Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

They Think, Talk, Act

November 1, 2005
With the proliferation of security video, there is a growing need for intelligent systems and video analytics. People just cannot see images on so many more monitors. Photo courtesy: Asynchrony Solutions, St. Louis, Mo.
Until recently, video surveillance relied on human operators at its core for detecting breaches and facilitating appropriate responses. Today’s surveillance systems are PC- and/or network-based, and use software that intelligently monitors images and automatically detects potential security threats, completely changing the dynamics of security video monitoring for security.

A surveillance system today can easily have hundreds of cameras. It would take several operators to view this many cameras even with a sequencing system switching four monitors per operator every ten seconds. This arrangement still leaves too much time between images for adequate surveillance, not to mention the fatigue factor it induces in human operators.

The answer is either more staff to monitor the video, which could become cost prohibitive, or a system that is intelligent enough to analyze incoming video, detect a problem and signal for a response or initiate a predetermined one.

Manufacturers worldwide are adding algorithms to video surveillance systems designed to take on a variety of analytical tasks. The primary function of these new video analysis features is to relieve security video operators from the stress of monitoring too many screens of information. As is usually the case with technology, many unexpected benefits have come into play as well.

In the past, security video surveillance was used primarily in post-event criminal proceedings. Today, intelligent systems are crime prevention tools as well as provide additional business benefits that result in a better return on investment for buyers.

Matrix programming brings a certain level of intelligence. For example, the Panasonic Matrix System 650 can be programmed to include “tour mode” to switch cameras in predetermined sequences on a select monitor; “group sequence mode” to automatically switch cameras in preset sequences on up to 16 different monitors; and “group preset mode” for instant spot display on up to 16 pre-selected monitors simultaneously.

Cost impact

Currently, intelligent video technology is being used principally for Homeland Security applications, owing to high costs. But as costs come down, such technology can be expected to be used more and more in the private sector. Initial trials by Homeland Security purchasers should unearth and remedy many of the bugs that naturally occur in software-based systems, so that the next wave of users has a much smoother introduction to the intelligent technologies.

Smarter security video such as GE's Video IQ can learn new scene backgrounds.

Resolution vs. intelligence

The security industry uses a variety of terms for intelligent video – some that have been adopted from the world of computer science and machine vision, and some that simply imply the benefits of the systems. The term actually refers to the analysis and extraction of video information with specific reasoning attached for specific applications. With intelligent video, it may be determined that certain video data is not of high priority so resolution can be decreased to conserve bandwidth or storage space. Intelligent video can refer to content management, such as indexing and retrieval, and can do things like automatically enhancing an image by removing noise, improving resolution or increasing dynamic range.

Today’s software programs analyze scenes in a camera view and provide directional motion, unattended baggage and abandoned vehicle detection, image stabilization, object classification, access control monitoring, people and traffic counting, license plate and facial recognition, behavioral analysis, trending, and an ongoing wealth of features. These surveillance systems can make decisions about images based on the confirmation or violation of preset protocols.

An intelligent video system can identify predetermined behaviors such as someone lying on the floor, erratic movements and people or cars converging on each other; a person, item or vehicle staying in one place for an extended period; a person or vehicle traveling against the normal flow; or objects newly appearing on the scene.

Some behavior recognition programs even utilize recursive adaptive computer algorithms. These are dynamic programs where normal patterns of behavior are continually learned and updated to define acceptable behavior patterns. These types of programs are very reliable, as they will alert on all anomalies and not just those that have been previously identified.

Rules are an analytics trigger. For instance, Quantum Secure, Inc., a developer of policy based enterprise physical security solutions, just introduced a new application suite called SAFE. The SAFE System provides users with the ability to define, document, deploy and enforce physical security policies across multiple system platforms and multiple facility sites. Driven by six primary integrated applications, it streamlines worldwide security operations while providing rules-based compliance, analytics, global reporting and real-time executive dashboards.

Multi-technologies

Generally, today’s systems are scalable and upgradeable, high-resolution, color systems with sensors and databases. They are biometric-enabled and have 3D image analyzers that perform multiple tasks including identifying, tracking, determining motives behind movements, broadcasting and storage.

The intelligent video system can be programmed for a variety of uses. Many systems will have features allowing them to audibly instruct intruders to disband before further action is taken to remove them from the area.

Automatic detection and subsequent alert of suspicious bags and packages can provide the exact location of a questionable object and a possible identification of its category or type based on factors like size, shape, etc. Nice Systems, headquartered in Israel, is well known for its Unattended Baggage Detection application.

Nice Systems created this analytical feature by using a DSP-based real-time video object tracking and analysis platform.

Detecting objects

A similar feature is used to eliminate illegally parked cars or abandoned vehicles from sensitive areas. Automatic detection and alert for vehicles parked in restricted zones gives security personal immediate notice of a breach that could eliminate a potential car bomb threat, or simply result in a parking ticket.

Automatically counting people within a defined area and providing information about the direction of movement generates accurate traffic information that can enable efficient staffing, better queue control and marketing data. This feature can also be set to alert staff when a safety threshold has been reached pertaining to occupancy limits.

The fairly well publicized biometric of facial recognition can be part of an intelligent video solution.

Facial recognition programs may be ironing out a few bugs and the technology continues to be refined ensuring false positive responses are on the decline. Programs that use similar characteristics to those found in facial recognition are cropping up as management and access control tools. 3VR Security Inc., San Francisco, has developed what they call the world’s first third generation video recorder, the 3VR. The turnkey appliance performs similarly to a high-end DVR, but also enables security professionals to find, sort and respond to data in record time. Among its many abilities is facial indexing, which allows a user to find a particular person within a contained area or review the history of a particular person’s movement within the facility via image search.

Every interactive or proactive security measure is susceptible to false alarms. One of the first smart features attributed to video surveillance was the ability to phase out these false alarm triggers.

The Video IQ from GE is programmed to learn new backgrounds automatically and to distinguish between people and other moving objects like cars, animals or tree branches. The Video IQ is a popular choice among homeland security buyers for applications needing perimeter protection.

There are, as with most improved security technology, insurance cost implications associated with the new intelligent video systems. iOmniscient, headquartered in Australia, has IQ 115, which can instantly detect if a person slips or falls and raises an alarm in response to alert personnel. A timely alert allows staff to take immediate action preventing further harm or injury. The cause for the slip and fall is documented as well, greatly reducing false claims, which in turn leads to lower insurance premiums.

Digital recording systems are not just getting smarter; they also allow for the integration of legacy analog security video components with the very latest digital technology. Instek Digital, Chino, Calif., uses a hybrid configuration to create a system that allows customers to use both analog and digital IP cameras. The company’s hDVR can support different video formats of IP cameras (MJPEG, MPEG4, and H264).

The eDVR from Instek uses a standard MPEG-4 compression and supports transmitting multimedia streams over existing TCP/IP networks. Aside from continuous and scheduled recording modes, each camera has its own alarm input for alarm-triggered recording.

Used to their full potential, video intelligence tools will provide a return on investment not seen with previous surveillance systems.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Exclusives Feature Image

    Stopping Thieves with Biometrics: If They Can’t Start It, They Can’t Steal It!

    See More
  • surveillance-investigation-freepik1170x658.jpg

    We need the Foreign Intelligence Surveillance Act more than ever

    See More
  • Web Exclusive Logo

    Think You Know How to Investigate a Theft or Fraud? Think Again. Here’s the Right Way to Do It

    See More

Related Products

See More Products
  • 150 things.jpg

    The Handbook for School Safety and Security

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!