SlideShare uma empresa Scribd logo
1 de 8
White paper




axis and intelligent Video (iV)
table of contents
1. What is intelligent video?                       3

2. Why is it an important development?              3

3. System design strategies for intelligent video   4

4. axis and intelligent video                       5

5. axis intelligent video products                  5

6. Conclusion                                       7
1.   What is intelligent video?
      Video surveillance is a booming business, and installations become larger and larger. At the same time,
      several studies have highlighted the hit and miss nature of human intervention to spot change in a sur-
      rounding environment. And the challenge becomes larger as systems expand. In addition, a massive
      amount of video is being recorded, but never watched or reviewed, due to lack of time.

      As a result, events and activities are missed, and suspicious behavior is not noticed in time to prevent
      incidents. This has led to the development of intelligent video (IV).

      Intelligent video is about reducing the vast amount of information contained in video, making it more
      manageable for systems and persons. Intelligent video surveillance systems automatically perform an
      analysis of captured video, and automatically use the resultant data. Building this sort of analytics into
      network cameras creates a reliable and versatile video surveillance system, and drastically reduces work-
      load for the staff. Furthermore, intelligent video allows the operator to use the video surveillance system
      more pro-actively by giving early warnings about situations that could be potential risk scenarios.

      The applications performing these analyses are referred to as Video Content Analysis (VCA) or Video
      Analytics (VA). Video analytics range from video motion detection and audio detection, to more ad-
      vanced systems including camera tampering detection, people counting, cross line detection, and vehicle
      license plate recognition. The number of applications is expected to grow quickly as the integration of
      third-party solutions is facilitated through open application development platforms.

      Intelligent video systems can also extract video and data from surveillance video streams and integrate
      that information with other applications, such as retail management systems or access control systems,
      creating new benefits and opening up new business possibilities.


 2.   Why is it an important development?
      Intelligent video allows video surveillance systems to be used for a host of new applications, and ensures
      that video surveillance systems become smarter, more accurate, and more cost-effective. In summary,
      intelligent video:

      >   Automatically analyzes and tags surveillance video in real-time
      >   Detects suspicious activities
      >   Initiates video recording, alarms or other actions
      >   Alerts operators or field personnel
      >   Enables users to be proactive – preventing crime rather than reacting or analyzing after the fact

      Systems can be set up to deliver far more targeted and specific information with intelligent video. This
      means that in the future there will be far less reliance on manned guarding. Intelligent video also creates
      a platform for a more pro-active approach to video surveillance. By configuring intelligent video systems
      to specific parameters, it is possible to get instant alerts when pre-set parameters have been breached,
      thus delivering early warnings to staff.

2.1   Efficient use of manpower
      Intelligent video enables efficient use of manpower. Fewer operators can monitor even very large instal-
      lations, since staff will not be required to watch many monitors for long hours to spot suspicious activ-
      ity. Instead, the intelligent video system would inform operators about people moving in restricted areas,
      cars driving the wrong way, or attempts to tamper with the video surveillance cameras.

2.2   Faster retrieval of stored video
      Video analytics – such as video motion detection – ensures that only relevant video footage is stored, so
      that when the need arises to search through old recordings, only video that could potentially include the
      event in question is retrieved. For example, an intelligent video system that has tagged the video stream
      with appropriate labels during recording can automatically search through days of stored video to find
      the right video footage in a matter of seconds.

                                                                                                               3
2.3   Reduced network load and storage needs
      Intelligent video systems that include video motion detection and audio detection minimize the need for
      storage space by recording only video that contains activity. Furthermore, by placing intelligent video ‘at
      the edge’, that is, processing as much as possible of the video in the network cameras themselves, the
      load on the network is significantly reduced as only relevant video is streamed from the cameras. Intel-
      ligent video applications help build video surveillance systems that are more cost-effective.

2.4   New business opportunities
      Intelligent video also makes it possible to use video for applications outside of security. For example, in
      retail stores it can be used for analyzing consumer behavior, such as the number of people stopping by a
      particular merchandising shelf, or the popular routes through the shop. In airports, an intelligent video
      system could measure the queue time between entering and exiting a check-in point, helping direct staff
      and minimizing waiting time for travelers. In these and other ways, intelligent video makes it possible to
      extract greater benefit out of the video surveillance infrastructure, enabling a higher return-on-invest-
      ment.


 3.   System design strategies for intelligent video
      There are two broad categories of systems for implementing intelligent video - centralized and distrib-
      uted. In centralized architectures, video and other information is collected by cameras and sensors and
      brought to a centralized server for analysis. In distributed architectures, the edge devices (network cam-
      eras and video encoders) are ‘intelligent’ and are capable of processing the video and extracting relevant
      information.

      Network video allows for distributed intelligence. Distributed architectures are designed to overcome the
      limitations of centralized architectures by distributing the processing to different elements in the net-
      work.

      If cameras, for example, have motion detection, then rather than streaming all the video, only interesting
      video that has motion in it can be sent to the monitoring station for further action and analysis. The load
      on the infrastructure and people involved falls dramatically. For specialized video analytics, where only the
      data is needed and not the video, such as, people counting, or automatic number plate recognition – run-
      ning the applications in the camera has a dramatic impact since the cameras can extract the required data
      and send just that information, with perhaps a few snapshots.

      The most scalable, cost-effective and flexible architecture is based on ‘intelligence at the edge’, that is,
      processing as much of the video as possible in the network cameras, or video encoders themselves. This
      architecture entails the least amount of bandwidth usage since the cameras can send out data and intel-
      ligently figure out what video needs to be sent. This significantly reduces the cost and complexity of the
      network centric processing model, and completely eliminates the drawbacks of centralized architec-
      tures.

      Furthermore, processing video at the edge – or partly at the edge – significantly reduces the cost of the
      servers needed to run the intelligent video applications. Servers that typically process only a few video
      streams when doing the entire video processing, can handle hundreds of video streams if some of the
      processing is done in the cameras.

      A number of software vendors supply intelligent video applications that solve specific needs. Together
      with network cameras, video encoders and/or video management software systems, these intelligent
      video applications form complete solutions, tailored to specific market requirements.

      While this creates great freedom of choice for the end user, it also calls for compatibility and easy inte-
      gration between the cameras/encoders, video management software, and the intelligent video applica-
      tions. In order to be commercially attractive and to optimize compatibility, devices, software, and intel-
      ligent video applications need to be built on open interfaces (APIs) and platforms.



                                                                                                                 4
To this end, Axis has developed the Axis Camera Application Platform. This is an open platform that
      enables third-party suppliers to develop compatible applications that can be downloaded installed on
      cameras and video encoders. This creates flexibility for users and enables them to design intelligent
      video surveillance systems that fit their needs perfectly.


 4.   Axis and intelligent video
      Axis is committed to enabling a great variety of video analytics for its network cameras and video encoders.
      Our products provide capacity in terms of enough processing power and memory to embed video analytics
      in these edge devices. This makes it possible to create scalable intelligent video solutions for a wide range
      of network video products, with diversified requirements, ranging from basic camera-enhancing software
      applications to more niche intelligent video systems.

      Axis platform for intelligent video applications is made up of a series of economically-priced modules
      which will offer basic functionality, thus enabling our ADPs (Application Development Partners) to build
      more complex systems onto. Axis is making it easy for ADPs by not only providing these basic intelligent
      video modules, but also creating the facility to easily download applications on top of our intelligent
      video architecture. To this end, Axis is providing our freely available, industry-standard Application Pro-
      gramming Interface called VAPIX®. This ensures that ADPs – or other software developers that want to
      become ADPs – and the systems integrator community can easily access and embed intelligent video in
      complete video applications. Software Developer Kits and other documentation can also be downloaded
      from the Axis ADP partner web site. Essentially this will provide the bridge between our devices and
      software from the ADP community so that pilot systems can be built and the benefits of intelligent
      video applications explored as quickly and easily as possible.

      Axis will continue to explore new ways to stimulate software vendors to build video analytics modules
      because ultimately the company sees intelligent video as yet another compelling reason for wider use of
      network video systems.


 5.   Axis intelligent video products
      Axis offers a number of intelligent video applications that support security operators in their daily work
      by solving real-world video surveillance challenges. Also Axis Application Development Partners supply
      a broad range of intelligent video applications that work with Axis network video products.

5.1   Active Tampering Alarm
      Active Tampering Alarm is an intelligent video analytics application available in selected Axis network
      cameras. This functionality alerts security staff when there is disrupted camera operation caused by
      vandalism or accident - such as redirection, blocking, or defocusing of cameras. The product is espe-
      cially useful in schools, prisons, public transportation, and in harsh environments where weather, vibra-
      tion, or dirt can disturb the camera’s performance. Without Active Tampering Alarm, it can take a long
      time before tampering is noticed, particularly when one operator monitors multiple cameras.


5.2   Video motion detection
      Video motion detection can either be built-in into a network video product or made available with video
      management software.

      Video motion detection is the original, basic, and prevalent intelligent video application within video
      surveillance. It is primarily used to reduce the amount of video that is stored, by flagging video that has
      changes and eliminating video in which nothing changes. By only storing video in which changes occur,
      security personnel can store video for a greater time period on a given storage capacity. It is also used
      to flag events to operators – such as persons entering locked areas – for immediate action.




                                                                                                                 5
Video motion detection is the foundation for a large number of more advanced video analytics, such
      as people counting, digital fences, and object tracking. Axis has offered video motion detection in its
      network video products since 2000 and today, all Axis network video products – except the AXIS 206
      Network Camera – are delivered out of the box with video motion detection.

5.3   Audio detection
      Many network video cameras include audio support, though, just as in video surveillance, local leg-
      islation or codes of practice sometimes limits the use of this feature. Sometimes, using audio can be
      a powerful complement to video. Audio detection is based on the same principles as video motion
      detection. The application detects noise – such as the breaking of a window or voices – and uses this
      as a trigger to transmit and record video, or to alert operators of suspicious activities. Audio detec-
      tion can react to events in areas too dark for the video motion detection to function properly, or
      detect activity that is hidden from the view of the cameras.

      For audio detection to work, the camera needs to at least include audio support, and either have a
      built-in microphone or have an external microphone attached. The audio detection is configured to
      react to a certain volume of sound and send an alarm or initiate recording of the video stream and
      the audio, if so desired. Axis offers audio detection in all network video products that contain audio
      support.

5.4   People counting
      In a retail store there could be a network video device installed at each of the public entrances.
      Network video devices can be fitted with a people counting module, which records the number of
      people passing through each door directly into a central business unit. Separate devices provide
      views of point of sale displays. Network cameras may trigger on motion and will stream this video
      down to a central unit, and onto an operator for analysis of “dwell times”. High volumes of people
      buzzing around, combined with long dwell times provide a picture of the display success. This infor-
      mation ultimately aids the store’s overall profitability.

      Other important store issues are: “When do queuing levels start to impact customer experience? Is a
      particular line going faster than anticipated? Is there frustration around a new layout in a store?”

      Network video systems can therefore serve multiple purposes - for business intelligence purposes
      helping retailers to increase sales and profitability through analysis of customer behavior, for im-
      proving the customer experience through analysis of queuing times and observing reaction of wait-
      ing customers, helping support decisions to open new tills as queue times reach levels where they
      begin to detract from the customer experience.

5.5   AXIS Cross Line Detection
      AXIS Cross Line Detection is a trip-wire application installable on Axis network cameras and encod-
      ers that support AXIS Camera Application Platform. The application is designed to work in most
      indoor and outdoor installations and in variable lighting conditions. It is especially suitable for gen-
      eral monitoring of entrance and exit points in low-traffic areas, detecting objects such as persons
      and vehicles that cross a defined virtual line. The application is perfect for monitoring building en-
      trances, loading docks, parking lots and area perimeters.

5.6   Partner applications
      Axis network video products include the industry standard Application Programming Interface
      VAPIX®, which facilitates the development of customized software solutions. This allows partners to
      develop applications – including intelligent video applications – that function with Axis network
      cameras and video encoders.

      Development and distribution of “edge applications” is further facilitated by AXIS Camera Application
      Platform. This open platform enables the development of compatible and reliable third-party applica-
      tions that subsequently can be downloaded to cameras and encoders, thus ensuring that users benefit
      from the market’s widest range of applications.


                                                                                                                 6
The AXIS Camera Application Platform consists of four components:

     > Software Development Kit (SDK) for development of embedded applications. The SDK package
       includes compiler system, APIs to access on-board device functionality, documentation, example
       code and a debugger and profiler tool.
     > Open application platform, which will be implemented in the majority of Axis network video
       products to allow download of compatible applications.
     > Compatibility tool to guarantee the functionality of the Axis network cameras and video encoders.
       Compatible applications will be listed on the Axis web site.
     > Optional copy protection tool to ensure that all applications in an installation are properly
       licensed.


6.   Conclusion
     Intelligent video will undoubtedly fuel deployment of network video technology over analog CCTV
     because it ensures that video surveillance systems become smarter, more accurate, and more cost-
     effective.

     The most scalable and flexible architecture is based on ‘intelligence at the edge’, that is, processing as
     much of the video as possible in the network cameras, or video encoders themselves. Furthermore, this
     approach not only entails the least amount of bandwidth but also significantly reduces the cost and
     complexity of the network.

     Open application development platforms such as AXIS Camera Application Platform facilitate the in-
     tegration of compatible third-party solutions, which should result in a quickly growing variety of ap-
     plications – general as well as specialized for different industries, creating new end user benefits and
     opening up new business possibilities.




                                                                                                                  7
www.axis.com




                                                                                                                                                          37847/EN/R2/0911
about axis Communications
Axis is an IT company offering network video solutions
for professional installations. The company is the global
market leader in network video, driving the ongoing
shift from analog to digital video surveillance. Axis
products and solutions focus on security surveillance
and remote monitoring, and are based on innovative,
open technology platforms.
Axis is a Swedish-based company, operating worldwide
with offices in more than 20 countries and cooperating
with partners in more than 70 countries. Founded in
1984, Axis is listed on the NASDAQ OMX Stockholm un-
der the ticker AXIS. For more information about Axis,
please visit our website at www.axis.com




©2009 Axis Communications AB. AXIS COMMUNICATIONS, AXIS, ETRAX, ARTPEC and VAPIX are registered trademarks or trademark applications of Axis
AB in various jurisdictions. All other company names and products are trademarks or registered trademarks of their respective companies. We reserve the
right to introduce modifications without notice.

Mais conteúdo relacionado

Mais procurados

Blaze automation jntu
Blaze automation jntuBlaze automation jntu
Blaze automation jntuBlaze_Hyd
 
Surveon Intelligent Building Megapixel Surveillance Solution
Surveon Intelligent Building Megapixel Surveillance SolutionSurveon Intelligent Building Megapixel Surveillance Solution
Surveon Intelligent Building Megapixel Surveillance SolutionSurveon Technology Inc.
 
CNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
CNL Software PSIM Presentation Case Study - IBM UK - Corporate SecurityCNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
CNL Software PSIM Presentation Case Study - IBM UK - Corporate SecurityAdlan Hussain
 
Corp preso animation__videointro_5.7.12_2.3version
Corp preso animation__videointro_5.7.12_2.3versionCorp preso animation__videointro_5.7.12_2.3version
Corp preso animation__videointro_5.7.12_2.3versionrgitre
 
Indigo Vision - Complete Solution Portfolio
Indigo Vision -  Complete Solution PortfolioIndigo Vision -  Complete Solution Portfolio
Indigo Vision - Complete Solution PortfolioClaudiu Sandor
 
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office SettingTIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office SettingSaraPia5
 
Intelligent Video Surveillance Solution
Intelligent Video Surveillance SolutionIntelligent Video Surveillance Solution
Intelligent Video Surveillance SolutionMindtree Ltd.
 
CNL Software IPSecurityCenter Case Studies Presentation 0113
CNL Software IPSecurityCenter Case Studies Presentation  0113CNL Software IPSecurityCenter Case Studies Presentation  0113
CNL Software IPSecurityCenter Case Studies Presentation 0113Adlan Hussain
 
Surveon Enterprise SMR8300 Product Introduction
Surveon Enterprise SMR8300 Product IntroductionSurveon Enterprise SMR8300 Product Introduction
Surveon Enterprise SMR8300 Product IntroductionSurveon Technology Inc.
 
Security and Communication Systems Integration
Security and Communication Systems Integration Security and Communication Systems Integration
Security and Communication Systems Integration Chris Cavallo
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarketFinite Moments
 
Ivanti uem security_webinar_cybersecurity_month_oct2020
Ivanti uem security_webinar_cybersecurity_month_oct2020Ivanti uem security_webinar_cybersecurity_month_oct2020
Ivanti uem security_webinar_cybersecurity_month_oct2020Ivanti
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochureMaliha Ali
 

Mais procurados (16)

Blaze automation jntu
Blaze automation jntuBlaze automation jntu
Blaze automation jntu
 
Surveon Intelligent Building Megapixel Surveillance Solution
Surveon Intelligent Building Megapixel Surveillance SolutionSurveon Intelligent Building Megapixel Surveillance Solution
Surveon Intelligent Building Megapixel Surveillance Solution
 
CNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
CNL Software PSIM Presentation Case Study - IBM UK - Corporate SecurityCNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
CNL Software PSIM Presentation Case Study - IBM UK - Corporate Security
 
MMPL corporate overview mail
MMPL corporate overview mailMMPL corporate overview mail
MMPL corporate overview mail
 
Corp preso animation__videointro_5.7.12_2.3version
Corp preso animation__videointro_5.7.12_2.3versionCorp preso animation__videointro_5.7.12_2.3version
Corp preso animation__videointro_5.7.12_2.3version
 
Indigo Vision - Complete Solution Portfolio
Indigo Vision -  Complete Solution PortfolioIndigo Vision -  Complete Solution Portfolio
Indigo Vision - Complete Solution Portfolio
 
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office SettingTIC-TOC: How to Safely Send People Back to Work in an Office Setting
TIC-TOC: How to Safely Send People Back to Work in an Office Setting
 
Intelligent Video Surveillance Solution
Intelligent Video Surveillance SolutionIntelligent Video Surveillance Solution
Intelligent Video Surveillance Solution
 
Homeland Security Solutions
Homeland Security SolutionsHomeland Security Solutions
Homeland Security Solutions
 
CNL Software IPSecurityCenter Case Studies Presentation 0113
CNL Software IPSecurityCenter Case Studies Presentation  0113CNL Software IPSecurityCenter Case Studies Presentation  0113
CNL Software IPSecurityCenter Case Studies Presentation 0113
 
Surveon Enterprise SMR8300 Product Introduction
Surveon Enterprise SMR8300 Product IntroductionSurveon Enterprise SMR8300 Product Introduction
Surveon Enterprise SMR8300 Product Introduction
 
Avigilon Brochure
Avigilon BrochureAvigilon Brochure
Avigilon Brochure
 
Security and Communication Systems Integration
Security and Communication Systems Integration Security and Communication Systems Integration
Security and Communication Systems Integration
 
White paper surveillancepointmarket
White paper  surveillancepointmarketWhite paper  surveillancepointmarket
White paper surveillancepointmarket
 
Ivanti uem security_webinar_cybersecurity_month_oct2020
Ivanti uem security_webinar_cybersecurity_month_oct2020Ivanti uem security_webinar_cybersecurity_month_oct2020
Ivanti uem security_webinar_cybersecurity_month_oct2020
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 

Destaque

Which has better zoom?
Which has better zoom?Which has better zoom?
Which has better zoom?cnssources
 
The challenges of minimal illumination
The challenges of minimal illuminationThe challenges of minimal illumination
The challenges of minimal illuminationcnssources
 
Thermal Surveillance
Thermal SurveillanceThermal Surveillance
Thermal Surveillancecnssources
 
Lighting design guide for network video
Lighting design guide for network videoLighting design guide for network video
Lighting design guide for network videocnssources
 
H264 video compression explained
H264 video compression explainedH264 video compression explained
H264 video compression explainedcnssources
 
The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...Brian Solis
 
Open Source Creativity
Open Source CreativityOpen Source Creativity
Open Source CreativitySara Cannon
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)maditabalnco
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsBarry Feldman
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome EconomyHelge Tennø
 

Destaque (12)

Sanral
SanralSanral
Sanral
 
HDTV
HDTVHDTV
HDTV
 
Which has better zoom?
Which has better zoom?Which has better zoom?
Which has better zoom?
 
The challenges of minimal illumination
The challenges of minimal illuminationThe challenges of minimal illumination
The challenges of minimal illumination
 
Thermal Surveillance
Thermal SurveillanceThermal Surveillance
Thermal Surveillance
 
Lighting design guide for network video
Lighting design guide for network videoLighting design guide for network video
Lighting design guide for network video
 
H264 video compression explained
H264 video compression explainedH264 video compression explained
H264 video compression explained
 
The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...The impact of innovation on travel and tourism industries (World Travel Marke...
The impact of innovation on travel and tourism industries (World Travel Marke...
 
Open Source Creativity
Open Source CreativityOpen Source Creativity
Open Source Creativity
 
Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)Reuters: Pictures of the Year 2016 (Part 2)
Reuters: Pictures of the Year 2016 (Part 2)
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 

Semelhante a White Paper on Axis and Intelligent Video Surveillance

Whitepaper networkvideo safecity
Whitepaper networkvideo safecityWhitepaper networkvideo safecity
Whitepaper networkvideo safecityAndrea Sorri
 
Whitepaper networkvideo safecity
Whitepaper networkvideo safecityWhitepaper networkvideo safecity
Whitepaper networkvideo safecityAxis Communications
 
Survey Paper on Smart Surveillance System
Survey Paper on Smart Surveillance SystemSurvey Paper on Smart Surveillance System
Survey Paper on Smart Surveillance SystemIRJET Journal
 
Iaetsd arm based remote surveillance and motion detection
Iaetsd arm based remote surveillance and motion detectionIaetsd arm based remote surveillance and motion detection
Iaetsd arm based remote surveillance and motion detectionIaetsd Iaetsd
 
Cost-effective Video Analytics in Smart Cities
Cost-effective Video Analytics in Smart CitiesCost-effective Video Analytics in Smart Cities
Cost-effective Video Analytics in Smart CitiesHCL Technologies
 
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdf
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdfTop 16 Applications of Computer Vision in Video Surveillance and Security.pdf
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdfSabhanayagham Thirugnanasambandam
 
Disruptive Trends Fueled by AI & Camera Edge Analytics
Disruptive Trends Fueled by AI & Camera Edge AnalyticsDisruptive Trends Fueled by AI & Camera Edge Analytics
Disruptive Trends Fueled by AI & Camera Edge AnalyticsMemoori
 
IRJET- Optimization of Surveillance Camera for Low Cost Storage Device
IRJET- Optimization of Surveillance Camera for Low Cost Storage DeviceIRJET- Optimization of Surveillance Camera for Low Cost Storage Device
IRJET- Optimization of Surveillance Camera for Low Cost Storage DeviceIRJET Journal
 
CCTV Surveillance System, attacks and design goals
CCTV Surveillance System, attacks and design goals  CCTV Surveillance System, attacks and design goals
CCTV Surveillance System, attacks and design goals IJECEIAES
 
Zencam Company Presentation
Zencam Company PresentationZencam Company Presentation
Zencam Company PresentationZenesis Networks
 
Video Surveillance Software Market size.pdf
Video Surveillance Software Market size.pdfVideo Surveillance Software Market size.pdf
Video Surveillance Software Market size.pdfshreyaporekar9
 

Semelhante a White Paper on Axis and Intelligent Video Surveillance (20)

Whitepaper networkvideo safecity
Whitepaper networkvideo safecityWhitepaper networkvideo safecity
Whitepaper networkvideo safecity
 
Whitepaper networkvideo safecity
Whitepaper networkvideo safecityWhitepaper networkvideo safecity
Whitepaper networkvideo safecity
 
ACTi Introduction
ACTi IntroductionACTi Introduction
ACTi Introduction
 
Survey Paper on Smart Surveillance System
Survey Paper on Smart Surveillance SystemSurvey Paper on Smart Surveillance System
Survey Paper on Smart Surveillance System
 
vivotek_ipcctv_handbook.pdf
vivotek_ipcctv_handbook.pdfvivotek_ipcctv_handbook.pdf
vivotek_ipcctv_handbook.pdf
 
Iaetsd arm based remote surveillance and motion detection
Iaetsd arm based remote surveillance and motion detectionIaetsd arm based remote surveillance and motion detection
Iaetsd arm based remote surveillance and motion detection
 
Cost-effective Video Analytics in Smart Cities
Cost-effective Video Analytics in Smart CitiesCost-effective Video Analytics in Smart Cities
Cost-effective Video Analytics in Smart Cities
 
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdf
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdfTop 16 Applications of Computer Vision in Video Surveillance and Security.pdf
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdf
 
Disruptive Trends Fueled by AI & Camera Edge Analytics
Disruptive Trends Fueled by AI & Camera Edge AnalyticsDisruptive Trends Fueled by AI & Camera Edge Analytics
Disruptive Trends Fueled by AI & Camera Edge Analytics
 
IRJET- Optimization of Surveillance Camera for Low Cost Storage Device
IRJET- Optimization of Surveillance Camera for Low Cost Storage DeviceIRJET- Optimization of Surveillance Camera for Low Cost Storage Device
IRJET- Optimization of Surveillance Camera for Low Cost Storage Device
 
CCTV Surveillance System, attacks and design goals
CCTV Surveillance System, attacks and design goals  CCTV Surveillance System, attacks and design goals
CCTV Surveillance System, attacks and design goals
 
GoSecure
GoSecureGoSecure
GoSecure
 
Zencam Company Presentation
Zencam Company PresentationZencam Company Presentation
Zencam Company Presentation
 
Multisentry Enterprise Platform
Multisentry Enterprise PlatformMultisentry Enterprise Platform
Multisentry Enterprise Platform
 
Video Surveillance Software Market size.pdf
Video Surveillance Software Market size.pdfVideo Surveillance Software Market size.pdf
Video Surveillance Software Market size.pdf
 
Unified VSS white paper
Unified VSS white paperUnified VSS white paper
Unified VSS white paper
 
Flyer axis agentvi_jvp_en_1505
Flyer axis agentvi_jvp_en_1505Flyer axis agentvi_jvp_en_1505
Flyer axis agentvi_jvp_en_1505
 
bc_techguide_33334_en_0811_lo.pdf
bc_techguide_33334_en_0811_lo.pdfbc_techguide_33334_en_0811_lo.pdf
bc_techguide_33334_en_0811_lo.pdf
 
Video Security Goes to the cloud
Video Security Goes to the cloudVideo Security Goes to the cloud
Video Security Goes to the cloud
 
41640 smart cams
41640 smart cams41640 smart cams
41640 smart cams
 

Mais de cnssources

10 reasons why you shouldn't buy an anologue camera
10 reasons why you shouldn't buy an anologue camera10 reasons why you shouldn't buy an anologue camera
10 reasons why you shouldn't buy an anologue cameracnssources
 
Video Compression Techniques
Video Compression TechniquesVideo Compression Techniques
Video Compression Techniquescnssources
 
CNS - An Introduction
CNS - An IntroductionCNS - An Introduction
CNS - An Introductioncnssources
 
CDVI Product Preview
CDVI Product PreviewCDVI Product Preview
CDVI Product Previewcnssources
 
An Introduction to CNS
An Introduction to CNSAn Introduction to CNS
An Introduction to CNScnssources
 

Mais de cnssources (8)

10 reasons why you shouldn't buy an anologue camera
10 reasons why you shouldn't buy an anologue camera10 reasons why you shouldn't buy an anologue camera
10 reasons why you shouldn't buy an anologue camera
 
Video Compression Techniques
Video Compression TechniquesVideo Compression Techniques
Video Compression Techniques
 
Volkswagen
VolkswagenVolkswagen
Volkswagen
 
Red Bull
Red BullRed Bull
Red Bull
 
Kia Motors
Kia MotorsKia Motors
Kia Motors
 
CNS - An Introduction
CNS - An IntroductionCNS - An Introduction
CNS - An Introduction
 
CDVI Product Preview
CDVI Product PreviewCDVI Product Preview
CDVI Product Preview
 
An Introduction to CNS
An Introduction to CNSAn Introduction to CNS
An Introduction to CNS
 

Último

The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 

Último (20)

The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 

White Paper on Axis and Intelligent Video Surveillance

  • 1. White paper axis and intelligent Video (iV)
  • 2. table of contents 1. What is intelligent video? 3 2. Why is it an important development? 3 3. System design strategies for intelligent video 4 4. axis and intelligent video 5 5. axis intelligent video products 5 6. Conclusion 7
  • 3. 1. What is intelligent video? Video surveillance is a booming business, and installations become larger and larger. At the same time, several studies have highlighted the hit and miss nature of human intervention to spot change in a sur- rounding environment. And the challenge becomes larger as systems expand. In addition, a massive amount of video is being recorded, but never watched or reviewed, due to lack of time. As a result, events and activities are missed, and suspicious behavior is not noticed in time to prevent incidents. This has led to the development of intelligent video (IV). Intelligent video is about reducing the vast amount of information contained in video, making it more manageable for systems and persons. Intelligent video surveillance systems automatically perform an analysis of captured video, and automatically use the resultant data. Building this sort of analytics into network cameras creates a reliable and versatile video surveillance system, and drastically reduces work- load for the staff. Furthermore, intelligent video allows the operator to use the video surveillance system more pro-actively by giving early warnings about situations that could be potential risk scenarios. The applications performing these analyses are referred to as Video Content Analysis (VCA) or Video Analytics (VA). Video analytics range from video motion detection and audio detection, to more ad- vanced systems including camera tampering detection, people counting, cross line detection, and vehicle license plate recognition. The number of applications is expected to grow quickly as the integration of third-party solutions is facilitated through open application development platforms. Intelligent video systems can also extract video and data from surveillance video streams and integrate that information with other applications, such as retail management systems or access control systems, creating new benefits and opening up new business possibilities. 2. Why is it an important development? Intelligent video allows video surveillance systems to be used for a host of new applications, and ensures that video surveillance systems become smarter, more accurate, and more cost-effective. In summary, intelligent video: > Automatically analyzes and tags surveillance video in real-time > Detects suspicious activities > Initiates video recording, alarms or other actions > Alerts operators or field personnel > Enables users to be proactive – preventing crime rather than reacting or analyzing after the fact Systems can be set up to deliver far more targeted and specific information with intelligent video. This means that in the future there will be far less reliance on manned guarding. Intelligent video also creates a platform for a more pro-active approach to video surveillance. By configuring intelligent video systems to specific parameters, it is possible to get instant alerts when pre-set parameters have been breached, thus delivering early warnings to staff. 2.1 Efficient use of manpower Intelligent video enables efficient use of manpower. Fewer operators can monitor even very large instal- lations, since staff will not be required to watch many monitors for long hours to spot suspicious activ- ity. Instead, the intelligent video system would inform operators about people moving in restricted areas, cars driving the wrong way, or attempts to tamper with the video surveillance cameras. 2.2 Faster retrieval of stored video Video analytics – such as video motion detection – ensures that only relevant video footage is stored, so that when the need arises to search through old recordings, only video that could potentially include the event in question is retrieved. For example, an intelligent video system that has tagged the video stream with appropriate labels during recording can automatically search through days of stored video to find the right video footage in a matter of seconds. 3
  • 4. 2.3 Reduced network load and storage needs Intelligent video systems that include video motion detection and audio detection minimize the need for storage space by recording only video that contains activity. Furthermore, by placing intelligent video ‘at the edge’, that is, processing as much as possible of the video in the network cameras themselves, the load on the network is significantly reduced as only relevant video is streamed from the cameras. Intel- ligent video applications help build video surveillance systems that are more cost-effective. 2.4 New business opportunities Intelligent video also makes it possible to use video for applications outside of security. For example, in retail stores it can be used for analyzing consumer behavior, such as the number of people stopping by a particular merchandising shelf, or the popular routes through the shop. In airports, an intelligent video system could measure the queue time between entering and exiting a check-in point, helping direct staff and minimizing waiting time for travelers. In these and other ways, intelligent video makes it possible to extract greater benefit out of the video surveillance infrastructure, enabling a higher return-on-invest- ment. 3. System design strategies for intelligent video There are two broad categories of systems for implementing intelligent video - centralized and distrib- uted. In centralized architectures, video and other information is collected by cameras and sensors and brought to a centralized server for analysis. In distributed architectures, the edge devices (network cam- eras and video encoders) are ‘intelligent’ and are capable of processing the video and extracting relevant information. Network video allows for distributed intelligence. Distributed architectures are designed to overcome the limitations of centralized architectures by distributing the processing to different elements in the net- work. If cameras, for example, have motion detection, then rather than streaming all the video, only interesting video that has motion in it can be sent to the monitoring station for further action and analysis. The load on the infrastructure and people involved falls dramatically. For specialized video analytics, where only the data is needed and not the video, such as, people counting, or automatic number plate recognition – run- ning the applications in the camera has a dramatic impact since the cameras can extract the required data and send just that information, with perhaps a few snapshots. The most scalable, cost-effective and flexible architecture is based on ‘intelligence at the edge’, that is, processing as much of the video as possible in the network cameras, or video encoders themselves. This architecture entails the least amount of bandwidth usage since the cameras can send out data and intel- ligently figure out what video needs to be sent. This significantly reduces the cost and complexity of the network centric processing model, and completely eliminates the drawbacks of centralized architec- tures. Furthermore, processing video at the edge – or partly at the edge – significantly reduces the cost of the servers needed to run the intelligent video applications. Servers that typically process only a few video streams when doing the entire video processing, can handle hundreds of video streams if some of the processing is done in the cameras. A number of software vendors supply intelligent video applications that solve specific needs. Together with network cameras, video encoders and/or video management software systems, these intelligent video applications form complete solutions, tailored to specific market requirements. While this creates great freedom of choice for the end user, it also calls for compatibility and easy inte- gration between the cameras/encoders, video management software, and the intelligent video applica- tions. In order to be commercially attractive and to optimize compatibility, devices, software, and intel- ligent video applications need to be built on open interfaces (APIs) and platforms. 4
  • 5. To this end, Axis has developed the Axis Camera Application Platform. This is an open platform that enables third-party suppliers to develop compatible applications that can be downloaded installed on cameras and video encoders. This creates flexibility for users and enables them to design intelligent video surveillance systems that fit their needs perfectly. 4. Axis and intelligent video Axis is committed to enabling a great variety of video analytics for its network cameras and video encoders. Our products provide capacity in terms of enough processing power and memory to embed video analytics in these edge devices. This makes it possible to create scalable intelligent video solutions for a wide range of network video products, with diversified requirements, ranging from basic camera-enhancing software applications to more niche intelligent video systems. Axis platform for intelligent video applications is made up of a series of economically-priced modules which will offer basic functionality, thus enabling our ADPs (Application Development Partners) to build more complex systems onto. Axis is making it easy for ADPs by not only providing these basic intelligent video modules, but also creating the facility to easily download applications on top of our intelligent video architecture. To this end, Axis is providing our freely available, industry-standard Application Pro- gramming Interface called VAPIX®. This ensures that ADPs – or other software developers that want to become ADPs – and the systems integrator community can easily access and embed intelligent video in complete video applications. Software Developer Kits and other documentation can also be downloaded from the Axis ADP partner web site. Essentially this will provide the bridge between our devices and software from the ADP community so that pilot systems can be built and the benefits of intelligent video applications explored as quickly and easily as possible. Axis will continue to explore new ways to stimulate software vendors to build video analytics modules because ultimately the company sees intelligent video as yet another compelling reason for wider use of network video systems. 5. Axis intelligent video products Axis offers a number of intelligent video applications that support security operators in their daily work by solving real-world video surveillance challenges. Also Axis Application Development Partners supply a broad range of intelligent video applications that work with Axis network video products. 5.1 Active Tampering Alarm Active Tampering Alarm is an intelligent video analytics application available in selected Axis network cameras. This functionality alerts security staff when there is disrupted camera operation caused by vandalism or accident - such as redirection, blocking, or defocusing of cameras. The product is espe- cially useful in schools, prisons, public transportation, and in harsh environments where weather, vibra- tion, or dirt can disturb the camera’s performance. Without Active Tampering Alarm, it can take a long time before tampering is noticed, particularly when one operator monitors multiple cameras. 5.2 Video motion detection Video motion detection can either be built-in into a network video product or made available with video management software. Video motion detection is the original, basic, and prevalent intelligent video application within video surveillance. It is primarily used to reduce the amount of video that is stored, by flagging video that has changes and eliminating video in which nothing changes. By only storing video in which changes occur, security personnel can store video for a greater time period on a given storage capacity. It is also used to flag events to operators – such as persons entering locked areas – for immediate action. 5
  • 6. Video motion detection is the foundation for a large number of more advanced video analytics, such as people counting, digital fences, and object tracking. Axis has offered video motion detection in its network video products since 2000 and today, all Axis network video products – except the AXIS 206 Network Camera – are delivered out of the box with video motion detection. 5.3 Audio detection Many network video cameras include audio support, though, just as in video surveillance, local leg- islation or codes of practice sometimes limits the use of this feature. Sometimes, using audio can be a powerful complement to video. Audio detection is based on the same principles as video motion detection. The application detects noise – such as the breaking of a window or voices – and uses this as a trigger to transmit and record video, or to alert operators of suspicious activities. Audio detec- tion can react to events in areas too dark for the video motion detection to function properly, or detect activity that is hidden from the view of the cameras. For audio detection to work, the camera needs to at least include audio support, and either have a built-in microphone or have an external microphone attached. The audio detection is configured to react to a certain volume of sound and send an alarm or initiate recording of the video stream and the audio, if so desired. Axis offers audio detection in all network video products that contain audio support. 5.4 People counting In a retail store there could be a network video device installed at each of the public entrances. Network video devices can be fitted with a people counting module, which records the number of people passing through each door directly into a central business unit. Separate devices provide views of point of sale displays. Network cameras may trigger on motion and will stream this video down to a central unit, and onto an operator for analysis of “dwell times”. High volumes of people buzzing around, combined with long dwell times provide a picture of the display success. This infor- mation ultimately aids the store’s overall profitability. Other important store issues are: “When do queuing levels start to impact customer experience? Is a particular line going faster than anticipated? Is there frustration around a new layout in a store?” Network video systems can therefore serve multiple purposes - for business intelligence purposes helping retailers to increase sales and profitability through analysis of customer behavior, for im- proving the customer experience through analysis of queuing times and observing reaction of wait- ing customers, helping support decisions to open new tills as queue times reach levels where they begin to detract from the customer experience. 5.5 AXIS Cross Line Detection AXIS Cross Line Detection is a trip-wire application installable on Axis network cameras and encod- ers that support AXIS Camera Application Platform. The application is designed to work in most indoor and outdoor installations and in variable lighting conditions. It is especially suitable for gen- eral monitoring of entrance and exit points in low-traffic areas, detecting objects such as persons and vehicles that cross a defined virtual line. The application is perfect for monitoring building en- trances, loading docks, parking lots and area perimeters. 5.6 Partner applications Axis network video products include the industry standard Application Programming Interface VAPIX®, which facilitates the development of customized software solutions. This allows partners to develop applications – including intelligent video applications – that function with Axis network cameras and video encoders. Development and distribution of “edge applications” is further facilitated by AXIS Camera Application Platform. This open platform enables the development of compatible and reliable third-party applica- tions that subsequently can be downloaded to cameras and encoders, thus ensuring that users benefit from the market’s widest range of applications. 6
  • 7. The AXIS Camera Application Platform consists of four components: > Software Development Kit (SDK) for development of embedded applications. The SDK package includes compiler system, APIs to access on-board device functionality, documentation, example code and a debugger and profiler tool. > Open application platform, which will be implemented in the majority of Axis network video products to allow download of compatible applications. > Compatibility tool to guarantee the functionality of the Axis network cameras and video encoders. Compatible applications will be listed on the Axis web site. > Optional copy protection tool to ensure that all applications in an installation are properly licensed. 6. Conclusion Intelligent video will undoubtedly fuel deployment of network video technology over analog CCTV because it ensures that video surveillance systems become smarter, more accurate, and more cost- effective. The most scalable and flexible architecture is based on ‘intelligence at the edge’, that is, processing as much of the video as possible in the network cameras, or video encoders themselves. Furthermore, this approach not only entails the least amount of bandwidth but also significantly reduces the cost and complexity of the network. Open application development platforms such as AXIS Camera Application Platform facilitate the in- tegration of compatible third-party solutions, which should result in a quickly growing variety of ap- plications – general as well as specialized for different industries, creating new end user benefits and opening up new business possibilities. 7
  • 8. www.axis.com 37847/EN/R2/0911 about axis Communications Axis is an IT company offering network video solutions for professional installations. The company is the global market leader in network video, driving the ongoing shift from analog to digital video surveillance. Axis products and solutions focus on security surveillance and remote monitoring, and are based on innovative, open technology platforms. Axis is a Swedish-based company, operating worldwide with offices in more than 20 countries and cooperating with partners in more than 70 countries. Founded in 1984, Axis is listed on the NASDAQ OMX Stockholm un- der the ticker AXIS. For more information about Axis, please visit our website at www.axis.com ©2009 Axis Communications AB. AXIS COMMUNICATIONS, AXIS, ETRAX, ARTPEC and VAPIX are registered trademarks or trademark applications of Axis AB in various jurisdictions. All other company names and products are trademarks or registered trademarks of their respective companies. We reserve the right to introduce modifications without notice.