Video analysis from the ­user’s point of view

May 2013 Surveillance

Recent years have seen a massive development in different kinds of video analysis algorithms which have been marketed with lots of optimistic promises. Many have been attempts to exploit algorithms created in a lab or university or research institute, by out-sourcing their development into products for use in video security systems. What looked promising in the lab, was often of only limited use in practice, particularly outdoors. Many suppliers and users have learned to their cost that marketing claims and presentations which raise expectations are not always met in reality.

Katharina Geutebrück
Katharina Geutebrück

Most video security systems used today to verify critical situations or alarms need a trigger, a message to the system and the user that something undesirable is happening. This information can come from a third-party system or from the system itself analysing the video streams from cameras.

Basic processes

In video analysis (also known as video content analysis, VCA) there are two different basic processes: motion detection and pattern recognition. Motion detection requires a constant stream of video data to analyse. Depending on the algorithm this can range from very simple (activity detection: ‘something moved!’) to really complex (Loitering: ‘There is someone in the scene who has been moving aimlessly back and forth for xx minutes’). In principle, pattern recognition is also possible with just one picture or photo. In the video security it is used to refine results from motion detection analysis by recognising a sign or text (eg, ANPR) or by comparing pictures with a predetermined pattern (eg facial recognition).

Examples of usage

Nowadays many different algorithms are offered for all sorts of applications, for security as well as business purposes. Nowadays it is not uncommon to find video systems in combined applications. Here are some examples:

Sabotage protection: monitors the contrast levels of the camera (for alerting to cloaking or lighting failure) and the viewing angle (for alerting to tampering).

Perimeter protection: detects moving objects or people in a so-called ‘sterile zone’ within the site (usually secured with a fence or wall).

Object identification: differentiates between people, vehicles and other objects, eg, for monitoring car park entrances (entry only permitted for cars, no pedestrians or cyclists), for toll payment at toll plazas etc.

Direction recognition: analyses the direction of movement of an object (eg, for detecting wrong-way drivers or for generating alarms when rail tracks are crossed in a station).

Detection of abandoned objects eg, for detecting unattended luggage (which could possibly contain explosives) in foyers, corridors or halls, for monitoring the access to evacuation routes and for recognising long-term parking violations in short-term zones (eg, loading and unloading at airports).

Detection of missing objects eg, for securing fine art exhibits or valuable goods shipments in logistic centres.

Number plate recognition: automatic reading of vehicle number plates eg, for access control, for collecting toll charges or for the statistical recording of visitors to an establishment (eg, in a zoo or shopping centre car park).

Facial recognition: automatic comparison with previously recorded photo in connection with access control systems or also with a database of known faces (eg, for identifying people who are banned from the establishment or VIP guests in a casino).

Traffic flow analysis: capturing traffic volumes and the separation between vehicles eg, for controlling entry traffic lights to tunnels.

Visitor flow analysis: the counting of visitors which may be combined with the mapping of their routes in an establishment (eg, for planning the arrangement of goods in a supermarket).

Smoke/fire detection: for reporting fire in open areas or tunnels.

Selection criteria

Experience reveals that no single algorithm is suitable for all these tasks. So a field test or a comparable reference has to be an important selection tool. Particularly with outdoor applications there are always difficulties in use because of changing weather conditions, hours of sunshine, the seasons etc.

In selecting a suitable process two performance indicators need to be considered: falsely detected situations (false positives), and not recognised detection situations (false negatives). In the first case, alarms (events, etc,) are reported although there is no real alarm situation (event situation, etc). Although there is no acute security risk, with time, the operator’s trust in the system dwindles. Alarms are no longer taken so seriously and a real alarm can easily be overlooked or ignored. The criticality of the second case is very much dependent on the application. How important is an event which is not recognised as a detection event?

Since these two indicators usually work against each other in opposite directions, the improvement of one indicator is nearly always to the detriment of the other. Therefore, before selecting a system it is imperative to define the protection aims very precisely.

Special issues

Thermal imaging cameras

It is increasingly common to use thermal imaging cameras in combination with video analysis in outdoor environments. Thermal imaging cameras provide images showing the contrasting temperatures in a scene, rather than the differences in brightness shown by conventional video cameras. With conventional cameras, the video analysis process can be significantly influenced by light reflections and shadows. At night the scene has to be adequately lit, and in bad weather the view can be so severely impeded by snow or fog that the function of the video analysis algorithm is extremely limited.

The use of thermal imaging cameras in this kind of situation can offer distinct advantages since they do not require any additional illumination and yet can still make a clear distinction between light and shade contrasts for ‘normal’ moving objects (people, vehicles, animals, etc,) in an image. Additionally they also offer the advantage that there is no lighting to attract insects and interfere with the detection accuracy. This technology is however not suitable for identifying people or objects as neither facial features nor details are adequately reproduced. And because of this, it is often used together with conventional pan and tilt cameras and appropriate lighting.

When these thermal imaging cameras are used for event detection, the conventional P&T cameras are controlled from the centralised system and moved to the right position for the user to see the event displayed in ‘normal’ format.

3D

3D is not just a consumer electronics trend. In video surveillance technology 3D is also an increasingly frequent discussion topic. Its precise meaning is however very variable depending on the supplier and the components. In the video analysis field the term 3D is often used if the system is able to correct for perspective bias – even though a two-dimensional image is being processed. And the term 3D also comes up in relation to the operation of systems using graphical site plans. ‘Real 3D’ ie, image capture using a camera with two lenses and image sensors is not common in video surveillance. However, it is conceivable that in years to come such cameras will be developed and used, as they could provide additional benefits for video analysis processes.

Combined and other camera systems

One further trend evident in the market at the moment are cameras fitted with several lenses. A variant with up to four image sensors and lenses which provide a 180-degree or 360-degree panoramic view from one location is already widely used. This saves cabling and installation costs. A similar purpose is served by cameras with fish-eye lenses whose images are straightened out for display using special software algorithms. Having only one image sensor and one lens, this makes for a more cost-effective solution but the image resolution and light sensitivity is lower.

One newcomer to the market is a variant, which covers one viewing direction with lenses of different focal lengths to provide both overviews and high resolution detailed images of the same scene. Another option is a single pan and tilt camera system which combines a thermal imaging camera with a conventional camera.

For more information contact Geutebrück, +27 (0)11 867 6585, [email protected], www.geutebrueck.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Get the AI fundamentals right
Technews Publishing SMART Security Solutions Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
LiDAR protects railways from new and existing dangers
Surveillance
3D LiDAR (Light Detection and Ranging) sensors are being installed to monitor rail traffic and ensure safety of passengers as well as individuals walking near the tracks, or trying to perform dangerous stunts for social media.

Read more...
Securing South Africa’s logistics sector
Secutel Technologies Products & Solutions Surveillance Logistics (Industry)
Unlike traditional guarding services, Visual Verifier operates on an ‘Always On’ principle, ensuring continuous 24/7 coverage of warehouses, depots, transit hubs, and delivery points.

Read more...
Unlock the future of security operations in Bloemfontein
DeepAlert News & Events Surveillance
Security professionals and business leaders are invited to revolutionise their offsite monitoring operations at the DeepAlert Product Road Show, taking place on 16 – 17 September 2025, at the Schoemanspark Golf Club, Bloemfontein.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
Secure, modernise and optimise CCTV
Surveillance Products & Solutions
Industrial and commercial organisations are navigating complex digital transformation processes. With SecuVue, companies can bridge the gap between operational technology and information technology for safer, smarter operations.

Read more...
Eagle Eye Precision Person & Vehicle Detection
Surveillance Products & Solutions AI & Data Analytics
Eagle Eye’s new Precision Person & Vehicle Detection feature detects people and vehicles at long distances with high accuracy and is especially designed for customers who actively monitor for intruders

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.