Learning to Adapt

Video analytics plays a key role in revolutionizing physical security

A new type of video surveillance technology called adaptive learning video analytics is revolutionizing physical security with its ability to analyze input from hundreds or even thousands of security cameras and provide alerts to potential threats as they occur. Conventional video surveillance systems are often ineffective, since they rely on people to monitor all the cameras’ output, which is a virtual impossibility. Some solutions use rules-based algorithms to analyze video output and detect one specific behavior—but human behavior is too various for this approach to be effective. And neither approach provides alerts in real time.

Adaptive learning video analytics takes a different approach by analyzing the output of video cameras in real time to detect—and alert on—abnormal behavior. Because this technology is computerbased, it brings physical security into the realm of IT like never before. In fact, IT will play an important role in implementing and managing this next generation of video surveillance systems and thus will need to learn about these systems and how they work.

Intelligent Technology
The basic concept of this new technology relates to other, wellunderstood technologies that IT departments already use, such as software-based performance management and network security products that employ pattern recognition. These products analyze a system’s performance over time to learn normal patterns of activity and recognize activity patterns that are abnormal, without human input. They also send alarms that alert users to any detected abnormal activity.

A system’s performance management product might learn, for example, that there is normally a spike of e-mail activity at 8 a.m., as people start their day’s work, but that a spike of email activity at 4 a.m. is not normal. This abnormal activity, which could represent an attack by a worm or virus, will trigger an alert.

The Core of Surveillance Technology
Adaptive learning video analytics uses similar principles. However, it has extra layers of complexity because its roots are not only in intelligent pattern recognition but also in observations made by video analytic algorithms. Video surveillance systems are designed to minimize threats from people, but people’s behavior is unpredictable. It is impossible to write a set of rules that can be expected to cover the full range of possible behaviors for any given environment. Instead, the system must be able to learn what is normal and what isn’t.

In essence, adaptive learning video analytics follows the human cognitive model for processing visual inputs into knowledge and requires a combination of computer vision, video analytics and machine-learning capabilities. The technology takes the input from existing video security cameras— the eyes of the system—recognizes and identifies the objects in each frame to learn what activity normally takes place within the area under surveillance; analyzes the changes, activities and motions of those objects; and builds a model of established behaviors.

Finally, adaptive learning video analytics provides a wide range of alert systems that can raise awareness and report abnormal or high-risk behaviors. This is possible because the system can compare current behaviors to patterns it has learned through observation. All these activities take place automatically, without the need of constant human involvement to create rules and update settings whenever a camera is deployed to a new location.

Unlike programmed rules-based solutions, adaptive learning video analytics can continuously improve on its accuracy and utility by adapting to changes in the observed environment, thereby also improving the value of the technology. This constant self-calibration and self-improvement enables the technology to continuously provide accurate analysis of potentially threatening behaviors.

Physical, IT Security Strategies
Adaptive learning video analytics accelerates the convergence of strategies for physical security and IT security. The technology is computationally intensive and thus has hardware and networking requirements that fall into the domain of IT.

Computing environment. The new adaptive learning video analytics technology is run on a series of servers that need to be deployed in a data center environment, complete with appropriate power and cooling requirements. These systems also must maximize CPU and memory utilization, and they are best suited to running on lean operating systems such as Linux.

Protocols. When evaluating video surveillance systems, it is important to remember that many employ proprietary protocols to perform functions such as moving video streams and are therefore often not compatible with existing IT infrastructure. Adaptive learning video analytics embraces open standards, employing the real-time streaming protocol for communication of video data and other standard protocols such as lightweight directory access protocol, which makes it much easier for IT to add the infrastructure required to support video surveillance.

Use of other Web service protocols such as extensible markup language and simple object access protocol also means the technology can integrate with existing IT networks to correlate all types of security alerts.

Integration with IT. Because video is bandwidth intensive, IT must be able to provide sufficient bandwidth between the servers handling adaptive learning video analytics and other enterprise servers. It also is important to adhere to industry standards regarding data compatibility and to be up-to-date on how they are evolving. Video compression standards have improved greatly in recent years, so it is always best to insist upon modern video compression encodings such as MPEG-4, H.263 and H.264. These protocols will save significant bandwidth when building a large deployment of cameras integrated with adaptive learning video analytics.

Architecture. An effective video analytics system must be able to communicate and interoperate with business logic and data, so it is important to employ a Web services platform architecture.

As more physical security solutions continue to incorporate intelligent software to augment the capabilities of their operations, it will become natural for these solutions to migrate under the domain of IT. In addition, as physical security continues to evolve from “guns, gates and guards” to using a wide variety of intelligent technologies, it also will eventually be migrated into and managed as an additional component of an organization’s overall corporate IT security model.

The sooner IT begins learning about how these technologies integrate into its domain, the sooner these technologies can be leveraged to benefit the enterprise as a whole.

Featured

  • 2025 Security LeadHER Conference Program Announced

    ASIS International and the Security Industry Association (SIA) – the leading membership associations for the security industry – have announced details for the 2025 Security LeadHER conference, a special event dedicated to advancing, connecting and empowering women in the security profession. The third annual Security LeadHER conference will be held Monday, June 9 – Tuesday, June 10, 2025, at the Detroit Marriott Renaissance Center in Detroit, Michigan. This carefully crafted program represents a comprehensive professional development opportunity for women in security this year. To view the full lineup at this year’s event, please visit securityleadher.org. Read Now

    • Industry Events
  • Report: 82 Percent of Phishing Emails Used AI

    KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management, today launched its Phishing Threat Trend Report, detailing key trends, new data, and threat intelligence insights surrounding phishing threats targeting organizations at the start of 2025. Read Now

  • NRF Supports Federal Bill to Thwart Retail Crime

    The National Retail Federation recently announced its support for the Combating Organized Retail Crime Act of 2025. The act was introduced by Chairman Chuck Grassley, R-Iowa, Senator Catherine Cortez Masto, D-Nev., and Representative Dave Joyce, R-Ohio. Read Now

  • ISC West 2025 Brings Almost 29,000 Industry Professionals to Las Vegas

    ISC West 2025, organized by RX and in collaboration with the Security Industry Association, concluded at the Venetian Expo in Las Vegas last week. The nation’s leading comprehensive and converged security event attracted nearly 29,000 industry professionals and left a lasting impression on the global security community. Over five action-packed days, ISC West welcomed more than 19,000 attendees and featured 750 exhibiting brands. Read Now

    • Industry Events
    • ISC West
  • Tradeshow Work Can Be Fun

    While at ISC West last week, I ran into numerous friends and associates all of which was a pleasant experience. The first question always seemed to be, “How many does this make for you?” Read Now

    • Industry Events
    • ISC West

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.