You are at : Search > Articles Search Results

Articles Search Results

168 Articles and 23 related Products found for facial recognition

Morpho joins FIDO Alliance to revolutionize online authentication

Morpho joins FIDO Alliance to revolutionize online authentication

Editor / Provider: Morpho (Safran) | Updated: 4/15/2014 | Article type: Security 50

Morpho (Safran) has recently joined the FIDO (Fast IDentity Online) Alliance, an industry consortium delivering standards for simpler, stronger authentication during online transactions.

“As a leader in secure identity management, we are delighted to join the digital industry's most innovative players in revolutionizing online authentication.”

Members of the alliance commit to sharing technology and collaborating on the development of open specifications that enable FIDO-compliant authentication methods to be interoperable, more secure, private and easy to use. FIDO addresses the need to develop a viable alternative to passwords.

To create a secure online ecosystem, FIDO specifications support a wide range of authentication technologies, platforms and mobile devices. By joining the FIDO alliance, Morpho will bring its expertise in authentication technologies such as biometrics (fingerprint, iris and facial recognition), Near Field Communication, Trusted Platform Modules (TPM) and secure elements (SIM cards, smart cards, USB tokens), as well as in innovative mobile devices and secure e-service platforms.

As a member, Morpho will offer FIDO-compliant products enabling banks, online service providers and mobile network operators to provide more convenient and secure access to online services.

“Morpho will contribute to FIDO's vision of more secure and convenient online authentication for a broad range of identity and payment applications. We are delighted to welcome Morpho as a Sponsor member and look forward to drawing upon their expertise in biometrics and protecting identity data,” said Michael Barrett, president of the FIDO Alliance.

“As a leader in secure identity management, we are delighted to join the digital industry's most innovative players in revolutionizing online authentication,” stated Thomas Chenevier, Senior Vice President, Products and Innovation at Morpho. “Joining the FIDO Alliance is a natural move for Morpho at a time when we are expanding our e-service offering.”

IP based video surveillance enjoys high market penetration in Middle East

IP based video surveillance enjoys high market penetration in Middle East

Editor / Provider: Jill Lai, a&s International | Updated: 4/15/2014 | Article type: Hot Topics

The video surveillance market is greatly influenced by government rules. HD and megapixel has become standard for video surveillance cameras and 180-day video storage is required for almost all market sectors. The Ministry of the Interior (MOI) also updates the rules every year. The government regulations usually include where the security cameras must be placed, several details about its specifications, and also, how to make sure they are able to produce good quality video. "In the Gulf Cooperation Council (GCC) countries, it is important to make sure that your IP-based video surveillance system meets all legislation and governmental standards, which should be the key elements of business here," said Peter Biltsted, Director of MEA at Milestone Systems. According to an industry expert, some IP-based video systems might have the problem of losing images, which would cause the end users and systems integrators to get fined afterwards. Therefore, high reliability of IP-based video surveillance systems is required for this region.

HIGH ADOPTION OF IP-BASED VIDEO SURVEILLANCE
Due to regulations from the government, the trend of full IP-based video surveillance starts from the U.A.E. such as Dubai, Abu Dhabi, Qatar, and then spreads the rest of the Gulf countries. The IP-based video surveillance trend also leads to high adoption of some innovations in this region, such as multi-megapixel, low-lux, and intelligent video analytics.

In the Middle East, people usually want the best technologies. For surveillance, the standard would be around 2 to 3 megapixels with WDR, because of the strong sunlight. ANPR and facial recognition are also usually required for infrastructure projects.

In large facilities, such as stadiums, hotels, campuses, and city surveillance projects, end users look for a more cost-effective way to have better coverage over a large area. “Multi-megapixel cameras are proving their worth here. Using multi-megapixel (1,080p for example) cameras, end users receive a minimum resolution more than seven times better than standard definition (VGA) or analog cameras. Megapixel cameras provide detailed information for capturing license plates and faces, said Scott Schafer, Executive VP Sales, Marketing and Service at Arecont Vision. “We have examples of customers that use 75 cameras to cover an area that would have required about 2,000 analog or standard definition VGA cameras delivering 40 pixel-per-foot resolution, which is enough to identify faces in a crowd. In campus settings, we have used eight multi-megapixel panoramic cameras to replace 24 standard definition cameras and the new system delivered superior resolution at a lower price.”

Intelligent Video Adoption
The local requirement of up to 180-day storage for HD megapixel video in some cases drives the need for more intelligent management of data, especially in large-scale projects such as infrastructure. "To provide an efficient forensic search after events take place, and also meet the challenges of managing so many cameras and data in a large environment, there is a need for intelligent video. And since people here are quite open to new technologies, they are starting to use intelligent video analytics (IVA) for marketing and management purposes," said Hakan 畤yi?it, Regional Director of Middle East at Bosch Security Systems.

Intelligent video is commonly used for high-end retailers and some large retailers deploying 160 to 200 cameras for people counting and heat maps. "In some five-star hotels, it has become common to have people-counting features to see who gets inside of the hotel building, 360 fish-eye camera at main areas like lobby/restaurant, heat mapping to analyze customers flow, and missing-object analysis for the retail stores inside. Some hotels provide the live-streaming video online for marketing.

Samsung also provides such solutions for retail/commercial markets controlled by Samsung security management platform," said Ali Boussi, Regional Sales Manager at BASS/Samsung Techwin. Due to the demand for intelligent video in this region, “Kedacom launched its latest NVRs, with the latest video analytic technology to do smart searching and quick location of the event as soon as the alarm is triggered. Besides, Kadacom also has a complete solution of centralized chain-store management and HD video surveillance solutions for courts,” said Zhiqiang Liu, Marketing Director, Kedacom Technology.

IP for SMB
The small-to-medium business (SMB) sector is also adopting IP technologies, starting from the U.A.E. “I would say in the MEA market, especially in GCC countries, there is very high percentage of SMB market using IP. Even small retail shops — usually requiring six to eight cameras — still need to meet government requirements for megapixel resolution. The analog system can't reach that standard.

All the shops need to be approved by the government. If they are not satisfied with the evidence, they will ask you to shut down the shops or replace the system entirely. That's why convergence comes there. I would say, in the next two to three years, GCC countries will not allow video that does not supply a certain level of video quality,” said Biltsted.

“Even for small customers here, they want integration. They usually want access control to be integrated too. If they have 25 cameras in place, they also want a perimeter solution to be integrated with their systems," said Biltsted.

"What I also found in this region is people have more awareness about security and they use surveillance for more than just for security. They will use the surveillance video to check if the store is clean. So, customers would choose cameras with a corridor view. We also bundle it with our software," he continued.

COMPETITIVE IP-BASED VIDEO SURVEILLANCE MARKET
 IP-based video surveillance technologies have penetrated to different market sectors here. Intelligent video is commonly used in a five-star hotel and even the small shops want an integrated system for video surveillance and access control. The Middle East has become a competitive market for IP-based video surveillance technologies. To satisfy end users' desires for new technologies, more and more integrated solutions will be introduced to the market for different applications.

Morpho IAD: The power behind the iris

Morpho IAD: The power behind the iris

Editor / Provider: Morpho(Safran) | Updated: 3/12/2014 | Article type: Security 50

Although less well known, Iris recognition is a biometric technique as effective as fingerprints. The launch of the IAD (Iris At a Distance) solution, which can identify a person at a range of more than one meter in less than a second, gives Morpho a great start in this market.

A fully developed biometric
Morpho has been working on iris recognition for a number of years, and has contributed to creating the 2 iris databases: those used by the Abu Dhabi Police and the Aadhaar project in India. The 2 most recent NIST evaluations awarded number one ranking to the Morpho iris identification algorithm. This expertise has encouraged Morpho to develop its IAD solution. The product was launched in October 2013 at the Gitex tradeshow in Dubai.

Technological prowess
Previously, 2 types of sensor shared the market. ‘Twin' or proximity sensors that must be within 60 cm of the person scanned, and cameras that operate at a minimum distance of 2 meters. Morpho's IAD scans both irises and the face at a distance of between 0.8 and 1.2 meters in barely 1 second, compared with the 4-7 seconds required by the most powerful solutions prior to its launch. The IAD system has dedicated cameras for facial image acquisition. The aim of this arrangement is to record a real-time image of a person and his/her position in space. These data allow the iris image acquisition system to calculate the ideal moment to capture the image, enabling the entire operation to be completed within a second. As an upscale scanning system, IAD is intended primarily for very high traffic areas. It is very simple and convenient to use, because the only thing the user needs to do is to look at the sensor screen for a second. The addition of facial recognition, for which very large databases already exist, is an additional benefit.

Excellent sales prospects
Designed primarily for the border control market, IAD could easily be integrated into an e-gate or installed in a security checkpoint desk. The system could also be deployed in airports to limit access to particular zones by passenger profile (final destination or transfer). Lastly, pharmaceutical companies and hospitals are interested in this solution to simplify access control procedures for staff working in gloves and masks.

“IAD is designed to detect two types of fraud: the use of a contact lens to copy the iris pattern of another person, and the use of a product to dilate the pupil of the iris, making identification impossible.” Laurent Lambert, product manager, Morpho.

“Many of the Gulf States already have an iris biometrics database, which is the essential precondition for using the IAD solution to maximum advantage. This exceptionally precise technology is highly thought of here.” Georges Moukarzel, Business Development Director middle east at Morpho

Paul Smith retail stores upgrade to Milestone IP Video solution

Paul Smith retail stores upgrade to Milestone IP Video solution

Editor / Provider: Milestone System | Updated: 2/26/2014 | Article type: Commercial Markets

Milestone XProtect Corporate open platform IP video management software (VMS) with XProtect Smart Client and network cameras from Axis Communications are being deployed across all of Paul Smith's 45 stores as part of the UK-based retailer's first comprehensive, company-wide IT refresh. Initially the new digital video system is being used for loss prevention but once it is fully implemented worldwide by the end of 2015, Paul Smith plans to use it for business intelligence to assist retail operations management.

Paul Smith is an early adopter of IP and cloud-based services. In 2001 it was the first large UK-based company to migrate to IP telephony, installing a Cisco IPT network. Embracing the latest IT management approaches (including use of open-architected and Microsoft-based systems), the company has been able to maintain a relatively small network services team despite very rapid growth. Paul Smith has a retail presence in 35 countries.

This approach means that when new IT challenges present themselves, Paul Smith's Head of IT, Lee Bingham, looks for standards-based solutions that are capable of scaling quickly and effectively. He specifies that new systems and services must last a minimum of 10 years because he simply does not have the manpower or budget to support continual replacements of devices and software.

Paul Smith's legacy CCTV had grown organically as the group expanded around the world. When the IT department was asked to take over running Paul Smith's video systems, Lee Bingham insisted that it must be moved to IP video and be visible on the corporate network: "If it's not IP then it's not IT, and therefore it made no sense to move it from our Facilities Management team over to the IT department unless the CCTV system was going to be accessible on the network by authorized managers from their desktops."

The company backed the IT department's three-year global migration plan from CCTV-to-IP video surveillance. The installation and networking of the new video platform is being carried out as part of a global IT infrastructure upgrade, along with new retail Point of Sale (POS) and Enterprise Resource Planning (ERP) systems.

Paul Smith's IT department researched the market for robust, scalable IP video hardware and software. After a painstaking evaluation process, they chose Milestone XProtect Corporate video management software and Axis network cameras. Axis video encoders were selected to bring some existing analog CCTV cameras onto the corporate network ahead of the full IT and IP video upgrade.

Lee Bingham said: "The fact that Milestone XProtect is built on an open platform architecture using Microsoft Active Directory makes rapid roll out possible, as well as cost-effective maintenance and support. Selecting Milestone enables us to migrate the whole CCTV estate onto a single platform to establish uniformity and consistency."

"Milestone fits our model perfectly. The open platform allows us to scale and add new services. We can control which managers can see cameras from which stores through our standard IT technologies. We can log in via the Milestone XProtect Smart Client front-end to view live and recorded video from all the cameras anywhere in the world. If there is a problem, we can generally fix it via the network from Nottingham without getting on a plane. This saves management time and reduces our company's carbon footprint.

In the future Bingham expects different managers in specialist areas like Visual Merchandising will want to proactively access the cameras to assess whether agreed store layouts are being observed and working well for customers. There will also be a higher demand for mobile device access to the video which Milestone Mobile can provide.

"Our objective, as the Milestone-based video systems have been rolled out globally, will be to build on this investment by extending its value beyond loss prevention," concludes Bingham. "We plan to work closely with our retail management team to explore the power of the new IP video system - potentially deploying techniques such as facial recognition, heat mapping and dwell-time analytics that enable us to better understand and serve our customers."

Security in higher education faces unique challenges

Security in higher education faces unique challenges

Editor / Provider: Eifeh Strom | Updated: 2/17/2014 | Article type: Hot Topics

Unlike K-12 campuses that are closed to the public, college and university campuses are open and spread out, often integrated into the local community. Because of this, perimeter detection is not plausible. “Colleges and universities present unique security challenges. You feel like you're protecting a small city, large corporation, research center, and creative think tank all at the same time,” said Harm Radstaak, MD of EMEA at HID Global. “In this environment, security means controlling physical access to buildings and events, plus logical access to computer networks and sensitive academic information. At the same time, operational costs must be kept under control while serving the diverse needs of a campus community.”

As an US consulting firm specializing in campus safety, security, and regulatory compliance for the education sector, Dan Pascale, CPP, Senior Director of Security & Emergency Services at Margolis Healy & Associates also pointed out the differing needs of colleges and universities based on location, particularly the difference between urban and rural campuses, in addition to the unique security challenges posed by colleges and universities. With tighter access control, tighter controls over visitor management, and more cooperation with local first responders, urban campuses need to address the more inherent dangers of urban surroundings. On the other hand, rural campuses feel safer and more secluded. As a result, rural campuses often do not feel the need to fortify with extra security measures. Additionally, unlike urban campuses, emergency response and security officials are more likely to all come from the university itself due to their more independent campus environment.

Clearer Surveillance, Higher Security
The “2012 Living on Campus: Special Report on College Housing,” by CP&M published in June 2012 found that that 82 % of college residence halls in the U.S. already have external video surveillance cameras in place, while 72 % also have internal surveillance. Now, with features like WDR becoming basic requirements for areas such as building entrances and parking garages, other features like megapixel cameras, panoramic cameras, and video analytics are gaining popularity as prices become more affordable. With advanced network infrastructures, university campuses lend themselves to network surveillance systems. As such, IP-based systems have been implemented in universities worldwide.

