Secure identity authentication system
Accurate, convenient.

enhanced security

The difficulty of impersonation is greatly increased through use of facial recognition technology.

convenient experience

The facial recognition process requires very little effort from the user, promptly verifying identity.

contactless system

The technology requires no physical contact, enhancing hygiene and reducing health risks.

enhanced security

The difficulty of impersonation is greatly increased through use of facial recognition technology.

convenient experience

The facial recognition process requires very little effort from the user, promptly verifying identity.

contactless system

The technology requires no physical contact, enhancing hygiene and reducing health risks.

The Tambua system takes a series of measurements of different key features on a person’s face, and builds a unique identifier specific to that individual

This unique identifier runs through an existing database, and produce a match confirming a person’s identity

It exhibits an accuracy above 99% on faces in the Wild

The Tambua system takes a series of measurements of different key features on a person’s face, and builds a unique identifier specific to that individual

This unique identifier can run through an existing database, and produce a match confirming a person’s identity

It exhibits an accuracy above 99% on faces in the Wild

The Avenity system takes a series of measurements of different key features on a person’s face, and builds a unique identifier specific to that individual 

This unique identifier can run through an existing database, and produce a match confirming a person’s identity

It exhibits an accuracy above 99% on faces in the Wild

LIVENESS DETECTION

A common method used to fool facial recognition systems involves presentation attacks

These involve impersonation of authorized users by means of:

  • Photographs
  • Screen Video Replay
  • Face Masks

Today, any person’s image can be found on social media platforms, or by a simple google image search

Our system has a unique anti-spoofing mechanism that accurately determines whether any face presented for authorization belongs to a real person, or is a presentation attack

2

LIVENESS DETECTION

2

A common method used to fool facial recognition systems involves presentation attacks

These involve impersonation of authorized users by means of:

  • Photographs
  • Screen Video Replay
  • Face Masks

Today, any person’s image can be found on social media platforms, or by a simple google image search

Our system has a unique anti-spoofing mechanism that accurately determines whether any face presented for authorization belongs to a real person, or is a presentation attack 

Get In Touch

Lets discuss how we can collaborate to meet your security needs

+254 734 572279

+254 706 572277

Available from 09:00 – 17:00

Address Sultan Office Suite, Ngong View Rd, Karen, Nairobi – Kenya

Email info@marceda.com