Remote Guarding: Changing the Face of Video Surveillance

By KoldoEceiza, Corporate Vice President of...

Remote Guarding: Changing the Face of...

Frontier Tech and Corporate Innovations

By Biren Gandhi, Head of Drone Business and...

Frontier Tech and Corporate Innovations

Improving Workforce Productivity In The Diagnostic Laboratory

By Mike Heydlauf, Sr. Director of Software...

Improving Workforce Productivity In...

Binge-Watching Education: Using Compelling Video To Engage Students Online

By Dr. Andrea Backman, Chief Academic Officer and...

Binge-Watching Education: Using...

Introduction to Security Video Analytics and Advancements

By David Waldron, CPP, Associate Principal and Project Executive, IMEG Corp

Introduction to Security Video Analytics and AdvancementsDavid Waldron, CPP, Associate Principal and Project Executive, IMEG Corp

As early analog-based CCTV systems have evolved into networked IP video surveillance systems, the capabilities, feature sets, and intelligence of systems available on the market have increased exponentially. As analog cameras were replaced by IP cameras, transmission infrastructure moved from dedicated coax networks to standard structured cable data networks, and recording systems advanced from video tape recorders to digital video recorders (DVRs) and later network video recorders (NVRs). Throughout this evolution, video surveillance data has become more valuable to organizations’ security efforts.

Over recent years, the quantity of cameras deployed at a typical commercial or government facility has increased to meet the demand for greater and greater visibility– but the ability for humans to effectively monitor these systems has been overwhelmed by the huge amounts of video data captured. Security monitoring personnel cannot view the large number of video feeds and be expected to successfully pick out security incidents or suspicious behavior on a real-time basis or even to search for security events from thousands of hours of recorded video. This limitation spurred the development of software applications that can process large amounts of video data and extract valuable video information, freeing security staff to apply human intelligence to evaluate and assess incident video to identify actual security threats or activities. The use of computer processing power and software algorithms to automate the processing of large collections of video data is referred to as“video content analysis” or more commonly as “video analytics.”

Advanced intelligence

Video analytic products have evolved from early offerings using rules-based analytics to more intelligent systems made possible by advancements in artificial intelligence (AI) and deep learning algorithms. These improvements provide more complex and powerful video processing to analyze video files, identify security incidents, and tag these incidents for further review, resulting in more accurate and reliable information to the user.

Early analytic systems offered a basic set of event triggers such as video motion detection, video loss detection, virtual tripwire sensing, areas of interest, as well as “smart search” tools to review recorded video. Current systems offer much more complex and valuable analysis tools capable of searching based on physical description, behavioral characteristics, vehicle description, etc. Although there are numerous analytic search criteria available, some that are more valuable to security include:

Physical Description

Behavioral Characteristics

Vehicle Descriptions

  • Gender
  • Loitering
  • Cars/trucks
  • Child/adult
  • Tailgate detection
  • Motorcycles/bicycles
  • Race
  • Direction of travel
  • Vehicle color
  • Clothing color
  • Unattended packages
  • Travel direction
  • Hats/glasses
  • Gunshot/aggression
  • Travel speed
  • Bags/backpacks
  • Weapon in hand
  • Illegal parking
  • Long/short sleeves
  • Crossing virtual line
  • Illegal U-turns
  • Facial recognition
  • Travel path tracking
  • License plate recognition

 

Increased processing power at the camera

In addition to more intelligent software algorithms, significant increases in processing power on-board IP cameras has opened new opportunities to deploy analytic applications at the edge. In the past, camera electronics were discrete and designed exclusively to capture video signals and enhance the image quality transmitted from the camera. As surplus processing capacity has become available on newer IP cameras, some of the video analysis workload traditionally done on centralized analytics servers can be performed at individual cameras in the field.

"It is exciting to see the continued maturity of security video analytics as advancements in software development and processing power continue to evolve"

By pushing portions of the video analysis tasks out to the cameras, improvements can be achieved in network bandwidth utilization, reductions in video storage requirements, and reduced deployment costs. By allowing security events to be identified and flagged at the edge, more information related to the video image can be captured and stored in the form of enhanced metadata attached to the video data stream. 

Along with technological advances, exciting progress is being made by organizations such as the Open Security & Safety Alliance (OSSA) to develop a standardized framework to encourage the development of new applications that can be loaded on the camera.

 

 

 

 

 

 

 

 

If an open platform is available to third-party application developers, it can be anticipated those new analytic applications will be created that can operate on many camera manufacturers’ devices at much lower costs.

Conclusion

As with all new products, early offerings rarely live up to the initial industry expectations and hype, but as products mature and innovations in related technologies advance, viable products tend to emerge. It is exciting to see the continued maturity of security video analytics as advancements in software development and processing power continue to evolve.

Read Also

Digital Transformation Is Not all about Technology It's about Change

Digital Transformation Is Not all about Technology It's about Change

Eric Acton, Head of Innovation Ecosystems, R2 Data Labs, Rolls-Royce
Digital Innovation on a Budget

Digital Innovation on a Budget

Darin Marsden, CM-BIM, Director of Productivity Technologies, Faith Technologies
6 Ways Legacy Companies Can Become DIGITAL DISRUPTORS

6 Ways Legacy Companies Can Become DIGITAL DISRUPTORS

Vickie Lonker, Vice President of Network and Security Management, Verizon
Will SDN Replace MPLS? Not so Fast

Will SDN Replace MPLS? Not so Fast

Scott Snyder, Partner, Digital & Innovation, Heidrick & Struggles [NASDAQ: HSII]
Responsible Engineering and the Internet of Things

Responsible Engineering and the Internet of Things

Vinton G. Cerf, VP & Chief Internet Evangelist, Google
Videos for Planned Maintenance

Videos for Planned Maintenance

Dr. John P. Cordle, Director, Maintenance University, Huntington Ingalls Industries - Fleet Support Group
Top