SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Video analytics
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

When do video systems yield information other than images?

When do video systems yield information other than images?
15 Nov 2016

Editor Introduction

A clear image is the desired end-result of video systems – or is it? In a growing number of applications, it’s not the image itself, but rather what information can be gained from the image, that is most important. We asked this week’s Expert Panel Roundtable to comment on some of the ways information from video is valuable to end users. Specifically, we asked: In what applications does information derived from video images provide more value than the images themselves?


Card image cap
Hedgie Bartol Axis Communications

Retail analytics can effectively transform a network camera into a very powerful marketing tool that enables retailers to find out more about their customers and improve the shopping experience. By analysing the objects within the video image, we can determine how many people are coming in or out of a location, how many people are inside the location, the average visit time per customer, queue levels, and identify customer demographics by age and gender. This information, combined with basic sales data, enables the retailer to make intelligent business decisions and to optimise operations, increase sales, and offer better customer service. Some retail analytics perform all image processing at the edge or completely embedded within the network camera. Therefore, no images or video are collected to be analysed later. Data is completely anonymous, effectively converting the camera into a sensor while still providing the benefits of a network video solution.

Card image cap
Jim Murray AMAG Technology, Inc.

Video analytics and the resulting metadata is being analysed to provide solutions that go outside of security and even video surveillance. The cameras are being used as smart sensors in an ever-growing number of applications. For example, thermographic cameras are widely used in auto safety applications, such as animal and pedestrian detection, as well as in industrial applications for leak detection or high temperature warnings. Retail marketing widely leverages digital video analytics in applications such as people counting, heat mapping, traffic patterns, and analysing queue times. Machine vision is using digital video for vision-controlled robotic handling systems used in applications such as product packaging, and automated harvesting. The information derived from digital video images assists in an ever-growing number of applications.

Card image cap
Kevin Wine Verint Systems

In today’s competitive business environment, organisations of all types and sizes seek new ways to transform video and related data into valuable insight — propelling more informed, intelligent decision-making. This process allows stakeholders to make sense of video data to detect risk proactively and to activate efficient response. Transforming raw data into actionable intelligence helps increase efficiency, enhances safety and optimises business practices. Examining video and understanding its correlation with other systems and processes delivers a broad range of benefits — it allows organisations to uncover hidden patterns, unknown correlations, market trends, customer preferences and other useful business information. Stakeholders can gain insights that empower them to anticipate, respond, and take action — which are necessary to successful operations. With the amount of video growing rapidly, the process of understanding how it affects ongoing operations is critical. Businesses that generate actionable intelligence from video are better positioned to achieve strategic objectives.

Card image cap
Brandon Reich Pivot3, Inc.

Video surveillance is a critical addition to data analysis and situational awareness. For example, in a city environment, first responders can leverage video to assess a situation in real time and execute a more informed and quicker response to a situation. Casino surveillance operators can use cameras to monitor for compliance with industry and government regulations. Oil and gas facilities can monitor system operations in remote sites to prevent system failures. Marketing teams also find video useful to determine the success of promotional campaigns within retail stores. These scenarios point to the growing benefit of video surveillance as a security and business optimisation tool. But as the value of video increases, users need to ensure this investment is protected. Quite simply, downtime and data loss is not an option for any business, whether it operates one site locally or many diverse facilities across the globe.

Card image cap
Jumbi Edulbehram NVIDIA

Data on the identification of people and other objects for the purposes of counting them, tracking their movements or identifying the, are useful for a number of applications such as customer analytics in retail, tracking of vehicles for traffic management, and identifying particular individuals or objects for security or other purposes. The "value" extracted from the data can be realised in various ways; for example, customer analytics in retail can be used to increase sales by making marketing more effective or optimising store layout according to traffic patterns within a store. The accurate identification of people by facial recognition could be valuable for applications such as restricting access based on identity or providing differentiated customer service in retail or hospitality. The automatic recognition of automobile number plates is valuable for applications such as parking management and congestion pricing.


Editor Summary

The retail market is leading the way in utilising information obtained from video images, but there are other examples, too, as our Expert Panel Roundtable points out. They include auto safety applications, such as animal and pedestrian detection, industrial applications for leak detection or high temperature warnings, public safety, and automobile number plate recognition. In short, video is more valuable today than ever, and the value transcends the historic application of the image an operator sees on a screen.

  • Related links
  • AMAG CCTV software
  • Axis Communications CCTV software
  • Oncam CCTV software
  • Oncam CCTV cameras
  • Pivot3 CCTV software
  • Verint CCTV software
  • Related categories
  • CCTV cameras
  • CCTV software
Related white papers
Understanding AI-powered video analytics

Understanding AI-powered video analytics

Download
Open credential standards and the impact on physical access control

Open credential standards and the impact on physical access control

Download
What is a universal RFID reader?

What is a universal RFID reader?

Download
Related articles
2026 Trends in retail security: Interface Systems insights

2026 Trends in retail security: Interface Systems insights

Why open matters in the age of AI

Why open matters in the age of AI

Verkada: AI-driven security revolution & $5.8B valuation

Verkada: AI-driven security revolution & $5.8B valuation

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Video analytics
  4. News
  5. Round table discussions
About this page

Discover how advanced video systems offer valuable data beyond visuals, enhancing security operations with insightful analytics and information.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec