SmartCatch Systems Putting Intelligence into Surveillance

Slides:



Advertisements
Similar presentations
/0403 Copyright ©2004 Business and Legal Reports, Inc. BLRs Safety Training Presentations Transportation Security TrainingPart II 49 CFR
Advertisements

Video Image Analysis. 2 TELESTE Video Networks 2 Video Image Analysis (VIA) Applications ITS / Tunnels, intersections and motorways / Railway and metro.
How Pixims Digital Pixel System® Technology Helps Mitigate Airport Security Threats July 2008.
Airport Security – Post 9/11
Johan de Clerk 14 June 2012 Smart Cities from a Civil Security Perspective.
VSE Corporation Proprietary Information
1 VMD – Video motion Detection Global Security. 2 Why intelligent Video? Who’s watching all these monitors ??? It’s Impossible!!!!
“Why do we need Security”  Each business has unique security and safety needs, e.g. Inventory Shrinkage and Theft Personal Safety Break Ins Moving Your.
XProtect® Expert 2013 Product presentation
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
LOSS PREVENTION SOLUTIONS USING VIDEO ANALYTICS reduce shrinkage, protect profits A Bikal Distribution GKB Ltd Company © All Rights Reserved.
AXIS Camera Recorder. Value Proposition  AXIS Camera Recorder Offers all core video recording and monitoring functionality at an attractive price level.
Base Protection Lab (BPL) December 12, 2007 ONR Program Officer: William “Kip” Krebs, , Alternate POC: Annetta Burger.
Microsoft Technology Associate
Axis Intelligent Video Intelligence where you need it.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
DUE Security and Fire Alarm Systems LEARNING OUTCOME 7B Describe design overview and location considerations.
Video management and analytics intelligent security systems intl 1 Videoo Management & ANALYTICS.
- TECHLEAD SOFTWARE ENGINEERING PVT. LTD. Video Analytics.
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
Chapter 7 Database Auditing Models
EC4019PA Intrusion & Access Control Technology (IACT) Chapter 4- CAMS Prepared by Sandy Tay.
Physical Security SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States.
The Impact of Physical Security on Network Security
Module 02: 1 Introduction to Computer Security and Information Assurance Objectives Recognize that physical security and cyber security are related Recognize.
Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.
BUSINESS B1 Information Security.
1 Security Integration and Esgraf sales presentation 01/2015.
IP-based Integrated Security Solutions for Airport Operations and Security AirporTech Asia 2008 Danny Peleg.
I A I Infrared Security System and Method US Patent 7,738,008 June How Does It Work? June 2010 I A I = Infrared Applications Inc.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
IS3220 Information Technology Infrastructure Security
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Access Control Jeff Wicklund Computer Security Fall 2013.
ACTi IVS Server 2 (Intelligent Video Surveillance) Connecting Vision.
Science Fiction Security Dr Alan J. Lipton CTO June 2003.
Ing. Fernando Clavero Febrero Ing. Fernando Clavero Febrero 2012.
Physical Security Ch9 Part I Security Methods and Practice CET4884 Principles of Information Security, Fourth Edition.
Vehicle Management System Adopted successfully with I.D., wireless Vehicle Management Systems (VMS) for Parking, Residential Societies.
Flame & Smoke Detection System Flame & Smoke Vision Detection is an intelligent vision-based analytics system which can timely detect suspicious fire or.
Dual Benefits from Applications of Innovative Transportation Security Technologies Mike Dinning U.S. Department of Transportation Volpe National Transportation.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Some Great Open Source Intrusion Detection Systems (IDSs)
Criminal Justice Intro to Security, Instructor Name Date, Semester Chapter 4: PHYSICAL SECURITY: STRUCTURAL, ELECTRONIC, AND HUMAN PROTECTION SYSTEMS.
Unit 1: Protecting the Facility (Virtual Machines)
Module 5: Designing Physical Security for Network Resources
Engineered Security Systems, Inc. Access Control Systems CCTV Systems Asset Protection Systems Fire Alarm Systems Laptop Protection Systems Burglar Alarm.
Onsite CRM Security
Nexbase Invites You To Our Special Products
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Airport Security Market in India to hit $23bn by 2024.
Data Mining for Surveillance Applications Suspicious Event Detection
Physical Security Governance Model
Add video notes to lecture
Matrix Video Surveillance Solution for Banking
Intelligent Video Surveillance – The End of CCTV
Huawei Digital Pipeline Solution
LAND RECORDS INFORMATION SYSTEMS DIVISION
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
A Forest of Sensors: Tracking
Wavestore Integrates…
Data Mining for Surveillance Applications Suspicious Event Detection
Objectives Telecommunications and Network Physical and Personnel
ACTi ALPR - Automatic License Plate Recognition
Audio Analytics & Content Management (VCMS)
Welcome Rakshak Group of Companies Rakshak Security Services & Systems Pvt. Ltd. Pilot Project for Security Training Centre.
Physical Security.
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Data Mining for Surveillance Applications Suspicious Event Detection
Presentation transcript:

SmartCatch Systems Putting Intelligence into Surveillance 19th Annual NDIA Security Technology Symposium June 16-19, 2003 Brooks McChesney Entrepreneur-in-Residence NEC USA Inc brooks@ccrl.sj.nec.com (408-863-6017)

Smart Surveillance: Features & Benefits Video intelligence software that detects, identifies and tracks objects within existing CCTV systems Monitors events in real time to insure activities are limited to specific tasks & within authorized areas of authority Automatically detects suspicious behaviors and other violations of established security policies and procedures Distinguishes between objects: person(s), bag(s), vehicles, etc. Sounds alerts & alarms according to user escalation procedures Supports incident analysis and forensic search (in real time or via preserved archives) Maintains confidentiality through restricted user and role based access

The New Face of Physical Security New Focus Reduce people cost with smart technology Integrate systems with advanced surveillance technology Prevent actions of those who pose a threat while facilitating actions of the honest majority Elevate operational effectiveness & efficiency Deploy human-centric framework that can associate actions with identity, behavior and credentials Then Reliance upon semi-skilled guards with 90-100% turnover and whose costs exceeds that of products & systems A highly fragmented, unstable industry Products typically passive, standalone sensors Thinking in terms of borders, fences & doors

Human Costs of Security Total Security Market Guard Cost (staff one post, 24/7 at one facility) In-House Guard $11B Contract Guard $11B Products & Systems $19B Source : JP Freeman, GE, Security magazine, OnGuard.Net

Typical Airport Model Perimeter Defense Zone Command Center Perimeter

Airport Examples Unattended baggage PanAm Lockerbie disaster: Heathrow Airport Unidentified person walks around the security gate Denver Airport, August 2002 Unidentified person in unauthorized AOA Detroit Metro Airport , May 2002 Piggybacking/Tailgating at secure access points Failure to recognize unattended vehicles Louisville Intl. Airport, Sept 2001 Unidentified person gains access to the runway and stows away Logan International Airport, Sept 1999 Unidentified person disappears in the parking lot Suspicious movement against normal traffic patterns

Application areas Perimeter Monitoring Security Checkpoint Monitoring

System Overview SmartCatch Vision Central Matrix Switch Biometrics Live Camera Feeds ALERTS RULES Card Reader signal Card Reader Biometrics Door Alarm Card Reader Database Biometrics Database Door Alarm Database

Detect abnormal behaviors: SFO requirements Detect tailgating: more than one person enters the door with one card swipe. Detect piggybacking: one person swipes the card and another person enters the door. Detect abnormal behaviors: Person swiping the card many times. Person loitering in front of the door.

Output from SFO ALARM ALARM ALARM ALARM

SFO Airport Results

SmartCatch Algorithms Background modeling Card reader Palm reader Object detection Motion detection Object tracking Event detection

SmartCatch Differentiators Limitations of the current systems Difficulties of human tracking: non-rigid motion, changing image size, occlusion and intersections Unable to handle changing shape in relation to camera angle Generates very high false alerts Cannot handle cluttered environment with multiple objects SmartCatch Approach Neural Network that handles both humans and non-humans in cluttered envionrments Tight Integration of Object detection & tracking resulting in very high system accuracy Robust object classification engine Background modeling that automatically adjusts to changing lighting conditions Real-time processing speed

SmartCatch: Benefits Provides a quantifiable increase in security Increases public/employee confidence Provides 24x7 protection without delays or inconvenience to customers or employees Reduces risks of liability Increases operational efficiency