Megapixel cameras provide clearer images, providing better security. Finding an appropriate video management system/software (VMS) and using video analytics to accompany recordings can further improve campus security by providing live monitoring, incident review, etc. “Universities in particular can benefit from user-friendly video management interfaces, as various departments may require access to certain video data,” said Kim Loy, VP of Global Marketing and Chief Product Officer at DVTEL. Being able to provide real-time views of remote locations as well as forensic evidence in case of an incident are other reasons a VMS is valuable to a university campus, according to Mike Scirica, VP of Marketing and Sales at WavestoreUSA.

The need for better video quality to capture facial recognition was what drove George Mason University in Virginia, U.S. to go for an IP-based surveillance system. The school opted to deploy dome and panoramic megapixel cameras from Arecont Vision, ranging from 1.8 megapixels to 8 megapixels, in athletic facilities, academic buildings, and parking garages, with plans to extend installation to residence halls. The camera images are fed to a local network video recorder from ExacqVision. School officials note the better forensic capabilities and flexibility to recover data as some of the major benefits of using megapixel cameras. Furthermore, lower bandwidth and storage requirements, along with the need for fewer cameras to cover larger spaces, helped the school reduce costs.

Scirica also noted an increased demand for hemispheric, fish-eye, and 360-degree cameras. “With these devices, one camera can replace up to four traditional surveillance cameras and when used with dewarping software, users gain a new level of situational awareness than previously possible.” Dewarping software comes built-in to some of WavestoreUSA's VMSs, allowing users to record the original images while simultaneously displaying the dewarped images. The software also allows users to manage digital PTZ controls without the need of third-party SDK integration. “The dewarping feature…helps schools get more functionality out of the system and, consequently, achieve enhanced awareness of their security environment,” added Scirica.

Work Most Often Undertaken when College Renovate Buildings*

(% based on 616 projects)

HVAC

40.2%

Electric Overhaul

32.3%

Plumbing

27.6%

Lighting

27.3%

Flooring/Carpeting

25.7%

Fire Alarms

20.1%

ADA Compliance

19.0%

Fiber Optics/Cable

15.6%

Storage

14.5%

Security Equipment

12.9%

LANs

12.0%

Tile

12.0%

Lavatories

11.9%

WANs

11.9%

Controls

11.2%

Roofing

10.1%

*Retrofit undertaken in at least 10 percent of projects

Source: College Planning & Management

Security outlook 2014: Products and technologies

Security outlook 2014: Products and technologies

Editor / Provider: Editorial Department, a&s Asia | Updated: 2/4/2014 | Article type: Hot Topics

In 2014, there are few product trends and technologies that will be heavily addressed, including intelligent surveillance, higher resolution technology, growing demands for entry-level market, upgraded analog, steady growth in access control and biometrics and video verification applications.

Intelligence is the breakthrough in surveillance
In the early years when video content analysis (VCA) was introduced to the market, it created a ripple of excitement. However, when the high expectation was not met by the technology, the excitement was chilled quickly. In the recent years, we have seen many applications been adapted to different vertical markets. For example, people counting is highly used in the retail sector for flow management or distinguishing out the hot selling products in malls. Another practical usage is to use VCA as a filter, to isolate suspicious activities for further determination by people. This application can be programmed to the cameras at the front end as an activity detector. If it is to be used at the back end as an intelligent analytic tool, then the pictures will become information-rich tool or further applications.

As to the improvements of VCA, there are 2 ways to go. One is through adding in the three-dimension (3D) technology--- by incorporating determining factors such as height measured from the ground, the accuracy of the image analysis could be highly enhanced, becoming a more reliable application. Another improvement is through self-learning technology. The precision of VCA is dependent on how well the VCA corrects its mistakes through multiple trial-and-errors.

Cameras are like the human eyes. If the image registered by the eyes is not just “seen” but “comprehended,” then the application will become more valuable to the system. The hottest topic in IT now is the big data. If combing intelligent surveillance and big data, security will definitely be brought to a higher level.

Higher resolution, clearer images
Recently, we have heard the coming of 4K images or H.265 compression technology – the revolution of visual demands is stimulated by the consumer market. As a product, HD can be described as mature; however, if we are talking about a system or an environment, then it is yet to be accomplished. From my point of view, it is very difficult to find new marketing topics for the IP market that is heavily competed for. In order to stay ahead in the industry, many manufacturers will pioneer into incorporating the 4K and H.265 technologies into their products despite that the environment is not mature yet.

Entry-level markets' rising demands
As mentioned, security has become more affordable and much accepted in the consumer markets. Many leading players such as AXIS, BOSCH, and SONY continuously introduce new entry-level products specially designed for this market. Similarly, the cost-downed made-in-Asia products from both IT and security industries all have something to offer to the entry-level market. To offer a stage for manufacturers to showcase their consumer-defined products, the 2014 Secutech International Expo, organized by Messe Frankfurt New Era Business Media (a&s company), is going to launch a concurrent SmaHome show, to greet the coming of age of the new security market.

