SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Downloaden Sie, um offline zu lesen
FACIAL RECOGNITION

Evolving Detection to Support
   Voluntary Self-Exclusion
      Canadian Gaming Summit
       Vancouver, April 2011
Contents

 1. Defining the Program Requirements           PAUL
 2. Facial Recognition & Biometric Encryption   KLAUS
 3. The Human Side of Detection                 PAUL
 4. Future Direction                            KLAUS




RG Overview   Page 2
Defining Program
                       Requirements



RG Overview   Page 3
Defining Program Requirements
     Self-Exclusion
        Option to take a break from slot/casino gambling
        Self-help tool for players who are working to control behaviour

      OLG Role:
       Provide clear information, implications for entering

       Effectively deliver systems, policies, procedures

       Stop direct marketing

       Provide referrals as a “gateway” to a system of
        community service that are “individually tailored”

                        Applies to slots/casino sites in Ontario
                        Does NOT apply to lottery, bingo, horse racing
RG Overview   Page 4
Defining Program Requirements
  What Self-Exclusion is Not
      Determination/judgement about a gambling problem
      A policing program
      A way to prevent people from gambling

   Dr. Howard J. Shaffer
      Harvard Medical              “… responsibility for self-exclusion and
         School –                   ultimately gambling remains with the
        Division on               patron… Even the name, self-exclusion,
        Addictions                 should serve to remind patrons, policy
                                  makers and industry observers that the
                                    responsibility for the behaviour of the
                                    gamblers who enroll in self-exclusion
                                        programs remains with them.”



RG Overview   Page 5
Defining Program Requirements
  Why Attempt to Detect Self-Excluders at
  All?
Deterrent to Breaching NOT                             Policing


      If a self-excluded person is detected, s/he will be escorted
       from site, and can be trespassed
      Support by operator includes creating disincentives to
       breaching


  FR is not the answer on its own… it is on part of
  an overall perimeter of support for Self-Excluders



RG Overview   Page 6
Defining Program Requirements
  Context for Facial Recognition
Objectives: To support players, evolve practices, build
 corporate reputation
OLG decisions must consider:

Vulnerable Player
                       Most Self-Excluders have significant problems
    Segment


Program Standards      International dialogue on best practices


   Brand Integrity     OLG is highly scrutinized


RG Overview   Page 7
Defining Program Requirements
  Program Priorities
Decision to implement FR required the following criteria:

                       • Sufficient “true hit” rate
    SYSTEM             • Acceptable “false positive” rate
 PERFORMANCE           • Defensible cost


                       • “Privacy by design” approach
     RESPECT for       • Protection of images/data to exceed industry standards
      PRIVACY          • Images of non-self-excluders had to be deleted

                       • Security officers use terminals at podium
      EASE of          • System allows officers to review images that
     OPERATION           appear with a “hit”, in order to “make call”
                       • Operate seamlessly with surveillance systems
RG Overview   Page 8
Defining Program Requirements
 Partners in Facial Recognition


 Information
                                   AGCO
   Privacy
                                  Regulator
Commissioner




University of                      iView
  Toronto                         Systems

RG Overview   Page 9
Facial Recognition
                        &
                        Biometric
                        Encryption


RG Overview   Page 10
Self Exclusion Technology Timeline
     Overall Approach

Online and                                Privacy                           FR+BE              Build          Rollout
                            FR+BE
centralized                            requirements       FR+BE             solution        production        FR+BE
                            proven
SE system                                finalized         tuned           confirmed         FR+BE          technology
                             viable
 (no FR)                                                                    by IPC            system          at OLG

»live April      »minor reduction »meetings with   »80% to 90% CIR       »proposal             »rollout results are
2009             in CIR           IPC staff        for OLG volunteer     vetted by iView,      consistent with POC tests
                 »~50% reduction                   group                 UofT, IPC and
                 in false alarms                   »detecting 30 times   OLG Exec
                                                   more SE than the
                                                   current process



                     • Measured approach to developing the system
                     • Privacy by Design
                     • Used staff control groups to measure system performance
                     • Lighting and pose are key to facial recognition success
                     • Field trial at Woodbine to validate system performance
                     • Rollout to all sites

   RG Overview    Page 11
Privacy by by Design:
  Privacy Design                Privacy + Security

  We are discarding all
 captured images except
correctly recognized alerts

                                     HASH

                         FR                              PI
                                                               IMAGE
                                                 NAME
                         TMPL


                                                        ADDR




                                      BE




 RG Overview   Page 12
Face Recognition Performance
     Control Group Results


                                               Correct Identification Rate



  30%             Lighting
               Improvements
                                49% Improvements 80%
                                      Entrance                        Additional
                                                                       Lighting
                                                                                      88%         Camera
                                                                                                 Positioning
                                                                                                                     91%

»baseline at                »test at                 »test at                      »test at                      »test at
Casino SSM                  Foster Drive             Woodbine Slots                Woodbine Slots                Woodbine Slots
Apr. 2009                   Oct. 2009                Oct. 2009                     Oct. 2009                     Mar. 2010



     Note: All tests were controlled by using volunteer OLG employees to determine the Correct Identification Rate




   RG Overview    Page 13
Human
                        Side
                        of
                        Detection


RG Overview   Page 14
Human Side
Role of Security Officers

  Must capture image correctly             DATA
  Carry out registration accurately       INPUT



  Potential “hits” appear on terminal    REVIEW
  Review and decide                      “HITS”

  Confirm identity on gaming floor
  Complete the breach
                                         INTERCEPT
  Appropriate reporting
RG Overview   Page 15
Human Side
  Duty of Care Implications?
      Detecting SE who breach is a requirement of SE
       program–a support to discourage return to gaming sites
      Photos in binders is one way to do this, FR is another
      Duty of Care/Standard of Care




RG Overview   Page 16
Future Direction




RG Overview   Page 17
Ensuring Performance

      Mystery Shop program with credible independent 3rd
       party
      Technology and pattern reviews to augment the
       technology base
      Product upgrades to implement industry FR
       enhancements




RG Overview   Page 18
Rollout and other Options

      Approximately 20 sites remaining
      Scheduled for completion Q2 of this fiscal



      Off-site registration Process
      Facial recognition can be extended to other areas of the
       casino – for example kiosks, non entrance locations, etc
      Extend the facial recognition technology to other populations
      Optimize the application for mobile platforms



RG Overview   Page 19
FR/BE Health Check and Enhancements

      Post rollout review and tuning is an ongoing task
      Privacy audit to validate the system design and
       implementation
      Site adjustments – optimized and/or additional cameras
      As detection levels fluctuate, understand why – SE program
       success versus system performance problems
      Analysis, analytics and trending for RG and addiction research




RG Overview   Page 20
Additional Sources

      OLG/IPC paper:
      Privacy-Protective Facial Recognition: Biometric Encryption Proof of Concept
      http://www.ipc.on.ca/images/Resources/pbd-olg-facial-recog.pdf

      IEEE pub:
      Martin, K., Lu, H., Bui, F., Plataniotis, K. N. and Hatzinakos, D.: A biometric encryption system
       for the self-exclusion scenario of face recognition. IEEE Systems Journal: Special Issue on
       Biometrics Systems 3(4), 440-450 (2009)

      IEEE pub:
      Lu, H., Martin, K., Bui, F., Plataniotis, K. N. and Hatzinakos, D.: Face recognition with
       biometric encryption for privacy-enhancing self-exclusion. (2009)

      IEEE pub:
       Bui, F.M., Martin, K., Lu, H., Plataniotis, K.N., and Hatzinakos, D.: Fuzzy Key Binding
       Strategies Based on Quantization Index Modulation (QIM) for biometric Encryption (BE)
       Applications. IEEE Transactions On Information Forensics and Security 5(1), 118-132 (2010)




RG Overview   Page 21

Weitere ähnliche Inhalte

Ähnlich wie Leg2a facial-recognition cga-april-2011-final

Allied Intro (Short)
Allied Intro (Short)Allied Intro (Short)
Allied Intro (Short)Chris Colson
 
GovLoop training analytics
GovLoop training analyticsGovLoop training analytics
GovLoop training analyticsGovLoop
 
11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)Jeremiah Grossman
 
Touchcom Sales Presentation
Touchcom Sales PresentationTouchcom Sales Presentation
Touchcom Sales Presentationewickline
 
Biometric Authentication for J2EE applications - JavaONE 2005
Biometric Authentication for J2EE applications - JavaONE 2005Biometric Authentication for J2EE applications - JavaONE 2005
Biometric Authentication for J2EE applications - JavaONE 2005Ramesh Nagappan
 
Faster apps. faster time to market. faster mean time to repair
Faster apps. faster time to market. faster mean time to repairFaster apps. faster time to market. faster mean time to repair
Faster apps. faster time to market. faster mean time to repairCompuware ASEAN
 
A brief overview of operational risk
A brief overview of operational riskA brief overview of operational risk
A brief overview of operational riskDiane Christina
 
How to make money out of open source software?
How to make money out of open source software?How to make money out of open source software?
How to make money out of open source software?SANGHEE SHIN
 
Digiop Marketing Presentation
Digiop Marketing PresentationDigiop Marketing Presentation
Digiop Marketing Presentationrmellott
 
Detailed Total Enrollment
Detailed  Total  EnrollmentDetailed  Total  Enrollment
Detailed Total Enrollmenttreyreeves1953
 
eMetrics SF 2011 - Integrating Analytics and Testing at Dell
eMetrics SF 2011 - Integrating Analytics and Testing at DelleMetrics SF 2011 - Integrating Analytics and Testing at Dell
eMetrics SF 2011 - Integrating Analytics and Testing at Delljoel_wright
 
Slow Cool 20081009 Final
Slow Cool 20081009 FinalSlow Cool 20081009 Final
Slow Cool 20081009 Finalrajivmordani
 
Motorola Report: State of Mobility in Healthcare
Motorola Report: State of Mobility in HealthcareMotorola Report: State of Mobility in Healthcare
Motorola Report: State of Mobility in Healthcare3GDR
 
IBM Confidently Provide Guidance with IBM Cognos TM1 and What-if Analysis
IBM Confidently Provide Guidance with IBM Cognos TM1 and What-if AnalysisIBM Confidently Provide Guidance with IBM Cognos TM1 and What-if Analysis
IBM Confidently Provide Guidance with IBM Cognos TM1 and What-if AnalysisIBM Sverige
 
Addressing Fraud Risk Management with Facts
Addressing Fraud Risk Management with FactsAddressing Fraud Risk Management with Facts
Addressing Fraud Risk Management with FactsInfosys BPM
 
Tapjoy mob crete_struggle with analytics
Tapjoy mob crete_struggle with analyticsTapjoy mob crete_struggle with analytics
Tapjoy mob crete_struggle with analyticsNae-won Park
 
Cloud Service Providers and OpenStack
Cloud Service Providers and OpenStackCloud Service Providers and OpenStack
Cloud Service Providers and OpenStackOpen Stack
 

Ähnlich wie Leg2a facial-recognition cga-april-2011-final (20)

Allied Intro (Short)
Allied Intro (Short)Allied Intro (Short)
Allied Intro (Short)
 
GovLoop training analytics
GovLoop training analyticsGovLoop training analytics
GovLoop training analytics
 
11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)
 
Touchcom Sales Presentation
Touchcom Sales PresentationTouchcom Sales Presentation
Touchcom Sales Presentation
 
Biometric Authentication for J2EE applications - JavaONE 2005
Biometric Authentication for J2EE applications - JavaONE 2005Biometric Authentication for J2EE applications - JavaONE 2005
Biometric Authentication for J2EE applications - JavaONE 2005
 
Faster apps. faster time to market. faster mean time to repair
Faster apps. faster time to market. faster mean time to repairFaster apps. faster time to market. faster mean time to repair
Faster apps. faster time to market. faster mean time to repair
 
A brief overview of operational risk
A brief overview of operational riskA brief overview of operational risk
A brief overview of operational risk
 
How to make money out of open source software?
How to make money out of open source software?How to make money out of open source software?
How to make money out of open source software?
 
Digiop Marketing Presentation
Digiop Marketing PresentationDigiop Marketing Presentation
Digiop Marketing Presentation
 
Detailed Total Enrollment
Detailed  Total  EnrollmentDetailed  Total  Enrollment
Detailed Total Enrollment
 
eMetrics SF 2011 - Integrating Analytics and Testing at Dell
eMetrics SF 2011 - Integrating Analytics and Testing at DelleMetrics SF 2011 - Integrating Analytics and Testing at Dell
eMetrics SF 2011 - Integrating Analytics and Testing at Dell
 
Aaci & fac64 sales presentation v1
Aaci & fac64 sales presentation v1Aaci & fac64 sales presentation v1
Aaci & fac64 sales presentation v1
 
Slow Cool 20081009 Final
Slow Cool 20081009 FinalSlow Cool 20081009 Final
Slow Cool 20081009 Final
 
Motorola Report: State of Mobility in Healthcare
Motorola Report: State of Mobility in HealthcareMotorola Report: State of Mobility in Healthcare
Motorola Report: State of Mobility in Healthcare
 
2012 Safety Academy: Compliance Overview
2012 Safety Academy: Compliance Overview2012 Safety Academy: Compliance Overview
2012 Safety Academy: Compliance Overview
 
IBM Confidently Provide Guidance with IBM Cognos TM1 and What-if Analysis
IBM Confidently Provide Guidance with IBM Cognos TM1 and What-if AnalysisIBM Confidently Provide Guidance with IBM Cognos TM1 and What-if Analysis
IBM Confidently Provide Guidance with IBM Cognos TM1 and What-if Analysis
 
Addressing Fraud Risk Management with Facts
Addressing Fraud Risk Management with FactsAddressing Fraud Risk Management with Facts
Addressing Fraud Risk Management with Facts
 
Tapjoy mob crete_struggle with analytics
Tapjoy mob crete_struggle with analyticsTapjoy mob crete_struggle with analytics
Tapjoy mob crete_struggle with analytics
 
Safety Score Card
Safety Score CardSafety Score Card
Safety Score Card
 
Cloud Service Providers and OpenStack
Cloud Service Providers and OpenStackCloud Service Providers and OpenStack
Cloud Service Providers and OpenStack
 

Mehr von brock55

Fng1 canadian-gaming-summit-110412-final
Fng1 canadian-gaming-summit-110412-finalFng1 canadian-gaming-summit-110412-final
Fng1 canadian-gaming-summit-110412-finalbrock55
 
Mkt2 building youronlinemktgpresence
Mkt2 building youronlinemktgpresenceMkt2 building youronlinemktgpresence
Mkt2 building youronlinemktgpresencebrock55
 
Mkt3 canadian-gaming-summit-importance-of-branding
Mkt3 canadian-gaming-summit-importance-of-brandingMkt3 canadian-gaming-summit-importance-of-branding
Mkt3 canadian-gaming-summit-importance-of-brandingbrock55
 
Fng5 impact-i gaming-on-landbased-april-2011
Fng5 impact-i gaming-on-landbased-april-2011Fng5 impact-i gaming-on-landbased-april-2011
Fng5 impact-i gaming-on-landbased-april-2011brock55
 
Sec2 on-line-gaming-presentation
Sec2 on-line-gaming-presentationSec2 on-line-gaming-presentation
Sec2 on-line-gaming-presentationbrock55
 
Ops5 building-a-new-entertainment-brand
Ops5 building-a-new-entertainment-brandOps5 building-a-new-entertainment-brand
Ops5 building-a-new-entertainment-brandbrock55
 

Mehr von brock55 (8)

Fng1 canadian-gaming-summit-110412-final
Fng1 canadian-gaming-summit-110412-finalFng1 canadian-gaming-summit-110412-final
Fng1 canadian-gaming-summit-110412-final
 
Mkt2 building youronlinemktgpresence
Mkt2 building youronlinemktgpresenceMkt2 building youronlinemktgpresence
Mkt2 building youronlinemktgpresence
 
Leg4
Leg4 Leg4
Leg4
 
Mkt3 canadian-gaming-summit-importance-of-branding
Mkt3 canadian-gaming-summit-importance-of-brandingMkt3 canadian-gaming-summit-importance-of-branding
Mkt3 canadian-gaming-summit-importance-of-branding
 
Fng5 impact-i gaming-on-landbased-april-2011
Fng5 impact-i gaming-on-landbased-april-2011Fng5 impact-i gaming-on-landbased-april-2011
Fng5 impact-i gaming-on-landbased-april-2011
 
Sec2 on-line-gaming-presentation
Sec2 on-line-gaming-presentationSec2 on-line-gaming-presentation
Sec2 on-line-gaming-presentation
 
Mkt5
Mkt5Mkt5
Mkt5
 
Ops5 building-a-new-entertainment-brand
Ops5 building-a-new-entertainment-brandOps5 building-a-new-entertainment-brand
Ops5 building-a-new-entertainment-brand
 

Kürzlich hochgeladen

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 

Kürzlich hochgeladen (20)

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 

Leg2a facial-recognition cga-april-2011-final

  • 1. FACIAL RECOGNITION Evolving Detection to Support Voluntary Self-Exclusion Canadian Gaming Summit Vancouver, April 2011
  • 2. Contents 1. Defining the Program Requirements PAUL 2. Facial Recognition & Biometric Encryption KLAUS 3. The Human Side of Detection PAUL 4. Future Direction KLAUS RG Overview Page 2
  • 3. Defining Program Requirements RG Overview Page 3
  • 4. Defining Program Requirements Self-Exclusion Option to take a break from slot/casino gambling Self-help tool for players who are working to control behaviour OLG Role:  Provide clear information, implications for entering  Effectively deliver systems, policies, procedures  Stop direct marketing  Provide referrals as a “gateway” to a system of community service that are “individually tailored” Applies to slots/casino sites in Ontario Does NOT apply to lottery, bingo, horse racing RG Overview Page 4
  • 5. Defining Program Requirements What Self-Exclusion is Not  Determination/judgement about a gambling problem  A policing program  A way to prevent people from gambling Dr. Howard J. Shaffer Harvard Medical “… responsibility for self-exclusion and School – ultimately gambling remains with the Division on patron… Even the name, self-exclusion, Addictions should serve to remind patrons, policy makers and industry observers that the responsibility for the behaviour of the gamblers who enroll in self-exclusion programs remains with them.” RG Overview Page 5
  • 6. Defining Program Requirements Why Attempt to Detect Self-Excluders at All? Deterrent to Breaching NOT Policing  If a self-excluded person is detected, s/he will be escorted from site, and can be trespassed  Support by operator includes creating disincentives to breaching FR is not the answer on its own… it is on part of an overall perimeter of support for Self-Excluders RG Overview Page 6
  • 7. Defining Program Requirements Context for Facial Recognition Objectives: To support players, evolve practices, build corporate reputation OLG decisions must consider: Vulnerable Player Most Self-Excluders have significant problems Segment Program Standards International dialogue on best practices Brand Integrity OLG is highly scrutinized RG Overview Page 7
  • 8. Defining Program Requirements Program Priorities Decision to implement FR required the following criteria: • Sufficient “true hit” rate SYSTEM • Acceptable “false positive” rate PERFORMANCE • Defensible cost • “Privacy by design” approach RESPECT for • Protection of images/data to exceed industry standards PRIVACY • Images of non-self-excluders had to be deleted • Security officers use terminals at podium EASE of • System allows officers to review images that OPERATION appear with a “hit”, in order to “make call” • Operate seamlessly with surveillance systems RG Overview Page 8
  • 9. Defining Program Requirements Partners in Facial Recognition Information AGCO Privacy Regulator Commissioner University of iView Toronto Systems RG Overview Page 9
  • 10. Facial Recognition & Biometric Encryption RG Overview Page 10
  • 11. Self Exclusion Technology Timeline Overall Approach Online and Privacy FR+BE Build Rollout FR+BE centralized requirements FR+BE solution production FR+BE proven SE system finalized tuned confirmed FR+BE technology viable (no FR) by IPC system at OLG »live April »minor reduction »meetings with »80% to 90% CIR »proposal »rollout results are 2009 in CIR IPC staff for OLG volunteer vetted by iView, consistent with POC tests »~50% reduction group UofT, IPC and in false alarms »detecting 30 times OLG Exec more SE than the current process • Measured approach to developing the system • Privacy by Design • Used staff control groups to measure system performance • Lighting and pose are key to facial recognition success • Field trial at Woodbine to validate system performance • Rollout to all sites RG Overview Page 11
  • 12. Privacy by by Design: Privacy Design Privacy + Security We are discarding all captured images except correctly recognized alerts HASH FR PI IMAGE NAME TMPL ADDR BE RG Overview Page 12
  • 13. Face Recognition Performance Control Group Results Correct Identification Rate 30% Lighting Improvements 49% Improvements 80% Entrance Additional Lighting 88% Camera Positioning 91% »baseline at »test at »test at »test at »test at Casino SSM Foster Drive Woodbine Slots Woodbine Slots Woodbine Slots Apr. 2009 Oct. 2009 Oct. 2009 Oct. 2009 Mar. 2010 Note: All tests were controlled by using volunteer OLG employees to determine the Correct Identification Rate RG Overview Page 13
  • 14. Human Side of Detection RG Overview Page 14
  • 15. Human Side Role of Security Officers  Must capture image correctly DATA  Carry out registration accurately INPUT  Potential “hits” appear on terminal REVIEW  Review and decide “HITS”  Confirm identity on gaming floor  Complete the breach INTERCEPT  Appropriate reporting RG Overview Page 15
  • 16. Human Side Duty of Care Implications?  Detecting SE who breach is a requirement of SE program–a support to discourage return to gaming sites  Photos in binders is one way to do this, FR is another  Duty of Care/Standard of Care RG Overview Page 16
  • 18. Ensuring Performance  Mystery Shop program with credible independent 3rd party  Technology and pattern reviews to augment the technology base  Product upgrades to implement industry FR enhancements RG Overview Page 18
  • 19. Rollout and other Options  Approximately 20 sites remaining  Scheduled for completion Q2 of this fiscal  Off-site registration Process  Facial recognition can be extended to other areas of the casino – for example kiosks, non entrance locations, etc  Extend the facial recognition technology to other populations  Optimize the application for mobile platforms RG Overview Page 19
  • 20. FR/BE Health Check and Enhancements  Post rollout review and tuning is an ongoing task  Privacy audit to validate the system design and implementation  Site adjustments – optimized and/or additional cameras  As detection levels fluctuate, understand why – SE program success versus system performance problems  Analysis, analytics and trending for RG and addiction research RG Overview Page 20
  • 21. Additional Sources  OLG/IPC paper:  Privacy-Protective Facial Recognition: Biometric Encryption Proof of Concept  http://www.ipc.on.ca/images/Resources/pbd-olg-facial-recog.pdf  IEEE pub:  Martin, K., Lu, H., Bui, F., Plataniotis, K. N. and Hatzinakos, D.: A biometric encryption system for the self-exclusion scenario of face recognition. IEEE Systems Journal: Special Issue on Biometrics Systems 3(4), 440-450 (2009)  IEEE pub:  Lu, H., Martin, K., Bui, F., Plataniotis, K. N. and Hatzinakos, D.: Face recognition with biometric encryption for privacy-enhancing self-exclusion. (2009)  IEEE pub:  Bui, F.M., Martin, K., Lu, H., Plataniotis, K.N., and Hatzinakos, D.: Fuzzy Key Binding Strategies Based on Quantization Index Modulation (QIM) for biometric Encryption (BE) Applications. IEEE Transactions On Information Forensics and Security 5(1), 118-132 (2010) RG Overview Page 21