CCTV cameras - Expert commentary

Reopening doors: What steps should be taken to ensure safety and security?
Reopening doors: What steps should be taken to ensure safety and security?

A total of £1.6 billion worth of goods are reported as ‘lost’ to in-store theft in supermarkets each year, with figures increasing steadily. The presence of self-checkout systems have increased in supermarkets, as well as other industry retailers. By 2021, we’re globally on track to have 468,000 self-checkout machines in operation, nearly double the 240,000 in existence since 2016. While this increase comes with such benefits as reduced wait times for customers and staff costs, it also comes with a risk of retail theft at self-checkouts. With the circumstances the world now finds itself in i.e. mass unemployment, financial uncertainty, the retail industry has seen an influx in these types of petty crimes, hitting retailers during an already turbulent period. While retailers are taking precautions to protect themselves and their patrons in this new era of in-person shopping, it’s important to ensure the business itself is protected. A popular method to combat these fears is to employ on-site security personnel, however, as we continue to adapt to new operating guidelines, retailers must begin thinking past the immediate future, and begin implementing long-term security solutions to prepare for life after lockdown such as strong CCTV systems with remote access. How has the security industry adapted its services to a post-lockdown world? Technological innovations like thermal recognition are key to adapting security systems for a post-lockdown world. Businesses which previously relied on facial recognition now must update their methods to account for shoppers wearing masks on-site and in-store. By 2021, we’re globally on track to have 468,000 self-checkout machines in operation, nearly double the 240,000 in existence since 2016 Biometric systems are now able to identify people with face masks, and thermal recognition such ADT’s Thermi-Scan system which can track human body temperature without the need for contact. Implementing these safe protocol procedures protect both employees and customers against virus outbreaks such as COVID-19. The need for these advances in video surveillance will reportedly increase the biometric facial recognition market by 14 per cent by 2027. Artificial intelligence has been hailed recently as the way forward for remote security needs, and whilst business-owners continue to navigate procedures of returning to work post-lockdown, having remote access to real-time security monitoring is essential now more than ever. What are the main measures stores can take to prevent or reduce theft? Strategically placing a multi-camera surveillance system to ensure clarity, eliminate blind spots, and deter thieves should be top priority. It’s equally essential to invest in a system which has an efficient playback programme, particularly in situations where reviewing important footage efficiently can offer vital information to the police force. Advances in video surveillance will reportedly increase the biometric facial recognition market by 14 per cent by 2027 As business-owners continue operating at reduced hours and with limited on-site staff, being able to access camera footage quickly and remotely is a key factor to consider. Whether owners opt to receive an alert on a mobile device allowing them to review notifications, or if their system is monitored by a remote security centre, it’s important to be able to access footage quickly for added efficiency and ease. Facial recognition and AI have been popular points of discussion in relation to security cameras and CCTV. While careful considerations must be taken prior to utilising any sort of facial recognition technology, including conducting a Privacy Impact Assessment, the benefits include being provided with real-time tracking of repeat offenders which immensely helps the prevention of in-store theft. Here are some key points to consider when choosing in-store surveillance: Assess your needs – To get the best out of your security system, it is essential to analyse what your requirements are for your business as they might have changed to adapt to a post-lockdown world Camera setup – With store layouts shifting to accommodate social distancing guidelines, it’s important to re-evaluate the current set-up of any security cameras. Depending on any layout updates, it might be important to consider operating multiple cameras in one area to ensure a peripheral view and eliminate any blind spots Camera positioning – For optimal performance, check that light sources are not obstructing your view such as glare from the sun. It is also worth considering the height at which cameras are installed to maximise surveillance Check the focus – It is worth testing camera lenses bi-monthly to ensure that lighting or weather hasn’t affected the focus of the lens, resulting in a blurry visual Remote access – As guidelines continue to evolve, ensure you’re able to access any necessary camera footage quickly and safely in case of emergency Will we begin to see a reduction of theft as new technology is implemented? We’re beginning to see incidents of shoplifting and theft being taken more seriously by law enforcement. In the coming months, for the first time in Britain nearly twenty shoplifters who were either caught red-handed or identified on CCTV will be appearing before magistrates. While currently these court cases are being pursued by a private police force, these actions come after a Government plea to high-level police to prosecute shoplifters stealing under £200. Retailers have long voiced concerns that forces have abandoned low-level thefts and these steps are small but show that businesses are being heard. As innovations in surveillance security continue, we’ll be seeing a move away from human involvement which will create a more reliable and efficient system able to rely on machine learning and analytics. While there have been wider strides made in utilising AI for surveillance, these are largely being used currently by local governments to alert police forces to threats of criminal activity. It’s not unreasonable to think that in the near future, these types of smart technology will be employed by private businesses to analyse suspicious behaviour or possible theft. However, as we see an increase in the advancement of security technology, we anticipate that those inclined to commit in-store theft will adapt their methods, therefore retailers should look to regularly evaluate their security needs to keep risks at bay.

Can CCTV become a more effective tool?
Can CCTV become a more effective tool?

We all know that having CCTV around your home can help to protect you and your family. Without CCTV, you could end up in danger and an intruder could get away with breaking into your house, hurting your loved ones and stealing your possessions. Similarly, without CCTV in the office, you’ll be leaving yourself open to all kinds of damage and could lose a lot of equipment in the process. In short, making sure you have CCTV is important for both home and business security. However, it can be improved to become a more effective system so that you’re better protected, and can even deter a potential intruder without having to panic. In our world of ever-changing technology, we’re able to upgrade and enhance our CCTV systems so they can become a monitored system. Remote CCTV monitoring is an ideal way to protect everyone and everything whether you’re at home or at a workplace. What is remote CCTV monitoring? For a long time, CCTV was one of the best ways to keep your home, the office and people safe. But people started to notice that it would only deter people so much of the time and often the cameras were ignored by intruders. They would just cover their faces and hope for the best as they steal from a home, office or any other premises. Remote CCTV monitoring is a system that can loop into your existing CCTV, or come preinstalled with a new system. This technology sends a feed to a control room full of trained operators that are on call 24/7. Within this control room, operators are able to respond to any sort of distress call or unauthorised movement on the property line.  How does it work? Remote CCTV monitoring works by attaching to a live feed of your CCTV system, existing or new, so that the signal and images can be passed to a team of operators. These operators are on hand 24/7 so that if there is a problem, you know that you're safe in the hands of a specialist team. The specialist team has been trained to mitigate the chances of somebody breaking into your home when the system is triggered; similarly they call the local authorities instantly so that the potential intruder has less time to flee the scene. This is especially important if an intruder is already inside your property because they have less time to steal your items and leave. Without CCTV in the office, you’ll be leaving yourself open to all kinds of damage and could lose a lot of equipment in the process One of the biggest questions that revolve around remote CCTV monitoring is the idea of operators watching the CCTV at all times. Luckily most remote CCTV monitoring systems will incorporate a motion detection system to accompany your CCTV. Motion detection offers the ability to alert a control room if there is an unauthorised entry to the property line. These motion detection systems are state-of-the-art and so, depending on the system that you choose, they can watch over your property from a number of angles. Once the motion detection system has been triggered and the alert has been sent to the control room, then and only then will the operators get involved. This means that until the motion detection system has been triggered, nobody will watch your live CCTV feed. After one of the systems has been triggered, one of the specialist operators will instantly jump into action. This means that they can take different measures to deter any potential intruder and make sure that they do everything in their power to stop any damage or theft from the premises. In addition to the motion detection system and CCTV, you are able to opt for a public address (PA) system too. This means that an operator is able to shout commands through the PA system and potentially scare away any intruder. The intruder will also be warned about the fact that local authorities have already been called to the location.  Remote monitoring versus traditional CCTV Motion detection offers the ability to alert a control room if there is an unauthorised entry to the property line Having a monitored CCTV system means that you're able to better protect yourself, your business, employees and even your loved ones. Whether you're at home or in the office, having someone looking over your shoulder protecting your every move is something that can be appreciated by everybody. The biggest problem with just having traditional CCTV, is that it is a reactive system. This means that rather than stopping crime, a CCTV system just records it. While the thought is that having a CCTV camera visible can deter some intruders, there's no real evidence to suggest that it stops anybody; anyone can simply cover their face and carry on breaking into your home, office or even your car. As mentioned, remote CCTV monitoring is going to tackle that problem and make sure that someone is on hand to protect you at all times.

The digital transformation of access control solutions
The digital transformation of access control solutions

The safeguarding of premises through the monitoring of entrance and exit points has traditionally been a very manual aspect of security. Human operators have been relied on to make decisions about who to admit and deny based on levels of authorisation and the appropriate credentials. But the access control business, like many industries before it, is undergoing its own digital transformation; one where the protection of premises, assets and people is increasingly delivered by interconnected systems utilising IoT devices and cloud infrastructure to offer greater levels of security and protection. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors. These systems, connected through the cloud, can be customised and scaled to meet the precise requirements of today’s customer. And it’s the ease of cloud integration, combined with open technologies and platforms that is encouraging increasing collaboration and exciting developments while rendering legacy systems largely unfit for purpose. Remote management and advanced diagnostics Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution.Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution. For example, as the world faces an unprecedented challenge and the COVID-19 pandemic continues to cause disruption, the ability to monitor and manage access to sites remotely is a welcome advantage for security teams who might otherwise have to check premises in person and risk breaking social distancing regulations. The benefits of not physically having to be on site extend to the locations within which these technologies can be utilised. As an example, within a critical infrastructure energy project, access can be granted remotely for maintenance on hard to reach locations. Advanced diagnostics can also play a part in such a scenario. When access control is integrated with video surveillance and IP audio, real-time monitoring of access points can identify possible trespassers with automated audio messages used to deter illegal access and making any dangers clear. And with video surveillance in the mix, high quality footage can be provided to authorities with real-time evidence of a crime in progress. Comprehensive protection in retail Within the retail industry, autonomous, cashier-less stores are already growing in popularity The use of connected technologies for advanced protection extends to many forward-looking applications. Within the retail industry, autonomous, cashier-less stores are already growing in popularity. Customers are able to use mobile technology to self-scan their chosen products and make payments, all from using a dedicated app. From an access control and security perspective, connected doors can be controlled to protect staff and monitor shopper movement. Remote management includes tasks such as rolling out firmware updates or restarting door controllers, with push notifications sent immediately to security personnel in the event of a breach or a door left open. Remote monitoring access control in storage In the storage facility space, this too can now be entirely run through the cloud with remote monitoring of access control and surveillance providing a secure and streamlined service. There is much to gain from automating the customer journey, where storage lockers are selected online and, following payment, customers are granted access. Through an app the customer can share their access with others, check event logs, and activate notifications. With traditional padlocks the sharing of access is not as practical, and it’s not easy for managers to keep a record of storage locker access. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers. The elimination of manual tasks, in both scenarios, represents cost savings. When doors are connected to the cloud, their geographical location is rendered largely irrelevant. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers They become IoT devices which are fully integrated and remotely programmable from anywhere, at any time. This creates a powerful advantage for the managers of these environments, making it possible to report on the status of a whole chain of stores, or to monitor access to numerous storage facilities, using the intelligence that the technology provides from the data it collects. Open platforms power continuous innovation All of these examples rely on open technology to make it possible, allowing developers and technology providers to avoid the pitfalls that come with the use of proprietary systems. The limitations of such systems have meant that the ideas, designs and concepts of the few have stifled the creativity and potential of the many, holding back innovation and letting the solutions become tired and their application predictable. Proprietary systems have meant that solution providers have been unable to meet their customers’ requirements until the latest upgrade becomes available or a new solution is rolled out. This use of open technology enables a system that allows for collaboration, the sharing of ideas and for the creation of partnerships to produce ground-breaking new applications of technology. Open systems demonstrate a confidence in a vendor’s own solutions and a willingness to share and encourage others to innovate and to facilitate joint learning. An example of the dynamic use of open technology is Axis’ physical access control hardware, which enables partners to develop their own cloud-based software for control and analysis of access points, all the while building and expanding on Axis’ technology platform. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification Opportunities for growth Open hardware, systems and platforms create opportunities for smaller and younger companies to participate and compete, giving them a good starting point, and some leverage within the industry when building and improving upon existing, proven technologies. This is important for the evolution and continual relevance of the physical security industry in a digitally enabled world. Through increased collaboration across technology platforms, and utilising the full range of possibilities afforded by the cloud environment, the manufacturers, vendors and installers of today’s IP enabled access control systems can continue to create smart solutions to meet the ever-changing demands and requirements of their customers across industry.

Latest LILIN news

LILIN and CyberLink enter strategic partnership with facial recognition system integration to offer one-stop intelligent security solution
LILIN and CyberLink enter strategic partnership with facial recognition system integration to offer one-stop intelligent security solution

LILIN, a globally renowned manufacturer of IP video cameras, recording devices, and software, announced a strategic partnership with CyberLink, a pioneer of AI and facial recognition technologies to strike business opportunities for facial recognition. Together, CyberLink’s FaceMe AI facial recognition engine will be integrated into the LILIN facial recognition system to create comprehensive smart security and smart retail solutions. FaceMe AI facial recognition solution CyberLink’s FaceMe AI facial recognition engine achieves up to 99.7% accuracy of the NIST FRVT test, ranked No. 1 in Taiwan, and when combined with LILIN’s smart security solutions, enables one-stop smart security, data analysis and warning system service. LILIN’s smart security solution is suitable for access control management of commercial offices and factories and can provide business analysis for the restaurant and retail industries as well. AI facial recognition system LILIN’s AI facial recognition system not only has the advantage of ‘3 High’ elements, encompassing a ‘High’ recognition rate Along with over 40 years of experience in IP video manufacturing and development of IP cameras, recording devices and software, LILIN continues to pursue innovation. LILIN’s AI facial recognition system not only has the advantage of ‘3 High’ elements, encompassing a ‘High’ recognition rate, ‘High’ capacity, up to 100,000 face database and ‘High’ elevation angle to be recognised, but also supports multiple image inputs, and image search facial recognition, making it easy to distinguish the trajectory of personnel. Furthermore, companies can create file identification through a photo of the ID, and use one-stop central management to synchronise the data immediately, greatly reducing the precious time spent on complicated processes! Intelligent security solutions “LILIN has many years of smart security experience, providing insight into the market’s needs for creating a comprehensive intelligent security solution. LILIN is pleased to partner with CyberLink and integrates FaceMe into our facial recognition system to strengthen smart retail, smart healthcare, smart factory, and smart business applications. Through continued efforts, I believe that LILIN will provide the most advanced total security solution for global customers.” said Mr. C.C. Hsu, LILIN’s President. “If there was ever a field worthy of continued research and innovation, it’s security,” said Dr. Jau Huang, CEO of CyberLink, adding “Without a doubt, LILIN is a globally renowned provider and manufacturer of IoT devices and CyberLink is a worldwide pioneer developing facial recognition applications for connected devices. Together, we are setting a new standard for what makes a place secure by bringing to market new technologies that make our customers safer, and our businesses smarter.”

Lessons Learned with Merit LILIN: What is the most innovative COVID-19 solution?
Lessons Learned with Merit LILIN: What is the most innovative COVID-19 solution?

