Video content analysis or video content analytics (VCA), also known as video analysis or video analytics (VA), is the capability of automatically analyzing video to detect and determine temporal and spatial events.
This technical capability is used in a wide range of domains including entertainment, [1] video retrieval and video browsing, [2] health-care, retail, automotive, transport, home automation, flame and smoke detection, safety, and security. [3] The algorithms can be implemented as software on general-purpose machines, or as hardware in specialized video processing units.
Many different functionalities can be implemented in VCA. Video Motion Detection is one of the simpler forms where motion is detected with regard to a fixed background scene. More advanced functionalities include video tracking [4] and egomotion estimation. [5]
Based on the internal representation that VCA generates in the machine, it is possible to build other functionalities, such as video summarization, [6] identification, behavior analysis, or other forms of situation awareness.
VCA relies on good input video, so it is often combined with video enhancement technologies such as video denoising, image stabilization, unsharp masking, and super-resolution.[ citation needed ]
Several articles provide an overview of the modules involved in the development of video analytic applications. [7] [8] This is a list of known functionalities and a short description.
Function | Description |
---|---|
Dynamic masking | Blocking a part of the video signal based on the signal itself, for example because of privacy concerns. |
Flame and smoke detection | IP cameras with intelligent video surveillance technology can be used to detect flame and smoke in 15–20 seconds or even less because of the built-in DSP chip. The chip processes algorithms that analyzes the videos captured for flame and smoke characteristics such as color chrominance, flickering ratio, shape, pattern and moving direction. |
Egomotion estimation | Egomotion estimation is used to determine the location of a camera by analyzing its output signal. |
Motion detection | Motion detection is used to determine the presence of relevant motion in the observed scene. |
Shape recognition | Shape recognition is used to recognize shapes in the input video, for example circles or squares. This functionality is typically used in more advanced functionalities such as object detection. |
Object detection | Object detection is used to determine the presence of a type of object or entity, for example a person or car. Other examples include fire and smoke detection. |
Recognition | Face recognition and Automatic Number Plate Recognition are used to recognize, and therefore possibly identify, persons or cars. |
Style detection | Style detection is used in settings where the video signal has been produced, for example for television broadcast. Style detection detects the style of the production process. [9] |
Tamper detection | Tamper detection is used to determine whether the camera or output signal is tampered with. |
Video tracking | Video tracking is used to determine the location of persons or objects in the video signal, possibly with regard to an external reference grid. |
Video error level analysis | Video scene content tamper analysis using free software. Video Error level analysis (VELA) |
Object co-segmentation | Joint object discovery, classification and segmentation of targets in one or multiple related video sequences |
VCA is a relatively new technology, with numerous companies releasing VCA-enhanced products in the mid-2000s. [10] [11] [12] While there are many applications, the track record of different VCA solutions differ widely. Functionalities such as motion detection, people counting and gun detection are available as commercial off-the-shelf products and believed to have a decent track-record (for example, even freeware such as dsprobotics Flowstone can handle movement and color analysis). In response to the COVID-19 pandemic, many software manufacturers have introduced new public health analytics like face mask detection or social distancing tracking. [13] [14] [15]
In many domains VCA is implemented on CCTV systems, either distributed on the cameras (at-the-edge) or centralized on dedicated processing systems. Video Analytics and Smart CCTV are commercial terms for VCA in the security domain. In the UK the BSIA has developed an introduction guide for VCA in the security domain. [16] In addition to video analytics and to complement it, audio analytics can also be used. [17]
Video management software manufacturers are constantly expanding the range of the video analytics modules available. With the new suspect tracking technology, it is then possible to track all of this subject's movements easily: where they came from, and when, where, and how they moved. Within a particular surveillance system, the indexing technology is able to locate people with similar features who were within the cameras’ viewpoints during or within a specific period of time. Usually, the system finds a lot of different people with similar features and presents them in the form of snapshots. The operator only needs to click on those images and subjects which need to be tracked. Within a minute or so, it's possible to track all the movements of a particular person, and even to create a step-by-step video of the movements.
Kinect is an add-on peripheral for the Xbox 360 gaming console that uses VCA for part of the user input. [18]
In retail industry, VCA is used to track shoppers inside the store. [19] By this way, a heatmap of the store can be obtained, which is beneficial for store design and marketing optimisations. Other applications include dwell time when looking at a products and item removed/left detection.
The quality of VCA in the commercial setting is difficult to determine. It depends on many variables such as use case, implementation, system configuration and computing platform. Typical methods to get an objective idea of the quality in commercial settings include independent benchmarking [20] and designated test locations.
VCA has been used for crowd management purposes, notably at The O2 Arena in London and The London Eye.
Police and forensic scientists analyse CCTV video when investigating criminal activity. Police use software, such as Kinesense, which performs video content analysis to search for key events in video and find suspects. Surveys have shown that up to 75% of cases involve CCTV. Police use video content analysis software to search long videos for important events. [21] [22]
Video content analysis is a subset of computer vision and thereby of artificial intelligence. Two major academic benchmark initiatives are TRECVID, [23] which uses a small portion of i-LIDS video footage, and the PETS Benchmark Data. [24] They focus on functionalities such as tracking, left luggage detection and virtual fencing. Benchmark video datasets such as the UCF101 [25] enables action recognition researches incorporating temporal and spatial visual attention with convolutional neural network and long short-term memory. Video analysis software is also being paired with footage from body-worn and dashboard cameras in order to more easily redact footage for public disclosure and to identify events and people in videos. [26]
The EU is funding a FP7 project called P-REACT [27] to integrate video content analytics on embedded systems with police and transport security databases. [28]
Artificial intelligence for video surveillance utilizes computer software programs that analyze the audio and images from video surveillance cameras in order to recognize humans, vehicles, objects and events. Security contractors program is the software to define restricted areas within the camera's view (such as a fenced off area, a parking lot but not the sidewalk or public street outside the lot) and program for times of day (such as after the close of business) for the property being protected by the camera surveillance. The artificial intelligence ("A.I.") sends an alert if it detects a trespasser breaking the "rule" set that no person is allowed in that area during that time of day.
Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm. Physical security involves the use of multiple layers of interdependent systems that can include CCTV surveillance, security guards, protective barriers, locks, access control, perimeter intrusion detection, deterrent systems, fire protection, and other systems designed to protect persons and property.
Closed-circuit television (CCTV), also known as video surveillance, is the use of closed-circuit television cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly transmitted, though it may employ point-to-point, point-to-multipoint (P2MP), or mesh wired or wireless links. Even though almost all video cameras fit this definition, the term is most often applied to those used for surveillance in areas that require additional security or ongoing monitoring.
Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing, or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception.
Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizations, but it may also be carried out by corporations. Depending on each nation's laws and judicial systems, the legality of and the permission required to engage in mass surveillance varies. It is the single most indicative distinguishing trait of totalitarian regimes. It is often distinguished from targeted surveillance.
A facial recognition system is a technology potentially capable of matching a human face from a digital image or a video frame against a database of faces. Such a system is typically employed to authenticate users through ID verification services, and works by pinpointing and measuring facial features from a given image.
Professional video over IP systems use some existing standard video codec to reduce the program material to a bitstream, and then to use an Internet Protocol (IP) network to carry that bitstream encapsulated in a stream of IP packets. This is typically accomplished using some variant of the RTP protocol.
Automatic number-plate recognition is a technology that uses optical character recognition on images to read vehicle registration plates to create vehicle location data. It can use existing closed-circuit television, road-rule enforcement cameras, or cameras specifically designed for the task. ANPR is used by police forces around the world for law enforcement purposes, including checking if a vehicle is registered or licensed. It is also used for electronic toll collection on pay-per-use roads and as a method of cataloguing the movements of traffic, for example by highways agencies.
Axis Communications AB is a Swedish manufacturer of network cameras, access control, and network audio devices for the physical security and video surveillance industries. Since 2015, it operates as an independent subsidiary of Canon Inc.
A closed-circuit television camera is a type of surveillance camera that transmits video signals to a specific set of monitors or video recording devices, rather than broadcasting the video over public airwaves. The term "closed-circuit television" indicates that the video feed is only accessible to a limited number of people or devices with authorized access. Cameras can be either analog or digital. Walter Bruch was the inventor of the CCTV camera.
The following outline is provided as an overview of and topical guide to computer vision:
An Internet Protocol camera, or IP camera, is a type of digital video camera that receives control data and sends image data via an IP network. They are commonly used for surveillance, but, unlike analog closed-circuit television (CCTV) cameras, they require no local recording device, only a local area network. Most IP cameras are webcams, but the term IP camera or netcam usually applies only to those that can be directly accessed over a network connection.
Automatic number plate recognition (ANPR) is a technology for automatically reading vehicle number plates. The Home Office states ANPR is used by law enforcement agencies in the United Kingdom to help detect, deter and disrupt criminality including tackling organised crime groups and terrorists.
Physical security information management (PSIM) is a category of software that provides a platform and applications created by middleware developers, designed to integrate multiple unconnected security applications and devices and control them through one comprehensive user interface. It collects and correlates events from existing disparate security devices and information systems to empower personnel to identify and proactively resolve situations. PSIM integration enables numerous organizational benefits, including increased control, improved situation awareness and management reporting. Ultimately, these solutions allow organizations to reduce costs through improved efficiency and to improve security through increased intelligence.
INDECT is a research project in the area of intelligent security systems performed by several European universities since 2009 and funded by the European Union. The purpose of the project is to involve European scientists and researchers in the development of solutions to and tools for automatic threat detection through e.g. processing of CCTV camera data streams, standardization of video sequence quality for user applications, threat detection in computer networks as well as data and privacy protection.
The Domain Awareness System is the largest digital surveillance system in the world as part of the Lower Manhattan Security Initiative in partnership between the New York Police Department and Microsoft to monitor New York City. It allows the NYPD to track surveillance targets and gain detailed information about them, and is overseen by the counterterrorism bureau.
Avigilon is a Canadian subsidiary of Motorola Solutions, which specializes in the design and development of video analytics, network video management software, surveillance cameras, and access control products.
Pelco Incorporated is an American security and surveillance technologies company. Founded in 1957 and headquartered in Fresno, California, Pelco is a wholly owned subsidiary of Motorola Solutions. The company's products include security cameras, recording and management systems, and video analytics software.
Mass surveillance is the pervasive surveillance of an entire or a substantial fraction of a population. Mass surveillance in India includes Surveillance, Telephone tapping, Open-source intelligence, Lawful interception, and surveillance under Indian Telegraph Act, 1885.
Artificial intelligence for video surveillance utilizes computer software programs that analyze the audio and images from video surveillance cameras in order to recognize humans, vehicles, objects, attributes, and events. Security contractors program the software to define restricted areas within the camera's view and program for times of day for the property being protected by the camera surveillance. The artificial intelligence ("A.I.") sends an alert if it detects a trespasser breaking the "rule" set that no person is allowed in that area during that time of day.
Kinesense is computer vision and video analytics company based in Dublin, Ireland. The company is one of largest suppliers of computer vision products to the UK police, who use the technology to search CCTV content in the course of criminal investigations.