Monday, May 10, 2010

Metadata and Your IP Camera Surveillance Solution

With the advent of IP Cameras, CCTV technology is slowly phasing its way out of the Surveillance industry. But one feature some people are unaware of when it comes to switching their old Analog cameras to IP futureproof technology is the metadata that can be collected and used to trigger certain functions.

The following article from Sony's Product Manager Yu Kitamura offers some great insight on this subject.

Yu Kitamura, Product Manager, Network Video Monitoring, Sony Yu Kitamura,
Product Manager
Network Video Monitoring
Sony

Metadata saves on resources required to store large amounts of data
Metadata saves on resources required to store large amounts of data

Yu Kitamura, Product Manager, Network Video Monitoring, Sony Europe explains the facts about metadata, and their benefits.

All organisations have to face the costly challenge of the storage and management of their valuable data. In the sphere of security, where visual data is indispensable, any avenues that make the capture, storage and retrieval of that information more efficient will command budget attention.

One of the inevitable costs of a comprehensive security operation is the money and resources required to store weeks of largely irrelevant security film, and also to identify and retrieve the relevant material from the archives when needed. What can make metadata- - or data about data - economically attractive is being able to save on those resources.

Key facts about metadata

Metadata may sound like yet another stream to manage but, on the contrary, it is actually the key to automating management, and allowing technology to make some decisions by itself. With current network video monitoring solutions

On a more strategic level, the use of metadata also has an important role to play in keeping traffic off the network

available , as well as the data that a security camera usually captures, the additional metadata enables the surveillance system itself to do much of the detection work that normally falls on the security operative. It can, for instance, pinpoint with coloured boxes areas of the screen that contain threats, making the job of the observer easier, and the ultimate response quicker and more effective.

On a more strategic level, the use of metadata also has an important role to play in keeping traffic off the network - an advantage that not only comes with substantial operational benefits, but also one that has significant cost implications.

New security cameras which make use of metadata can independently recognise visual security breaches, such as abandoned packages or suspicious movement, and are sophisticated enough to know the difference between moving people and safe background conditions, such as blowing trees or splashing fountains. Such a capability means that those areas need no longer form a security blind spot as they do with current analogue CCTV.

As a consequence, there is no more need to ‘mask' problem areas within the field of view. These cameras' capabilities also enable many of the common time-consuming false alarm scenarios to be eradicated. Once again, this is a function of the metadata, which feeds back information on the risks associated with what the cameras are seeing.

The benefits of metadata technology

The metadata technology of these security cameras comes with technical benefits too. Bandwidth requirements are minimised
Metadata makes for fast and accurate results when searching through data
Metadata technology provides fast and accurate results when searching through historical data
because only legitimate threat images and data are sent and stored. In a security environment where monitoring may be happening 24/7, the screening out of irrelevant data is a big step forward. It makes a significant difference to the cost and management of the captured material, and it also makes for fast and accurate results when searching through historical data.

Application of intelligence in video surveillance and proactive detection

Surveillance software currently available in the market analyses, assesses and responds to the images transmitted by intelligent security cameras. The surveillance software packages also gain additional information about the images from the cameras' metadata. By then employing features that alert and direct operatives to the visible threats within a frame of video, this type of software provides more than just a safety net - it delivers proactive detection.

This type of security software is designed with the practicalities of security work in mind. An unmistakable on-screen highlight box locates a threat, captures the observer's attention and leaves no room for error. It enhances the security decision-making process and provides accurate back-up data in time-critical situations, delivering essential decision support when it is most needed.

Metadata...it is actually the key to automating management, and allowing technology to make some decisions by itself



What allows this type of system to run so efficiently, with the metadata running alongside the video and audio data is its development of Distributed Enhanced Processing Architecture (DEPA). Having intelligent cameras on the same network as the servers that are running the security software opens up enormous possibilities and potential, and now means that a multi-camera security set-up doesn't have to be complex and difficult to monitor; personnel can be guided by the software to the hot-spots and the right screens to watch. They can be shown the detail of the threat before it becomes an incident, and may even as a result prevent it from turning into an incident at all.

A new era in security network video monitoring is underway. The return on investment from bringing monitoring cameras on to the network and away from the world of analogue CCTV, are clear. It is no longer necessary to run, manage and upgrade two separate systems. The same investment that allows a company to save money on voice over-IP can now benefit the security function as well. Use of the network also allows the possibility of additional hardware devices to function alongside the network video monitoring, allowing features such as triggered lighting or door locking.

Wednesday, May 5, 2010

IFSEC 2010 Cameras To Look For!

IFSEC2010 is soon approaching and there are several new products to look out for if you are attending. HD IP Camera Technology is proving itself as the future in network surveillance camera solutions and beyond. Its crystal clear imaging can be used in almost any industry, and prove useful especially for web marketing for live HD video viewing of resorts, construction sites, and beaches, as seen by HDRelay.com. The latest in HD IP camera technology is also future proof, providing usage for many years to come.

Here are some of the latest in HD IP Camera Technology coming from Sony Security and Axis Communications that will featured at this year's IFSEC, May 10 - 13 in Birmingham, UK

Axis Communications -- Booth 4E90

The Axis Q6034 is the latest PTZ HD IP Camera to be released by Axis. It boasts several features, including:
  • HDTV 720p, day/night and H.264
  • 18x zoom and fast pan/tilt
  • High Power over Ethernet (IEEE 802.3at)
  • Two-way audio* and audio detection
  • Four configurable inputs/outputs* for connection to external devices such as sensors and relays
  • Local storage with a built-in SD/SDHC memory card slot
  • Day and night functionality, progressive scan, 128x wide dynamic range, electronic image stabilization, and E-flip
"AXIS Q6034 combines high-speed and robust pan/tilt capability with HDTV-quality video to provide exceptional coverage of large areas and great detail when zooming in on an object," says Erik Frännlid, Axis' Director of Product Management. "AXIS Q6034 is easy to install and is powered using High Power over Ethernet. An outdoor-ready version is also planned for release later this year."

This camera will be on display at IFSEC and is coming in May2010 to WebCamProShop.
Click here to learn more about this camera.

Sony Security -- Booth 4J10

Two new HD IP Cameras from Sony Security, SNC-DH180 and SNC-DH240 will be unveiled for the first time in Europe at this years IFSEC.



The SNC-DH180 is a Vandal Resistant HD Minidome Camera that encompasses Sony's popular View-DR (Visibility enhanced wide Dynamic Range) technology and and IR Illuminator, making it a cutting edge Outdoor-ready HD Surveillance Camera.

More features include:
  • Superior 720p HD picture quality, supporting H.264 at 30 fps
  • Maximum reoslution 1280 x 1024
  • The new Exmor CMOS sensor achieves high image quality and high sensitivity
  • Clearly see objects in the dark up to 15 m (49 feet) away with IR Illuminators
  • The Visibility Enhancer optimizes contrast and makes the subject more visible, even in severe backlight or shadow conditions
  • XDNR (eXcellent Dynamic Noise Reduction) technology for clear images without motion blur under low illumination
  • Easy Focus function/Easy Zoom function
  • Intelligent Motion Detection, Advanced Audio and Tamper Alarm
  • Built-in heater
  • IP66 Rating

The SNC- DH240 is also an HD Minidome which has similar features to the DH180 -- the main one being the maximum resolution of 1920 x 1440. Pretty impressive!

This model, however is not vandal proof. WebCamProShop suggests you protect you hardware investment by storing your HD technology in a Dotworkz D2 or D3 Housing. These rugged enclosures are made to withstand any weather condition or extreme temperatures. Learn more about Dotworkz Products on their website,
Dotworkz.com. All products are also for sale on WebCamProShop. Click here for more information. These Sony products will also be available soon!

Friday, April 30, 2010

Sony's Cutting Edge Sony SNC-RH164

Check out this video from Sony on their Cutting Edge HD Technology. The SNC-RH164 offers stunning imaging in 720p along with several other intelligent motion and other capabilities

The
SNC-RH164 PTZ HD Camera along with all of the latest from Sony is available at WebCamProShop!

Features include:
- HD with 30 fps
- 10x Zoom
- XDNR (Excellent Dynamic Noise Reduction)
- Visibility Enhancer
- DEPA Advanced
- 210° Tilt
- Quick Release for Easy Installation
- hPoE (Compliant With IEEE802.3at)
- Triple Codec: H.264/MPEG-4/JPEG
- ONVIF Compliant

Wednesday, April 28, 2010

Milestone IP video supports Venaria, Italy: a small town with big security needs

COPENHAGEN – 27 April 2010. Milestone XProtect™, the world-leading open platform IP video management software, has been chosen as the foundation for a flexible surveillance system by the city of Venaria, Italy. The Milestone platform provides future scalability and the addition of new innovations such as Axis H.264 network cameras and the integration of license plate video analytics.

Just a few kilometers from Turin, Venaria last year welcomed one million visitors attracted by a beautiful 17th-century palace erected by the house of Savoy. The cultural complex and surrounding gardens constantly draw high-prestige visitors like the President of Italy, former US president George Bush and current California Governor Arnold Schwarzenegger. On this basis alone, one can appreciate that Venaria’s security needs are of the highest level. In addition, the Ceronda Creek and Stura River flow through municipal territory where the effects of any flooding on the palace and historic center are dreaded.

The challenge of scalability for multiple needs
The municipal administration had tried to address these needs earlier with an analog video surveillance system, to protect some of the town’s crucial areas. That experience, according to Municipal Police Chief Luca Vivalda, “produced sparse results and brought critique.”

In January 2008 they conferred the task of a new IP installation to ASM Venaria, a public agency that is carrying out the project and handling the maintenance. The advantages are two-fold: cost savings and maximum guaranteed discretion in meeting high security needs associated with visiting public figures, as well as protecting the privacy of its citizens. The image data never leaves the municipality because there are no external agencies involved.

ASM personnel are Milestone-certified and directly involved in setting up the command center operations. They designed a scalable video surveillance system that was flexibly accessible, easy to use, compatible with privacy laws, and able to meet the local prefecture’s requirements pertaining to extraordinary events. The system covers the monitoring of traffic, the security of citizens, tourists and guests, and watching the rivers for the Civil Defense, where Axis cameras follow the watercourse flows in real time at critical junctures. The surveillance also monitors such areas as recreational parks and residential zones, schools and administration buildings.

Open IP video allows adding H.264 technology and analytics

ASM Venaria’s IT Manager Ivano Voghera explains the technology choices: “Chief Vivalda and I undertook inspections in other cities with video surveillance installations, carefully evaluating both hardware and software. We chose Milestone’s IP video software platform and Axis network cameras. The Milestone platform has the right functionality for the operations center, which fully met our requirements for a system simple enough for the staff to easily learn it, yet capable enough to guarantee immediate response to any need whatsoever.”

The project is entirely financed by the municipality. The installation required a new network infrastructure and that choice fell to mesh technology, which is quick to set up and reliable: in case of a radio link crash, the data communication is passed to another link. It is supported by a fiber optic network.

About 90 Axis network cameras are installed. Initially Axis 233 dome cameras and 233M fixed cameras had been chosen, however, they have since been nearly all replaced with the newer Axis Q1755, which is full HD and supports the H.264 protocol that uses less bandwidth.

The IP video software is Milestone XProtect Corporate, preferred for its greater degree of functionality. Ivano Voghera observes: “Milestone ensures a high level of service. For example, when we decided to go with the Axis Q1755, it was so new that not even Milestone had the proper drivers yet, but they supplied them in just 15 days, allowing the project to go forward as needed.”

In 2009 license plate recognition was also implemented, exploiting a much-appreciated capability of the Milestone platform to integrate new functions and video analysis modules that can be implemented as need arises by simply adding the required dedicated license, without having to modify the user interface.

The Milestone platform enabled the creation of a distributed architecture system in which all the images are converged onto a central server accessible by the municipal administration. Taking advantage of the Milestone video management for creating a varied and controlled user access hierarchy, the installation allows workstations to also be deployed at the traffic control center, municipal health authority, civil defense and the national police station. Operators are given rights to certain cameras by location, and to live or recorded images, as relevant.

The full customer case article is available in English, German and Italian here.

Download screenshots here

Friday, April 23, 2010

ProShop Tips and Tricks: Troubleshooting Your Network Camera and Components

Troubleshooting IP or network based live cameras is much simpler than it may appear. Most issues are related to power loss or a change in the network that supports the camera. All brands of cameras Axis, Sony, Panasonic and others are equally susceptible to outages and most likely will require some troubleshooting during the life of the camera.

The following outline was written by Steve Surfaro of Axis Communications:


When troubleshooting physical infrastructure, integrators must examine:
  • Cabling and wireless networks,
  • Equipment that controls the network devices and system power, and
  • Wiring plant that supports the multiple network-based security systems.
The wiring plant includes the telecommunications closet, the intermediate cross-connect, the main cross-connect and the data center, as well as the command monitoring center and the main cable head where the physical infrastructure connects to TELCO services, external WANs or the Internet.}

To determine the source problem, ask these questions:

Is there power?
This is the most obvious place to start troubleshooting. Ferret out whether a break in the network cable is present or if the problem lies with the power sourcing equipment (PSE) or the powered device (PD) itself. It’s advantageous to have a network management system that can consistently monitor the endpoints of the network and pinpoint where performance has slowed down or stopped altogether, especially for larger networks.

Is the PSE’s capacity exceeded?
If an Ethernet cable connects devices to a Power-over-Ethernet (PoE) switch, confirm that the device being powered can accept and use power from that Ethernet cable for its operation. As a safety precaution, a PoE switch or other PoE-compliant PSE won’t supply power over an Ethernet cable if it’s not connected to a PoE-compliant device.

Second, check the wattage rating of the network switch and the power requirements of all the PoE devices being powered by that switch. The PoE standard — also known as the IEEE 802.3af standard — designates a maximum power output of 15.4 watts per port, or 12.95 watts to the powered device after factoring in the normal power loss that occurs on a twisted pair cable. Attaching too many devices with large power requirements to a switch can exceed its power capacity. To determine the classification of a particular powered device, check the manufacturer’s specification sheet.


If the network switch supports the newly ratified Hi PoE standard — also known as IEEE 802.3at or PoE+ — it can deliver 25 watts of power per port, or 22.55 watts to the powered device once power dissipation in the cable is considered. If the Hi PoE network switch uses all four of the twisted pairs in the Cat 5 cable, it can deliver up to 51 watts of power per channel. This is more than sufficient to power and control pan/tilt/zoom network cameras, as well as (small) heaters and fans in outdoor network cameras, over a single Ethernet cable.


Is the wireless network experiencing interference?

Much like hardwired network systems, integrators should set up a network management system to monitor wireless transceivers or radios for power loss, fluctuating network throughput and poor signal strength. Radios can also be monitored for interference from external sources.

Rooting Out Logical Infrastructure Problems

When troubleshooting logical infrastructure, integrators must examine:
  • Network switches,
  • Firewalls, and
  • Network management systems.
This is the virtual portion of your network that controls how you segment access to network security devices and systems. It also involves the way you guarantee quality of service (QoS) for critical systems during spikes in bandwidth demand from various security systems on the network.

To determine where the problem might be originating in the logical infrastructure, here are a few pertinent questions to investigate:

Does the user have permission to access the system?
If a user complains that they’re not receiving information from a particular network-based device, check the Virtual Local Area Network (VLAN) to see if they have been granted permission to access that device. The VLAN is designed to separate groups of users to prevent unauthorized access to network components such as devices or databases.

For instance, human resources might have permission to look at an access control database but is barred from the access control panels themselves. A school superintendent may be able to see all of the video cameras in the district, but principals can see only the cameras covering their own campuses. Or in an emergency, first responders may be given temporary access to a building’s security cameras.


Is a new logical security application causing communication failures?

If network-based devices suddenly stop communication, check to see if the network administrator has introduced a new logical security application that may have triggered the failure. This could be a new proxy server that doesn’t recognize the device, a new firewall that creates a barrier between the device and the network in accordance with the company’s information security management (ISM) policy, or a piece of security software that is blocking the network port used by the device.

The best way to test for these problems is to shut down the new application and see if the device begins communicating again. Start with the simplest communications path possible and then add layers of logical infrastructure and tracking when things start to fail.


Troubleshooting Specific, Network-Based Security Systems

After investigating the infrastructures, integrators should move on to the specific network systems for further inspection. The diagnostic strategies for two of the more popular network-based security systems — video surveillance and access control — are very similar.

Is the powered device working?

Whether it’s a network camera or a card reader, the first thing to check is the device itself. Is it receiving power? Are all its parts functioning? If the problem doesn’t seem to be power or part failure, try resetting the device. Start with a soft reset: simply powering down the device and then powering it back up again. If that doesn’t work, a hard reset will restore the device’s settings to its factory default. Then you can change the settings one at a time to see if a particular new setting is causing the problem.


Is the problem in the firmware?

One of the most common oversights in upgrading network-based systems is firmware compatibility between the network camera and the video management system or between the card reader, the door control panel and the access control management system. A manufacturer might have shipped you a firmware revision for the network device that isn’t supported by the management system. Or the network administrator might have upgraded the management system without considering its compatibility with the network device. Any of these scenarios could lead to a communications issue.


Are the databases synched?

If multiple network-based security systems are designed to work in tandem, it’s important to synchronize their databases to ensure that they operate properly. For example, a visitor management system might allow visitors to enroll online to ensure a badge is waiting for them when they arrive at the facility. However, if that information doesn’t automatically populate the access control system database, then the visitor’s badge won’t be recognized by the card reader.


Is remote access being hampered?

For network video surveillance systems in particular, problems can emerge with WAN connectivity when monitoring video streams remotely. To correct, first ensure that the individual monitoring the cameras is accessing the correct static IP addresses. If the network doesn’t use static IP addresses for the network cameras, check that correct port forwarding or network address translation protocols are in place. This might require specialized programming to determine if the camera’s video stream is transmitting properly through the router.
Hosted video solutions (i.e www.USrelay.com) avoid much of this complex protocol connectivity by connecting the cameras to an outside dispatch service. The service automatically reconfigures the cameras to stream video to a hosted video portal, where it can be accessed by remote users.

Keeping It Simple

Even in a complex network environment, the simplest approach is the most effective one. Start troubleshooting by ruling out more obvious problems such as power loss before exploring other possible issues affecting system performance. Try to recreate a simple communications path between the network device and the user of that device’s information — be it a video stream or an entrance permission. Then gradually introduce other areas of the network to determine where and when the problem occurs. This systematic layering of complexity will make it easier and faster for you to root out the problem and bring the security systems back to full operation.

Troubleshooting Checklist:


Check physical infrastructure
  • Power to all devices?
  • Manual soft or hard reset?
  • PoE capacity exceeded?
  • Wireless interference?
Check logical infrastructure
  • User permission for VLAN?
  • New logical security application?
  • (Proxy server, firewall, security software, etc.)
  • Firmware compatibility?

Thursday, April 15, 2010

Axis Introduces New Outdoor-Ready Fixed Network Cameras

Axis Communications, the market leader in network video, today announces a new series of outdoor-ready, high-performance fixed network cameras that save installation time and costs. The IP66-rated cameras have protection against dust, rain, snow and sun, and can operate in temperatures as low as -40 °C (-40 °F). Arctic Temperature Control is available for secure start-up of zoom cameras in freezing temperatures. The cameras are powered by Power over Ethernet for easy installation.

The outdoor-ready cameras, including megapixel (MP) / HDTV models, deliver superb image quality and support multiple streams in H.264 and Motion JPEG, two-way audio, intelligent video functionalities such as video motion detection, audio detection, active tampering alarm, and have built-in SD/SDHC memory card slot for storing recordings locally. The cameras consist of the following:





AXIS P1343-E Network Camera: SVGA resolution, day and night, digital pan/tilt/zoom (PTZ), remote back focus;
AXIS P1344-E Network Camera: 1 MP resolution / HDTV 720p, day and night, digital PTZ, remote back focus;
AXIS P1346-E Network Camera: 3 MP resolution / HDTV 1080p, day and night, P-Iris (precise iris control), digital PTZ, multi-view streaming, remote back focus;
AXIS Q1755-E Network Camera: 2 MP resolution / HDTV 720p and 1080i, day and night, 10x zoom, autofocus and pan/tilt head support.





WebCamProShop currently offers the Dotworkz S-Type Environmental Enclosure Series, designed for different weather conditions and climates: COOLDOME™ for extreme heat applications, Ring of Fire for cold climates and harsh winter conditions, as well as the Heater/Blower for average temperatures and Tornado for hot/humid temperatures. All models of fixed network cameras, including the Axis models P1343, P1344, P1346 and Q1755, are compatible with and fit inside the S-Type.

Monday, April 12, 2010

Axis Product Discontinuations and Replacements

These cameras will be discontinued on May 31st, 2010. Axis will continue with support until May 26th, 2013. Suggested replacement products:

  • For AXIS 223M: AXIS P1346, a 3-megapixel camera with superb 1080p HDTV image quality and multi-view streaming.
  • For AXIS 225FD: AXIS P3343-VE, an outdoor-ready, day/night fixed dome supporting remote focus and zoom.
  • For AXIS 211A: AXIS P1343, which offers audio support and day/night functionality in a robust design.
  • For AXIS 210A: AXIS P1311, a camera with fixed focal, CS-mount lens, offering audio support in a robust design.

Please note that AXIS 210 and AXIS 211 are not included in this statement, no discontinuation dates are set for those cameras.

IMPORTANT: Axis VT Dome Housing DBH24 and Verso “Cool” Outdoor Housing will be discontinued May 31st, 2010 with support until May 31st, 2011. We suggest replacing these with the Dotworkz D2/D3 with Heater Blower, Tornado, Ring of Fire, and COOLDOME for Axis PTZ network cameras and the Static or Brick-Style cameras respectively in the Dotworkz S-TYPE versions. When testing the imported Axis aluminum housings T92A and T95A against the D2, D3 and S-Type we found the Dotworkz housing to be much more durable to impact and generally a much better value.

AXIS T8121 High PoE Midspan 1-port will also be discontinued May 31st, 2010 with support until May 31st, 2011, and suggested replacement product is the upcoming AXIS T8123 High PoE Midspan 1-port.