Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Eyes with Brains

By Bill Zalud
September 1, 2005
Software brings intelligence, integration and convergence to security video. A platform from Keri Systems allows cameras to intelligently know about reader points.
Who would have believed it? The hottest advances in security video have nothing to do with CCDs and optics. With today’s technology approaching maturity, tomorrow’s features will center on such efforts as platforms, pixel “smarts,” facial recognition and intelligent video software.

According to Frost & Sullivan Senior Research Analyst Soumilya Banerjee, there’s also a shift in demand from digital to IP-based security systems that permits remote monitoring. Improvement in image quality and analysis is another focus area. The incorporation of algorithms has made it possible for security video systems to send out alerts before or during the initiation of a crime and ultimately assist concerned authorities in taking immediate action.

“It is expected that developments in chip technology will also eliminate undesirable interference in the images, resulting in far superior picture clarity,” explained Banerjee. “Cameras can be expected to be able to capture more number of pixels and also allow operators to zoom in on particular elements of interest while retaining high picture resolution.”

Another area of focus gaining popularity is video motion anomaly detection (VMAD) systems, which have a preloaded algorithm to help users study the movement of pixels within the image. These smart cameras can also identify objects that are partially or completely hidden from view for a certain period of time.

Cameras as weapons

There are more aggressive security camera designs in the light of terrorism and military needs.

Some manufacturers are working on intelligent cameras with non-lethal weapons that have the ability to lock on their target, measure the distance and shoot if the target is within a range of 50 feet. These cameras are also expected to gain acceptance in extremely high security and high-risk areas such as prisons or covert government research facilities.

There are still smart camera challenges.

Although the acceptance of smart cameras is highly promising, manufacturers need to solve the issue surrounding the false alarm rate.

Systems integration also brings intelligence to security video. One example from Keri Systems of San Jose, Calif., is the Visions video platform, which combines the firm’s access control hardware and software with digital video technology. When integrated with access software, cameras are automatically configured to coincide with doors, gates or other input points. Subsequent QuickSearch reports will communicate with the Visions Server application to find and list any access system events that also have associated video clips, and play them back in a viewer window on demand. The server records and retrieves all video events, as well as providing on-screen camera control and live monitoring via a powerful, easy to use interface.

Intelligence built into cameras, such as this one from Honeywell, brings decision-making down to the individual pixel level.
Another integrated, intelligent video approach comes from GE’s Security business (Austin, Texas). That firm’s new ACUVision panel 1.0 offers a single panel platform solution for access control, alarm monitoring and digital recording. Unlike other access control systems that require a separate access control panel, a separate digital video recorder panel and two IP addresses, GE combines all of the requirements into a single panel. Proving the software point, a single database manages multiple recorders and cameras. The combined Diamond II/ACUVision solution is a network of recorders and cameras communicating over a LAN or WAN using the same database. The system can consist of one or many recorders, connected to hundreds of cameras, each of which can be independently set up to respond with different recording criteria.

Embedded OS technology improves performance and reliability with enhanced logic implementation to continually tag video with the associated alarm events, even in an offline condition from the host.

There also is specific intelligence built into cameras. Honeywell of Syosset, N.Y., has a wide dynamic camera, a high-resolution body camera designed for environments with high contrast and changing light conditions. It uses patented technology to convert images from analog to digital format within each pixel immediately after the image is captured. Uniquely each pixel in the camera acts as its own camera having an independent shutter speed, optimizing the exposure time for every picture detail.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cards feat

    Adding Value by Adding Functions to Cards and Badges

    See More
  • hospital corridor

    How to Build a Complete Access Control System

    See More
  • Multi-tasking – It’s in the Cards

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing