Intelligent video surveillance and GIS

February 2009 Surveillance

IVS (intelligent video surveillance) is a state-of-the-art technology for use in security environments allowing users to easily monitor and secure areas with security cameras. Places of interest can easily be monitored with sophisticated software that makes detecting threats or unwanted visitors simple and effective.

IVS consists of algorithms that detect movement or changes in live and recorded video to see whether a possible threat is about to occur, is occurring or has occurred.

These algorithms work by examining each pixel of the video and putting together all the pixel changes which then depicts motion or detection. Depending on the policies and alerts you have setup, you will be notified of this motion/detection; actions can be automatically taken by the software eg, tracking the motion until it is no longer detected.

Some of the benefits of IVS

Realtime video monitoring: IVS software can display live video in realtime and alert users according to customised security policies.

Improves quality of surveillance: With IVS software you have the ability to be notified immediately when unusual activity is detected, 24 hours a day, 7 days a week.

Accurate detection: IVS software has the ability to detect specific behaviours, eg, if someone is where they should not be, you will be warned – indoors, outdoors and even in low light situations.

Force multiplier: IVS software can be integrated with existing CCTV/analogue systems or implemented with new state- of-the-art IP network cameras. There is no need to replace existing investment in infrastructure. IVS becomes a force multiplier when added to any existing camera network.

Optimise labour costs: Due to the IVS software handling all alerts from possible threats, less personnel is needed to view video and can be redeployed to pro-actively assist in providing supportive security services. With standard video systems, someone must always be watching for threats or abnormal behaviour, but with the IVS software watching for you, more video can be watched by fewer people. Video no longer needs to be watched live by a person 24/7. This decreases labour costs at the control centre and increases productivity.

Video analytics form an important component of IVS

Effectively manage realtime CCTV video: Video analytics allow you to effectively manage multiple cameras within a CCTV system. Some large surveillance installations require that multiple CCTV cameras are watched by just one or two security personnel. This can cause issues as each camera is not being effectively monitored. Video analytics provides the capability to only push video to monitors when an actual event occurs or when a specific alarm is triggered. This means the video analytics software is watching the cameras for you and only notifies you when some type of action needs to be taken.

CCTV system intelligent motion detection: Video analytics also gives you the capability of advanced motion detection in your CCTV system. When a camera within the CCTV system detects motion within a specific area of the video, it will automatically trigger an alarm. Video analytics offers higher reliability than standard motion detection. Video analytics software is based on various algorithms that will analyse the video to determine the type of motion. This means your CCTV system will only look for true motion of a moving person or vehicle instead of eg, swaying trees and bushes.

Licence plate/vehicle type recognition: The software allows the cameras to detect and determine vehicle type and licence plates which can then be integrated in the system for tolls, behaviour monitoring, anti-crime operations etc.

Object recognition: One can also monitor video footage for missing or unwanted objects. Objects that have been left behind (like a bag) can be detected when the video from a CCTV camera displays an object not part of the normal video scene. Video analytics can also do the reverse. When a camera within your CCTV system has a change in the video scene that shows that an object is missing an alarm can be triggered.

Security access points: Video analytics can determine the behaviour of people outside an access point. This can include loitering, studying of the security cameras or even tailgating. One can therefore better monitor traffic around security access points. Alarms can be set that will trigger when people within the CCTV cameras view are acting strangely or entering an area they are not permitted.

Advanced systems are able to detect anomalous situations by analysing inputs from multiple sensors, including cameras, fence intrusion systems, and radar systems and ensures a policy based response to threatening conditions. These systems combine GIS, advanced video analytics, and robust and open systems architecture to maximise system effectiveness and interoperation with third party cameras, CCTV systems, intrusion sensors, access control and alarm management systems.

In terms of integration, software algorithms are combined with initial sensor feedback to both decrease false alarms and increase the confidence level of a specific event. For example, a fence integration will consist of a fence sending an alarm of an event to the IVS system. Before setting a general alarm, the system will redirect a camera to the point of intrusion and apply analytics. Perhaps executing an algorithm to verify that the intrusion is a person, versus an animal or vegetation. After validating that fence event, the system can now perform the alarming function.

Integration with GIS provides many innovative features not found in other intelligent video systems. Combined with a flexible open architecture these features include:

* Geographic map-based command and control user interfaces that provide enhanced situational awareness, and automates PTZ camera steering tasks.

* Wide-area surveillance and perimeter intrusion detection: When integrated with perimeter intrusion systems one can provide automated video corroboration of intrusion events without using camera presets, which reduces cost and increases flexibility.

* Advanced scene analysis turns cameras into object detection and tracking sensors. Objects, once detected and reported in the database, become full geo-objects, ready for manipulation within a GIS environment.

* Point-and-click interfaces that control multiple PTZ cameras simultaneously through interaction with both maps and video images.

* Automated policy-based detection rules and alarm notification ensures that the proper responses are carried out for any given type of alarm. And because every alarm triggered is a geo-object, all typical GIS related response mechanisms can be utilised.

Automated wide area surveillance systems – technical detail

Advanced systems also provide automated wide area surveillance capabilities that provide complete solutions for digital surveillance of remote sites and large outdoor environments. Distributed computing architectures utilise TCP/IP networking to provide maximum flexibility for component deployment. While the security industry has invested a lot of effort into migrating CCTV systems onto digital platforms to ease the burden of managing the volume of video data, almost no attention has been paid to the ergonomics of operators interacting with digital video systems and PTZ cameras.

This deficiency can be addressed by utilising camera control technologies to make operators more efficient by automating PTZ camera steering, making it easier for operators to interact with the cameras, and providing them with truly useful feedback about where each camera is looking. This feedback is portrayed directly onto either a 2D or 3D GIS display.

Advanced systems will be able to directly interface with the majority of PTZ cameras and matrix switches on the market. It is also able to utilise feedback from PTZ cameras to provide realtime positional information feedback to operators on a GIS display, dramatically enhancing situational awareness for operators that are not intimately familiar with the environment being monitored. This allows users to see on a map, in realtime, which direction a PTZ camera is pointing and to simultaneously steer multiple cameras to view a location by clicking on any location on a map, instead of using a joystick.

Intelligent video

Advanced systems have video analytics that permit reliable alarming based on object detection and tracking, all designed to eliminate or reduce the false and nuisance alarms traditionally associated with intelligent video systems. A common source of false alarms when performing motion and object detection is the motion of the camera itself, either under the control of an operator, or due to wind, weather or vibrations. Pole mounted cameras are particularly prone to low frequency, high amplitude oscillations in even moderate winds or vibration effects, and this can wreak havoc with intelligent video systems.

To overcome this problem, the usual solution is to use expensive hardware video stabilisers, or to reinforce the camera mounting, which is also an expensive proposition. More advanced systems solve this problem by stabilising video images in software, which is a unique capability among leading vendors of intelligent video systems. This allows video analytics software to function even in the presence of significant camera motion or vibration.

Video analytics are able to classify and track an object based on size (animal, human, car, truck, etc), speed (slow moving, fast moving), shape, and direction of movement in changing lighting conditions (overcast, moving clouds, night), and alarms can be raised based on upper and lower thresholds for any of these attributes.

Realtime object detection alarm

Behaviours: These systems also have the ability to classify objects in relationship to environmentally changing backgrounds and then track those objects within video space. This functionality results in the ability to identify typical security behaviours or situations: detecting stopped vehicles, human/vehicle piggybacking, crowd detection, left-behind or removed objects, etc.

Geo-referencing tracked objects: The advanced systems that are integrated with GIS is capable of converting the positions of objects or events tracked through video analytics into geographical latitude and longitude coordinates, which can then be displayed as an icon on a GIS map. Through the use of advanced camera control capabilities and user interface, an operator can then click on the icon on the map to steer one or more PTZ cameras to the object’s location automatically.

Realtime object detection and tracking

Emergency/crime response: A command and control user interface which leverage GIS technology can be used in emergency/crime response to locate intruders and response vehicles and personnel on the geographic map as well. This enables security personnel to orchestrate a coordinated response. From the central command centre, security personnel get a bird’s eye view of the situation, they are able to visually locate both the perpetrator and the response vehicles. They can steer cameras to critical locations simply by clicking on the map or the system can automatically steer the cameras based on any geographic coordinate on the map from GPS or other sensor inputs. Response officers can transmit an alarm with their GPS position from any GPS transmitting device and these systems can automatically steer the camera to this location. This can greatly increase the safety of the response team and aid in orchestrating a successful response.

Remote access to video and alarms: Native support for PocketPC based PDAs also exist to receive alarms, view live video, control PTZ cameras, and provide alarm acknowledgments. Advanced PTZ camera control capabilities (point-and-click, drag-to-zoom) are also available through the PDA software, and the operator can dynamically adjust video stream frame rate and quality to suit the available network bandwidth.

Forensic search: Digital storage of video provides for seamless searching of video through forensic analysis or date-time queries for each camera, whether the video is stored locally or centrally. Advanced searches allow a user to add forensic analysis capabilities to the query, such as looking for motion or objects in certain parts of the camera’s field of view, or looking for objects that meet certain size, speed, or directional criteria. An example may be searching for movement within a keep out zone.

