SECURITYHIGHEND CSPL

Preview:

Citation preview

Video Analysis & Surveillance in

High End Security

Introduction Security refers to “freedom from risk or danger”.

Video security is used to protect homes, property and people.

Because of increased crime in many towns and cities, video security is

essential. Another reason for video security is

documenta- tion. If a crime is committed, you will have a record of it. This

evidence is readily available and can be quite valuable.

Introduction

11 Sep 2001 WTC disaster 7 July 2005 London bombings3

contd...

Now in Mumbai 26th Nov 2008

Hotel Taj Mahal

CST Railway Station

Taxi at Vile Parle

Mumbai Terror Attack Terrorists infiltrated in to Mumbai through sea route

which could have been tracked in the sea itself They alighted on the shore in group of ten people with

heavy luggage and entered the land which again could have been monitored

Few of the terrorists were staying in the hotel and were able to move large material inside their rooms and also survey the hotel building which also could have been monitored

Few terrorists went firing all across the city through railway station, hospital and roads and were not being monitored which if could have been done, the terrorists could have been trapped and prevented from causing damage to that extent

Increasing crime rates and terrorist activity, as well as an increasing demand for more protection of people and assets is affecting the growth of the security related applications and more specifically, the video surveillance system.

An obvious benefit of video surveillance is 24/7 monitoring of both densely populated areas, remote and isolated locations. Whether used for live monitoring, recording or both, video has proven to be invaluable for identifying individuals spotting criminal activity, recording accidents and other events.

Introductioncontd...

Traditional Surveillance Systems

Traditional CCTV security systems conventionally are: Analog or Digital type Limited Tape life or Storage in terms of Time Complex High End Central Management System Systems are totally dumb and require very high Human

intervention Ideal for small thefts and similar incidents but cannot

deal with terrorist attacks

IT IS MORE IMPORTANT TO SAVE HUMAN LIFE THAN TO FIND OUT THE REASON

THROUGH POSTMORTEM

MISSION TO COMBAT TERRORISM RIGHT AT THE DOOR

WE PROVIDE THE NEXT GENERATION SECURITY SYSTEMS WITH ARTIFICIAL

INTELLIGENCE

Video Analysis & Surveillance in High End Security

Monitoring important places like Airports and Railway stations. Securing nuclear power sites and national infrastructures. Used for Military and Defense purposes Monitor important roads and public places. Detection and abandoning (possibly dangerous) objects

Requirements

Low latency Data storage and Management including proper

backup.

Searching and retrieval of stored visual information

High degree of accuracy in producing alarms for predefined events.

Object detection and Tracking

Motion detection and analysis Visualization at different levels (eg. enhancing &

restoration) Sensors : - To monitor movement along the fences

- For people/vehicle counting

High End Centralized Management

H.264 based compression technique which would enable quality video stream on 1 mbps bandwidth

Storage upto 1 year or more Easy retrieval with respect to Time and Place Detection of illegitimate loitering Detection of unidentified objects Object detection and tracking System to build more accountability Ideal resource center for Police / ATS/ RAW and

other Intelligence agencies

Proposed Solution

Central Storage

Wireless Network

Motion AnalysisIntrusion AnalysisObject AnalysisColour AnalysisShape Analysis

Encoder Encoder

Online Monitoring

Offline Monitoring

On AlertMonitoring

Centralized Management System

Camera 1 Camera 2

Proposed Solution The proposed solution includes High resolution cameras

fixed at numerous locations across the city which would include public places, prohibited areas, sensitive areas etc.

These camera will be connected to encoders whereby the captured would be encoded to desired format and then transmitted to the Centralized Management System over wireless network

The CMS will process and analyze the videos at run time and store them with tags referring to various parameters like object characteristics, motion, intrusion etc.

In case of any intrusion or other set parameter being active an alert will be generated at the CMS

Online Monitoring will also be available with switching between the cameras

Monitoring Features The Online monitoring enables analysis of the video with respect to

object sizes, shapes, colour and stores the same with reference tags

The Online monitoring allows search facility with parameters like motion, object details, intrusion

For e.g. at any given point if the user wishes to monitor a particular shape or oversize objects, he will receive videos from the respective cameras on his screen where such objects are being located

The Offline monitoring enables access to stored video (about 1 year) with comprehensive search facility. For e.g. user can access videos of a particular day of a particular colour car across all the locations being monitored

“On Alert” monitoring enables users to receive online alerts in case of any intrusion, loitering in particular areas, over speeding vehicle or detection of a particular shape of object like gun etc. The user can immediately access the video from respective camera and track the suspicious person / object

Object Detection Object detection provides surveillance-

watch automation that automatically detects objects.

e.g : People,Vehicles etc.

Classes of object detection

Intrusion Detection

Abandoned Baggage Detection

Stopped Vehicle Detection

Object Removal Detection

Autonomous PTZ Tracking

Intrusion Detection

Provides a security alarm when a person or vehicle moves within a prohibited area

under video surveillance.

Stopped Vehicle DetectionStopped vehicle detection automatically detects and alarms on the presence of a stopped vehicle in an area where parking/standing is a violation.

Object Removal Detection

Provides an alarm when an item is removed from its last location. Detection can be

defined to immediately alarm when an object is removed/ stolen.

Unattended Baggage Detection

Unattended baggage detection provides an alarm when an item (package, debris,

baggage, etc.) is deposited or appears in a controlled area. In addition, detection can be configured to ignore items that

are attended by a nearby person.

Autonomous PTZ Tracking Detects and tracks a moving object by automatic commanding of the mechanical pan, tilt, and zoom of a PTZ security camera. With this automatic acquiring capabilities, the target is kept in-site and in-focus providing magnified identification and information gathering possibilities.

Motion AnalysisMoving Object

DetectionFeature

ExtractionCorrespondence

Analysis

Prediction

Update

Context

Tracking

Moving Object DetectionTemporal differencing

Background subtractionOptical Flow

Case Study - 1

Airport Security

Airport SecurityAirports must be able to discover and deal with potential security and operational

problems, such as: * Unattended

baggage * Illegally parked vehicles (vehicle

detection) * Intruders

* Multiple Entries into a secured area * Baggage tampering

Airport Security Video surveillance is also important to implement at airport’s apron, that is the area aircrafts are parked and maintained by specialized ground vehicles. For tracking of vehicles, e.g. fueling vehicles and baggage cars, as well as tracking of individuals.

contd...

Airport Security A main requirement behind the adopted video system architecture is that the system must be

capable of monitoring and recognizing the activities and interaction of numerous vehicles and personnel in a dynamic environment over

extended periods

contd..

Case Study - 2

Oil Refinery

Oil RefineryApplication : 24x7 monitoring of a 5-mile perimeter of the fence Threat Scenarios: Vehicles or people loitering outside fence (severe) Vehicles or people going over, under, or through fence (critical) Vehicles or people near inside of fence (critical) Abandoned objects near fence (inside or out), e.g., duffle bag of explosives (severe) Camera disabling (moved, masked, lost power)

Oil Refinerycontd...

Moving vehicle

Oil refinery

Perimeter around Oil Refinery

Case Study -3

Military and Defense Applications

Military & Defense ApplicationsTo detect enemy planes and warships

To detect intruders at the fences of border areas

Ship IdentificationPhysical Environment Issues

· Water (constantly moving)

· Tides (edge and height of water constantly changing in view of camera)

· Weather (rain, snow, fog, rapid shifts from sunny to cloudy)

· High winds

· Shore birds (primarily sea gulls)

Case Study - 4

Traffic Monitoring

Need for Traffic Monitoring To reduce the traffic congestion on

highways Reduce the road accidents

Identifying suspicious vehicles. Etc..,

Traffic MonitoringTraffic scene analysis in 3 categories

A straight forward vehicle detection and counting system. Congestion monitoring Vehicle classification and tracking systems which involve much more detailed scene traffic analysis.

Traffic MonitoringRecognizes vehicle patterns and compares subsequent images to determine vehicle and direction.

Thus it can detect any car driving the wrong way into a lane against the flow.

contd...

www.cspl.co.inmail@cspl.co.in

Recommended