Security Technology Executive

MAY-JUN 2015

Issue link: https://securitytechnologyexecutive.epubxp.com/i/530736

Contents of this Issue

Navigation

Page 31 of 67

32 SECURITY TECHNOLOGY EXECUTIVE • May/June 2015 www.SecurityInfoWatch.com VIDEO ANALYTICS order to prevent the situation from escalating. Third generation analytics give first responders the situational awareness they need by delivering real-time forensics, and follows the natural evolu- tion of video analytics. Imagine a scenario where you receive a call from someone who found a man lying uncon- scious in a corridor inside a building on campus. After calling the medics, you pull up the security video of that corridor to find out what happened. It turns out the man was attacked, and your video footage provides a picture of the assailant. Real-time forensic analytics enables you to use the picture of the assailant or, if the sus- pect wasn't captured on-camera, even a general description of the suspect from an eye witness, to quickly search through a database. This database includes full-body images previously extracted from the recorded footage of all video feeds in the network to track the assailant's movements after the attack and, if he's still in the building, find his current location. The key is that the analytics can find a person in almost real-time. They do not have the limitations of facial recognition, which demands that cameras be carefully positioned; instead the analytics considers the person as a whole. The system needs to be able to spot the suspect from behind, as well as from the front, and from a camera mounted at an angle typical- ly associated with standard video surveillance, which is not ideal for facial recognition. As important as the suspect's current loca- tion is for apprehension purposes, so too are his whereabouts in the time leading up to the inci- dent. How did the assailant get in the building? When did he enter? Which door did he come through? Which fence did he climb over? By fol- lowing the individual's past movements, you can identify the answers to these questions and potentially uncover security vulnerabilities that This year's event will feature 40+ peer-led sessions providing real-world security and public safety solutions for management operations, funding, grant approvals, strategies for partnering and collaboration, technology selection and systems implementation. Plus, unique on-site security tours of NASA's Houston Space Center, The Port of Houston, Houston's TranStar Emergency Ops Center, Texas Medical Center and City of Houston's Emergency Operations Center* *Tours are subject to change. Brought to you by: FOR MORE INFORMATION AND TO REGISTER, VISIT SECUREDCITIES.COM REAL-WORLD SECURITY SOLUTIONS NOVEMBER 10-12, 2015 / HOUSTON, TX SECURED CAMPUS | SECURED TRANSIT | SECURED HEALTHCARE Cutting-Edge Solutions to Protect Your Cities REGISTER BEFORE JULY 1, 2015 FOR ONLY $199 Request information: www.SecurityInfoWatch.com/10752984 First generation video analytics was limited to watching for changes in individual pixels, or perhaps a significant portion of the pixels.

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - MAY-JUN 2015