Dahua launches new easy4ip app Wi-Fi solution: Eyes on your home security
Dahua launches new easy4ip app Wi-Fi solution: Eyes on your home security

Dahua Technology, a world-leading manufacturer of video surveillance products headquartered in Hangzhou, China, introduces home Wi-Fi solution, offering real-time monitor for home surveillance. Dahua home Wi-Fi solution allows users to monitor home or staff at work, and acts as a deterrent to thefts and other crimes. The resolution of Dahua home Wi-Fi series camera is up to 3-Megapixel and it can connect with easy4ip app for remote control and viewing. The footage saved in local storage. Users are able to communicate with family, friends or staff remotely while checking on them via the built-in bi-directional audio. Besides, the camera can send alarm notifications when it detects activity. Dahua home Wi-Fi series camera features wireless operation that saves wiring and installation time in great deal. The simple 3-step installation process enables it to detect and connect to the Wi-Fi network automatically, letting users view streamed video right away. Due to its compact design, the camera can be placed almost anywhere and provides 120 degree monitoring with more clear details. Dahua home Wi-Fi solution is ideal for home or business owners who want to stay aware of their property 24/7. It is a great tool for keeping an eye on things from afar. “Our 3-Megapixel Wi-Fi cameras with bi-directional audio ensures the owners to keep an eye of their home or business in real-time. By working together with easy4ip app, video clips can be sent to their phones or tablets when an alarm is tripped, showing them the cause of alarm and the information needed before arrival on-site.” said Peter Pan, Product Manager at Dahua. “We offer customers a perfect choice for not only smart and comprehensive security, but also added value with remote monitoring capabilities and effective management.” Recommended models: C 15/35 K15/35 A15/35 HFW1120/1320S-W HDBW1120/1320E-W SD22204T-GN-W SD29204T-GN-W Product highlights: Capture every detail with 3MP camera 7*24 real-time monitoring & playback Bi-directional audio Push alarm (motion detection & sound detection) Plug & Play with Easy4ip APP Easy to install

Add to Compare
Latitude NVMS version 6.3 from DVTEL
Latitude NVMS version 6.3 from DVTEL

Latitude NVMS is the platform of choice for corporations and organisations that want to manage video surveillance operations over IP networks in the most effective way. DVTEL’s award winning Latitude NVMS® is an open standards, network-based video management software platform that is designed to be both powerful and versatile. Using the latest technology advancements of an enterprise system, Latitude is part of DVTEL’s cutting-edge Video Security Solution for organisations of all sizes. Latitude replaces antiquated CCTV matrix switches, multiplexers, or DVRs to provide the power of a cutting-edge IP-based physical security solution. From a small business, single server system to a distributed system managing thousands of cameras, Latitude can efficiently support any system size or architecture. Plus, installations can span multiple sites, cities and continents. Latitude NVMS is part of DVTEL’s total Video Security Solution. DVTEL develops, designs, and provides solutions that protect critical infrastructure -- in transportation hubs, city centres, nuclear and power facilities along with buildings and campuses of corporations, educational institutions and government facilities. DVTEL’s Video Security Solutions tie together the most advanced Network Video Management Software with leading edge IP-based cameras and encoders, including built-in analytics capabilities that detect and report security threats, creating a powerful security “edge”. Features of Latitude version 6.3 include remote and central monitoring; failover and redundancy; advanced alarm management; audio handling; SceneTracker™, which stitches multiple scenes together into a panoramic image; and TruWitness™, which enables a smartphone to be used as an IP camera. Now, certain advanced features, such as ActiveDirectory, CaseBuilder and SNMP, are included free of charge, and the prices of some of the existing features have been reduced.

Add to Compare
Network video recording with Siemens SISTORE MX NVS - intuitive software, complete functionality
Network video recording with Siemens SISTORE MX NVS - intuitive software, complete functionality

Siemens SISTORE MX NVS is a software package for network recording, allowing the operator to view live images, as well as to support recording, playback and remote access for up to 64 network cameras per installed server. Highlights:Open IP Software for recording and visualization of up to 64 network cameras per serverScalable system architecture from small stand-alone systems to large systemsSupports IP cameras from Siemens and leading manufacturers, including mega-pixel resolutionsIntegrated motion detection and sabotage alarm functionIntegration of new megapixel IP camerasLive audio and audio recording from Siemens and Axis network camerasMulti-monitor support for client and serverImproved user managementMulti-server search from RemoteView client, for applications in logistics for exampleZoom functionality within live imagesSupport of megapixel recording With the continued market growth in the use of IP cameras, SISTORE MX NVS allows integration of the new range of new Siemens network cameras. By supporting audio (both live and recording) from Siemens and Axis network cameras, additional, potentially very important information, can be supplied to resolve incidents. Megapixel recordings contain more information, which can be particularly useful when using the integrated digital zoom feature.  Improved user managementSISTORE MX NVS works with a uniquely designed user administration system. By assigning different user rights to reflect specific duties and seniority, each operator can be given access to certain functions, and, importantly, declined access to others. When logging into the RemoteView client, no separate registration on the server is required.Flexible configurationTo enable customers to best view their sites, support for up to four monitors, with flexible configuration, is now fully supported. Approved for financial applicationsSISTORE MX NVS is employed in a wide range of applications including retail, traffic, transportation and banking.  For financial institutions, SISTORE MX NVS meets the exacting standards of the German Accident and Prevention Regulations for Banks (UVV-Kassen). 

Add to Compare
Object Detection/Removal (ODR) now available with SISTORE CX
Object Detection/Removal (ODR) now available with SISTORE CX

Enhanced features with new version of SISTORE CXIn response to market demand, Siemens has released a new version of the popular SISTORE CX high performance digital video analysis system.  It brings a number of new benefits, including the addition of an Object Detection/Removal function.  SISTORE CX is an intelligent embedded codec that performs streaming and recording over an IP network. Benefits in the latest version include:Automatic back-upExport/import of configuration informationImproved image quality in playback modeSimplified configurationFault status contactSISTORE Player upgradeSISTORE CX ODR - Object Detection and RemovalOne of the most significant developments is SISTORE CX ODR - a video sensor system using the latest in Siemens algorithm-based technology to detect objects that have been moved or left.  This makes it the ideal surveillance solution for a wide range of applications (either indoor or outdoor).  In airports, rail stations, sports stadia etc - in fact any public area where potentially explosive devices may be left - ODR can identify abandoned suspect packages and allow for prompt intervention.  But equally it can be used to monitor areas where objects must not be left such as emergency exits or ‘staff only' designated areas.  In museums and art galleries, the technology also allows the detection of removal of artefacts, as well as alerting security staff to any unattended objects, which could pose a security threat.ODR is a software option that is available for all devices on the SISTORE CX platform.The ODR function is in addition to the Enhanced Detection Solution (EDS) option already available via another software module.  EDS offers professional outdoor video motion detection, with object tracking, employing statistical algorithm based technology which continuously analyses the video stream throughout its history, especially useful in applications such as prisons, airports, perimeter surveillance etc.

Add to Compare
New Hanwha Techwin America Project Support Team
New Hanwha Techwin America Project Support Team

Samsung's Project Support Team has been set up in response to increased customer demand for knowledge driven help on large or complex integrated projects. The team will focus on Samsung's ability to harness the power of IP network based security solutions, whilst looking to increase the end-users' ROI by highlighting innovative ways the systems can be used for purposes other than security.End-users are increasingly expecting integration to play a key role in helping them achieve maximum return on their investment in a security solution. Samsung are therefore working towards providing system integrators with the ability to almost effortlessly integrate all the component parts of a security system. These could including intruder, fire, access control, perimeter protection and CCTV systems, as well as the opportunity to have them all interact with a building's building management system, and in the process have the freedom and flexibility to choose ‘best of breed' products.John Sayer who is managing the Project Support Team said: "I am delighted to be given the opportunity to head up the Project Support Team which has been established to provide hands-on support for the fast growing pan-European network of installers and system integrators who are recommending Samsung Techwin Europe Ltd's professional security solutions for large scale projects," said John. "With a complete product portfolio encompassing the very latest IP & network CCTV, Access Control and intruder detection products, the Project Support team clearly has a valuable role to play ensuring that our customers are able to specify the best complete solution for the job in hand. We will be available to offer advice and support from project conception and design, through to delivery."John has worked within the electronic security industry for over twenty years, during which time he has performed product management and pre and post sales support roles whilst with Cardkey, Johnson Controls and Maxxess Systems. John's understanding of IP network based security systems includes the design and implementation of video surveillance, access control, perimeter protection, intruder, fire and BMS systems into fully integrated solutions.The formation of the Project Support Team coincides with the introduction of Samsung's Total Security Manager (TSM) software, which enables the integration, monitoring and control of a diverse range of Samsung security systems via a single unified Graphical User Interface. TSM is packed full of features to make true integration possible and has an advanced alarm handling system which forwards information onto appropriate levels of security personnel and management, depending upon the designated importance of an incident.

