Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Are CMOS & Image Analysis the Next Trends?

September 1, 2004
Computer chip advances and better analysis of images captured by security video systems are two important trends identified by Technical Insights, a division of Frost & Sullivan of San Antonio. The research firm recently completed analysis on the report, Security Technology: Advances in Video Surveillance.

According to Technical Insights, video surveillance applications have been vitalized by the power of digital processing and storage. The move to digital format facilitates the adoption of the Internet for remote monitoring, smart sensors, wireless networks and the integration of intelligent software such as facial recognition and others.

The addition of infrared thermal sensors, movement detection, frame grabbers, spectral analyzers and behavior interpretation has energized the basic security system. Streaming video goes over the Internet and cameras are remotely controlled. Very small wireless camera systems can be anywhere.

Advances in security video technology affect access control and benefit surveillance activities. Such research has resulted in cameras that are smaller than ever before, with superior color capability and crisper images. Higher picture resolution has been achieved through fully digital technology – a new way to record a signal. Beyond these kinds of benefits, there have also been improvements in camera quality and reliability. The main advance here has been the development of CCDs, an imaging process developed at Bell Labs in the late 1960s. The CCD camera produces superior picture quality, is anti-static, and eliminates the possibility of image burning. Such cameras last longer and are also easier to maintain. However, a few manufacturers, primarily those producing cameras for highly specialized purposes, still use the old vacuum type of tube camera.

Cameras and monitors remained monochrome for a long time because they could deliver sharper images and were also cheaper. Now, industry-sponsored research has provided color cameras that are more sensitive, deliver sharper images and are priced more reasonably at between $200 and $400.

Traditionally, video cameras relying on CCD required more chips. Now camera-on-a-chip or complementary metal oxide semiconductor (CMOS) chip cameras have emerged as major competitors to CCD cameras. Also developed at Bell Labs, the camera-on-a-chip approach, based on the same CMOS technology found in today’s computer chips, has the capability to produce real-time video images that rival the quality of images produced by camcorders. Aside from requiring less space, CMOS cameras use less power than CCD cameras. A 9V battery, for example, can run a CMOS camera for five hours, but can run one of today’s computer-based desktop cameras for a maximum of 30 minutes.

As a result, CMOS cameras are best suited to hand-held devices or security cameras requiring low power. And because the camera-on-a chip is an offshoot of silicon-chip technology, semiconductor manufacturers can produce the chip using existing facilities. This was not the situation with CCD technology because it requires specially designed manufacturing facilities. Future uses of CMOS might include 3-D imaging and collision avoidance, such as cameras detecting other vehicles in a car’s blind spot. One day the camera may get integrated into the computer screen and revolutionize the tech world.

The world image sensor market is currently estimated at $4 billion with a 17 percent growth rate. 2006 revenues have been forecasted at $6 billion. The market is blooming as the demand for high-end applications increases. Emerging CMOS technology is also anticipated to contribute substantially to the revenue, its entrance into the market accompanied by automotive and handheld communication applications. CCD is anticipated to provide the foundation for CMOS growth with its maturing market.<

Image anlysis trend – There are security, safety and traffic management applications for imaging systems used by surface transportation professionals. Cameras and sensors along roads provide real-time information about the number and variety of vehicles traveling over a particular patch of pavement at any given moment. Operators continuously gather and analyze such information and share it with a myriad of audiences, from local public safety officials to authorities in nearby jurisdictions. Photo courtesy of VBrick Systems

Better than biometrics

Several experiments on facial recognition by video imaging and database search have been disappointing. Yet the use of a full arsenal of biometrics and imaging technologies will no doubt improve these systems. For example, 3-D imaging, color and IR and UV spectral imaging provide far more information about a face than just a video. Hair dye, cosmetics, movements, gestures, padding in the cheeks and temperature variations on the skin can all become part of the equation. The development of software and algorithms that can analyze these data, and make quick and accurate decisions, will be a major activity in the field.

One such system is A4Vision technology, which enables the real-time capture of 3-D images of a subject’s face. Using near-infrared light, an invisible structured light pattern bathes the face while the video camera precisely records the reflected and scattered energy. The distorted pattern is input into a reconstruction algorithm, which extracts a biometric template from the facial geometry. This template is based on the unique rigid tissues of the skull, which do not alter over time. Verification is performed by matching the biometric template, stored in an ordinary database, against a template stored on a smart card.

This A4Vision technology has some advantages over biometric technologies. It is not affected by lighting conditions, background colors, facial hair or make-up, provides higher performance at different view angles, and is more accurate in real-life environments.

The human visual system is highly non-uniform in sampling, coding, processing and understanding. The spatial resolution is highest around the point of fixation (foveation point) and decreases rapidly with increasing eccentricity. Real-time video surveillance may not require maximum resolution of the complete image. A video security surveillance system may have hundreds of cameras, microphones and biometrics stations. The design and development of such a system is quite complex and includes the encryption and decryption process, the image data compression and special data processing like real-time foveation. Currently, most image quality measurement methods are designed for uniform resolution images and do not correlate well with the perceived foveated image quality.

A surveillance system must enable the efficient transmission of events and data of interest from a network of cameras to a central processing unit. For example, a face detection and tracking module that runs at each camera server can find a human presence within an observation area, and provide 2-D face coordinates and an estimated scale to the video transmission module. The captured video is then efficiently represented in logpolar coordinates, with the foveation point centered on the face, and sent to the connected client modules for further processing.

The actual movement of the eye as it focuses on details of an image follows a saccadic path and some imaging systems mimic this movement by small, rapid scanning motions of the sensor. A surveillance system may employ active cameras that track the detected person by switching between smooth pursuit and saccadic movements, as a function of the target presence in the fovea region. The high resolution of the data in this region enables successive application of recognition/identification modules on the transmitted video without sacrificing their performance.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Biggest risks for your enterprise through 2026

    The risk landscape over the next five years: key trends

    See More
  • data privacy

    Accidental database breaches are on the rise – How can your company avoid becoming the next headline?

    See More
  • USA network of light

    What are the DoD's top four priorities in the next year?

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing