Presentation on theme: "Www.axis.com Video analytics and security Philip Siow Senior Consultant South Asia Pacific."— Presentation transcript:
Video analytics and security Philip Siow Senior Consultant South Asia Pacific
>T>The market is moving towards digital >F>From CCTV to IP/Digital Surveillance >F>From closed to open >F>From fixed to flexible and scalable >F>From security to secure intelligence >F>From surveillance to What is video surveillance today? The future is information! information
Recognition What is your surveillance need? DetectionIdentification 3 Pixels16 Pixels ? ? 80 Pixels ?
Resolution - Exposure - Shadows - Proportions Can you recognize this face ?
Fine Details 8 pixels64 pixels Know your application demands!
Demand for Automation & Analytics > Easy to install, configure and use Easy to manage, integrate and support A processor that meets the algorithm calculation
>The image chip is the core component in a network camera or video encoder –Axis ARTPEC is optimized for surveillance demands and usage –Surveillance industrys most advanced single-chip solution –Image processing power for superior image quality The core component in video surveillance products 7
Mpixel/sec 3x the performance (60 Mpixel/second)
Axis Camera Application Platform COMPATIBLE APPLICATION Axis network camera or video encoder AXIS Camera Application Platform COMPATIBLE APPLICATION Detection Counting Recognition Unique IP video product meeting specific end user needs!
>Tampering alarms >Tripwire or Cross Line detection >Loitering detection >Tailgating detection >Counter-flow detection >Left luggage detection >Crowd detection >Car pulled off the road >Car made illegal U-turn Examples of intelligent applications
Securing Your Network Video
Overview >How do we achieve security? –System Design –Secure the content –Secure the environment –Authenticate users and devices
Securing the content >Watermarking >Digital signature cryptography >Use to authenticate users
Encryption of data – SSL/TLS Encryption: Uses an algorithm or cipher to scramble data which makes it unreadable to everyone except the recipient >The most common way to secure content is using SSL/TLS encryption >This runs on top of TCP/IP >When HTTP is secured it is referred to as HTTPS >Commonly used in e-commerce applications, such as E-banking >Prevents eavesdropping, tampering, and message forgery from man-in-the-middle attacks
Camera - HTTPS and network video >Use HTTPS for management on public or semi-public networks >Below are the settings on the camera
Camera - WLAN/Camera configuration SSID (Name of the WLANs) (Master) or Ad-hoc Security: WEP, WPA/WPA2-PSK or WPA/WPA2-Enterprise
Environment - Virtual Private Network (VPN) >A virtual private network (VPN) uses an encryption protocol to provide a secure tunnel over unsecure networks, through which data can be safely transferred.
Failover recording >Temporary storing recordings on local SD card when network is disconnected >Using Local Storage API together with extensions to the RTSP API >Available for models supporting local storage
Thank you! network video innovation global HDTV partner network leader camera protect outdoor image usability leader safe thermal easy installation intelligent open integration ease of use competence megapixel environment worldwide H.264 focus Axis video encoder convergence Get the Axis picture. Stay one step ahead.