Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Video Analytics Points to Industry Maturity

By Cynthia Freschi
February 1, 2009


Video content analysis (VCA) has garnered a tremendous amount of attention in the past few months and, if all is to be believed, the technology is near the point where it is a “buy” rather than a “sell.” And while this is good news in our beleaguered economy, there still remains some question as to where the VCA should be located – on the edge device (camera) or on the head end – or on both?

Before addressing the options however, a definition of VCA is in order. Video analytics is a process that extracts useful information, in the form of data, from live or recorded video images. Applications include the capability to identify loiterers, detect vandalism or monitor crowds for abandoned baggage. The capacity to accomplish this, however, depends on where the VCA is located.


The Case for Edge-Based Analytics

In a recent report on the market for VCA, IMS Research forecasts that its penetration into network surveillance cameras will exceed 40 percent by 2012 and it goes on to predict that network cameras will be the main hardware platform for embedded analytics. The advantage of edge-based embedded analytics is bandwidth preservation and reduction of storage requirements because the need to transmit all captured video for analysis is eliminated. In addition, content analysis on the video of interest can be performed when the video is in its highest quality and before it is compressed for transmission over the network to a recording/storage device.

Improvements in imaging technology, including digital signal processing (DSP), megapixel technology and increased sensitivity to low light have also contributed to the increased adoption of camera-based analytics. DSP chips deliver more processing capacity, which enables more edge processing; and megapixel sensors offer greater resolution and detail, which are necessary for analytic products to perform complex operations. Intelligent cameras can be programmed to transmit at low-resolution rates until a pre-defined event of interest occurs, at which point transmission switches to a higher frame rate and resolution. Improvements in compression technologies such as H.264 have also enabled transmission of higher definition resolution over a lower bandwidth.

Cost is another factor influencing the move to camera-based analytics because it is a more effective way of implementing VCA. Single unit cameras featuring built-in analytics can be installed where and when required, or the number added to as required. And when more processing is done at the edge, it can help to reduce the cost of analytic processing by eliminating or downsizing server requirements.


Efficiencies at the Head End

Due to the large installed base of analog cameras, however, IMS Research predicts that in the short term the biggest penetration of VCA will occur within network video recorders (NVRs), digital video recorders (DVRs) and video encoders, which convert analog signals to network compatible signals. It is argued that relying solely on camera-embedded analytics is not as efficient when analytics must be performed or metadata correlated on enterprise-wide systems such as casino or educational installations, where hundreds of cameras are deployed. Additionally, forensic searches (i.e. facial recognition, object identification, etc.), which are usually performed on recorded video, are still beyond the capabilities of most on-camera solutions at this time.

In these instances, the greater processing power and central management capabilities of a server-based or head end solution is generally a better solution. Centralized analytics allows for the configuration of different application sets on different cameras and at differing times. For instance, in a car dealership lot, the parameters for motion detection would generally be programmed differently for nighttime recording versus daytime and this is done more conveniently through centralized management. In another example, VCA may be used to calculate periods of peak activity or for counting numbers of people passing through an entrance and this function can more easily be achieved with a head end solution.

Whether it’s camera-based or server-based, VCA provides benefits to the user in terms of data mining and retrieval speed. Data mining of POS transactions for instance has been used extensively in the retail industry for creating marketing promotions, identifying buying trends and developing new product. On the security side, exception reports that include surveillance video and accompanying POS data can be generated, and as an example if the POS cash drawer is open longer than two minutes, the system will create an exception report with the time, date, employee, cash register, and revenue center along with the video of the event.


VCA’s Future

So, back to the original question: Is it better for the VCA software to be located on the edge device, the head end (i.e. server), or on both? Or is there yet another answer, such as imaging processing over IP (IPoIP) technology, which distributes the image processing responsibilities between the camera and the server?

Whatever the choice, VCA is another maturation point of our industry and one from which much of the future of the industry will developed.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Cynthia Freschi is president of North American Video, with fully staffed offices located in five states. Her firm is an SDM Magazine Top Systems Integrator.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • A Maturing Industry Faces the Need for Standards

    See More
  • Going ‘Green’ in the Security Industry

    See More
  • Then to Now – Network-centric Digital Video

    See More

Related Products

See More Products
  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing