• Skip to primary navigation
  • Skip to main content
  • Skip to footer

Ulrich's TechLib

Electronic Security Library & Other Oddities

  • HOME
  • BLOG
  • ABOUT
  • PRIVACY POLICY
  • CONTACT
You are here: Home / Video Analytics / 3 Secrets of Video Analytics That Everyone Misses

3 Secrets of Video Analytics That Everyone Misses

Jul 13, 2020 by Ulrich Leave a Comment

Secrets of Video Analytics

So, what are the three secrets of video analytics that everyone misses?

The first half of this article discusses analytics generally. You can head directly to the secrets of video analytics if you wish to skip the overview.

Before I proceed, let’s define video analytics.

What is Video Analytics in CCTV?

Video analytics is the use of algorithms to create searchable events based on video streams. These video streams are analysed, almost in real-time.

You create alarms based on the events.

Related: How to Create a Pop-Up Alarm in ACC

It saves time and allows you to act on the data available with minimal searches.

That is the idea.

As with all things, it’s not always that simple.

The Simplest Example

Motion detection. There’s nothing simpler.

The system creates events and alarms based on changes in pixels. Pixels from one frame is checked and compared to the previous frame. If a change occurred, motion is detected.

The event is triggered based on the threshold. In other words, the percentage of change on a given frame to the next.

A frame is any still image in a sequence of further frames. These frames make up a video. The more frames per second, the more fluid the video feed is.

The higher the threshold, the more change needed to trigger the event.

A problem arises as soon as there are unwanted motion events. For example, trees that move significantly due to wind or animals entering the scene.

Pixel Motion Detection
Pixel Motion Detection

Motion detection is useful because scenes with no activity are ignored and not recorded.

However, it can cause a disproportionately high amount of false positives. Alarms will overwhelm the operator. At this point, event searches are near meaningless.

Conversely, set the parameters for detection too strict and you risk missing important events.

We’re approaching the secrets of video analytics. There’s a need for better forms of detection.

Luckily, that exists.

Advanced Video Analytics

There are many forms of more advanced detection on the market today. They are widely available on a variety of systems, but they are not all equal.

Some of these include:

  • Line crossing and people counting
  • Loitering detection
  • Object placement
  • Objects entering or leaving an area
  • Directional analytics
  • License Plate Recognition (LPR)
  • Facial recognition
  • Most recently, mask detection
  • Appearance

The list is by no means extensive.

I will touch on these briefly.

Line Crossing and People Counting

Line crossing checks if a person, vehicle, or something else crossed a virtual barrier. Often, the same algorithm can count people crossing the line.

It is useful for retail stores that want to monitor traffic.

Loitering Detection

Detects groups of people that gather in undesired areas.

Object Placement

It detects objects placed in undesired areas. For example, suspicious luggage left in an airport terminal.

Objects Entering or Leaving an Area

Will detect objects as defined by the user. These objects could be proprietary and pre-defined as with Avigilon’s Classified Object Detection. Objects such as humans, vehicles, or a subset of vehicle types, such as bicycles.

Directional Analytics

Allows the user to specify direction violations, such as a vehicle driving in the wrong direction in a one-way street.

License Plate Recognition

One of the more useful forms of video analytics, LPR detects and logs a vehicle’s license plate number.

There are two forms of LPR. The first uses text-recognition. This method, while helpful, can also detect all sorts of other text on vehicles so is less accurate.

The other uses an algorithm to detect license plates based on the region’s defined license plates. This method will ignore other text.

Facial Recognition

Will detect and identify a person from a database of facial images.

Mask Detection

This form of analytics has been released by various vendors recently to combat COVID-19. It detects whether a person is wearing a mask.

Appearance

Appearance-based analytics allows the user to search for persons or vehicles based on colour.

Appearance Search Based on Gender
Appearance Search Based on Clothing

Are you ready for the secrets of video analytics?

Secret 1: Know Your Product

Despite many vendors having similar features, it helps to know the specific product you want to use. And you won’t know which to use unless you have tested a few.

If you are an end-user, you may insist on comparisons between products. Allow the integrator the opportunity to conduct such tests on your premises. At the very least, ask them why they are recommending product A over product B.

Be part of the process.

Blind brand trust has been the source of frustration for many. If the integrator is sure of their offering, they won’t mind competing to land your business.

You may also prefer to get a consultant to manage this process.

Typically, you’d want to compare performance across similar analytic types. Test the detection rates over the desired distances.

Consider your lighting and what test results are like in the evening. Avigilon, for example, recommends a minimum of 8 lux on target for their analytic cameras.

Performances will vary from one brand to the next.

Questions to ask:

  • What do we want the camera to detect?
  • When do we want the camera to detect?
  • What is the optimal mounting height for our application?
  • How does the camera perform in low light?
  • What level of lighting is in the scene?
  • Should we get additional lighting?
  • What are the minimum pixels per metre or foot required for detection?
  • Will the environment play a role?
  • What about blind spots?
  • How will events and alarms be monitored?
  • What are the network requirements?
  • What is the scale of the implementation, and can the system handle it?
  • Are there other forms of security better suited to our needs?
  • Will the solution infringe on privacy?
  • Are the people who will implement the solution qualified?
  • Which of the products tested will suit our needs best?

Secret 2: Using the Wrong Solution

Thermal cameras are almost always better suited to perimeter detection.

Why?

Because on the perimeter you don’t need to see who has breached the fence, only that somebody has. Your day-night cameras will identify an individual as he approaches your building.

Secondly, you don’t need to concern yourself with lighting. A human’s heat signature will compel early detection.

And of course, thermal cameras can detect over a vast distance.

A look at FLIR detection, recognition, and identification distances reveals this.

FLIR Range Performances
FLIR Range Performances – Click to Enlarge

That’s not even taking into account higher resolution variants.

The differences, according to FLIR, shows us that:

The detection will determine whether an object is present or not.

The recognition will allow the user to see what type of object it is.

And the identification will allow the user the opportunity to determine whether the object is friend or foe.

I’ve seen people using line crossing detection on perimeters. That’s not something I’d recommend.

I’d much prefer human detection either side of the fence. A criminal will crawl underneath the fence or climb over. There’s a chance he will go through a hole.

In every instance, his movement is likely to be slow or awkward. That is why line crossing will likely fail the user.

If you have to use line crossing, consider additional security such as fence triggers.

Secret 3: Over-Promising and Under Delivering

The first two points tie nicely into this one.

Sometimes, the lack of communication between client and integrator is the biggest problem. Or, simply put, someone wasn’t truthful.

All analytics are fallible.

That should be one of the first things conveyed. There isn’t any system that’s 100% accurate.

You will get false-positives, and you will have under-detection.

The role of analytics systems is to make the operator’s job easier. It’s not a magic bullet, one system fits-all, solution.

Manage the client’s expectations. The client, conversely, has to ask the right questions.

Otherwise, someone is bound to be unhappy.

You can’t expect the world on a shoestring budget, and you can’t deliver on a promise when you haven’t the right expertise.

The secrets of video analytics?

  1. Know your product.
  2. Use the right solution.
  3. Don’t lie.

Do you think I’ve missed something? Let me know in the comments below.

Share

Share
Share
Tweet

Filed Under: Video Analytics Tagged With: cctv, video analytics

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Footer

Get Social

  • Facebook
  • LinkedIn
  • Twitter

Post Tags

acc acc 5 acc 6 acc 7 acc client acc server password alarm anydesk avigilon avigilon directory backup batch script cctv create pop-up google earth internet log lucidchart obs studio onvif device manager password ping pop-up pop-up alarm port-forwarding port forwarding putty server teamviewer timestamp upgrade video analytics vlc

Site Archives

  • Aug 2020
  • Jul 2020
  • Jun 2020

Newsletter

Copyright © 2023 ยท Ulrich's TechLib

Manage Cookie Consent
I use cookies to optimize my website and my service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}