SlideShare a Scribd company logo
Video Analysis & Surveillance
in
High End Security
Introduction
 Security refers to “freedom from risk or
danger”.
 Video security is used to protect homes,
property and people.
 Because of increased crime in many towns and
cities, video security is essential.
 Another reason for video security is documenta-
tion. If a crime is committed, you will have a
record of it. This evidence is readily available
and can be quite valuable.
Introduction
11 Sep 2001 WTC disaster
7 July 2005 London bombings
3
contd...
Now in Mumbai 26th Nov 2008
Hotel Taj Mahal
CST Railway Station
Taxi at Vile Parle
Mumbai Terror Attack
 Terrorists infiltrated in to Mumbai through sea route which could
have been tracked in the sea itself
 They alighted on the shore in group of ten people with heavy
luggage and entered the land which again could have been
monitored
 Few of the terrorists were staying in the hotel and were able to
move large material inside their rooms and also survey the hotel
building which also could have been monitored
 Few terrorists went firing all across the city through railway
station, hospital and roads and were not being monitored which
if could have been done, the terrorists could have been trapped
and prevented from causing damage to that extent
 Increasing crime rates and terrorist activity, as well
as an increasing demand for more protection of
people and assets is affecting the growth of the
security related applications and more specifically,
the video surveillance system.
 An obvious benefit of video surveillance is 24/7
monitoring of both densely populated areas,
remote and isolated locations. Whether used for
live monitoring, recording or both, video has
proven to be invaluable for identifying individuals
spotting criminal activity, recording accidents and
other events.
Introduction
contd...
Traditional Surveillance Systems
 Traditional CCTV security systems conventionally are:
 Analog or Digital type
 Limited Tape life or Storage in terms of Time
 Complex High End Central Management System
 Systems are totally dumb and require very high Human
intervention
 Ideal for small thefts and similar incidents but cannot deal with
terrorist attacks
IT IS MORE IMPORTANT TO SAVE HUMAN LIFE
THAN TO FIND OUT THE REASON THROUGH
POSTMORTEM
MISSION TO COMBAT TERRORISM RIGHT AT
THE DOOR
WE PROVIDE THE NEXT GENERATION SECURITY
SYSTEMS WITH ARTIFICIAL INTELLIGENCE
Video Analysis & Surveillance in
High End Security
Monitoring important places like Airports and Railway
stations.
 Securing nuclear power sites and national
infrastructures.
 Used for Military and Defense purposes
 Monitor important roads and public places.
 Detection and abandoning (possibly dangerous) objects
Requirements
 Low latency
 Data storage and Management including proper
backup.
 Searching and retrieval of stored visual information
 High degree of accuracy in producing alarms for
predefined events.
 Object detection and Tracking
 Motion detection and analysis
 Visualization at different levels (eg. enhancing &
restoration)
 Sensors : - To monitor movement along the fences
- For people/vehicle counting
High End Centralized Management
 H.264 based compression technique which would
enable quality video stream on 1 mbps bandwidth
 Storage upto 1 year or more
 Easy retrieval with respect to Time and Place
 Detection of illegitimate loitering
 Detection of unidentified objects
 Object detection and tracking
 System to build more accountability
 Ideal resource center for Police / ATS/ RAW and other
Intelligence agencies
Proposed Solution
Central
Storage
Wireless Network
Motion Analysis
Intrusion Analysis
Object Analysis
Colour Analysis
Shape Analysis
Encoder Encoder
Online
Monitoring
Offline
Monitoring
On Alert
Monitoring
Centralized Management System
Camera 1 Camera 2
Proposed Solution
 The proposed solution includes High resolution cameras fixed at
numerous locations across the city which would include public
places, prohibited areas, sensitive areas etc.
 These camera will be connected to encoders whereby the
captured would be encoded to desired format and then
transmitted to the Centralized Management System over
wireless network
 The CMS will process and analyze the videos at run time and
store them with tags referring to various parameters like object
characteristics, motion, intrusion etc.
 In case of any intrusion or other set parameter being active an
alert will be generated at the CMS
 Online Monitoring will also be available with switching between
the cameras
Monitoring Features
 The Online monitoring enables analysis of the video with respect to object
sizes, shapes, colour and stores the same with reference tags
 The Online monitoring allows search facility with parameters like motion,
object details, intrusion
 For e.g. at any given point if the user wishes to monitor a particular shape or
oversize objects, he will receive videos from the respective cameras on his
screen where such objects are being located
 The Offline monitoring enables access to stored video (about 1 year) with
comprehensive search facility. For e.g. user can access videos of a particular
day of a particular colour car across all the locations being monitored
 “On Alert” monitoring enables users to receive online alerts in case of any
intrusion, loitering in particular areas, over speeding vehicle or detection of a
particular shape of object like gun etc. The user can immediately access the
video from respective camera and track the suspicious person / object
Object Detection
Object detection provides surveillance-watch
automation that automatically detects objects.
e.g : People,Vehicles etc.
Classes of object detection
Intrusion Detection
Abandoned Baggage Detection
Stopped Vehicle Detection
Object Removal Detection
Autonomous PTZ Tracking
Intrusion Detection
Provides a security alarm when a person or
vehicle moves within a prohibited area under
video surveillance.
Stopped Vehicle Detection
Stopped vehicle detection
automatically detects and
alarms on the presence of a
stopped vehicle in an area
where parking/standing is a
violation.
Object Removal Detection
Provides an alarm when an item is removed from
its last location. Detection can be defined to
immediately alarm when an object is removed/
stolen.
Unattended Baggage Detection
Unattended baggage detection provides an alarm
when an item (package, debris, baggage, etc.) is
deposited or appears in a controlled area. In
addition, detection can be configured to ignore
items that are attended by a nearby person.
Autonomous PTZ Tracking
Detects and tracks a moving object by automatic commanding of
the mechanical pan, tilt, and zoom of a PTZ security camera. With
this automatic acquiring capabilities, the target is kept in-site and
in-focus providing magnified identification and information
gathering possibilities.
Motion Analysis
Moving Object
Detection
Feature
Extraction
Correspondence
Analysis
Prediction
Update
Context
Tracking
Moving Object Detection
Temporal differencing
Background subtraction
Optical Flow
Case Study - 1
Airport Security
Airport Security
Airports must be able to discover and deal with
potential security and operational problems, such
as:
* Unattended baggage
* Illegally parked vehicles (vehicle detection)
* Intruders
* Multiple Entries into a secured area
* Baggage tampering
Airport Security
Video surveillance is also important to implement at
airport’s apron, that is the area aircrafts are parked
and maintained by specialized ground vehicles.
For tracking of vehicles, e.g. fueling vehicles and
baggage cars, as well as tracking of individuals.
contd...
Airport Security
A main requirement behind the adopted video
system architecture is that the system must be capable
of monitoring and recognizing the activities and
interaction of numerous vehicles and personnel in a
dynamic environment over extended periods
contd..
Case Study - 2
Oil Refinery
Oil Refinery
Application : 24x7 monitoring of a 5-mile perimeter
of the fence
Threat Scenarios:
Vehicles or people loitering outside fence (severe)
Vehicles or people going over, under, or through
fence (critical)
Vehicles or people near inside of fence (critical)
Abandoned objects near fence (inside or out),
e.g., duffle bag of explosives (severe)
Camera disabling (moved, masked, lost power)
Oil Refinery
contd...
Moving
vehicle
Oil refinery
Perimeter around Oil Refinery
Case Study -3
Military and Defense Applications
Military & Defense Applications
To detect enemy planes and warships
To detect intruders at the fences of border areas
Ship Identification
Physical Environment Issues
· Water (constantly moving)
· Tides (edge and height of water constantly changing in view of
camera)
· Weather (rain, snow, fog, rapid shifts from sunny to cloudy)
· High winds
· Shore birds (primarily sea gulls)
Case Study - 4
Traffic Monitoring
Need for Traffic Monitoring
 To reduce the traffic congestion on highways
 Reduce the road accidents
 Identifying suspicious vehicles. Etc..,
Traffic Monitoring
Traffic scene analysis in 3 categories
 A straight forward vehicle detection and counting system.
 Congestion monitoring
 Vehicle classification and tracking systems which involve
much more detailed scene traffic analysis.
Traffic Monitoring
Recognizes vehicle patterns and compares
subsequent images to determine vehicle and
direction.
Thus it can detect any car driving the wrong way
into a lane against the flow.
contd...
www.cspl.co.in
mail@cspl.co.in

