SlideShare a Scribd company logo
•
How do you make a
suspect bag stand out
from the crowd?
Talkto Sony about Intelligent Object Detection.
- -
Vof c lunky cameras and closed·
ide·O surveillance is at the
front end of an astonishing
transformation. Once a world
circuit coaxial networks hardwired into a
room full of c loudy gray S·inch screens,
surveillanceis rapidly becom ing a land of
sleek, intelligent cameras linked to
sohware applicat ons running on the IP
network. Some of these applications are
basic, such as motion detection setting off
alarm s. Some are clever, such as a grocery
store system where cameras at
the checkout counter are linked to the
receipt tape.
Though CCTV still composes almost
ha f the overall video surveillance market,
its share is rapidly swindling with a surge
in IP-based digital v·ideo systems. And
proving ROI on dig tal surveillance may not
be as hard asyou th nk either.The post-9/ 1
1obsess on with secur ty created th s
surgein surveillance investment, but
what's susta ning it is that dig tal video
surveillance appears to be living up to its
hype.And, when done well, t prov des
real ROI for the business. First off, it allows
for consolidation of monitoring:You can
watch many geographically disperse
sites from one control roomHsomething
that was impossible w ith c losedcircuit
systems. An even b gger benefit of d ig tal
isthat central control and monitoring
allows you to put cameras at smaller
sites and monitor them from the central
operations center. With CCTV, you'd
require a closed system at that smaller
site and onsite monitoring, which itself
requires atleast one employee.D igital
video alsobeats tapein terms of storage
and retrieval. Tape-based system scan
requirea full t me employee just for
retrieval.
But the key to IP-based video
surveillance s appeal is the ever
expanding roster of applications
being attached to it. In other words,
surveillance isn't j ust about security
anymore.For example, in retail stores,
v deo surveillance is being used for
measuring foot traffic through a store to
understand both peak traffic t mes and
a so shoppers' brows ng hab its, which
in turn allows them to better configure
andise around the store.Of course
the surveillance s used for security as
well, but t'salso be ng utilized to train
new employees.
Training, n fact, has become a possible
killer applet for video surveillance, due
in large part to theincreased quality of
the images.Vide·Oof cashiers at a grocery
store doing their jobs correctly {and
incorrectly) is edited into video packages
that train new hires. Still others are using
cameras to improvelog stics, assembling
trainsat humpyards (where the rail cars
come off boats and trucks), for examp e,
or monitoring assembly lines for quality
control. Suddenly, surveillance is a
business enab er, not j ust barbed wire.
merch
• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •
c e o • nd .,,.,....,. ,• •
l,l.• n• 11" '11 O. . ,c to•
......A •• oc:i• t • P ubliidl••
1,1.• n• 11" '11 e .,. ,...,
......A •• oc:i• t • P ubliidl••
e.i,,cu
C h l •t 0 .• 1911+•
o .,.ia. . .. ..
()omni<' 0 . S o " '•
,,.;111 ,.....
l(w,.tt>• 11,... .,., •
J ,. ., . f h.,.b pfu••
c.. ..... .,. .
Mo,t.C.......,.,- ,a.,:i.,,
S,..,1hN•!h i+ • O . . .c t o•
11' ... ... a , .,
w•...,.,••,•••
P •o dudOOn
N• N • Hood
,. . ,. .. 1..., 1,1. .p , u ,
fliut:.l!l'I.....
J . . ,. . Th••ion
•- • , .1 > . . 0 C pl>..,<0m
C ••i<I Jot,n,,.,..,
S . .l>.c • p b o n
.... . .... .11"'•"-ii..
O Co-py ,ia,1,t 20011C PI,
- '• <'o;M• ,...,v+d ,
W hlo'" • p ul >hll. , . . .. . ... . • •,. .,y
• """' 10 +nou•• "'*..,•.,, . vol • l
'" "" "" '" " ,n I"•" '"9"'n+, .,,..,
'" ' nott+ . . .1o1... . ,. .. . 11:, """""+tftlfll l.,.n.
--=-c p
( (:olj,() f l l',8USH!I <
IM l (IIN. .h()NA
Kto• d OHie•
PO e -!U t t !
0 ......1.uAf
T•l +117l • U l l l l
,.,., 11 3» 8• 4
...-. .11,w,,w .cpd- i.c""'
S O N Y. 3
• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •
IPnetwork-basedsurveillance camerasofferenticingpossibilities.Butdoyouwantfull
orpartialIP?Howmuchbandwidth?We'llwalkyouthroughtheentireprocess.
N
etwort.:cameras for P-based
video surveil lance systems
have been arou nd s nce 1996.
These are attached directly to
the network and send video to a network
video reco rder or to a server equipped with
video management software,whk h stores,
displays or broadcasts the images.It w il lbe
another five years, according to co nsultancy
and research firm Gartner, before the market
favors P over analog.However,IP cameras are
considered a fast-growing market; according
to IMS Research, the global network video
market grew 42 percent last year and is
expected to reach $2.6 billion
by 2010.
Experts say the reasonsfor analog's
continued dom nance center ma nly around
up gradecosts and a generallack of
knowledge about networking tech nologies
in many physical security departments.
Two KtyDtcisions
When looking at your options, the first th ng
you need to consider is whether you should
use fullor partial IP.Yo u can stillget some of
the advantages of IPwh le maintaining your
investment n analog by using encoders
that convert the analog signalto one that
can run overIP.These systems work well
but are not architected for growth . Full
IPinstallationsare more streamlined and
efficient and require less maintenance.
They re digital from one end to another and
are very reliable because th ere are fewer
m oving parts.
Second, consider if there isenough
bandwidth on the co rporatebackbone.
BecauseIP-based surveil lance places
new demands on exist ng network
infrastructures, thephysicalsecurity
department has to workw ith ITto
imp ement or evenchoosethe best system,
which means overcoming a traditional
barrier between the two groups.The best
decisionson network design will be made
jo ntly between the two groups, says Jeff
Vining. research vk e president at Gartner.
Forinstance, because streaming l ive video
isbandwidth -intensive, it can be too costly
to upgrade networks o r too difficult to u se
in situations where there are many users..
To optimize bandwidth, you may need to
use application delivery control lersand/or
wide-area-network opt mizatio n controllers,
he says.
• S O N Y.
Do'sand Don'ts
•DON'Tltt cc,stbt ,our guiclirlg ligtit.Most
p,toplebuJ<al'lera.s with costastheirhlghttt
ptiorityandfffectiYfftessuttit secod, which
resuttsin grainy, o.t·of.fowsimages.There
aretoolsnailable that htlpro•cl!loost the
resolution and ltltSdlatfits,our nteds, baste!
Ofl fa,,c:torslikedistanceanda 1H u heiglit.
•OOWTttiillk s •allwhtll upgradi119from
analog/llYJt systems.
•00Hderstud the trHe-offs to11,igli·
quality il'lages. f¥Voracrisper il'lage om
saiooth motion.
•00co.siderU1elm 1tfitsc,fctnt,aliting
videosuTtila11ce.
• DON'Tassumt everything isl'lil and
•atch.WllilerunyHtwork a • ffasda.i•
compatibility with rnuy vendors'Yideo
ma11a.ger.et1tsoftware,SOilenu.agemHt
software is• 0oreo,tn ttianoth«s.
Because IP-based surveillanceplaces new demands on
existing network infrastructu res, the physical security
department has toworkwith ITto implement oreven
choose the best system, which means overcominga
traditional barrier between the two groups
b aJuation Crittril
The range of features available on network
cameras is co nstantty changing,but here
are some basic things to look for, according
to analysts.
Field of view:According to Vining, most
applications cal lfor a 2404 degreefield of
view and a zoom capability of 500 feet.For
those who need more, there are pan/tilt/
zoom (PTZ}cameras, which can provide
360-de,gree views.These can cost mo re than
twke as much as fixed cameras,Vining says,
and normal ly require more maintenance
because of their moving part.s.
Bandwidth: It's a huge issue, especially as
demand grows for more cameras on the
network and higher-resolution images.You
can reduce bandwidth consumptio n by
putting intelligence into th e camera, says
Simon Hanis, senior analyst at IMSResearch,
so, for instance, only certain images are
forward ed.However, that means you're
no t recording nonevents that may supply
needed context."You need to use that
selectivety," h e says.
Power source: The state-of-the-art
approach for network cameras is to use
power over Ethernet (POE),which means
you power the camera through the same
wire that sends the IPsignal resulting in
significant cost savings. POE is not always
available on PTZcameras, however, because
of the amount of power they consume.Also
ensure that the POE feature complies with
the IEEE802.3af standa rd so it's compatible
with network switches from leading
vendors.
Resolution: Many users are moving toward
megapi xel cameras, which offer five times
the resolution of video graph ics array (VGA)
cameras. Not onty do you get a d earer
image, but because of the higher resolution,
you can also reduce the number of cameras
you need.
Auto filtering :For image clarity in various
lighting situations, it s impo rtant to get a
camera ,vith adjustable lenses to control
the amount of light that is received.This is
especially importa nt, Vining says,w hen a
camera is facing east orwest. However, he
says, some organizations will simply elevate
camera mounts and then angle downward
to view the horizon rather than incur the
additional costs of adjustable lenses.
Open platforms: Look for vendors
that comply 100percent with industry
standa rds, such as in th e areas of
security and video compression, Gartner
recom mends.Also look for open application
program ming interfaces and multiple
supported software applications.
Scalability: Companies with large
installations will want the equipment to be
compatible with tools that locate, update
and monitor the status of the devices and
the ir IPaddresses.
Servicefsupport : Make sure the vendor
or reseller is able to send replacement
parts quickly and can readity offer
engineering support. Many network camera
manufa cturers sell indirectly th rough
channel partners, which is common in the
ITindu stry but not in the security industry.
This takes some getting used to among
traditional security personnel.
S O N Y. s
AVOIDINGCOMMON
MISCONCEPTIONSABOUT
VIDEOANALYTICS• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •
Videocontent analysis(AKAvideoanalytics)is
gettingbetterallthetime,butit'sstillnewenough
thatbuyersshouldproceedwitheyeswideopen
6 S O N Y.
MYTH ONE: Video analytics can replace
or surpass human performance.When
confronted with an un ike y claim about
video analytics, a good rule of thumb is to
ask the following question: could a person
watch ng the video perform the same
task?If the answer s no, then it is unlikely
that video analytics can do it either.Even
if the answer is yes, it is still possible that
the abilities of video analyticswill be
stretched •• remember, humans have been
interpreting visual images for about S
m illion years. Computers have only been
at it forabout 40 years.
THETRUTH:In most operational
environments, good analytics software
can be configured to be as capable as a
human observer at detecting important
events such as cars parking illegally,
people climbing overfences, people
entering restricted areas, and so on.This
event discrimination ability makes the
technology a significant improvement
V
ideo analytics is one of those hot
technologies that gets people
excited .The ability to use artificial
intelligence based technology to
"watch•video, extract useful information
and create alerts holds much promise for
security and surveillance applkations.
In fact, the technology can appear so
cutting edge that it often sounds more
like science fiction than reality. And,
u nfortunately, the excitement around
the tech nology has led to a marketplace
where the line between fiction and reality
h as blurred. For instance, one common
myth about video analytk s is that it
can spot a terrorist in a stadium full of
people·· something even the human
eye can't detect.Or it can automatically
"see"a person cheating at a black jack
table, while highty trained surveillance
personne l cannot. This article covers the
five biggest myths of video analytics
technology and practice, and examines
the true state of·the -art.
over other sensing technologies such
as b uried cables. mk rowave detectors,
and taut wire fencing.The real value of
video analytics, though, is that casts an
unblinking eye over the scene 4 4 in this
sense, it is a dramatic improvement over
huma n performance
most realistic operational scenarios,
there will be many false alarms caused by
extraneous motion and the inability of
VMD to distinguish between any motion
and a real event of interest.
THE TRUTH: Like any p roduct, there
are varying design spedfica tions beh ind
each video analytics application.Don't
be fooled into thinking that a technology
forcounting people in a retail setting
will work for perimeter protection or vke
versa. Analytics products often make
assumptions about camera orientation,
d istance to objects. numbers and types of
objects, indoor vs. outdoor environments,
illumin ation and many other factors th at
can affect performance. Make sure that
whichever products and technologies
you choose are appropriate foryour
operational environment and your
particular mission.
MYTH FOU R:Video analytics (or the
necessary hardware) is not cost effective.
Historicalty, video analytk s solutions h ave
req uired a serious capital outlay to get
MYTH TWO:Video analytics can improve
bad CCTV infrastructure. Most CCTV
systems aren't designed with video
anatytics in mind··in fact, many are designed
without human operators in mind
.Cameras are often low q uality; views are
obstructed by natural o r man-made
obstacles such as trees and buildings; and
scenes are often poorty illuminated at
night. Analytics is no "'magic bullet"'that
can see through walls o r turn night into
day. If the camera doesn't have a d ear
unobstructed view of the area of interest,
anatytks will struggle to add value.
THE TRUTH: The performance of analytk.s
systems is generallyvery acceptable in
wen-designed operating environments. If
there are enough pixels and appropriate
Analytics products often make
assumptionsabout cameraorientation,
distance to objects, numbersand types of
objects, indoorvs.outdoor environments,
illumination and manyotherfactors that
canaffect performance.
illumination to view an unobstructed area
ofinterest,detection rates are usualty
very good. Most reputable manufacturers
claim detection rates (inideal conditions) of
over 90%with very acceptable false alarm
rates · as low as 1per week per camera or
even better.
ne size fits all Cu stomers often have
ble in the field when an analytics
logy is taken outside of its comfort
ere are many different video
roducts that are designed to
erent jobs in many d ifferent
vironments. Many vendors
Video Motion Detection
t video analytk s. In a
indoor environment,
some value but in
up and running. Per camera license costs
used to be very high; systems required
large PC infrastructure footprints; and
deployment, maintenance, and training
costs were a constant financial question.
In some cases this is st ill true!This is a
very large expense for system that isn't
going to replace a human guard.force any
time soon.
THE TRUTH: Video analytics technology,
as it h as matured in the marketplace,
has become more of a value added
component of CCTVinfrastructure rather
than a stand alone enterprise software
solution.Today, it is possible to purchase
true intelligent analytics capabilities as
a feature of main·stream CCTVhardwa re
components such as: cameras; IP video
encoders; IP routers: and OVRs, NVRs, and
S O N Y. 1
•
video management platforms. A nalytics
features do add a premium to the prices of
these devices but the price-tag is
significantly lower than a stand alone
PC-based solution. Furthermore, more
sophisticated customers of analytics
have seen more value in analytics than
simply rep lacing a guard-force.Customers
are now reap ing value from analytics
by making their people, processes and
infrastructure more cost effective.This
is being done by using analytics to
help optim ize bandwidth and storage of
network v de·Osystem s; or by using
analytics to make foren sic investigations
faster and more personnel-efficient.
Analyticsfeatures
doadd apremium
to the prices ofthese devices but
the price-tagis
significantly lower
ttian a stand-alone
PC-based solution.
Furthermore,
moresophisticated
customers of
analytics have
seen more value
in analyticsthan
simply replacing a
guard-force.
MYTH FIVE:Video ana ytics isover·
hyped.It seems that there is a new
video ana ytics vendor hawk ng their
wares every week. Every video analytics
app ication is the best on the market: the
most robust: with fewest false alarms;
also easiest to use; and operat ng in the
w idest variety of environments; oh, and it
costs almost nothing to own.With all the
market noise, it is ditncult to separate the
wheat from the chaff of even figure out if
there is any wheat at all!
THE TRUTH:like any competitive
market w ith new and exciting techno ogy,
there w ill be outrageous claimsmade
by some less-than-scrupulous vendors.
But thisdoesn't mean that everything
ishype.We're allfamiliar w ith used car
sa espeople and yet there are a great
many good quality used carsout there.
Be suspicious of avendor who answers
•yes" to every question. Look for reputab le
vendors with proven track records.They
w ill help guide you through the process of
evaluat ng and deploying v deo analytics.
They will help set e,cpectat ons and work
w ith integrators to ensure that CCTV
infrastructure w ill be appropriate to make
your m iss on and your exper ence w ith
analytics as successful as possible.
s S O N Y.
LOOKSMART• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •
V
ideo analytics has come along way
from the hyped up, gee·whiz
technology of a few years ago that
promised way more than it cou d
deliver.The good news is. the technology
has improved enou gh that organ izations,
slowly but surely, are finding that analytics
tools can help them make sense of all the
video they are collecting and even find an
R O I -but only if they are careful shoppers.
Here's what to know before you beg n.
intrusio n detection, entry throu gh an
exit and so on. Some of the analytics
companies are stillfocused on only the
software.
TIP 2 - Start With Your Business NHd
- Th•n Select the Technology
The latest v deo anatytics toolsclaim to
do very sophisticated activities, from
identifying loiterers to detecting vandalism
to monitoring crowds for dropped
baggage.When evaluating your options,
you may be tempted to get carried away.
Don't. Always start with the business need,
then see if there is technology that could
fill i t -not the other way around.
Its like every other decision.What is the
return on investment, what is the value it
can bring my organization,and what can it
TIP 1 - Und•rst•nd th• Mark•tplace
Once, video analytks was largelya
software business, with applicat.ions
residing on central servers or digitalvideo
re<orders.These applkationswere (and
still are) based on algorithms that monitor
for spedfK event. s -motion detection,
help me accomplish that Ican't accomplish
any other way? Could analytk.sallow you
to reduce your security guard force? Could
it let you monitor a site remotely and save
money on gasoline? Could it help manage
all the video information you're <olle<ting
or let you <onduct investigations more
efficiently? Prices have come down, but
the te<hnology is still expensive.One way
vendors are dealing with this is by moving
to packaged models, with groups of
algorithms targeted at specific industries.
TIP 3 -Think About Wheth er On-th•·
Edt• Analytiu Makes Se n u for You
Another key decision is whether you want
to have content analysis performed "on the
edge" -that is, on digital video <ameras or
encoders, rather than on serversor DVR.s.
Analysts say this iswhere the industry is
heading, but right now you still have a lot
of options.
The advantage of on the edge analytics
is that content analysis<an be performed
when the video isof its highest quality,
before it is compressed to be sent over
the networkand stored.A traditional.
centralized model, however, provides
more flexibility. One OVRor server<an
do analytic.son more than one camera
feed,which means that <apabilities can
be dire<ted and redirected based on the
needs of the minute.
Which direction to go, says Frost &
Sullivan research analyst Dilip Sarangan,
depends largelyon your organization's
network capabilit.iesand what the IT
department iswilling to put on the
network, since video traffic tends to
be a bandwidth hog.The decision may
influence which vendors you want to
consider. Somevendors, such as Cemium,
focus on centralized tools,while others
such as toimage focus on on-the-edge
setups.A lot of vendors, however, do sell
both.
TIP 4 •Test , Test , T u t.,
B•fore You Writ. the Check
Once you identifyyour business need
and narrow down the field, it's time to
start testing.Video anatytics technology
isable to deliveron more of its promises
than it could a fewyearsago. Even
today, however, the technology must be
configured correctly, and it may not work
at all in certain situations. Fortunately,
vendors maybe willing to let you try out
the hardware or software for a month or
two beforeyou actually write any checks.
Insist on it.
S O N Y. 9
• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •
The growing popularity of video surveillance is fuelled by the shift
to IPvideosystemsthat arelessexpensivethan traditional analogue
systemsandmakeit easierto add orrelocatecamerasandmulticast
video signalsto multiple locations.
,o S O N Y.
Video-recording management software alsocan
actasatrafficcop- lielping distributevideo in
1GBblocksacrossvariousiSCSIdiskarraysonthe
network.Thisallowsforhigherstoragelimitsfor
camerasthat arecapturingvideo insensitiveor
high-trafficareaswhere alarmsare frequent.
Y
et, every system is limited by
two finite resources:network
bandwid th and d isk space.
A 100Mbps network
connection can support nearty 85
cameras producing 10·1SKB images per
second (about 1Mbps each), but the
network will be running at 100 percent
utilization.Whether the IP video system
ison the existing IT network or a parallel
network, enterprises need to set a realistic
bandwidth target and then determine how
many cameras can be supported by their
infrastructure
To en sure efficient ba ndwid th usage,
security integrators can help design fluid
systems that adjust to accommodate traffic
surges. For example, frame rates can be
red uced temporarily while the sharpness
of each image is mainta ined, o r the same
num ber of frames can be recorded at a
lower resolution.
Video conten t analysis (VCA) embedded
in an IP encoder - the device that
translates analogue camera signals into
digital - also can reduce the amo unt
of traffic sent across the network .With
VCA at the edge, it is possible to only
transmit video that generates an alarm
due to a security concern - such as a
perso n loitering, thef t of an object or an
object left behind in a scene. By selecting
spedHc portions of video to forward, VCA
diminishes the amount of ba ndwidth
req uired for surveillance but enables
all camera channe ls to be monitored
effectively.
Of course, storing all of that IPv·ideo
represents a challenge. A 200GB hard
drive can store approximately two weeks
of video da ta, depending on the quality
of video .For some industries, such
as correctional facilities and gaming,
regulations require tha t recorded video is
stored for a longer period of time - up to
30 days or even a year in some states.
Enterprises can red uce storage costs
by improving and op timizing how the
available storage is shared among cameras.
The trad itional storage approach uses
network video recorders (NVRs), whkh
are PC servers that act as ga teways to
directly attached SCSI RAID storage o r
storage-area ne twork storage. By moving
the intelligence to the edge, it is possible
to configure an IP camera or IP encoder to
stream d irectly to an iSCSI RAID, bypassing
the NVR and the associated capital and
ongoing costs.
The difference in this architecture
is pa rticularly noticeable in dispersed
systems where the WAN lacks the
ba ndwidth for centralized record ing.
Instead of installing NVRs in each building,
which can be a maintenance nightmare,
enterprises can insta llstorage that is
directly attached to IPcameras or to IP
encoders.
Consider a university with 20 buildings
and 25 cameras per building. Each
camera is recording high-quality video at
2.8Mbps per camera for 90 days.With an
NVR solution, the university would need
1,SOOTB of storage and 40 NVRs spread
over each location. With direcMo iSCSI
recording, the 40 NVR PCs are not req uired.
Multiple cameras can share the
direct tO·iSCSI RAIDs on a local record ing
network, keeping the recording load off
the main local or wide-area netwo rk.
Video traverses the backbone only when
perso nnel need to review stored vide·O.
When this occurs. the video can be shared
and searched by anyone with the proper
network access.
This approach also means that
enterprises do not lose recorded video
due to network outages or NVR server
hardwa re or sohwa re failure.
Video recording management sohwa re
also can act as a traffic cop - helping
distribute video in 1G8 blocks across
various iSCSI disk arrays o n the network.
This allows for higher storage limits for
cameras that are capturing vide·Oin
sensitive or high-traffic areas where alarms
are frequent.
Also, if one disk array fails, the
recording -manageme nt software will
simply redirect video to a backup devk e.
That results in bette r disk utilization, better
load balanci ng and greater reliability. This
architecture is also simpler, with fewer
items that can fail, and less hardware and
sohwa re for ITperso nnel to manage.
Among enterprises, there is no doubt
tha t the use of video surveillance is
growing, makin g it important that IT
managers understand the methods to
eliminate issues tha t can cause network
congestio n and failure. Record ing video at
the edge is a simple and common practice
tha t can make IPvideo surveillance systems
easier to manage and more cost-effective.
S O N Y. 11
• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •
TIPSTOGETYOUSTARTEDONTHERIGHTROAD
STEP 1:
D•t •rmine your u m . , H ' raison d 'i tre.
From this you'll be able to decide just
about everything else. Be on demand,
because you can't watch the cameras all
the time.You should be able to call up
the camera with the best coverage to
monitor situations if and when incidents
occur. Allow for targeted smart cameras
for high-risk areas, so that camerswill
trigger alarmswhen something beginsto
happen.
STEP 2:
T•k• •n inventory.
If yo u have cameras already, survey what
departments own them, what they are
for, how they are monitored and what
format they use, then decide if any of
these cameras can be folded into your
new system.
STEP 3:
G•t s m u t on ca mera t echnolo g i u .
Determine the effect of new technologies
on operations, training, maintenance and
staffing. Determine how clear you need
the picture to be (as opposed to how
clear yo u want it to be).Thiswill have an
impact on costs. Here are some of your
choices:
• FRAMERATE.The more frames per
second (fps) you choose, the more
network capacity each camera will require
and the more data storage you'll need.
• RESOLUTION.Similar to frame rate.
but this is not a motion issue; rather, its
a clarity issue. The clearer yo ur picture,
the more pixels it will have, the larger the
file will be and the more bandw idth it will
consume.
• COMPRESSION. There are several
standard commercial compression
algorithms. but the most common. for
,2 S O N Y.
Going mega
Network u11Hruart rupi"9 tht btntfits
ofdieme,apiul rev•lutiort, a major
btntfit th.It uirtnotr.eadiitvtd byttltir
.1..ato9uecounter,arts.tbt ntw geoeratiort
of1ae9,apixtl<amtm providetllh.lll<td
darity.11ldpractiu,I irittligenct intoany
st<urityorsuTtila•ct operation,from
.1if'1'•ru, stadiumsantistioppin9,ulls.,to
<orporatt,ba1tin9carparts andpu.ii<
spaces..theme9apixtl resolrtiort willtltt•4
your u,p,1bilityI t prottd people,property,
p,.ducu.11ldnnicts. Wrtb1J me9apixtl
rts.lutioa, thiseew gtntration of ca111er1:s
<al'lcltlivffsbirp afldvividimages.,attvt•
•idtYitwinga11gles., idealfOffortesicdetails
inst<urit)'a,ppliuitions like buiklin9tflttallctS
a11du r ,arks, theme9apixtlrange gh-tsJOU
thelevelof idt11tifimiort detailyou11ttd
•ithout creating ovtr·largefilescnsin9
bandwidt• problfflls,
S O N Y. ,3
all the right reasons, isMPEG-4.You can
add acommercial compression package
to your MPEG-4 to further reduce your
storage needs.
• STORAGE DURATION. Th rty days of
storage isthe unofficial standard.Th s
g ives enough time, without overdoing it,
tolearn of an incident before the data is
lost. When you get an event of nterest,
you should p an on dropping that file
onto a DVD and storingit ndefinitely or
at east until all cr m inal and c ivil
proceedings are concluded, ncluding
appeals.You can also send events of
interest to a separate server for indefinite
storage.
• STORAGE SIZE. A single digital
camera running 24 hours at just Sfps,
using MPEG-4 at Quarter CIF reso ution,
creates 11GBof information. A 500·
camera system, not at all uncommon for
corporate buildingsand campuses, will
generate 165 terabytes every month. So
it's easy to see why keeping pedestrian
images beyond 30 days is economk ally
foolhardy. And remember, thisis with
cameras running on spare frame rates
and resolut ons. Full motion video (30
fps) will create 990 tetabytes, almost a
petabyte, of data. If you also go to full CIF,
multiply that by four, and you're talking
a few petabytes a month! Stay on top of
the contractors and consultants so that
they st ick to the original engineering
discuss ons, or they could eas ly overdo
your system. Mission creep can be
expensive.And remember, t's not j ust
storage but also bandwidth you have
to consider.
14 S O N Y.
Atsome point you'llwant to
convert yourimages to digital
to take advantage of its easier
storage and better retrieve and
searchcapabilities.
• DIGITAL VS. ANALOGUE. At some
point you'll want to conver t your images
to digital to take advantage of ts easier
storage and better retrieve and search
capabilities. But analog images can travel
farther from the camera, socable runs
w ill impact your choices.A consultant can
adv se you on the best route to go.
• PAN T LT ZOOM (PTZ). There are
two ways to do this. The old-fash oned
way, which stillworks really well, isto
physically move the camera and change
its focus whenever you want to get a
c lose-up. Dome cameras have a dark
bubble over the camera to mask where
it ispointed at any given time. Make sure
each PTZ has a default •park• position
that gives you an op timal v·ew and focal
length. It is easy to forget to do th is and
leave a PTZ whereit waslast focused; th s
w ill likety not give you the best coverage
w hen nothing special s happen ng. The
other (more costly} way to do PTZ is
dig tally, wit hin the image itse f.This will
require megapixel images. Zooming in on,
say, a license p ate, will fuzz out the image
illegibly if you don't start with sufficient
pixel density in your camera platform.
Surveillance software revenue to quadruple by 2013
I
na ntw studylllathu
pote•tilllJOrwelliall
i •plkations, A.BlRes.arcll
projt<Udlatl 'fftflt e for
videowmll&ln<e softwart
will q11ad,.,.k everthe nut
fiveyears.Accotdi•gtoA.BlVi<e
Preslde•t andb seatthorertor
StanSdlatt..rneitue generned
froms.rve lancesoftwarewill
increaseto•oretMll S900
milio. ilt 2013,•Pfromairrtflt
teVtlllltSof$24$ million,
Sdlattsaysthere art se,eral
bigdri¥ersto,tilisirlaeas.t.,
i,ul• dingil'luHsed spe11dil'l9
o.securitysystffllsbydie
government Otl theftp,ewntiOf'I
sys-tenub)'rt-tailoutleuancl
oe surveillanctIt}'mil1ket
res.tarclers.AdditiOflally, he
saystflat theadvft'ltofWj.fi Ms
madeitpossibletoplacewirtless
camerasjust aboutanywhere
wllik stil sending fooU9t ba.c:k
toacentrallocatio•.
Lootingatdiebroader
pimlre,Sch.1ttsaystflat
tedinologia.ladvancesare
aboinmasir19 ttiescopeand
the poteetill usesofvideo
s•rveillance,Hesaysth.ato11e
ofthemoredist11rbin911Sesis
theabilityofstoremarlttieg
departnuntstoactllaly rnoeitor
theeyeb•H1.0-ttmentsof
customerstofi9urtolltwlwlt
productsordisplays• awtheir
atteetio11.
"WbtnstottS havethe
abilityi . ollsffl'tyo.•syou
walkthroughaSIOtt, wflatIan
il!Wlgineistlwltmorund• ore
storesw•tJ}'toba:slc.allyhave
a pretty in-dep knowledgeof
thts<11stomm,"llesays.'"Solefi
s,yfOfinstancethestoreissues
youadis<o...t anl thatalsohasa
n1ditfrequeecyIDum icleetifies
whoyouare,Atldtbenltt'ssay
thtyobserveyoulookingat,but
not a<tually pwdlasin9,rncvies
in theadglt'tideos.ection.Well,
thellt t t thiagyoublow)'Mre
9etmga ltties.e,ro,.otion.al
materialsforracymoviesyoWre
notf 'IH intHtstedia,"'
S<lwlttabo11otesth.atmore
•ndm0tt batikure lookieg
intohtstallingu • eraswith
facerecognitionallilitytohel,
pre¥ffltrotilleriesbeforethey
ne11occur,Thus,when ablowll
banlrollberentenaba11k,ttle
camera cn recogniu his face
and seedoutan alert.Winos
arealready deployi,9 this sort
offacerecognitio. software i .
•onitortheiremployees. S<hau
says, and•SWl9ittodetectwlle11
certain employeesft'lter into
•n.authorizedareasan4alerting
esecurityteam,
Sdlatt btlievesth.au s
•oresurveilancef'Cl11ipnu11t
becomesiriaeasinglydigitiud
antlsoftware-reliaet,itwill
inaeaSWlglymovtiritothe
,urviewof ITde,artmeats.. Aftd
becauu thes..neilance
softwarevastlybroadens the
e:rtenttowtiidlcompaniesand
9oven1menuca.watdl people,
itwillinf'ritablym ate privacy
co11cerJ1stllatwill havetobe
add.ressd.
"Dow•theroado. ,
behaviouris9oin9to
beoluffl'td ••dimott
fre111t11tly,andtllatkasall
Dul ofi111plk.rtion.S:hesays..
"'Imeat1, thefactthat t e (re
a<tuly lookingatyoureyebal
•Oftme11usll.wswe'v-t
ttached• wholenewreal• of
wrveillan<ecapabilities,"'
STEP 4:
Wr.stle • few more issues to th• ground.
• MONITORING . This is a contentio us
issue. The p ublic may expe<t that
cameras are monitored all the time,
b ut it s neither practical nor possible.
The best you can do is p ut your high·
p riority <amera images up in your
command center for occasional viewing.
Even better: Use analytics software to
pinpoint an event of interest and <all it
up with an aud ible alarm.
• DECOYS. It may be tempting to use
dummy camera domes to suggest you
have surveillance, this will g ive you,
p ublic a false sense of security. Most
competent p rograms avoid their use,
except in specific circumstances and
then only in concert with live cameras.
• STAFFING. It s unrealistic to expect
to be g iven additionalstaff to monitor
a new suite of camera s, and it s equally
unrealistic to expect to get different
people than the o nes you have now. For
these reasons, you will want to choose a
system that has a simple GUI (graphical
user interface), provides out-of-service
alarms for cameras and encoders, is low·
maintenance and has high mean times
between failures.
• POLICIES ANO PROCEDURES. If your
cameras can view geography off your
p roperty, consult with your sohware
p rovider to mask out these areas.This
is especially important if you have
line of sight to residential p roperties.
Supervision and the applkation of swift
discipline are very important to avoid
inappropriate use.
• TRAINING.The mo re complex your
syst em, the more training the staff will
need. This takes good time management
be<ause unless you have a full shift to go
on training rotation, you will be doing
training on overtime.
• MAINTENANCE. Include in your
maintenance contract a service-level
agreement th at g uarantees your high·
p riority camerasare fixed promptly.
Be sure it requires an adequate stock
of onsite replacement cameras and
network encoders and o ther peripheral
devices so that the most important
cameras can be restored to servk e
quickly.Yo ur system should open a
trouble ticket immediately upon d evice
failure, and you will want to review the
system's performance monthly to en sure
you are up to speed on how reliable it
is and which p arts are giving you the
most trouble.
S O N Y. 1s
• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •
•
Sonyisattheforefront ofthedigital
rangingportfolioofproductsandsol
Manager, Sony Professional Solution
trends inthe regionalmarket.
• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •
neerevolution,offeringawide
MageshSrinivasan, Marketing
East,encapsulatessomeofthe key
16 S O N Y.
IsSclflJbullish allowtthe s11rYeillanctmartet i11
the Mkldle la.st?Do,•.,seei te<hHl•fJ shift
(Nun aniklf H t t IP?
Yes,we areq uite optim stk in our outlook
towards thismarket.Clearty, with security
be ng on top of both pub ic and private
organizationsthere w il l be a greater focus
on th s technology for years to come.
Further, v'ideo surveillance hasvarious
emerg ing app icationsfor example for the
retail and sportsindustry both of which are
high growth areasin this region With
regards to transition from analogue to P
vte've seena big growth n demand for IP
cameras since '06 and it will cont nue to
rise.The market hasadapted by making
available hybrid products which support
both analogue as vtell as IPcameras, such
as Sony's new Hybrid NSR-1000 series of
Ne twork Surveillance Recorders.
Whit impart willhve tlte newgenerati. . of
•e9apixel ted1n.klt,hiveon t11e market ind
tflterprise Htworlut
High Definition isthe name of the game n
al lcurrent and futurevisual communication
technologies.We've seen HOw ave
influencing allConsumer and Professional
e ectronk technologiesacross the globe.
Video Security hasseen the beg nnings
of HD transition with th e ntroduction
of mega pixel'IP cameras, specifically
des gned to meet th e needs of the video
security market.The tech nology enables
a new set of applicationswhich cou ld be
delivered owing to greater v sual clarity
for surveillance.Hovtever. the end-user
applicat ons are stillin the earty stages and
it would take at least another year to check
and confirmif the intended benefitscome
th rough with acceptable trade off on P
network bandwidth and processing power
of the server.
camera is expensive,over rime « onomies
of scale' shouk l bring down the end-user
price.Sony's range of mini-do me and box
camerasare equipped with'Light Funnel
Function'and ExWavePROforhigh sensitivity
and arealso capable of' ntelligent Motion
OetectioO:ThesefeaturesaUovt effective
implementation on projects that may have
very bright or dark environments,face
identification, number plate recognition and
other such applications.
Oneofthebsues with tlleIPs11rYeilla11ctmarl:et
b ticktf • •rtet educition ind la<kof ope.n
standards. H••do,.uucklethis bsue?
We nvest a large portio n of our resources
towards market education and training on
the P video security technology .
With regards to the ssue of 'lack of open
standards'a key event occurredduring
IFSEC'OS.Three leading vendors of
ne twork video products - Sony,Axisand
8osch - began working col laboratively to
establisha globalopeninterface standard.
Open NetworkVKleo nterface Fo rum
- ONVIFwil l be the governing body to
formulate and communicate the ind ustry
standards.A standard interface will achieve
interoperability betvteen al ldifferent
vendors' products - allowing customers
to "p' k k & mix" equ pment from various
companiesand then simpty"plug & pl a y
Thisnew standard w il lofferincreased
flexibility to ntegrators and users of
network video equipment.
Willmegi pixe.lumeru ltemore Hpeu in
andwtiu kindtf ipplicitions4• Jl>Usee for
this tedlntklty?
Yes,mega pixel will cost more asthe
technology requiredto build a mega pixel
WhitisSonydoingt t lm 1npartnff n ,ertiseill
HtworllYi4eosol• t"'•ul
Weensure that our channel pannersare
have accessto free tech nk al train ing on a
regu ar basisas well as acqu re professional
guidancein key projects.Further, we are
put ting in place a processof accreditation
for our channel.Th s requires the
prospective dea er or system integrator
to com ply with the specialist skill set and
knowledge base as requiredto provide
video security solutions to end-u sers.
Weensure that ourchannel partners
are have accessto free technical
trainingon a regularbasis aswellas
acquire professionalguidancein key
projects. Further, we are putting in
place a processof accreditation for
our channel.
S O N Y. ,1
THEDIGITALWAVE• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •
IPvideo-surveillancesystemsofferfeaturesfarmoreadvancedthan
whatyoucangetfromstandardanalogueCCTV.SimonNash,Senior
EuropeanMarketingManager,NetworkVideoMonitoring,Sony
Europe,talksaboutwhythesesystemsarebecoming increasingly
popular intheenterprise.
VWHsum ila11c.thastr.Kil•aal ybeef!adosed·
<imiit ••alofueaffail'n i• bJthep Iseairity
naff.Now,wllat isdriri•gthesh.iftttw-ardsIP·llase4
dt9italr,ste,ut
Weareexperiencingarapid shift from existing
analogue systems to IP.This ismainly due
to customers takingadvantage of the &atest
intelligent videoanalysis.Current motion
detectionanalysiscan only alert operators
when and where to lookat images. but are
unabletoidentiy specific behaviours.With
intelligentvideoanalysis.a systemcanbe
tuned to send an alert based on highly specific
conditions appropriate to the iod ividual
cameras'rolewithinaninstallation.The
system designer cancreate hightycustomised
installationswhereeachcameraissetto de iver
arangeof alarmsto signal whenvarious
eventsoccur sothat operatorscanrespond
appropriately.Such afinetunedsystem with a
high degreeof filtering makesefficient use
of theoperator'sanention.Theydonot have
to watch muhiplescreenssimuhaneously,and
imagesthat areselectedandpresentedare
lookedat carefu ly.Intelligent lideo analysis that
makesbetter useof operatorattention
producesgreateraccuracyin monitoring with
fasterresponsetimes.Whilethenumberof
operatorsrema nsthe same.,thesystem'soverall
effectivenessincreases.
With the riseof IPbaseddigital systems.
lideo surveillancehasbecomeanother
application on thecorporate netvorkmanaged
bythe ITdepartment.
DoIPNsed syste• s,oIMphdj•st• ci•it.or91tl Wllat
newapplkatiOflsarefffler,irltl
Yes, n fact many customersare using the
counting capabilities of our cameras and
marclgement software.Wea.resee ng an
increase of this being used for many other
applications outside of traditional security
applications..
Wh t i• plkati• n:swill vide. survtill,a .cthaw o•
eatetpriseflet- .rltsas itlte<o•es111applkatiOfl!
W h do(10s11ee411toh e pi• mi•dwhile411esi9ni•ga
survtillol11ctirlfrastrltffllrel
With theiocreasedpopularity of themegapixel
cameras, thisishavingan mpacton the
bandwidth requirements.Itis mportant to
work with amanufacturer that hasa heritage
in producing H264 cameras.Sony hasbeen
producingcameraswith H.264compression
since2006.Wenow haveeight camerasusing
thisalgorithm.
<.a•vide. aiutytks hielpcompa•ies todraw
i11telllfet1<efromthieirsurwilan<e vil e .?
Yes, ntelligent video anatysisisbeing usedfor
many other applications..Forexample, retail
owners a.reusing Pcameras to not only provide
traditiorcllsecurity, but alsoheatmapp ng
fuoctions to show hot spotsin their stores..
<.a•you tel usftMltt abo..t S.ny'sDistrill•ted &illan<ed
PNctssi119Ardlit.ecturet
Sony's newIPbasedsecurityarchitectureis
a fundamental departure from today s back
heavy,centralised processor systems.As its
name suggests,DEPA distributes processing
power throughout the system to avoid
theperformance bottlenecksinherent to
preliousdesigns.A DEPA system assigns
specific processing tasksappropriate to each
separate componentwhile sharing processing
power betweenlikecomponents..Thisopens
new opportunities for system flexibility and
scalability.Overallsystem costs aregreatly
reduced by closelyintegrating preprocessing
analysis and metadatageneration inSony, DEPA
enabled Pcameras.with back end processing
in network video recorders.Inaddition, the front
end anatysisoperatesacrossall the cameras
simuhaneously.Th ssignficantly raises the
overallsecurity capabilities.
,s S O N Y.
Experts Group.We should note that MPEG
comp ression techniquescan also be used for
video thatissent over non-IP networks l ike
broadcast cable television systems.
MPEG-4 Part 10 hasa so been
incorporatedinto thelatest rrustandards
and thismost recent standard sreferred to as
H.264 or AdvancedVideo Coding.MPEG-4
provides asignificant improvement in both
picture quality and it doub esbandwidth
efficiencywhen compared to MPEG-2, MP-EG·
4 Part 2,or H..263 techn ques.
Forvideo, the two most common
compression techniques-MPEG-2
andMPEG-4were establishedthe
Motion Picture ExpertsGroup.
H.264 PRIMER• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • •
HowvideooverIPworks
V
ideo encod ng and session controlis
more complex than techniques used
fa<voice becausei1must allow for
awider al lowance of bandwidth,i1
must includeprotocolsfor presenting pictures
on a multiple k ndsof screens,and it must
alsoincludean audiocomponent to al low for
sound that accompaniesthe picture.
In the voice world, the ITUT has
establ isheda seriesof standardsincluding
G.711, G 721,G.722,G.726, G.727,G.728,
and G.729.And once digitizedand encoded,
voice transmissions(or sessions)are typically
controlk!d by H.323 or SessionInitiation
Protocol.with SIPbe ng the strategkalty
controlk!d pro tocol.
For video, the tvo most common
compression techn iques.-MPEG-2and
MPEG-4 were established the Motion Picture
H.264" Zulreslfflbandwidth,
whllt dtl nring btttor plctun quality
PSNfl(Cl8t ........._,tt..:
A .1 , ...,..,
·OCf
IIHcl . . 1«11111
.. .10 - 1 1 ..,. .
uur.-.t1,11
..,.
) S
µ
i.1PEG..t
"
"'
"
.
i
!.11, tt tK!W1)
,oo
0 ,oo ,oo
lmprovtd quaJjty
Because the P-VOP elements of each frame
are moreaccurate, H264 will provide
better imageswith moredetai In security
applications.thiscould make a real difference.
H.264 t 1pl1intd
In MPEG-4 co mpression, each frame issub
dividedinto an nitial Video Object Plane (I·
VOP), which contains allthe anchor data, and
severalPredictiveVideo Object Planes
(P-VOPs) which p redict the difference
between the currentimage and the previous
VOP.H264 workson the same principle, but
adj usts itsdata capture for the P-VOP-sin real·
t me, to focus more accuratety on the area
wheremovement hasoccurred.Thisachieves
enhanced mageswhi lst actual ly transmitting
significantlylessdata.
ltss bandwidth
For network security users, H.264offers all
sorts of practicalbenefits.Us ng network
cameras designed to wo rk with H.264, you
will needlessbandwidth .MPEG-4 requires
approximately one-third of the bandwidth
used by JPEG; H.264 requ resjust o ne
fifth.That's a most a 40% saving between
standard MPEG-4 and H.264.
Rtductd StOTlgt
With better compression, your stored files
will take up much lessroom o n your server,
potentially saving significant sums in your
netvork storage requirements.
S O N Y. 19
Ph1!1p Robinson, 0 0 ,Shal)ah Teaching Hospital
D_esi
•
Introduce a new level of intelligence and clarity to your business - Go M a with Sony.
•
gned for ·security,Sony Megapixelcamerascombine 1.3 MegaR:ixel resolution with
,;:e
w
ExwavePRO CCD,Light Funnelwith colour filters and Intelligent Motion Detection
Oeliver high picture quality in even the most difficult lighting conditions.

More Related Content

Similar to SONY SECURITY CIO survival guide

Detailed study of_cctv_cameras
Detailed study of_cctv_camerasDetailed study of_cctv_cameras
Detailed study of_cctv_cameras
Yaser Al-Abdali
 
Ten reasons to buy a network camera
Ten reasons to buy a network cameraTen reasons to buy a network camera
Ten reasons to buy a network camera
Axis Communications
 
10 reasons why you shouldn't buy an anologue camera
10 reasons why you shouldn't buy an anologue camera10 reasons why you shouldn't buy an anologue camera
10 reasons why you shouldn't buy an anologue camera
cnssources
 
CCTV Surveillance System, attacks and design goals
CCTV Surveillance System, attacks and design goals  CCTV Surveillance System, attacks and design goals
CCTV Surveillance System, attacks and design goals
IJECEIAES
 
10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation
Shein Myint Aung
 
Video Surveillance Book, 2013
Video Surveillance Book, 2013Video Surveillance Book, 2013
Video Surveillance Book, 2013
arms8586
 
Imagus_Whitepaper_250515
Imagus_Whitepaper_250515Imagus_Whitepaper_250515
Imagus_Whitepaper_250515Melissa Olsen
 
Imagus_Whitepaper_250515
Imagus_Whitepaper_250515Imagus_Whitepaper_250515
Imagus_Whitepaper_250515Melissa Olsen
 
The Diffusion of IP Video Surveillance
The Diffusion of IP Video SurveillanceThe Diffusion of IP Video Surveillance
The Diffusion of IP Video Surveillance
Chris Sandström
 
Whitepaper networkvideo safecity
Whitepaper networkvideo safecityWhitepaper networkvideo safecity
Whitepaper networkvideo safecity
Andrea Sorri
 
Whitepaper networkvideo safecity
Whitepaper networkvideo safecityWhitepaper networkvideo safecity
Whitepaper networkvideo safecity
Axis Communications
 
Honeywell CCTV Cameras in Bangalore - Call: 09066656366
Honeywell CCTV Cameras in Bangalore - Call: 09066656366Honeywell CCTV Cameras in Bangalore - Call: 09066656366
Honeywell CCTV Cameras in Bangalore - Call: 09066656366
RajaGopal Reddy
 
Pelco CCTV Cameras in Bangalore - Call: 09066656366
Pelco CCTV Cameras in Bangalore - Call: 09066656366Pelco CCTV Cameras in Bangalore - Call: 09066656366
Pelco CCTV Cameras in Bangalore - Call: 09066656366
RajaGopal Reddy
 
Vintron CCTV Cameras in Bangalore - Call: 09066656366
Vintron CCTV Cameras in Bangalore - Call: 09066656366Vintron CCTV Cameras in Bangalore - Call: 09066656366
Vintron CCTV Cameras in Bangalore - Call: 09066656366
RajaGopal Reddy
 
Tutus CCTV Cameras in Bangalore - Call: 09066656366
Tutus CCTV Cameras in Bangalore - Call: 09066656366Tutus CCTV Cameras in Bangalore - Call: 09066656366
Tutus CCTV Cameras in Bangalore - Call: 09066656366
RajaGopal Reddy
 
CNB CCTV Cameras in Bangalore - Call: 09066656366
CNB CCTV Cameras in Bangalore - Call: 09066656366CNB CCTV Cameras in Bangalore - Call: 09066656366
CNB CCTV Cameras in Bangalore - Call: 09066656366
RajaGopal Reddy
 
Fingerprint Time Attendance Management System Bangalore - 09066656366
Fingerprint Time Attendance Management System Bangalore - 09066656366Fingerprint Time Attendance Management System Bangalore - 09066656366
Fingerprint Time Attendance Management System Bangalore - 09066656366
RajaGopal Reddy
 
Biometric Attendance System Service Provider in Bangalore - Call @ 0906665636...
Biometric Attendance System Service Provider in Bangalore - Call @ 0906665636...Biometric Attendance System Service Provider in Bangalore - Call @ 0906665636...
Biometric Attendance System Service Provider in Bangalore - Call @ 0906665636...
RajaGopal Reddy
 
X-ray Baggage Scanner Companies in India - 09066656366
X-ray Baggage Scanner Companies in India - 09066656366X-ray Baggage Scanner Companies in India - 09066656366
X-ray Baggage Scanner Companies in India - 09066656366
RajaGopal Reddy
 

Similar to SONY SECURITY CIO survival guide (20)

Detailed study of_cctv_cameras
Detailed study of_cctv_camerasDetailed study of_cctv_cameras
Detailed study of_cctv_cameras
 
Ten reasons to buy a network camera
Ten reasons to buy a network cameraTen reasons to buy a network camera
Ten reasons to buy a network camera
 
10 reasons why you shouldn't buy an anologue camera
10 reasons why you shouldn't buy an anologue camera10 reasons why you shouldn't buy an anologue camera
10 reasons why you shouldn't buy an anologue camera
 
CCTV Surveillance System, attacks and design goals
CCTV Surveillance System, attacks and design goals  CCTV Surveillance System, attacks and design goals
CCTV Surveillance System, attacks and design goals
 
10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation10 Steps To a Successful IP Surveillance Installation
10 Steps To a Successful IP Surveillance Installation
 
Video Surveillance Book, 2013
Video Surveillance Book, 2013Video Surveillance Book, 2013
Video Surveillance Book, 2013
 
Imagus_Whitepaper_250515
Imagus_Whitepaper_250515Imagus_Whitepaper_250515
Imagus_Whitepaper_250515
 
Imagus_Whitepaper_250515
Imagus_Whitepaper_250515Imagus_Whitepaper_250515
Imagus_Whitepaper_250515
 
The Diffusion of IP Video Surveillance
The Diffusion of IP Video SurveillanceThe Diffusion of IP Video Surveillance
The Diffusion of IP Video Surveillance
 
Whitepaper networkvideo safecity
Whitepaper networkvideo safecityWhitepaper networkvideo safecity
Whitepaper networkvideo safecity
 
Whitepaper networkvideo safecity
Whitepaper networkvideo safecityWhitepaper networkvideo safecity
Whitepaper networkvideo safecity
 
Honeywell CCTV Cameras in Bangalore - Call: 09066656366
Honeywell CCTV Cameras in Bangalore - Call: 09066656366Honeywell CCTV Cameras in Bangalore - Call: 09066656366
Honeywell CCTV Cameras in Bangalore - Call: 09066656366
 
Pelco CCTV Cameras in Bangalore - Call: 09066656366
Pelco CCTV Cameras in Bangalore - Call: 09066656366Pelco CCTV Cameras in Bangalore - Call: 09066656366
Pelco CCTV Cameras in Bangalore - Call: 09066656366
 
vivotek_ipcctv_handbook.pdf
vivotek_ipcctv_handbook.pdfvivotek_ipcctv_handbook.pdf
vivotek_ipcctv_handbook.pdf
 
Vintron CCTV Cameras in Bangalore - Call: 09066656366
Vintron CCTV Cameras in Bangalore - Call: 09066656366Vintron CCTV Cameras in Bangalore - Call: 09066656366
Vintron CCTV Cameras in Bangalore - Call: 09066656366
 
Tutus CCTV Cameras in Bangalore - Call: 09066656366
Tutus CCTV Cameras in Bangalore - Call: 09066656366Tutus CCTV Cameras in Bangalore - Call: 09066656366
Tutus CCTV Cameras in Bangalore - Call: 09066656366
 
CNB CCTV Cameras in Bangalore - Call: 09066656366
CNB CCTV Cameras in Bangalore - Call: 09066656366CNB CCTV Cameras in Bangalore - Call: 09066656366
CNB CCTV Cameras in Bangalore - Call: 09066656366
 
Fingerprint Time Attendance Management System Bangalore - 09066656366
Fingerprint Time Attendance Management System Bangalore - 09066656366Fingerprint Time Attendance Management System Bangalore - 09066656366
Fingerprint Time Attendance Management System Bangalore - 09066656366
 
Biometric Attendance System Service Provider in Bangalore - Call @ 0906665636...
Biometric Attendance System Service Provider in Bangalore - Call @ 0906665636...Biometric Attendance System Service Provider in Bangalore - Call @ 0906665636...
Biometric Attendance System Service Provider in Bangalore - Call @ 0906665636...
 
X-ray Baggage Scanner Companies in India - 09066656366
X-ray Baggage Scanner Companies in India - 09066656366X-ray Baggage Scanner Companies in India - 09066656366
X-ray Baggage Scanner Companies in India - 09066656366
 

More from Wasef Al-Hakim

Xpert Traning Certificate
Xpert Traning CertificateXpert Traning Certificate
Xpert Traning CertificateWasef Al-Hakim
 
SONY SECURITY CIO survival guide
SONY SECURITY CIO survival guideSONY SECURITY CIO survival guide
SONY SECURITY CIO survival guide
Wasef Al-Hakim
 
SONY SECURITY CIO survival guide
SONY SECURITY CIO survival guideSONY SECURITY CIO survival guide
SONY SECURITY CIO survival guide
Wasef Al-Hakim
 
Security MEGA PRojects
Security MEGA PRojectsSecurity MEGA PRojects
Security MEGA PRojects
Wasef Al-Hakim
 
Wasef al hakim visual cv-v6.0+slideshare compatiable
Wasef al hakim visual cv-v6.0+slideshare compatiableWasef al hakim visual cv-v6.0+slideshare compatiable
Wasef al hakim visual cv-v6.0+slideshare compatiable
Wasef Al-Hakim
 
Security-Mega-Projects
Security-Mega-ProjectsSecurity-Mega-Projects
Security-Mega-Projects
Wasef Al-Hakim
 
Wasef al hakim visual cv-v4.0+projects+titles
Wasef al hakim visual cv-v4.0+projects+titlesWasef al hakim visual cv-v4.0+projects+titles
Wasef al hakim visual cv-v4.0+projects+titles
Wasef Al-Hakim
 
Wasef al hakim visual cv-v3.0
Wasef al hakim visual cv-v3.0Wasef al hakim visual cv-v3.0
Wasef al hakim visual cv-v3.0
Wasef Al-Hakim
 
Wasef al hakim visual cv
Wasef al hakim visual cvWasef al hakim visual cv
Wasef al hakim visual cv
Wasef Al-Hakim
 

More from Wasef Al-Hakim (12)

Xpert Traning Certificate
Xpert Traning CertificateXpert Traning Certificate
Xpert Traning Certificate
 
SONY SECURITY CIO survival guide
SONY SECURITY CIO survival guideSONY SECURITY CIO survival guide
SONY SECURITY CIO survival guide
 
SONY SECURITY CIO survival guide
SONY SECURITY CIO survival guideSONY SECURITY CIO survival guide
SONY SECURITY CIO survival guide
 
High-END-Security
High-END-SecurityHigh-END-Security
High-END-Security
 
ACADIA-UNIV
ACADIA-UNIVACADIA-UNIV
ACADIA-UNIV
 
Cisco-Major-Projects
Cisco-Major-ProjectsCisco-Major-Projects
Cisco-Major-Projects
 
Security MEGA PRojects
Security MEGA PRojectsSecurity MEGA PRojects
Security MEGA PRojects
 
Wasef al hakim visual cv-v6.0+slideshare compatiable
Wasef al hakim visual cv-v6.0+slideshare compatiableWasef al hakim visual cv-v6.0+slideshare compatiable
Wasef al hakim visual cv-v6.0+slideshare compatiable
 
Security-Mega-Projects
Security-Mega-ProjectsSecurity-Mega-Projects
Security-Mega-Projects
 
Wasef al hakim visual cv-v4.0+projects+titles
Wasef al hakim visual cv-v4.0+projects+titlesWasef al hakim visual cv-v4.0+projects+titles
Wasef al hakim visual cv-v4.0+projects+titles
 
Wasef al hakim visual cv-v3.0
Wasef al hakim visual cv-v3.0Wasef al hakim visual cv-v3.0
Wasef al hakim visual cv-v3.0
 
Wasef al hakim visual cv
Wasef al hakim visual cvWasef al hakim visual cv
Wasef al hakim visual cv
 

SONY SECURITY CIO survival guide

  • 1.
  • 2. • How do you make a suspect bag stand out from the crowd? Talkto Sony about Intelligent Object Detection.
  • 3. - - Vof c lunky cameras and closed· ide·O surveillance is at the front end of an astonishing transformation. Once a world circuit coaxial networks hardwired into a room full of c loudy gray S·inch screens, surveillanceis rapidly becom ing a land of sleek, intelligent cameras linked to sohware applicat ons running on the IP network. Some of these applications are basic, such as motion detection setting off alarm s. Some are clever, such as a grocery store system where cameras at the checkout counter are linked to the receipt tape. Though CCTV still composes almost ha f the overall video surveillance market, its share is rapidly swindling with a surge in IP-based digital v·ideo systems. And proving ROI on dig tal surveillance may not be as hard asyou th nk either.The post-9/ 1 1obsess on with secur ty created th s surgein surveillance investment, but what's susta ning it is that dig tal video surveillance appears to be living up to its hype.And, when done well, t prov des real ROI for the business. First off, it allows for consolidation of monitoring:You can watch many geographically disperse sites from one control roomHsomething that was impossible w ith c losedcircuit systems. An even b gger benefit of d ig tal isthat central control and monitoring allows you to put cameras at smaller sites and monitor them from the central operations center. With CCTV, you'd require a closed system at that smaller site and onsite monitoring, which itself requires atleast one employee.D igital video alsobeats tapein terms of storage and retrieval. Tape-based system scan requirea full t me employee just for retrieval. But the key to IP-based video surveillance s appeal is the ever expanding roster of applications being attached to it. In other words, surveillance isn't j ust about security anymore.For example, in retail stores, v deo surveillance is being used for measuring foot traffic through a store to understand both peak traffic t mes and a so shoppers' brows ng hab its, which in turn allows them to better configure andise around the store.Of course the surveillance s used for security as well, but t'salso be ng utilized to train new employees. Training, n fact, has become a possible killer applet for video surveillance, due in large part to theincreased quality of the images.Vide·Oof cashiers at a grocery store doing their jobs correctly {and incorrectly) is edited into video packages that train new hires. Still others are using cameras to improvelog stics, assembling trainsat humpyards (where the rail cars come off boats and trucks), for examp e, or monitoring assembly lines for quality control. Suddenly, surveillance is a business enab er, not j ust barbed wire. merch • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • c e o • nd .,,.,....,. ,• • l,l.• n• 11" '11 O. . ,c to• ......A •• oc:i• t • P ubliidl•• 1,1.• n• 11" '11 e .,. ,..., ......A •• oc:i• t • P ubliidl•• e.i,,cu C h l •t 0 .• 1911+• o .,.ia. . .. .. ()omni<' 0 . S o " '• ,,.;111 ,..... l(w,.tt>• 11,... .,., • J ,. ., . f h.,.b pfu•• c.. ..... .,. . Mo,t.C.......,.,- ,a.,:i.,, S,..,1hN•!h i+ • O . . .c t o• 11' ... ... a , ., w•...,.,••,••• P •o dudOOn N• N • Hood ,. . ,. .. 1..., 1,1. .p , u , fliut:.l!l'I..... J . . ,. . Th••ion •- • , .1 > . . 0 C pl>..,<0m C ••i<I Jot,n,,.,.., S . .l>.c • p b o n .... . .... .11"'•"-ii.. O Co-py ,ia,1,t 20011C PI, - '• <'o;M• ,...,v+d , W hlo'" • p ul >hll. , . . .. . ... . • •,. .,y • """' 10 +nou•• "'*..,•.,, . vol • l '" "" "" '" " ,n I"•" '"9"'n+, .,,.., '" ' nott+ . . .1o1... . ,. .. . 11:, """""+tftlfll l.,.n. --=-c p ( (:olj,() f l l',8USH!I < IM l (IIN. .h()NA Kto• d OHie• PO e -!U t t ! 0 ......1.uAf T•l +117l • U l l l l ,.,., 11 3» 8• 4 ...-. .11,w,,w .cpd- i.c""' S O N Y. 3
  • 4. • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • IPnetwork-basedsurveillance camerasofferenticingpossibilities.Butdoyouwantfull orpartialIP?Howmuchbandwidth?We'llwalkyouthroughtheentireprocess. N etwort.:cameras for P-based video surveil lance systems have been arou nd s nce 1996. These are attached directly to the network and send video to a network video reco rder or to a server equipped with video management software,whk h stores, displays or broadcasts the images.It w il lbe another five years, according to co nsultancy and research firm Gartner, before the market favors P over analog.However,IP cameras are considered a fast-growing market; according to IMS Research, the global network video market grew 42 percent last year and is expected to reach $2.6 billion by 2010. Experts say the reasonsfor analog's continued dom nance center ma nly around up gradecosts and a generallack of knowledge about networking tech nologies in many physical security departments. Two KtyDtcisions When looking at your options, the first th ng you need to consider is whether you should use fullor partial IP.Yo u can stillget some of the advantages of IPwh le maintaining your investment n analog by using encoders that convert the analog signalto one that can run overIP.These systems work well but are not architected for growth . Full IPinstallationsare more streamlined and efficient and require less maintenance. They re digital from one end to another and are very reliable because th ere are fewer m oving parts. Second, consider if there isenough bandwidth on the co rporatebackbone. BecauseIP-based surveil lance places new demands on exist ng network infrastructures, thephysicalsecurity department has to workw ith ITto imp ement or evenchoosethe best system, which means overcoming a traditional barrier between the two groups.The best decisionson network design will be made jo ntly between the two groups, says Jeff Vining. research vk e president at Gartner. Forinstance, because streaming l ive video isbandwidth -intensive, it can be too costly to upgrade networks o r too difficult to u se in situations where there are many users.. To optimize bandwidth, you may need to use application delivery control lersand/or wide-area-network opt mizatio n controllers, he says. • S O N Y. Do'sand Don'ts •DON'Tltt cc,stbt ,our guiclirlg ligtit.Most p,toplebuJ<al'lera.s with costastheirhlghttt ptiorityandfffectiYfftessuttit secod, which resuttsin grainy, o.t·of.fowsimages.There aretoolsnailable that htlpro•cl!loost the resolution and ltltSdlatfits,our nteds, baste! Ofl fa,,c:torslikedistanceanda 1H u heiglit. •OOWTttiillk s •allwhtll upgradi119from analog/llYJt systems. •00Hderstud the trHe-offs to11,igli· quality il'lages. f¥Voracrisper il'lage om saiooth motion. •00co.siderU1elm 1tfitsc,fctnt,aliting videosuTtila11ce. • DON'Tassumt everything isl'lil and •atch.WllilerunyHtwork a • ffasda.i• compatibility with rnuy vendors'Yideo ma11a.ger.et1tsoftware,SOilenu.agemHt software is• 0oreo,tn ttianoth«s.
  • 5. Because IP-based surveillanceplaces new demands on existing network infrastructu res, the physical security department has toworkwith ITto implement oreven choose the best system, which means overcominga traditional barrier between the two groups b aJuation Crittril The range of features available on network cameras is co nstantty changing,but here are some basic things to look for, according to analysts. Field of view:According to Vining, most applications cal lfor a 2404 degreefield of view and a zoom capability of 500 feet.For those who need more, there are pan/tilt/ zoom (PTZ}cameras, which can provide 360-de,gree views.These can cost mo re than twke as much as fixed cameras,Vining says, and normal ly require more maintenance because of their moving part.s. Bandwidth: It's a huge issue, especially as demand grows for more cameras on the network and higher-resolution images.You can reduce bandwidth consumptio n by putting intelligence into th e camera, says Simon Hanis, senior analyst at IMSResearch, so, for instance, only certain images are forward ed.However, that means you're no t recording nonevents that may supply needed context."You need to use that selectivety," h e says. Power source: The state-of-the-art approach for network cameras is to use power over Ethernet (POE),which means you power the camera through the same wire that sends the IPsignal resulting in significant cost savings. POE is not always available on PTZcameras, however, because of the amount of power they consume.Also ensure that the POE feature complies with the IEEE802.3af standa rd so it's compatible with network switches from leading vendors. Resolution: Many users are moving toward megapi xel cameras, which offer five times the resolution of video graph ics array (VGA) cameras. Not onty do you get a d earer image, but because of the higher resolution, you can also reduce the number of cameras you need. Auto filtering :For image clarity in various lighting situations, it s impo rtant to get a camera ,vith adjustable lenses to control the amount of light that is received.This is especially importa nt, Vining says,w hen a camera is facing east orwest. However, he says, some organizations will simply elevate camera mounts and then angle downward to view the horizon rather than incur the additional costs of adjustable lenses. Open platforms: Look for vendors that comply 100percent with industry standa rds, such as in th e areas of security and video compression, Gartner recom mends.Also look for open application program ming interfaces and multiple supported software applications. Scalability: Companies with large installations will want the equipment to be compatible with tools that locate, update and monitor the status of the devices and the ir IPaddresses. Servicefsupport : Make sure the vendor or reseller is able to send replacement parts quickly and can readity offer engineering support. Many network camera manufa cturers sell indirectly th rough channel partners, which is common in the ITindu stry but not in the security industry. This takes some getting used to among traditional security personnel. S O N Y. s
  • 6. AVOIDINGCOMMON MISCONCEPTIONSABOUT VIDEOANALYTICS• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • Videocontent analysis(AKAvideoanalytics)is gettingbetterallthetime,butit'sstillnewenough thatbuyersshouldproceedwitheyeswideopen 6 S O N Y. MYTH ONE: Video analytics can replace or surpass human performance.When confronted with an un ike y claim about video analytics, a good rule of thumb is to ask the following question: could a person watch ng the video perform the same task?If the answer s no, then it is unlikely that video analytics can do it either.Even if the answer is yes, it is still possible that the abilities of video analyticswill be stretched •• remember, humans have been interpreting visual images for about S m illion years. Computers have only been at it forabout 40 years. THETRUTH:In most operational environments, good analytics software can be configured to be as capable as a human observer at detecting important events such as cars parking illegally, people climbing overfences, people entering restricted areas, and so on.This event discrimination ability makes the technology a significant improvement V ideo analytics is one of those hot technologies that gets people excited .The ability to use artificial intelligence based technology to "watch•video, extract useful information and create alerts holds much promise for security and surveillance applkations. In fact, the technology can appear so cutting edge that it often sounds more like science fiction than reality. And, u nfortunately, the excitement around the tech nology has led to a marketplace where the line between fiction and reality h as blurred. For instance, one common myth about video analytk s is that it can spot a terrorist in a stadium full of people·· something even the human eye can't detect.Or it can automatically "see"a person cheating at a black jack table, while highty trained surveillance personne l cannot. This article covers the five biggest myths of video analytics technology and practice, and examines the true state of·the -art.
  • 7. over other sensing technologies such as b uried cables. mk rowave detectors, and taut wire fencing.The real value of video analytics, though, is that casts an unblinking eye over the scene 4 4 in this sense, it is a dramatic improvement over huma n performance most realistic operational scenarios, there will be many false alarms caused by extraneous motion and the inability of VMD to distinguish between any motion and a real event of interest. THE TRUTH: Like any p roduct, there are varying design spedfica tions beh ind each video analytics application.Don't be fooled into thinking that a technology forcounting people in a retail setting will work for perimeter protection or vke versa. Analytics products often make assumptions about camera orientation, d istance to objects. numbers and types of objects, indoor vs. outdoor environments, illumin ation and many other factors th at can affect performance. Make sure that whichever products and technologies you choose are appropriate foryour operational environment and your particular mission. MYTH FOU R:Video analytics (or the necessary hardware) is not cost effective. Historicalty, video analytk s solutions h ave req uired a serious capital outlay to get MYTH TWO:Video analytics can improve bad CCTV infrastructure. Most CCTV systems aren't designed with video anatytics in mind··in fact, many are designed without human operators in mind .Cameras are often low q uality; views are obstructed by natural o r man-made obstacles such as trees and buildings; and scenes are often poorty illuminated at night. Analytics is no "'magic bullet"'that can see through walls o r turn night into day. If the camera doesn't have a d ear unobstructed view of the area of interest, anatytks will struggle to add value. THE TRUTH: The performance of analytk.s systems is generallyvery acceptable in wen-designed operating environments. If there are enough pixels and appropriate Analytics products often make assumptionsabout cameraorientation, distance to objects, numbersand types of objects, indoorvs.outdoor environments, illumination and manyotherfactors that canaffect performance. illumination to view an unobstructed area ofinterest,detection rates are usualty very good. Most reputable manufacturers claim detection rates (inideal conditions) of over 90%with very acceptable false alarm rates · as low as 1per week per camera or even better. ne size fits all Cu stomers often have ble in the field when an analytics logy is taken outside of its comfort ere are many different video roducts that are designed to erent jobs in many d ifferent vironments. Many vendors Video Motion Detection t video analytk s. In a indoor environment, some value but in up and running. Per camera license costs used to be very high; systems required large PC infrastructure footprints; and deployment, maintenance, and training costs were a constant financial question. In some cases this is st ill true!This is a very large expense for system that isn't going to replace a human guard.force any time soon. THE TRUTH: Video analytics technology, as it h as matured in the marketplace, has become more of a value added component of CCTVinfrastructure rather than a stand alone enterprise software solution.Today, it is possible to purchase true intelligent analytics capabilities as a feature of main·stream CCTVhardwa re components such as: cameras; IP video encoders; IP routers: and OVRs, NVRs, and S O N Y. 1
