What is wrong with this Picture?

What is Wrong With This Picture?

New anomaly detection technology transcends conventional video analytics

Recently, the industry has been buzzing about video analytics technologies. The talk is about how they have the intelligence to help prevent potentially threatening events from escalating, and even proactively detect threats before they take place. This is undoubtedly a game changer for physical security and law enforcement professionals looking for effective ways to reduce crime and enhance overall security.

Video analytics also provide security professionals with the long-awaited solution they need to substantiate the budget for more advanced security technologies. This has always been a challenge without demonstrating how such investments deliver real return on investment (ROI). Given the wide range of security and business intelligence applications across the enterprise, and relative ease of deployment for most solutions, video analytics can more easily be cost-justified.

However, legacy video analytics technologies have a fundamental limitation: they are rules-based solutions that detect only what they are programmed to see, requiring the use of application-specific software modules. This can be costly to implement and inefficient in detecting events that require action.

For example, if you employ an analytic solution that autonomously detects weapons, and a fight breaks out, the latter will go undetected. Unless staff who spot the fight and take immediate action are monitoring the video system, the event will go unnoticed until reported – at which point the situation may be critical.

All this has changed with an emerging technology that goes far beyond the capabilities of traditional video analytics solutions – Anomaly Detection. Anomaly detection employs machine-learning algorithms that continuously adapt to events in a specific surveilled area. If something as simple as a person falling or laying on the ground occurs in an area where this type of event is statistically uncommon, the technology detects the event in real-time and alerts designated personnel or first responders.

This applies to any abnormal activity that takes place in the designated camera’s field of view – unruly crowds, fire and smoke, fighting, weapons brandishing, irregular movement of vehicles or people, vandalism, or anything that is simply not supposed to be taking place in a given area.

Anomaly detection software can be selectively applied to any single camera, group of cameras, or system wide via integration with a video management system (VMS). This allows users to leverage their existing investment in video systems, transforming these systems from reactive to proactive solutions. While many AI-powered solutions can have hefty hardware requirements, lightweight options with modest hardware needs do exist (for example, ASTRA offered by Active Intelligence). Choosing an option that does not require expensive high-performance hardware can ease the cost justification process.

Implementation of these solutions is often extremely simple. Once installed, the anomaly detection solution spends a period of time monitoring the selected video feeds, using artificial intelligence (AI) and machine learning to understand normal activity in a given area

Once the learning period completes, the anomaly detection software notifies operators in real-time when an abnormal activity is recognized. This allows security personnel and other first responders to take action to remediate the situation, if necessary. The proactive nature of the solution can help prevent potentially dangerous events from escalating, and/or help alert personnel if an individual needs assistance.

Since anomaly detection software does not require rules to be pre-configured, it has virtually unlimited applications for physical security, health and occupational safety, and business intelligence. Anomaly detection software can automatically call attention to a virtually unlimited number of event types. For example, irregular movements of people and vehicles; medical emergencies; suspicious behavior; vandalism and destruction of property; pooling water and flooding; dangerous vehicle movements; slip and fall incidents; theft and home invasion; workplace accidents; crowd gathering and dispersion; unscheduled visitors and trespassing; fire and smoke; and aggressive behavior and fighting… basically, anything outside of normal activity will be detected.

Here is a perfect scenario of an abnormal event that conventional video analytics simply would not notice. Employees are returning to the workplace, but often on flex hours or hybrid schedules. Some employees enjoy working at odd hours or on the weekends when offices are generally not occupied. An employee takes this opportunity to “borrow” some office equipment, removing it from the facility.

Anomaly detection software would automatically report this unusual event, as it would individuals quickly dispersing in a common area or vandals trashing a retail space. Any action outside of “normal” activity for this specific area under surveillance in a specific environment would trigger a notification in real-time. Anomaly detection also never stops learning and will continue to consider new “normal” events and behaviors over time, including season changes, traffic flow, weather, schedule changes, and more.

Anomaly detection software is also completely unbiased – it does not profile or store personal identifiable information that could pose liability issues for companies. All anomalies are identified based on statistical data captured by the software without any profiling or human judgement. This means anomaly detection is ideal for use in nearly any public or private environment.

Anomaly detection technology sets a new standard for preemptive video technology that can be applied to myriad physical security and business intelligence applications across organizations of virtually any size. What’s more, anomaly detection is easy to cost-justify given the vast numbers of ways it can mitigate risks and liabilities.

It is fast and easy to implement using existing video security systems, does not require additional training, significantly reduces the need for live operator monitoring, boosts security and safety, and reduces risks and liabilities. Anomaly detection software is the solution our industry has been waiting for; allowing businesses to better protect their facility and get closer to prevention.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3