Assisting operators

CCTV Handbook 2010 Surveillance

Watching cameras continuously is just not an effective use of manpower.

Video systems generate a vast volume of picture data, but it is not economically sensible for people to review and evaluate all of it. Usually on sites where many video cameras are used, they have to be monitored by just a few operators. Watching all cameras continuously is just not an effective use of manpower because nobody can give their full attention to lots of images at once and operators inevitably tire quickly. Soon, lapses in concentration mean important details are overlooked and the whole security concept is significantly undermined. Though there may be a semblance of security, the reality is different.

To rectify this, relevant information needs to be filtered out of the mass. And thankfully, analysis algorithms are able to continuously examine as much picture content as you like and to automatically draw the operator’s attention to critical situations. Algorithms and processors do not get tired and they work automatically in the background 24 hours a day, seven days a week – just like a perfect assistant.

Clearly, any system must not generate many alarms without good reason, or operators will cease to treat them as critical situations and will just cancel the alarms without checking them out properly. Then the result is just the same as without video analysis — the operators lose concentration, real alarm situations are easily overlooked and the system is only actually providing a superficial impression of security.

Defining the task

So if video analysis is to be used efficiently and reliably, it is vital to have a clear definition of a so-called critical situation and a perfectly matched algorithm.

In the video system market in recent years, many marketing campaigns have featured sweeping statements about the capabilities of so-called intelligent video analysis. As a result, many users expect analysis algorithms to have human intelligence. They expect that if they themselves can see that it is a person crawling there and not a dog on all fours, then surely so must an algorithm which is supposed to be able to differentiate between humans and animals. If only it were that easy!

In fact, most algorithms use relatively basic criteria to differentiate, for example, vehicles and people from other moving objects and from each other.

But in order to make this logical deduction, the algorithm also has to have been told how big a person would be in the image when he is in the foreground and how big he would be in the background. This is done during set up when a service engineer measures the scene to determine how wide the foreground and background are. An operator who observes the scene does not need details like this to be defined explicitly. He knows simply from the context.

Classification algorithms like this are perfectly adequate for some applications. However, in situations where it is likely that people may not approach the site in an upright position (precisely because they do not want to be discovered), then this type of algorithm is completely unsuitable and a security risk.

Nowadays there is a large choice of algorithms which can undertake a wide variety of tasks. To provide really reliable assistance, the chosen algorithm needs to be suited to its particular task and must be set up perfectly. The more complex its computing process, and the faster its response time, then the greater the computing capacity it will require.

Centralised or decentralised

Many camera manufacturers already offer algorithms built into their cameras. These support decentralised video analysis conducted out at the edge of the video system rather than in the main server. This arrangement has the great advantage that it is uncompressed image data which is analysed – the perfect raw material for reliable analysis. This ‘analysis at the edge’ also saves bandwidth and reduces demands on computing capacity in the central computer.

When IP cameras are used and their images analysed centrally, then all the data is compressed first before being fed into the network and sent to the server which decompresses and analyses it. Unfortunately, this can result in analysis performance being impaired by compression artifacts. And it also inevitably means that the network is loaded with picture data which does not contain any important information and whose decompression makes additional demands on central server computing power.

But centralised analysis also has its advantages. It offers more flexibility in relation to the algorithms employed – often essential for specialist tasks; and it demands less computing power in the cameras – which may mean cheaper cameras can be used.

Both?

Often the best solution is a combination of different architecture types. You might want to use pre-analysis in the camera first to look for movement, then send selected footage to the central evaluation computer which then examines these pictures using a specialised or more complex algorithm. This second process filters out irrelevant motion and reports relevant situations reliably. Assuming that there is not constant movement in all of the camera scenes, then several cameras can share the network bandwidth and the computing capacity of the central server.

Video analysis is a sensible addition to modern video security systems particularly where it relieves the operator by providing efficient assistance.

For more information contact Geutebrück GmbH, +49 2645 137 0, [email protected], www.geutebrueck.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Get the AI fundamentals right
Technews Publishing SMART Security Solutions Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
LiDAR protects railways from new and existing dangers
Surveillance
3D LiDAR (Light Detection and Ranging) sensors are being installed to monitor rail traffic and ensure safety of passengers as well as individuals walking near the tracks, or trying to perform dangerous stunts for social media.

Read more...
Securing South Africa’s logistics sector
Secutel Technologies Products & Solutions Surveillance Logistics (Industry)
Unlike traditional guarding services, Visual Verifier operates on an ‘Always On’ principle, ensuring continuous 24/7 coverage of warehouses, depots, transit hubs, and delivery points.

Read more...
Unlock the future of security operations in Bloemfontein
DeepAlert News & Events Surveillance
Security professionals and business leaders are invited to revolutionise their offsite monitoring operations at the DeepAlert Product Road Show, taking place on 16 – 17 September 2025, at the Schoemanspark Golf Club, Bloemfontein.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
Secure, modernise and optimise CCTV
Surveillance Products & Solutions
Industrial and commercial organisations are navigating complex digital transformation processes. With SecuVue, companies can bridge the gap between operational technology and information technology for safer, smarter operations.

Read more...
Eagle Eye Precision Person & Vehicle Detection
Surveillance Products & Solutions AI & Data Analytics
Eagle Eye’s new Precision Person & Vehicle Detection feature detects people and vehicles at long distances with high accuracy and is especially designed for customers who actively monitor for intruders

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.