  • 8. • video management platforms. A nalytics features do add a premium to the prices of these devices but the price-tag is significantly lower than a stand alone PC-based solution. Furthermore, more sophisticated customers of analytics have seen more value in analytics than simply rep lacing a guard-force.Customers are now reap ing value from analytics by making their people, processes and infrastructure more cost effective.This is being done by using analytics to help optim ize bandwidth and storage of network v de·Osystem s; or by using analytics to make foren sic investigations faster and more personnel-efficient. Analyticsfeatures doadd apremium to the prices ofthese devices but the price-tagis significantly lower ttian a stand-alone PC-based solution. Furthermore, moresophisticated customers of analytics have seen more value in analyticsthan simply replacing a guard-force. MYTH FIVE:Video ana ytics isover· hyped.It seems that there is a new video ana ytics vendor hawk ng their wares every week. Every video analytics app ication is the best on the market: the most robust: with fewest false alarms; also easiest to use; and operat ng in the w idest variety of environments; oh, and it costs almost nothing to own.With all the market noise, it is ditncult to separate the wheat from the chaff of even figure out if there is any wheat at all! THE TRUTH:like any competitive market w ith new and exciting techno ogy, there w ill be outrageous claimsmade by some less-than-scrupulous vendors. But thisdoesn't mean that everything ishype.We're allfamiliar w ith used car sa espeople and yet there are a great many good quality used carsout there. Be suspicious of avendor who answers •yes" to every question. Look for reputab le vendors with proven track records.They w ill help guide you through the process of evaluat ng and deploying v deo analytics. They will help set e,cpectat ons and work w ith integrators to ensure that CCTV infrastructure w ill be appropriate to make your m iss on and your exper ence w ith analytics as successful as possible. s S O N Y.
  • 9. LOOKSMART• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • V ideo analytics has come along way from the hyped up, gee·whiz technology of a few years ago that promised way more than it cou d deliver.The good news is. the technology has improved enou gh that organ izations, slowly but surely, are finding that analytics tools can help them make sense of all the video they are collecting and even find an R O I -but only if they are careful shoppers. Here's what to know before you beg n. intrusio n detection, entry throu gh an exit and so on. Some of the analytics companies are stillfocused on only the software. TIP 2 - Start With Your Business NHd - Th•n Select the Technology The latest v deo anatytics toolsclaim to do very sophisticated activities, from identifying loiterers to detecting vandalism to monitoring crowds for dropped baggage.When evaluating your options, you may be tempted to get carried away. Don't. Always start with the business need, then see if there is technology that could fill i t -not the other way around. Its like every other decision.What is the return on investment, what is the value it can bring my organization,and what can it TIP 1 - Und•rst•nd th• Mark•tplace Once, video analytks was largelya software business, with applicat.ions residing on central servers or digitalvideo re<orders.These applkationswere (and still are) based on algorithms that monitor for spedfK event. s -motion detection, help me accomplish that Ican't accomplish any other way? Could analytk.sallow you to reduce your security guard force? Could it let you monitor a site remotely and save money on gasoline? Could it help manage all the video information you're <olle<ting or let you <onduct investigations more efficiently? Prices have come down, but the te<hnology is still expensive.One way vendors are dealing with this is by moving to packaged models, with groups of algorithms targeted at specific industries. TIP 3 -Think About Wheth er On-th•· Edt• Analytiu Makes Se n u for You Another key decision is whether you want to have content analysis performed "on the edge" -that is, on digital video <ameras or encoders, rather than on serversor DVR.s. Analysts say this iswhere the industry is heading, but right now you still have a lot of options. The advantage of on the edge analytics is that content analysis<an be performed when the video isof its highest quality, before it is compressed to be sent over the networkand stored.A traditional. centralized model, however, provides more flexibility. One OVRor server<an do analytic.son more than one camera feed,which means that <apabilities can be dire<ted and redirected based on the needs of the minute. Which direction to go, says Frost & Sullivan research analyst Dilip Sarangan, depends largelyon your organization's network capabilit.iesand what the IT department iswilling to put on the network, since video traffic tends to be a bandwidth hog.The decision may influence which vendors you want to consider. Somevendors, such as Cemium, focus on centralized tools,while others such as toimage focus on on-the-edge setups.A lot of vendors, however, do sell both. TIP 4 •Test , Test , T u t., B•fore You Writ. the Check Once you identifyyour business need and narrow down the field, it's time to start testing.Video anatytics technology isable to deliveron more of its promises than it could a fewyearsago. Even today, however, the technology must be configured correctly, and it may not work at all in certain situations. Fortunately, vendors maybe willing to let you try out the hardware or software for a month or two beforeyou actually write any checks. Insist on it. S O N Y. 9
  • 10. • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • The growing popularity of video surveillance is fuelled by the shift to IPvideosystemsthat arelessexpensivethan traditional analogue systemsandmakeit easierto add orrelocatecamerasandmulticast video signalsto multiple locations. ,o S O N Y.
  • 11. Video-recording management software alsocan actasatrafficcop- lielping distributevideo in 1GBblocksacrossvariousiSCSIdiskarraysonthe network.Thisallowsforhigherstoragelimitsfor camerasthat arecapturingvideo insensitiveor high-trafficareaswhere alarmsare frequent. Y et, every system is limited by two finite resources:network bandwid th and d isk space. A 100Mbps network connection can support nearty 85 cameras producing 10·1SKB images per second (about 1Mbps each), but the network will be running at 100 percent utilization.Whether the IP video system ison the existing IT network or a parallel network, enterprises need to set a realistic bandwidth target and then determine how many cameras can be supported by their infrastructure To en sure efficient ba ndwid th usage, security integrators can help design fluid systems that adjust to accommodate traffic surges. For example, frame rates can be red uced temporarily while the sharpness of each image is mainta ined, o r the same num ber of frames can be recorded at a lower resolution. Video conten t analysis (VCA) embedded in an IP encoder - the device that translates analogue camera signals into digital - also can reduce the amo unt of traffic sent across the network .With VCA at the edge, it is possible to only transmit video that generates an alarm due to a security concern - such as a perso n loitering, thef t of an object or an object left behind in a scene. By selecting spedHc portions of video to forward, VCA diminishes the amount of ba ndwidth req uired for surveillance but enables all camera channe ls to be monitored effectively. Of course, storing all of that IPv·ideo represents a challenge. A 200GB hard drive can store approximately two weeks of video da ta, depending on the quality of video .For some industries, such as correctional facilities and gaming, regulations require tha t recorded video is stored for a longer period of time - up to 30 days or even a year in some states. Enterprises can red uce storage costs by improving and op timizing how the available storage is shared among cameras. The trad itional storage approach uses network video recorders (NVRs), whkh are PC servers that act as ga teways to directly attached SCSI RAID storage o r storage-area ne twork storage. By moving the intelligence to the edge, it is possible to configure an IP camera or IP encoder to stream d irectly to an iSCSI RAID, bypassing the NVR and the associated capital and ongoing costs. The difference in this architecture is pa rticularly noticeable in dispersed systems where the WAN lacks the ba ndwidth for centralized record ing. Instead of installing NVRs in each building, which can be a maintenance nightmare, enterprises can insta llstorage that is directly attached to IPcameras or to IP encoders. Consider a university with 20 buildings and 25 cameras per building. Each camera is recording high-quality video at 2.8Mbps per camera for 90 days.With an NVR solution, the university would need 1,SOOTB of storage and 40 NVRs spread over each location. With direcMo iSCSI recording, the 40 NVR PCs are not req uired. Multiple cameras can share the direct tO·iSCSI RAIDs on a local record ing network, keeping the recording load off the main local or wide-area netwo rk. Video traverses the backbone only when perso nnel need to review stored vide·O. When this occurs. the video can be shared and searched by anyone with the proper network access. This approach also means that enterprises do not lose recorded video due to network outages or NVR server hardwa re or sohwa re failure. Video recording management sohwa re also can act as a traffic cop - helping distribute video in 1G8 blocks across various iSCSI disk arrays o n the network. This allows for higher storage limits for cameras that are capturing vide·Oin sensitive or high-traffic areas where alarms are frequent. Also, if one disk array fails, the recording -manageme nt software will simply redirect video to a backup devk e. That results in bette r disk utilization, better load balanci ng and greater reliability. This architecture is also simpler, with fewer items that can fail, and less hardware and sohwa re for ITperso nnel to manage. Among enterprises, there is no doubt tha t the use of video surveillance is growing, makin g it important that IT managers understand the methods to eliminate issues tha t can cause network congestio n and failure. Record ing video at the edge is a simple and common practice tha t can make IPvideo surveillance systems easier to manage and more cost-effective. S O N Y. 11
  • 12. • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • TIPSTOGETYOUSTARTEDONTHERIGHTROAD STEP 1: D•t •rmine your u m . , H ' raison d 'i tre. From this you'll be able to decide just about everything else. Be on demand, because you can't watch the cameras all the time.You should be able to call up the camera with the best coverage to monitor situations if and when incidents occur. Allow for targeted smart cameras for high-risk areas, so that camerswill trigger alarmswhen something beginsto happen. STEP 2: T•k• •n inventory. If yo u have cameras already, survey what departments own them, what they are for, how they are monitored and what format they use, then decide if any of these cameras can be folded into your new system. STEP 3: G•t s m u t on ca mera t echnolo g i u . Determine the effect of new technologies on operations, training, maintenance and staffing. Determine how clear you need the picture to be (as opposed to how clear yo u want it to be).Thiswill have an impact on costs. Here are some of your choices: • FRAMERATE.The more frames per second (fps) you choose, the more network capacity each camera will require and the more data storage you'll need. • RESOLUTION.Similar to frame rate. but this is not a motion issue; rather, its a clarity issue. The clearer yo ur picture, the more pixels it will have, the larger the file will be and the more bandw idth it will consume. • COMPRESSION. There are several standard commercial compression algorithms. but the most common. for ,2 S O N Y. Going mega Network u11Hruart rupi"9 tht btntfits ofdieme,apiul rev•lutiort, a major btntfit th.It uirtnotr.eadiitvtd byttltir .1..ato9uecounter,arts.tbt ntw geoeratiort of1ae9,apixtl<amtm providetllh.lll<td darity.11ldpractiu,I irittligenct intoany st<urityorsuTtila•ct operation,from .1if'1'•ru, stadiumsantistioppin9,ulls.,to <orporatt,ba1tin9carparts andpu.ii< spaces..theme9apixtl resolrtiort willtltt•4 your u,p,1bilityI t prottd people,property, p,.ducu.11ldnnicts. Wrtb1J me9apixtl rts.lutioa, thiseew gtntration of ca111er1:s <al'lcltlivffsbirp afldvividimages.,attvt• •idtYitwinga11gles., idealfOffortesicdetails inst<urit)'a,ppliuitions like buiklin9tflttallctS a11du r ,arks, theme9apixtlrange gh-tsJOU thelevelof idt11tifimiort detailyou11ttd •ithout creating ovtr·largefilescnsin9 bandwidt• problfflls,
  • 13. S O N Y. ,3
  • 14. all the right reasons, isMPEG-4.You can add acommercial compression package to your MPEG-4 to further reduce your storage needs. • STORAGE DURATION. Th rty days of storage isthe unofficial standard.Th s g ives enough time, without overdoing it, tolearn of an incident before the data is lost. When you get an event of nterest, you should p an on dropping that file onto a DVD and storingit ndefinitely or at east until all cr m inal and c ivil proceedings are concluded, ncluding appeals.You can also send events of interest to a separate server for indefinite storage. • STORAGE SIZE. A single digital camera running 24 hours at just Sfps, using MPEG-4 at Quarter CIF reso ution, creates 11GBof information. A 500· camera system, not at all uncommon for corporate buildingsand campuses, will generate 165 terabytes every month. So it's easy to see why keeping pedestrian images beyond 30 days is economk ally foolhardy. And remember, thisis with cameras running on spare frame rates and resolut ons. Full motion video (30 fps) will create 990 tetabytes, almost a petabyte, of data. If you also go to full CIF, multiply that by four, and you're talking a few petabytes a month! Stay on top of the contractors and consultants so that they st ick to the original engineering discuss ons, or they could eas ly overdo your system. Mission creep can be expensive.And remember, t's not j ust storage but also bandwidth you have to consider. 14 S O N Y. Atsome point you'llwant to convert yourimages to digital to take advantage of its easier storage and better retrieve and searchcapabilities. • DIGITAL VS. ANALOGUE. At some point you'll want to conver t your images to digital to take advantage of ts easier storage and better retrieve and search capabilities. But analog images can travel farther from the camera, socable runs w ill impact your choices.A consultant can adv se you on the best route to go. • PAN T LT ZOOM (PTZ). There are two ways to do this. The old-fash oned way, which stillworks really well, isto physically move the camera and change its focus whenever you want to get a c lose-up. Dome cameras have a dark bubble over the camera to mask where it ispointed at any given time. Make sure each PTZ has a default •park• position that gives you an op timal v·ew and focal length. It is easy to forget to do th is and leave a PTZ whereit waslast focused; th s w ill likety not give you the best coverage w hen nothing special s happen ng. The other (more costly} way to do PTZ is dig tally, wit hin the image itse f.This will require megapixel images. Zooming in on, say, a license p ate, will fuzz out the image illegibly if you don't start with sufficient pixel density in your camera platform.
  • 15. Surveillance software revenue to quadruple by 2013 I na ntw studylllathu pote•tilllJOrwelliall i •plkations, A.BlRes.arcll projt<Udlatl 'fftflt e for videowmll&ln<e softwart will q11ad,.,.k everthe nut fiveyears.Accotdi•gtoA.BlVi<e Preslde•t andb seatthorertor StanSdlatt..rneitue generned froms.rve lancesoftwarewill increaseto•oretMll S900 milio. ilt 2013,•Pfromairrtflt teVtlllltSof$24$ million, Sdlattsaysthere art se,eral bigdri¥ersto,tilisirlaeas.t., i,ul• dingil'luHsed spe11dil'l9 o.securitysystffllsbydie government Otl theftp,ewntiOf'I sys-tenub)'rt-tailoutleuancl oe surveillanctIt}'mil1ket res.tarclers.AdditiOflally, he saystflat theadvft'ltofWj.fi Ms madeitpossibletoplacewirtless camerasjust aboutanywhere wllik stil sending fooU9t ba.c:k toacentrallocatio•. Lootingatdiebroader pimlre,Sch.1ttsaystflat tedinologia.ladvancesare aboinmasir19 ttiescopeand the poteetill usesofvideo s•rveillance,Hesaysth.ato11e ofthemoredist11rbin911Sesis theabilityofstoremarlttieg departnuntstoactllaly rnoeitor theeyeb•H1.0-ttmentsof customerstofi9urtolltwlwlt productsordisplays• awtheir atteetio11. "WbtnstottS havethe abilityi . ollsffl'tyo.•syou walkthroughaSIOtt, wflatIan il!Wlgineistlwltmorund• ore storesw•tJ}'toba:slc.allyhave a pretty in-dep knowledgeof thts<11stomm,"llesays.'"Solefi s,yfOfinstancethestoreissues youadis<o...t anl thatalsohasa n1ditfrequeecyIDum icleetifies whoyouare,Atldtbenltt'ssay thtyobserveyoulookingat,but not a<tually pwdlasin9,rncvies in theadglt'tideos.ection.Well, thellt t t thiagyoublow)'Mre 9etmga ltties.e,ro,.otion.al materialsforracymoviesyoWre notf 'IH intHtstedia,"' S<lwlttabo11otesth.atmore •ndm0tt batikure lookieg intohtstallingu • eraswith facerecognitionallilitytohel, pre¥ffltrotilleriesbeforethey ne11occur,Thus,when ablowll banlrollberentenaba11k,ttle camera cn recogniu his face and seedoutan alert.Winos arealready deployi,9 this sort offacerecognitio. software i . •onitortheiremployees. S<hau says, and•SWl9ittodetectwlle11 certain employeesft'lter into •n.authorizedareasan4alerting esecurityteam, Sdlatt btlievesth.au s •oresurveilancef'Cl11ipnu11t becomesiriaeasinglydigitiud antlsoftware-reliaet,itwill inaeaSWlglymovtiritothe ,urviewof ITde,artmeats.. Aftd becauu thes..neilance softwarevastlybroadens the e:rtenttowtiidlcompaniesand 9oven1menuca.watdl people, itwillinf'ritablym ate privacy co11cerJ1stllatwill havetobe add.ressd. "Dow•theroado. , behaviouris9oin9to beoluffl'td ••dimott fre111t11tly,andtllatkasall Dul ofi111plk.rtion.S:hesays.. "'Imeat1, thefactthat t e (re a<tuly lookingatyoureyebal •Oftme11usll.wswe'v-t ttached• wholenewreal• of wrveillan<ecapabilities,"' STEP 4: Wr.stle • few more issues to th• ground. • MONITORING . This is a contentio us issue. The p ublic may expe<t that cameras are monitored all the time, b ut it s neither practical nor possible. The best you can do is p ut your high· p riority <amera images up in your command center for occasional viewing. Even better: Use analytics software to pinpoint an event of interest and <all it up with an aud ible alarm. • DECOYS. It may be tempting to use dummy camera domes to suggest you have surveillance, this will g ive you, p ublic a false sense of security. Most competent p rograms avoid their use, except in specific circumstances and then only in concert with live cameras. • STAFFING. It s unrealistic to expect to be g iven additionalstaff to monitor a new suite of camera s, and it s equally unrealistic to expect to get different people than the o nes you have now. For these reasons, you will want to choose a system that has a simple GUI (graphical user interface), provides out-of-service alarms for cameras and encoders, is low· maintenance and has high mean times between failures. • POLICIES ANO PROCEDURES. If your cameras can view geography off your p roperty, consult with your sohware p rovider to mask out these areas.This is especially important if you have line of sight to residential p roperties. Supervision and the applkation of swift discipline are very important to avoid inappropriate use. • TRAINING.The mo re complex your syst em, the more training the staff will need. This takes good time management be<ause unless you have a full shift to go on training rotation, you will be doing training on overtime. • MAINTENANCE. Include in your maintenance contract a service-level agreement th at g uarantees your high· p riority camerasare fixed promptly. Be sure it requires an adequate stock of onsite replacement cameras and network encoders and o ther peripheral devices so that the most important cameras can be restored to servk e quickly.Yo ur system should open a trouble ticket immediately upon d evice failure, and you will want to review the system's performance monthly to en sure you are up to speed on how reliable it is and which p arts are giving you the most trouble. S O N Y. 1s
  • 16. • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • Sonyisattheforefront ofthedigital rangingportfolioofproductsandsol Manager, Sony Professional Solution trends inthe regionalmarket. • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • neerevolution,offeringawide MageshSrinivasan, Marketing East,encapsulatessomeofthe key 16 S O N Y.
  • 17. IsSclflJbullish allowtthe s11rYeillanctmartet i11 the Mkldle la.st?Do,•.,seei te<hHl•fJ shift (Nun aniklf H t t IP? Yes,we areq uite optim stk in our outlook towards thismarket.Clearty, with security be ng on top of both pub ic and private organizationsthere w il l be a greater focus on th s technology for years to come. Further, v'ideo surveillance hasvarious emerg ing app icationsfor example for the retail and sportsindustry both of which are high growth areasin this region With regards to transition from analogue to P vte've seena big growth n demand for IP cameras since '06 and it will cont nue to rise.The market hasadapted by making available hybrid products which support both analogue as vtell as IPcameras, such as Sony's new Hybrid NSR-1000 series of Ne twork Surveillance Recorders. Whit impart willhve tlte newgenerati. . of •e9apixel ted1n.klt,hiveon t11e market ind tflterprise Htworlut High Definition isthe name of the game n al lcurrent and futurevisual communication technologies.We've seen HOw ave influencing allConsumer and Professional e ectronk technologiesacross the globe. Video Security hasseen the beg nnings of HD transition with th e ntroduction of mega pixel'IP cameras, specifically des gned to meet th e needs of the video security market.The tech nology enables a new set of applicationswhich cou ld be delivered owing to greater v sual clarity for surveillance.Hovtever. the end-user applicat ons are stillin the earty stages and it would take at least another year to check and confirmif the intended benefitscome th rough with acceptable trade off on P network bandwidth and processing power of the server. camera is expensive,over rime « onomies of scale' shouk l bring down the end-user price.Sony's range of mini-do me and box camerasare equipped with'Light Funnel Function'and ExWavePROforhigh sensitivity and arealso capable of' ntelligent Motion OetectioO:ThesefeaturesaUovt effective implementation on projects that may have very bright or dark environments,face identification, number plate recognition and other such applications. Oneofthebsues with tlleIPs11rYeilla11ctmarl:et b ticktf • •rtet educition ind la<kof ope.n standards. H••do,.uucklethis bsue? We nvest a large portio n of our resources towards market education and training on the P video security technology . With regards to the ssue of 'lack of open standards'a key event occurredduring IFSEC'OS.Three leading vendors of ne twork video products - Sony,Axisand 8osch - began working col laboratively to establisha globalopeninterface standard. Open NetworkVKleo nterface Fo rum - ONVIFwil l be the governing body to formulate and communicate the ind ustry standards.A standard interface will achieve interoperability betvteen al ldifferent vendors' products - allowing customers to "p' k k & mix" equ pment from various companiesand then simpty"plug & pl a y Thisnew standard w il lofferincreased flexibility to ntegrators and users of network video equipment. Willmegi pixe.lumeru ltemore Hpeu in andwtiu kindtf ipplicitions4• Jl>Usee for this tedlntklty? Yes,mega pixel will cost more asthe technology requiredto build a mega pixel WhitisSonydoingt t lm 1npartnff n ,ertiseill HtworllYi4eosol• t"'•ul Weensure that our channel pannersare have accessto free tech nk al train ing on a regu ar basisas well as acqu re professional guidancein key projects.Further, we are put ting in place a processof accreditation for our channel.Th s requires the prospective dea er or system integrator to com ply with the specialist skill set and knowledge base as requiredto provide video security solutions to end-u sers. Weensure that ourchannel partners are have accessto free technical trainingon a regularbasis aswellas acquire professionalguidancein key projects. Further, we are putting in place a processof accreditation for our channel. S O N Y. ,1
  • 18. THEDIGITALWAVE• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • IPvideo-surveillancesystemsofferfeaturesfarmoreadvancedthan whatyoucangetfromstandardanalogueCCTV.SimonNash,Senior EuropeanMarketingManager,NetworkVideoMonitoring,Sony Europe,talksaboutwhythesesystemsarebecoming increasingly popular intheenterprise. VWHsum ila11c.thastr.Kil•aal ybeef!adosed· <imiit ••alofueaffail'n i• bJthep Iseairity naff.Now,wllat isdriri•gthesh.iftttw-ardsIP·llase4 dt9italr,ste,ut Weareexperiencingarapid shift from existing analogue systems to IP.This ismainly due to customers takingadvantage of the &atest intelligent videoanalysis.Current motion detectionanalysiscan only alert operators when and where to lookat images. but are unabletoidentiy specific behaviours.With intelligentvideoanalysis.a systemcanbe tuned to send an alert based on highly specific conditions appropriate to the iod ividual cameras'rolewithinaninstallation.The system designer cancreate hightycustomised installationswhereeachcameraissetto de iver arangeof alarmsto signal whenvarious eventsoccur sothat operatorscanrespond appropriately.Such afinetunedsystem with a high degreeof filtering makesefficient use of theoperator'sanention.Theydonot have to watch muhiplescreenssimuhaneously,and imagesthat areselectedandpresentedare lookedat carefu ly.Intelligent lideo analysis that makesbetter useof operatorattention producesgreateraccuracyin monitoring with fasterresponsetimes.Whilethenumberof operatorsrema nsthe same.,thesystem'soverall effectivenessincreases. With the riseof IPbaseddigital systems. lideo surveillancehasbecomeanother application on thecorporate netvorkmanaged bythe ITdepartment. DoIPNsed syste• s,oIMphdj•st• ci•it.or91tl Wllat newapplkatiOflsarefffler,irltl Yes, n fact many customersare using the counting capabilities of our cameras and marclgement software.Wea.resee ng an increase of this being used for many other applications outside of traditional security applications.. Wh t i• plkati• n:swill vide. survtill,a .cthaw o• eatetpriseflet- .rltsas itlte<o•es111applkatiOfl! W h do(10s11ee411toh e pi• mi•dwhile411esi9ni•ga survtillol11ctirlfrastrltffllrel With theiocreasedpopularity of themegapixel cameras, thisishavingan mpacton the bandwidth requirements.Itis mportant to work with amanufacturer that hasa heritage in producing H264 cameras.Sony hasbeen producingcameraswith H.264compression since2006.Wenow haveeight camerasusing thisalgorithm. <.a•vide. aiutytks hielpcompa•ies todraw i11telllfet1<efromthieirsurwilan<e vil e .? Yes, ntelligent video anatysisisbeing usedfor many other applications..Forexample, retail owners a.reusing Pcameras to not only provide traditiorcllsecurity, but alsoheatmapp ng fuoctions to show hot spotsin their stores.. <.a•you tel usftMltt abo..t S.ny'sDistrill•ted &illan<ed PNctssi119Ardlit.ecturet Sony's newIPbasedsecurityarchitectureis a fundamental departure from today s back heavy,centralised processor systems.As its name suggests,DEPA distributes processing power throughout the system to avoid theperformance bottlenecksinherent to preliousdesigns.A DEPA system assigns specific processing tasksappropriate to each separate componentwhile sharing processing power betweenlikecomponents..Thisopens new opportunities for system flexibility and scalability.Overallsystem costs aregreatly reduced by closelyintegrating preprocessing analysis and metadatageneration inSony, DEPA enabled Pcameras.with back end processing in network video recorders.Inaddition, the front end anatysisoperatesacrossall the cameras simuhaneously.Th ssignficantly raises the overallsecurity capabilities. ,s S O N Y.
  • 19. Experts Group.We should note that MPEG comp ression techniquescan also be used for video thatissent over non-IP networks l ike broadcast cable television systems. MPEG-4 Part 10 hasa so been incorporatedinto thelatest rrustandards and thismost recent standard sreferred to as H.264 or AdvancedVideo Coding.MPEG-4 provides asignificant improvement in both picture quality and it doub esbandwidth efficiencywhen compared to MPEG-2, MP-EG· 4 Part 2,or H..263 techn ques. Forvideo, the two most common compression techniques-MPEG-2 andMPEG-4were establishedthe Motion Picture ExpertsGroup. H.264 PRIMER• • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • HowvideooverIPworks V ideo encod ng and session controlis more complex than techniques used fa<voice becausei1must allow for awider al lowance of bandwidth,i1 must includeprotocolsfor presenting pictures on a multiple k ndsof screens,and it must alsoincludean audiocomponent to al low for sound that accompaniesthe picture. In the voice world, the ITUT has establ isheda seriesof standardsincluding G.711, G 721,G.722,G.726, G.727,G.728, and G.729.And once digitizedand encoded, voice transmissions(or sessions)are typically controlk!d by H.323 or SessionInitiation Protocol.with SIPbe ng the strategkalty controlk!d pro tocol. For video, the tvo most common compression techn iques.-MPEG-2and MPEG-4 were established the Motion Picture H.264" Zulreslfflbandwidth, whllt dtl nring btttor plctun quality PSNfl(Cl8t ........._,tt..: A .1 , ...,.., ·OCf IIHcl . . 1«11111 .. .10 - 1 1 ..,. . uur.-.t1,11 ..,. ) S µ i.1PEG..t " "' " . i !.11, tt tK!W1) ,oo 0 ,oo ,oo lmprovtd quaJjty Because the P-VOP elements of each frame are moreaccurate, H264 will provide better imageswith moredetai In security applications.thiscould make a real difference. H.264 t 1pl1intd In MPEG-4 co mpression, each frame issub dividedinto an nitial Video Object Plane (I· VOP), which contains allthe anchor data, and severalPredictiveVideo Object Planes (P-VOPs) which p redict the difference between the currentimage and the previous VOP.H264 workson the same principle, but adj usts itsdata capture for the P-VOP-sin real· t me, to focus more accuratety on the area wheremovement hasoccurred.Thisachieves enhanced mageswhi lst actual ly transmitting significantlylessdata. ltss bandwidth For network security users, H.264offers all sorts of practicalbenefits.Us ng network cameras designed to wo rk with H.264, you will needlessbandwidth .MPEG-4 requires approximately one-third of the bandwidth used by JPEG; H.264 requ resjust o ne fifth.That's a most a 40% saving between standard MPEG-4 and H.264. Rtductd StOTlgt With better compression, your stored files will take up much lessroom o n your server, potentially saving significant sums in your netvork storage requirements. S O N Y. 19
  • 20. Ph1!1p Robinson, 0 0 ,Shal)ah Teaching Hospital
  • 21.
  • 22.
  • 23.
  • 24. D_esi • Introduce a new level of intelligence and clarity to your business - Go M a with Sony. • gned for ·security,Sony Megapixelcamerascombine 1.3 MegaR:ixel resolution with ,;:e w ExwavePRO CCD,Light Funnelwith colour filters and Intelligent Motion Detection Oeliver high picture quality in even the most difficult lighting conditions.