Getting started with video analytics

April 2009 Surveillance

Video motion detection (VMD) was first implemented more than four decades ago as an analogue system, but failed to deliver due to high false alarm rates and product and installation costs. The evolution of electronics, PCs and the Internet has led to a new form of digital VMD that has proven unsuccessful as a result of poor algorithm designs and the heavy processing required to accommodate outdoor scenarios. As a result of advances in miniaturisation technology and increased processing power, a new form of VMD was born: video analytics, a more cost effective, powerful and efficient solution which is also simple to set up and operate.

Architectures

Four different video analytics architectures can be identified in today’s market: software-based; OEM hardware-based; hybrid; and edge devices.

A decisive factor in choosing an effective video analytics system is its capability to maintain a low rate of false alarms while allowing a high rate of probability of detection (PoD). A system that generates frequent false alarms by reacting to extraneous stimuli is ineffective and counteracts the main purpose of video analytics, which is to deliver only relevant information. On the other hand, the system’s PoD needs to be high enough to ensure that relevant security events are not missed.

The following parameters allow users to achieve a fine balance between PoD and false alarms:

* Defining the detection zone is necessary in order to reflect the area of interest, since the camera has a large field of view (FoV) and only specific areas are relevant for detection purposes. There are three types of detection zones that can be defined by most systems: active (alarm zone); inactive (pre-alarm zone); and passive.

The active detection zone (or alarm zone) refers to the areas where an alert is required when a certain event occurs. The inactive detection zone refers to areas within the camera’s FoV but where activities are ignored. The passive zone (pre alarm zone), is defined as a zone where the system is aware of activities but will deliver an alarm only when an activity passes from that zone to an active zone – for instance, it could be a fence separating a public and private area.

* Detection rules define the types of detection that are of interest, such as intruders, tripwires, unattended baggage, loitering and stopped vehicles. Detection rules are important in order to reduce false alarms. For example, one may wish to identify persons entering a location from an unauthorised access point such as an exit, while allowing free passage to people exiting that location. In this case, the detection rule would define the sense of movement that is allowed.

* Depth setup enables a computer to translate 2D images into 3D viewing. The human brain has the innate capability of understanding the size of an object in relation to its distance. Depth setup gives a computer similar capability, enabling it to distinguish between an aeroplane in the background and a fly on the lens.

Other key elements that affect the reliability of video analytics in detecting security events and ignoring irrelevant information include lighting conditions (minimum required light intensity within the detection zone at night); defining the expected speed and size of an object; and selecting the appropriate camera lens for the desired coverage area.

A key challenge that system integrators face when dealing with video analytics is the customer’s desire for a system that can be rapidly installed, minimising surveillance downtime due to installation; and simple to operate, minimising the learning curve.

The basics of reliability

In tandem with the increased interest in video analytics over the past five years, many new companies have emerged in the market. With varying levels of performance and no unified standard, the user would be well advised to find out how well a system performs and seek installation references.

The military represents the perfect test bed for security products. With diverse locations and challenges such as rain, snow, wind, darkness, animals, cloud shadows, slow-moving or camouflaged intruders and far distance detection, the army is an ideal organisation to test and approve a new technology and provide feedback for improvement.

Many technologies available to the public today originated in military labs and testing grounds. A video analytics system that has passed the harshest tests in the most difficult terrains is obviously suitable for high-risk sites. The criteria for success in a military test include a low false alarm rate; high PoD; ability to perform well over long periods of time (sometimes measured in years); rapid deployment; and ease of integration. These factors, along with a bulletproof design, are all necessary for off-the-shelf purchasing and installing.

Probably most important, are references from actual system installations around the world. The more sites the system has been installed at, the more diversified is the manufacturer’s experience in dealing with myriad detection scenarios and false alarms reduction.

For more information contact Brendon Cowley, business development director, C3 Shared Services, +27 (0)11 312 2041, [email protected]



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Get the AI fundamentals right
Technews Publishing SMART Security Solutions Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
LiDAR protects railways from new and existing dangers
Surveillance
3D LiDAR (Light Detection and Ranging) sensors are being installed to monitor rail traffic and ensure safety of passengers as well as individuals walking near the tracks, or trying to perform dangerous stunts for social media.

Read more...
Securing South Africa’s logistics sector
Secutel Technologies Products & Solutions Surveillance Logistics (Industry)
Unlike traditional guarding services, Visual Verifier operates on an ‘Always On’ principle, ensuring continuous 24/7 coverage of warehouses, depots, transit hubs, and delivery points.

Read more...
Unlock the future of security operations in Bloemfontein
DeepAlert News & Events Surveillance
Security professionals and business leaders are invited to revolutionise their offsite monitoring operations at the DeepAlert Product Road Show, taking place on 16 – 17 September 2025, at the Schoemanspark Golf Club, Bloemfontein.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
Secure, modernise and optimise CCTV
Surveillance Products & Solutions
Industrial and commercial organisations are navigating complex digital transformation processes. With SecuVue, companies can bridge the gap between operational technology and information technology for safer, smarter operations.

Read more...
Eagle Eye Precision Person & Vehicle Detection
Surveillance Products & Solutions AI & Data Analytics
Eagle Eye’s new Precision Person & Vehicle Detection feature detects people and vehicles at long distances with high accuracy and is especially designed for customers who actively monitor for intruders

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.