SlideShare a Scribd company logo
Video Surveillance Technology
            and
City Surveillance for Mumbai
what is video
surveillance?




                Present Implementations?
                    •   Human detection systems.
                    •   Vehicle monitoring systems
                    •   Monitoring of Critical non movable assets
Importance of Video
Surveillance System

             Video surveillance has been a popular security tool for years. And
              thanks to new breakthroughs in technology, security cameras are
              more effective than ever before;

             Banks, retail stores, and countless other end-users depend on the
              protection provided by video surveillance;

             Fortunately, advances in digital technology have made video
              surveillance systems far more cost-effective, flexible, and simple
              to operate;

             Security systems using IP (Internet Protocol) cameras are easy to
              install and maintain, and can be customized and scaled to
              perfectly match your specific needs.
Security
Threats




                     Vehicles with        Suspicious behavior
                   explosive payload      that leads to violent
                                                 crime;




           Suspicious behavior          Access control
               that leads to           breaches (human
             financial losses            and vehicle).
Is
surveillance a
threat ?




   Continuous video of all locations
     within        the   district       may   be
     perceived as a security threat;
   This      is     actually       a    security
     mechanism;




                                Prevention is better than
                                         cure
Why city
Surveillance
?



   •   To have a video security blanket across the
       district;

   •   To be able to monitor activities in any part
       of the district in real time;

   •   For automatic alarms for suspicious events;

   •   To be able to playback past events after the
       occurrence and to locate / trace vehicles,
       objects or people.
Benefits of Video
  Surveillance
    System


              Proactive actions (Preventive Surveillance);
              Full surveillance with less personnel. (Cost reduction);
              Verification (recording) of events;
              Additional tool against crime;
              Low operational cost;
              Cost effectiveness for escalating system;
              Flexibility to escalate system to unlimited number of cameras.
Resources
Required

      •   Cameras: Hundreds of cameras across the District;

      •   Camera Mounting;

      •   Bandwidth and Connectivity: To take the video feeds to central monitoring

          locations;

      •   High capacity servers at the monitoring location to save the captured

          video streams;

      •   Sophisticated video analytics software to analyze the videos and do value-

          addition such as raising of alarms, recognition of people and objects and

          so on;

      •   Mechanism to disseminate video-derived intelligence to officers on the

          ground;

      •   Ability to combine video feeds with other sources of intelligence –

          communication intercepts and, most of all, human intelligence.
Project
Benefits
  to
Mumbai
    •   A Disaster Information and Planning System without
        investing any money;


    •   A Law-And-Order monitoring system;


    •   Personnel locating potential – for criminals,
        Missing children and others : Would entail use
        of facial recognition technology;


    •   Video records can serve as evidence in
        street crime cases;
Additional
Benefits (1/2)


           •   Accurate information on the state of infrastructure in the district
               – potholes, water-logging, burst pipelines, leaky fire hydrants,
               etc. can all be detected from central locations;
           •   Illegal activities such as encroachments, water theft, etc. can be
               easily detected;
           •   Any digging / development activity on streets can be centrally
               monitored / recorded;
           •   Illegal hoardings, banners, construction activities can be easily
               detected;
           •   Records of traffic conditions can be used for planning of road,
               bridge and other infrastructure creation;
Additional
 Benefits
  (2/2)
  • During the monsoons, clogged sewages can be detected long
    before the clogging leads to water logging;

  • Monitoring of water logging in real time can help with planning of
    sewage and drainage systems;

  • Garbage pile-up, malfunctioning street lights, etc. can be detected;

  • Noise / air pollution measurement equipment for real estate and
    development planning;

  • Polluting establishments can be detected and brought to book.
City
Infrastructure
       s
Benefits to
    Other
City Agencies


      • Police can know the health of roads if they need to reach a
        crime scene in a hurry;

      • Ambulances will know, how much time it may take to reach
        a hospital or a patient;

      • The Fire department will be able to reach a scene of fire
        faster.
Benefits
     to
The Citizens



           • Regular traffic and route planning information;
           • Vehicle and people tracking services;
           • Increased safety due to surveillance;
           • Emergency road information during disasters and
               calamities;
           • Overall, better planning for the city.
Benefits
    to
   Local
Associations



         • Gives Local Association an opportunity to have prominent citizens voice
               their support for them via a socially significant project;

         • Cameras across the district to have the local association name – very
               visible branding for local association;

         • Law Enforcement Agencies and other official users of the video feeds to
               interact regularly with local associations for sourcing the video.
Opex Model
     for
Video-blanket
    Model

         The source of funding to meet this huge expenditure would be through Public –
           Private – Partnership (PPP) Module;

         Or, the local renowned body/association will shoulder the expenditure and Police
           Department of Thane District will provide security service on real-time on 24x7
           basis by coordinating with Micro ICCS developed and operated by MTIL;

         The part of the expenditure can be realized through advertisement by using the
           allocated empty space above the cameras installed at various locations in the district.
Future Value
Added Services


      • Automatic recognition of car numbers as a location service;

      • Video record of accidents to be used for insurance claims – insurance
        companies pay for such videos;

      • Policing the streets for parking and other offences – issuance of no parking
        / no stopping tickets using such cameras;

      • Car parking services. When on a street, call our number and we will use the
        camera output to guide you to an available parking slot.
A brief Introduction on Video surveillance Technology

More Related Content

What's hot

Automatic Vehicle Locator(AVL) Seminar report
 Automatic Vehicle Locator(AVL) Seminar report Automatic Vehicle Locator(AVL) Seminar report
Automatic Vehicle Locator(AVL) Seminar report
Rohit Kumar patel
 
automatic vehicle location
automatic vehicle locationautomatic vehicle location
automatic vehicle locationAkhil Kumar
 
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
Corporate Services
 
Self-Driving Cars With Convolutional Neural Networks (CNN.pptx
Self-Driving Cars With Convolutional Neural Networks (CNN.pptxSelf-Driving Cars With Convolutional Neural Networks (CNN.pptx
Self-Driving Cars With Convolutional Neural Networks (CNN.pptx
ssuserf79e761
 
“Embedded Vision in ADAS and Autonomous Vehicles: Navigating the New Reality,...
“Embedded Vision in ADAS and Autonomous Vehicles: Navigating the New Reality,...“Embedded Vision in ADAS and Autonomous Vehicles: Navigating the New Reality,...
“Embedded Vision in ADAS and Autonomous Vehicles: Navigating the New Reality,...
Edge AI and Vision Alliance
 
Cctv ip surveillance system
Cctv ip surveillance systemCctv ip surveillance system
Cctv ip surveillance system
A Total Communication Solutions Provider
 
Driving behavior for ADAS and Autonomous Driving
Driving behavior for ADAS and Autonomous DrivingDriving behavior for ADAS and Autonomous Driving
Driving behavior for ADAS and Autonomous Driving
Yu Huang
 
Drowsiness Detection Presentation
Drowsiness Detection PresentationDrowsiness Detection Presentation
Drowsiness Detection Presentation
Saurabh Kawli
 
Driver DrowsiNess System
Driver DrowsiNess SystemDriver DrowsiNess System
Driver DrowsiNess System
Gurunadh Guru
 
Parking management system ppt
Parking management system pptParking management system ppt
Parking management system ppt
Echelon Edge Pvt Ltd
 
Surveilance ppt
Surveilance ppt Surveilance ppt
Surveilance ppt
AKSHIT KOHLI
 
Intelligent traffic information and control system
Intelligent traffic information and control systemIntelligent traffic information and control system
Intelligent traffic information and control system
SADEED AMEEN
 
Drowsy Driver detection system
Drowsy Driver detection systemDrowsy Driver detection system
Drowsy Driver detection system
Muneendra Rasamsetty
 
Driver Status Monitoring system
Driver Status Monitoring systemDriver Status Monitoring system
Driver Status Monitoring system
SeenivasababuBG
 
Seminar on anpr 1
Seminar on anpr 1Seminar on anpr 1
Seminar on anpr 1
Chandan Gowda
 
Deep Learning for Autonomous Driving
Deep Learning for Autonomous DrivingDeep Learning for Autonomous Driving
Deep Learning for Autonomous Driving
Jan Wiegelmann
 
Moving object detection in video surveillance
Moving object detection in video surveillanceMoving object detection in video surveillance
Moving object detection in video surveillance
Ashfaqul Haque John
 