The COVID-19 pandemic is the defining global health crisis of our time. In order to be able to fight against it, mask detection and temperature measurement have become daily routines for everyone. In this situation, Merit LILIN, with over 40 years of experience in IP video manufacturers of IP cameras, recording devices, and software, have created a cost-effective COVID-19 solution to ensure end-user health and safety. Temperature measurement Many solutions should provide temperature information, with alert settings that trigger alarms when temperatures are high. The main component of LILIN Temperature Measuring Camera is a dual-lens camera with two sensors, one a visible image lens and the other a thermal array sensor. This design not only provides temperature information and color image information but also high-temperature alert settings when the temperature exceeds.  Mask detection With COVID-19 rules and regulations now incorporating person protection equipment such as masks, many solutions are now geared towards mask detection. LILIN has its own mask detection AI, which can be run on an i3 CPU-supported PC. Using the LILIN AI system and Aida NAV server, the system can recognise if the person is wearing a mask or not. If the system identifies a user that is not wearing a mask, an alert goes out with an image of the person. It allows the application to run automatically and enforces the wearing of masks in many situations. A notification is sent to an administrator when an image of a person is captured.  Social distancing measures In addition to temperature measurement and mask detection becoming daily epidemic prevention matters, maintaining social distance is extremely significant as well. Through the LILIN Aida detection system, people can calculate the social density and use it with alarm notifications, if an area exceeds the density threshold. Moreover, the LILIN COVID-19 solution has a wide range of applications in different sectors, including schools, public transportation systems, offices, retail and more. By doing so, extensive safety measures can combat COVID-19, providing the public with intelligent epidemic prevention solutions, through innovative AI detection systems.

LILIN transforms intelligent traffic systems with the AIDA traffic management platform
LILIN transforms intelligent traffic systems with the AIDA traffic management platform

With the introduction of the AIDA Traffic Management platform, LILIN has transformed Intelligent Traffic Systems from expensive, often inaccurate, and inflexible computer-vision solutions into a new simplified platform with embedded Artificial Intelligence (AI) that learns, adapts and detects every detail of street-level vehicle activity. Engineered for seamless integration into LILIN Windows®-based VMS products including Navigator Control Center, Navigator Corporate, and Navigator Enterprise, AIDA Traffic Management installs on the edge and uses metadata to bring real-time traffic data to organisations and municipalities. Enforcing parking and traffic violations AIDA is purpose-built for a flexible range of ITS applications, making each user-selected function completely automated and cost-efficient. For example, AIDA can extract data from vehicles traveling on multi-lane highways or urban streets, allowing municipalities to better enforce parking and traffic violations, recover stolen cars, or assist law enforcement in Amber Alerts. AIDA can recognise 12 licence plates per second on vehicles traveling up to 125 miles per hour AIDA can recognise 12 license plates per second on vehicles travelling up to 125 miles per hour, casting an astonishingly wide net. Police can store and later access this data, enabling investigators to zero in on a suspect's whereabouts and behavioural patterns. Besides monitoring cars, trucks and motorcycles, AIDA can detect pedestrians loitering or entering restricted areas. Capturing vital operational data In a parking lot, AIDA can compare licence plate data to pre-defined lists of allowed or excluded vehicles before taking an appropriate action, such as opening a gate or generating an alert if an unauthorised vehicle enters an area as a value-added service. It can also locate available parking slots and broadcast this information to incoming cars. In addition to its security role, AIDA can capture vital operational data about parking infrastructures, including the number of cars served by time, day, and length of stay. This data can then be applied to help optimise a staffing schedule and maximise the profitability of a parking lot's rate structure. AIDA removes the hassles of traditional computer vision techniques that require extensive, CPU-draining image processing. In contrast, AIDA software incorporates an AI engine that is instructed to learn what to look for and is able to run multiple models on distributed AI CPU, GPU, and VPUs.

Related white papers

How to overcome the storage challenges of adopting surveillance AI

Five things to consider for AI with video technology

Making your surveillance cyber secure