+ All Categories
Home > Documents > Digital Video Surveillance - IBM Digital Events (Digital Video Surveillance) Integration of Security...

Digital Video Surveillance - IBM Digital Events (Digital Video Surveillance) Integration of Security...

Date post: 02-Apr-2018
Category:
Upload: hoangcong
View: 221 times
Download: 0 times
Share this document with a friend
36
Digital Video Surveillance CEMAAS © 2007 IBM Corporation Digital Video Surveillance IBM Global Technology Services Ing. Erik-Karl Tupy IBM IMT CEMAAS Leader Digital Video Surveillance Dipl.Ing. Rainer Eisenwagen IBM IMT CEMAAS Leading Architect Digital Video Surveillance
Transcript

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation

Digital Video Surveillance

IBM Global Technology Services

Ing. Erik-Karl TupyIBM IMT CEMAASLeader Digital Video Surveillance

Dipl.Ing. Rainer EisenwagenIBM IMT CEMAASLeading Architect Digital Video Surveillance

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation2

IMT CEMAAS ….is the biggest business area of IBM in Europe

* direct business, all other countries via business partner

DOTTED: IMT CEMAAS

Central Eastern Europe(CEE)

Poland*Hungary*Czech Rep.*Slovakia*Russia*

TajikistanKyrgistanKazakhstanUzbekistanTurkmenistan

MontenegroAlbaniaMacedoniaMoldaviaUkraineBelarus

Slovenia*Croatia*Bulgaria*Romania*SerbiaBosnia

Egypt*Pakistan*Emirates, Saudi, Kuwait, OmanLebanon, JordanIrak,Iran,Afganistan

Middle East,Egypt and Pakistan

(MEEP)

Austria*Switzerland*

CEMAAS

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation3

Why is IBM in the market for Security Solutions?Convergence betweenSecurity- and Information-Technology

- Same Network (IP)

- Digital Events (DigitalVideo Surveillance)

Integration of SecurityTechnologie in existing IT Infrastructure

- Data Transfer

- Processes

- Back End

Security

System

Mobile

HR

User ManagementProvisioning

Data Management

BusinessIntelligence

IT-Plattform

GUI

Notification

Availability

Security

Networking

Maintenance

Integration

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation4

Function Analog DigitalPicture Taking Analog CCTV Camera Digital CCTV Camera *)Transfer Coaxial Cables IP NetworkVideo Switching Analog Video Switch Video serverVideo Multiplexing Analog Video Multiplexer Video serverRecording 24 Hour VCR Recorder Video serverPlayback Video Playback Recorder Video serverData Analysis Manual Video serverInformation Search Manual Video server

VCR RecorderMonitor

CoaxialCable

Video switch

Video Server

Monitor

EthernetCabling

EthernetSwitches

AnalogCameras

DigitalCameras Analog

Cameras *)

*) Remark: Analog cameras can be integrated by digitising the video stream.

Digital StoragePlayback Recorder

Comparison of analog and digital video technology

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation5

Increase Security Level

Less recognition

Surveillance Syndrome

More Cameras

More Monitors

Automatic Recognition

Informed Decission

Surveillance Syndrome

No additional employees…

Increase Security Level

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation6

The expert eye ......

Efficiency

20 min

Recognition Rate

Monitors: 2+

after 12 minutes: 45%

After 22 minutes: 5%

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation7

Automatic Analysis... of the motion of objects having regard to

- Size

- Position

- Time

- Direction

- Crossing of borders and barriers

- Motion / no motion

- Lanes

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation8

Forbidden Parking

Detection of Motion

Sequences

Face Recognition

People Counting

Plate Recognition

Abandoned Objects

DigitalVideo

Surveillance

Object Removal

Examples of use

Access Control

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation9

Access Control Digital Video Surveillance in combination with intelligent validation and/or verification systems close security gaps.

„Classic“ applications can be found in areas like:

- Doors

- Entrance Areas

- Gateways

- Lobbies and Foyers

- Holding Areas

- Zones with special access restrictions

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation10

Forbidden Parking

Detection of Motion

Sequences

Face Recognition

People Counting

Plate Recognition

Abandoned Objects

DigitalVideo

Surveillance

Object Removal

Examples of use

Access Control

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation11

Plate RecognitionLicense plates are stored in a database

The recognition system analyses the video data and reads license plates in realtime

The outcome of the analysis is compared with the database

Example of usage: Gates to parking lots can be opened automatically

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation12

Applications for Plate Recognition

Road Charges Access ControlFIR (Far-InfraRed) Classification of Vehicles

HighwaysParking Lots

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation13

Forbidden Parking

Detection of Motion

Sequences

Face Recognition

People Counting

Plate Recognition

Abandoned Objects

DigitalVideo

Surveillance

Object Removal

Examples of use

Access Control

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation14

Detection of Motion SequencesSecurity

Gathering

Loitering

Slip&Fall

Graffiti

Surveillance of endangered zones

Marketing

Definition of best points of sale

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation15

Forbidden Parking

Detection of Motion

Sequences

Face Recognition

People Counting

Plate Recognition

Abandoned Objects

DigitalVideo

Surveillance

Object Removal

Examples of use

Access Control

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation16

People Counting

Monitoring of events (maximum number of participants)

Utilisation of public transportation

‚Tail-Gating‘ prevention

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation17

Motion Sequences & People Counting

Office

200 sq. ft.

Office

1875 sq. ft.

Stairs Downto Building

PedestrianXing

Parking Spots

Parking Spots

Stairs toUpper

Parking Lot

Building

MainEntrance

Cameramounted on

roof ofbuilding

CameraCoverageArea

Road Road

Lamps

TypicalPedestrianPath

TypicalVehiclePath

Hawthorne1 Deployment Scenario for Camera #2

Arrival & Departure Distribution of people into Hawthorne 1

Paths of Large Objects over a 24 hour period

Tracks of all objects over 24 hours

0

10

20

30

40

50

60

70

80

1 4 7 10 13 16 19 22 25 28 31 34 37 40 43 46 49 52 55 58 61 64 67 70 73 76

Series1

Arrival Peak:

~ 8.30 am

Departure Peak: ~ 3.30 pm & 5.30pm

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation18

Forbidden Parking

Detection of Motion

Sequences

Face Recognition

People Counting

Plate Recognition

Abandoned Objects

DigitalVideo

Surveillance

Object Removal

Examples of use

Access Control

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation19

Abandoned ObjectsDetection of unattended luggage- Bombs

- Criminal activities

The intelligent detection system report critical situations directly to the guards. Further actions can be taken immediately.

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation20

Forbidden Parking

Detection of Motion

Sequences

Face Recognition

People Counting

Plate Recognition

Abandoned Objects

DigitalVideo

Surveillance

Object Removal

Examples of use

Access Control

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation21

Object RemovalArt Exhibitions

- Surveillance of pictures and sculptures in sensible historical buildings

Warehouses- Stock Control (also in combination

with RFID)

- Reasons for loss can be detected

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation22

Forbidden Parking

Detection of Motion

Sequences

Face Recognition

People Counting

Plate Recognition

Abandoned Objects

DigitalVideo

Surveillance

Object Removal

Examples of use

Access Control

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation23

Forbidden ParkingGateways

Access roads for Fire Brigade

Emergency Exits

along fences

Lot Control

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation24

Forbidden Parking

Detection of Motion

Sequences

Face Recognition

People Counting

Plate Recognition

Abandoned Objects

DigitalVideo

Surveillance

Object Removal

Examples of use

Access Control

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation25

Face RecognitionTwo dimensional (2D)– Search and recgonise

individuals

– in groups

– in rooms

– In open space

Three dimensional (3D)– Access Control

– at any kind of entrance

IDENTICAL

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation26

3D Face Recognition

Access Control– Error rate < 0,001%

– Recognition time < 1 sec

Open Interfaces– HR databases

– Time Attendance Systems

Implementations in existing infrastructure

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation27

Forbidden Parking

Detection of Motion

Sequences

Face Recognition

People Counting

Plate Recognition

Abandoned Objects

DigitalVideo

Surveillance

Object Removal

Examples of use

Access Control

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation

IBM Smart AnalyticsArchitecture

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation29

IBM Smart Analytics Datastream

DB2 DATABASE

VIDEO CLIPS

Video

VIDEO ANALYSIS

VIDEO ENCODING

WEB SERVICE

DATA SERVER

WINDOWS 2003

STREAMING SERVER

META DATA

VIDEO CLIPSSSE

MILS Server

Video Server

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation30

SSE – AF SSE – AF SSE – AF SSE – DF SSE – DF

Multi-Modal Event Database (IBM DB2)

IBM: MILS (Meta-Data Ingestion Web Services) --- IBM WebSphere App

IBM: MILS (Event Query Web Services) --- IBM WebSphere App

Event Search /

Query Application

Event Browsing

Application

Real Time Event Alert

Application

Event Statistics

Application

Situation Awareness

Application

Behavior Analysis License Plate Reco Face Reco Badge Reader Radar Analytics

Analytics EnginesWith DLL plug-ins

XML Event Metadata

Tables for Event Indexing

SQL-like event search queries

IBM:MILS Middleware for Large Scale Surveillance

SSE: Smart Surveillance Engine

SSE – AF SSE – AF SSE – AF SSE – DF SSE – DF

Multi-Modal Event Database (IBM DB2)

IBM: MILS (Meta-Data Ingestion Web Services) --- IBM WebSphere App

IBM: MILS (Event Query Web Services) --- IBM WebSphere App

Event Search /

Query Application

Event Browsing

Application

Real Time Event Alert

Application

Event Statistics

Application

Situation Awareness

Application

Event Search /

Query Application

Event Browsing

Application

Real Time Event Alert

Application

Event Statistics

Application

Situation Awareness

Application

Behavior Analysis License Plate Reco Face Reco Badge Reader Radar Analytics

Analytics EnginesWith DLL plug-ins

XML Event Metadata

Tables for Event Indexing

SQL-like event search queries

IBM:MILS Middleware for Large Scale Surveillance

SSE: Smart Surveillance Engine

Architecture – Integrated Situation Awareness

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation31

Anatomy of an attack & technology mapping

Attack In ProgressAttack Planning Phase Post Incident

How does an attack happen?

“Bad guys” are approaching your facility or are already in it

The “bad guys” are watching your facility and probing your security and surveillance systems

Incident has occurred. The quest is now to find the perpetrators and their associates.

What are the bad guys doing?

MinutesWeeks to Months Too late to preventHow much time do we have to respond?

Real time alert capabilities

Data mining capabilities to detect reconnaissance

Search & Retrieval Capabilities

What technical capabilities are needed at these phases?

Attack In Progress

SSS, Most Comp.

Attack Planning Phase

SSS

Post Incident

SSS, some competition

Which phases are addressed by today’s technologies?

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation32

Typical IBM Smart Analytics SystemVideo Server

Video clips

Video streaming service

MILS Host meta data

WebsphereAS/MQDB2

SSEAnalyze Video Generate meta

dataEncode video

User client

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation33

.... and who can check all the data now ????

Parking Lot

Main Entrance

Entrance to level

Warehouse

Gate to parking lot

Box with goods has been stolen

LP– “When did suspect enter the building?”

LP– “Where has suspect parked his car?”

LP– “When did suspect arrive at parking lot?”

LP uses IBM Smart Analytics to identify suspect

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation34

Video Surveillance vs IBM Smart Analytics

Why is this car parked here?

IBM SSS -Watches video & logs activity

•Alert – car parked in loading zone > 5 mins

•Unusually low activity on access road

•Show all red cars on parking lot over the last month

We should change our security

strategy!

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation35

DigitalVideoSurveillance

DigitalVideoSurveillance

Digital Video Surveillance CEMAAS

© 2007 IBM Corporation

COFFEE BREAK


Recommended