Computer-based intruder detection

October 2003 Surveillance

You are having a romantic supper with your partner at your favourite restaurant when you receive an SMS on your cellphone: ‘Camera 4 – patio – motion detected.’ You know that for motion to be detected on this camera the trigger object has to be taller than 1 m, so the staffie is out of the question. You dial your home base from your cellphone and on connection browse to Camera 4 using the RemoteView facility on your cellphone.

And there you see it ... a person staring through the lounge window to observe what could be stolen, planning his moves before breaking in.

Whilst you watch the armed response suddenly appear on the scene - they also got a telephonic message that there was an intruder at your house, clearly stating the address and the area in question. They arrest the intruder and you finish your supper with coffee and cognac.

Is this a scene from '1984' by George Orwell with Big Brother playing its part? No, this is modern reality and happens every day. It is another example of how the conversion of modern technology (in this case motion detection driven by a computer-based digital surveillance system with GSM and SMS technology) can assist in intruder detection and asset protection.

How is this possible? The person has not entered your house yet and therefore could not be picked up by the sensors that are normally used to detect intrusion by traditional house alarm systems.

In this case a computer-based surveillance system was programmed using a 'mask' for motion detection, set up in such a manner as to ensure that only a human could trigger the pre-set condition. This means that it can 'see' through the window and detect any motion within its range. The system picks up motion by constantly comparing the current picture with the previous one, and if a certain percentage of the pixels (individual building blocks of a digital image) are different from the previous one, a set of predetermined events is triggered.

These could include:

* A voice ordering the person to leave the property immediately.

* Lights and other appliances being switched on.

* Telephone calls giving specific details to the armed response company.

* Alarms being triggered.

* SMS or a call to a cellular telephone.

Remote monitoring

Whilst this is happening, the owner may, from any remote location using a device such as a cellular phone, laptop or computer, view current events, play back historic data and obviously take appropriate action. The remote viewer can even save the images on the remote device if he is concerned that the system holding the historical images may be stolen before assistance may arrive.

Most security systems are used to prevent or detect intrusion. Benign detection may be where one needs to record an entry to a secured space. This could be as innocent as an authorised person entering an automated boom gate using an access card or by his vehicle licence plate being recognised by a system that records the images as well as time and date of entry for record purposes.

Malicious detection could be where a person breaches a security structure with bad intentions, as described above.

GIGO implies 'specify robustly'

The concept of 'garbage in garbage out' is more important when dealing with digital surveillance. The quality of the cameras used is of the utmost importance. As there is no degradation on digital images, evident on tape-based analog equipment, only cameras that fulfil the exact requirements should be installed. TV lines of 420 and up and the correct light intensity factors are of the utmost importance. Fortunately there are some sophisticated computer-based programs available that will guide the installer through the process of selecting the exact camera equipment suitable for any set of circumstances.

This was clearly demonstrated recently in a much-published case of an armed robbery at a department store where the suspects were captured after digital recorded images provided poster quality images of the intruders. This was achieved by using high quality cameras correctly configured and positioned to do the job at hand.

Structures such as fences, walls, electric fences, electric gates, booms, security check points, etc, are designed to prevent malicious entry. Once inside the secured area, beams, sensors and cameras are designed to detect and warn about an unlawful breach. These devices may trigger a variety of actions and each is designed for a specific purpose - the ultimate is to warn early enough as to prevent any danger to assets and lives, thus before the main structure is breached.

IT in the driving seat

The more processing power available to the device, the more advanced the reaction, as one needs processing power to drive the various devices described above. This creates a strong case for computer-based surveillance equipment as these can more easily access the standard communications devices that we have grown so accustomed to over the last decade - including the Internet, cellphones and SMS technology. It can also allow the user to dial in using the above to view from anywhere in the world what is actually happening and arrange appropriate action.

But intrusions may also include intrusion and violation of privacy. Who last opened the safe, because some important documents are nowhere to be found? What did the child minder do whilst we were at the movies last night? Where did that investigation docket go and who was the last to remove it from the central files? Who entered the hostel and was not supposed to and who allowed them entrance?

Security as a management tool

Modern surveillance technology has all the potential to be used as a management tool, allowing a supervisor to at any given time from his office computer observe all the various manufacturing processes that he is responsible for. Or the owner of a hairdressing salon using a system to ensure quality on work delivered. Or by a law enforcement agency to refute a claim of unlawful usage of force by a crime suspect. Or by a haulage company to ensure that cargo is safely delivered.

It may also be used to augment the services provided by a security company as an extension to guards and a trigger to armed response. In this case the camera will detect breaches of the perimeter as they take place and immediately inform the guard in the guardhouse whilst switching on alarms and spotlights and calling armed response.

Digital surveillance technology is just another building block to help us win the fight against unlawful intrusions. With computer speed and processing powers doubling roughly every nine months, who knows what the future holds?

Perhaps George Orwell was not all that far out in 1949 when he wrote his epic novel that gave the world Big Brother. And perhaps he will turn in his grave if he should know what reality television has done to his ideas.

For more information contact, Jan Botha, GeoVision SA, 012 664 0411, [email protected], www.cuts.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Human-centric control rooms
Iritron Integrated Solutions Surveillance Residential Estate (Industry)
Iritron and Oculus show that when it comes to control rooms, people, not just technology, are at the centre of the most significant performance differentiators today, not just how efficiently the technology works.

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Secure, long-distance thermal from Keenfinity
Products & Solutions Surveillance Residential Estate (Industry)
The DINION thermal 8100i camera is a bullet thermal camera built for mission-critical applications, prioritising long-distance monitoring and reliable perimeter intrusion detection with built-in Intelligent Video Analytics (IVA) Pro Perimeter video analytics.

Read more...
IVA AI Pro Visual Gun Detection
Products & Solutions Surveillance Security Services & Risk Management Residential Estate (Industry)
Bosch has announced the launch of the IVA AI Pro Visual Gun Detection analytics based on deep learning. It is designed for automatic detection and classification of people and brandished firearms.

Read more...
IP-based horn loudspeakers
Products & Solutions Surveillance Security Services & Risk Management Residential Estate (Industry)
Bosch has announced the launch of its new IP-based horn loudspeakers and amplifier module: the high-output LHN-UC15L-SIP horn (for long-throw applications), the compact LHN-UC15W-SIP horn (for wide-angle coverage) and the AMN-P15-SIP amplifier module.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Get the AI fundamentals right
Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
LiDAR protects railways from new and existing dangers
Surveillance
3D LiDAR (Light Detection and Ranging) sensors are being installed to monitor rail traffic and ensure safety of passengers as well as individuals walking near the tracks, or trying to perform dangerous stunts for social media.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.