Edge device – managed bandwidth

In South Africa bandwidth is always an issue. One can overcome the problem by using an edge device that operates within the wide-area surveillance system, which monitors, detects and reports on multiple types of threats. The edge device can also act as a standalone remote sensor, detecting and reporting threats or seamlessly integrating into your current enterprise surveillance solution. These devices can be used as input logic for smart threat detection or can be activated by the central control room system based on the identification of a threat. When integrated into your enterprise surveillance system, the edge device lets the system scale video much more affordably. Offloading image processing allows your network video server to receive a higher number of inputs-helping you save money. The edge server also removes the need to stream video all the time, and therefore requires less network bandwidth and less storage. The edge device can be programmed to store information until such time that it is requested, or continuously send information. It may also be programmed to only send text information, jpeg alarm images, video clips of events, or full frame rate video. It is like having your own personal security guard on duty out in the wilds, 24/7, never sleeping.

Potential benefits to critical facilities

To illustrate a few of the powerful capabilities and resulting benefits that these geo-referenced IVS solutions can provide to a critical facility, consider the following scenarios.

Scenario A: A thief is crawling towards the facility in an attempt to enter illegally. The system will monitor for changes in the background and identify objects which are anomalous or changing over time, while filtering out changes due to lighting and environmental conditions. When conditions are met, the appropriate security protocol will be initiated.

Scenario B: A gang has cut through a critical facility’s chain link perimeter fence with the intention of sneaking into the facility. The system will detect a person(s) cutting through or climbing over a facility’s perimeter fence. When integrated with fence detection sensors, the system can automatically command multiple cameras to the point of intrusion. When this happens, an alarm will notify security personnel and the system will display a map with the exact location of the intrusion while continuing to track, identify and record the suspects. Further, such a system also allows operators to control cameras using a point-and-click interface, allowing them to fully understand the situation before implementing an emergency response.

Scenario C: A truck containing hazardous material departs the facility in several hours. As a security precaution, the facility has declared that the truck cannot be accessed by anyone until just prior to departing the facility. Using the visual interface feature, an operator can draw a virtual perimeter zone around the vehicle. If a person crosses that region during this monitoring period, the system will alarm, notify security and track the offending person or object.

Scenario D: A criminal steals an employee’s access card, allowing them to gain entry to the facility’s unauthorised zones. The system can be integrated with a facility’s card access system, wherein every time a facility employee scans his/her access card, the system provides security personnel with a comparison of a live image of the person against an archived still image. Alternatively, the system can be integrated with a facial recognition system that will automatically verify the individual entering the facility against an archived database of faces.

For more information contact African Astronautics, +27 (0)12 460 7534, [email protected], www.afrinautics.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI human detection cameras vs outdoor detectors
Provision ISR SA Surveillance
The advancement of technology has revolutionised many aspects of security systems, notably in the transition from traditional outdoor alarm detectors to modern, AI-based, human-detection IP cameras, which offer many benefits.

Read more...
Safeguarding farmland with digital solutions
Axis Communications SA Surveillance
Marlenique Estate, located in the Western Cape, opted for an Axis end-to-end solution to protect its premises with access management, remote monitoring, and property and asset protection.

Read more...
Cutting costs and enhancing security
Secutel Technologies Surveillance
[Sponsored] Visual verification, powered by the Secutel Visual Verifier, detects and verifies intrusions and physical attacks and ensures comprehensive protection in areas where high-value losses are at risk.

Read more...
Supercharge surveillance with AXIS Camera Station Pro
Duxbury Networking Surveillance Products & Solutions
Designed to put efficient surveillance at users’ fingertips with an intuitive interface that is easy to operate, AXIS Camera Station Pro 6.2 provides a customisable video management and access control solution for companies of all sizes.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
SMART Surveillance at the Indaba
SMART Security Solutions Editor's Choice Surveillance Videos
SMART Security Solutions hosted its second SMART Surveillance conference, focusing on a range of topics related to the video surveillance market, on July 11th, 2024, at the Indaba Conference Centre in Fourways.

Read more...
Horn speakers from Sunell
Forbatt SA Products & Solutions Surveillance Residential Estate (Industry)
Horn speakers are an effective tool for actively deterring intruders from entering estates. By emitting loud, clear audio warnings, horn speakers can alert trespassers that they have been detected and are being monitored.

Read more...
Sunell’s range of thermal cameras
Forbatt SA Products & Solutions Surveillance Residential Estate (Industry)
Thermal cameras offer significant value to estate security. Their ability to provide reliable surveillance in all lighting and weather conditions ensures continuous monitoring, providing a constant sense of security and reducing the likelihood of security breaches.

Read more...
Integrating radar and surveillance
Forbatt SA Products & Solutions Surveillance Residential Estate (Industry)
Integrating radar with CCTV video systems significantly enhances estate security by providing long-range threat detection and comprehensive monitoring capabilities. This combination leverages the strengths of both technologies, offering several key benefits.

Read more...
Sunell anti-corrosion cameras
Forbatt SA Products & Solutions Surveillance Residential Estate (Industry)
With Sunell’s anti-corrosion range of cameras, the initial investment in anti-corrosion CCTV cameras may be higher than standard cameras, but the long-term benefits outweigh the upfront costs.

Read more...