Give your pixels a job description

October 2011 News & Events

Following on last month’s comment on gigapixel, Niall Beazley from Vision Catcher replied with the following (the e-mail has been shortened):

“I smiled when I saw your editorial comment on the growing interest in pixel densities and what can be done. Truly amazing technologies, however, not all technologies are the same and it is very important that the client understands what he really wants. As per previous articles, Rob Anderson’s comments on ‘give a camera a job description’ is the first question that needs to be asked.

“As a matter of fact, the use of gigapixel wide area surveillance and gigapixel photography is fine if there is complete continuity of coverage of the area being viewed.

“The vote for the use of a gigapixel offering is purely relevant to the requirement and the frame rate employed. Normally any object or person needing identification within the field of view (FOV) cannot move quickly enough to get through the FOV within the frame rate even if it is at two or three seconds per frame, and is therefore captured and probably identified. It should be noted that the larger megapixel cameras offered within the security environment provide frame rates as follows; current 10 MP offer up to 6 fps and the 16 MP up to 3 fps. The illustrious new entry to the market, Arecont’s 20 MP surround view panoramic 180 or 360 camera provides the highest frame rate for its class at over 11 fps. The key to this relevancy of requirement, is that in a cash counting scenario a frame rate of anything less than real time, 25-30 fps, will be insufficient and therefore a gigapixel offering a complete waste of time.

“I suspect that some of the images shown on the various websites are taken using scanning techniques or with multiple cameras to stitch together an overview image that is compelling and impressive. In the first scenario, if the camera is moved to a new field of view and the images stitched together then by virtue of the camera moving information must be lost as per PTZ footage. The second scenario would provide full coverage and continuous live/recorded footage, however the cost of implementation might well be prohibitive to the whole concept.

“What is clear is that there are some amazing technologies available. Understanding how to apply these technologies and what the end result might be are as important as giving the camera its job description and setting it up to do the job it is required for. This will result in a happy client and recorded footage admissible in a court of law and therefore capable of telling the real story.”

Social media

Did you know Hi-Tech Security Solutions now has its own Facebook page? You can find us at https://www.facebook.com/pages/Hi-Tech-Security-Solutions/246894392008979 - why it is so complicated is another matter. Or you can just search for us. Feel free to keep up with the latest happenings and post your own views. And in case you did not know, we are also on Twitter (@HiTechSecurity_).

Andrew Seldon



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
The global generative AI market surpassed $130 billion in 2024
News & Events AI & Data Analytics
According to a new research report from the IoT analyst firm, Berg Insight, the Generative AI (GenAI) market grew substantially in 2024, experiencing triple-digit growth rates in all three major segments: GenAI hardware, foundation models, and development platforms.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
ProtecLink 2025: Ithegi Electronics supports a safer, smarter security ecosystem
News & Events
If you are a security buyer, operations lead, or technology partner, do not miss ProtecLink 2025, to be held in Polokwane on 16 September 2025, at the Polokwane Royal Hotel.

Read more...
Directory of suppliers
Technews Publishing SMART Security Solutions Fire & Safety
The Directory of Product and Solution Suppliers for the fire safety industry includes details of companies that provide security and risk mitigation products, advice, and services within this market.

Read more...
Fire safety in commercial kitchens
Technews Publishing Kestrel Distribution Products & Solutions Fire & Safety Commercial (Industry)
Fire safety in commercial kitchens is becoming increasingly critical. Defender is Europe’s first EN 17446:2021-approved kitchen hood fire suppression system and offers the indispensable safety measures required.

Read more...
IZI Group acquires G4S Cash Solutions South Africa
News & Events
IZI Africa, a sister company within the IZI Group, has acquired G4S Cash Solutions (SA) following the receipt of all necessary regulatory approvals. This transaction marks a significant consolidation in the South African cash handling industry.

Read more...
Secutel maintains ISO certifications
News & Events Fire & Safety
Secutel Technologies has successfully recertified all four of its ISO standards, a reflection of its continued commitment to excellence, client trust, and operational integrity.

Read more...
SABRIC appoints Andre Wentzel as interim CEO
News & Events Financial (Industry) Associations
The South African Banking Risk Information Centre (SABRIC) has announced the appointment of Andre Wentzel as interim chief executive officer, effective immediately.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.