Add to Compare
Siemens Siveillance SiteIQ Wide Area for automated video surveillance
Siemens Siveillance SiteIQ Wide Area for automated video surveillance

Chemical manufacturing facilities have always placed a high priority on public and environmental safety but today manufacturers must also now consider the threat of intrusion and attacks. Thanks to Siveillance SiteIQ Wide Area from Siemens Building Technologies Division, security procedures at a chemical manufacturing facility owned by PPG Industries are greatly enhanced.Pittsburgh-based PPG is a global manufacturer and supplier of paints, coatings, optical products, specialty materials, chemicals, glass and fibre glass. Serving customers in construction, consumer products, industrial and transportation markets, it operates on the leading edge of new technologies and solutions. The company operates in more than 60 countries around the globe. PPG reviewed the surveillance system at one of its largest and uniquely located sites. While the system recorded activity 24 hours a day, accurate real-time surveillance was limited to periods when security guards watched video-feed without interruption. It was a relatively simple matter to realize that the software intelligence built into the Siveillance SiteIQ Wide Area solution from Siemens Building Technologies Division, would enhance protection of the site, with the additional benefit of simultaneously reducing surveillance costs.Siveillance SiteIQ Wide Area is an automated large-scale video surveillance solution that transforms traditional physical security systems by combining camera and other sensor (intrusion, fire detection, access control etc.) input. It provides reliable protection for industrial facilities, transportation hubs and byways such as seaports and airports, water treatment facilities and other critical infrastructure by continuously monitoring sites through intelligent policy zones and virtual barriers – even across water. It detects, tracks, and classifies activity in real time, filtering critical events from camera and other sensor input, displaying the results on a comprehensive digital map of the entire site – on a single screen. This enables operators to see exactly what is happening at any time throughout the whole site. Integrated 3D analytics determine object attributes in absolute “real-world“ coordinates. This requires fewer cameras and helps lower infrastructure cost compared to 2D analytics.At the PPG site, the software-driven nerve center of the Siveillance SiteIQ Wide Area solution takes input from many cameras and provides a live, bird’s-eye view of the entire manufacturing facility, spanning over 1000 acres and including a mile of shoreline as well as railway entry and exit points. This composite view takes the guesswork out of tracking objects that move from camera to camera, so operators always know the accurate location of every object in the facility. Detailed information about anything suspicious is readily available.The perimeter and other sensitive areas are protected by ‘Alert’ zones. This automated triggering of instantaneous alerts substantially reduces the cost of monitoring, giving around-the-clock protection. When anything unexpected occurs, Siveillance SiteIQ Wide Area automatically detects any activity, pinpoints the location and tracks the perpetrators whilst simultaneously alerting guards through audio, video notifications, and e-mail alerts. This ability to efficiently deploy guards rapidly and efficiently helps prevent the escalation of incidents. Alerts are triggered from changes as simple as a vehicle or an individual entering a restricted area, but can also be triggered by object speed or size. Alert areas are easily and instantly set or changed by dragging area boundaries in the composite image of the site and can be adjusted using preset shortcuts. The open architecture enables Siveillance SiteIQ Wide Area to run on standard hardware and software and allows it to be modified and expanded to respond to changing security needs. It easily accommodates site-specific operational conditions and varying security requirements allowing the limiting of access to selected areas or the entire site, the specification of varying security level requirements within the site – and the raising or lowering of security levels in accordance with threat levels or evolving governmental mandates.Planning and implementation of the system at the PPG site was assisted by the skill of Siemens staff and the solution was delivered ahead of schedule. This gave security personnel at PPG time to get practical, hands-on experience before the system went live and after just a single day of training, operators were using the system successfully.Mr. Troy Higginbotham (Sr. Tech Analyst) of PPG says: “I have been working with Siemens’ surveillance software since 2003. In my opinion, the latest Siveillance SiteIQ Wide Area version is the best upgrade since its inception. The ability to track a single object with multiple interrogation cameras and auto-zoom to a factor – based on how far the object is from that camera – is very impressive.”Troy continued: “I have had the opportunity to work with the system for a few hours in order to re-acquaint myself and the advances made have amazed me. Siemens’ professional services team, along with the technical support team, has done everything needed to make this project a successful upgrade.”Shortly after the Siemens’ solution was operational, a mock attack was staged with actors portraying terrorists. Operators tracked, monitored, and recorded the progress of the ‘intruders’ by vessel and on foot, via the screen image of the site. Never before had security officials at the site been able to detect and monitor a potential threat to their facility so effectively. They then dispatched guards to their exact locations. Siveillance SiteIQ Wide Area has now become the foundation of the security program at the site because it seamlessly integrates new and existing sensor types and allows the client to manage all surveillance-related security issues easily from a single point.

