Video analytics in the spotlight

November 2012 Surveillance, Retail (Industry)

What is happening in the world of video analytics? A little while ago analytics was the next big thing that would change the world of surveillance, save money and put a man on Mars. Then the hype seemed to calm down when people realised the benefits of analytics in real-world environments are not quite what they are in vendors’ labs.

To be sure, there are working analytics solutions out there, but how reliable are the more sophisticated products in areas with random traffic and weather conditions? Hi-Tech Security Solutions asked some analytics players what their opinions are of the analytics market and where they see it going. To start with, we asked what, in general, is happening in the world of video analytics today?

Roy Alves
Roy Alves

Roy Alves, country manager for Axis Communications says analytics is definitely improving. “We are seeing a big trend in heat mapping used in conjunction with people counting in the retail sector. There is also a shift in using data to staff tills, ensuring retailers have employed the correct number of staff. The technology is improving due to the fact that image quality on the camera is getting better, allowing for enhanced analytics.”

John Loftus
John Loftus

MASS Distribution CEO, John Loftus adds, we must remember that very few CCTV manufacturers own their own video analytics software or algorithms. “The majority of the manufacturers use off-the-shelf analytics from a few select software houses. So analytics seldom differs much from manufacturer to manufacturer. There is little in-house development by CCTV manufacturers.”

He adds that analytics is becoming a standard offering. A few years ago it was a very expensive add-on, but as it proliferated through the industry, it is becoming the norm. “Today almost every manufacturer offers analytics as a standard feature.”

He also notes that real-world implementations are plentiful, “but the term ‘controlled environment’ must always be borne in mind. Using analytics on a highway for directional monitoring (an alarm must sound if someone reverses on a motorway or drives in the wrong direction, against the flow) is such an example. Using analytics in a museum/art gallery to monitor precious objects is another classic example.”

Theo Biehler
Theo Biehler

Theo Biehler, MD of Viasys Africa says 10 years ago we saw a few venture-backed companies that threw millions of dollars into marketing analytics that over-promised and under-delivered. “Exotic behaviours like facial recognition in a crowd seemed to only be days away from hitting the market, but it never came. Investments in expensive hardware to run the heavy algorithms were wasted because the complexity was overwhelming and reliability was spotty at best.

“Today we are seeing the market ask for more reasonable behaviours like simple, reliable outdoor intrusion detection. End users realise the most important function of analytics must be reliable detection in outdoor environments. If this one function is reliable, you can build on it, but without it you have zero value.”

He adds that analytics has recently received a boost with the reduction in cost of thermal imaging cameras. Prices have dropped due to advances in supply management and competition. The combination of thermal imaging cameras and video analytics hits the sweet spot for perimeter security applications because the challenging aspects of light reflections and moving brush is eliminated and only the high contrast intruder can be detected.

Where is analytics working?

If analytics is proving its worth in certain situation, where can customers install it with the expectation that the system will work reliably, all the time. Once again there is a tremendous difference between closed, lab events and the real world where anything can happen. If companies and governments have trouble simply obtaining camera images that are clear enough to use to prosecute offenders, can we really rely on more complex applications like analytics to deliver the goods? And if so, in which areas do these systems work well.

Alves notes that there is a significant improvement in motion detection technology, which has seen the reliability of this application increase rapidly over time.

Loftus says that analytics works well in controlled environments, but when using it for applications such as people counting in airports or entrances to busy retail outlets would prove the opposite, “there are just too many people, too much movement for accurate usage with current software.”

He adds that when MASS offers its clients the analytics offered by the CCTV manufacturers, “we make use of what we can, but principally as back-up. Our focus is more on ensuring proper integration of the various systems we offer. In other words, does the intruder or access control system fully integrate with our CCTV system? Does our ground radar work seamlessly with our thermal cameras? Does the perimeter detection trigger the necessary responses from the other electronic security systems on site? Does the point-of-sale integration allow for full data mining or is it merely a text overlay on the recorded video?”

He says that in static applications, he finds analytics useful, for example in congestion detection, object detection, directional detection and in some instances the use of virtual trip-wires. “If analytics are used in isolation for perimeter detection, I would suggest that buyers exercise caution in their approach.”

In contrast, Biehler says analytics provides reliable perimeter protection and intruder detection. All functionality offered in this regard works effectively as long as clients are informed as to the potential limitations of their solution.

Give us an example

Talk is cheap, so Hi-Tech Security Solutions asked our interviewees to provide examples of what analytical applications they are installing for customers that are delivering the benefits required.

Viasys’s video analytics solution has been proven over many years and has made the company a market leader in Europe in perimeter protection and intruder detection solutions for solar parks. “We also provide solutions to a variety of other industries,” adds Biehler. “It is an effective video alarming solution which can be integrated with other security solutions to provide a reinforced solution. Given the detection range of up to 180 m using thermal cameras, these are becoming increasingly sought after.”

Active tampering alarms are one of the solutions Axis focuses on. This functionality enables security staff to detect disrupted camera operation by automatically alerting the operator when a camera is manipulated in any way. The product is especially useful in applications where there is potential for vandalism. “Cross line detection is suitable for general monitoring of entrance and exit points in low-traffic areas, detecting objects such as persons and vehicles that cross a defined virtual line,” says Alves.

He adds that more analytical applications are going to be on-camera in future. More decision making on the camera itself is beneficial as a cost as well as a bandwidth saving.

Viasys has options for analytics on camera and server-based. “Some clients tend to favour server-based solutions as this enables them to combine various types of cameras through the servers,” says Biehler. “While the alerts can be transmitted to remote monitoring centres, on-site guards can also view the monitors. The ability to use existing cameras also limits the overall cost of implementing the analytics.”

MASS does not install systems, but provides a system design facility for clients. “Our designs have incorporated video analytics, but only as a secondary system,” says Loftus. “In other words, if the CCTV manufacturer provides analytics as a standard offering, we will inform the client that analytics is available with the system and we will use it, but mostly in static and monitored environments.”

Long-term analytics potential

Looking ahead into the next five years, Alves sees that the accuracy of existing applications will be improved and cameras will have better depth perception, allowing for better analytics. He also expects to see customer behaviour tracking as well as intelligent colour recognition and decent facial recognition. And installers will have some help with intelligent installation assistance in which the camera will be able to automatically configure its own settings suited to any environment.

“With continuous development taking place, this space is bound to be very interesting,” says Biehler. “Using the functionality for visual alerts to be transmitted via the cloud, it is likely that analytics will make visual verification the dominant security requirement in less than five years.

“Used correctly, analytics can highlight an intrusion or perimeter breach as it happens, enhanced by actual images. This creates the opportunity for security teams on site to respond quickly to the specific area of breach to minimise the impact of the intrusion. Visual verification also allows a quick threat assessment so that an appropriate security response is arranged. This could enhance the personal safety of guards on site. For example, it would be dangerous for a single unarmed guard to approach multiple (possibly armed) intruders, especially at night.

“We have already been engaged by progressive security companies regarding their vision for the future incorporation of visual verification into their solutions. With some development, we will hopefully be able to release details of some of these solutions within a year.”

Loftus, on the other hand, says MASS sees more useful development taking place with respect to the integration of various products and disciplines rather than analytics.

From the user’s perspective

Of course, users have heard it all before, so we end this article by asking our interviewees how they can be sure that the analytics they want (or are being sold) will work as well in real-world situations as in the vendor’s demonstration.

Alves says users should always ask for proof of concepts as well as visit pilot sites. “They should ask to see the analytics working in a similar environment as to the one they would be using it for.”

Loftus takes a similar approach, but says the user should ask if the installer is prepared to bear the cost of a proof-of-concept installation. Furthermore, they should ask:

* Have we jointly drafted a functional specification for this installation? What role does video analytics play in the specification?

* If the product does not meet the full requirements of the functional specification, what recourse do I have?

Viasys offers a free 30-day trial of its analytics to test it in the intended environment. The software can be downloaded from its website along with a guide on how to use it. Biehler says this allows a reasonable test period, which should cover a variety of different conditions within the given environment.

While video analytics has been overhyped in the past, and still is in certain instances, there are applications that deliver as promised. The next five years should see some remarkable improvements in certain types of analytical applications. We will also see the continued movement of more software onto the camera itself, taking the processing burden from servers as well as saving on bandwidth as on-event monitoring becomes the norm. It will also enhance the security function by taking over some of the boring tasks that humans are currently supposed to do. And visual verification will also become the norm, as we can see happening already, saving time and costs by reducing false alarm responses.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
Holding all the cards
neaMetrics Suprema SMART Security Solutions Technews Publishing Access Control & Identity Management
After so many years of offering alternatives to card technology for access control, one could be forgiven for assuming we are all using biometrics or mobile credentials for all our physical and digital access requirements.

Read more...
AI-powered classification across large areas
Axis Communications SA Surveillance Products & Solutions AI & Data Analytics
Axis Communications announced the upcoming launch of two innovative radars. Each device delivers a 180° or 270° horizontal field of detection, with accurate AI-powered classification across large areas, 24/7, in all weather and lighting conditions.

Read more...
Unified, AI-powered security platform
Suprema neaMetrics Access Control & Identity Management Surveillance Products & Solutions
Suprema recently announced the launch of BioStar X, its advanced unified security platform. BioStar X unifies biometric access control and video surveillance into a single, scalable platform.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Five key technology trends for the security sector in 2026
Axis Communications SA News & Events Surveillance
Axis Communications examines trends it considers important for 2026, as technology and customer requirements continue to evolve, but the basic security needs of end users remain constant.

Read more...
Securing a South African healthcare network
Surveillance Healthcare (Industry) AI & Data Analytics
VIVOTEK partnered with local integrator Chase Networks and distributor Rectron to deliver a fully integrated security ecosystem, providing PathCare with a centralised view of all facilities, simplifying monitoring of sensitive laboratory areas, and ensuring SOP compliance.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.