“ADAS in Action (POC Autonomous Driving Vehicle Presentation)”
“ADAS in Action (POC Autonomous Driving Vehicle Presentation)”  “ADAS in Action (POC Autonomous Driving Vehicle Presentation)”
“ADAS in Action (POC Autonomous Driving Vehicle Presentation)”
GlobalLogic Ukraine
 
Self-driving cars are here
Self-driving cars are hereSelf-driving cars are here
Self-driving cars are here
Andrew Ng
 
UDS: Vehicle Diagnostics in AUTOSAR Software Architecture
UDS: Vehicle Diagnostics in AUTOSAR Software Architecture UDS: Vehicle Diagnostics in AUTOSAR Software Architecture
UDS: Vehicle Diagnostics in AUTOSAR Software Architecture
Embitel Technologies (I) PVT LTD
 

What's hot (20)

Automatic Vehicle Locator(AVL) Seminar report
 Automatic Vehicle Locator(AVL) Seminar report Automatic Vehicle Locator(AVL) Seminar report
Automatic Vehicle Locator(AVL) Seminar report
 
automatic vehicle location
automatic vehicle locationautomatic vehicle location
automatic vehicle location
 
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
 
Self-Driving Cars With Convolutional Neural Networks (CNN.pptx
Self-Driving Cars With Convolutional Neural Networks (CNN.pptxSelf-Driving Cars With Convolutional Neural Networks (CNN.pptx
Self-Driving Cars With Convolutional Neural Networks (CNN.pptx
 
“Embedded Vision in ADAS and Autonomous Vehicles: Navigating the New Reality,...
“Embedded Vision in ADAS and Autonomous Vehicles: Navigating the New Reality,...“Embedded Vision in ADAS and Autonomous Vehicles: Navigating the New Reality,...
“Embedded Vision in ADAS and Autonomous Vehicles: Navigating the New Reality,...
 
Cctv ip surveillance system
Cctv ip surveillance systemCctv ip surveillance system
Cctv ip surveillance system
 
Driving behavior for ADAS and Autonomous Driving
Driving behavior for ADAS and Autonomous DrivingDriving behavior for ADAS and Autonomous Driving
Driving behavior for ADAS and Autonomous Driving
 
Drowsiness Detection Presentation
Drowsiness Detection PresentationDrowsiness Detection Presentation
Drowsiness Detection Presentation
 
Driver DrowsiNess System
Driver DrowsiNess SystemDriver DrowsiNess System
Driver DrowsiNess System
 
Parking management system ppt
Parking management system pptParking management system ppt
Parking management system ppt
 
Surveilance ppt
Surveilance ppt Surveilance ppt
Surveilance ppt
 
Intelligent traffic information and control system
Intelligent traffic information and control systemIntelligent traffic information and control system
Intelligent traffic information and control system
 
Drowsy Driver detection system
Drowsy Driver detection systemDrowsy Driver detection system
Drowsy Driver detection system
 
Driver Status Monitoring system
Driver Status Monitoring systemDriver Status Monitoring system
Driver Status Monitoring system
 
Seminar on anpr 1
Seminar on anpr 1Seminar on anpr 1
Seminar on anpr 1
 
Deep Learning for Autonomous Driving
Deep Learning for Autonomous DrivingDeep Learning for Autonomous Driving
Deep Learning for Autonomous Driving
 
Moving object detection in video surveillance
Moving object detection in video surveillanceMoving object detection in video surveillance
Moving object detection in video surveillance
 
“ADAS in Action (POC Autonomous Driving Vehicle Presentation)”
“ADAS in Action (POC Autonomous Driving Vehicle Presentation)”  “ADAS in Action (POC Autonomous Driving Vehicle Presentation)”
“ADAS in Action (POC Autonomous Driving Vehicle Presentation)”
 
Self-driving cars are here
Self-driving cars are hereSelf-driving cars are here
Self-driving cars are here
 
UDS: Vehicle Diagnostics in AUTOSAR Software Architecture
UDS: Vehicle Diagnostics in AUTOSAR Software Architecture UDS: Vehicle Diagnostics in AUTOSAR Software Architecture
UDS: Vehicle Diagnostics in AUTOSAR Software Architecture
 

Viewers also liked

Video Surveillance
Video SurveillanceVideo Surveillance
Video SurveillanceMihika Shah
 
Cctv presentation
Cctv presentationCctv presentation
Cctv presentation
Jimuth Dutta Chowdhury
 
CCTV-Powerpoint-Presentation
CCTV-Powerpoint-PresentationCCTV-Powerpoint-Presentation
CCTV-Powerpoint-Presentation
guestaec424
 
Surveillance
SurveillanceSurveillance
Surveillance
Akhilesh Bhargava
 
CCTV Camera Presentation
CCTV Camera PresentationCCTV Camera Presentation
CCTV Camera Presentation
Basith JM
 
Video Surveillance System
Video Surveillance SystemVideo Surveillance System
Video Surveillance System
Ali Mattash
 
Proposal for cctv cameras
Proposal for cctv camerasProposal for cctv cameras
Proposal for cctv cameras
Mritunjay Kumar
 
Seminar on CCTV Cameras
Seminar on CCTV CamerasSeminar on CCTV Cameras
Seminar on CCTV Cameras
Sachin Sharma
 
Xvidia Intelligent Surveillance
Xvidia Intelligent SurveillanceXvidia Intelligent Surveillance
Xvidia Intelligent Surveillance
ars756
 
"Intelligent Video Surveillance: Are We There Yet?," a Presentation from Chec...
"Intelligent Video Surveillance: Are We There Yet?," a Presentation from Chec..."Intelligent Video Surveillance: Are We There Yet?," a Presentation from Chec...
"Intelligent Video Surveillance: Are We There Yet?," a Presentation from Chec...
Edge AI and Vision Alliance
 
Shri pps
Shri ppsShri pps
Shri ppslshri
 
Video Surveillance System
Video Surveillance SystemVideo Surveillance System
Video Surveillance System
Sheikh Faiyaz
 
Ip Based distributed surveillance system
Ip Based distributed surveillance systemIp Based distributed surveillance system
Ip Based distributed surveillance system
Kamal Lamichhane
 
Types of Surveillance Systems
Types of Surveillance Systems			Types of Surveillance Systems
Types of Surveillance Systems LeolaHuffman
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
IBM Security
 
Security Cameras & IP Cameras
Security Cameras & IP CamerasSecurity Cameras & IP Cameras
Security Cameras & IP Cameras
Ahmad0Muhammad
 
The Technology Radar - a Tool of Technology Intelligence and Innovation Strategy
The Technology Radar - a Tool of Technology Intelligence and Innovation StrategyThe Technology Radar - a Tool of Technology Intelligence and Innovation Strategy
The Technology Radar - a Tool of Technology Intelligence and Innovation StrategyRené Rohrbeck
 
Smart devices
Smart devicesSmart devices
Smart devices
kumar bunny
 

Viewers also liked (20)

Video Surveillance
Video SurveillanceVideo Surveillance
Video Surveillance
 
Cctv presentation
Cctv presentationCctv presentation
Cctv presentation
 
CCTV-Powerpoint-Presentation
CCTV-Powerpoint-PresentationCCTV-Powerpoint-Presentation
CCTV-Powerpoint-Presentation
 
Surveillance
SurveillanceSurveillance
Surveillance
 
CCTV Camera Presentation
CCTV Camera PresentationCCTV Camera Presentation
CCTV Camera Presentation
 
Video Surveillance System
Video Surveillance SystemVideo Surveillance System
Video Surveillance System
 
Proposal for cctv cameras
Proposal for cctv camerasProposal for cctv cameras
Proposal for cctv cameras
 
Seminar on CCTV Cameras
Seminar on CCTV CamerasSeminar on CCTV Cameras
Seminar on CCTV Cameras
 
Xvidia Intelligent Surveillance
Xvidia Intelligent SurveillanceXvidia Intelligent Surveillance
Xvidia Intelligent Surveillance
 
"Intelligent Video Surveillance: Are We There Yet?," a Presentation from Chec...
"Intelligent Video Surveillance: Are We There Yet?," a Presentation from Chec..."Intelligent Video Surveillance: Are We There Yet?," a Presentation from Chec...
"Intelligent Video Surveillance: Are We There Yet?," a Presentation from Chec...
 
Shri pps
Shri ppsShri pps
Shri pps
 
Video Surveillance System
Video Surveillance SystemVideo Surveillance System
Video Surveillance System
 
Wan
WanWan
Wan
 
Ip Based distributed surveillance system
Ip Based distributed surveillance systemIp Based distributed surveillance system
Ip Based distributed surveillance system
 
CCTV Presentation
CCTV Presentation CCTV Presentation
CCTV Presentation
 
Types of Surveillance Systems
Types of Surveillance Systems			Types of Surveillance Systems
Types of Surveillance Systems
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
Security Cameras & IP Cameras
Security Cameras & IP CamerasSecurity Cameras & IP Cameras
Security Cameras & IP Cameras
 
The Technology Radar - a Tool of Technology Intelligence and Innovation Strategy
The Technology Radar - a Tool of Technology Intelligence and Innovation StrategyThe Technology Radar - a Tool of Technology Intelligence and Innovation Strategy
The Technology Radar - a Tool of Technology Intelligence and Innovation Strategy
 
Smart devices
Smart devicesSmart devices
Smart devices
 

Similar to A brief Introduction on Video surveillance Technology

smart security infrastructure
smart security infrastructuresmart security infrastructure
smart security infrastructure
Shreyas Satpute
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security Infrastructure
GAURAV. H .TANDON
 
Smart Cities 2015_Gautam Nanda
Smart Cities 2015_Gautam NandaSmart Cities 2015_Gautam Nanda
Smart Cities 2015_Gautam Nanda
IPPAI
 
Vi system product brochure
Vi system product brochureVi system product brochure
Vi system product brochure
wilnet40
 
CNL Software IPSecurityCenter Case Studies Presentation 0113
CNL Software IPSecurityCenter Case Studies Presentation  0113CNL Software IPSecurityCenter Case Studies Presentation  0113
CNL Software IPSecurityCenter Case Studies Presentation 0113
Adlan Hussain
 
Eyewatch a versatile mobile platform for security and M-governance - Cdr (Ret...
Eyewatch a versatile mobile platform for security and M-governance - Cdr (Ret...Eyewatch a versatile mobile platform for security and M-governance - Cdr (Ret...
Eyewatch a versatile mobile platform for security and M-governance - Cdr (Ret...
IPPAI
 
Video surveillance
Video surveillanceVideo surveillance
Video surveillance
naresh_arthem
 
Video Surveillance Software Market size.pdf
Video Surveillance Software Market size.pdfVideo Surveillance Software Market size.pdf
Video Surveillance Software Market size.pdf
shreyaporekar9
 
Case studies Safe Cities
Case studies Safe CitiesCase studies Safe Cities
Case studies Safe Cities
Axis Communications
 
Xvidia Security
Xvidia Security Xvidia Security
Xvidia Security
ars756
 
EENA 2021 - Improving public safety with smart cities and Internet of Things ...
EENA 2021 - Improving public safety with smart cities and Internet of Things ...EENA 2021 - Improving public safety with smart cities and Internet of Things ...
EENA 2021 - Improving public safety with smart cities and Internet of Things ...
EENA (European Emergency Number Association)
 
Secure and safe monitor ur hazard plant with Link-vue System
Secure and safe monitor ur hazard  plant  with Link-vue SystemSecure and safe monitor ur hazard  plant  with Link-vue System
Secure and safe monitor ur hazard plant with Link-vue System
Mahesh Chandra Manav
 
Detailed Study of CCTV Cameras
Detailed Study of CCTV CamerasDetailed Study of CCTV Cameras
Detailed Study of CCTV Cameras
Hans Khanna
 
Detailed study of_cctv_cameras
Detailed study of_cctv_camerasDetailed study of_cctv_cameras
Detailed study of_cctv_cameras
Yaser Al-Abdali
 
Video Crime Monitoring
Video Crime MonitoringVideo Crime Monitoring
Video Crime Monitoring
ijtsrd
 
Psdot 7 change detection algorithm for visual
Psdot 7 change detection algorithm for visualPsdot 7 change detection algorithm for visual
Psdot 7 change detection algorithm for visual
ZTech Proje
 
Data-Driven Monitoring in Safety Critical Infrastructure
Data-Driven Monitoring in Safety Critical InfrastructureData-Driven Monitoring in Safety Critical Infrastructure
Data-Driven Monitoring in Safety Critical Infrastructure
Jinane J. Harmouche
 
Traffic violations Saher Presentation KSA
Traffic violations Saher Presentation KSATraffic violations Saher Presentation KSA
Traffic violations Saher Presentation KSA
Hemant Narang
 
Airport Its Design Guide R1.3
Airport Its Design Guide R1.3Airport Its Design Guide R1.3
Airport Its Design Guide R1.3
Peter Ashley
 

Similar to A brief Introduction on Video surveillance Technology (20)

smart security infrastructure
smart security infrastructuresmart security infrastructure
smart security infrastructure
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security Infrastructure
 
Smart Cities 2015_Gautam Nanda
Smart Cities 2015_Gautam NandaSmart Cities 2015_Gautam Nanda
Smart Cities 2015_Gautam Nanda
 
Vi system product brochure
Vi system product brochureVi system product brochure
Vi system product brochure
 
CNL Software IPSecurityCenter Case Studies Presentation 0113
CNL Software IPSecurityCenter Case Studies Presentation  0113CNL Software IPSecurityCenter Case Studies Presentation  0113
CNL Software IPSecurityCenter Case Studies Presentation 0113
 
Eyewatch a versatile mobile platform for security and M-governance - Cdr (Ret...
Eyewatch a versatile mobile platform for security and M-governance - Cdr (Ret...Eyewatch a versatile mobile platform for security and M-governance - Cdr (Ret...
Eyewatch a versatile mobile platform for security and M-governance - Cdr (Ret...
 
Video surveillance
Video surveillanceVideo surveillance
Video surveillance
 
Flyer axis agentvi_jvp_en_1505
Flyer axis agentvi_jvp_en_1505Flyer axis agentvi_jvp_en_1505
Flyer axis agentvi_jvp_en_1505
 
Video Surveillance Software Market size.pdf
Video Surveillance Software Market size.pdfVideo Surveillance Software Market size.pdf
Video Surveillance Software Market size.pdf
 
Case studies Safe Cities
Case studies Safe CitiesCase studies Safe Cities
Case studies Safe Cities
 
Xvidia Security
Xvidia Security Xvidia Security
Xvidia Security
 
EENA 2021 - Improving public safety with smart cities and Internet of Things ...
EENA 2021 - Improving public safety with smart cities and Internet of Things ...EENA 2021 - Improving public safety with smart cities and Internet of Things ...
EENA 2021 - Improving public safety with smart cities and Internet of Things ...
 
Secure and safe monitor ur hazard plant with Link-vue System
Secure and safe monitor ur hazard  plant  with Link-vue SystemSecure and safe monitor ur hazard  plant  with Link-vue System
Secure and safe monitor ur hazard plant with Link-vue System
 
Detailed Study of CCTV Cameras
Detailed Study of CCTV CamerasDetailed Study of CCTV Cameras
Detailed Study of CCTV Cameras
 
Detailed study of_cctv_cameras
Detailed study of_cctv_camerasDetailed study of_cctv_cameras
Detailed study of_cctv_cameras
 
Video Crime Monitoring
Video Crime MonitoringVideo Crime Monitoring
Video Crime Monitoring
 
Psdot 7 change detection algorithm for visual
Psdot 7 change detection algorithm for visualPsdot 7 change detection algorithm for visual
Psdot 7 change detection algorithm for visual
 
Data-Driven Monitoring in Safety Critical Infrastructure
Data-Driven Monitoring in Safety Critical InfrastructureData-Driven Monitoring in Safety Critical Infrastructure
Data-Driven Monitoring in Safety Critical Infrastructure
 
Traffic violations Saher Presentation KSA
Traffic violations Saher Presentation KSATraffic violations Saher Presentation KSA
Traffic violations Saher Presentation KSA
 
Airport Its Design Guide R1.3
Airport Its Design Guide R1.3Airport Its Design Guide R1.3
Airport Its Design Guide R1.3
 

More from Aneesh Suresh

“Secured Governance”:-India’s Pathway for Techno Economic National Growth
“Secured Governance”:-India’s Pathway for Techno Economic National Growth “Secured Governance”:-India’s Pathway for Techno Economic National Growth
“Secured Governance”:-India’s Pathway for Techno Economic National Growth Aneesh Suresh
 
Cctv market in india a birds eyeview
Cctv market in india   a birds eyeviewCctv market in india   a birds eyeview
Cctv market in india a birds eyeview
Aneesh Suresh
 
