Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Video Surveillance

Dancing to the Algorithms

By Bill Zalud
October 1, 2011
Fence and barbed wire

Video analytics can be part of a virtual perimeter such as the camera technology at Elayn Hunt Correctional Center in St. Gabriel, La.

It started with fairly simple video motion detection, a certain change in pixels raises an alert. Nowadays, algorithms – basically instances of logic to produce output from given video input – have expanded to cover people, behavior, demographics, traffic patterns, objects, vehicles and virtual perimeters.

Video analytics has also evolved beyond security to include myriad business applications that can range from highway traffic management to retail merchandizing.

Video analytics can be “more than changes in pixels. You can set different points on the image – distance and height, depth perception,” says Billy Ridge of MMR Communication, a systems integrator.

Ridge helped set up a unique security video application at the Elayn Hunt Correctional Center in St. Gabriel, La., using DVTel’s ioimage intelligent video analytic cameras to assist in providing improved perimeter protection for a skilled nursing facility and a nearby cell block area where prison inmates are locked down in their cells the majority of the day.

At the edge or what some call onboard video analytics creates a virtual fence along the center’s perimeter. Upon a registered activation, cameras stream video of a potential intruder in the restricted area across the network.  With smart cameras maintaining a watch of the perimeter and generating alerts upon detection of suspicious behavior, the facility sees the potential to reduce the need for manned guard towers. In addition, the video from an alert highlights and identifies the subject, providing timely information for command center operators needing to quickly assess threat levels.

 

MORE TECH, LESS PEOPLE

Video analytics “is a force multiplier,” says the center’s spokesperson, Pam Laborde. By deploying the technology, Elayn Hunt officers in this area of the facility respond only to analytics-generated alerts, reducing reliance on full time observation of live cameras and potentially reducing wasted time viewing lengthy video streams trying to identify breaches in the restricted zones. A patrol vehicle provides live monitoring of these zones as well.

“Like most states, Louisiana is going through a budget crunch, so they are trying to maximize their prison system manpower by leveraging technology,” says Ridge. Each camera views approximately 240 linear feet of fencing and is configured to identify and notify correctional officers should anyone try to climb the prison perimeter fence. The video is monitored by officers in multiple locations of the facility.

No doubt, video analytics enhances surveillance systems with real-time event detection but also post-event analysis of recorded images.

 

SERVER OR EDGE OR BOTH

Basically, there are three types of analytics implementation.

Server-based: In this approach, the analytics is through a dedicated server that pulls the video, analyzes it, and issues the alerts or analysis results. This approach is independent of the video cameras, and, therefore, is applicable to most types of surveillance systems.

Edge-based: In this approach, the analytics is through an IP video camera or video encoder with sufficient processing power to run the functionality.

Security video still of college students

An elevator camera captures some student shenanigans at Louisiana State University, part of an ongoing upgrade to IP video which includes analytics.

Hybrid or distributed: The analytics task is distributed between the edge device (which may be an IP camera or encoder) and a server. One example of this approach comes from Agent Vi.

Another example of the edge-based approach comes from the Dallas Area Rapid Transit (DART) operation, which deployed a video intrusion detection at the transit system’s northwest rail operations facility. 

By deploying long-range thermal SightSensors, DART was able to complete the project using fewer cameras, reducing the number of poles, power and communications required. “Protecting our critical facilities in this manner enables us to run a safe, secure system,” says Jill Shaw, DART’s emergency preparedness manager.

Security and safety officials used the effort as the basis of a surveillance camera deployment plan. Not only would the camera network need to encompass the majority of LSU’s two-square mile campus, it would also take into account different stakeholders in the project and a variety of anticipated uses for the cameras.

Simple or complex, video analytics can play a key security role, especially as part of a total approach such as part of an integrated security management platform, according to Lee Thompson, general manager at Advantech, the Dover, Del., integrator.

Analytics “can help security be more proactive. Just establish the preset conditions to deter, for example, trespassing. When the image meets those presets, an alarm can sound and you get that person’s attention real fast,” observes Thompson. 

How Good Is License Plate Recognition?

When it comes to license plate recognition, there are different measures for general surveillance, forensics and for greater detail. Pictured are at 40 feet, 80 feet and 120 feet.
New Jersey License Plate
License Plate
License Plate

Whenever the subject of video analytics comes up, one of the applications described is license plate recognition. An Infinova field applications engineer setup some calculations using a day/night PTZ camera based on real world conditions: a function for distance in terms of focal length, scene width and imager width.

The results:

  • General surveillance– less than 40 pixels per foot. Applications can include watching over a highway looking for traffic jams. There is no need to read license plates. It would be similar to facial recognition applications where the system is looking to see what a crowd is doing but does not need to recognize faces or when someone is in a restricted area and there is a need to respond immediately but seeing the face is not important.
  • Forensic– 60-80 pixels per foot. Here, there is a need to see, record and recognize images such as license plates and faces so that, after the fact, security or law enforcement can determine exactly what happened.
  • High detail– 80-120 pixels per foot. This includes applications where not only the license plate needs to be recognized but also the model of the car. In casino applications, it is where one needs to see faces of employees and customers as well as being able to identify what is in their hands.
KEYWORDS: camera analytics video analytics

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Person holding phone to smart lock

Why it’s Time to Move on From Legacy Access Control Systems

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

2026

What Security Leaders Could Expect in 2026

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • blue and pink digital spiral

    48% of security leaders hesitant to adapt to post-quantum algorithms

    See More
  • quantum-comp-freepik1170x658.jpg

    NIST reveals 4 quantum-resistant cryptographic algorithms to prevent future attacks

    See More
  • video surveillance

    Techniques and algorithms for video surveillance analytics

    See More

Related Products

See More Products
  • The Complete Guide to Physical Security

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing