This document discusses the transformation of video surveillance from analog closed-circuit TV systems to digital IP-based surveillance cameras networked over the internet. Some key points:
- IP-based digital surveillance allows for centralized monitoring from one location of multiple geographically dispersed sites, improving efficiency. It also enables applications beyond just security like analytics of customer behavior.
- While CCTV still dominates the market, IP surveillance is growing rapidly due to advantages like remote monitoring, storage and retrieval of video, and expanding applications.
- For organizations transitioning to IP surveillance, important considerations include whether to use a hybrid analog/IP system, available network bandwidth, and camera features like resolution, field of view, and power source. Pro
Yole Intel RealSense 3D camera module and STM IR laser 2015 teardown reverse ...Yole Developpement
INNOVATIVE 3D CAMERA FOR FACIAL ANALYSIS AND HAND/FINGER TRACKING, BASED ON RESONANT MICRO-MIRROR, IR LASER, VISIBLE AND NEAR INFRARED IMAGE SENSORS.
Intel RealSense is an intelligent 3D camera equipped with a system of three components: a conventional camera, a near infrared image sensor and an infrared laser projector. Infrared parts are used to calculate the distance between objects, but also to separate objects on different planes. They serve for facial recognition as well as gestures tracking.
The Intel 3D camera can scan the environment from 0.2m to 1.2m. The fixed-focal length camera will support up to 1080p @30FPS capture in RGB with a 77° FOV. Its lens has a built in IR cut filter. The 640x480 pixel VGA camera has a frame rate up to 60fps with a 90° FOV, moreover its lens has an IR Band Pass filter.
More information on that report at http://www.i-micronews.com/reports.html
Online Security Breach Compromises 77 Million Client Accountscorelink11
The recent Sony Playstation Network online security breach, which resulted in roughly 77 million customer accounts being compromised, has emphasized the growing importance of data security. View this presentation to learn more about online security.
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.Cyphort
Secretary Johnson called the attack on Sony Pictures Entertainment “an attack on our freedom of expression and way of life.” In this MMW session, we dissect Destover malware, responsible for more than 100 terabytes of stolen data from Sony Pictures Entertainment.
Added bonus: MMW Watch List of 2014
We will summarize the “most wanted” of the year 2014, including Backoff, the POS malware, and Zberp, the financial Trojan.
Two large corporations have been crippled by recent information security breaches. It may not be hard to quantify the losses in terms of lost revenue and profits but what will be hard to quantify are the losses to reputation. Cited as two of the most damaging cyber-attacks on corporate America, this presentation looks at what went wrong and what could have been done to prevent these situations.
Annual Maintenance Contracts (AMC) l Outsourcing application maintenance l Application support l hardware & software requirement l web designing & hosting
Now security is one of the topmost concern of retail shops, mega marts and all the corporate offices. Hence installing a CCTV Camera is the only wise option available. Get to know more about CCTV Cameras in this presentation.
Yole Intel RealSense 3D camera module and STM IR laser 2015 teardown reverse ...Yole Developpement
INNOVATIVE 3D CAMERA FOR FACIAL ANALYSIS AND HAND/FINGER TRACKING, BASED ON RESONANT MICRO-MIRROR, IR LASER, VISIBLE AND NEAR INFRARED IMAGE SENSORS.
Intel RealSense is an intelligent 3D camera equipped with a system of three components: a conventional camera, a near infrared image sensor and an infrared laser projector. Infrared parts are used to calculate the distance between objects, but also to separate objects on different planes. They serve for facial recognition as well as gestures tracking.
The Intel 3D camera can scan the environment from 0.2m to 1.2m. The fixed-focal length camera will support up to 1080p @30FPS capture in RGB with a 77° FOV. Its lens has a built in IR cut filter. The 640x480 pixel VGA camera has a frame rate up to 60fps with a 90° FOV, moreover its lens has an IR Band Pass filter.
More information on that report at http://www.i-micronews.com/reports.html
Online Security Breach Compromises 77 Million Client Accountscorelink11
The recent Sony Playstation Network online security breach, which resulted in roughly 77 million customer accounts being compromised, has emphasized the growing importance of data security. View this presentation to learn more about online security.
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.Cyphort
Secretary Johnson called the attack on Sony Pictures Entertainment “an attack on our freedom of expression and way of life.” In this MMW session, we dissect Destover malware, responsible for more than 100 terabytes of stolen data from Sony Pictures Entertainment.
Added bonus: MMW Watch List of 2014
We will summarize the “most wanted” of the year 2014, including Backoff, the POS malware, and Zberp, the financial Trojan.
Two large corporations have been crippled by recent information security breaches. It may not be hard to quantify the losses in terms of lost revenue and profits but what will be hard to quantify are the losses to reputation. Cited as two of the most damaging cyber-attacks on corporate America, this presentation looks at what went wrong and what could have been done to prevent these situations.
Annual Maintenance Contracts (AMC) l Outsourcing application maintenance l Application support l hardware & software requirement l web designing & hosting
Now security is one of the topmost concern of retail shops, mega marts and all the corporate offices. Hence installing a CCTV Camera is the only wise option available. Get to know more about CCTV Cameras in this presentation.
Network cameras have been around for a number of years; the first one was released back in 1996. In
the early years, network camera technology was not on a par with that of professional level analog
cameras. Initially designed to take advantage of digital imaging, networking, and the Internet in new
application areas, these cameras were not used for surveillance applications. That has certainly changed.
Now, network cameras have caught up with analog camera technology and meet the same requirements
and specifications and, as we’ll see below, in several important areas, network cameras surpass analog
camera performance.
CCTV Surveillance System, attacks and design goals IJECEIAES
Closed Circuit Tele-Vision surveillance systems are frequently the subject of debate. Some parties seek to promote their benefits such as their use in criminal investigations and providing a feeling of safety to the public. They have also been on the receiving end of bad press when some consider intrusiveness has outweighed the benefits. The correct design and use of such systems is paramount to ensure a CCTV surveillance system meets the needs of the user, provides a tangible benefit and provides safety and security for the wider law-abiding public. In focusing on the normative aspects of CCTV, the paper raises questions concerning the efficiency of understanding contemporary forms of „social ordering practices‟ primarily in terms of technical rationalities while neglecting other, more material and ideological processes involved in the construction of social order. In this paper, a 360-degree view presented on the assessment of the diverse CCTV video surveillance systems (VSS) of recent past and present in accordance with technology. Further, an attempt been made to compare different VSS with their operational strengths and their attacks. Finally, the paper concludes with a number of future research directions in the design and implementation of VSS.
This document uses city centers as an example of a common city surveillance application using Axis network cameras. It motivates the need for a surveillance system, the reason for choosing an IP-based system and, most importantly, it describes the system design to help customers and/or system integration partners to write a “Request for Proposal"
This document uses city centers as an example of a common city surveillance application using Axis network cameras. It motivates the need for a surveillance system, the reason for choosing an IP-based system and, most importantly, it describes the system design to help customers and/or system integration partners to write a “Request for Proposal"
Honeywell CCTV Cameras in Bangalore - Call: 09066656366RajaGopal Reddy
Honeywell CCTV Cameras in Bangalore - Call: 09066656366 for Honeywell CCTV Camera Dealers in Bangalore.
To find more details on any particular product, Email: sales@cctvcams.in or contact us directly @ 09066656366
Pelco CCTV Cameras in Bangalore - Call: 09066656366RajaGopal Reddy
Pelco CCTV Cameras in Bangalore - Call: 09066656366 for Pelco CCTV Camera Dealers in Bangalore.
To find more details on any particular product, Email: sales@cctvcams.in or contact us directly @ 09066656366
Vintron CCTV Cameras in Bangalore - Call: 09066656366RajaGopal Reddy
Vintron CCTV Cameras in Bangalore - Call: 09066656366 for Vintron CCTV Camera Dealers in Bangalore.
To find more details on any particular product, Email: sales@cctvcams.in or contact us directly @ 09066656366
Tutus CCTV Cameras in Bangalore - Call: 09066656366RajaGopal Reddy
Tutus CCTV Cameras in Bangalore - Call: 09066656366 for Tutus CCTV Camera Dealers in Bangalore.
To find more details on any particular product, Email: sales@cctvcams.in or contact us directly @ 09066656366
CNB CCTV Cameras in Bangalore - Call: 09066656366RajaGopal Reddy
CNB CCTV Cameras in Bangalore - Call: 09066656366 for CNB CCTV Camera Dealers in Bangalore.
To find more details on any particular product, Email: sales@cctvcams.in or contact us directly @ 09066656366
Biometric Attendance System Service Provider in Bangalore - Call @ 0906665636...RajaGopal Reddy
Biometric Attendance System Service Provider in Bangalore - Call @ 09066656366 for Dealers and Price details in Bangalore. We are specialized for Biometric Fingerprint Attendance System, Biometric Time Attendance System, Biometric Access Control Attendance System, ESSL Biometric System.
X-ray Baggage Scanner Companies in India - 09066656366RajaGopal Reddy
X-ray Baggage Scanner Companies in India - 09066656366
To find more details on any particular service, email sales@cctvcams.in or contact us directly @ 09066656366.
Network cameras have been around for a number of years; the first one was released back in 1996. In
the early years, network camera technology was not on a par with that of professional level analog
cameras. Initially designed to take advantage of digital imaging, networking, and the Internet in new
application areas, these cameras were not used for surveillance applications. That has certainly changed.
Now, network cameras have caught up with analog camera technology and meet the same requirements
and specifications and, as we’ll see below, in several important areas, network cameras surpass analog
camera performance.
CCTV Surveillance System, attacks and design goals IJECEIAES
Closed Circuit Tele-Vision surveillance systems are frequently the subject of debate. Some parties seek to promote their benefits such as their use in criminal investigations and providing a feeling of safety to the public. They have also been on the receiving end of bad press when some consider intrusiveness has outweighed the benefits. The correct design and use of such systems is paramount to ensure a CCTV surveillance system meets the needs of the user, provides a tangible benefit and provides safety and security for the wider law-abiding public. In focusing on the normative aspects of CCTV, the paper raises questions concerning the efficiency of understanding contemporary forms of „social ordering practices‟ primarily in terms of technical rationalities while neglecting other, more material and ideological processes involved in the construction of social order. In this paper, a 360-degree view presented on the assessment of the diverse CCTV video surveillance systems (VSS) of recent past and present in accordance with technology. Further, an attempt been made to compare different VSS with their operational strengths and their attacks. Finally, the paper concludes with a number of future research directions in the design and implementation of VSS.
This document uses city centers as an example of a common city surveillance application using Axis network cameras. It motivates the need for a surveillance system, the reason for choosing an IP-based system and, most importantly, it describes the system design to help customers and/or system integration partners to write a “Request for Proposal"
This document uses city centers as an example of a common city surveillance application using Axis network cameras. It motivates the need for a surveillance system, the reason for choosing an IP-based system and, most importantly, it describes the system design to help customers and/or system integration partners to write a “Request for Proposal"
Honeywell CCTV Cameras in Bangalore - Call: 09066656366RajaGopal Reddy
Honeywell CCTV Cameras in Bangalore - Call: 09066656366 for Honeywell CCTV Camera Dealers in Bangalore.
To find more details on any particular product, Email: sales@cctvcams.in or contact us directly @ 09066656366
Pelco CCTV Cameras in Bangalore - Call: 09066656366RajaGopal Reddy
Pelco CCTV Cameras in Bangalore - Call: 09066656366 for Pelco CCTV Camera Dealers in Bangalore.
To find more details on any particular product, Email: sales@cctvcams.in or contact us directly @ 09066656366
Vintron CCTV Cameras in Bangalore - Call: 09066656366RajaGopal Reddy
Vintron CCTV Cameras in Bangalore - Call: 09066656366 for Vintron CCTV Camera Dealers in Bangalore.
To find more details on any particular product, Email: sales@cctvcams.in or contact us directly @ 09066656366
Tutus CCTV Cameras in Bangalore - Call: 09066656366RajaGopal Reddy
Tutus CCTV Cameras in Bangalore - Call: 09066656366 for Tutus CCTV Camera Dealers in Bangalore.
To find more details on any particular product, Email: sales@cctvcams.in or contact us directly @ 09066656366
CNB CCTV Cameras in Bangalore - Call: 09066656366RajaGopal Reddy
CNB CCTV Cameras in Bangalore - Call: 09066656366 for CNB CCTV Camera Dealers in Bangalore.
To find more details on any particular product, Email: sales@cctvcams.in or contact us directly @ 09066656366
Biometric Attendance System Service Provider in Bangalore - Call @ 0906665636...RajaGopal Reddy
Biometric Attendance System Service Provider in Bangalore - Call @ 09066656366 for Dealers and Price details in Bangalore. We are specialized for Biometric Fingerprint Attendance System, Biometric Time Attendance System, Biometric Access Control Attendance System, ESSL Biometric System.
X-ray Baggage Scanner Companies in India - 09066656366RajaGopal Reddy
X-ray Baggage Scanner Companies in India - 09066656366
To find more details on any particular service, email sales@cctvcams.in or contact us directly @ 09066656366.
2. •
How do you make a
suspect bag stand out
from the crowd?
Talkto Sony about Intelligent Object Detection.
3. - -
Vof c lunky cameras and closed·
ide·O surveillance is at the
front end of an astonishing
transformation. Once a world
circuit coaxial networks hardwired into a
room full of c loudy gray S·inch screens,
surveillanceis rapidly becom ing a land of
sleek, intelligent cameras linked to
sohware applicat ons running on the IP
network. Some of these applications are
basic, such as motion detection setting off
alarm s. Some are clever, such as a grocery
store system where cameras at
the checkout counter are linked to the
receipt tape.
Though CCTV still composes almost
ha f the overall video surveillance market,
its share is rapidly swindling with a surge
in IP-based digital v·ideo systems. And
proving ROI on dig tal surveillance may not
be as hard asyou th nk either.The post-9/ 1
1obsess on with secur ty created th s
surgein surveillance investment, but
what's susta ning it is that dig tal video
surveillance appears to be living up to its
hype.And, when done well, t prov des
real ROI for the business. First off, it allows
for consolidation of monitoring:You can
watch many geographically disperse
sites from one control roomHsomething
that was impossible w ith c losedcircuit
systems. An even b gger benefit of d ig tal
isthat central control and monitoring
allows you to put cameras at smaller
sites and monitor them from the central
operations center. With CCTV, you'd
require a closed system at that smaller
site and onsite monitoring, which itself
requires atleast one employee.D igital
video alsobeats tapein terms of storage
and retrieval. Tape-based system scan
requirea full t me employee just for
retrieval.
But the key to IP-based video
surveillance s appeal is the ever
expanding roster of applications
being attached to it. In other words,
surveillance isn't j ust about security
anymore.For example, in retail stores,
v deo surveillance is being used for
measuring foot traffic through a store to
understand both peak traffic t mes and
a so shoppers' brows ng hab its, which
in turn allows them to better configure
andise around the store.Of course
the surveillance s used for security as
well, but t'salso be ng utilized to train
new employees.
Training, n fact, has become a possible
killer applet for video surveillance, due
in large part to theincreased quality of
the images.Vide·Oof cashiers at a grocery
store doing their jobs correctly {and
incorrectly) is edited into video packages
that train new hires. Still others are using
cameras to improvelog stics, assembling
trainsat humpyards (where the rail cars
come off boats and trucks), for examp e,
or monitoring assembly lines for quality
control. Suddenly, surveillance is a
business enab er, not j ust barbed wire.
merch
• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •
c e o • nd .,,.,....,. ,• •
l,l.• n• 11" '11 O. . ,c to•
......A •• oc:i• t • P ubliidl••
1,1.• n• 11" '11 e .,. ,...,
......A •• oc:i• t • P ubliidl••
e.i,,cu
C h l •t 0 .• 1911+•
o .,.ia. . .. ..
()omni<' 0 . S o " '•
,,.;111 ,.....
l(w,.tt>• 11,... .,., •
J ,. ., . f h.,.b pfu••
c.. ..... .,. .
Mo,t.C.......,.,- ,a.,:i.,,
S,..,1hN•!h i+ • O . . .c t o•
11' ... ... a , .,
w•...,.,••,•••
P •o dudOOn
N• N • Hood
,. . ,. .. 1..., 1,1. .p , u ,
fliut:.l!l'I.....
J . . ,. . Th••ion
•- • , .1 > . . 0 C pl>..,<0m
C ••i<I Jot,n,,.,..,
S . .l>.c • p b o n
.... . .... .11"'•"-ii..
O Co-py ,ia,1,t 20011C PI,
- '• <'o;M• ,...,v+d ,
W hlo'" • p ul >hll. , . . .. . ... . • •,. .,y
• """' 10 +nou•• "'*..,•.,, . vol • l
'" "" "" '" " ,n I"•" '"9"'n+, .,,..,
'" ' nott+ . . .1o1... . ,. .. . 11:, """""+tftlfll l.,.n.
--=-c p
( (:olj,() f l l',8USH!I <
IM l (IIN. .h()NA
Kto• d OHie•
PO e -!U t t !
0 ......1.uAf
T•l +117l • U l l l l
,.,., 11 3» 8• 4
...-. .11,w,,w .cpd- i.c""'
S O N Y. 3
4. • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •
IPnetwork-basedsurveillance camerasofferenticingpossibilities.Butdoyouwantfull
orpartialIP?Howmuchbandwidth?We'llwalkyouthroughtheentireprocess.
N
etwort.:cameras for P-based
video surveil lance systems
have been arou nd s nce 1996.
These are attached directly to
the network and send video to a network
video reco rder or to a server equipped with
video management software,whk h stores,
displays or broadcasts the images.It w il lbe
another five years, according to co nsultancy
and research firm Gartner, before the market
favors P over analog.However,IP cameras are
considered a fast-growing market; according
to IMS Research, the global network video
market grew 42 percent last year and is
expected to reach $2.6 billion
by 2010.
Experts say the reasonsfor analog's
continued dom nance center ma nly around
up gradecosts and a generallack of
knowledge about networking tech nologies
in many physical security departments.
Two KtyDtcisions
When looking at your options, the first th ng
you need to consider is whether you should
use fullor partial IP.Yo u can stillget some of
the advantages of IPwh le maintaining your
investment n analog by using encoders
that convert the analog signalto one that
can run overIP.These systems work well
but are not architected for growth . Full
IPinstallationsare more streamlined and
efficient and require less maintenance.
They re digital from one end to another and
are very reliable because th ere are fewer
m oving parts.
Second, consider if there isenough
bandwidth on the co rporatebackbone.
BecauseIP-based surveil lance places
new demands on exist ng network
infrastructures, thephysicalsecurity
department has to workw ith ITto
imp ement or evenchoosethe best system,
which means overcoming a traditional
barrier between the two groups.The best
decisionson network design will be made
jo ntly between the two groups, says Jeff
Vining. research vk e president at Gartner.
Forinstance, because streaming l ive video
isbandwidth -intensive, it can be too costly
to upgrade networks o r too difficult to u se
in situations where there are many users..
To optimize bandwidth, you may need to
use application delivery control lersand/or
wide-area-network opt mizatio n controllers,
he says.
• S O N Y.
Do'sand Don'ts
•DON'Tltt cc,stbt ,our guiclirlg ligtit.Most
p,toplebuJ<al'lera.s with costastheirhlghttt
ptiorityandfffectiYfftessuttit secod, which
resuttsin grainy, o.t·of.fowsimages.There
aretoolsnailable that htlpro•cl!loost the
resolution and ltltSdlatfits,our nteds, baste!
Ofl fa,,c:torslikedistanceanda 1H u heiglit.
•OOWTttiillk s •allwhtll upgradi119from
analog/llYJt systems.
•00Hderstud the trHe-offs to11,igli·
quality il'lages. f¥Voracrisper il'lage om
saiooth motion.
•00co.siderU1elm 1tfitsc,fctnt,aliting
videosuTtila11ce.
• DON'Tassumt everything isl'lil and
•atch.WllilerunyHtwork a • ffasda.i•
compatibility with rnuy vendors'Yideo
ma11a.ger.et1tsoftware,SOilenu.agemHt
software is• 0oreo,tn ttianoth«s.
5. Because IP-based surveillanceplaces new demands on
existing network infrastructu res, the physical security
department has toworkwith ITto implement oreven
choose the best system, which means overcominga
traditional barrier between the two groups
b aJuation Crittril
The range of features available on network
cameras is co nstantty changing,but here
are some basic things to look for, according
to analysts.
Field of view:According to Vining, most
applications cal lfor a 2404 degreefield of
view and a zoom capability of 500 feet.For
those who need more, there are pan/tilt/
zoom (PTZ}cameras, which can provide
360-de,gree views.These can cost mo re than
twke as much as fixed cameras,Vining says,
and normal ly require more maintenance
because of their moving part.s.
Bandwidth: It's a huge issue, especially as
demand grows for more cameras on the
network and higher-resolution images.You
can reduce bandwidth consumptio n by
putting intelligence into th e camera, says
Simon Hanis, senior analyst at IMSResearch,
so, for instance, only certain images are
forward ed.However, that means you're
no t recording nonevents that may supply
needed context."You need to use that
selectivety," h e says.
Power source: The state-of-the-art
approach for network cameras is to use
power over Ethernet (POE),which means
you power the camera through the same
wire that sends the IPsignal resulting in
significant cost savings. POE is not always
available on PTZcameras, however, because
of the amount of power they consume.Also
ensure that the POE feature complies with
the IEEE802.3af standa rd so it's compatible
with network switches from leading
vendors.
Resolution: Many users are moving toward
megapi xel cameras, which offer five times
the resolution of video graph ics array (VGA)
cameras. Not onty do you get a d earer
image, but because of the higher resolution,
you can also reduce the number of cameras
you need.
Auto filtering :For image clarity in various
lighting situations, it s impo rtant to get a
camera ,vith adjustable lenses to control
the amount of light that is received.This is
especially importa nt, Vining says,w hen a
camera is facing east orwest. However, he
says, some organizations will simply elevate
camera mounts and then angle downward
to view the horizon rather than incur the
additional costs of adjustable lenses.
Open platforms: Look for vendors
that comply 100percent with industry
standa rds, such as in th e areas of
security and video compression, Gartner
recom mends.Also look for open application
program ming interfaces and multiple
supported software applications.
Scalability: Companies with large
installations will want the equipment to be
compatible with tools that locate, update
and monitor the status of the devices and
the ir IPaddresses.
Servicefsupport : Make sure the vendor
or reseller is able to send replacement
parts quickly and can readity offer
engineering support. Many network camera
manufa cturers sell indirectly th rough
channel partners, which is common in the
ITindu stry but not in the security industry.
This takes some getting used to among
traditional security personnel.
S O N Y. s
6. AVOIDINGCOMMON
MISCONCEPTIONSABOUT
VIDEOANALYTICS• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •
Videocontent analysis(AKAvideoanalytics)is
gettingbetterallthetime,butit'sstillnewenough
thatbuyersshouldproceedwitheyeswideopen
6 S O N Y.
MYTH ONE: Video analytics can replace
or surpass human performance.When
confronted with an un ike y claim about
video analytics, a good rule of thumb is to
ask the following question: could a person
watch ng the video perform the same
task?If the answer s no, then it is unlikely
that video analytics can do it either.Even
if the answer is yes, it is still possible that
the abilities of video analyticswill be
stretched •• remember, humans have been
interpreting visual images for about S
m illion years. Computers have only been
at it forabout 40 years.
THETRUTH:In most operational
environments, good analytics software
can be configured to be as capable as a
human observer at detecting important
events such as cars parking illegally,
people climbing overfences, people
entering restricted areas, and so on.This
event discrimination ability makes the
technology a significant improvement
V
ideo analytics is one of those hot
technologies that gets people
excited .The ability to use artificial
intelligence based technology to
"watch•video, extract useful information
and create alerts holds much promise for
security and surveillance applkations.
In fact, the technology can appear so
cutting edge that it often sounds more
like science fiction than reality. And,
u nfortunately, the excitement around
the tech nology has led to a marketplace
where the line between fiction and reality
h as blurred. For instance, one common
myth about video analytk s is that it
can spot a terrorist in a stadium full of
people·· something even the human
eye can't detect.Or it can automatically
"see"a person cheating at a black jack
table, while highty trained surveillance
personne l cannot. This article covers the
five biggest myths of video analytics
technology and practice, and examines
the true state of·the -art.
7. over other sensing technologies such
as b uried cables. mk rowave detectors,
and taut wire fencing.The real value of
video analytics, though, is that casts an
unblinking eye over the scene 4 4 in this
sense, it is a dramatic improvement over
huma n performance
most realistic operational scenarios,
there will be many false alarms caused by
extraneous motion and the inability of
VMD to distinguish between any motion
and a real event of interest.
THE TRUTH: Like any p roduct, there
are varying design spedfica tions beh ind
each video analytics application.Don't
be fooled into thinking that a technology
forcounting people in a retail setting
will work for perimeter protection or vke
versa. Analytics products often make
assumptions about camera orientation,
d istance to objects. numbers and types of
objects, indoor vs. outdoor environments,
illumin ation and many other factors th at
can affect performance. Make sure that
whichever products and technologies
you choose are appropriate foryour
operational environment and your
particular mission.
MYTH FOU R:Video analytics (or the
necessary hardware) is not cost effective.
Historicalty, video analytk s solutions h ave
req uired a serious capital outlay to get
MYTH TWO:Video analytics can improve
bad CCTV infrastructure. Most CCTV
systems aren't designed with video
anatytics in mind··in fact, many are designed
without human operators in mind
.Cameras are often low q uality; views are
obstructed by natural o r man-made
obstacles such as trees and buildings; and
scenes are often poorty illuminated at
night. Analytics is no "'magic bullet"'that
can see through walls o r turn night into
day. If the camera doesn't have a d ear
unobstructed view of the area of interest,
anatytks will struggle to add value.
THE TRUTH: The performance of analytk.s
systems is generallyvery acceptable in
wen-designed operating environments. If
there are enough pixels and appropriate
Analytics products often make
assumptionsabout cameraorientation,
distance to objects, numbersand types of
objects, indoorvs.outdoor environments,
illumination and manyotherfactors that
canaffect performance.
illumination to view an unobstructed area
ofinterest,detection rates are usualty
very good. Most reputable manufacturers
claim detection rates (inideal conditions) of
over 90%with very acceptable false alarm
rates · as low as 1per week per camera or
even better.
ne size fits all Cu stomers often have
ble in the field when an analytics
logy is taken outside of its comfort
ere are many different video
roducts that are designed to
erent jobs in many d ifferent
vironments. Many vendors
Video Motion Detection
t video analytk s. In a
indoor environment,
some value but in
up and running. Per camera license costs
used to be very high; systems required
large PC infrastructure footprints; and
deployment, maintenance, and training
costs were a constant financial question.
In some cases this is st ill true!This is a
very large expense for system that isn't
going to replace a human guard.force any
time soon.
THE TRUTH: Video analytics technology,
as it h as matured in the marketplace,
has become more of a value added
component of CCTVinfrastructure rather
than a stand alone enterprise software
solution.Today, it is possible to purchase
true intelligent analytics capabilities as
a feature of main·stream CCTVhardwa re
components such as: cameras; IP video
encoders; IP routers: and OVRs, NVRs, and
S O N Y. 1
8. •
video management platforms. A nalytics
features do add a premium to the prices of
these devices but the price-tag is
significantly lower than a stand alone
PC-based solution. Furthermore, more
sophisticated customers of analytics
have seen more value in analytics than
simply rep lacing a guard-force.Customers
are now reap ing value from analytics
by making their people, processes and
infrastructure more cost effective.This
is being done by using analytics to
help optim ize bandwidth and storage of
network v de·Osystem s; or by using
analytics to make foren sic investigations
faster and more personnel-efficient.
Analyticsfeatures
doadd apremium
to the prices ofthese devices but
the price-tagis
significantly lower
ttian a stand-alone
PC-based solution.
Furthermore,
moresophisticated
customers of
analytics have
seen more value
in analyticsthan
simply replacing a
guard-force.
MYTH FIVE:Video ana ytics isover·
hyped.It seems that there is a new
video ana ytics vendor hawk ng their
wares every week. Every video analytics
app ication is the best on the market: the
most robust: with fewest false alarms;
also easiest to use; and operat ng in the
w idest variety of environments; oh, and it
costs almost nothing to own.With all the
market noise, it is ditncult to separate the
wheat from the chaff of even figure out if
there is any wheat at all!
THE TRUTH:like any competitive
market w ith new and exciting techno ogy,
there w ill be outrageous claimsmade
by some less-than-scrupulous vendors.
But thisdoesn't mean that everything
ishype.We're allfamiliar w ith used car
sa espeople and yet there are a great
many good quality used carsout there.
Be suspicious of avendor who answers
•yes" to every question. Look for reputab le
vendors with proven track records.They
w ill help guide you through the process of
evaluat ng and deploying v deo analytics.
They will help set e,cpectat ons and work
w ith integrators to ensure that CCTV
infrastructure w ill be appropriate to make
your m iss on and your exper ence w ith
analytics as successful as possible.
s S O N Y.
9. LOOKSMART• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •
V
ideo analytics has come along way
from the hyped up, gee·whiz
technology of a few years ago that
promised way more than it cou d
deliver.The good news is. the technology
has improved enou gh that organ izations,
slowly but surely, are finding that analytics
tools can help them make sense of all the
video they are collecting and even find an
R O I -but only if they are careful shoppers.
Here's what to know before you beg n.
intrusio n detection, entry throu gh an
exit and so on. Some of the analytics
companies are stillfocused on only the
software.
TIP 2 - Start With Your Business NHd
- Th•n Select the Technology
The latest v deo anatytics toolsclaim to
do very sophisticated activities, from
identifying loiterers to detecting vandalism
to monitoring crowds for dropped
baggage.When evaluating your options,
you may be tempted to get carried away.
Don't. Always start with the business need,
then see if there is technology that could
fill i t -not the other way around.
Its like every other decision.What is the
return on investment, what is the value it
can bring my organization,and what can it
TIP 1 - Und•rst•nd th• Mark•tplace
Once, video analytks was largelya
software business, with applicat.ions
residing on central servers or digitalvideo
re<orders.These applkationswere (and
still are) based on algorithms that monitor
for spedfK event. s -motion detection,
help me accomplish that Ican't accomplish
any other way? Could analytk.sallow you
to reduce your security guard force? Could
it let you monitor a site remotely and save
money on gasoline? Could it help manage
all the video information you're <olle<ting
or let you <onduct investigations more
efficiently? Prices have come down, but
the te<hnology is still expensive.One way
vendors are dealing with this is by moving
to packaged models, with groups of
algorithms targeted at specific industries.
TIP 3 -Think About Wheth er On-th•·
Edt• Analytiu Makes Se n u for You
Another key decision is whether you want
to have content analysis performed "on the
edge" -that is, on digital video <ameras or
encoders, rather than on serversor DVR.s.
Analysts say this iswhere the industry is
heading, but right now you still have a lot
of options.
The advantage of on the edge analytics
is that content analysis<an be performed
when the video isof its highest quality,
before it is compressed to be sent over
the networkand stored.A traditional.
centralized model, however, provides
more flexibility. One OVRor server<an
do analytic.son more than one camera
feed,which means that <apabilities can
be dire<ted and redirected based on the
needs of the minute.
Which direction to go, says Frost &
Sullivan research analyst Dilip Sarangan,
depends largelyon your organization's
network capabilit.iesand what the IT
department iswilling to put on the
network, since video traffic tends to
be a bandwidth hog.The decision may
influence which vendors you want to
consider. Somevendors, such as Cemium,
focus on centralized tools,while others
such as toimage focus on on-the-edge
setups.A lot of vendors, however, do sell
both.
TIP 4 •Test , Test , T u t.,
B•fore You Writ. the Check
Once you identifyyour business need
and narrow down the field, it's time to
start testing.Video anatytics technology
isable to deliveron more of its promises
than it could a fewyearsago. Even
today, however, the technology must be
configured correctly, and it may not work
at all in certain situations. Fortunately,
vendors maybe willing to let you try out
the hardware or software for a month or
two beforeyou actually write any checks.
Insist on it.
S O N Y. 9
10. • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •
The growing popularity of video surveillance is fuelled by the shift
to IPvideosystemsthat arelessexpensivethan traditional analogue
systemsandmakeit easierto add orrelocatecamerasandmulticast
video signalsto multiple locations.
,o S O N Y.
11. Video-recording management software alsocan
actasatrafficcop- lielping distributevideo in
1GBblocksacrossvariousiSCSIdiskarraysonthe
network.Thisallowsforhigherstoragelimitsfor
camerasthat arecapturingvideo insensitiveor
high-trafficareaswhere alarmsare frequent.
Y
et, every system is limited by
two finite resources:network
bandwid th and d isk space.
A 100Mbps network
connection can support nearty 85
cameras producing 10·1SKB images per
second (about 1Mbps each), but the
network will be running at 100 percent
utilization.Whether the IP video system
ison the existing IT network or a parallel
network, enterprises need to set a realistic
bandwidth target and then determine how
many cameras can be supported by their
infrastructure
To en sure efficient ba ndwid th usage,
security integrators can help design fluid
systems that adjust to accommodate traffic
surges. For example, frame rates can be
red uced temporarily while the sharpness
of each image is mainta ined, o r the same
num ber of frames can be recorded at a
lower resolution.
Video conten t analysis (VCA) embedded
in an IP encoder - the device that
translates analogue camera signals into
digital - also can reduce the amo unt
of traffic sent across the network .With
VCA at the edge, it is possible to only
transmit video that generates an alarm
due to a security concern - such as a
perso n loitering, thef t of an object or an
object left behind in a scene. By selecting
spedHc portions of video to forward, VCA
diminishes the amount of ba ndwidth
req uired for surveillance but enables
all camera channe ls to be monitored
effectively.
Of course, storing all of that IPv·ideo
represents a challenge. A 200GB hard
drive can store approximately two weeks
of video da ta, depending on the quality
of video .For some industries, such
as correctional facilities and gaming,
regulations require tha t recorded video is
stored for a longer period of time - up to
30 days or even a year in some states.
Enterprises can red uce storage costs
by improving and op timizing how the
available storage is shared among cameras.
The trad itional storage approach uses
network video recorders (NVRs), whkh
are PC servers that act as ga teways to
directly attached SCSI RAID storage o r
storage-area ne twork storage. By moving
the intelligence to the edge, it is possible
to configure an IP camera or IP encoder to
stream d irectly to an iSCSI RAID, bypassing
the NVR and the associated capital and
ongoing costs.
The difference in this architecture
is pa rticularly noticeable in dispersed
systems where the WAN lacks the
ba ndwidth for centralized record ing.
Instead of installing NVRs in each building,
which can be a maintenance nightmare,
enterprises can insta llstorage that is
directly attached to IPcameras or to IP
encoders.
Consider a university with 20 buildings
and 25 cameras per building. Each
camera is recording high-quality video at
2.8Mbps per camera for 90 days.With an
NVR solution, the university would need
1,SOOTB of storage and 40 NVRs spread
over each location. With direcMo iSCSI
recording, the 40 NVR PCs are not req uired.
Multiple cameras can share the
direct tO·iSCSI RAIDs on a local record ing
network, keeping the recording load off
the main local or wide-area netwo rk.
Video traverses the backbone only when
perso nnel need to review stored vide·O.
When this occurs. the video can be shared
and searched by anyone with the proper
network access.
This approach also means that
enterprises do not lose recorded video
due to network outages or NVR server
hardwa re or sohwa re failure.
Video recording management sohwa re
also can act as a traffic cop - helping
distribute video in 1G8 blocks across
various iSCSI disk arrays o n the network.
This allows for higher storage limits for
cameras that are capturing vide·Oin
sensitive or high-traffic areas where alarms
are frequent.
Also, if one disk array fails, the
recording -manageme nt software will
simply redirect video to a backup devk e.
That results in bette r disk utilization, better
load balanci ng and greater reliability. This
architecture is also simpler, with fewer
items that can fail, and less hardware and
sohwa re for ITperso nnel to manage.
