required the following criteria: • Sufficient “true hit” rate SYSTEM • Acceptable “false positive” rate PERFORMANCE • Defensible cost • “Privacy by design” approach RESPECT for • Protection of images/data to exceed industry standards PRIVACY • Images of non-self-excluders had to be deleted • Security officers use terminals at podium EASE of • System allows officers to review images that OPERATION appear with a “hit”, in order to “make call” • Operate seamlessly with surveillance systems RG Overview Page 8
  • 9. Defining Program Requirements Partners in Facial Recognition Information AGCO Privacy Regulator Commissioner University of iView Toronto Systems RG Overview Page 9
  • 10. Facial Recognition & Biometric Encryption RG Overview Page 10
  • 11. Self Exclusion Technology Timeline Overall Approach Online and Privacy FR+BE Build Rollout FR+BE centralized requirements FR+BE solution production FR+BE proven SE system finalized tuned confirmed FR+BE technology viable (no FR) by IPC system at OLG »live April »minor reduction »meetings with »80% to 90% CIR »proposal »rollout results are 2009 in CIR IPC staff for OLG volunteer vetted by iView, consistent with POC tests »~50% reduction group UofT, IPC and in false alarms »detecting 30 times OLG Exec more SE than the current process • Measured approach to developing the system • Privacy by Design • Used staff control groups to measure system performance • Lighting and pose are key to facial recognition success • Field trial at Woodbine to validate system performance • Rollout to all sites RG Overview Page 11
  • 12. Privacy by by Design: Privacy Design Privacy + Security We are discarding all captured images except correctly recognized alerts HASH FR PI IMAGE NAME TMPL ADDR BE RG Overview Page 12
  • 13. Face Recognition Performance Control Group Results Correct Identification Rate 30% Lighting Improvements 49% Improvements 80% Entrance Additional Lighting 88% Camera Positioning 91% »baseline at »test at »test at »test at »test at Casino SSM Foster Drive Woodbine Slots Woodbine Slots Woodbine Slots Apr. 2009 Oct. 2009 Oct. 2009 Oct. 2009 Mar. 2010 Note: All tests were controlled by using volunteer OLG employees to determine the Correct Identification Rate RG Overview Page 13
  • 14. Human Side of Detection RG Overview Page 14
  • 15. Human Side Role of Security Officers  Must capture image correctly DATA  Carry out registration accurately INPUT  Potential “hits” appear on terminal REVIEW  Review and decide “HITS”  Confirm identity on gaming floor  Complete the breach INTERCEPT  Appropriate reporting RG Overview Page 15
  • 16. Human Side Duty of Care Implications?  Detecting SE who breach is a requirement of SE program–a support to discourage return to gaming sites  Photos in binders is one way to do this, FR is another  Duty of Care/Standard of Care RG Overview Page 16
  • 18. Ensuring Performance  Mystery Shop program with credible independent 3rd party  Technology and pattern reviews to augment the technology base  Product upgrades to implement industry FR enhancements RG Overview Page 18
  • 19. Rollout and other Options  Approximately 20 sites remaining  Scheduled for completion Q2 of this fiscal  Off-site registration Process  Facial recognition can be extended to other areas of the casino – for example kiosks, non entrance locations, etc  Extend the facial recognition technology to other populations  Optimize the application for mobile platforms RG Overview Page 19
  • 20. FR/BE Health Check and Enhancements  Post rollout review and tuning is an ongoing task  Privacy audit to validate the system design and implementation  Site adjustments – optimized and/or additional cameras  As detection levels fluctuate, understand why – SE program success versus system performance problems  Analysis, analytics and trending for RG and addiction research RG Overview Page 20
  • 21. Additional Sources  OLG/IPC paper:  Privacy-Protective Facial Recognition: Biometric Encryption Proof of Concept  http://www.ipc.on.ca/images/Resources/pbd-olg-facial-recog.pdf  IEEE pub:  Martin, K., Lu, H., Bui, F., Plataniotis, K. N. and Hatzinakos, D.: A biometric encryption system for the self-exclusion scenario of face recognition. IEEE Systems Journal: Special Issue on Biometrics Systems 3(4), 440-450 (2009)  IEEE pub:  Lu, H., Martin, K., Bui, F., Plataniotis, K. N. and Hatzinakos, D.: Face recognition with biometric encryption for privacy-enhancing self-exclusion. (2009)  IEEE pub:  Bui, F.M., Martin, K., Lu, H., Plataniotis, K.N., and Hatzinakos, D.: Fuzzy Key Binding Strategies Based on Quantization Index Modulation (QIM) for biometric Encryption (BE) Applications. IEEE Transactions On Information Forensics and Security 5(1), 118-132 (2010) RG Overview Page 21