securityhighend cspl
TRANSCRIPT
Video Analysis & Surveillance in
High End Security
Introduction Security refers to “freedom from risk or danger”.
Video security is used to protect homes, property and people.
Because of increased crime in many towns and cities, video security is
essential. Another reason for video security is
documenta- tion. If a crime is committed, you will have a record of it. This
evidence is readily available and can be quite valuable.
Introduction
11 Sep 2001 WTC disaster 7 July 2005 London bombings3
contd...
Now in Mumbai 26th Nov 2008
Hotel Taj Mahal
CST Railway Station
Taxi at Vile Parle
Mumbai Terror Attack Terrorists infiltrated in to Mumbai through sea route
which could have been tracked in the sea itself They alighted on the shore in group of ten people with
heavy luggage and entered the land which again could have been monitored
Few of the terrorists were staying in the hotel and were able to move large material inside their rooms and also survey the hotel building which also could have been monitored
Few terrorists went firing all across the city through railway station, hospital and roads and were not being monitored which if could have been done, the terrorists could have been trapped and prevented from causing damage to that extent
Increasing crime rates and terrorist activity, as well as an increasing demand for more protection of people and assets is affecting the growth of the security related applications and more specifically, the video surveillance system.
An obvious benefit of video surveillance is 24/7 monitoring of both densely populated areas, remote and isolated locations. Whether used for live monitoring, recording or both, video has proven to be invaluable for identifying individuals spotting criminal activity, recording accidents and other events.
Introductioncontd...
Traditional Surveillance Systems
Traditional CCTV security systems conventionally are: Analog or Digital type Limited Tape life or Storage in terms of Time Complex High End Central Management System Systems are totally dumb and require very high Human
intervention Ideal for small thefts and similar incidents but cannot
deal with terrorist attacks
IT IS MORE IMPORTANT TO SAVE HUMAN LIFE THAN TO FIND OUT THE REASON
THROUGH POSTMORTEM
MISSION TO COMBAT TERRORISM RIGHT AT THE DOOR
WE PROVIDE THE NEXT GENERATION SECURITY SYSTEMS WITH ARTIFICIAL
INTELLIGENCE
Video Analysis & Surveillance in High End Security
Monitoring important places like Airports and Railway stations. Securing nuclear power sites and national infrastructures. Used for Military and Defense purposes Monitor important roads and public places. Detection and abandoning (possibly dangerous) objects
Requirements
Low latency Data storage and Management including proper
backup.
Searching and retrieval of stored visual information
High degree of accuracy in producing alarms for predefined events.
Object detection and Tracking
Motion detection and analysis Visualization at different levels (eg. enhancing &
restoration) Sensors : - To monitor movement along the fences
- For people/vehicle counting
High End Centralized Management
H.264 based compression technique which would enable quality video stream on 1 mbps bandwidth
Storage upto 1 year or more Easy retrieval with respect to Time and Place Detection of illegitimate loitering Detection of unidentified objects Object detection and tracking System to build more accountability Ideal resource center for Police / ATS/ RAW and
other Intelligence agencies
Proposed Solution
Central Storage
Wireless Network
Motion AnalysisIntrusion AnalysisObject AnalysisColour AnalysisShape Analysis
Encoder Encoder
Online Monitoring
Offline Monitoring
On AlertMonitoring
Centralized Management System
Camera 1 Camera 2
Proposed Solution The proposed solution includes High resolution cameras
fixed at numerous locations across the city which would include public places, prohibited areas, sensitive areas etc.
These camera will be connected to encoders whereby the captured would be encoded to desired format and then transmitted to the Centralized Management System over wireless network
The CMS will process and analyze the videos at run time and store them with tags referring to various parameters like object characteristics, motion, intrusion etc.