More Related Content

Similar to SECURITYHIGHEND CSPL

Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillance
Puneet soni
 
IRJET - Automatic Gun Control using Motion Detection System
IRJET - Automatic Gun Control using Motion Detection SystemIRJET - Automatic Gun Control using Motion Detection System
IRJET - Automatic Gun Control using Motion Detection System
IRJET Journal
 
Drone Security and Surveillance Security Drone.pdf
Drone Security and Surveillance Security Drone.pdfDrone Security and Surveillance Security Drone.pdf
Drone Security and Surveillance Security Drone.pdf
Phoenix Protection Services
 
Physical security.docx
Physical security.docxPhysical security.docx
Physical security.docx
MVNVKUMAR
 
AI-powered real-time video analytics for defence sector
AI-powered real-time video analytics for defence sectorAI-powered real-time video analytics for defence sector
AI-powered real-time video analytics for defence sector
Accubits Technologies
 
Totem mep solutions catalogue 2013
Totem mep solutions catalogue   2013Totem mep solutions catalogue   2013
Totem mep solutions catalogue 2013
Firoze Zia Hussain
 
Totem mep solutions catalogue 2013
Totem mep solutions catalogue   2013Totem mep solutions catalogue   2013
Totem mep solutions catalogue 2013
Firoze Hussain
 
Totem mep solutions catalogue 2013
Totem mep solutions catalogue   2013Totem mep solutions catalogue   2013
Totem mep solutions catalogue 2013
Firoze Zia Hussain
 
IVS Presentation
IVS PresentationIVS Presentation
IVS Presentation
JB Online
 
Thesis
ThesisThesis
Thesiscas123
 
Thesis
ThesisThesis
Thesiscas123
 
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural NetworksIRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
IRJET Journal
 
Video Crime Monitoring
Video Crime MonitoringVideo Crime Monitoring
Video Crime Monitoring
ijtsrd
 
Developing technology
Developing technologyDeveloping technology
Developing technology
OrderCustomEssay
 
Intrusion Detection & Electronic Surveillance For Security
Intrusion Detection & Electronic Surveillance For SecurityIntrusion Detection & Electronic Surveillance For Security
Intrusion Detection & Electronic Surveillance For SecurityPLN9 Security Services Pvt. Ltd.
 
Real Time Video Prosecution Unit
Real Time Video Prosecution UnitReal Time Video Prosecution Unit
RC Presentation MSPCE 2016
RC Presentation MSPCE 2016RC Presentation MSPCE 2016
RC Presentation MSPCE 2016Rick Cox
 
The Ultimate Guide to Security Surveillance.docx
The Ultimate Guide to Security Surveillance.docxThe Ultimate Guide to Security Surveillance.docx
The Ultimate Guide to Security Surveillance.docx
PelorusTechnologies
 
Abandoned Object Detection Based on Statistics for Labeled Regions
Abandoned Object Detection Based on Statistics for Labeled RegionsAbandoned Object Detection Based on Statistics for Labeled Regions
Abandoned Object Detection Based on Statistics for Labeled Regions
IRJET Journal
 

Similar to SECURITYHIGHEND CSPL (20)

Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillance
 
IRJET - Automatic Gun Control using Motion Detection System
IRJET - Automatic Gun Control using Motion Detection SystemIRJET - Automatic Gun Control using Motion Detection System
IRJET - Automatic Gun Control using Motion Detection System
 
Drone Security and Surveillance Security Drone.pdf
Drone Security and Surveillance Security Drone.pdfDrone Security and Surveillance Security Drone.pdf
Drone Security and Surveillance Security Drone.pdf
 
Physical security.docx
Physical security.docxPhysical security.docx
Physical security.docx
 
AI-powered real-time video analytics for defence sector
AI-powered real-time video analytics for defence sectorAI-powered real-time video analytics for defence sector
AI-powered real-time video analytics for defence sector
 
Totem mep solutions catalogue 2013
Totem mep solutions catalogue   2013Totem mep solutions catalogue   2013
Totem mep solutions catalogue 2013
 
Totem mep solutions catalogue 2013
Totem mep solutions catalogue   2013Totem mep solutions catalogue   2013
Totem mep solutions catalogue 2013
 
Totem mep solutions catalogue 2013
Totem mep solutions catalogue   2013Totem mep solutions catalogue   2013
Totem mep solutions catalogue 2013
 
IVS Presentation
IVS PresentationIVS Presentation
IVS Presentation
 
Thesis
ThesisThesis
Thesis
 
Thesis
ThesisThesis
Thesis
 
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural NetworksIRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
 
Video Crime Monitoring
Video Crime MonitoringVideo Crime Monitoring
Video Crime Monitoring
 
Developing technology
Developing technologyDeveloping technology
Developing technology
 
Security Intrusion Detection & Electronic Surveillance
Security Intrusion Detection & Electronic SurveillanceSecurity Intrusion Detection & Electronic Surveillance
Security Intrusion Detection & Electronic Surveillance
 
Intrusion Detection & Electronic Surveillance For Security
Intrusion Detection & Electronic Surveillance For SecurityIntrusion Detection & Electronic Surveillance For Security
Intrusion Detection & Electronic Surveillance For Security
 
Real Time Video Prosecution Unit
Real Time Video Prosecution UnitReal Time Video Prosecution Unit
Real Time Video Prosecution Unit
 
RC Presentation MSPCE 2016
RC Presentation MSPCE 2016RC Presentation MSPCE 2016
RC Presentation MSPCE 2016
 
The Ultimate Guide to Security Surveillance.docx
The Ultimate Guide to Security Surveillance.docxThe Ultimate Guide to Security Surveillance.docx
The Ultimate Guide to Security Surveillance.docx
 
Abandoned Object Detection Based on Statistics for Labeled Regions
Abandoned Object Detection Based on Statistics for Labeled RegionsAbandoned Object Detection Based on Statistics for Labeled Regions
Abandoned Object Detection Based on Statistics for Labeled Regions
 

More from Vikki Choudhry

BSS_M STUPOR Counter UAS " Unmanned Aircraft System"
BSS_M STUPOR  Counter UAS " Unmanned Aircraft System"BSS_M STUPOR  Counter UAS " Unmanned Aircraft System"
BSS_M STUPOR Counter UAS " Unmanned Aircraft System"
Vikki Choudhry
 
CK PRODUCT CATALOGUE 2023
CK PRODUCT CATALOGUE 2023 CK PRODUCT CATALOGUE 2023
CK PRODUCT CATALOGUE 2023
Vikki Choudhry
 
AI Based Image Analysis & Analytics Solution-.pdf
AI Based Image Analysis & Analytics Solution-.pdfAI Based Image Analysis & Analytics Solution-.pdf
AI Based Image Analysis & Analytics Solution-.pdf
Vikki Choudhry
 
BSS-LS Technology for producing pure hydrogen by hydrothermal oxidation.pptx
BSS-LS Technology for producing pure hydrogen by hydrothermal oxidation.pptxBSS-LS Technology for producing pure hydrogen by hydrothermal oxidation.pptx
BSS-LS Technology for producing pure hydrogen by hydrothermal oxidation.pptx
Vikki Choudhry
 
GBAS An introduction - Proprietary Information - BSS_AT
GBAS   An introduction - Proprietary Information - BSS_AT GBAS   An introduction - Proprietary Information - BSS_AT
GBAS An introduction - Proprietary Information - BSS_AT
Vikki Choudhry
 
Corrizon™ a single component waterborne metal protector that creates an immun...
Corrizon™ a single component waterborne metal protector that creates an immun...Corrizon™ a single component waterborne metal protector that creates an immun...
Corrizon™ a single component waterborne metal protector that creates an immun...
Vikki Choudhry
 
BSS_M alternative to Batteries in Automotive EVs
BSS_M  alternative to Batteries in Automotive EVs  BSS_M  alternative to Batteries in Automotive EVs
BSS_M alternative to Batteries in Automotive EVs
Vikki Choudhry
 
BSS NanoMesh WPE (Water Purification Equipment )
BSS NanoMesh WPE (Water Purification Equipment )BSS NanoMesh WPE (Water Purification Equipment )
BSS NanoMesh WPE (Water Purification Equipment )
Vikki Choudhry
 
BSS_M KMZ Presentation - A Gamechanger in Medical Diagnostics
BSS_M  KMZ Presentation - A Gamechanger in Medical Diagnostics BSS_M  KMZ Presentation - A Gamechanger in Medical Diagnostics
BSS_M KMZ Presentation - A Gamechanger in Medical Diagnostics
Vikki Choudhry
 
BSS_M Presentation on UAVs; Counter-UAV; UTM; Weaponized Drone
BSS_M  Presentation on UAVs; Counter-UAV; UTM; Weaponized Drone BSS_M  Presentation on UAVs; Counter-UAV; UTM; Weaponized Drone
BSS_M Presentation on UAVs; Counter-UAV; UTM; Weaponized Drone
Vikki Choudhry
 
BSS NanoMesh WPE (Water Purification Equipment )
BSS NanoMesh WPE (Water Purification Equipment )BSS NanoMesh WPE (Water Purification Equipment )
BSS NanoMesh WPE (Water Purification Equipment )
Vikki Choudhry
 
CSPL Catalogue for Police and Army
CSPL  Catalogue for Police and ArmyCSPL  Catalogue for Police and Army
CSPL Catalogue for Police and ArmyVikki Choudhry
 

More from Vikki Choudhry (12)

BSS_M STUPOR Counter UAS " Unmanned Aircraft System"
BSS_M STUPOR  Counter UAS " Unmanned Aircraft System"BSS_M STUPOR  Counter UAS " Unmanned Aircraft System"
BSS_M STUPOR Counter UAS " Unmanned Aircraft System"
 
CK PRODUCT CATALOGUE 2023
CK PRODUCT CATALOGUE 2023 CK PRODUCT CATALOGUE 2023
CK PRODUCT CATALOGUE 2023
 
AI Based Image Analysis & Analytics Solution-.pdf
AI Based Image Analysis & Analytics Solution-.pdfAI Based Image Analysis & Analytics Solution-.pdf
AI Based Image Analysis & Analytics Solution-.pdf
 
BSS-LS Technology for producing pure hydrogen by hydrothermal oxidation.pptx
BSS-LS Technology for producing pure hydrogen by hydrothermal oxidation.pptxBSS-LS Technology for producing pure hydrogen by hydrothermal oxidation.pptx
BSS-LS Technology for producing pure hydrogen by hydrothermal oxidation.pptx
 
GBAS An introduction - Proprietary Information - BSS_AT
GBAS   An introduction - Proprietary Information - BSS_AT GBAS   An introduction - Proprietary Information - BSS_AT
GBAS An introduction - Proprietary Information - BSS_AT
 
Corrizon™ a single component waterborne metal protector that creates an immun...
Corrizon™ a single component waterborne metal protector that creates an immun...Corrizon™ a single component waterborne metal protector that creates an immun...
Corrizon™ a single component waterborne metal protector that creates an immun...
 
BSS_M alternative to Batteries in Automotive EVs
BSS_M  alternative to Batteries in Automotive EVs  BSS_M  alternative to Batteries in Automotive EVs
BSS_M alternative to Batteries in Automotive EVs
 
BSS NanoMesh WPE (Water Purification Equipment )
BSS NanoMesh WPE (Water Purification Equipment )BSS NanoMesh WPE (Water Purification Equipment )
BSS NanoMesh WPE (Water Purification Equipment )
 
BSS_M KMZ Presentation - A Gamechanger in Medical Diagnostics
BSS_M  KMZ Presentation - A Gamechanger in Medical Diagnostics BSS_M  KMZ Presentation - A Gamechanger in Medical Diagnostics
BSS_M KMZ Presentation - A Gamechanger in Medical Diagnostics
 
BSS_M Presentation on UAVs; Counter-UAV; UTM; Weaponized Drone
BSS_M  Presentation on UAVs; Counter-UAV; UTM; Weaponized Drone BSS_M  Presentation on UAVs; Counter-UAV; UTM; Weaponized Drone
BSS_M Presentation on UAVs; Counter-UAV; UTM; Weaponized Drone
 
