Analyse hours of video in minutes

July 2018 Editor's Choice, Surveillance

Shortly after the announcement that BriefCam is to be acquired by Canon, Asaf Bar, BriefCam’s sales director for the Middle East, Africa and India, paid Hi-Tech Security Solutions a visit with the company’s South African master distributor, ISDS. The reason for the visit was to introduce the next generation of BriefCam’s video content analytics platform.

BriefCam has taken its unique fusion of Video Synopsis and Deep Learning to the next level with BriefCam v5. These capabilities redefine how video surveillance systems are being used by law enforcement agencies and major enterprises globally. The uses of this technology are many, including streamlining and reducing time spent reviewing video by pinpointing people and objects of interest, for safety and security, and also identifying trends in behaviour for extracting quantifiable insights.

The BriefCam video content analytics platform has three integrated modules: Review, Research and Respond.

Review and search

As demonstrated by Bar, this version collates information from multiple video streams at the same time, the maximum number dependent on your processing power. By first selecting your timeframe, the system detects, extracts and classifies all objects on the streams you select from your VMS and superimposes the objects on the stationary background, simultaneously displaying events that have occurred at different times, with the ability to link back to original video. The user is then able to refine the categories of their search, by a lengthy list of classes. For example, only showing women, men, children, cars, trucks, animals, etc. The synopsis quickly filters out everything not requested and allows for further refinement.

The user can specify a female wearing red and carrying a bag, for example, and the system identifies all objects from the video streams meeting those requirements. If you are looking for someone running away from a crime scene, you can also exclude all people not moving faster than a certain speed in a particular direction.

The same applies to vehicles. You can get a synopsis of all vehicles travelling at over 30 kmph in your parking area over the course of a day, for example. You can also get a synopsis for everyone walking or driving along a specific path (which you define with your mouse) over the period of time the user is interested in.

The new version of BriefCam also has facial recognition and attribute similarity. There is currently no functionality to identify people via facial biometrics, but it is possible to build a synopsis of all the faces seen on your video streams over the selected timeframe. Once again you can filter the results and select a person to see where they have been, across all cameras.

Bar notes that the next version of the application will have improved facial recognition allowing for use of external source, and the ability for users to create blacklists and whitelists of people allowed in the environment.

Planning and research

The second module is a business intelligence tool that allows users to uncover quantitative insights within their video data and provide reporting and analytics to enable data driven decision making for various areas of the business. Users can build any report they choose – such as footfall in a retail environment for each hour of the day – and these will be available at the click of a button. They can also be automatically generated and sent to specific people on a regular basis.

Bar says customers will be able to create almost limitless intelligence with the feature, including tracking people and vehicle movement patterns over time, determining demographic trends associated with time, identify crime hotspots and even tracking employees’ adherence to safety regulations automatically.

The reports are designed through a point and click process, which means they can be generated quickly while delivering valuable and actionable information.

Proactive response

The third module is the real-time option that monitors live camera feeds and can trigger alerts on certain defined conditions. For example, cars making an illegal U-turn at a specific intersection or travelling the wrong way down a one-way street can be immediately brought to the attention of the relevant people, or people walking in an exit-only access point can be highlighted and tracked.

The options are, again, almost limitless and triggers can be set for people and vehicles loitering, entering restricted areas, or even parking for too long in drop-off areas. All while the surveillance system is still used for its normal functions by the security staff.

For more information on what Briefcam can do, please see the video examples at https://www.briefcam.com/resources/videos/.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.