1 / 17

Science Fiction Security

Science Fiction Security. Dr Alan J. Lipton CTO ajl@ObjectVideo.com June 2003. Who’s Watching Video?. Too much data to be monitored manually. Humans cannot effectively watch surveillance video After 20 minutes, human attention degenerates to an unacceptable level.

jadyn
Download Presentation

Science Fiction Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Science Fiction Security Dr Alan J. Lipton CTO ajl@ObjectVideo.com June 2003

  2. Who’s Watching Video? Too much data to be monitored manually • Humans cannot effectively watch surveillance video • After 20 minutes, human attention degenerates to an unacceptable level “…such a task, even when assigned to a person who is dedicated and well-intentioned, will not support an effective security system.” NIJ Research Report / Sandia National Laboratories

  3. Computer Vision • Teaching machines to understand what they see… • Tough problem • But, recent advances in technology… • Such as the DARPA-sponsored VSAM program (http://www.cs.cmu.edu/~vsam) • And advances in computer power… • And increasing integration in security and surveillance infrastructure… • Intelligent Video is a critical enabling technology for truly scalable, enterprise-wide, security and surveillance

  4. PERIMETER WARNING LOITERING WARNING PERIMETER ALERT VEW – Event Detection RULE #1 – Perimeter Warning“Detect when <human or vehicle> <crosses> <warning perimeter> <in any direction> Respond with a <log entry> and a <tripwire warning sound> and a <alert snapshot>” RULE #2 – Loitering Warning“Detect when <human or vehicle> <enters or loiters in> <embankment area> <where loiter time is 2 minutes> Respond with a <log entry> and a <area warning sound> and a <alert snapshot>“ RULE #3 – Severe Perimeter Alert“Detect when <human or vehicle> <crosses> <alert perimeter> <from right to left> Respond with a <log entry> and a <tripwire alert sound> and a <alert snapshot> and a <e-mail to the security director> and a <PDA message to the security patrol> and […]” Alerts include all necessary information - when the event occurred, where the event occurred, what rule was violated, and which object and type of object violated the rule

  5. ! ? !! !! !!! ? ! !!! Some Applications of VEW • Detect & Alert on Multiple Zones • Detect People & Vehicles CrossingVirtual Perimeters • Detect People & Vehicles Parkingor Loitering PERIMETERMONITORING INTRUSIONDETECTION “LEFT BAG” /FOD ASSET PROTECTION • Detect People Climbing Fence • Detect People Inside Fence • Detect Objects Thrown Over Fence • Detect Theft of Valuable Assets COUNTER-SURVEILLANCE

  6. Some More Applications of VEW Monitoring Activity at “Edges” of Structure (e.g., jumpers) Monitor Activity Under and On Actual Structure Monitor Activity Under and On Actual Structure Alert on Anything Near or On Pilings and Exposed Structural Supports Monitoring Water Traffic Under and Around Critical Areas or Structures Watch for Divers and Boats Loitering or Anchoring Around Critical Areas

  7. In the Real World Perimeter Incursion Detection

  8. More in the Real World Left Object Theft

  9. Even More in the Real World Wrong-Way Traffic Flow Detection

  10. Coming Down the Pike Australian: therefore suspicious!! Bio-Metrics of non-cooperative subjects – by Face or Gait

  11. Access Control Systems Intuitive User Interface Intuitive Alert Reporting HID Normalcy Modeling Sensor Fusion Data Base Interface Video Under- standing Other Sensors Hardware Infra- structure Enabling Technology BlockPile Next 12-24 Months Where We are Today

  12. Example – US Customs Northern Border Protection Canada Canada USA USA Canada USA VEW Detecting human and vehicle activities by day or night

  13. Example: An Oil Refinery 500 Feet • Protection for 5 mile perimeter • Perimeter testing using customer-chosen camera. • Usability testing with actual security personnel. • Day and night scenarios. BP Camera

  14. Example: Logan Airport • Complete airfield perimeter protection – 8 miles. • Day and night protection required. • Additional protection in critical zones and for weather. • Massport and Massachusetts State Police Marine Division participating in testing.

  15. Daylight Cameras w/ Floodlights INTEGRATED ACCESS CONTROL Example: Hackensack Bridge • Commuter rail bridge monitoring. • Rail yard train car protection. • System to cover ~600 cameras.

  16. Conclusion • Current approach to security is not scalable • More people, more cameras, more confusion • Automation is key • Intelligent Video is a solution for automating intuitive video surveillance tasks • Buy our product 

More Related