New Uses for AI

New applications of AI in IP cameras are delivering precise detection, robust search capabilities, elevated data analysis and enhanced image quality. When combined with built-in analytics, AI can help streamline forensic investigations and also supports several mission-critical business functions.

Boosting Performance
Many companies, Hanwha included, first started introducing AI into their products on a selective and specific basis. Now, AI is a key feature across most product lines. Many new and existing products now incorporate AI technology to boost their performance to unprecedented levels and enabling new vision solutions that address customers’ complex challenges by adding new layers of business intelligence.

This trend is about more than devices. It is all part of the continuing convergence of hardware devices and software solutions -- combining 24/7 protection with the latest advancements in AI, analytics, and cloud-based management to create data-driven and analytics-based platforms.

New types of business intelligence software can harness the data gathered by the embedded edge AI analytics in IP cameras to monitor market trends and events in real time. These software applications can process metadata and presents contextualized data through customizable widgets and charts in a visualized dashboard. This gives customers context about their facility and operations, deriving insights that can turn unrealized data into actionable insights.

New Types of Surveillance Applications
AI is enabling a range of surveillance applications, such as remote system monitoring, cloud-based services, analytics, and data gathering. AI allows cloud and remote monitoring solutions to effectively manage bandwidth by only alerting teams when an important event is triggered, such as a person in an area, loitering, etc.

Previously, cloud recording was limited to continuous recording and processing motion detection in the cloud, whereas now edge AI processing can be coupled with a cloud solution. Many remote monitoring solutions would use simple SMTP email notifications and short video clips.

Now, detailed metadata can be transmitted allowing an operator to quickly see relevant information, while only receiving notifications on items that are pertinent. When an incident occurs, locating a person of interest can take a matter of minutes instead of having to spend hours sifting through hundreds of camera streams.

AI cameras are also being used to improve operational efficiency in “non-security” applications. A common example is workplace safety. If there are areas of a warehouse or manufacturing facility, for example, where people should not normally be present, AI can provide real-time altering and recording of times when this rule is breached.

In retail stores, AI-powered cameras can fit marketing and merchandising opportunities, looking at heatmaps to see hot/cool areas of the sales floor, traffic patterns, etc. This allows the retailer to adjust endcaps and other product placement without needing another siloed system.

AI Accuracy
To ensure the highest level of accuracy possible in AI cameras and devices, it is important to think about how you want to use the cameras and ensure that they have the proper field of view, which impacts the pixel density and AI performance. Depending on how you want the camera to function, ensure you have the right resolution, zoom, and angle when spec’ing and installing the camera. In addition, make sure the image is optimized, thinking about WDR and exposure settings and IR/lighting.

The continued integration of AI cameras with other security systems can create more proactive and intelligent total security and surveillance solutions. The goal is to make alerts more meaningful by removing false positives from everyday nuisances, such as lighting changes, shadows, small animals, etc.

Furthermore, we want to remove data from legacy silos so that different systems can make use of this data. A common example is visual verification of access control alarm systems. Using AI, a rule could be written that if a person is not seen at a certain doorway, to ignore the alert. Or an operator verifying the alert can quickly look for people in the forensic search instead of having to manually review lots of footage. They can then search for those attributes (clothing color, etc.) to see if there have been repeated attempts.

Looking ahead, we will continue to see emerging technologies being integrated with AI to create more comprehensive intelligent monitoring and surveillance environments. For example, cameras or audio sensors are being AI-enabled to make them more accurately detect certain scenarios based on the monitored audio alone, while ignoring false positives. Thermal and bi-spectrum cameras are gaining AI capabilities allowing them to provide thermal imaging with AI detections. In the future, we will see this continue to devices such as RADAR or LIDAR sensors and beyond.

AI models will also become more specialized, allowing customers to choose what they want to detect, allowing for vertical specialization without needing specialized cameras, such as detecting shopping carts and forklifts. This diversity across sectors shows just how far-reaching AI has become, not only for surveillance but for every market segment.

This article originally appeared in the July / August 2024 issue of Security Today.

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities