What is wrong with this Picture?

What is Wrong With This Picture?

New anomaly detection technology transcends conventional video analytics

Recently, the industry has been buzzing about video analytics technologies. The talk is about how they have the intelligence to help prevent potentially threatening events from escalating, and even proactively detect threats before they take place. This is undoubtedly a game changer for physical security and law enforcement professionals looking for effective ways to reduce crime and enhance overall security.

Video analytics also provide security professionals with the long-awaited solution they need to substantiate the budget for more advanced security technologies. This has always been a challenge without demonstrating how such investments deliver real return on investment (ROI). Given the wide range of security and business intelligence applications across the enterprise, and relative ease of deployment for most solutions, video analytics can more easily be cost-justified.

However, legacy video analytics technologies have a fundamental limitation: they are rules-based solutions that detect only what they are programmed to see, requiring the use of application-specific software modules. This can be costly to implement and inefficient in detecting events that require action.

For example, if you employ an analytic solution that autonomously detects weapons, and a fight breaks out, the latter will go undetected. Unless staff who spot the fight and take immediate action are monitoring the video system, the event will go unnoticed until reported – at which point the situation may be critical.

All this has changed with an emerging technology that goes far beyond the capabilities of traditional video analytics solutions – Anomaly Detection. Anomaly detection employs machine-learning algorithms that continuously adapt to events in a specific surveilled area. If something as simple as a person falling or laying on the ground occurs in an area where this type of event is statistically uncommon, the technology detects the event in real-time and alerts designated personnel or first responders.

This applies to any abnormal activity that takes place in the designated camera’s field of view – unruly crowds, fire and smoke, fighting, weapons brandishing, irregular movement of vehicles or people, vandalism, or anything that is simply not supposed to be taking place in a given area.

Anomaly detection software can be selectively applied to any single camera, group of cameras, or system wide via integration with a video management system (VMS). This allows users to leverage their existing investment in video systems, transforming these systems from reactive to proactive solutions. While many AI-powered solutions can have hefty hardware requirements, lightweight options with modest hardware needs do exist (for example, ASTRA offered by Active Intelligence). Choosing an option that does not require expensive high-performance hardware can ease the cost justification process.

Implementation of these solutions is often extremely simple. Once installed, the anomaly detection solution spends a period of time monitoring the selected video feeds, using artificial intelligence (AI) and machine learning to understand normal activity in a given area

Once the learning period completes, the anomaly detection software notifies operators in real-time when an abnormal activity is recognized. This allows security personnel and other first responders to take action to remediate the situation, if necessary. The proactive nature of the solution can help prevent potentially dangerous events from escalating, and/or help alert personnel if an individual needs assistance.

Since anomaly detection software does not require rules to be pre-configured, it has virtually unlimited applications for physical security, health and occupational safety, and business intelligence. Anomaly detection software can automatically call attention to a virtually unlimited number of event types. For example, irregular movements of people and vehicles; medical emergencies; suspicious behavior; vandalism and destruction of property; pooling water and flooding; dangerous vehicle movements; slip and fall incidents; theft and home invasion; workplace accidents; crowd gathering and dispersion; unscheduled visitors and trespassing; fire and smoke; and aggressive behavior and fighting… basically, anything outside of normal activity will be detected.

Here is a perfect scenario of an abnormal event that conventional video analytics simply would not notice. Employees are returning to the workplace, but often on flex hours or hybrid schedules. Some employees enjoy working at odd hours or on the weekends when offices are generally not occupied. An employee takes this opportunity to “borrow” some office equipment, removing it from the facility.

Anomaly detection software would automatically report this unusual event, as it would individuals quickly dispersing in a common area or vandals trashing a retail space. Any action outside of “normal” activity for this specific area under surveillance in a specific environment would trigger a notification in real-time. Anomaly detection also never stops learning and will continue to consider new “normal” events and behaviors over time, including season changes, traffic flow, weather, schedule changes, and more.

Anomaly detection software is also completely unbiased – it does not profile or store personal identifiable information that could pose liability issues for companies. All anomalies are identified based on statistical data captured by the software without any profiling or human judgement. This means anomaly detection is ideal for use in nearly any public or private environment.

Anomaly detection technology sets a new standard for preemptive video technology that can be applied to myriad physical security and business intelligence applications across organizations of virtually any size. What’s more, anomaly detection is easy to cost-justify given the vast numbers of ways it can mitigate risks and liabilities.

It is fast and easy to implement using existing video security systems, does not require additional training, significantly reduces the need for live operator monitoring, boosts security and safety, and reduces risks and liabilities. Anomaly detection software is the solution our industry has been waiting for; allowing businesses to better protect their facility and get closer to prevention.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3