India secured governanace
India  secured governanaceIndia  secured governanace
India secured governanaceAneesh Suresh
 
Sports Hub - a Mantra for development of Sporting Infrastructure in the country.
Sports Hub - a Mantra for development of Sporting Infrastructure in the country.Sports Hub - a Mantra for development of Sporting Infrastructure in the country.
Sports Hub - a Mantra for development of Sporting Infrastructure in the country.Aneesh Suresh
 
Secured Governance in education
Secured Governance in educationSecured Governance in education
Secured Governance in educationAneesh Suresh
 
Making the most out of corporate social responsibility
Making the most out of  corporate social responsibilityMaking the most out of  corporate social responsibility
Making the most out of corporate social responsibilityAneesh Suresh
 
Secured governance for india a techno economic corridor for growth
Secured governance for india   a techno economic corridor for growthSecured governance for india   a techno economic corridor for growth
Secured governance for india a techno economic corridor for growthAneesh Suresh
 
1. secured transport hub a techno economic corridor(upsated 25th june 2012)
1. secured transport hub   a techno economic corridor(upsated 25th june 2012)1. secured transport hub   a techno economic corridor(upsated 25th june 2012)
1. secured transport hub a techno economic corridor(upsated 25th june 2012)Aneesh Suresh
 
Summary secured governance for road development and secured township project ...
Summary secured governance for road development and secured township project ...Summary secured governance for road development and secured township project ...
Summary secured governance for road development and secured township project ...Aneesh Suresh
 
Latest trends in security security requirements - a channel for growth
Latest trends in security security requirements - a channel for growthLatest trends in security security requirements - a channel for growth
Latest trends in security security requirements - a channel for growthAneesh Suresh
 

More from Aneesh Suresh (10)

“Secured Governance”:-India’s Pathway for Techno Economic National Growth
“Secured Governance”:-India’s Pathway for Techno Economic National Growth “Secured Governance”:-India’s Pathway for Techno Economic National Growth
“Secured Governance”:-India’s Pathway for Techno Economic National Growth
 
Cctv market in india a birds eyeview
Cctv market in india   a birds eyeviewCctv market in india   a birds eyeview
Cctv market in india a birds eyeview
 
India secured governanace
India  secured governanaceIndia  secured governanace
India secured governanace
 
Sports Hub - a Mantra for development of Sporting Infrastructure in the country.
Sports Hub - a Mantra for development of Sporting Infrastructure in the country.Sports Hub - a Mantra for development of Sporting Infrastructure in the country.
Sports Hub - a Mantra for development of Sporting Infrastructure in the country.
 
Secured Governance in education
Secured Governance in educationSecured Governance in education
Secured Governance in education
 
Making the most out of corporate social responsibility
Making the most out of  corporate social responsibilityMaking the most out of  corporate social responsibility
Making the most out of corporate social responsibility
 
Secured governance for india a techno economic corridor for growth
Secured governance for india   a techno economic corridor for growthSecured governance for india   a techno economic corridor for growth
Secured governance for india a techno economic corridor for growth
 
1. secured transport hub a techno economic corridor(upsated 25th june 2012)
1. secured transport hub   a techno economic corridor(upsated 25th june 2012)1. secured transport hub   a techno economic corridor(upsated 25th june 2012)
1. secured transport hub a techno economic corridor(upsated 25th june 2012)
 
Summary secured governance for road development and secured township project ...
Summary secured governance for road development and secured township project ...Summary secured governance for road development and secured township project ...
Summary secured governance for road development and secured township project ...
 
Latest trends in security security requirements - a channel for growth
Latest trends in security security requirements - a channel for growthLatest trends in security security requirements - a channel for growth
Latest trends in security security requirements - a channel for growth
 

Recently uploaded

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 

Recently uploaded (20)

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 

A brief Introduction on Video surveillance Technology

  • 1. Video Surveillance Technology and City Surveillance for Mumbai
  • 2. what is video surveillance? Present Implementations? • Human detection systems. • Vehicle monitoring systems • Monitoring of Critical non movable assets
  • 3. Importance of Video Surveillance System  Video surveillance has been a popular security tool for years. And thanks to new breakthroughs in technology, security cameras are more effective than ever before;  Banks, retail stores, and countless other end-users depend on the protection provided by video surveillance;  Fortunately, advances in digital technology have made video surveillance systems far more cost-effective, flexible, and simple to operate;  Security systems using IP (Internet Protocol) cameras are easy to install and maintain, and can be customized and scaled to perfectly match your specific needs.
  • 4. Security Threats Vehicles with Suspicious behavior explosive payload that leads to violent crime; Suspicious behavior Access control that leads to breaches (human financial losses and vehicle).
  • 5. Is surveillance a threat ?  Continuous video of all locations within the district may be perceived as a security threat;  This is actually a security mechanism; Prevention is better than cure
  • 6. Why city Surveillance ? • To have a video security blanket across the district; • To be able to monitor activities in any part of the district in real time; • For automatic alarms for suspicious events; • To be able to playback past events after the occurrence and to locate / trace vehicles, objects or people.
  • 7. Benefits of Video Surveillance System  Proactive actions (Preventive Surveillance);  Full surveillance with less personnel. (Cost reduction);  Verification (recording) of events;  Additional tool against crime;  Low operational cost;  Cost effectiveness for escalating system;  Flexibility to escalate system to unlimited number of cameras.
  • 8. Resources Required • Cameras: Hundreds of cameras across the District; • Camera Mounting; • Bandwidth and Connectivity: To take the video feeds to central monitoring locations; • High capacity servers at the monitoring location to save the captured video streams; • Sophisticated video analytics software to analyze the videos and do value- addition such as raising of alarms, recognition of people and objects and so on; • Mechanism to disseminate video-derived intelligence to officers on the ground; • Ability to combine video feeds with other sources of intelligence – communication intercepts and, most of all, human intelligence.
  • 9. Project Benefits to Mumbai • A Disaster Information and Planning System without investing any money; • A Law-And-Order monitoring system; • Personnel locating potential – for criminals, Missing children and others : Would entail use of facial recognition technology; • Video records can serve as evidence in street crime cases;
  • 10. Additional Benefits (1/2) • Accurate information on the state of infrastructure in the district – potholes, water-logging, burst pipelines, leaky fire hydrants, etc. can all be detected from central locations; • Illegal activities such as encroachments, water theft, etc. can be easily detected; • Any digging / development activity on streets can be centrally monitored / recorded; • Illegal hoardings, banners, construction activities can be easily detected; • Records of traffic conditions can be used for planning of road, bridge and other infrastructure creation;
  • 11. Additional Benefits (2/2) • During the monsoons, clogged sewages can be detected long before the clogging leads to water logging; • Monitoring of water logging in real time can help with planning of sewage and drainage systems; • Garbage pile-up, malfunctioning street lights, etc. can be detected; • Noise / air pollution measurement equipment for real estate and development planning; • Polluting establishments can be detected and brought to book.
  • 13. Benefits to Other City Agencies • Police can know the health of roads if they need to reach a crime scene in a hurry; • Ambulances will know, how much time it may take to reach a hospital or a patient; • The Fire department will be able to reach a scene of fire faster.
  • 14. Benefits to The Citizens • Regular traffic and route planning information; • Vehicle and people tracking services; • Increased safety due to surveillance; • Emergency road information during disasters and calamities; • Overall, better planning for the city.
  • 15. Benefits to Local Associations • Gives Local Association an opportunity to have prominent citizens voice their support for them via a socially significant project; • Cameras across the district to have the local association name – very visible branding for local association; • Law Enforcement Agencies and other official users of the video feeds to interact regularly with local associations for sourcing the video.
  • 16. Opex Model for Video-blanket Model  The source of funding to meet this huge expenditure would be through Public – Private – Partnership (PPP) Module;  Or, the local renowned body/association will shoulder the expenditure and Police Department of Thane District will provide security service on real-time on 24x7 basis by coordinating with Micro ICCS developed and operated by MTIL;  The part of the expenditure can be realized through advertisement by using the allocated empty space above the cameras installed at various locations in the district.
  • 17. Future Value Added Services • Automatic recognition of car numbers as a location service; • Video record of accidents to be used for insurance claims – insurance companies pay for such videos; • Policing the streets for parking and other offences – issuance of no parking / no stopping tickets using such cameras; • Car parking services. When on a street, call our number and we will use the camera output to guide you to an available parking slot.