Add to Compare

CCTV software - Expert commentary

Network operator fraud remains the biggest threat to the revenues of mobile operators
Network operator fraud remains the biggest threat to the revenues of mobile operators

As anti-fraud company Revector marks 20 years of operating, CEO and Founder Andy Gent believes that telecommunications fraud is still not high enough on the corporate agenda for network operators – this should be a significant concern to shareholders.  In 2001, Revector was launched to combat specific fraudulent activity against mobile network operators. The company’s management expected the business to have a shelf life of no more than five years – such as the belief that mobile operators would quickly get a grip on network fraud and reduce it to zero.  Twenty years later frauds continue to persist – costing shareholders, networks, and Governments billions in lost revenue annually.  Revenue through mobile service According to Andy Gent, fraudsters are, at heart, business people, exploiting an opportunity for money. Gent explains how this relates to network fraud thus, “Mobile service providers generate revenues in two ways - by having their subscribers that pay the company to access the networks they run and associated services such as voice calls, text messages, and data usage. The second – known as termination revenue – involves transporting calls from other networks.”  Revenues from termination are shared between all networks that help deliver the call Revenues from termination are shared between all networks that help deliver the call, as Gent outlines: “Imagine a call from the UK to Australia. This will pass through several service providers that will each take a small percentage of the call revenues for passing on the call.”  “Telecommunications companies establish relationships with others around predictable calling patterns. For example, BT may know that they need one million minutes of calls to South Africa per month. They, therefore, establish a relationship with a South African telecommunications company to provide this.”    Trading termination minutes The issue comes when the unexpected happens, for example, an earthquake in Cape Town. Now UK residents with relatives in Cape Town suddenly demand a lot more telephone time. BT needs more minutes than it has. It is unlikely that its partner in South Africa can provide these – they are facing the same issue due to the increased volume of calls in and out of the country – so it will look to the open market for the minutes it needs.  Gent continues, “Termination minutes are traded in the same way as other commodities. Exchanges combine minutes from multiple sources, bundle these together and sell them. The issue is where these minutes come from. The bundles may well include “white” routes – premium minutes provided by legitimate telecommunications companies. However, many will include so-called “grey” routes.”    A simple but effective fraud  Grey routes are not provided by the telecommunications companies but by third parties or through fraudulent means. Typically, the “grey” routes come at a lower cost than the “white” routes, but some telecommunications service providers may not know this or care about it. The natural pressure on cost means some telecommunications companies end up using “grey” route minutes. The threats to network providers’ revenues come from these “grey” routes.  A primary risk is SIM Box fraud.  SIM Box fraud  SIM Box fraud occurs where there is a differential price between the cost of routing a call in a country and the cost of terminating a call, as Gent outlines below: “Imagine a network is offering a promotion with free calls to others on the same network. At the same time, the value of terminating a call to that network’s customers is $0.05 per call.” One single SIM card being used in this way can generate $3000 per month and there are hundreds of cards in each SIM box “If someone can procure SIM cards with the promotion, these can be loaded into a SIM Box – a device that can house hundreds of SIM cards in racks and be connected to the internet - to terminate calls. The owner of the SIM box can then offer to terminate calls for $0.03 per call. The cost to the SIM box owner is close to zero – the local minutes they are using to terminate calls are bundled with the SIM deal.  The $0.03 per call is pure profit after the SIM cards and SIM boxes have been purchased.”  While this sounds like a complicated scam it can be lucrative. One single SIM card being used in this way can generate $3000 per month and there are hundreds of cards in each SIM box.   