Computer-based intruder detection

October 2003 CCTV, Surveillance & Remote Monitoring

You are having a romantic supper with your partner at your favourite restaurant when you receive an SMS on your cellphone: ‘Camera 4 – patio – motion detected.’ You know that for motion to be detected on this camera the trigger object has to be taller than 1 m, so the staffie is out of the question. You dial your home base from your cellphone and on connection browse to Camera 4 using the RemoteView facility on your cellphone.

And there you see it ... a person staring through the lounge window to observe what could be stolen, planning his moves before breaking in.

Whilst you watch the armed response suddenly appear on the scene - they also got a telephonic message that there was an intruder at your house, clearly stating the address and the area in question. They arrest the intruder and you finish your supper with coffee and cognac.

Is this a scene from '1984' by George Orwell with Big Brother playing its part? No, this is modern reality and happens every day. It is another example of how the conversion of modern technology (in this case motion detection driven by a computer-based digital surveillance system with GSM and SMS technology) can assist in intruder detection and asset protection.

How is this possible? The person has not entered your house yet and therefore could not be picked up by the sensors that are normally used to detect intrusion by traditional house alarm systems.

In this case a computer-based surveillance system was programmed using a 'mask' for motion detection, set up in such a manner as to ensure that only a human could trigger the pre-set condition. This means that it can 'see' through the window and detect any motion within its range. The system picks up motion by constantly comparing the current picture with the previous one, and if a certain percentage of the pixels (individual building blocks of a digital image) are different from the previous one, a set of predetermined events is triggered.

These could include:

* A voice ordering the person to leave the property immediately.

* Lights and other appliances being switched on.

* Telephone calls giving specific details to the armed response company.

* Alarms being triggered.

* SMS or a call to a cellular telephone.

Remote monitoring

Whilst this is happening, the owner may, from any remote location using a device such as a cellular phone, laptop or computer, view current events, play back historic data and obviously take appropriate action. The remote viewer can even save the images on the remote device if he is concerned that the system holding the historical images may be stolen before assistance may arrive.

Most security systems are used to prevent or detect intrusion. Benign detection may be where one needs to record an entry to a secured space. This could be as innocent as an authorised person entering an automated boom gate using an access card or by his vehicle licence plate being recognised by a system that records the images as well as time and date of entry for record purposes.

Malicious detection could be where a person breaches a security structure with bad intentions, as described above.

GIGO implies 'specify robustly'

The concept of 'garbage in garbage out' is more important when dealing with digital surveillance. The quality of the cameras used is of the utmost importance. As there is no degradation on digital images, evident on tape-based analog equipment, only cameras that fulfil the exact requirements should be installed. TV lines of 420 and up and the correct light intensity factors are of the utmost importance. Fortunately there are some sophisticated computer-based programs available that will guide the installer through the process of selecting the exact camera equipment suitable for any set of circumstances.

This was clearly demonstrated recently in a much-published case of an armed robbery at a department store where the suspects were captured after digital recorded images provided poster quality images of the intruders. This was achieved by using high quality cameras correctly configured and positioned to do the job at hand.

Structures such as fences, walls, electric fences, electric gates, booms, security check points, etc, are designed to prevent malicious entry. Once inside the secured area, beams, sensors and cameras are designed to detect and warn about an unlawful breach. These devices may trigger a variety of actions and each is designed for a specific purpose - the ultimate is to warn early enough as to prevent any danger to assets and lives, thus before the main structure is breached.

IT in the driving seat

The more processing power available to the device, the more advanced the reaction, as one needs processing power to drive the various devices described above. This creates a strong case for computer-based surveillance equipment as these can more easily access the standard communications devices that we have grown so accustomed to over the last decade - including the Internet, cellphones and SMS technology. It can also allow the user to dial in using the above to view from anywhere in the world what is actually happening and arrange appropriate action.

But intrusions may also include intrusion and violation of privacy. Who last opened the safe, because some important documents are nowhere to be found? What did the child minder do whilst we were at the movies last night? Where did that investigation docket go and who was the last to remove it from the central files? Who entered the hostel and was not supposed to and who allowed them entrance?

Security as a management tool

Modern surveillance technology has all the potential to be used as a management tool, allowing a supervisor to at any given time from his office computer observe all the various manufacturing processes that he is responsible for. Or the owner of a hairdressing salon using a system to ensure quality on work delivered. Or by a law enforcement agency to refute a claim of unlawful usage of force by a crime suspect. Or by a haulage company to ensure that cargo is safely delivered.

It may also be used to augment the services provided by a security company as an extension to guards and a trigger to armed response. In this case the camera will detect breaches of the perimeter as they take place and immediately inform the guard in the guardhouse whilst switching on alarms and spotlights and calling armed response.

Digital surveillance technology is just another building block to help us win the fight against unlawful intrusions. With computer speed and processing powers doubling roughly every nine months, who knows what the future holds?

Perhaps George Orwell was not all that far out in 1949 when he wrote his epic novel that gave the world Big Brother. And perhaps he will turn in his grave if he should know what reality television has done to his ideas.

For more information contact, Jan Botha, GeoVision SA, 012 664 0411, janb@cuts.co.za, www.cuts.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Qognify VMS adds support for Pelco IP camera series
CCTV, Surveillance & Remote Monitoring Products
The latest IP camera series from Pelco can now be used with Qognify’s advanced video solution for corporate and enterprise projects, increasing the overall number of camera models and third-party devices supported in Qognify VMS to more than 6 500.

Read more...
VIVOTEK launches VAST Security Station
CCTV, Surveillance & Remote Monitoring Products
VIVOTEK officially launched its AI security system, VAST Security Station (VSS), in March, available to users in three flexible tiers: VSS Lite, VSS Standard, and VSS Professional.

Read more...
Keeping students, staff and communities safe
Vumacam News CCTV, Surveillance & Remote Monitoring Security Services & Risk Management
South African schools are facing increasing security challenges, making effective surveillance systems more important than ever. To address this issue, Vumacam is offering advanced security solutions with security partners, aimed at keeping students, staff, and the community safe.

Read more...
Helping to care for zoo animals
Hikvision South Africa CCTV, Surveillance & Remote Monitoring
Zoo keeps an eye on the safety of animals and visitors through the installation of Hikvision 4 MP turret, 12 MP Fisheye cameras, as well as PTZs, NVRs and central management system.

Read more...
Boosting digital-intelligent transformation and AI applications
Dahua Technology South Africa CCTV, Surveillance & Remote Monitoring Products
2022 has been a year full of development and innovation for Dahua. The company has launched various upgrades to its existing product portfolio as well as an artillery of new products and solutions that address specific needs/problems in society.

Read more...
Arcules and IMMIX announce integration
News CCTV, Surveillance & Remote Monitoring Products
Arcules has announced that its integration with Immix Central Station and Guard Force is available. The integration provides Central Station and Guard Force users a way to manage, verify, and respond to security events, while using Arcules-managed video feeds.

Read more...
Developing an effective CCTV control room culture
Leaderware Editor's Choice CCTV, Surveillance & Remote Monitoring Training & Education
Organisational culture in organisations can be seen as the set of values, practices, focus, standards and behaviours, and ways of interacting with others that are accepted and subscribed to by the people who work there.

Read more...
Eagle Eye Networks releases 2023 Video Surveillance Trends Report
Eagle Eye Networks News CCTV, Surveillance & Remote Monitoring
Eagle Eye Networks has released the 2023 Trends in Video Surveillance ebook, identifying five trends that will have the largest impact on businesses around the globe in 2023.

Read more...
Stainless steel 8 MP dome
Axis Communications SA Products CCTV, Surveillance & Remote Monitoring
Enclosed in marine-grade stainless steel (SS 316L) and DNV-certified, the AXIS Q3538-SLVE can withstand the corrosive effects of seawater and cleaning chemicals.

Read more...
Enhanced image clarity and enriched AI functions
Dahua Technology South Africa CCTV, Surveillance & Remote Monitoring Products
The IPC WizMind S series is equipped with multiple intelligent functions, offers adaptability, and comes in plastic-free packaging, enabling better image performance, promoting environmental sustainability, and providing global clients with smarter vision with a stronger surveillance shield.

Read more...