Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Video Surveillance

Dancing to the Algorithms

By Bill Zalud
Gate and barbed wire
October 1, 2011
Fence and barbed wire

Video analytics can be part of a virtual perimeter such as the camera technology at Elayn Hunt Correctional Center in St. Gabriel, La.

It started with fairly simple video motion detection, a certain change in pixels raises an alert. Nowadays, algorithms – basically instances of logic to produce output from given video input – have expanded to cover people, behavior, demographics, traffic patterns, objects, vehicles and virtual perimeters.

Video analytics has also evolved beyond security to include myriad business applications that can range from highway traffic management to retail merchandizing.

Video analytics can be “more than changes in pixels. You can set different points on the image – distance and height, depth perception,” says Billy Ridge of MMR Communication, a systems integrator.

Ridge helped set up a unique security video application at the Elayn Hunt Correctional Center in St. Gabriel, La., using DVTel’s ioimage intelligent video analytic cameras to assist in providing improved perimeter protection for a skilled nursing facility and a nearby cell block area where prison inmates are locked down in their cells the majority of the day.

At the edge or what some call onboard video analytics creates a virtual fence along the center’s perimeter. Upon a registered activation, cameras stream video of a potential intruder in the restricted area across the network.  With smart cameras maintaining a watch of the perimeter and generating alerts upon detection of suspicious behavior, the facility sees the potential to reduce the need for manned guard towers. In addition, the video from an alert highlights and identifies the subject, providing timely information for command center operators needing to quickly assess threat levels.

 

MORE TECH, LESS PEOPLE

Video analytics “is a force multiplier,” says the center’s spokesperson, Pam Laborde. By deploying the technology, Elayn Hunt officers in this area of the facility respond only to analytics-generated alerts, reducing reliance on full time observation of live cameras and potentially reducing wasted time viewing lengthy video streams trying to identify breaches in the restricted zones. A patrol vehicle provides live monitoring of these zones as well.

“Like most states, Louisiana is going through a budget crunch, so they are trying to maximize their prison system manpower by leveraging technology,” says Ridge. Each camera views approximately 240 linear feet of fencing and is configured to identify and notify correctional officers should anyone try to climb the prison perimeter fence. The video is monitored by officers in multiple locations of the facility.

No doubt, video analytics enhances surveillance systems with real-time event detection but also post-event analysis of recorded images.

 

SERVER OR EDGE OR BOTH

Basically, there are three types of analytics implementation.

Server-based: In this approach, the analytics is through a dedicated server that pulls the video, analyzes it, and issues the alerts or analysis results. This approach is independent of the video cameras, and, therefore, is applicable to most types of surveillance systems.

Edge-based: In this approach, the analytics is through an IP video camera or video encoder with sufficient processing power to run the functionality.

Security video still of college students

An elevator camera captures some student shenanigans at Louisiana State University, part of an ongoing upgrade to IP video which includes analytics.

Hybrid or distributed: The analytics task is distributed between the edge device (which may be an IP camera or encoder) and a server. One example of this approach comes from Agent Vi.

Another example of the edge-based approach comes from the Dallas Area Rapid Transit (DART) operation, which deployed a video intrusion detection at the transit system’s northwest rail operations facility. 

By deploying long-range thermal SightSensors, DART was able to complete the project using fewer cameras, reducing the number of poles, power and communications required. “Protecting our critical facilities in this manner enables us to run a safe, secure system,” says Jill Shaw, DART’s emergency preparedness manager.

Security and safety officials used the effort as the basis of a surveillance camera deployment plan. Not only would the camera network need to encompass the majority of LSU’s two-square mile campus, it would also take into account different stakeholders in the project and a variety of anticipated uses for the cameras.

Simple or complex, video analytics can play a key security role, especially as part of a total approach such as part of an integrated security management platform, according to Lee Thompson, general manager at Advantech, the Dover, Del., integrator.

Analytics “can help security be more proactive. Just establish the preset conditions to deter, for example, trespassing. When the image meets those presets, an alarm can sound and you get that person’s attention real fast,” observes Thompson. 

How Good Is License Plate Recognition?

When it comes to license plate recognition, there are different measures for general surveillance, forensics and for greater detail. Pictured are at 40 feet, 80 feet and 120 feet.
New Jersey License Plate
License Plate
License Plate

Whenever the subject of video analytics comes up, one of the applications described is license plate recognition. An Infinova field applications engineer setup some calculations using a day/night PTZ camera based on real world conditions: a function for distance in terms of focal length, scene width and imager width.

The results:

  • General surveillance– less than 40 pixels per foot. Applications can include watching over a highway looking for traffic jams. There is no need to read license plates. It would be similar to facial recognition applications where the system is looking to see what a crowd is doing but does not need to recognize faces or when someone is in a restricted area and there is a need to respond immediately but seeing the face is not important.
  • Forensic– 60-80 pixels per foot. Here, there is a need to see, record and recognize images such as license plates and faces so that, after the fact, security or law enforcement can determine exactly what happened.
  • High detail– 80-120 pixels per foot. This includes applications where not only the license plate needs to be recognized but also the model of the car. In casino applications, it is where one needs to see faces of employees and customers as well as being able to identify what is in their hands.
KEYWORDS: camera analytics video analytics

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • blue and pink digital spiral

    48% of security leaders hesitant to adapt to post-quantum algorithms

    See More
  • quantum-comp-freepik1170x658.jpg

    NIST reveals 4 quantum-resistant cryptographic algorithms to prevent future attacks

    See More
  • video surveillance

    Techniques and algorithms for video surveillance analytics

    See More

Related Products

See More Products
  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!