Finding people in real time

November 2016 Surveillance, Products & Solutions

Rapidly locating a person of interest is one of the most important tasks for every operator in the control room. Whether it is working in real-time to reunite a lost child with their parents, aiding in the apprehension of a suspect, or working with the authorities post incident, every second counts. Improving capabilities in this area has resulted in one of the most exciting developments, in what is being referred to as next-generation real-time video analytics.

Erez Goldstein, senior product marketing manager at Qognify.
Erez Goldstein, senior product marketing manager at Qognify.

For estates that have large numbers of surveillance cameras distributed over wide areas and multiple sites (such as airports and other mass transit hubs, hospitals, sports events, city centres and government facilities), finding person/s of interest has traditionally been a resource draining and time intensive operation, often lasting hours. Furthermore, major incident investigation could result in days, weeks or even months of manually trawling through masses of CCTV footage.

What is more, while pinpointing the whereabouts of the person is paramount, if a ‘live’ situation presents a possible threat (such as the suggested presence of a known suspected terrorist), this information alone isn’t enough. You need to know when and where they entered the estate, the precise route they took, who they were with and what they did before arriving at their current destination.

To address this precise issue, the latest video analytics (such as Suspect Search from Qognify) have been proven to help reduce search time from hours to minutes and even seconds. To best explain how it works in practice here is an example.

Search on description

The information desk is notified by a concerned traveller that they have seen someone behaving very suspiciously in the land-side shopping concourse of an international airport. The control room is notified about the incident and is given a description of the person of interest. The operator uses this information to quickly make an avatar that matches the description – a white male, medium build, blonde hair, wearing blue jeans, a green hooded sweatshirt and a black backpack.

Every relevant camera on the network is then searched to find all instances where person/s matching the description appear on camera. Three to five seconds later the operator is presented with a selection of images from which he fine-tunes his search (more than 95% of irrelevant images have already been filtered out by the algorithm). He identifies the person in question and now uses a still image from the camera as his reference photo instead of the avatar, re-iterating the search, which now provides even better results for getting a match to the right person.

The rapid speed of the search is made possible because the system is capturing, indexing and storing data in real time, from every camera. What is more, (in the case of Suspect Search) the system is camera agnostic and has basic minimal requirements only for image quality and size (a plus point over facial recognition technology).

Historical routes

With the person identified, the operator is then presented with a clickable map detailing the route, locations and times that the person is visible to the camera, as well as the most updated video feed showing where the person was last (or even currently). The operator now tracks the movements of the suspect, but crucially he no longer has the backpack and the priority is to locate it immediately. Reviewing the footage, the person is first seen talking to a person he did not arrive with and he hands over the bag. Now the operator uses the system to search for the second suspect (whilst continuing to monitor the first suspect) who is seen entering a café and leaving without the bag.

Now monitoring all three live-feeds (the two suspects and the nearest camera to the bag) the operator is guided step-by-step by the situation management system, following the pre-determined protocol to co-ordinate a response. He dispatches one security team to the café and triggers the evacuation of the surrounding area to an agreed boundary, at the same time the on-site police are sent images of the suspects, along with their exact location, to ensure they are apprehended for questioning.

Not only has the system been used to locate the suspects and assess the severity of the situation, all of the time-stamped video footage can be packaged for review by police as well, for evidence submission.

For more information about real-time video analytics and Suspect Search visit www.qognify.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New fire blanket for lithium-ion battery fires
Fire & Safety Products & Solutions
SafeQuip launched its newly developed range of high-performance, multi-use lithium-ion battery fire blankets, specifically designed to address fires involving devices with lithium-ion batteries, providing a crucial tool for safety in environments where these batteries are in use.

Read more...
SafeQuip launches lithium-ion battery fire extinguishers
Fire & Safety Products & Solutions
[Sponsored] SafeQuip has launched the SANS 1910-2022 approved Lith-Ex fire extinguisher range, which carries NTA 8133:2021 (KIWA/POOO55865) test approval, which proves its lithium-ion battery fire extinguishing capability.

Read more...
Watermist suppression in mining
FS Systems Fire & Safety Mining (Industry) Products & Solutions
Watermist suppression systems are highly effective in suppressing flames and controlling heat spread, especially in confined spaces commonly found in mining environments, by generating fine droplets with an increased surface area, enabling rapid heat absorption and cooling during fire incidents.

Read more...
FS partners with Oculus
FS Systems Fire & Safety Products & Solutions
FS Systems announced a strategic partnership with Oculus Innovations to combine the company’s integrated security management solutions with Oculus Innovations’ expertise in designing state-of-the-art control room environments.

Read more...
Quality fire detection installation at Baywear Clothing
G2 Fire Fire & Safety Industrial (Industry) Products & Solutions
JZL Projects and Solutions was asked to provide a comprehensive yet cost-effective and reliable fire detection solution for Baywear Clothing that would be installed with minimum disruption to the factory.

Read more...
AI human detection cameras vs outdoor detectors
Provision ISR SA Surveillance
The advancement of technology has revolutionised many aspects of security systems, notably in the transition from traditional outdoor alarm detectors to modern, AI-based, human-detection IP cameras, which offer many benefits.

Read more...
Safeguarding farmland with digital solutions
Axis Communications SA Surveillance
Marlenique Estate, located in the Western Cape, opted for an Axis end-to-end solution to protect its premises with access management, remote monitoring, and property and asset protection.

Read more...
From wireless alarms to smart homes
Elvey Security Technologies Perimeter Security, Alarms & Intruder Detection Products & Solutions
The final brand SMART Security Solutions features in its discussions with companies operating in South and southern Africa’s detection and alerting technologies market is DSC, distributed in the region by Elvey Security Technologies.

Read more...
The AX Hybrid PRO Series offers reliable wired and wireless protection
Hikvision South Africa Editor's Choice Perimeter Security, Alarms & Intruder Detection Products & Solutions
Hikvision has announced the launch of a new AX Hybrid PRO alarm system with innovative Hikvision ‘Speed-X’ transmission technology. This system offers reliable wired protection while delivering expanded flexibility with seamless wireless integration.

Read more...
Advanced Perimeter Intrusion Detection Systems
XtraVision OPTEX Technews Publishing Modular Communications Perimeter Security, Alarms & Intruder Detection Integrated Solutions Products & Solutions
Making full use of fibre installations around the perimeter by adding Perimeter Intrusion Detection Systems means you can easily add another layer of security to existing surveillance and fencing systems.

Read more...