Analog – bullish with upgrades
The analog technology still dominates the security market in terms of quantity with an 80 % share even in 2013. Although the competition is so intense that little profit can be generated, the cheap pricing will still affect the market for another while. However, if manufacturers can take advantage of the large need for analog upgrades and produce some innovation for improving the existing technology, profits can certainly be yielded. Hence, we should pay attention to those solutions designed for the upgrade of the existing analog systems, such as the highly developed 960H, HD-SDI to be lowered in price, or the 800TVL products hot in China. These upgrades will aggressively seize the large analog market.

Access control onto a steady rise
Access control applications has followed closely with the IP trend, and can go along with other mature technologies such as biometrics, RFID, wireless electric lock, IP video door phone. As IP continues to excel, access control is definitely going on a stable growth for the following years.

Biometrics be lifted up outside security
In the previous issue, we have picked out iPhone 5s as the product of the month due to its selection of fingerprint technology. Biometrics will definitely be riding an upward spiral with consumer 3C products--- free from the constraints of the security market. Applications such as facial recognition, voice identification, and many more will also be in demand. Some of the technologies that were unable to be supported by the surveillance industry could possibly find a new stage to shine through 3C.

Video verification enhancing applications
False alarm has always been a headache for the alarm providers. Some of the countries now have regulations requesting all alarm services to add in video images to enhance verifications that alleviate the burden of police on duty. Some alarm service providers add in the video verification to reduce the unnecessary dispatch of guards. This is even more appreciated in Asian countries, where people are accustomed to image viewing. Although alarm is not highly requested in India, perhaps more can be secured through the combination of alarm and video.

Looking ahead the transition phase of security
The most exciting trajectory of security is pointed towards to follow the path of 3C, as the value of surveillance becomes tangible through mobile devices. The untapped opportunities in the security industry will lure both geniuses and funds as how it is in the Silicon Valley! There is going to be a fiery image revolution changing the old professional security. I myself am very curious, just how will the core value of professional security---“trust”--- be redefined in the consumer-driven new markets? Maybe we can hold on to this thought, and come back to examine it in 2016.

Axis improves Shaanxi Rural Credit Cooperative HDTV video network system

Axis improves Shaanxi Rural Credit Cooperative HDTV video network system

Editor / Provider: Axis communications | Updated: 12/9/2013 | Article type: Commercial Markets

Mission
As network technologies advances and IT deployments go further, the video surveillance industry has stepped into the network era. Video surveillance is developing towards networking, modularization, and high definition, to meet user demands for high definition, robustness, reliability, ease-of-use, resilience, scalability, and ease of installation and maintenance. Shaanxi Rural Credit Cooperatives Union grows rapidly, and maintains more than 3,000 points of presence and hundreds of off-premise ATM self-service sites. HDTV network cameras were needed for the key areas at the banking sites, including main gates, bank note handover areas for cash carriers, outer/inner areas, counters, and ATM self-service areas, to address the business-critical requirements for “clear faces”, “clear bank notes”, “clear details”, “clear interior/exterior environments”.

Solution
On the basis of the specific HDTV surveillance requirements of the Union's points of presence, Axis network cameras were selected with functionalities and performance purpose-designed for banking, and in accordance with the actual conditions on the sites, as well as the business requirements, the Union formulated the plan as follows:
1. Main gates of the banking offices: Bank employees enter/exit the offices through the main gates, and all clients access the offices through the main gates for financial transactions. So, additional HDTV network cameras at the main gates enable facial recognition. Devices deployed: AXIS Q1604 Network Cameras with WDR functionality.
2. Back doors of the banking offices (bank note handover areas): Bank note handover is carried out in areas between the banking offices and cash carriers, for cash entry into the offices in the morning and cash return to the vaults at night. Naturally, the risk of robbery is great. AXIS P1354 Network Cameras with Lightfinder technology were deployed.
3. Banking office environments: The banking office environments are the areas where clients queue to handle financial transactions. In this place, risks are greater since cash flows between the bank tellers and clients, and the clients are allowed to move as they like. AXIS M3007-PV Network Dome Camera with 360o panoramic view were deployed.
4. ATM self-service settings: All ATMs in self-service settings were originally equipped with analog pinhole cameras, which didn't provide good facial recognition or identification for access control. AXIS Q1604 Network Cameras with WDR functionality were installed.