In case of any intrusion or other set parameter being active an alert will be generated at the CMS
Online Monitoring will also be available with switching between the cameras
Monitoring Features The Online monitoring enables analysis of the video with respect to
object sizes, shapes, colour and stores the same with reference tags
The Online monitoring allows search facility with parameters like motion, object details, intrusion
For e.g. at any given point if the user wishes to monitor a particular shape or oversize objects, he will receive videos from the respective cameras on his screen where such objects are being located
The Offline monitoring enables access to stored video (about 1 year) with comprehensive search facility. For e.g. user can access videos of a particular day of a particular colour car across all the locations being monitored
“On Alert” monitoring enables users to receive online alerts in case of any intrusion, loitering in particular areas, over speeding vehicle or detection of a particular shape of object like gun etc. The user can immediately access the video from respective camera and track the suspicious person / object
Object Detection Object detection provides surveillance-
watch automation that automatically detects objects.
e.g : People,Vehicles etc.
Classes of object detection
Intrusion Detection
Abandoned Baggage Detection
Stopped Vehicle Detection
Object Removal Detection
Autonomous PTZ Tracking
Intrusion Detection
Provides a security alarm when a person or vehicle moves within a prohibited area
under video surveillance.
Stopped Vehicle DetectionStopped vehicle detection automatically detects and alarms on the presence of a stopped vehicle in an area where parking/standing is a violation.
Object Removal Detection
Provides an alarm when an item is removed from its last location. Detection can be
defined to immediately alarm when an object is removed/ stolen.
Unattended Baggage Detection
Unattended baggage detection provides an alarm when an item (package, debris,
baggage, etc.) is deposited or appears in a controlled area. In addition, detection can be configured to ignore items that
are attended by a nearby person.
Autonomous PTZ Tracking Detects and tracks a moving object by automatic commanding of the mechanical pan, tilt, and zoom of a PTZ security camera. With this automatic acquiring capabilities, the target is kept in-site and in-focus providing magnified identification and information gathering possibilities.
Motion AnalysisMoving Object
DetectionFeature
ExtractionCorrespondence
Analysis
Prediction
Update
Context
Tracking
Moving Object DetectionTemporal differencing
Background subtractionOptical Flow
Case Study - 1
Airport Security
Airport SecurityAirports must be able to discover and deal with potential security and operational
problems, such as: * Unattended
baggage * Illegally parked vehicles (vehicle
detection) * Intruders
* Multiple Entries into a secured area * Baggage tampering
Airport Security Video surveillance is also important to implement at airport’s apron, that is the area aircrafts are parked and maintained by specialized ground vehicles. For tracking of vehicles, e.g. fueling vehicles and baggage cars, as well as tracking of individuals.
contd...
Airport Security A main requirement behind the adopted video system architecture is that the system must be
capable of monitoring and recognizing the activities and interaction of numerous vehicles and personnel in a dynamic environment over
extended periods
contd..
Case Study - 2
Oil Refinery
Oil RefineryApplication : 24x7 monitoring of a 5-mile perimeter of the fence Threat Scenarios: Vehicles or people loitering outside fence (severe) Vehicles or people going over, under, or through fence (critical) Vehicles or people near inside of fence (critical) Abandoned objects near fence (inside or out), e.g., duffle bag of explosives (severe) Camera disabling (moved, masked, lost power)
Oil Refinerycontd...
Moving vehicle
Oil refinery
Perimeter around Oil Refinery
Case Study -3
Military and Defense Applications
Military & Defense ApplicationsTo detect enemy planes and warships
To detect intruders at the fences of border areas
Ship IdentificationPhysical Environment Issues
· Water (constantly moving)
· Tides (edge and height of water constantly changing in view of camera)
· Weather (rain, snow, fog, rapid shifts from sunny to cloudy)
· High winds
· Shore birds (primarily sea gulls)
Case Study - 4
Traffic Monitoring
Need for Traffic Monitoring To reduce the traffic congestion on
highways Reduce the road accidents
Identifying suspicious vehicles. Etc..,
Traffic MonitoringTraffic scene analysis in 3 categories
A straight forward vehicle detection and counting system. Congestion monitoring Vehicle classification and tracking systems which involve much more detailed scene traffic analysis.
Traffic MonitoringRecognizes vehicle patterns and compares subsequent images to determine vehicle and direction.
Thus it can detect any car driving the wrong way into a lane against the flow.
contd...