Upload
hoangcong
View
221
Download
0
Embed Size (px)
Citation preview
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation
Digital Video Surveillance
IBM Global Technology Services
Ing. Erik-Karl TupyIBM IMT CEMAASLeader Digital Video Surveillance
Dipl.Ing. Rainer EisenwagenIBM IMT CEMAASLeading Architect Digital Video Surveillance
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation2
IMT CEMAAS ….is the biggest business area of IBM in Europe
* direct business, all other countries via business partner
DOTTED: IMT CEMAAS
Central Eastern Europe(CEE)
Poland*Hungary*Czech Rep.*Slovakia*Russia*
TajikistanKyrgistanKazakhstanUzbekistanTurkmenistan
MontenegroAlbaniaMacedoniaMoldaviaUkraineBelarus
Slovenia*Croatia*Bulgaria*Romania*SerbiaBosnia
Egypt*Pakistan*Emirates, Saudi, Kuwait, OmanLebanon, JordanIrak,Iran,Afganistan
Middle East,Egypt and Pakistan
(MEEP)
Austria*Switzerland*
CEMAAS
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation3
Why is IBM in the market for Security Solutions?Convergence betweenSecurity- and Information-Technology
- Same Network (IP)
- Digital Events (DigitalVideo Surveillance)
Integration of SecurityTechnologie in existing IT Infrastructure
- Data Transfer
- Processes
- Back End
Security
System
Mobile
HR
User ManagementProvisioning
Data Management
BusinessIntelligence
IT-Plattform
GUI
Notification
Availability
Security
Networking
Maintenance
Integration
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation4
Function Analog DigitalPicture Taking Analog CCTV Camera Digital CCTV Camera *)Transfer Coaxial Cables IP NetworkVideo Switching Analog Video Switch Video serverVideo Multiplexing Analog Video Multiplexer Video serverRecording 24 Hour VCR Recorder Video serverPlayback Video Playback Recorder Video serverData Analysis Manual Video serverInformation Search Manual Video server
VCR RecorderMonitor
CoaxialCable
Video switch
Video Server
Monitor
EthernetCabling
EthernetSwitches
AnalogCameras
DigitalCameras Analog
Cameras *)
*) Remark: Analog cameras can be integrated by digitising the video stream.
Digital StoragePlayback Recorder
Comparison of analog and digital video technology
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation5
Increase Security Level
Less recognition
Surveillance Syndrome
More Cameras
More Monitors
Automatic Recognition
Informed Decission
Surveillance Syndrome
No additional employees…
Increase Security Level
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation6
The expert eye ......
Efficiency
20 min
Recognition Rate
Monitors: 2+
after 12 minutes: 45%
After 22 minutes: 5%
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation7
Automatic Analysis... of the motion of objects having regard to
- Size
- Position
- Time
- Direction
- Crossing of borders and barriers
- Motion / no motion
- Lanes
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation8
Forbidden Parking
Detection of Motion
Sequences
Face Recognition
People Counting
Plate Recognition
Abandoned Objects
DigitalVideo
Surveillance
Object Removal
Examples of use
Access Control
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation9
Access Control Digital Video Surveillance in combination with intelligent validation and/or verification systems close security gaps.
„Classic“ applications can be found in areas like:
- Doors
- Entrance Areas
- Gateways
- Lobbies and Foyers
- Holding Areas
- Zones with special access restrictions
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation10
Forbidden Parking
Detection of Motion
Sequences
Face Recognition
People Counting
Plate Recognition
Abandoned Objects
DigitalVideo
Surveillance
Object Removal
Examples of use
Access Control
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation11
Plate RecognitionLicense plates are stored in a database
The recognition system analyses the video data and reads license plates in realtime
The outcome of the analysis is compared with the database
Example of usage: Gates to parking lots can be opened automatically
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation12
Applications for Plate Recognition
Road Charges Access ControlFIR (Far-InfraRed) Classification of Vehicles
HighwaysParking Lots
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation13
Forbidden Parking
Detection of Motion
Sequences
Face Recognition
People Counting
Plate Recognition
Abandoned Objects
DigitalVideo
Surveillance
Object Removal
Examples of use
Access Control
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation14
Detection of Motion SequencesSecurity
Gathering
Loitering
Slip&Fall
Graffiti
Surveillance of endangered zones
Marketing
Definition of best points of sale
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation15
Forbidden Parking
Detection of Motion
Sequences
Face Recognition
People Counting
Plate Recognition
Abandoned Objects
DigitalVideo
Surveillance
Object Removal
Examples of use
Access Control
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation16
People Counting
Monitoring of events (maximum number of participants)
Utilisation of public transportation
‚Tail-Gating‘ prevention
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation17
Motion Sequences & People Counting
Office
200 sq. ft.
Office
1875 sq. ft.
Stairs Downto Building
PedestrianXing
Parking Spots
Parking Spots
Stairs toUpper
Parking Lot
Building
MainEntrance
Cameramounted on
roof ofbuilding
CameraCoverageArea
Road Road
Lamps
TypicalPedestrianPath
TypicalVehiclePath
Hawthorne1 Deployment Scenario for Camera #2
Arrival & Departure Distribution of people into Hawthorne 1
Paths of Large Objects over a 24 hour period
Tracks of all objects over 24 hours
0
10
20
30
40
50
60
70
80
1 4 7 10 13 16 19 22 25 28 31 34 37 40 43 46 49 52 55 58 61 64 67 70 73 76
Series1
Arrival Peak:
~ 8.30 am
Departure Peak: ~ 3.30 pm & 5.30pm
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation18
Forbidden Parking
Detection of Motion
Sequences
Face Recognition
People Counting
Plate Recognition
Abandoned Objects
DigitalVideo
Surveillance
Object Removal
Examples of use
Access Control
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation19
Abandoned ObjectsDetection of unattended luggage- Bombs
- Criminal activities
The intelligent detection system report critical situations directly to the guards. Further actions can be taken immediately.
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation20
Forbidden Parking
Detection of Motion
Sequences
Face Recognition
People Counting
Plate Recognition
Abandoned Objects
DigitalVideo
Surveillance
Object Removal
Examples of use
Access Control
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation21
Object RemovalArt Exhibitions
- Surveillance of pictures and sculptures in sensible historical buildings
Warehouses- Stock Control (also in combination
with RFID)
- Reasons for loss can be detected
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation22
Forbidden Parking
Detection of Motion
Sequences
Face Recognition
People Counting
Plate Recognition
Abandoned Objects
DigitalVideo
Surveillance
Object Removal
Examples of use
Access Control
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation23
Forbidden ParkingGateways
Access roads for Fire Brigade
Emergency Exits
along fences
Lot Control
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation24
Forbidden Parking
Detection of Motion
Sequences
Face Recognition
People Counting
Plate Recognition
Abandoned Objects
DigitalVideo
Surveillance
Object Removal
Examples of use
Access Control
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation25
Face RecognitionTwo dimensional (2D)– Search and recgonise
individuals
– in groups
– in rooms
– In open space
Three dimensional (3D)– Access Control
– at any kind of entrance
IDENTICAL
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation26
3D Face Recognition
Access Control– Error rate < 0,001%
– Recognition time < 1 sec
Open Interfaces– HR databases
– Time Attendance Systems
Implementations in existing infrastructure
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation27
Forbidden Parking
Detection of Motion
Sequences
Face Recognition
People Counting
Plate Recognition
Abandoned Objects
DigitalVideo
Surveillance
Object Removal
Examples of use
Access Control
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation29
IBM Smart Analytics Datastream
DB2 DATABASE
VIDEO CLIPS
Video
VIDEO ANALYSIS
VIDEO ENCODING
WEB SERVICE
DATA SERVER
WINDOWS 2003
STREAMING SERVER
META DATA
VIDEO CLIPSSSE
MILS Server
Video Server
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation30
SSE – AF SSE – AF SSE – AF SSE – DF SSE – DF
Multi-Modal Event Database (IBM DB2)
IBM: MILS (Meta-Data Ingestion Web Services) --- IBM WebSphere App
IBM: MILS (Event Query Web Services) --- IBM WebSphere App
Event Search /
Query Application
Event Browsing
Application
Real Time Event Alert
Application
Event Statistics
Application
Situation Awareness
Application
Behavior Analysis License Plate Reco Face Reco Badge Reader Radar Analytics
Analytics EnginesWith DLL plug-ins
XML Event Metadata
Tables for Event Indexing
SQL-like event search queries
IBM:MILS Middleware for Large Scale Surveillance
SSE: Smart Surveillance Engine
SSE – AF SSE – AF SSE – AF SSE – DF SSE – DF
Multi-Modal Event Database (IBM DB2)
IBM: MILS (Meta-Data Ingestion Web Services) --- IBM WebSphere App
IBM: MILS (Event Query Web Services) --- IBM WebSphere App
Event Search /
Query Application
Event Browsing
Application
Real Time Event Alert
Application
Event Statistics
Application
Situation Awareness
Application
Event Search /
Query Application
Event Browsing
Application
Real Time Event Alert
Application
Event Statistics
Application
Situation Awareness
Application
Behavior Analysis License Plate Reco Face Reco Badge Reader Radar Analytics
Analytics EnginesWith DLL plug-ins
XML Event Metadata
Tables for Event Indexing
SQL-like event search queries
IBM:MILS Middleware for Large Scale Surveillance
SSE: Smart Surveillance Engine
Architecture – Integrated Situation Awareness
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation31
Anatomy of an attack & technology mapping
Attack In ProgressAttack Planning Phase Post Incident
How does an attack happen?
“Bad guys” are approaching your facility or are already in it
The “bad guys” are watching your facility and probing your security and surveillance systems
Incident has occurred. The quest is now to find the perpetrators and their associates.
What are the bad guys doing?
MinutesWeeks to Months Too late to preventHow much time do we have to respond?
Real time alert capabilities
Data mining capabilities to detect reconnaissance
Search & Retrieval Capabilities
What technical capabilities are needed at these phases?
Attack In Progress
SSS, Most Comp.
Attack Planning Phase
SSS
Post Incident
SSS, some competition
Which phases are addressed by today’s technologies?
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation32
Typical IBM Smart Analytics SystemVideo Server
Video clips
Video streaming service
MILS Host meta data
WebsphereAS/MQDB2
SSEAnalyze Video Generate meta
dataEncode video
User client
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation33
.... and who can check all the data now ????
Parking Lot
Main Entrance
Entrance to level
Warehouse
Gate to parking lot
Box with goods has been stolen
LP– “When did suspect enter the building?”
LP– “Where has suspect parked his car?”
LP– “When did suspect arrive at parking lot?”
LP uses IBM Smart Analytics to identify suspect
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation34
Video Surveillance vs IBM Smart Analytics
Why is this car parked here?
IBM SSS -Watches video & logs activity
•Alert – car parked in loading zone > 5 mins
•Unusually low activity on access road
•Show all red cars on parking lot over the last month
We should change our security
strategy!
Digital Video Surveillance CEMAAS
© 2007 IBM Corporation35
DigitalVideoSurveillance
DigitalVideoSurveillance