Security Technology Executive

NOV-DEC 2017

Issue link: https://securitytechnologyexecutive.epubxp.com/i/917121

Contents of this Issue

Navigation

Page 25 of 71

26 SECURIT Y TECHNOLOGY E XECUTIVE • November/December 2017 • www. SecurityInfoWatch.com other cases, it can be achieved through a software upgrade to your existing video management system. This software then works in conjunction with your existing NVR and cameras, coordinating control and sharing alarm information. NERC #2 – Response to Attacks The second NERC guideline is having a means to "Respond to an Attack." We don't often think of a video management systems (VMS) as having the capability to "respond", but in fact, a system based on intelligent video surveillance can address this guideline. The key to a video surveillance system's capability to actually "respond" lies in its ability to share data between sensors. We've discussed how the use of location-based video analytics provides insights such as target position, real-size, and object movement, but there are other types of sensors with- in a typical surveillance system that are geospatial - meaning they can share and receive location data. When these sensors collaborate on target type and location, they can effectively react to various types of intrusions. To demonstrate this capability, let's look at a typical detect and respond scenario. The scenario shown involves the use of two sen - sors and a map-based VMS. The first sensor is a detection camera, enabled with video analytics. The second camera is a PTZ camera, enabled with a camera auto follow video analytic. Action 1: The scenario starts with an intrusion at the fence monitored by a fixed perimeter camera. Enabled with intelligent video software, this camera has the ability to not only detect an intrusion, but classify it as a human, and provide the intruder 's location to the VMS. Action 2: The system can immediately display the object, what it is (e.g. human) and its exact location. It can also dynamically update its position on the map-based display using a class-specific icon. Action 3: Simultaneously, a detection alarm is issued which includes the alarm description, alarm image, looping video, live camera view, and a map location based on the detection sent by the fixed camera. Action 4: An intelligent system has the abil- ity to share this alarm data to other geospatially aware sensors, in this case, a PTZ camera. Sharing the location data of the target allows the system to control the pan and tilt of a PTZ camera to swing to the exact location of the intruder and use the distance between the camera location and the intruder to automatically cal - culate the proper zoom level for best viewing. Action 5: With the intruder now cen- tered in the view of the PTZ camera, the system may invoke a camera auto follow algorithm which will keep the intruder centered within the camera's view during the duration of the event. In real time, this entire scenario takes just over 5 seconds and involves no operator interaction. NERC #3 – Communication and Notification The key to the successful communication of an intrusion is the ability to provide a large amount of data in a method that is quickly understood. What happened, where did it happen and what's happen- ing now. A map-based surveillance system has the advantage of providing a wealth of alarm informa- tion in a single, easy to understand interface. In this case, the intruder is detected in the live video and is also dynamically shown on the map with an icon indicating that it is a human. "Breadcrumbs" denote his track and direction of movement. Additionally, an alarm window instantly provides a textual description of the event, an image capture of the detection, a looping video of the alarm, the live camera of the event and quick access to any PTZ cameras which have been assigned to follow the intruder. Within a few seconds of the alarm, the operator has all the important alarm information automatically displayed. Figure – Automated response scenario using video analytics. INFRASTRUCTURE FOCUS

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - NOV-DEC 2017