Download presentation
Presentation is loading. Please wait.
Published byMyra Moke Modified over 10 years ago
1
www.axis.com Video analytics and security Philip Siow Senior Consultant South Asia Pacific
2
www.axis.com >T>The market is moving towards digital >F>From CCTV to IP/Digital Surveillance >F>From closed to open >F>From fixed to flexible and scalable >F>From security to secure intelligence >F>From surveillance to What is video surveillance today? The future is information! information
3
www.axis.com Recognition What is your surveillance need? DetectionIdentification 3 Pixels16 Pixels ? ? 80 Pixels ?
4
www.axis.com Resolution - Exposure - Shadows - Proportions Can you recognize this face ?
5
www.axis.com Fine Details 8 pixels64 pixels Know your application demands!
6
www.axis.com Demand for Automation & Analytics > Easy to install, configure and use Easy to manage, integrate and support A processor that meets the algorithm calculation
7
www.axis.com >The image chip is the core component in a network camera or video encoder –Axis ARTPEC is optimized for surveillance demands and usage –Surveillance industrys most advanced single-chip solution –Image processing power for superior image quality The core component in video surveillance products 7
8
www.axis.com Mpixel/sec 3x the performance (60 Mpixel/second)
9
www.axis.com License plate - 120m (394 ft) 35x optical zoom (15px)
10
www.axis.com Axis Camera Application Platform COMPATIBLE APPLICATION Axis network camera or video encoder AXIS Camera Application Platform COMPATIBLE APPLICATION Detection Counting Recognition Unique IP video product meeting specific end user needs!
11
www.axis.com >Tampering alarms >Tripwire or Cross Line detection >Loitering detection >Tailgating detection >Counter-flow detection >Left luggage detection >Crowd detection >Car pulled off the road >Car made illegal U-turn Examples of intelligent applications
12
www.axis.com Securing Your Network Video
13
www.axis.com Overview >How do we achieve security? –System Design –Secure the content –Secure the environment –Authenticate users and devices
14
www.axis.com Securing the content >Watermarking >Digital signature cryptography >Use to authenticate users
15
www.axis.com Encryption of data – SSL/TLS Encryption: Uses an algorithm or cipher to scramble data which makes it unreadable to everyone except the recipient >The most common way to secure content is using SSL/TLS encryption >This runs on top of TCP/IP >When HTTP is secured it is referred to as HTTPS >Commonly used in e-commerce applications, such as E-banking >Prevents eavesdropping, tampering, and message forgery from man-in-the-middle attacks
16
www.axis.com Camera - HTTPS and network video >Use HTTPS for management on public or semi-public networks >Below are the settings on the camera
17
www.axis.com Camera - WLAN/Camera configuration SSID (Name of the WLANs) (Master) or Ad-hoc Security: WEP, WPA/WPA2-PSK or WPA/WPA2-Enterprise
18
www.axis.com Environment - Virtual Private Network (VPN) >A virtual private network (VPN) uses an encryption protocol to provide a secure tunnel over unsecure networks, through which data can be safely transferred.
19
www.axis.com Failover recording >Temporary storing recordings on local SD card when network is disconnected >Using Local Storage API together with extensions to the RTSP API >Available for models supporting local storage
20
www.axis.com Thank you! network video innovation global HDTV partner network leader camera protect outdoor image usability leader safe thermal easy installation intelligent open integration ease of use competence megapixel environment worldwide H.264 focus Axis video encoder convergence Get the Axis picture. Stay one step ahead.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.