Video analytics - Expert commentary
Thermal cameras see heat rather than light, so they are a perfect “human detector” Safeguarding outdoor assets in a reliable and cost-effective manner often comes down to a single requirement: Accurate intruder alerts and timely information about the unfolding event. While there are many technologies available for outdoor security, smart cameras with video analytics have emerged as the solution of choice for detecting intruders in real time outdoors. Yet the best...
Currently some retailers operate two separate speaker systems in their stores: one for broadcasting background music and one for announcements Twenty years ago, IP network cameras launched a revolution in video surveillance. Today, network audio systems are about to do the same for the speaker market. Back in 1996, the predominant video cameras were analogue. They weren’t intelligent. They required an expensive and complex head-end of recording and monitoring systems....
If all the components within a security and wider IT network have the ability to interact together, they can offer so much more than their individual capabilities The widespread use of open protocol systems is one of the most important developments in the security and safety sector for decades. With a heavy reliance upon various security softwares (even for physical security), using open systems has gone from being a desirable selling point to a necessity in the security indus...
Access levels of individuals based on their roles can be cross compared with their normal access patterns, it is also useful to look for anomalies in device behaviour Threats to an organisation’s physical and logical security are increasing in number and financial impact, according to several recent surveys. To combat this problem, security and IT professionals are fighting back with system upgrades and software solutions including advanced analytics. Using the analytics...
The global market for security as a service is set to grow from $921 million in 2016 to $1.49 billion by 2020 The global security as a service market is made up of video surveillance as a service (VSaaS) and access control as a service (ACaaS). With video surveillance as a service, the user pays on a yearly, quarterly or monthly basis for the ability to view live or recorded surveillance data. Using access control as a service, the customer pays a subscription to have a server...
Hikvision has been in the news in the United Kingdom recently, including a front page news story in The Times. SourceSecurity.com offered Keen Yao, Vice President at Hikvision’s International Business Centre, a chance to set the record straight regarding concerns expressed about hacking of cameras, the company’s ties to the Chinese state, and its role as the biggest video surveillance equipment manufacturer in the world. Hikvision has come a long way in the past few ye...
The field of artificial intelligence known as machine learning or cognitive computing has in recent years become highly popular The field of artificial intelligence known as machine learning or cognitive computing has in recent years become highly popular. The meteoric rise of “deep learning” technology over the past several years has been truly dramatic in many industries. Industry giants from Google, Microsoft, Facebook, IBM and many others have been pouring mass...
For more than a decade, Verint Systems, Melville, New York, has been developing and redefining the phrase the company pioneered: actionable intelligence. Today, its real-world specifications provide an in-depth analysis of video and integrated physical security data, deepening the gathering of intelligence and lessening risk at the protected premises. The entire realm of situational awareness continues to transition as intelligence is gleaned from new points, with this trend only...
In our world we make mobile security equipment for surveillance on-the-go in moving vehicles There are too many moving parts to a mobile system to think we could just predict hardware innovations. In our world we make mobile security equipment for surveillance on-the-go in moving vehicles. To make it work it takes a village of components vendors to bring it all together into a system that will keep civilians safer in the future. Possibly to the point of preventing an event fro...
Camera apps provide flexibility that is unheard-of with traditional server-based processing and analytics solutions The ability to customise IP video surveillance cameras with third-party apps has been a game-changer in system design and implementation. Traditional analytics require streaming all video to a server or external processor for deep interpretation to detect a license plate, face, or other criteria in each video frame. Apps perform image processing within the camera...
We will examine the question of the increasing technicality of the closed circuit video industry from three perspectives; The Manufacturer, the Specifier, and the Integrator. History of Closed Circuit Video industry Before we begin examining this subject, let's take a look briefly at the history of the Closed Circuit Video Industry. 1920s: Tubes were invented (Cathode, Image Dissector, Iconoscope) 1940s: CCTV first introduced to monitor rocket launches 1970s: The...
Many end-users shell out the cash to acquire the newest high-end devices, plug in, and expect to be wowed A well-developed surveillance system can give a single security guard the power to see what otherwise might take a hundred pairs of eyes to see. But what happens when all the components are all connected and powered up, and the resulting image on the screen is, well, indiscernible, or, at the very least, terribly pixelated? Many end-users shell out the cash to acquire the...
A lot has changed in the last 15 plus years in the security industry, including the ability to process and analyse Big Data. The growth rate of data has reached an astounding pace. Today, best estimates are that about 2.5 quintillion bytes of data are produced every day—that’s 2.5 followed by a staggering 18 zeros! The volume of data feeding into businesses is so vast, the only means available to leverage this data to drive decision making is to harness the power of a Business I...
The need for security convergence and shared threat intelligence is markedly increasing “Converged security” has been a buzz phrase for more than a decade, but the industry is just now starting to reap the rewards. Converged security recognises that truly comprehensive organisational risk management involves the integration of two distinct security functions that have largely been siloed in the past: information security (network operations centre or NOC) and physi...
A force of 85,000 police and military will patrol the Olympic grounds and environs to provide security A week before the Rio Olympics were slated to begin, Brazil fired the private security firm assigned to hire personnel to screen people entering the various Olympic venues located around Rio De Janeiro. The security plan called for 3,400 screeners. The security firm had only found 500. What happened? Today, prospective security officers must undergo background checks that do...
Body worn cameras help to provide better evidence documentation, increased accountability and transparency in law enforcement Forensic recordings – or the audio and video recordings from 911 calls, traffic cameras, CCTV systems and more – are virtually everywhere. However, in most cases the devices are static and fixed and often do not provide immediate or real-time information on incidents or pending threats. For example, the Boston Marathon bombers we...
Body worn cameras are seen as improving accountability, and also can provide evidence in criminal trials Body worn cameras have realised a surge in demand across the United States in the current climate of concern about how police interact with citizens, especially when that interaction turns deadly. Embracing body worn cameras For example, Los Angeles has approved a $69.6 million plan to equip 7,000 Los Angeles patrol officers with body worn cameras by the end o...
The LTO Program discusses how organisations are struggling to balance thebenefit of video surveillance with high costs and increasing legal parameters We live in a world where there is an increasing need for video surveillance for crime prevention and public security and safety. Video surveillance is being used in greater quantity and with higher quality expectations in airports, cities and workplaces around the globe. In fact, the average person is reportedly caught on a surv...
Part 3 of our Security in Healthcare series Megapixel and higher-definition cameras are meeting the security and surveillance needs of a variety of hospital and healthcare facilities Video is a major component of most hospital and healthcare security systems. Among the big video trends are greater integration of video with other systems, and increased use of higher-megapixel cameras and 180-degree and 360-degree-view cameras to monitor larger areas. Variety of video...
The market for smart buildings has expanded exponentially to greater benefits including life safety, security, and intelligence Much like the term “Internet of Things” or “IoT” the concept of “Smart Buildings” brings to mind many different ideas -- from programmable thermostats to touchless faucets to other green-building initiatives, with a focus on environmentally-friendly and energy efficient designs. While the early days of smart b...
Budget cuts are causing councils to scale down their systems, or decommission them altogether Budget cuts in England and Wales are leading to cameras being switched off to save money. But why is this happening and what could be done to minimise the impact on public space CCTV systems? The UK could be described as the CCTV “capital” of the world, with between 4 million and 6 million cameras deployed, according to a British Security Industry Association study in 201...
Transport hubs will always be terrorist targets since people congregate in tight clusters (Image credit: deepspace / Shutterstock.com) The attack on Ataturk Airport, Istanbul, comes only three months after the bombing of Brussels Airport. Many are considering common elements in terms of modus operandi and likely perpetrators but the similarities are largely superficial. Airports, like any major transport hub, will always be terrorist targets since people congregate in tight...
It is more complicated to search through video compared to text-based data Since the launch of Google’s search engine in 1998, Internet search has grown and expanded from desktops to mobile devices, generating over 3.5 billion searches of text, images and videos per day. One likely reason for this popularity is the search engine’s ability to immediately produce relevant results based on search criteria. The security industry, in contrast, has not always taken adv...
H.265 compression continued to be a popular topic from exhibitors on the second day of IFSEC Video beyond security, compression, HD over analogue and integration were on the lips of several exhibitors at IFSEC International 2016. Strangely for a security exhibition, there were plenty of exhibitors talking about non-security applications on the second day of IFSEC International in London. For Axis Communications, Atul Rajput, Regional Director for Northern Europe, said th...
A public facility with too much security or the wrong kind of security can discourage the public from visiting (Photo credit: Steve Williams Photography) The lethal November 2015 terrorist attacks against several soft targets in Paris have inspired changes in security at facilities considered soft targets across the United States and around the world. Today’s security directors well understand that “it can happen here.” To be clear, it probably won&rs...
Multiple trends point to a maturing video analytics market that is poised to meet or even exceed customer expectations Systems that use video analytics, also known as video content analysis, have a chequered history in the security market. Since the technology was introduced amid much fanfare a dozen or more years ago, opinions about video analytics have sometimes been undermined by systems that did not live up to the initial hype. In fact, early failures continue to taint per...
The landscape for end-to-end solutions is not designed to address thelong-term evolving needs of customers The video surveillance industry has reached an important crossroads where manufacturers can choose to continue in one direction that solely focuses on their own products and profits, or to move forward in another direction that emphasises building partnerships for the greater good of the community. On one side lies the short road of end-to-end, proprietary solutions fro...
Though primarily developed for consumer electronic devices, the advantages ofH.265 compression technology make it ideal for the world of physical security Ever since digital video systems were introduced the race was on to develop compression technologies to reduce runaway bandwidth and storage consumption. We’ve watched the industry roll out MJPEG, MPEG and H.264 advanced compression standards in direct response to each innovation. With adoption of HDTV and 4K solutions...
Drones can satisfy five commercial needs, today: surveillance, patrolling,incident response, mapping and site assessment The military uses drones. So do the police. Drones serve as weapons and surveillance tools.Today, businesses and institutions are applying drone technology to a variety of private security surveillance challenges. Private uses include patrolling facilities and installations such as pipelines from the sky. To be sure, private contractors sometimes weaponise d...
Technology solutions enhance and make manned guarding moreeffective and efficient the quickest way Most companies believe manned guards can help mitigate disturbances and neutralise situations, while at the same time reducing the chance of criminal activities and/or accidents occurring. However, people cannot be omnipresent or always be in the right place at the right time. When combining manned guards with the power of today’s technology, the results are unmatched. Dev...
