More than meets the eye

August 2016 Perimeter Security, Alarms & Intruder Detection, Surveillance

286 perimeter breaches in ten years – this was the result of an Associated Press investigation on the busiest 31 airports in the United States. These incidents happened despite the fact that after the September 11 attacks, US airports had invested hundreds of millions of dollars to upgrade their perimeter fencing.

The report basically proves two things: First, it is anything but easy to protect large areas, and second, it is not enough to build seven-foot high fences with barbed wire on top to keep intruders out. What is true for airports also applies to any other critical infrastructure, be it a utility, a power plant, a refinery or a pipeline. And although public safety may not be at risk here, the manufacturing industry has a strong interest to protect physical assets and intellectual property.

While a fence and security guards may be an appropriate solution for lower risk environments, critical infrastructures need more than that. Network video surveillance has the highest potential to drastically increase perimeter security. The most obvious advantage being image quality. In today’s video surveillance applications there is an ever increasing demand for more detail. However, the industry does rely too heavily on higher resolution and consequently more detail.

More details and thus pixels means more data, which in turn means more storage capacity and a higher network load. Although highly detailed images make it easy to distinguish individuals or minor details, we need to find ways to reduce storage requirements and network strain. But that is not all. The number of cameras being deployed in the market place is also rapidly increasing. Even if storage requirements and network strain are reduced significantly we still face an enormous amount of data. This leaves us with the manageability and accessibility of video data.

Manageability and accessibility of video data

At the end of the day, security personnel or operators want to be alerted instantly when suspicious events are detected. Built-in video analytics from Bosch analyse real-time images continuously to instantly detect suspicious events and alert when needed once predefined alarms are triggered. This helps operators and security personnel to spend more time on other tasks, and respond only to important events.

In case an event did occur and operators or security personnel want to browse stored video data to find irrefutable forensic evidence. If time and place are exactly known, this is quite easily done as the videos carry timestamps. But if you want to figure out and understand the escape route of a perpetrator on the basis of multiple cameras’ recordings, your ability to do so quickly will be limited by the sheer amount of data.

Considering this, it would be helpful if network video cameras understand what they see. In other words when they add ‘sense and structure’ to video data in order to keep video data manageable and easy accessible. For mission critical applications, like the perimeter protection of airports, critical infrastructures and government buildings as well as border patrol and traffic monitoring, Bosch offers built-in Intelligent Video Analytics.

Small and medium businesses, large retail stores, commercial buildings and warehouses can for example make use of Bosch’s built-in Essential Video Analytics for advanced intrusion detection, enforcing health and safety regulations, and business analytics like crowd density information and people counting.

Intelligence at the edge

Bosch ensures the highest quality and reliability of video analytics by putting it at the edge. That’s why every single network camera with either Intelligent Video Analytics or Essential Video Analytics can operate independently without the need for a central analytics server – so no single point of failure. This is called distributed or decentralised intelligence.

If one camera or encoder fails, the rest of the system remains at full performance. Expanding the system is therefore also easy. Network strain and storage requirements can be reduced by only streaming what is needed, since the analysis is done in the camera. With intelligence at the edge, Bosch’s focus is to significantly enhance system robustness and flexibility while reducing costs.

Network cameras with built-in video analytics can be configured to automatically identify alert conditions such as persons approaching or attempting to climb over fences, reliably differentiating between humans and the proverbial cat that flits through the image.

Alert conditions can also include objects crossing one or more predefined lines, following a defined line of movement or changing their speed (running), shape (crouching) or aspect ratio (falling). Camera-based, real-time processing can also be used to issue loitering alarms and perform left object detection, giving the security team the information it needs to react and take action quickly.

Automatically tracking moving objects of interest can help to verify or disprove alarms, alerting the security operator as appropriate. Such tracking can be initiated by a simple click or automatically when predefined alarm rules are met. Once integrated with intrusion detection systems or access control at the gates, intelligent video can also be used to automatically verify alarms from these systems or to double-check the identity of an individual presenting her or his credentials at the gate.

Video analytics meets the extremes

Outdoor video surveillance brings with it many challenges. One of them is the fact that lighting conditions vary with time, and while some of these changes are predictable (day/night), others such as headlights of a passing car or just scattered clouds are not. Bosch network cameras with built-in video analytics can detect changing lighting conditions and adapt their settings in real time, guaranteeing the best possible image quality at any time. Intelligent algorithms can also help dealing with unfavourable weather conditions.

Another feature is Intelligent Defog, a technology designed to dramatically improve image clarity in low-contrast situations such as fog, mist or air pollution. It removes the haze from the image for better visibility and enhances image details by increasing both the contrast and the colour saturation of the images.

Quickly retrieve the correct data

Although reliable real-time alarms are most important in perimeter security, incidents usually result in the need to reconstruct them later. Analysing recorded video is a time-consuming endeavour and prone to error. Network cameras with built-in video analytics can greatly reduce the effort and speed up forensics by introducing a level of abstraction. They can generate metadata in the form of simple text strings, describing relevant video details such as objects or movements. These metadata are very small compared to the actual images, so they do not add significantly to bandwidth and storage requirements. Nevertheless, they offer a huge benefit in that they can be searched automatically. In a typical setting, 20 seconds are sufficient to filter all relevant video sequences out of four hours’ worth of video using metadata. These data can also help to optimise business processes based on, for example, people counting or crowd density information.

For more information contact Bosch Security Systems – South Africa & sub-Saharan Africa, +27 (0)11 651 9600, [email protected], http://africa.boschsecurity.com.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Outperform aspirating smoke detectors
Bosch Building Technologies Products & Solutions
With enhanced AI algorithms for greater reliability and accuracy in distinguishing real fire situations, the Aviotec 8000i IR camera achieves, on average, three times faster detection times than current aspirating smoke detectors.

Read more...
Wireless security makes its mark
Perimeter Security, Alarms & Intruder Detection
Alarms have always had a wireless component since the first monitoring control room was launched, but internally, homes and companies used to install cables to connect various sensors and devices to the control panel.

Read more...
Smart, reliable detection in any conditions
OPTEX Perimeter Security, Alarms & Intruder Detection
In its discussions with companies operating in South and Southern Africa’s detection and alerting technologies market, SMART Security Solutions spoke to OPTEX for more information on its solutions and technologies.

Read more...
Surveillance on the perimeter
Axis Communications SA Hikvision South Africa Technews Publishing Editor's Choice Perimeter Security, Alarms & Intruder Detection
Cameras have long been a feature in perimeter security, with varying reports of success and failure, often dependent on the cameras’ planning, installation and configuration, as well as their integration with other perimeter solutions and centralised management platforms.

Read more...
Directory of suppliers
Perimeter Security, Alarms & Intruder Detection
The Directory of Product and Solution Suppliers for the alarm, intrusion, and perimeter markets includes details of companies that provide security and risk mitigation products, advice, and services to these verticals.

Read more...
Visual verification raises the security game
Technews Publishing Inhep Electronics Holdings Videofied SA Editor's Choice Perimeter Security, Alarms & Intruder Detection
Incorporating alarm signals with live surveillance footage, visual verification enables a human observer in a control room (onsite or offsite) to gain a clear understanding of the situation, thereby facilitating informed decision-making.

Read more...
Two systems to enhance the efficacy of intrusion detection
Perimeter Security, Alarms & Intruder Detection
The OPTEX RedScan Pro and RedScan mini-Pro sensors, as well as the company’s Fibre SenSys solution, are highly accurate intrusion detection systems that employ two very different yet powerful technologies, providing two types of intrusion detection solutions.

Read more...
From wireless alarms to smart homes
Elvey Security Technologies Perimeter Security, Alarms & Intruder Detection Products & Solutions
The final brand SMART Security Solutions features in its discussions with companies operating in South and southern Africa’s detection and alerting technologies market is DSC, distributed in the region by Elvey Security Technologies.

Read more...
Hadeda-proof sensor technologies
Reditron Perimeter Security, Alarms & Intruder Detection
SMART Security Solutions highlights Takex, represented locally by Reditron, speaking to Gordon Moore, Reditron’s National Sales Director, and Mark Crichton, Takex Channel Manager for South Africa.

Read more...
What not to do: Key ‘don’ts’ in perimeter security systems
Fang Fences & Guards Perimeter Security, Alarms & Intruder Detection
Many people know what to do when securing a perimeter; in this article, Johan van Wyk highlights the important ‘don’ts’ to consider when implementing a turnkey perimeter security solution.

Read more...