BSS NanoMesh WPE (Water Purification Equipment )
BSS NanoMesh WPE (Water Purification Equipment )BSS NanoMesh WPE (Water Purification Equipment )
BSS NanoMesh WPE (Water Purification Equipment )
 
CSPL Catalogue for Police and Army
CSPL  Catalogue for Police and ArmyCSPL  Catalogue for Police and Army
CSPL Catalogue for Police and Army
 

SECURITYHIGHEND CSPL

  • 1. Video Analysis & Surveillance in High End Security
  • 2. Introduction  Security refers to “freedom from risk or danger”.  Video security is used to protect homes, property and people.  Because of increased crime in many towns and cities, video security is essential.  Another reason for video security is documenta- tion. If a crime is committed, you will have a record of it. This evidence is readily available and can be quite valuable.
  • 3. Introduction 11 Sep 2001 WTC disaster 7 July 2005 London bombings 3 contd...
  • 4. Now in Mumbai 26th Nov 2008 Hotel Taj Mahal CST Railway Station Taxi at Vile Parle
  • 5. Mumbai Terror Attack  Terrorists infiltrated in to Mumbai through sea route which could have been tracked in the sea itself  They alighted on the shore in group of ten people with heavy luggage and entered the land which again could have been monitored  Few of the terrorists were staying in the hotel and were able to move large material inside their rooms and also survey the hotel building which also could have been monitored  Few terrorists went firing all across the city through railway station, hospital and roads and were not being monitored which if could have been done, the terrorists could have been trapped and prevented from causing damage to that extent
  • 6.  Increasing crime rates and terrorist activity, as well as an increasing demand for more protection of people and assets is affecting the growth of the security related applications and more specifically, the video surveillance system.  An obvious benefit of video surveillance is 24/7 monitoring of both densely populated areas, remote and isolated locations. Whether used for live monitoring, recording or both, video has proven to be invaluable for identifying individuals spotting criminal activity, recording accidents and other events. Introduction contd...
  • 7. Traditional Surveillance Systems  Traditional CCTV security systems conventionally are:  Analog or Digital type  Limited Tape life or Storage in terms of Time  Complex High End Central Management System  Systems are totally dumb and require very high Human intervention  Ideal for small thefts and similar incidents but cannot deal with terrorist attacks
  • 8. IT IS MORE IMPORTANT TO SAVE HUMAN LIFE THAN TO FIND OUT THE REASON THROUGH POSTMORTEM MISSION TO COMBAT TERRORISM RIGHT AT THE DOOR WE PROVIDE THE NEXT GENERATION SECURITY SYSTEMS WITH ARTIFICIAL INTELLIGENCE
  • 9. Video Analysis & Surveillance in High End Security Monitoring important places like Airports and Railway stations.  Securing nuclear power sites and national infrastructures.  Used for Military and Defense purposes  Monitor important roads and public places.  Detection and abandoning (possibly dangerous) objects
  • 10. Requirements  Low latency  Data storage and Management including proper backup.  Searching and retrieval of stored visual information  High degree of accuracy in producing alarms for predefined events.  Object detection and Tracking  Motion detection and analysis  Visualization at different levels (eg. enhancing & restoration)  Sensors : - To monitor movement along the fences - For people/vehicle counting
  • 11. High End Centralized Management  H.264 based compression technique which would enable quality video stream on 1 mbps bandwidth  Storage upto 1 year or more  Easy retrieval with respect to Time and Place  Detection of illegitimate loitering  Detection of unidentified objects  Object detection and tracking  System to build more accountability  Ideal resource center for Police / ATS/ RAW and other Intelligence agencies
  • 12. Proposed Solution Central Storage Wireless Network Motion Analysis Intrusion Analysis Object Analysis Colour Analysis Shape Analysis Encoder Encoder Online Monitoring Offline Monitoring On Alert Monitoring Centralized Management System Camera 1 Camera 2
  • 13. Proposed Solution  The proposed solution includes High resolution cameras fixed at numerous locations across the city which would include public places, prohibited areas, sensitive areas etc.  These camera will be connected to encoders whereby the captured would be encoded to desired format and then transmitted to the Centralized Management System over wireless network  The CMS will process and analyze the videos at run time and store them with tags referring to various parameters like object characteristics, motion, intrusion etc.  In case of any intrusion or other set parameter being active an alert will be generated at the CMS  Online Monitoring will also be available with switching between the cameras
  • 14. Monitoring Features  The Online monitoring enables analysis of the video with respect to object sizes, shapes, colour and stores the same with reference tags  The Online monitoring allows search facility with parameters like motion, object details, intrusion  For e.g. at any given point if the user wishes to monitor a particular shape or oversize objects, he will receive videos from the respective cameras on his screen where such objects are being located  The Offline monitoring enables access to stored video (about 1 year) with comprehensive search facility. For e.g. user can access videos of a particular day of a particular colour car across all the locations being monitored  “On Alert” monitoring enables users to receive online alerts in case of any intrusion, loitering in particular areas, over speeding vehicle or detection of a particular shape of object like gun etc. The user can immediately access the video from respective camera and track the suspicious person / object
  • 15. Object Detection Object detection provides surveillance-watch automation that automatically detects objects. e.g : People,Vehicles etc.
  • 16. Classes of object detection Intrusion Detection Abandoned Baggage Detection Stopped Vehicle Detection Object Removal Detection Autonomous PTZ Tracking
  • 17. Intrusion Detection Provides a security alarm when a person or vehicle moves within a prohibited area under video surveillance.
  • 18. Stopped Vehicle Detection Stopped vehicle detection automatically detects and alarms on the presence of a stopped vehicle in an area where parking/standing is a violation.
  • 19. Object Removal Detection Provides an alarm when an item is removed from its last location. Detection can be defined to immediately alarm when an object is removed/ stolen.
  • 20. Unattended Baggage Detection Unattended baggage detection provides an alarm when an item (package, debris, baggage, etc.) is deposited or appears in a controlled area. In addition, detection can be configured to ignore items that are attended by a nearby person.
  • 21. Autonomous PTZ Tracking Detects and tracks a moving object by automatic commanding of the mechanical pan, tilt, and zoom of a PTZ security camera. With this automatic acquiring capabilities, the target is kept in-site and in-focus providing magnified identification and information gathering possibilities.
  • 23. Case Study - 1 Airport Security
  • 24. Airport Security Airports must be able to discover and deal with potential security and operational problems, such as: * Unattended baggage * Illegally parked vehicles (vehicle detection) * Intruders * Multiple Entries into a secured area * Baggage tampering
  • 25. Airport Security Video surveillance is also important to implement at airport’s apron, that is the area aircrafts are parked and maintained by specialized ground vehicles. For tracking of vehicles, e.g. fueling vehicles and baggage cars, as well as tracking of individuals. contd...
  • 26. Airport Security A main requirement behind the adopted video system architecture is that the system must be capable of monitoring and recognizing the activities and interaction of numerous vehicles and personnel in a dynamic environment over extended periods contd..
  • 27. Case Study - 2 Oil Refinery
  • 28. Oil Refinery Application : 24x7 monitoring of a 5-mile perimeter of the fence Threat Scenarios: Vehicles or people loitering outside fence (severe) Vehicles or people going over, under, or through fence (critical) Vehicles or people near inside of fence (critical) Abandoned objects near fence (inside or out), e.g., duffle bag of explosives (severe) Camera disabling (moved, masked, lost power)
  • 30. Case Study -3 Military and Defense Applications
  • 31. Military & Defense Applications To detect enemy planes and warships To detect intruders at the fences of border areas
  • 32. Ship Identification Physical Environment Issues · Water (constantly moving) · Tides (edge and height of water constantly changing in view of camera) · Weather (rain, snow, fog, rapid shifts from sunny to cloudy) · High winds · Shore birds (primarily sea gulls)
  • 33. Case Study - 4 Traffic Monitoring
  • 34. Need for Traffic Monitoring  To reduce the traffic congestion on highways  Reduce the road accidents  Identifying suspicious vehicles. Etc..,
  • 35. Traffic Monitoring Traffic scene analysis in 3 categories  A straight forward vehicle detection and counting system.  Congestion monitoring  Vehicle classification and tracking systems which involve much more detailed scene traffic analysis.
  • 36. Traffic Monitoring Recognizes vehicle patterns and compares subsequent images to determine vehicle and direction. Thus it can detect any car driving the wrong way into a lane against the flow. contd...