Video Analytics for Perimeter Violation Examined

Author: IPVM, Published on Dec 17, 2008

Provides metrics and analysis of deploying video analytics for perimeter violation - Editor's note

For the past 3 years, my organization, C3 Shared Services, has been deploying video analytics for many facilities with the highest level of risk in South Africa. This report shares 3 key lessons we have learned:

  • Our customers demand very low levels of false alerts
  • Significant differences in performance exist between different video analytic manufacturers
  • Optimizing the on-site setup is crucial to performance

Low Levels of False Alerts

For our customers, it is common that a fee is charged every time a responder is dispatched to follow up on an alarm. The money for these fees can add up very quickly.  In fact, one of customers used to joke how false alarms from previous systems doubled the responder's salaries.  Unfortunately, high level of false alarms are not acceptable by customers - both from a cost and organization basis.

Significant Differences Between Vendors

We have been participated in numerous tests with many vendors offering video analytics for perimeter violation. The poor results can be alarming. For instance, one test had harsh environment shadows from smoke stacks and pedestrian shadows cast through concrete palisade into detection zones. We had 3 analytic vendors tested with 2 cameras each for 1 week. The results:
  • 6,000 alarms
  • 16,000 alarms
  • 175 alarms
As you can imagine, the first two (generated by two of the most respected European manufacturers) were totally unacceptable.

We went with ioimage and have been using them for many projects over the last 2 yeras.  We have deployed ioimage systems along extensive perimeters in adverse environments.

Across all of our deployments, the probability of detecting a true intruder is essentially 100%. This is actually tested by most of our customers every day and night.

False alarms have been low with the amount of false alerts depending on the environment. In our best performing environments, we rarely have more than 1 false alerts per camera per month. In our most demanding environments, with rain and reflecting light, we do not average more than 1 false alarm per camera per night.  In all cases, the operators find this manageable.

Optimizing On-Site Setup Crucial

On-site system optimization is crucial and consists of two major components: camera optimization and analytic configuration.

Camera optimization is the most important and significant part of our installations.  The cameras must provide clear images and a wide depth of field both day and night to allow for optimal alerting.

For perimeter violation, we place cameras on posts looking down the fenceline.  The distances between cameras depends whether it is a color/IR or thermal camera.
  • For color/IR infrared cameras, we place cameras every 60 meters. Our tests demonstrate that the cameras can reliably alert up to 70 meters. We provide 10 meters overlap of camera coverage to ensure that there are no deadspots and to detect anyone attempting to tamper a camera.
  • For thermal cameras, we place 75 mm thermal cameras every 400 meters. Our tests demonstrate that thermal camera can reliably alert up to 450 meters. We provide 50 meters overlap between each camera (because thermal cameras have a deadspot for the first 50 meters in front of the camera).
For all cameras, we position them 5 meters to 7.5 meters high. This height ensures depth perception.  Short heights make it more difficult to detect movement.

The positioning and the projection of light is important. We always seek to have lighting in front of the camera rather than behind. Specifically, we want to avoid aiming the camera directly into the rising or setting sun.  If we use artifical light (such as an IR illuminator), we want to ensure that the light is projected in parallel. If the light is projected too far downwards, the auto iris may reduce light entering the camera and therefore shrink the depth of the FOV.

We budget 3 or 4 hours for optimization of each camera, with tuning done during the day and a final tuning at night.

As part of this, we setup the analytics in the appliance's web-based setup.  The key element in the setup is to ensure that the depth perception is accurate because cameras provide 2 dimensional images of a 3 dimensional world.  A demonstration of this can be seen in the video below:


Finally, we make sure of monthly maintenace so that the lenses are clean and that the cameras are not moved. Dirty lenses or shifted cameras can both undermine performance so this is crucial.

All of our deployments have been done using analog cameras connected to intelligent encoders. Learn more about the details of a few of our projects.

Conclusion

While video analytics requires field expertise and care in selecting of manufacturers, we have had great success deploying video analytics.

Nick Grange is an Owner at C3 Shared Services.

1 report cite this report:

Camera Positioning Key to Video Analytics on Apr 13, 2009
A routinely overlooked but key aspect to using video analytics is camera positioning. Not simply an implementation issue, camera positioning...

Related Reports

Avigilon Favorability Results 2019 on Jan 15, 2019
Since IPVM's 2017 Avigilon favorability results, the company was acquired by Motorola and has shifted from being an aggressive startup to a more...
Gorilla Technology AI Provider, Raises $15 Million, Profiled on Jan 15, 2019
Gorilla Technology is a Taiwanese video analytics manufacturer that recently announced a $15 million investment from SBI Group, saying this...
Worst Products Tested In Past Year on Jan 09, 2019
IPVM has done over 100 tests in the past year. But which products performed the worst? Which ones should users be most aware of? In this report,...
Managed Video Services UL 827B Examined on Jan 09, 2019
Historically, UL listings for central stations have been important, with UL 827 having widespread support. However, few central stations have...
2019 Video Surveillance Cameras Overview on Jan 07, 2019
Each year, IPVM summarizes the main advances and changes for video surveillance cameras, based on our industry-leading testing and...
IPVM Best New Products 2019 Opened - 70+ Entrants on Jan 07, 2019
The inaugural IPVM Best New Product Awards has been opened - the industry's first and only program where the awards are not pay-to-play and the...
Axis Tailgate Detection Tested on Jan 04, 2019
Axis is aiming to tackle tailgating, one of access control's biggest issues, with the Tailgating Detector ACAP application. This camera app claims...
Camera Course January 2019 on Jan 03, 2019
This is the only independent surveillance camera course, based on in-depth product and technology testing. Lots of manufacturer training exists...
The Battle For The VSaaS Market Begins 2019 - Alarm.com, Arcules, Eagle Eye, OpenEye, Qumulex, Verkada, More on Jan 02, 2019
2019 will be the year that VSaaS finally becomes a real factor for professional video surveillance. While Video Surveillance as a Service (VSaaS)...
ASCMA / Moni Problems Deepen, Lenders Terminate Support Agreement on Dec 28, 2018
Ascent Capital Group, aka ASCMA, currently branded Brinks Home Security, formerly known as Moni and Monitronics faces a troubling end to a rocky...

Most Recent Industry Reports

Access Control Records Maintenance Guide on Jan 16, 2019
Weeding out old entries, turning off unused credentials, and updating who carries which credentials is as important as to maintaining security as...
UK Fines Security Firms For Illegal Direct Marketing on Jan 16, 2019
Two UK security firms have paid over $200,000 in fines for illegally making hundreds of thousands of calls to people registered on a government...
Access Control Cabling Tutorial on Jan 15, 2019
Access Control is only as reliable as its cables. While this aspect lacks the sexiness of other components, it remains a vital part of every...
Avigilon Favorability Results 2019 on Jan 15, 2019
Since IPVM's 2017 Avigilon favorability results, the company was acquired by Motorola and has shifted from being an aggressive startup to a more...
Gorilla Technology AI Provider, Raises $15 Million, Profiled on Jan 15, 2019
Gorilla Technology is a Taiwanese video analytics manufacturer that recently announced a $15 million investment from SBI Group, saying this...
2019 IP Networking Book Released on Jan 14, 2019
The new IP Networking Book 2019 is a 285 page in-depth guide that teaches you how IT and telecom technologies impact modern security...
Arecont Costar Layoffs on Jan 14, 2019
Arecont Vision, a Costar Company, has laid off more than 10% of their workforce in a move the company described to IPVM as a result of "important...
The False SCMP Story on Hikvision NYC AI on Jan 14, 2019
In the past week, one of Asia's largest publications, the South China Morning Post (SCMP), posted an article about "Chinese [facial recognition]...
WDR Tutorial on Jan 11, 2019
Understanding wide dynamic range (WDR) is critical to capturing high quality images in demanding conditions. However, with no real standards, any...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact