Geutebruck introduce new G-SIM security information management system
Geutebruck introduce new G-SIM security information management system

The new Geutebruck security information management system, G-SIM is the ultimate reliable assistant for managing, filtering and processing the vast quantities of security information generated by medium to large networked video security systems. It provides the best in video event handling and intuitive user operation, even for very extensive and highly complex systems with dozens of sites, thousands of cameras and numerous other alarm generating systems. G-SIM uses graphical representations which are quick and easy to understand and interpret, combined with familiar drag-and-drop functionality which only allows actions relevant to the prevailing situation. High levels of customisation provide each operator in the network with the information he needs in his own individually preferred format, quickly, intuitively and reliably. G-SIM’s key features include central user management, easy administration and operation using site plan-based control elements as well as the central reporting of all relevant operating and system events. Its system architecture is freely scalable and designed to enable effortless interaction between users whether they are within the network or access it remotely. G-SIM allows you to spread the processes involved in managing more powerful systems efficiently across a variety of workstations and to pass work from one operator to another to delegate or escalate tasks. G-SIM provides a perfect fit solution for each application and each user and comprehensive support for your own security concept. You can configure functions such as the live and recorded image display; the site plan-based control; the alarm management; the delegating and reporting tools; the complete documentation of all systems and operator actions as well as the sophisticated redundancy provision, to suit each application and each user.  The comprehensive user administration function and the universal audit trail together safeguard data protection and guarantee evidential quality of images and footage. G-SIM integrates seamlessly with all Geutebruck systems and with the vast range of third party interfaces they support, so it also facilitates the seamless processing and management of security information by subcontractors.  Key features: Complete flexibility for any number of networked workstations Intuitive operation using individually designed site-plan-based operator interfaces Ideal overview thanks to the seamlessly integrated video wall solutions Complete video stream management for live and recorded video Efficient alarm management with site plans, video and all other relevant information Comprehensive support for delegation, i.e. for the hand-over of event or alarm processing, the allocation of tasks and for switching internal system communication between users Perfect data protection as a result of the flexible administration of user rights and the complete audit trail High reliability backed up with sophisticated redundancy Freely scalable even for very extensive systems Management of all subcontractors and third party systems integrated into the Geutebruck system

Add to Compare
Geutebruck’s new G-Tect/VMX – professional detection, smart and simple
Geutebruck’s new G-Tect/VMX – professional detection, smart and simple

Geutebruck’s G-Tect/VMX is a new video motion detection solution for professional use, which is both extremely quick to set up and exceptionally reliable. It not only detects movement but differentiates between potentially relevant moving objects and background changes. G-Tect/VMX continuously analyses and evaluates all picture contents, and regularly adjusts its ‘understanding’ of the background. Thanks to the latest smart algorithms which continually adapt to the current image contents, G-Tect/VMX offers unprecedented accuracy at suppressing unwanted alarms caused by systematically occurring environmental effects such as moving foliage, rain, snow or headlights. It recognises these images changes resulting from weather as a systematically occurring background changes and therefore tolerates them.  Setting up a sterile zone where any intruder triggers an alarm is a simple mouse-clicking operation.  Configuring direction-dependent detection for a zone is quick and easy too. You can then copy settings across to other alarm zones and cameras with similar site conditions, for example to set up a series of cameras to monitor a fence. Finally there is a single intuitive global sensitivity control to optimize all the settings. – This minimalist design approach to system settings slashes the time required for system installation and makes it predictable. G-Tect/VMX is designed for seamless integration in the Geutebruck system world and comes with licence-free activation of Geutebruck’s classic VMD detector, to enable legendary dual sensor operation and the best possible protection of critical areas. Also being unveiled alongside this detection solution is Geutebruck’s new G-Tect/MoP pixelating function which maintains data protection privacy for public access areas by automatically masking moving objects in live displays or archived image data while still allowing authorised personnel access to the full image for serious incident investigation and evidential purposes. Other innovations on the Geutebruck stand at Security 2012 include: the G-Scope/1000 range of new compact video platforms for top performance in tight spots; a new range of G-VRaid units; the re_porter-XRdb with a hot swap database as well as G-SIM the exceptionally powerful new video management system for large complex installations. To see for yourself visit stand 409 in hall 2 at Security 2012 or go to www.geutebrueck.com for more information.

Add to Compare
VCA4IP, Geutebruck’s video content analysis, now available for third party IP cameras
VCA4IP, Geutebruck’s video content analysis, now available for third party IP cameras

Geutebruck video analysis algorithms are already deployed in more than 50,000 digital video cameras round the world.  Now, with its latest software offering, VCA4IP, Geutebruck is making these tried-and-tested professional video content analysis algorithms available for installation in third party IP cameras when used with re_porter or GeViScope CCTV systems. Activity detection (AD), video motion detection (VMD) and Dual-Sensor functions are each available separately by individual licence.  AD provides reliable movement detection for indoor and selected outdoor applications with a very low false alarm rate owing to the effective suppression of environmental influences.  For critical outdoor applications where you want to differentiate between objects of different sizes, movements in different directions and at different speeds, then VMD is the best choice. It can ensure that permitted movements don't trigger unnecessary alarms, by for instance, ignoring vehicles leaving a site, or small animals straying into the scene.  For exceptionally high targeting accuracy and even better suppression of unwanted alarms, Geutebruck's Dual-Sensor uses video motion detection and object classification algorithms in parallel, with alarms only being triggered when both sets of criteria are met.VCA4IP can process resolutions up to several megapixels.  Built-in diagnostics report sabotage and monitor the connection status and contrast levels to avoid the generation of false reports.  Any number of parameter profiles (day/night switches) can be stored for each camera channel.  All camera channels are easily configured in the standard user-friendly set-up screen. 

Add to Compare
Geutebruck's new 'fading long term memory' slashes the cost of video archiving
Geutebruck's new 'fading long term memory' slashes the cost of video archiving

Geutebruck CCTV systems can now retain high quality video for long periods using only a fraction of the normal storage capacity.  Their new ‘fading long term memory' (FLTM) option reflects the fact that, where different kinds of event are discovered, handled and investigated in different timescales; there is no real need to continue storing video at the full 25 fps for a month or more, if lower frame rates suffice after the first few days.  FLTM software therefore enables you to progressively reduce the frame rate of your stored footage as time goes by, in accordance with your assessment of residual risks.Let's imagine your system has to deal with robbery, vandalism and fraud, and you have to retain a video record for 30 days.  Robberies are discovered and pursued promptly, so within three days all relevant 25 fps footage has been reviewed and backed up.  Vandalism is dealt with in a week and 6-7 fps footage is adequate.  The timescale for fraud is longer but 1 fps provides the necessary evidential detail.  Normally, for high quality real-rime video @ 4Mbit/s, storage per camera would be about 43.2 GB per day, or 1.3 TB for 30 days.  But with FLTM you only need: 3 days @ 25 fps ≈ 130 GB + 4 days @ 6.25 fps ≈ 90 GB (differential compression reduces data by about 50%)+ 23 days @ 1 fps (I-frames only) ≈ 70 GB  A total of only 290 GB per camera - which enables you to make significant hardware savings without any loss of benefit, utility or security.

Add to Compare
Geutebruck introduces the next generation of ‘omnibrid’, multi-standard operating software
Geutebruck introduces the next generation of ‘omnibrid’, multi-standard operating software

‘Hybrid was yesterday; the future is omnibrid,' is how Geutebruck is heralding the introduction of its new generation of setup and operating software for GeViStore and GeViScope platforms this spring. Not only does this high performance software support analogue, digital and megapixel cameras as well as ONVIF-compliant IP cameras and even16/9 HD-format ones, but it also enables any M-JPEG and H.264 based standard digital compression processes (including specialist video surveillance ones like MPEG4CCTV, H264CCTV) to be used in the same system. This multi-standard capability means that more than one compression standard can be used in one single system and the end-user is no longer tied to one particular process. And, if a camera signal is not available from the source in the optimised MPEG4CCTV format, then the M-JPEG stream can be trans-coded in real time.From Geutebruck's point of view the arrival of ‘omnibrid' software marks another significant step towards achieving the ultimate goal of producing video security systems which record only those images which are really relevant to the user, and which give him the best possible conditions for extracting the valuable information from them. Geutebruck's video sensors and intelligent video analysis software already offer a reliable and proven means of efficiently selecting, managing, and minimising relevant material for onward transmission and/or recording, while its own specialist, CCTV-friendly, standard-compliant compression processes retain fluid motion, and consequently valuable detail, in situations and processes where the vast majority of other H.264 implementations only hesitate and shudder. However, until now the only IP cameras whose video stream could be processed using Geutebruck's video analysis software have been those few with added functionality.‘Omnibrid' software lifts this restriction and opens the door for much greater flexibility in product selection. It also provides more scope for intelligent data management, enables the use of different compression formats for different purposes, and gives system designers much more scope to achieve optimum customisations.

Add to Compare

CCTV software - Expert commentary

What is AI Face Search? Benefits over facial recognition systems
What is AI Face Search? Benefits over facial recognition systems

When a child goes missing in a large, crowded mall, we have a panicking mom asking for help from the staff, at least a dozen cameras in the area, and assuming the child has gone missing for only 15 minutes, about 3 hours’ worth of video to look through to find the child. Typical security staff response would be to monitor the video wall while reviewing the footage and making a verbal announcement throughout the mall so the staff can keep an eye out for her. There is no telling how long it will take, while every second feels like hours under pressure. As more time passes, the possible areas where the child can be will widen, it becomes more time-consuming to search manually, and the likelihood of finding the child decreases. What if we can avoid all of that and directly search for that particular girl in less than 1 second? Artificial neural networks are improving every day and now enable us to search for a person across all selected camera streamsWith Artificial Intelligence, we can. Artificial neural networks are improving every day and now enable us to search for a person across all selected camera streams in a fraction of a second, using only one photo of that person. The photo does not even have to be a full frontal, passport-type mugshot; it can be a selfie image of the person at a party, as long as the face is there, the AI can find her and match her face with the hundreds or thousands of faces in the locations of interest. The search result is obtained in nearly real time as she passes by a certain camera. Distinguishing humans from animals and statues The AI system continuously analyses video streams from the surveillance cameras in its network, distinguishes human faces from non-human objects such as statues and animals, and much like a human brain, stores information about those faces in its memory, a mental image of the facial features so to speak. When we, the system user, upload an image of the person of interest to the AI system, the AI detects the face(s) in that image along with their particular features, search its memory for similar faces, and shows us where and when the person has appeared. We are in control of selecting the time period (up to days) and place (cameras) to search, and we can adjust the similarity level, i.e., how much a face matches the uploaded photo, to expand or fine-tune the search result according to our need. Furthermore, because the camera names and time stamps are available, the system can be linked with maps to track and predict the path of the person of interest. AI Face Search is not Face Recognition for two reasons: it protects people’s privacy, and it is lightweight Protecting people’s privacy with AI Face Search  All features of face recognition can be enabled by the system user, such as to notify staff members when a person of interest is approaching the store AI Face Search is not Face Recognition for two reasons: it protects people’s privacy, and it is lightweight. First, with AI Face Search, no names, ID, personal information, or lists of any type are required to be saved in the system. The uploaded image can be erased from the system after use, there is no face database, and all faces in the camera live view can be blurred out post-processing to guarantee GDPR compliance. Second, the lack of a required face database, a live view with frames drawn around the detected faces and constant face matching in the background also significantly reduces the amount of computing resource to process the video stream, hence the lightweight. Face Search versus Face Recognition AI Face Search Face Recognition Quick search for a particular person in video footage Identify everyone in video footage Match detected face(s) in video stream to target face(s) in an uploaded image Match detected face(s) in video stream to a database Do not store faces and names in a database Must have a database with ID info Automatically protect privacy for GDPR compliance in public places May require additional paperwork to comply with privacy regulations Lightweight solution Complex solution for large-scale deployment Main use: locate persons of interest in a large area Main use: identify a person who passes through a checkpoint Of course, all features of face recognition can be enabled by the system user if necessary, such as to notify staff members when a person of interest is approaching the store, but the flexibility to not have such features and to use the search tool as a simple Google-like device particularly for people and images is the advantage of AI Face Search.Because Face Search is not based on face recognition, no faces and name identifications are stored Advantages of AI Face Search Artificial Intelligence has advanced so far in the past few years that its facial understanding capability is equivalent to that of a human. The AI will recognise the person of interest whether he has glasses, wears a hat, is drinking water, or is at an angle away from the camera. In summary, the advantages of Face Search: High efficiency: a target person can be located within a few seconds, which enables fast response time. High performance: high accuracy in a large database and stable performance, much like Google search for text-based queries. Easy setup and usage: AI appliance with the built-in face search engine can be customised to integrate to any existing NVR/VMS/camera system or as a standalone unit depending on the customer’s needs. The simple-to-use interface requires minimal training and no special programming skills. High-cost saving: the time saving and ease of use translate to orders of magnitude less manual effort than traditionally required, which means money saving. Scalability: AI can scale much faster and at a wider scope than human effort. AI performance simply relies on computing resource, and each Face Search appliance typically comes with the optimal hardware for any system size depending on the customer need, which can go up to thousands of cameras. Privacy: AI Face Search is not face recognition. For face recognition, there are privacy laws that limits the usage. Because Face Search is not based on face recognition, no faces and name identifications are stored, so Face Search can be used in many public environments to identify faces against past and real-time video recordings. AI Face Search match detected face(s) in video stream to target face(s) in an uploaded image Common use cases of AI Face Search In addition to the scenario of missing child in a shopping mall, other common use cases for the AI Face Search technology include: Retail management: Search, detect and locate VIP guests in hotels, shopping centres, resorts, etc. to promptly attend to their needs, track their behaviour pattern, and predict locations that they tend to visit. Crime suspect: Quickly search for and prove/disprove the presence of suspects (thief, robber, terrorist, etc.) in an incident at certain locations and time. School campus protection: With the recent increase in number of mass shootings in school campuses, there is a need to identify, locate and stop a weapon carrier on campus as soon as possible before he can start shooting. Face Search will enable the authorities to locate the suspect and trace his movements within seconds using multiple camera feeds from different areas on campus. Only one clear image of the suspect’s face is sufficient. In the race of technology development in response to business needs and security concerns, AI Face Search is a simple, lightweight solution for airports, shopping centres, schools, resorts, etc. to increase our efficiency, minimise manual effort in searching for people when incidents occur on site, and actively prevent potential incidents from occurring. By Paul Sun, CEO of IronYun, and Mai Truong, Marketing Manager of IronYun

ONVIF Profile T and H.265: the evolution of video compression
ONVIF Profile T and H.265: the evolution of video compression

In today’s market, efficient use of bandwidth and storage is an essential part of maintaining an effective video surveillance system. A video management system’s ability to provide analysis, real time event notifications and crucial image detail is only as a good as the speed and bandwidth of a surveillance network. In the physical security industry, H.264 is the video compression format used by most companies. Some companies also employ H.264 enhancements to compress areas of an image that are irrelevant to the user at a higher ratio within a video stream in order to preserve image quality for more important details like faces, license plates or buildings. The H.265, H.264’s successor, will be increasingly used for compression in the future. Some companies are already using H.265 in their cameras and video management systems, while a host of other manufacturers are certainly preparing for its broader adoption in the years to come. Video compression technologies Reduced bandwidth and storage requirements are the primary benefits of video compression technologies Reduced bandwidth and storage requirements are the primary benefits of video compression technologies. In some cases, H.265 can double the data compression ratio of H.264, while retaining the same quality. Increased compression rate translates into decreased storage requirements on hard drives, less bandwidth usage and fewer switches – all of which reduce overall costs of system ownership. H.265 compression delivers a lower bitrate than H.264, which is relevant to end users and integrators because the lower bitrate reduces strain on hardware and can reduce playback issues. It’s very important that the compression format that is used is supported in all of the different components of a system: cameras, desktop computers on which the VMS is running and the VMS itself. It is also good for end users and integrators to understand the basics of video compression. Having a basic understanding of compression allows users to tweak settings to reduce bandwidth usage even more. Many cameras come with default settings that can be changed to ultimately reduce costs. ONVIF physical security In the physical security industry, ONVIF is working to incorporate into its specifications the use of new formats such as H.265 but is not directly involved in developing the compression standards themselves. With Profile T, the new ONVIF video profile released will employ a new media service that is compression agnostic. This means that it can support new video compression formats, including H.265, as well as new audio compression formats, with the ability to include new video and audio codecs as needed in the future without having to redesign its media service. In the physical security industry, ONVIF is working to incorporate into its specifications the use of new formats such as H.265 Standardisation organisations that are directly addressing new compression standards include the International Telecommunication Union (ITU), the Moving Picture Experts Group (MPEG) and a joint commission of the International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC), which is addressing the coding of audio, picture, multimedia and hypermedia information. Other compression formats on par with H.264 and H.265 are being developed by companies such as Google. H.265 compression formats Using products that employ H.265 compression will reduce costs through bandwidth reduction, as will changing default settings on cameras, which are often conservative. Having a basic understanding of compression formats and how to tweak camera factory default settings also gives integrators the ability to further reduce bandwidth for added costs savings and increased system performance. These enhancements will analyse which parts of an image are most important and adjust local levels of compressions accordingly It is also worth noting that H.265 enhancements will likely be developed by camera manufacturers to further reduce bandwidth, as was the case with H.264. These enhancements will analyze which parts of an image are most important and adjust local levels of compressions accordingly. While H.265 itself is ready for prime time, its value as a tool for IP-based surveillance systems is dependent on support for the codec in all parts of the system – the VMS, server hardware, graphics cards and camera. Though widespread H.265 adoption is predicted, providers of these components are jumping on the H.265 bandwagon at different rates of speed. ONVIF is including support for H.265 in its new video profile, Profile T, because it believes it will become the most widely used compression format and ONVIF recognises the need to anticipate that migration as a future need of the industry. The new media service, which will be implemented with Profile T, will be future-proof in that when new compression formats are released in the future, ONVIF can adopt them very quickly. That flexibility will definitely help integrators.

How artificial intelligence (AI) is changing video surveillance today
How artificial intelligence (AI) is changing video surveillance today

There’s a lot of excitement around artificial intelligence (AI) today – and rightly so. AI is shifting the modern landscape of security and surveillance and dramatically changing the way users interact with their security systems. But with all the talk of AI’s potential, you might be wondering: what problems does AI help solve today? The need for AI The fact is, today there are too many cameras and too much recorded video for security operators to keep pace with. On top of that, people have short attention spans. AI is a technology that doesn’t get bored and can analyse more video data than humans ever possibly could.AI is a technology that doesn’t get bored and can analyse more video data than humans ever possibly could It is designed to bring the most important events and insight to users’ attention, freeing them to do what they do best: make critical decisions. There are two areas where AI can have a significant impact on video surveillance today: search and focus of attention. Faster search Imagine using the internet today without a search engine. You would have to search through one webpage at a time, combing through all its contents, line-by-line, to hopefully find what you’re looking for. That is what most video surveillance search is like today: security operators scan hours of video from one camera at a time in the hope that they’ll find the critical event they need to investigate further. That’s where artificial intelligence comes in. The ability of AI to reduce hours of work to mere minutes is especially significant when we think about the gradual decline in human attention spans With AI, companies such as Avigilon are developing technologies that are designed to make video search as easy as searching the internet. Tools like Avigilon Appearance Search™ technology – a sophisticated deep learning AI video search engine – help operators quickly locate a specific person or vehicle of interest across all cameras within a site. When a security operator is provided with physical descriptions of a person involved in an event, this technology allows them to initiate a search by simply selecting certain descriptors, such as gender or clothing colour. During critical investigations, such as in the case of a missing or suspicious person, this technology is particularly helpful as it can use those descriptions to search for a person and, within seconds, find them across an entire site. Focused attention           The ability of AI to reduce hours of work to mere minutes is especially significant when we think about the gradual decline in human attention spans. Consider all the information a person is presented with on a given day. They don’t necessarily pay attention to everything because most of that information is irrelevant. Instead, they prioritise what is and is not important, often focusing only on information or events that are surprising or unusual. Security operators scan hours of video from one camera at a time in the hope that they’ll find the critical event they need to investigate further Now, consider how much information a security operator who watches tens, if not hundreds or thousands of surveillance cameras, is presented with daily. After just twenty minutes, their attention span significantly decreases, meaning most of that video is never watched and critical information may go undetected. By taking over the task of "watching" security video, AI technology can help focus operators’ attention on events that may need further investigation. As AI technology evolves, the rich metadata captured in surveillance video will add even more relevance to what operators are seeing For instance, technology like Avigilon™ Unusual Motion (UMD) uses AI to continuously learn what typical activity in a scene looks like and then detect and flag unusual events, adding a new level of automation to surveillance. This helps save time during an investigation by allowing operators to quickly search through large amounts of recorded video faster, automatically focusing their attention on the atypical events that may need further investigation, enabling them to more effectively answer the critical questions of who, what, where and when. As AI technology evolves, the rich metadata captured in surveillance video – like clothing colour, age or gender – will add even more relevance to what operators are seeing. This means that in addition to detecting unusual activities based on motion, this technology has the potential to guide operators’ attention to other “unusual” data that will help them more accurately verify and respond to a security event. The key to advanced security When integrated throughout a security system, AI technology has the potential to dramatically change security operations There’s no denying it, the role of AI in security today is transformative. AI-powered video management software is helping to reduce the amount of time spent on surveillance, making security operators more efficient and effective at their jobs. By removing the need to constantly watch video screens and automating the “detection” function of surveillance, AI technology allows operators to focus on what they do best: verifying and acting on critical events. This not only expedites forensic investigations but enables real-time event response, as well. When integrated throughout a security system, AI technology has the potential to dramatically change security operations. Just as high-definition imaging has become a quintessential feature of today’s surveillance cameras, the tremendous value of AI technology has positioned it as a core component of security systems today, and in the future.