Result
1. Application of Wide Dynamic Range technology: The Union needs details about persons and vehicles in its operating environments, so the cameras are expected to provide high definition, accurate color revivification, superior WDR effects, sufficient data that allows for identification of the colors and license numbers of the passing vehicles, and excellent image quality, free from high light impact in the environment. AXIS Q1604 Network Cameras were deployed which feature WDR, providing “dynamic capture” capabilities, enabling an ideal solution for monitoring applications in the highly variable lighting conditions, in circumstances where the light comes through a tunnel creating both shadow and bright zones. In these demanding environments, AXIS Q1604 allows for the user to clearly identify people and objects. The cameras' Wide Dynamic Range with dynamic capture uses several images with different exposure times. Advanced image processing results in the video with clarity and sharpness, therefore, no part of the image turns out too dark or too bright.

2. Application of the Lightfinder technology: At the back doors of the Union's banking offices (bank note handover areas), the cameras are expected to provide high clarity, accurate color revivification, and particularly, low light performance for poor lighting conditions at nighttime. AXIS P1354 Network Cameras with Lightfinder technology were deployed. AXIS P1354 is a fixed day and night camera with superb image quality, delivering excellent H.264 performance in a robust design. Superior video quality is provided with progressive scan in multiple individual H.264 streams, as well as Motion JPEG streams. The focus assistant, remote back focus and pixel counter features simplifies installation. The outstanding light sensitivity supplied by Axis' Lightfinder technology, with maintained colors even in very poor lighting conditions, is obtained by a combination of Axis' expertise in image processing, system-on-chip development and selection of the best optical components.

3. Application of 360o panoramic view cameras: In the outer environments in the Union's banking offices, it is necessary to monitor facial features, and activities of the clients during business hours as well as unauthorized entry. Therefore, the cameras are expected to provide high definition, accurate color revivification, no blind zone and wide coverage. AXIS M3007-PV Network Cameras with 360o panoramic view cameras were deployed. They offer multiple viewing modes: 360o overview and dewarped imaging technologies, including panorama, dual panorama, quad views and support for digital pan/tilt/zoom functionality. Multiple video streams in H.264 and dynamic JPEG formats can be transmitted simultaneously.

4. Ultra-low bandwidth and storage requirements: The Union's existing distributed management model will be transformed into centralized surveillance and management with city-level secondary banking surveillance centers, which are then connected to the provincial and national security networks, thus extending the monitoring coverage and tools, freeing the operators at the local sites from device maintenance, and improving the overall efficiencies and effects. Axis cameras with high performance video compression algorithms, deployed in the Union, provide the ability to transmit the HD images with the limited bandwidth. This reduces bandwidth requirements while ensuring the high quality of images.

Houston club adopts Safran Morpho's 3D facial recognition for secure access

Houston club adopts Safran Morpho's 3D facial recognition for secure access

Editor / Provider: Safran Morpho | Updated: 11/20/2013 | Article type: Security 50

Safran Morpho, through its subsidiary MorphoTrak, provides 3D facial recognition technology for secure access at The Marque, the most exclusive membership club in Houston, Texas.

The Marque business social club selected the Morpho 3D Face Reader, to provide a highly secure, convenient biometric solution that allows members-only access to certain areas of the club. With Morpho 3D Face Readers, access control is fast, with a quick glance at the reader and members are instantly recognized, unlocking doors to the exclusive areas.

Analyzing the three-dimensional structure of the user's face, the Morpho 3D Face Reader achieves highly accurate, reliable and quick matching while ensuring high throughput. The system is also used in data centers, communications facilities, casinos, laboratories and corporate headquarters; anywhere a high level of convenience and security is needed.

The Marque is an exclusive retreat where members entertain clients, conduct business meetings, or simply relax in luxury.

Six “musts” for selecting and installing VMS

Six “musts” for selecting and installing VMS

Editor / Provider: The Editorial Department, a&s International | Updated: 10/23/2013 | Article type: Tech Corner

When it comes to configuring surveillance solutions, it all comes down to two important factors—openness and customization. Over the years, video management software (VMS) has emerged as a business-enabling technology where a more open platform allows the integration of other value-adding system combinations such as POS, RFID, video analytics, time and attendance, access control, and more. The ease of use, improved algorithms, and data libraries are improving its reliability. The result is that the value of video is increased both in real time and when viewing recorded video.

According to Jumbi Edulbehram, VP of Business Development at Next Level Security Systems, the decision-making process can be varied and complex when considering VMS solutions. These factors include price, ease of use, integration, features, and intelligence.

Cost
One of the most important considerations when purchasing and installing VMS is total cost of ownership. For total cost of ownership, some key points should be taken into account: cost of installation, cost of maintenance, and time to deploy and conduct the system setup.

User-Friendliness
Another critical requirement is that the VMS should be simple and easy to use. As video surveillance systems become more complex, people using surveillance systems not only include security personnel, but also administrative and IT staff. Different users will have unique needs when accessing video. “It's important that everyone involved – from the head of security to workstation operators – can quickly find their way around the system and know how to configure it,” said Alan Ataev, Global Sales Director at AxxonSoft. For instance, there is a security customer who has certain wants and needs, as well as a business user and administrator, and their demands differ. Being able to have an interface that communicates with these different groups is important.

Gadi Piran, President of OnSSI agrees. “The VMS's interface needs to be as intuitive as possible, and should not require technical savvy to operate. Users should not be required to memorize codes or commands, and the system should display all, and only, the actions available at the current time for each individual camera.”

Ease of deployment
Deploying VMS can be a complicated task. “System integrators have to be educated on networking, hardware, operating systems, and edge devices to name a few,” Krugliak said. “The fewer tasks the installer is required to perform, the more automatic the setup procedure will be and therefore, the sooner the system installer can complete the project.”

Fully-supported hardware list should be as many as possible. It is always preferable to go with an open VMS solution capable of integrating a great variety of third party IP cameras and encoders. This ensures end users have greater freedom to select best of breed hardware. “We can already see today that the world [of] security [industry] is heading for network solutions in a big way,” Ataev said. “Right now, we have 1,300 models of IP cameras integrated with AxxonSoft products, and this number is constantly growing.” An open platform not only enables the user to optimize the system to do the job at hand, it also reduces long-term costs as it is possible to change components without a forklift upgrade.

Customization & Scalability
Video is just one component in the overall security operation. The VMS may need to integrate with other systems, including access control, video content analytics, license plate recognition, facial recognition, fence detection systems, fire alarm systems, and others. In addition, users should be able to customize the software to meet their unique needs. Whether or not SDK is extensive enough in order to enable customers to develop integrations or to customize the user interface to meet their needs becomes crucial.

The VMS architecture and how it fits within the network environment also needs to be considered. “A VMS solution that can adapt to any network and scale to thousands of cameras as the system evolves over time ensures customers are future proofed and can grow their system as required,” Palatsoukas said. For some verticals with a large camera count system, such as airports, the VMS should allow for growth with more locations, more recording servers, more cameras, and more users, without paying a penalty for going from one system size to another. For instance, an airport video surveillance system is typically composed of several hundred or thousands of cameras. The large camera count also comes with a large number of users, alarms, and workflows, which all in turn needs to be supported by the VMS. In this case, a suitable VMS needs to have the appropriate scalable architecture in order to support this infrastructure.

High Availability and Redundancy
In addition to the number of hardware components, the number of clients on a server can take a toll on the system. “It is crucial to ensure that the VMS has built-in capabilities to ensure that video is recorded and can be reviewed at all times,” Palatsoukas said.

A built-in mechanism in the VMS to offer continuous system access, uninterrupted video streaming, health monitoring, and system self-check is especially crucial for verticals that cannot afford the downtime. “High availability is of the utmost importance for a security system that is used to minimize threats and protect assets,” added Palatsoukas. “An offline system can result in revenue losses through operations stoppage and theft, hence making it very important to minimize downtime. The embedded high availability features are tailored specifically for the VMS, minimizing configuration and management time. They are also less expensive than third-party solutions.”

For critical use, such as casinos or banks, redundancy is a key concern as storage itself might take 30 to 40 percent of the total surveillance system price. A smart redundancy feature saves storage space and money since only triggered event footage is stored as backup. “In casino and city surveillance, smart redundancy is important as there will be enormous amounts of information and simple 1-1 redundancy is very wasteful,” said Patrick Lim, Director of Sales and Marketing at Ademco Far East (an Ademco Security Group Company). “Smart redundancy can reduce up to 50 percent of additional cost, which is ideal in controlling the budget and space needed.”

Intelligence and Automation
Security has traditionally been used to protect assets in a passive fashion. However, VMS allows video surveillance to go beyond traditional security by gathering business intelligence and driving decisions. A system with intelligent video analytics can combine multiple video analytic events using rules dependency to trigger an alarm and to minimize false alarms. “The system must be able to intelligently generate and distribute valid alerts in a variety of forms – video, text, audio, data and other – so that operators are no longer required to view live video from dozens, hundreds, and thousands of cameras,” Piran said.

Automation is important for remote sites as combining different security and non-security systems under a set of rules requires automated security. For instance, when reviewing the VMS, it is important that users seek out an automated platform that will deliver the video intelligence necessary to help security personnel rapidly detect, act on, and investigate security breaches and other threats.

Automation can include lighting, access control, door management, and more. It can also include more complicated tasks such as automated system health monitoring. “Automated system health monitoring is a critical feature to help users manage geographically distributed video operations, while enhancing system uptime and reliability to ensure video is being captured and is available for review at all times,” said Debjit Das, VP of Global Marketing, Video and Situation Intelligence Solutions, Verint Systems.

A large project may have multiple security systems scattered on multiple sites, creating a lot of complexity for the operator who might have to connect to multiple applications on different computers. “Being able to watch live and playback video, receive events, and run reports from multiple sites with one application makes operations easier for the users, who can concentrate on identifying and analyzing security threats,” Palatsoukas said.

The automation feature is important for remote sites. “Software features such as smart tracking of personnel, activities and events become very important, as they may have very limited security manpower at sites looking at cameras over a very large area,” added Lim.

User-centric mindset Picking the wrong VMS solution can be catastrophic and the consequence is not as simple as replacing a surveillance camera. Knowing the capability of VMS, project complexity, and user needs will help integrators at the start and avoid a mismatch scenario.

Homework for Integrators
Integrators might start by outlining end-user needs. Steven Lowrance, Applications Engineering Manager at Aronson Security Group offers some of the following tips. Below are some of the questions that help integrators better understanding a situation and system requirements:
1. How many cameras will there be? 
2. Is there a need for specialty cameras or brands (thermal, IR, covert, etc)? 
3. Where are those cameras located?
4. What is the recording schedule? 
5. Will the system be used for live viewing or more for forensic use after an event? 
6. Do users need advanced applications such as video analytics? 
7. How many users will view the cameras? 
8. Is permission restriction necessary to the business? 
9. Is centralized administration of users and devices important? 
10.Does the business have a server operating system requirement or restriction? 
11.Is integration with other systems a requirement?

Int'l Sochi Airport monitored by Artec 3D facial recognition and XProtect Milestone system

Int'l Sochi Airport monitored by Artec 3D facial recognition and XProtect Milestone system

Editor / Provider: Artec | Updated: 9/14/2013 | Article type: Infrastructure

Elektronika, LLC has developed and implemented an integrated security system for the International Airport of Sochi that is to host the upcoming Winter Olympics 2014.

The network was designed in compliance with Aviation and Transportation Security legislation referring to Class I airports. It provides a wide range of functional capabilities including security monitoring and alarm situation detection, as well as its rapid response.

The entire airport premises are covered by the system network. There are over 550 HD video surveillance cameras working non-stop. The security system also involves united checkpoints and automatic alert detection. The object is monitored by a sole dispatch center collecting data from the entire airport zone.

The project is tailored to utilize intellectual capabilities of various technologies. The system is able to detect alarming situations and alert all on-duty airport security workers, as well as to facilitate required scenario execution. In case of emergency, dispatch operators receive verified and prioritized information.

Built on a singular software platform (ESM), the network combines the security technologies: video analysis, biometric access control systems based on fingerprint and 3D facial geometry recognition, electronic passes, situation management in accordance with various scenarios.

Nikolay Ovchenkov, Elektronika LLC CEO: “We have spent over a year engineering the security system of Sochi airport. One of the top-priority goals was to design a highly effective system that could be easily adapted into existing high speed work flow of the airport and become a trusted security solution. To achieve this goal we have selected the best technologies and solutions that function as a centralized network”. Victor Shesternin, Asset Protection Director Deputy, Bazel Aero: “The level of airport infrastructure security will hugely increase with installation of modern security systems, as it is highly important for the Winter Olympics in Sochi. The whole project engages innovative approaches and solutions. Now, the airports of Sochi and Krasnodar are equipped with new generation systems.

More on technologies:
Incident management scenarios based on ESM platform (developed by Elektronika) ESM-based dispatch center manages the security network. ESM works with scenarios that imply certain responses to various threats, meaning that it provides event analysis and incident management with exact directions.

Benefits and innovative capabilities of ESM:
* No human factor mistakes. Each operator's performance is assessed and controlled.
* The system controls each stage of threat management.
* Capable of rapid response while complex situations
Security management system based on ESM software unites all resources offering full scale monitoring and level security automotive management, ACS algorithms and video surveillance support.

Airport access control with Broadway 3D Face Recognition System by Artec Group :
Broadway 3D, installed for airport workers access control, provides the highest security level available on the market. The system uses geometry of a human face – one of the most precise biometrics that is impossible to fool or fake. Broadway 3D was selected to be installed in the Sochi airport for its safety and fast performance. The system eliminates access of an unregistered person or unauthorized employee. In less than a second the system captures surface information, having analyzed about 40 thousand points on a user's face it builds a mathematical model and compares it to the database. It is capable of identifying a person on the walk, in hats or sunglasses. It can also tell apart identical twins. Moreover, the system offers a high throughput that is quite crucial while rush hours. Registration takes up to 2 seconds; throughput is 60 people per minute. The system of 3D facial recognition is integrated into the network under ESM management and works in a verification mode. A biometric template is stored in the database and its numeric number is assigned to each access card.

When a person enters though a checkpoint, he presents his card to a card reader. After that Broadway 3D performs facial recognition and compares it with 3D template in the database. If the information matches, Broadway 3D grants access to the person. The information is stored in ESM software. In addition, the solution is able to change work modes and algorithms of particular checkpoint per dispatcher's order.

Intellectual surveillance by XProtect Milestone system developed by Milestone
Xprotect Milestone system offers all the functions required for highly effective video surveillance, including live and recorded video view, dome and rotary IP cameras management. Milestone virtual matrix can direct video streams to any PCs which is quite important for multichannel systems of video surveillance. The solution is extremely functional, safe and has vast integration opportunities.

First Page< Prev< | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 >Next >Last Page