Loss of termination revenues Service providers can quickly find a large proportion of revenues lost to SIM boxes. Gent has seen “up to 90 percent of termination revenues being lost.” “The nature of SIM box fraud is transitory: fraudsters will pick the countries with the strongest opportunity to generate revenues quickly, sweep in and terminate calls for a month or two before the operator notices the revenue drop and takes action.”    Is it illegal?  If this practice sounds entrepreneurial rather than illegal, it is probably because it seems like a victimless crime. However, mobile network operators have paid millions if not billions for the ability to operate networks and generate termination revenues. A reduction in this revenue will mean less investment into next-generation networks or customer service.  For the consumer, illegal termination often means poor quality calls with a lack of services such as caller line identification (CLI). But perhaps the most concerning issue is where the proceeds of crime go, as Gent outlines. “Often these SIM box frauds are run by criminal gangs using the process to launder money or finance organised crime or people trafficking.”  “With widespread restrictions on the number of SIM cards that can be sold to one person, the only way to procure enough SIM cards is via criminal activity. Gangs bribe or coerce network operation staff into supplying SIM cards by the thousand, generating millions in illicit revenues.”  Other telecommunications fraud  Threat to operator termination revenues comes from OTT service providers that have an eye on termination revenues Another threat to operator termination revenues comes from Over-the-Top (OTT) service providers that have an eye on termination revenues as well as competing with telecommunications service providers for a share of the voice and messaging market.  While most telecommunications companies see Voice over IP (or OTT) as fair competition, in recent years several new OTT service providers have grown extremely quickly. WhatsApp, for example, was incorporated in 2009 and acquired by Facebook just five years later for almost $20 billion.  The business models of these companies vary. Some focus on the “freemium” approach where the initial service is free but add-ons become chargeable. OTT app fraud However, recently some OTT players are looking to terminate revenue to monetise their business models. These operators have been offering competitive termination rates by hijacking a traditional call made from one telephone number to another and terminating it within an OTT app, as Gent explains, “We are seeing OTT apps intercepting traditional telephone calls and delivering them within a user’s app.”  “The call starts as a dialled telephone call, but the user receives it within an OTT app.  If OTT players can achieve this, they can generate termination revenues at zero cost – other than to the traditional operator.”  Using an app to make calls “Of course, if the recipient of the call believes the caller has used an app to call them, they are more likely to use this method of communication in the future – and less likely to dial a number directly. For the OTT players, termination acts as a marketing tool as well as a revenue stream.”  According to Gent, one OTT service provider has gone as far as including a setting within their app that states “receive regular incoming calls within the app when possible”.  This is defaulted to “on” when the app is downloaded.  Only the most technologically savvy users would even know it was there.  Combatting the fraud against networks  Networks are less worried about losing revenue to fraud and more about grabbing as many subscribers as possible" Why do networks not do more to combat fraud?  The reality, according to Gent, is a combination of priorities and ignorance. He comments, “Most mobile network operators are large but still relatively young companies – typically built around customer acquisition.”  “Networks are less worried about losing revenue to fraud and more about grabbing as many subscribers as possible.  This has led to a mindset where whatever the questions the answer is always more marketing promotions.”  A small number of innovators around the world continue to fight these frauds directly, but the fraudsters simply move on to the next victim and, when the anti-fraud measures are relaxed, the fraudsters return.  An opportunity for the future  As mobile networks mature and become more commoditised, Gent believes the issues around combatting fraud will become a wider concern. “If you had told me in 2001 that fraud would still be an issue in 2021, I would have been shocked. Yet operators are still losing significant revenues to criminals. Addressing this needs to remain a priority for the industry, not just to ensure networks have the revenues to build and maintain robust networks but also to ensure that criminal behaviour that this kind of illicit activity funds is reduced. This is not just an issue for network operators but also for wider society.” 

The automated future of retail and how to secure it
The automated future of retail and how to secure it

While the foundation of autonomous retail has been built up over the past few years, it is only now that retailers are beginning to fully experiment with the technology. There were an estimated 350 stores globally in 2018 offering a fully autonomous checkout process, yet this number is forecast to increase dramatically with 10,000 stores anticipated by 2024. This acceleration in the growth of unmanned retail stores has, in part, been boosted by the COVID-19 pandemic and a demand for a more contactless, socially distanced shopping experience. Physical security technologies Innovative physical security technologies can play a significant role in protecting a site while supporting its operation Many retailers are now exploring such solutions as a way to streamline their services and simplify store operations while reducing overheads. Of course, the security of unmanned sites is a concern, with many eager to embrace such a design, but wary about the prospect of leaving a store unguarded. This is where innovative physical security technologies can play a significant role in protecting a site while supporting its operation and also helping to improve customer experience. Comprehensive integrated solution To make the autonomous retail vision a reality, a comprehensive solution is needed that integrates network cameras, IP audio speakers, and access control devices. The cameras can be employed to monitor entrance points and sales areas, including checkout terminals, and can be monitored and operated remotely from a central control room. This offers management full visibility of operations, regardless of the number of stores. Recorded video material can be processed, packaged, and passed to authorities, when necessary, by applicable laws. Optimising operations As autonomous stores do not require staff to be present and run largely independently, managers can be notified automatically via mobile device if an event occurs that requires their attention. This could range from a simple need to restock popular items or clean the premises after a spillage, to a criminal break-in or attack. Again, network video surveillance cameras installed inside and outside of the premises provide high-quality video of any incident as it occurs, enabling immediate action to be taken. Improving customer experience Access control mechanisms at the entrance and exit points enable smooth, touch-free access to customers Access control mechanisms at the entrance and exit points enable smooth, touch-free access to customers, while IP audio speakers allow ambient music to be played, creating a relaxed in-store atmosphere and also offering the ability to play alerts or voice messages as required. Due to the automated nature of such audio broadcasting, consistency of brand can be created across multiple locations where playlists and pre-recorded voice messages are matched in terms of style and tone from store to store. Boosting profits The accessibility of premises 24/7 can ultimately lead to an increase in sales by simply allowing customers to enter the store and make a purchase at any time, rather than being restricted by designated retail hours. This also serves to improve customer loyalty through retail convenience. Utilising data from the access control system, managers can configure lights to turn on/off and ambient music to power down when the last person leaves the shop, to be reactivated the next time someone enters the premises. This approach can also conserve energy, leading to cost savings. Designing a future proof solution The threat of vandalism is greatly limited if everyone entering the shop can be identified, which is something that is already happening in Scandinavia using QR codes linked to an electronic identification system called BankID. This process involves a user being identified by their bank details, and their credentials checked upon entering the store. This not only streamlines the transaction process but vastly improves security because only those who want to legitimately use the services will go through the identification process, helping to deter antisocial or criminal behaviour. Physical security technology should be reliable and of high quality, without compromising the service to customers VMS-based network solution Both inside and outside of the premises, physical security technology should be reliable and of high quality, without compromising the service to customers, or hampering their experience. Door controls, network cameras, and loudspeakers, together with a comprehensive video management system (VMS), enable retailers to control every element of their store and remove any uncertainty around its management or security. Such a system, network-enabled and fully scalable to meet ongoing business requirements, can be offered using open APIs; this allows configuration and customisation while ensuring that the retailer is not limited by the technology or tied into any particular set-up or vendor as their requirements evolve. Additional security benefits As more businesses launch their unmanned stores, the benefits of such technology to streamline and improve every aspect of their operations become ever clearer. A comprehensive solution from a trusted security provider can bring complete peace of mind while offering additional benefits to support the retail business as it seeks a secure future.

How AI and security guards work together using video analytics
How AI and security guards work together using video analytics

How AI and humans can work together is a longstanding debate. As society progresses technologically, there’s always the worry of robots taking over jobs. Self-checkout tills, automated factory machines, and video analytics are all improving efficiency and productivity, but they can still work in tandem with humans, and in most cases, they need to. Video analytics in particular is one impressively intelligent piece of technology that security guards can utilise. How can video analytics help with certain security scenarios? Video analytics tools Before video analytics or even CCTV in general, if a child went missing in a shopping centre, we could only rely on humans. Take a crowded Saturday shopping centre, a complex one with a multitude of shops and eateries, you’d have to alert the security personnel, rely on a tannoy and search party, and hope for a lockdown to find a lost or kidnapped child. With video analytics, how would this scenario play out? It’s pretty mind-blowing. As soon as security is alerted, they can work with the video analytics tools to instruct it precisely With the same scenario, you now have the help of many different cameras, but then there’s the task of searching through all the CCTV resources and footage. That’s where complex search functions come in. As soon as security is alerted, they can work with the video analytics tools to instruct it precisely on what footage to narrow down, and there’s a lot of filters and functions to use. Expected movement direction For instance, they can tick a ‘human’ field, so the AI can track and filter out vehicles, objects etc., and then they can input height, clothing colours, time the child went missing, and last known location. There’s a complex event to check too, under ‘child kidnap’. For a more accurate search, security guards can then add in a searching criterion by drawing the child’s expected movement direction using a visual query function. A unique function like this enables visual criteria-based searches rather than text-based ones. The tech will then narrow down to the images/videos showing the criteria they’ve inputted, showing the object/child that matches the data and filter input. Detecting facial data There are illegal demonstrations and troublesome interferences that police have to deal with A white-list face recognition function is then used to track the child’s route which means the AI can detect facial data that has not been previously saved in the database, allowing it to track the route of a target entity, all in real time. Then, security guards can confirm the child’s route and current location. All up-to-date info can then be transferred to an onsite guard’s mobile phone for them to confirm the missing child’s movement route, face, and current location, helping to find them as quickly as possible. Often, there are illegal demonstrations and troublesome interferences that police have to deal with. Video analytics and surveillance can not only capture these, but they can be used to predict when they may happen, providing a more efficient process in dealing with these types of situations and gathering resources. Event processing functions Picture a public square with a number of entries into the main area, and at each entry point or path, there is CCTV. Those in the control room can set two events for each camera: a grouping event and a path-passing event. These are pretty self-explanatory. A grouping event covers images of seeing people gathering in close proximity and a path-passing event will show when people are passing through or entering. The video analytics tool can look out for large gatherings and increased footfall to alert security By setting these two events, the video analytics tool can look out for large gatherings and increased footfall to alert security or whoever is monitoring to be cautious of protests, demonstrations or any commotion. Using complex event processing functions, over-detection of alarms can also be prevented, especially if there’s a busy day with many passing through. Reducing false alarms By combining the two events, that filters down the triggers for alarms for better accuracy to predict certain situations, like a demonstration. The AI can also be set to only trigger an alarm when the two events are happening simultaneously on all the cameras of each entry to reduce false alarms. There are so many situations and events that video analytics can be programmed to monitor. You can tick fields to monitor any objects that have appeared, disappeared, or been abandoned. You can also check events like path-passing to monitor traffic, as well as loitering, fighting, grouping, a sudden scene change, smoke, flames, falling, unsafe crossing, traffic jams and car accidents etc. Preventing unsafe situations Complex events can include violations of one-way systems, blacklist-detected vehicles Complex events can include violations of one-way systems, blacklist-detected vehicles, person and vehicle tracking, child kidnaps, waste collection, over-speed vehicles, and demonstration detections. The use of video analytics expands our capabilities tremendously, working in real time to detect and help predict security-related situations. Together with security agents, guards and operatives, AI in CCTV means resources can be better prepared, and that the likelihood of preventing unsafe situations can be greatly improved. It’s a winning team, as AI won’t always get it right but it’s there to be the advanced eyes we need to help keep businesses, premises and areas safer.

Related white papers

Video Surveillance as a service: Why are video management systems migrating to the Cloud?

The borderless control room

Smart and reliable rail and metro operations