Upload
others
View
21
Download
0
Embed Size (px)
Citation preview
© 2015 IBM Corporation
i2 User Group Conference 2016
Intelligent Video AnalyticsEnhance security and public safety with comprehensivesecurity, intelligence and investigative capabilities
Mark SemenenkoTechnical Specialist
© 2015 IBM Corporation
i2 User Group Conference 2016
Video Analytics provides capabilities to
Alert operators to events or issues as they happen,
helping them respond quicker and prevent incidents
Utilise your finite resources, helping them monitor
large CCTV infrastructures
Search and locate persons of interest and vehicles
in minutes across specific cameras and time ranges
© 2015 IBM Corporation
i2 User Group Conference 2016
IBM has a wealth of experience in implementing Video Analytics at scale in challenging environments
Video Analytics and surveillance are integrated in the
Chicago OEMC to create searchable intelligence
Mobile video analysis and operations for Brazil’s
SESGE improves security threat detection,
interagency coordination and timeliness of response
Italian Rail integrated physical security systems to
improve safety, reduce crime, prevent malicious
behaviour in rail stations, tunnels and track crossings
© 2015 IBM Corporation
i2 User Group Conference 2016
Intelligent Video Analytics (IVA) Capabilities
Turns video into structured
information
Alerts monitoring personnel to
possible incidents
Enables rapid searching of video
© 2015 IBM Corporation
i2 User Group Conference 2016
Behaviour Analytics
• Classification - size, speed,
trajectory, color, time, duration,
shape, features
• People Search
• Vehicle Search
• Tripwires
• Directional motion
• Region of interest & un-interest
• Object removal
• Abandoned object
• Face capture, facial search
• Crowd behavior
• Counting
• Loitering
• Speed detection
© 2015 IBM Corporation
i2 User Group Conference 2016
Monitoring with video analytics
Alert for a combination of situations (i.e. bag left unattended for a certain length of time)
Designed specifically for high population areas to reduce false alerts
Detects objects in varying situations (i.e. bad lighting, lot of activity)
Combines learning to realize “is it still there?” – background, object identification and duration
Video analytics quickly identify suspicious objects allowing resources
to be deployed faster to investigate
Identify an abandoned or suspicious object
© 2015 IBM Corporation
i2 User Group Conference 2016
Monitoring with video analytics
Identify what to watch (i.e. people gathering in certain locations or any flash mob situation)
Determine the situation for awareness (i.e. certain number in one area over a period of time)
Notify personnel to address crowd management
Video analytics help identify unexpected movements such as a rapid
gathering to deploy resources to better manage the crowd
Identify unexpected crowd movements
© 2015 IBM Corporation
i2 User Group Conference 2016
Monitoring with video analytics
Identify what to watch (i.e ) Detect faces and clothing, size, and skin tone attributes to improve recognition
Store faces in secure database for mining by facial recognition algorithms
Open interface for interaction with IBM Face Match, Morpho, and other leading facial recognition
technologies
Detect characteristics including facial recognition alerts
Facial features Torso features: color, solid, stripes
Security intelligence needs to be able to integrate with counterterrorism, recidivist, and other facial databases
© 2015 IBM Corporation
i2 User Group Conference 2016
Bald=“Yes”
Skin=“Light”
Eyeglasses=“Yes”
Caucasian; bald with eyeglasses
Multiple Attribute Query Example
© 2015 IBM Corporation
i2 User Group Conference 2016
Light skin tone + bald + blue torso
© 2015 IBM Corporation
i2 User Group Conference 2016
Dark skin tone + white head
© 2015 IBM Corporation
i2 User Group Conference 2016
People walking versus running
© 2015 IBM Corporation
i2 User Group Conference 2016
© 2015 IBM Corporation
i2 User Group Conference 2016
© 2015 IBM Corporation
i2 User Group Conference 2016
© 2015 IBM Corporation
i2 User Group Conference 2016
© 2015 IBM Corporation
i2 User Group Conference 2016
© 2015 IBM Corporation
i2 User Group Conference 2016
© 2015 IBM Corporation
i2 User Group Conference 2016
© 2015 IBM Corporation
i2 User Group Conference 2016
Redaction
© 2015 IBM Corporation
i2 User Group Conference 2016
Redaction
© 2015 IBM Corporation
i2 User Group Conference 2016
Thank you22