Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Eyes with Brains

By Bill Zalud
September 1, 2005
Software brings intelligence, integration and convergence to security video. A platform from Keri Systems allows cameras to intelligently know about reader points.
Who would have believed it? The hottest advances in security video have nothing to do with CCDs and optics. With today’s technology approaching maturity, tomorrow’s features will center on such efforts as platforms, pixel “smarts,” facial recognition and intelligent video software.

According to Frost & Sullivan Senior Research Analyst Soumilya Banerjee, there’s also a shift in demand from digital to IP-based security systems that permits remote monitoring. Improvement in image quality and analysis is another focus area. The incorporation of algorithms has made it possible for security video systems to send out alerts before or during the initiation of a crime and ultimately assist concerned authorities in taking immediate action.

“It is expected that developments in chip technology will also eliminate undesirable interference in the images, resulting in far superior picture clarity,” explained Banerjee. “Cameras can be expected to be able to capture more number of pixels and also allow operators to zoom in on particular elements of interest while retaining high picture resolution.”

Another area of focus gaining popularity is video motion anomaly detection (VMAD) systems, which have a preloaded algorithm to help users study the movement of pixels within the image. These smart cameras can also identify objects that are partially or completely hidden from view for a certain period of time.

Cameras as weapons

There are more aggressive security camera designs in the light of terrorism and military needs.

Some manufacturers are working on intelligent cameras with non-lethal weapons that have the ability to lock on their target, measure the distance and shoot if the target is within a range of 50 feet. These cameras are also expected to gain acceptance in extremely high security and high-risk areas such as prisons or covert government research facilities.

There are still smart camera challenges.

Although the acceptance of smart cameras is highly promising, manufacturers need to solve the issue surrounding the false alarm rate.

Systems integration also brings intelligence to security video. One example from Keri Systems of San Jose, Calif., is the Visions video platform, which combines the firm’s access control hardware and software with digital video technology. When integrated with access software, cameras are automatically configured to coincide with doors, gates or other input points. Subsequent QuickSearch reports will communicate with the Visions Server application to find and list any access system events that also have associated video clips, and play them back in a viewer window on demand. The server records and retrieves all video events, as well as providing on-screen camera control and live monitoring via a powerful, easy to use interface.

Intelligence built into cameras, such as this one from Honeywell, brings decision-making down to the individual pixel level.
Another integrated, intelligent video approach comes from GE’s Security business (Austin, Texas). That firm’s new ACUVision panel 1.0 offers a single panel platform solution for access control, alarm monitoring and digital recording. Unlike other access control systems that require a separate access control panel, a separate digital video recorder panel and two IP addresses, GE combines all of the requirements into a single panel. Proving the software point, a single database manages multiple recorders and cameras. The combined Diamond II/ACUVision solution is a network of recorders and cameras communicating over a LAN or WAN using the same database. The system can consist of one or many recorders, connected to hundreds of cameras, each of which can be independently set up to respond with different recording criteria.

Embedded OS technology improves performance and reliability with enhanced logic implementation to continually tag video with the associated alarm events, even in an offline condition from the host.

There also is specific intelligence built into cameras. Honeywell of Syosset, N.Y., has a wide dynamic camera, a high-resolution body camera designed for environments with high contrast and changing light conditions. It uses patented technology to convert images from analog to digital format within each pixel immediately after the image is captured. Uniquely each pixel in the camera acts as its own camera having an independent shutter speed, optimizing the exposure time for every picture detail.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Brains, Security and Hierarchical Temporal Memory (HTM) And What? Please Read On….

    See More
  • Brains vs. Brawn – Determining New Trends in VIP Security

    See More
  • Turnstiles: Brawn, Brains or Both

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing