Video Analytics for Perimeter Violation Examined

By: IPVM, Published on Dec 17, 2008

Provides metrics and analysis of deploying video analytics for perimeter violation - Editor's note

For the past 3 years, my organization, C3 Shared Services, has been deploying video analytics for many facilities with the highest level of risk in South Africa. This report shares 3 key lessons we have learned:

  • Our customers demand very low levels of false alerts
  • Significant differences in performance exist between different video analytic manufacturers
  • Optimizing the on-site setup is crucial to performance

Low Levels of False Alerts

For our customers, it is common that a fee is charged every time a responder is dispatched to follow up on an alarm. The money for these fees can add up very quickly.  In fact, one of customers used to joke how false alarms from previous systems doubled the responder's salaries.  Unfortunately, high level of false alarms are not acceptable by customers - both from a cost and organization basis.

Significant Differences Between Vendors

We have been participated in numerous tests with many vendors offering video analytics for perimeter violation. The poor results can be alarming. For instance, one test had harsh environment shadows from smoke stacks and pedestrian shadows cast through concrete palisade into detection zones. We had 3 analytic vendors tested with 2 cameras each for 1 week. The results:
  • 6,000 alarms
  • 16,000 alarms
  • 175 alarms
As you can imagine, the first two (generated by two of the most respected European manufacturers) were totally unacceptable.

We went with ioimage [link no longer available] and have been using them for many projects over the last 2 yeras.  We have deployed ioimage systems along extensive perimeters in adverse environments.

Across all of our deployments, the probability of detecting a true intruder is essentially 100%. This is actually tested by most of our customers every day and night.

False alarms have been low with the amount of false alerts depending on the environment. In our best performing environments, we rarely have more than 1 false alerts per camera per month. In our most demanding environments, with rain and reflecting light, we do not average more than 1 false alarm per camera per night.  In all cases, the operators find this manageable.

Optimizing On-Site Setup Crucial

On-site system optimization is crucial and consists of two major components: camera optimization and analytic configuration.

Camera optimization is the most important and significant part of our installations.  The cameras must provide clear images and a wide depth of field both day and night to allow for optimal alerting.

For perimeter violation, we place cameras on posts looking down the fenceline.  The distances between cameras depends whether it is a color/IR or thermal camera.
  • For color/IR infrared cameras, we place cameras every 60 meters. Our tests demonstrate that the cameras can reliably alert up to 70 meters. We provide 10 meters overlap of camera coverage to ensure that there are no deadspots and to detect anyone attempting to tamper a camera.
  • For thermal cameras, we place 75 mm thermal cameras every 400 meters. Our tests demonstrate that thermal camera can reliably alert up to 450 meters. We provide 50 meters overlap between each camera (because thermal cameras have a deadspot for the first 50 meters in front of the camera).
For all cameras, we position them 5 meters to 7.5 meters high. This height ensures depth perception.  Short heights make it more difficult to detect movement.

The positioning and the projection of light is important. We always seek to have lighting in front of the camera rather than behind. Specifically, we want to avoid aiming the camera directly into the rising or setting sun.  If we use artifical light (such as an IR illuminator), we want to ensure that the light is projected in parallel. If the light is projected too far downwards, the auto iris may reduce light entering the camera and therefore shrink the depth of the FOV.

We budget 3 or 4 hours for optimization of each camera, with tuning done during the day and a final tuning at night.

As part of this, we setup the analytics in the appliance's web-based setup.  The key element in the setup is to ensure that the depth perception is accurate because cameras provide 2 dimensional images of a 3 dimensional world.  A demonstration of this can be seen in the video below:


Finally, we make sure of monthly maintenace so that the lenses are clean and that the cameras are not moved. Dirty lenses or shifted cameras can both undermine performance so this is crucial.

All of our deployments have been done using analog cameras connected to intelligent encoders. Learn more about the details of a few of our projects.

Conclusion

While video analytics requires field expertise and care in selecting of manufacturers, we have had great success deploying video analytics.

Nick Grange is an Owner at C3 Shared Services.

1 report cite this report:

Camera Positioning Key to Video Analytics on Apr 13, 2009
A routinely overlooked but key aspect to using video analytics is camera...

Related Reports

Hikvision Acusense Analytics Tested on Sep 23, 2019
Hikvision touts "The Magic Behind It All" in their new Acusense line are...
Video Analytics 101 on Mar 16, 2020
This guide teaches the fundamentals of video surveillance...
Axis Suffers Outage, Provides Postmortem on Aug 15, 2019
This week, Axis suffered an outage impacting their website and cloud...
The Access Control Codes Guide: IBC, NFPA 72, 80 & 101 on Nov 07, 2019
For access, there is one basic maxim: Life safety above all else. But how do...
AHJ / Authority Having Jurisdiction Tutorial on Aug 06, 2020
One of the most powerful yet often underappreciated characters in all...
Axis Live Privacy Shield Analytics Tested on Jun 25, 2019
Privacy is becoming a bigger factor in video surveillance, driven both by...
Axis Perimeter Defender Improves, Yet Worse Than Dahua and Wyze on Sep 19, 2019
While Axis Perimeter Defender analytics improved from our 2018 testing, the...
Milestone XProtect 2019 R3 'Centralized Search' Tested on Oct 30, 2019
Milestone has had problems over the last few years releasing significant new...
Bottom: Integrators Start To Stand Vs Coronavirus on Apr 20, 2020
Good news - IPVM integrator statistics show that while coronavirus has hit...
Costar Technologies / Arecont H1 2020 Financials Examined on Sep 16, 2020
Costar's financial results have been hit by the coronavirus with the company...
U.S. Government Accountability Office Urges Facial Recognition Regulation on Aug 27, 2020
The US Government Accountability Office (GAO) is urging facial recognition...
Hazardous & Explosion Proof Access Control Tutorial on Feb 27, 2020
Controlling access to hazardous environments requires equipment meeting...
Anyvision Aims For 2022 Revenue of $1 Billion on Jul 17, 2019
Only 3 video surveillance manufacturers do a billion dollars or more in...
Pivot3 Mass Layoffs on Mar 27, 2020
Pivot3 has conducted mass layoffs, the culmination of grand hopes, a quarter...
Access Control Mustering Guide on Sep 30, 2019
In emergencies, determining where employees are located can be critical for...

Recent Reports

OnTech Smart Services Partners With Google and Amazon To Compete With Integrators on Sep 25, 2020
A pain point for many homeowners to use consumer security and surveillance is...
The Future of Metalens For Video Surveillance Cameras - MIT / UMass / Immervision on Sep 25, 2020
Panoramic cameras using 'fisheye' lens have become commonplace in video...
Hikvision Sues Over Brazilian Airport Loss on Sep 24, 2020
Hikvision was excluded from a Brazilian airport project because it is owned...
China General Chamber of Commerce Calls Out US Politics on Sep 24, 2020
While US-China relations are at an all-time low, optimism about relations...
Verkada Disruptive Embedded Live Help on Sep 24, 2020
Call up your integrator? Have someone come by the next day? Verkada is...
IP Networking Course Fall 2020 - Last Chance - Register Now on Sep 23, 2020
Today is the last chance to register for the only IP networking course...
Drain Wire For Access Control Reader Tutorial on Sep 23, 2020
An easy-to-miss cabling specification plays a key role in access control, yet...
Norway Council of Ethics Finds Hikvision Human Rights Abuses "Ongoing" on Sep 23, 2020
Hikvision's involvement in "serious human rights abuse" in Xinjiang is...
IPVM Camera Calculator User Manual / Guide on Sep 23, 2020
Learn how to use the IPVM Camera Calculator (updated for Version 3.1). The...
Installation Course Fall 2020 - Save $50 - Last Chance on Sep 22, 2020
This is a unique installation course in a market where little practical...
SimpliSafe Business Security Launched Examined on Sep 22, 2020
SimpliSafe has launched "SimpliSafe Business Security" that the company...
FLIR CEO: Many New Fever Entrants "Making Claims That The Science Just Won't Support" on Sep 22, 2020
FLIR's CEO joins a growing number calling out risks with fever / screening...
China Bems Temperature Measurement Terminal Tested on Sep 22, 2020
Guangzhou Bems (brand Benshi) is the manufacturer behind temperature...
Axis Exports To China Police Criticized By Amnesty International on Sep 21, 2020
Axis Communications and other EU surveillance providers are under fire from...
Milestone XProtect on AWS Tested on Sep 21, 2020
Milestone finally launched multiple cloud solutions in 2020, taking a...