TITLE

Video Analytics Points to Industry Maturity

AUTHOR(S)
Freschi, Cynthia
PUB. DATE
February 2009
SOURCE
Security: Solutions for Enterprise Security Leaders;Feb2009, Vol. 46 Issue 2, p40
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article offers information on video content analysis (VCA), a process that provides useful information from video excerpts in the form of data. This security system helps address various security problems such as detecting vandalism, identifying loiterers or monitoring crowds for abandoned baggage. However, the location of VCA, whether on the edge device or on the head end, determines its capacity to accomplish its goals.
ACCESSION #
36619566

 

Related Articles

  • False Alarms--False Hope?  // SDM: Security Distributing & Marketing;Jul2002, Vol. 32 Issue 7, p8 

    Editorial. Focuses on the security alarm industry's struggle in the U.S. to reduce false security alarms. Need for proper allocation of resources by the security alarm industry; Impact of false security alarms on the security alarm industry.

  • Product Solutions Outdoor Protection.  // Security: Solutions for Enterprise Security Leaders;Sep2002, Vol. 39 Issue 7, p8 

    Features products for outdoor protection chosen by 'Security Magazine' editors. Philips' AutoDome camera; Silent Witness' V294A Angledome wedge style camera; Senstar-Stellar Corp.'s Perimitrax, an outdoor buried cable intrusion detection sensor; Delta Scientific's IP500 portable barriers.

  • Extending the Perimeter.  // Security: Solutions for Enterprise Security Leaders;Sep2002, Vol. 39 Issue 7, p11 

    Reports that security buyers have extended the perimeter monitored by electronic security systems. Increase use of sensors and detectors; Shift from contracted central station to monitoring to proprietary monitoring; Technology advances since September 11th.

  • Looking at the viewer: analysing facial activity to detect personal highlights of multimedia contents. Joho, Hideo; Staiano, Jacopo; Sebe, Nicu; Jose, Joemon // Multimedia Tools & Applications;Jan2011, Vol. 51 Issue 2, p505 

    This paper presents an approach to detect personal highlights in videos based on the analysis of facial activities of the viewer. Our facial activity analysis was based on the motion vectors tracked on twelve key points in the human face. In our approach, the magnitude of the motion vectors...

  • Caught on camera. SPEARS, ALLEN // Professional Carwashing & Detailing;Apr2013, Vol. 37 Issue 4, p44 

    The article discusses the appropriate surveillance equipment for the protection of property from theft and vandalism, especially in carwashes. It suggests that cameras must be designed to sustain constantly wet atmosphere and should be properly sealed against any moisture incursion. It also...

  • When to 'Stay off the Main Highway' and Use a Parallel Network.  // SDM: Security Distributing & Marketing;Feb2004, Vol. 34 Issue 2, p36 

    Provides tips on the number of options available that can be used to connect network cameras. Philosophies underlying the EIA/TIA 568 cabling standard; Use of unused conductors in connecting network devices and cameras; Consideration when approaching and installing network security system.

  • Content Security.  // KM World;Sep2005, Vol. 14 Issue 8, p1 

    This section presents a graph related to content security systems that depicts information regarding the access to content by an unauthorized individual either deliberately or accidentally.

  • Acquiring Subject Participation for Information Security Survey Research: A Content and Correspondence Analysis Approach. Johnson, Alice M.; Shipps, Belinda P. // Journal of Information Privacy & Security;2013, Vol. 9 Issue 4, p3 

    Twenty-four business executives and 22 security executives had previously participated in a study about information security investment. The current study asked participants to comment on their reasons for participating in that research. A total of 1003 reasons were submitted which were used to...

  • TSA Working Around Implants.  // Security: Solutions for Enterprise Security Leaders;Apr2005, Vol. 42 Issue 4, p16 

    Reports on the initiative of commercial airline passengers in setting off more metal detector alarms. Complaints against airport searches; Measures to ease complex airport security procedures; Approach for passengers with bionic devices and prosthetic implants.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics