Computer-based intruder detection

October 2003 Surveillance

You are having a romantic supper with your partner at your favourite restaurant when you receive an SMS on your cellphone: ‘Camera 4 – patio – motion detected.’ You know that for motion to be detected on this camera the trigger object has to be taller than 1 m, so the staffie is out of the question. You dial your home base from your cellphone and on connection browse to Camera 4 using the RemoteView facility on your cellphone.

And there you see it ... a person staring through the lounge window to observe what could be stolen, planning his moves before breaking in.

Whilst you watch the armed response suddenly appear on the scene - they also got a telephonic message that there was an intruder at your house, clearly stating the address and the area in question. They arrest the intruder and you finish your supper with coffee and cognac.

Is this a scene from '1984' by George Orwell with Big Brother playing its part? No, this is modern reality and happens every day. It is another example of how the conversion of modern technology (in this case motion detection driven by a computer-based digital surveillance system with GSM and SMS technology) can assist in intruder detection and asset protection.

How is this possible? The person has not entered your house yet and therefore could not be picked up by the sensors that are normally used to detect intrusion by traditional house alarm systems.

In this case a computer-based surveillance system was programmed using a 'mask' for motion detection, set up in such a manner as to ensure that only a human could trigger the pre-set condition. This means that it can 'see' through the window and detect any motion within its range. The system picks up motion by constantly comparing the current picture with the previous one, and if a certain percentage of the pixels (individual building blocks of a digital image) are different from the previous one, a set of predetermined events is triggered.

These could include:

* A voice ordering the person to leave the property immediately.

* Lights and other appliances being switched on.

* Telephone calls giving specific details to the armed response company.

* Alarms being triggered.

* SMS or a call to a cellular telephone.

Remote monitoring

Whilst this is happening, the owner may, from any remote location using a device such as a cellular phone, laptop or computer, view current events, play back historic data and obviously take appropriate action. The remote viewer can even save the images on the remote device if he is concerned that the system holding the historical images may be stolen before assistance may arrive.

Most security systems are used to prevent or detect intrusion. Benign detection may be where one needs to record an entry to a secured space. This could be as innocent as an authorised person entering an automated boom gate using an access card or by his vehicle licence plate being recognised by a system that records the images as well as time and date of entry for record purposes.

Malicious detection could be where a person breaches a security structure with bad intentions, as described above.

GIGO implies 'specify robustly'

The concept of 'garbage in garbage out' is more important when dealing with digital surveillance. The quality of the cameras used is of the utmost importance. As there is no degradation on digital images, evident on tape-based analog equipment, only cameras that fulfil the exact requirements should be installed. TV lines of 420 and up and the correct light intensity factors are of the utmost importance. Fortunately there are some sophisticated computer-based programs available that will guide the installer through the process of selecting the exact camera equipment suitable for any set of circumstances.

This was clearly demonstrated recently in a much-published case of an armed robbery at a department store where the suspects were captured after digital recorded images provided poster quality images of the intruders. This was achieved by using high quality cameras correctly configured and positioned to do the job at hand.

Structures such as fences, walls, electric fences, electric gates, booms, security check points, etc, are designed to prevent malicious entry. Once inside the secured area, beams, sensors and cameras are designed to detect and warn about an unlawful breach. These devices may trigger a variety of actions and each is designed for a specific purpose - the ultimate is to warn early enough as to prevent any danger to assets and lives, thus before the main structure is breached.

IT in the driving seat

The more processing power available to the device, the more advanced the reaction, as one needs processing power to drive the various devices described above. This creates a strong case for computer-based surveillance equipment as these can more easily access the standard communications devices that we have grown so accustomed to over the last decade - including the Internet, cellphones and SMS technology. It can also allow the user to dial in using the above to view from anywhere in the world what is actually happening and arrange appropriate action.

But intrusions may also include intrusion and violation of privacy. Who last opened the safe, because some important documents are nowhere to be found? What did the child minder do whilst we were at the movies last night? Where did that investigation docket go and who was the last to remove it from the central files? Who entered the hostel and was not supposed to and who allowed them entrance?

Security as a management tool

Modern surveillance technology has all the potential to be used as a management tool, allowing a supervisor to at any given time from his office computer observe all the various manufacturing processes that he is responsible for. Or the owner of a hairdressing salon using a system to ensure quality on work delivered. Or by a law enforcement agency to refute a claim of unlawful usage of force by a crime suspect. Or by a haulage company to ensure that cargo is safely delivered.

It may also be used to augment the services provided by a security company as an extension to guards and a trigger to armed response. In this case the camera will detect breaches of the perimeter as they take place and immediately inform the guard in the guardhouse whilst switching on alarms and spotlights and calling armed response.

Digital surveillance technology is just another building block to help us win the fight against unlawful intrusions. With computer speed and processing powers doubling roughly every nine months, who knows what the future holds?

Perhaps George Orwell was not all that far out in 1949 when he wrote his epic novel that gave the world Big Brother. And perhaps he will turn in his grave if he should know what reality television has done to his ideas.

For more information contact, Jan Botha, GeoVision SA, 012 664 0411, [email protected], www.cuts.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Hikvision launches AcuSeek NVR
Surveillance Products & Solutions AI & Data Analytics
By integrating natural language interaction, Hikvision’s AcuSeek NVR enables precise video and image retrieval within seconds, marking a transformative milestone for the security industry's advance into intelligent and efficient applications.

Read more...
2025 video surveillance market set for improved fortunes
News & Events Surveillance
Novaira Insights has unveiled its latest report, World Market for Video Surveillance Hardware and Software – 2025 Edition, forecasting a healthy growth rate of 8,1% until 2029, excluding China.

Read more...
Dallmeier and Hexagon form a technology partnership
Surveillance
Dallmeier and Hexagon have agreed to form a technology partnership, which will see the two companies combine their expertise to develop integrated security solutions for various application areas, particularly critical infrastructures.

Read more...
Analyse, automate, and optimise logistics processes
neaMetrics Surveillance Transport (Industry) Products & Solutions Logistics (Industry)
In today’s rapidly evolving logistics sector, the pressure to improve process efficiency, optimise resource usage, and ensure seamless security is more intense than ever. Smart, proactive surveillance is no longer a luxury — it is a critical operational necessity.

Read more...
Safer spaces through smart surveillance
NEC XON Surveillance
Advances in facial recognition technology are transforming surveillance from a mere recording tool into an intelligent, integrated system that enhances real-time safety, moving beyond the traditional expansion of CCTV efforts.

Read more...
Next generation of AI-powered video telematics
IoT & Automation Surveillance Transport (Industry)
Webfleet, Bridgestone’s fleet management solution in South Africa, has launched Webfleet Video 2.0, an AI-powered solution designed to enhance fleet safety, security, compliance with local regulations and operational efficiency through real-time video insights.

Read more...
Key design considerations for a control room
Leaderware Editor's Choice Surveillance Training & Education
If you are designing or upgrading a control room, or even reviewing or auditing an existing control room, there are a number of design factors that one would need to consider.

Read more...
Smart cities and the role of video security
Surveillance Integrated Solutions
As cities around the world continue to embrace smart technology, including IoT that not only connects to people, but also the surrounding activity, the integration of advanced video security systems is crucial to ensure safety and efficiency in environments.

Read more...
How intrusion protection helps secure O&G operations
Surveillance Perimeter Security, Alarms & Intruder Detection Industrial (Industry)
For O&G operators in Africa, physical security remains one of the biggest considerations, particularly when it comes to perimeter protection and the ability to mitigate intruder-related incidents.

Read more...
Axis secures the Waterfront
Surveillance Entertainment and Hospitality (Industry) Retail (Industry)
Axis Communications shares insight into its longstanding partnership with the V&A Waterfront, one of Africa’s premier retail and mixed-use precincts, through its latest, updated customer success story.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.