Seeing Limitations

Expecting another video analytics as a feature might deliver less than promised

ANALYTICS can detect suspicious movement from people walking along a street, detect terrorists walking around a hillside a mile away or pick an offender out from a sea of faces. These are just some of the misconceptions about current analytics. Was there ever a product so over-promised and under-delivered? The reality is analytics technology is still in its infancy.

Expectations are at the heart of the issue—being realistic with end users about what can be achieved. The fundamental problem is that humans do these tasks without even thinking. People read license plates and recognize faces subconsciously. It may have taken humans years of learning during childhood to acquire these skills, but now, these tasks are taken for granted. Computers, on the other hand, lack even the basics of visual intelligence. The technology can perform some video analytic functions reliably, but often, only by severely constraining the application. Qualification is everything, and meeting end-user expectations is vital.

Analytics Today
So what can be done today? License plate recognition technology has been around for years and is well-proven. However, still it is not 100 percent accurate. Face recognition is notoriously difficult to perform reliably and is extremely easy to fool by using disguises. For face recognition to work with any degree of accuracy, an excellent headshot of the subject is required. But there are, however, some bread-and-butter analytics functions that can perform well.

Motion detection is the most simple and basic form of analytics. Many manufacturers support it, but few systems achieve sufficiently low false alarm rates to be useable. A system that generates anything in excess of 20 false alarms in a night becomes ineffective, because all alarms quickly become ignored or the motion detection gets switched off to prevent the operator getting drowned in alarms. Aesop unwittingly foresaw the reality of most security systems when he wrote "The Boy Who Cried Wolf."

Congestion detection has evolved from basic motion detection. When the density of humans or cars reaches a certain level, an alarm is triggered. Counter flow looks for objects that move against the flow and is valuable in applications like airport security. Virtual tripwire also is a refinement of motion detection because it triggers an alarm when someone or something breaks a line drawn in the image. This is useful in large areas with no-go zones, such as in factories.

People are allowed to happily move in free areas, but the system alarms as soon as movement is detected outside the defined zone. With all these analytics applications, camera positioning, lens selection and lighting are critical. Just changing the camera position improves analytic performance by an order of magnitude. For example, in counter-flow detection, the algorithm has an easier job if the camera is positioned pointing down, so it sees the area in plain view. If it is looking from a perspective view with human bodies occluding one another, the process of tracking people becomes much harder, and expectations can once again become unrealistic.

There are hundreds of companies touting analytics software. Manufacturers of IP video solutions are approached by analytics providers each week, asking to integrate an analytic product into their IP video management platform. Why so many? Any small software company can develop a suite of video analytics by buying a frame grabber, a powerful PC and writing software. These are then sold as separate, standalone systems that sit next to the main CCTV system. Video is split from the matrix and fed into the analytics system. This delivers only limited benefits because it’s not integrated into the operation of the main CCTV system.

Analog technology just can’t support integrated analytics. DVRs do to a greater extent, but the technology still remains in islands and is not fully integrated.

IP Intelligence
IP-based video management systems provide an ideal platform for powerful analytics to be completely integrated into the system, making it a core and integral part of operation. Leading IP video solutions support analytics that can be performed in two fundamental modes: live to detect events during occurrence and post-processing to test various scenarios on recorded footage. The optimum place to locate live analytics is obviously at the camera, as it is the only truly scalable solution and doesn't use up network bandwidth. Central, real-time processing will eventually run out of steam, but every camera can have dedicated processing. For example, a camera with built-in analytics can monitor scene activity and transmit only on specified events, such as a person moving the wrong way through airport security. This cuts unnecessary video traffic on the network, reducing bandwidth requirements—something that cannot be done with traditional analog technology.

The optimum place to locate post-processing analytics is obviously on a central server so recorded video can be searched many times with different parameters. One of the biggest time wasters for operators used to be fast forwarding and rewinding through VCR tape. This is improved with DVRs, but most still feature digital fast forward or rewind. Analytics offer the potential to further transform the task by searching large amounts of recorded video for possible events for operator validation. Computers can accomplish one things—locating possible events—and humans do what they are good at—verifying those events.

Setting expectations is everything. It’s important not to believe all the hype about what analytics can deliver. In 30 years time, it will probably be possible, but today it's all about making sure that what is achievable is done well.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.