Intelligent video surveillance and GIS

February 2009 Surveillance

IVS (intelligent video surveillance) is a state-of-the-art technology for use in security environments allowing users to easily monitor and secure areas with security cameras. Places of interest can easily be monitored with sophisticated software that makes detecting threats or unwanted visitors simple and effective.

IVS consists of algorithms that detect movement or changes in live and recorded video to see whether a possible threat is about to occur, is occurring or has occurred.

These algorithms work by examining each pixel of the video and putting together all the pixel changes which then depicts motion or detection. Depending on the policies and alerts you have setup, you will be notified of this motion/detection; actions can be automatically taken by the software eg, tracking the motion until it is no longer detected.

Some of the benefits of IVS

Realtime video monitoring: IVS software can display live video in realtime and alert users according to customised security policies.

Improves quality of surveillance: With IVS software you have the ability to be notified immediately when unusual activity is detected, 24 hours a day, 7 days a week.

Accurate detection: IVS software has the ability to detect specific behaviours, eg, if someone is where they should not be, you will be warned – indoors, outdoors and even in low light situations.

Force multiplier: IVS software can be integrated with existing CCTV/analogue systems or implemented with new state- of-the-art IP network cameras. There is no need to replace existing investment in infrastructure. IVS becomes a force multiplier when added to any existing camera network.

Optimise labour costs: Due to the IVS software handling all alerts from possible threats, less personnel is needed to view video and can be redeployed to pro-actively assist in providing supportive security services. With standard video systems, someone must always be watching for threats or abnormal behaviour, but with the IVS software watching for you, more video can be watched by fewer people. Video no longer needs to be watched live by a person 24/7. This decreases labour costs at the control centre and increases productivity.

Video analytics form an important component of IVS

Effectively manage realtime CCTV video: Video analytics allow you to effectively manage multiple cameras within a CCTV system. Some large surveillance installations require that multiple CCTV cameras are watched by just one or two security personnel. This can cause issues as each camera is not being effectively monitored. Video analytics provides the capability to only push video to monitors when an actual event occurs or when a specific alarm is triggered. This means the video analytics software is watching the cameras for you and only notifies you when some type of action needs to be taken.

CCTV system intelligent motion detection: Video analytics also gives you the capability of advanced motion detection in your CCTV system. When a camera within the CCTV system detects motion within a specific area of the video, it will automatically trigger an alarm. Video analytics offers higher reliability than standard motion detection. Video analytics software is based on various algorithms that will analyse the video to determine the type of motion. This means your CCTV system will only look for true motion of a moving person or vehicle instead of eg, swaying trees and bushes.

Licence plate/vehicle type recognition: The software allows the cameras to detect and determine vehicle type and licence plates which can then be integrated in the system for tolls, behaviour monitoring, anti-crime operations etc.

Object recognition: One can also monitor video footage for missing or unwanted objects. Objects that have been left behind (like a bag) can be detected when the video from a CCTV camera displays an object not part of the normal video scene. Video analytics can also do the reverse. When a camera within your CCTV system has a change in the video scene that shows that an object is missing an alarm can be triggered.

Security access points: Video analytics can determine the behaviour of people outside an access point. This can include loitering, studying of the security cameras or even tailgating. One can therefore better monitor traffic around security access points. Alarms can be set that will trigger when people within the CCTV cameras view are acting strangely or entering an area they are not permitted.

Advanced systems are able to detect anomalous situations by analysing inputs from multiple sensors, including cameras, fence intrusion systems, and radar systems and ensures a policy based response to threatening conditions. These systems combine GIS, advanced video analytics, and robust and open systems architecture to maximise system effectiveness and interoperation with third party cameras, CCTV systems, intrusion sensors, access control and alarm management systems.

In terms of integration, software algorithms are combined with initial sensor feedback to both decrease false alarms and increase the confidence level of a specific event. For example, a fence integration will consist of a fence sending an alarm of an event to the IVS system. Before setting a general alarm, the system will redirect a camera to the point of intrusion and apply analytics. Perhaps executing an algorithm to verify that the intrusion is a person, versus an animal or vegetation. After validating that fence event, the system can now perform the alarming function.

Integration with GIS provides many innovative features not found in other intelligent video systems. Combined with a flexible open architecture these features include:

* Geographic map-based command and control user interfaces that provide enhanced situational awareness, and automates PTZ camera steering tasks.

* Wide-area surveillance and perimeter intrusion detection: When integrated with perimeter intrusion systems one can provide automated video corroboration of intrusion events without using camera presets, which reduces cost and increases flexibility.

* Advanced scene analysis turns cameras into object detection and tracking sensors. Objects, once detected and reported in the database, become full geo-objects, ready for manipulation within a GIS environment.

* Point-and-click interfaces that control multiple PTZ cameras simultaneously through interaction with both maps and video images.

* Automated policy-based detection rules and alarm notification ensures that the proper responses are carried out for any given type of alarm. And because every alarm triggered is a geo-object, all typical GIS related response mechanisms can be utilised.

Automated wide area surveillance systems – technical detail

Advanced systems also provide automated wide area surveillance capabilities that provide complete solutions for digital surveillance of remote sites and large outdoor environments. Distributed computing architectures utilise TCP/IP networking to provide maximum flexibility for component deployment. While the security industry has invested a lot of effort into migrating CCTV systems onto digital platforms to ease the burden of managing the volume of video data, almost no attention has been paid to the ergonomics of operators interacting with digital video systems and PTZ cameras.

This deficiency can be addressed by utilising camera control technologies to make operators more efficient by automating PTZ camera steering, making it easier for operators to interact with the cameras, and providing them with truly useful feedback about where each camera is looking. This feedback is portrayed directly onto either a 2D or 3D GIS display.

Advanced systems will be able to directly interface with the majority of PTZ cameras and matrix switches on the market. It is also able to utilise feedback from PTZ cameras to provide realtime positional information feedback to operators on a GIS display, dramatically enhancing situational awareness for operators that are not intimately familiar with the environment being monitored. This allows users to see on a map, in realtime, which direction a PTZ camera is pointing and to simultaneously steer multiple cameras to view a location by clicking on any location on a map, instead of using a joystick.

Intelligent video

Advanced systems have video analytics that permit reliable alarming based on object detection and tracking, all designed to eliminate or reduce the false and nuisance alarms traditionally associated with intelligent video systems. A common source of false alarms when performing motion and object detection is the motion of the camera itself, either under the control of an operator, or due to wind, weather or vibrations. Pole mounted cameras are particularly prone to low frequency, high amplitude oscillations in even moderate winds or vibration effects, and this can wreak havoc with intelligent video systems.

To overcome this problem, the usual solution is to use expensive hardware video stabilisers, or to reinforce the camera mounting, which is also an expensive proposition. More advanced systems solve this problem by stabilising video images in software, which is a unique capability among leading vendors of intelligent video systems. This allows video analytics software to function even in the presence of significant camera motion or vibration.

Video analytics are able to classify and track an object based on size (animal, human, car, truck, etc), speed (slow moving, fast moving), shape, and direction of movement in changing lighting conditions (overcast, moving clouds, night), and alarms can be raised based on upper and lower thresholds for any of these attributes.

Realtime object detection alarm

Behaviours: These systems also have the ability to classify objects in relationship to environmentally changing backgrounds and then track those objects within video space. This functionality results in the ability to identify typical security behaviours or situations: detecting stopped vehicles, human/vehicle piggybacking, crowd detection, left-behind or removed objects, etc.

Geo-referencing tracked objects: The advanced systems that are integrated with GIS is capable of converting the positions of objects or events tracked through video analytics into geographical latitude and longitude coordinates, which can then be displayed as an icon on a GIS map. Through the use of advanced camera control capabilities and user interface, an operator can then click on the icon on the map to steer one or more PTZ cameras to the object’s location automatically.

Realtime object detection and tracking

Emergency/crime response: A command and control user interface which leverage GIS technology can be used in emergency/crime response to locate intruders and response vehicles and personnel on the geographic map as well. This enables security personnel to orchestrate a coordinated response. From the central command centre, security personnel get a bird’s eye view of the situation, they are able to visually locate both the perpetrator and the response vehicles. They can steer cameras to critical locations simply by clicking on the map or the system can automatically steer the cameras based on any geographic coordinate on the map from GPS or other sensor inputs. Response officers can transmit an alarm with their GPS position from any GPS transmitting device and these systems can automatically steer the camera to this location. This can greatly increase the safety of the response team and aid in orchestrating a successful response.

Remote access to video and alarms: Native support for PocketPC based PDAs also exist to receive alarms, view live video, control PTZ cameras, and provide alarm acknowledgments. Advanced PTZ camera control capabilities (point-and-click, drag-to-zoom) are also available through the PDA software, and the operator can dynamically adjust video stream frame rate and quality to suit the available network bandwidth.

Forensic search: Digital storage of video provides for seamless searching of video through forensic analysis or date-time queries for each camera, whether the video is stored locally or centrally. Advanced searches allow a user to add forensic analysis capabilities to the query, such as looking for motion or objects in certain parts of the camera’s field of view, or looking for objects that meet certain size, speed, or directional criteria. An example may be searching for movement within a keep out zone.

Edge device – managed bandwidth

In South Africa bandwidth is always an issue. One can overcome the problem by using an edge device that operates within the wide-area surveillance system, which monitors, detects and reports on multiple types of threats. The edge device can also act as a standalone remote sensor, detecting and reporting threats or seamlessly integrating into your current enterprise surveillance solution. These devices can be used as input logic for smart threat detection or can be activated by the central control room system based on the identification of a threat. When integrated into your enterprise surveillance system, the edge device lets the system scale video much more affordably. Offloading image processing allows your network video server to receive a higher number of inputs-helping you save money. The edge server also removes the need to stream video all the time, and therefore requires less network bandwidth and less storage. The edge device can be programmed to store information until such time that it is requested, or continuously send information. It may also be programmed to only send text information, jpeg alarm images, video clips of events, or full frame rate video. It is like having your own personal security guard on duty out in the wilds, 24/7, never sleeping.

Potential benefits to critical facilities

To illustrate a few of the powerful capabilities and resulting benefits that these geo-referenced IVS solutions can provide to a critical facility, consider the following scenarios.

Scenario A: A thief is crawling towards the facility in an attempt to enter illegally. The system will monitor for changes in the background and identify objects which are anomalous or changing over time, while filtering out changes due to lighting and environmental conditions. When conditions are met, the appropriate security protocol will be initiated.

Scenario B: A gang has cut through a critical facility’s chain link perimeter fence with the intention of sneaking into the facility. The system will detect a person(s) cutting through or climbing over a facility’s perimeter fence. When integrated with fence detection sensors, the system can automatically command multiple cameras to the point of intrusion. When this happens, an alarm will notify security personnel and the system will display a map with the exact location of the intrusion while continuing to track, identify and record the suspects. Further, such a system also allows operators to control cameras using a point-and-click interface, allowing them to fully understand the situation before implementing an emergency response.

Scenario C: A truck containing hazardous material departs the facility in several hours. As a security precaution, the facility has declared that the truck cannot be accessed by anyone until just prior to departing the facility. Using the visual interface feature, an operator can draw a virtual perimeter zone around the vehicle. If a person crosses that region during this monitoring period, the system will alarm, notify security and track the offending person or object.

Scenario D: A criminal steals an employee’s access card, allowing them to gain entry to the facility’s unauthorised zones. The system can be integrated with a facility’s card access system, wherein every time a facility employee scans his/her access card, the system provides security personnel with a comparison of a live image of the person against an archived still image. Alternatively, the system can be integrated with a facial recognition system that will automatically verify the individual entering the facility against an archived database of faces.

For more information contact African Astronautics, +27 (0)12 460 7534, [email protected], www.afrinautics.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Empowering cities with intelligent security solutions
Secutel Technologies Surveillance IoT & Automation
By leveraging advanced AI analytics, real-time data collection, and seamless integration capabilities, cities can address pressing security challenges and create a safer environment for residents.

Read more...
Re-imagining business operations with the power of AI
AI & Data Analytics Surveillance
inq., a Convergence Partners company, has introduced a range of artificial intelligence (AI) solutions to assist organisations across industry verticals in optimising business operations and improving internal efficiencies.

Read more...
Eight MP dome for harsh environments
Axis Communications SA Surveillance Products & Solutions
Axis Communications announced a marine-grade stainless steel camera that offers performance in harsh environments. Enclosed in an electropolished stainless steel casing, it can withstand the corrosive effects of seawater and cleaning chemicals.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
Advanced security solution for high-risk areas
Secutel Technologies Surveillance Integrated Solutions
The need for a sophisticated intrusion detection system is paramount when faced with persistent security challenges, particularly in isolated battery rooms or high-risk areas prone to vandalism, cable theft, and battery theft.

Read more...
Hikvision’s top seven trends for the security industry in 2024
Hikvision South Africa News & Events Surveillance AI & Data Analytics
As we embrace technological innovation, and adapt to evolving societal needs, we are witnessing the convergence of advanced technologies like artificial intelligence (AI), the Internet of Things (IoT), and big data.

Read more...
inq. SA unveils AI, IoT solutions for the digital age
AI & Data Analytics Surveillance
inq. has announced the launch of an extensive Edge Artificial Intelligence (AI), Internet of Things (IoT), and the Edgedock data insights value proposition to transform business operations across various sectors.

Read more...
ONVIF releases first add-on for secure communications
Surveillance Training & Education
ONVIF has released the final version of the TLS Configuration add-on to increase the security of communications between devices and software clients within a physical security system.

Read more...
2024 Trends in Video Surveillance report
Surveillance AI & Data Analytics
AI in video surveillance tops Eagle Eye Networks 2024 trends report; this year’s list also includes affordable professional video monitoring, workplace security upgrades, licence-plate recognition for HOAs, and sustainable security.

Read more...