Solutions

Cipherstone Technologies helps businesses develop advanced products integrating computer vision technology in a wide range of areas including advanced user interfaces, biometric authentication, industrial inspection, intelligent surveillance, medical imaging and traffic monitoring.

Advanced computer vision technology may be applied for monitoring of traffic on highways or rail networks. For example, vision may assist in the automatic detection and identification of vehicles, and the classification of vehicle types. The technology may be utilised in e.g. an electronic toll collection system for free flow traffic. Computer vision may also be an integral part in systems for automatic incident detection and traffic density estimation. On the rail networks, visual technologies may be employed to detect damages on trains, particularly the pantograph which may tear down the power line if damaged causing severe delays. Example application:…
An important long-term goal in the development of advanced user interfaces is to bridge the gap between the user and the computer and to make the interaction more user friendly and natural. One step in that direction is to allow the user to control a computer using body movements and speech. For example, using computer vision technologies, we can track the movements of the head, eyes, arms and so on. Gestures can be recognised and then translated into commands such as "move object up" or "rotate object". Example areas where the user-computer interaction would benefit from computer vision technologies include…
In industrial inspection, products arriving on a conveyor belt are checked with respect to quality. Typically, this process involves checking visual features such as size, shape, colour, surface characteristics and existence of the individual product parts. In many applications, the inspection may be automated in whole or in parts using computer vision technology. The application of vision is typically straightforward in inspection as it is often possible to control the lighting using multiple light sources and favourable camera angles. Example application: Timber sorting A real-world example is the automatic sorting of timber based on visual features. Surface images of the…
In medical imaging, computer vision technology is frequently used to enhance images such as tomography or ultrasound images for visual inspection.The objective may be to suppress noise in a magnetic resonance image of a brain or increase contrast in an obstetric sonogram of a fetus. In microscopic imaging, computer vision software is often employed to detect and classify cells with the goal of detecting pathological tissue, and discriminate it from normal tissue. Example application: Magnetic resonance imaging Magnetic resonance imaging (MRI) is an imaging technique used to visualise internal structures in the body. It is particulary useful for imaging soft…
Proactive CCTV surveillance typically involves monitoring video streams from many different cameras trying to identify and react to incidents as soon as they appear. Computer vision may assist in the real-time processing of the video streams to draw the operator attention to events that may be of interest and thereby reduce the work load and increase the response time. Vision may also be used off-line to process previously captured footage to localise and track suspect vehicles or persons over a period of time. Applications range from identifying hooligans at a football stadium to detecting terrorists at long range as they…
Biometric authentication refers to the identification of humans based on physical or behavioural characteristics. Examples of biometric modalities include face, fingerprint, retina and iris identification. The choice of modality depends on the requirements of the application, e.g. the desired level of security, the acceptable level of intrusiveness, and the maximum hardware and software cost. For example, fingerprint scanners are typically used for computer logon while face and gait recognition are the most suitable modalities for CCTV surveillance applications. The company staff has more than 15 years of experience in applying computer vision technology in the domain of biometric authentication. Example…

Solutions

  • 1

Industries

  • 1