Video Surveillance

7 Methods for Better Perimeter Surveillance

 

Effective perimeter security depends on accurate intrusion detection. A solution that permits false and nuisance alarms undermines confidence in the system and erodes the confidence of those tasked to respond.  Although many different factors can impact the accuracy of perimeter security systems, today’s intelligent video surveillance systems can help you to eliminate false and nuisance alarms and increase trust in your intrusion solution in a number of ways.

Filter outdoor movement

Movement from wind, trees and leaves, small animals, even blowing trash can trigger nuisance alarms in outdoor video analytics systems. Today’s smarter cameras use image processing to filter out such movement and send only authentic alarms that represent an actual threat. When security operators can count on accurate information, they will execute a response with vigilance. In contrast, when a system consistently produces nuisance alarms, operators will come to ignore them.

Use thermal cameras

Advancements in the sensitivity of thermal imagers and more sophisticated image processing have increased the effectiveness of thermal cameras for 24-hour use. On-board video processing now emphasizes small temperature differences between objects and the background to exaggerate the details and present a clearer image. Increased capabilities extend the value of outdoor thermal cameras to see more, detect more and operate 24-hours a day. Thermal cameras are also impervious to nuisance alerts caused by headlights or sun reflections from water.

Choose cameras that use GPS for accuracy

Accurate smart cameras use GPS to interpret the size of all objects, allowing you to set precise size filters. Without GPS awareness, a small animal close to the camera would appear substantially larger than a person moving off in the distance, so the camera would alarm on the small animal and miss the human intruder. When securing large perimeters and outdoor areas, cameras must always detect the person anywhere in the camera’s field of view and ignore small animals. GPS is the foundational technology for achieving accurate size filters to detect what’s important.

Use video for visual confirmation of breaches

Numerous sensors and other technologies can provide early detection of a perimeter security breach, but only video provides inherent visual confirmation with the alarm for quick decisions. Such visual confirmation saves valuable time to respond.

Measure detection range accurately

The best practice to determine the true range of an outdoor camera is to measure the distance at which it can automatically detect a person walking directly toward the camera (inbound). This is the most difficult task for a smart camera because a person walking toward the camera produces the least amount of motion.

On the other hand, a person walking across the camera's field of view creates a larger amount of motion, so that is easier to detect at longer ranges. When cameras are placed according to their cross-field detection ranges, you will leave large gaps in coverage where an intruder will go undetected.

To achieve 100-percent coverage, always place cameras according to their inbound detection capabilities. If your camera manufacturer does not specify how their ranges are measured, it’s best to ask for a live demonstration of the camera’s detection range.

Avoid bind spots in coverage

Every security camera has a blind spot, which must be considered in the perimeter system design because this area can include a meaningful portion of the camera's range. Narrowing a camera's field of view to increase its detection range further extends the blind spot under the camera. Effective perimeter security systems must be designed with a “zero blind spot” approach, with each camera's view overlapping the blind spot of the camera in front of it.

Choose equipment hardened for the outdoors

To ensure dependability and continuous accurate coverage, outdoor cameras need to be protected from humidity, sand and extreme temperatures. Otherwise, normal expansion and contraction due to temperature changes throughout the day could allow grit, dust or humidity to enter a camera's housing and impact the electronics and/or cloud the lens. Sealed, nitrogen-purged cameras tested to meet NEMA 4X standards can withstand harsh environments.

Use Web-based software to ensure a solid design

Some camera manufacturers have Web-based design tools available to assist integrators, engineers, and end users design a smart camera system that addresses blind spots, determines detection range and helps enforce best practices to ensure detection accuracy.

By making smart choices in product selection and implementing best practices, false and nuisance alarms that once plagued outdoor security solutions are being relegated to the past.  Smart outdoor video systems now provide a high level of accuracy that ensures effective perimeter security and justifies increased confidence among operators and end-users. 

Did you enjoy this article? Click here to subscribe to Security Magazine. 

Recent Articles by John Romanowich

You must login or register in order to post a comment.

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

September 2014

2014 September

In the September issue of Security Magazine, find out who this year's most influential people are in the security industry are. Also, take a peek at the technology products that ASIS 2014 will be showcasing at the upcoming event. Read about the lessons learned from security at the World Cup, find out why tactical medical training is a must for your enterprise and how Atlanta increased security by sharing surveillance.
Table Of Contents Subscribe

Adopting New Technology

How long do you wait before adopting a new technology?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+