Among enterprises, there is no doubt
tha t the use of video surveillance is
growing, makin g it important that IT
managers understand the methods to
eliminate issues tha t can cause network
congestio n and failure. Record ing video at
the edge is a simple and common practice
tha t can make IPvideo surveillance systems
easier to manage and more cost-effective.
S O N Y. 11
12. • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •
TIPSTOGETYOUSTARTEDONTHERIGHTROAD
STEP 1:
D•t •rmine your u m . , H ' raison d 'i tre.
From this you'll be able to decide just
about everything else. Be on demand,
because you can't watch the cameras all
the time.You should be able to call up
the camera with the best coverage to
monitor situations if and when incidents
occur. Allow for targeted smart cameras
for high-risk areas, so that camerswill
trigger alarmswhen something beginsto
happen.
STEP 2:
T•k• •n inventory.
If yo u have cameras already, survey what
departments own them, what they are
for, how they are monitored and what
format they use, then decide if any of
these cameras can be folded into your
new system.
STEP 3:
G•t s m u t on ca mera t echnolo g i u .
Determine the effect of new technologies
on operations, training, maintenance and
staffing. Determine how clear you need
the picture to be (as opposed to how
clear yo u want it to be).Thiswill have an
impact on costs. Here are some of your
choices:
• FRAMERATE.The more frames per
second (fps) you choose, the more
network capacity each camera will require
and the more data storage you'll need.
• RESOLUTION.Similar to frame rate.
but this is not a motion issue; rather, its
a clarity issue. The clearer yo ur picture,
the more pixels it will have, the larger the
file will be and the more bandw idth it will
consume.
• COMPRESSION. There are several
standard commercial compression
algorithms. but the most common. for
,2 S O N Y.
Going mega
Network u11Hruart rupi"9 tht btntfits
ofdieme,apiul rev•lutiort, a major
btntfit th.It uirtnotr.eadiitvtd byttltir
.1..ato9uecounter,arts.tbt ntw geoeratiort
of1ae9,apixtl<amtm providetllh.lll<td
darity.11ldpractiu,I irittligenct intoany
st<urityorsuTtila•ct operation,from
.1if'1'•ru, stadiumsantistioppin9,ulls.,to
<orporatt,ba1tin9carparts andpu.ii<
spaces..theme9apixtl resolrtiort willtltt•4
your u,p,1bilityI t prottd people,property,
p,.ducu.11ldnnicts. Wrtb1J me9apixtl
rts.lutioa, thiseew gtntration of ca111er1:s
<al'lcltlivffsbirp afldvividimages.,attvt•
•idtYitwinga11gles., idealfOffortesicdetails
inst<urit)'a,ppliuitions like buiklin9tflttallctS
a11du r ,arks, theme9apixtlrange gh-tsJOU
thelevelof idt11tifimiort detailyou11ttd
•ithout creating ovtr·largefilescnsin9
bandwidt• problfflls,
14. all the right reasons, isMPEG-4.You can
add acommercial compression package
to your MPEG-4 to further reduce your
storage needs.
• STORAGE DURATION. Th rty days of
storage isthe unofficial standard.Th s
g ives enough time, without overdoing it,
tolearn of an incident before the data is
lost. When you get an event of nterest,
you should p an on dropping that file
onto a DVD and storingit ndefinitely or
at east until all cr m inal and c ivil
proceedings are concluded, ncluding
appeals.You can also send events of
interest to a separate server for indefinite
storage.
• STORAGE SIZE. A single digital
camera running 24 hours at just Sfps,
using MPEG-4 at Quarter CIF reso ution,
creates 11GBof information. A 500·
camera system, not at all uncommon for
corporate buildingsand campuses, will
generate 165 terabytes every month. So
it's easy to see why keeping pedestrian
images beyond 30 days is economk ally
foolhardy. And remember, thisis with
cameras running on spare frame rates
and resolut ons. Full motion video (30
fps) will create 990 tetabytes, almost a
petabyte, of data. If you also go to full CIF,
multiply that by four, and you're talking
a few petabytes a month! Stay on top of
the contractors and consultants so that
they st ick to the original engineering
discuss ons, or they could eas ly overdo
your system. Mission creep can be
expensive.And remember, t's not j ust
storage but also bandwidth you have
to consider.
14 S O N Y.
Atsome point you'llwant to
convert yourimages to digital
to take advantage of its easier
storage and better retrieve and
searchcapabilities.
• DIGITAL VS. ANALOGUE. At some
point you'll want to conver t your images
to digital to take advantage of ts easier
storage and better retrieve and search
capabilities. But analog images can travel
farther from the camera, socable runs
w ill impact your choices.A consultant can
adv se you on the best route to go.
• PAN T LT ZOOM (PTZ). There are
two ways to do this. The old-fash oned
way, which stillworks really well, isto
physically move the camera and change
its focus whenever you want to get a
c lose-up. Dome cameras have a dark
bubble over the camera to mask where
it ispointed at any given time. Make sure
each PTZ has a default •park• position
that gives you an op timal v·ew and focal
length. It is easy to forget to do th is and
leave a PTZ whereit waslast focused; th s
w ill likety not give you the best coverage
w hen nothing special s happen ng. The
other (more costly} way to do PTZ is
dig tally, wit hin the image itse f.This will
require megapixel images. Zooming in on,
say, a license p ate, will fuzz out the image
illegibly if you don't start with sufficient
pixel density in your camera platform.
15. Surveillance software revenue to quadruple by 2013
I
na ntw studylllathu
pote•tilllJOrwelliall
i •plkations, A.BlRes.arcll
projt<Udlatl 'fftflt e for
videowmll&ln<e softwart
will q11ad,.,.k everthe nut
fiveyears.Accotdi•gtoA.BlVi<e
Preslde•t andb seatthorertor
StanSdlatt..rneitue generned
froms.rve lancesoftwarewill
increaseto•oretMll S900
milio. ilt 2013,•Pfromairrtflt
teVtlllltSof$24$ million,
Sdlattsaysthere art se,eral
bigdri¥ersto,tilisirlaeas.t.,
i,ul• dingil'luHsed spe11dil'l9
o.securitysystffllsbydie
government Otl theftp,ewntiOf'I
sys-tenub)'rt-tailoutleuancl
oe surveillanctIt}'mil1ket
res.tarclers.AdditiOflally, he
saystflat theadvft'ltofWj.fi Ms
madeitpossibletoplacewirtless
camerasjust aboutanywhere
wllik stil sending fooU9t ba.c:k
toacentrallocatio•.
Lootingatdiebroader
pimlre,Sch.1ttsaystflat
tedinologia.ladvancesare
aboinmasir19 ttiescopeand
the poteetill usesofvideo
s•rveillance,Hesaysth.ato11e
ofthemoredist11rbin911Sesis
theabilityofstoremarlttieg
departnuntstoactllaly rnoeitor
theeyeb•H1.0-ttmentsof
customerstofi9urtolltwlwlt
productsordisplays• awtheir
atteetio11.
"WbtnstottS havethe
abilityi . ollsffl'tyo.•syou
walkthroughaSIOtt, wflatIan
il!Wlgineistlwltmorund• ore
storesw•tJ}'toba:slc.allyhave
a pretty in-dep knowledgeof
thts<11stomm,"llesays.'"Solefi
s,yfOfinstancethestoreissues
youadis<o...t anl thatalsohasa
n1ditfrequeecyIDum icleetifies
whoyouare,Atldtbenltt'ssay
thtyobserveyoulookingat,but
not a<tually pwdlasin9,rncvies
in theadglt'tideos.ection.Well,
thellt t t thiagyoublow)'Mre
9etmga ltties.e,ro,.otion.al
materialsforracymoviesyoWre
notf 'IH intHtstedia,"'
S<lwlttabo11otesth.atmore
•ndm0tt batikure lookieg
intohtstallingu • eraswith
facerecognitionallilitytohel,
pre¥ffltrotilleriesbeforethey
ne11occur,Thus,when ablowll
banlrollberentenaba11k,ttle
camera cn recogniu his face
and seedoutan alert.Winos
arealready deployi,9 this sort
offacerecognitio. software i .
•onitortheiremployees. S<hau
says, and•SWl9ittodetectwlle11
certain employeesft'lter into
•n.authorizedareasan4alerting
esecurityteam,
Sdlatt btlievesth.au s
•oresurveilancef'Cl11ipnu11t
becomesiriaeasinglydigitiud
antlsoftware-reliaet,itwill
inaeaSWlglymovtiritothe
,urviewof ITde,artmeats.. Aftd
becauu thes..neilance
softwarevastlybroadens the
e:rtenttowtiidlcompaniesand
9oven1menuca.watdl people,
itwillinf'ritablym ate privacy
co11cerJ1stllatwill havetobe
add.ressd.
"Dow•theroado. ,
behaviouris9oin9to
beoluffl'td ••dimott
fre111t11tly,andtllatkasall
Dul ofi111plk.rtion.S:hesays..
"'Imeat1, thefactthat t e (re
a<tuly lookingatyoureyebal
•Oftme11usll.wswe'v-t
ttached• wholenewreal• of
wrveillan<ecapabilities,"'
STEP 4:
Wr.stle • few more issues to th• ground.
• MONITORING . This is a contentio us
issue. The p ublic may expe<t that
cameras are monitored all the time,
b ut it s neither practical nor possible.
The best you can do is p ut your high·
p riority <amera images up in your
command center for occasional viewing.
Even better: Use analytics software to
pinpoint an event of interest and <all it
up with an aud ible alarm.
• DECOYS. It may be tempting to use
dummy camera domes to suggest you
have surveillance, this will g ive you,
p ublic a false sense of security. Most
competent p rograms avoid their use,
except in specific circumstances and
then only in concert with live cameras.
• STAFFING. It s unrealistic to expect
to be g iven additionalstaff to monitor
a new suite of camera s, and it s equally
unrealistic to expect to get different
people than the o nes you have now. For
these reasons, you will want to choose a
system that has a simple GUI (graphical
user interface), provides out-of-service
alarms for cameras and encoders, is low·
maintenance and has high mean times
between failures.
• POLICIES ANO PROCEDURES. If your
cameras can view geography off your
p roperty, consult with your sohware
p rovider to mask out these areas.This
is especially important if you have
line of sight to residential p roperties.
Supervision and the applkation of swift
discipline are very important to avoid
inappropriate use.
• TRAINING.The mo re complex your
syst em, the more training the staff will
need. This takes good time management
be<ause unless you have a full shift to go
on training rotation, you will be doing
training on overtime.
• MAINTENANCE. Include in your
maintenance contract a service-level
agreement th at g uarantees your high·
p riority camerasare fixed promptly.
Be sure it requires an adequate stock
of onsite replacement cameras and
network encoders and o ther peripheral
devices so that the most important
cameras can be restored to servk e
quickly.Yo ur system should open a
trouble ticket immediately upon d evice
failure, and you will want to review the
system's performance monthly to en sure
you are up to speed on how reliable it
is and which p arts are giving you the
most trouble.
S O N Y. 1s
17. IsSclflJbullish allowtthe s11rYeillanctmartet i11
the Mkldle la.st?Do,•.,seei te<hHl•fJ shift
(Nun aniklf H t t IP?
Yes,we areq uite optim stk in our outlook
towards thismarket.Clearty, with security
be ng on top of both pub ic and private
organizationsthere w il l be a greater focus
on th s technology for years to come.
Further, v'ideo surveillance hasvarious
emerg ing app icationsfor example for the
retail and sportsindustry both of which are
high growth areasin this region With
regards to transition from analogue to P
vte've seena big growth n demand for IP
cameras since '06 and it will cont nue to
rise.The market hasadapted by making
available hybrid products which support
both analogue as vtell as IPcameras, such
as Sony's new Hybrid NSR-1000 series of
Ne twork Surveillance Recorders.
Whit impart willhve tlte newgenerati. . of
•e9apixel ted1n.klt,hiveon t11e market ind
tflterprise Htworlut
High Definition isthe name of the game n
al lcurrent and futurevisual communication
technologies.We've seen HOw ave
influencing allConsumer and Professional
e ectronk technologiesacross the globe.
Video Security hasseen the beg nnings
of HD transition with th e ntroduction
of mega pixel'IP cameras, specifically
des gned to meet th e needs of the video
security market.The tech nology enables
a new set of applicationswhich cou ld be
delivered owing to greater v sual clarity
for surveillance.Hovtever. the end-user
applicat ons are stillin the earty stages and
it would take at least another year to check
and confirmif the intended benefitscome
th rough with acceptable trade off on P
network bandwidth and processing power
of the server.
camera is expensive,over rime « onomies
of scale' shouk l bring down the end-user
price.Sony's range of mini-do me and box
camerasare equipped with'Light Funnel
Function'and ExWavePROforhigh sensitivity
and arealso capable of' ntelligent Motion
OetectioO:ThesefeaturesaUovt effective
implementation on projects that may have
very bright or dark environments,face
identification, number plate recognition and
other such applications.
Oneofthebsues with tlleIPs11rYeilla11ctmarl:et
b ticktf • •rtet educition ind la<kof ope.n
standards. H••do,.uucklethis bsue?
We nvest a large portio n of our resources
towards market education and training on
the P video security technology .
With regards to the ssue of 'lack of open
standards'a key event occurredduring
IFSEC'OS.Three leading vendors of
ne twork video products - Sony,Axisand
8osch - began working col laboratively to
establisha globalopeninterface standard.
Open NetworkVKleo nterface Fo rum
- ONVIFwil l be the governing body to
formulate and communicate the ind ustry
standards.A standard interface will achieve
interoperability betvteen al ldifferent
vendors' products - allowing customers
to "p' k k & mix" equ pment from various
companiesand then simpty"plug & pl a y
Thisnew standard w il lofferincreased
flexibility to ntegrators and users of
network video equipment.
Willmegi pixe.lumeru ltemore Hpeu in
andwtiu kindtf ipplicitions4• Jl>Usee for
this tedlntklty?
Yes,mega pixel will cost more asthe
technology requiredto build a mega pixel
WhitisSonydoingt t lm 1npartnff n ,ertiseill
HtworllYi4eosol• t"'•ul
Weensure that our channel pannersare
have accessto free tech nk al train ing on a
regu ar basisas well as acqu re professional
guidancein key projects.Further, we are
put ting in place a processof accreditation
for our channel.Th s requires the
prospective dea er or system integrator
to com ply with the specialist skill set and
knowledge base as requiredto provide
video security solutions to end-u sers.
Weensure that ourchannel partners
are have accessto free technical
trainingon a regularbasis aswellas
acquire professionalguidancein key
projects. Further, we are putting in
place a processof accreditation for
our channel.
S O N Y. ,1
18. THEDIGITALWAVE• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •
IPvideo-surveillancesystemsofferfeaturesfarmoreadvancedthan
whatyoucangetfromstandardanalogueCCTV.SimonNash,Senior
EuropeanMarketingManager,NetworkVideoMonitoring,Sony
Europe,talksaboutwhythesesystemsarebecoming increasingly
popular intheenterprise.
VWHsum ila11c.thastr.Kil•aal ybeef!adosed·
<imiit ••alofueaffail'n i• bJthep Iseairity
naff.Now,wllat isdriri•gthesh.iftttw-ardsIP·llase4
dt9italr,ste,ut
Weareexperiencingarapid shift from existing
analogue systems to IP.This ismainly due
to customers takingadvantage of the &atest
intelligent videoanalysis.Current motion
detectionanalysiscan only alert operators
when and where to lookat images. but are
unabletoidentiy specific behaviours.With
intelligentvideoanalysis.a systemcanbe
tuned to send an alert based on highly specific
conditions appropriate to the iod ividual
cameras'rolewithinaninstallation.The
system designer cancreate hightycustomised
installationswhereeachcameraissetto de iver
arangeof alarmsto signal whenvarious
eventsoccur sothat operatorscanrespond
appropriately.Such afinetunedsystem with a
high degreeof filtering makesefficient use
of theoperator'sanention.Theydonot have
to watch muhiplescreenssimuhaneously,and
imagesthat areselectedandpresentedare
lookedat carefu ly.Intelligent lideo analysis that
makesbetter useof operatorattention
producesgreateraccuracyin monitoring with
fasterresponsetimes.Whilethenumberof
operatorsrema nsthe same.,thesystem'soverall
effectivenessincreases.
With the riseof IPbaseddigital systems.
lideo surveillancehasbecomeanother
application on thecorporate netvorkmanaged
bythe ITdepartment.
DoIPNsed syste• s,oIMphdj•st• ci•it.or91tl Wllat
newapplkatiOflsarefffler,irltl
Yes, n fact many customersare using the
counting capabilities of our cameras and
marclgement software.Wea.resee ng an
increase of this being used for many other
applications outside of traditional security
applications..
Wh t i• plkati• n:swill vide. survtill,a .cthaw o•
eatetpriseflet- .rltsas itlte<o•es111applkatiOfl!
W h do(10s11ee411toh e pi• mi•dwhile411esi9ni•ga
survtillol11ctirlfrastrltffllrel
With theiocreasedpopularity of themegapixel
cameras, thisishavingan mpacton the
bandwidth requirements.Itis mportant to
work with amanufacturer that hasa heritage
in producing H264 cameras.Sony hasbeen
producingcameraswith H.264compression
since2006.Wenow haveeight camerasusing
thisalgorithm.
<.a•vide. aiutytks hielpcompa•ies todraw
i11telllfet1<efromthieirsurwilan<e vil e .?
Yes, ntelligent video anatysisisbeing usedfor
many other applications..Forexample, retail
owners a.reusing Pcameras to not only provide
traditiorcllsecurity, but alsoheatmapp ng
fuoctions to show hot spotsin their stores..
<.a•you tel usftMltt abo..t S.ny'sDistrill•ted &illan<ed
PNctssi119Ardlit.ecturet
Sony's newIPbasedsecurityarchitectureis
a fundamental departure from today s back
heavy,centralised processor systems.As its
name suggests,DEPA distributes processing
power throughout the system to avoid
theperformance bottlenecksinherent to
preliousdesigns.A DEPA system assigns
specific processing tasksappropriate to each
separate componentwhile sharing processing
power betweenlikecomponents..Thisopens
new opportunities for system flexibility and
scalability.Overallsystem costs aregreatly
reduced by closelyintegrating preprocessing
analysis and metadatageneration inSony, DEPA
enabled Pcameras.with back end processing
in network video recorders.Inaddition, the front
end anatysisoperatesacrossall the cameras
simuhaneously.Th ssignficantly raises the
overallsecurity capabilities.
,s S O N Y.
19. Experts Group.We should note that MPEG
comp ression techniquescan also be used for
video thatissent over non-IP networks l ike
broadcast cable television systems.
MPEG-4 Part 10 hasa so been
incorporatedinto thelatest rrustandards
and thismost recent standard sreferred to as
H.264 or AdvancedVideo Coding.MPEG-4
provides asignificant improvement in both
picture quality and it doub esbandwidth
efficiencywhen compared to MPEG-2, MP-EG·
4 Part 2,or H..263 techn ques.
Forvideo, the two most common
compression techniques-MPEG-2
andMPEG-4were establishedthe
Motion Picture ExpertsGroup.
H.264 PRIMER• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •
HowvideooverIPworks
V
ideo encod ng and session controlis
more complex than techniques used
fa<voice becausei1must allow for
awider al lowance of bandwidth,i1
must includeprotocolsfor presenting pictures
on a multiple k ndsof screens,and it must
alsoincludean audiocomponent to al low for
sound that accompaniesthe picture.
In the voice world, the ITUT has
establ isheda seriesof standardsincluding
G.711, G 721,G.722,G.726, G.727,G.728,
and G.729.And once digitizedand encoded,
voice transmissions(or sessions)are typically
controlk!d by H.323 or SessionInitiation
Protocol.with SIPbe ng the strategkalty
controlk!d pro tocol.
For video, the tvo most common
compression techn iques.-MPEG-2and
MPEG-4 were established the Motion Picture
H.264" Zulreslfflbandwidth,
whllt dtl nring btttor plctun quality
PSNfl(Cl8t ........._,tt..:
A .1 , ...,..,
·OCf
IIHcl . . 1«11111
.. .10 - 1 1 ..,. .
uur.-.t1,11
..,.
) S
µ
i.1PEG..t
"
"'
"
.
i
!.11, tt tK!W1)
,oo
0 ,oo ,oo
lmprovtd quaJjty
Because the P-VOP elements of each frame
are moreaccurate, H264 will provide
better imageswith moredetai In security
applications.thiscould make a real difference.
H.264 t 1pl1intd
In MPEG-4 co mpression, each frame issub
dividedinto an nitial Video Object Plane (I·
VOP), which contains allthe anchor data, and
severalPredictiveVideo Object Planes
(P-VOPs) which p redict the difference
between the currentimage and the previous
VOP.H264 workson the same principle, but
adj usts itsdata capture for the P-VOP-sin real·
t me, to focus more accuratety on the area
wheremovement hasoccurred.Thisachieves
enhanced mageswhi lst actual ly transmitting
significantlylessdata.
ltss bandwidth
For network security users, H.264offers all
sorts of practicalbenefits.Us ng network
cameras designed to wo rk with H.264, you
will needlessbandwidth .MPEG-4 requires
approximately one-third of the bandwidth
used by JPEG; H.264 requ resjust o ne
fifth.That's a most a 40% saving between
standard MPEG-4 and H.264.
Rtductd StOTlgt
With better compression, your stored files
will take up much lessroom o n your server,
potentially saving significant sums in your
netvork storage requirements.
S O N Y. 19
24. D_esi
•
Introduce a new level of intelligence and clarity to your business - Go M a with Sony.
•
gned for ·security,Sony Megapixelcamerascombine 1.3 MegaR:ixel resolution with
,;:e
w
ExwavePRO CCD,Light Funnelwith colour filters and Intelligent Motion Detection
Oeliver high picture quality in even the most difficult lighting conditions.