There is no custom code to display.

Columns

Deep Learning to the Rescue

by Ray Bernard PSP, CHS-III

May-Jun 2019

This question about video analytics touches on an area where Deep Learning is making a real impact: security video analytics.

Q:        I keep reading that today’s video analytics are much more accurate – such as 95 percent versus 75 percent – than they were just five years ago. Has there been a change in the related science?

A:        Video analytics has significantly improved due impacts of two categories of Artificial Intelligence (AI): Machine Learning and Deep Learning.

Artificial Intelligence (AI) is an area of computer science that is more than 50 years old and that is now on the steep upward end of its exponential growth curve due to the billions of dollars of annual R&D investment and the massive computing capabilities that can be applied to it. One area of AI advancement is deep learning, which is a category of machine learning, which is the science of getting computers to perform actions without specifically being programmed to do so.

For example, machine learning software for email spam filtering would be “trained” on recognizing spam by being fed thousands of emails labeled either as spam or not spam, and the software would analyze each email and determine from those examples how to identify spam.

Deep learning is a type of machine learning that involves artificial neural networks, whose designs are inspired by the way that scientists believe the brain works. A neural network is built from pieces of software called “nodes”, which are organized into layers. Each layer performs a step in the processing, passing along its results from one layer to the next. Deep learning software typically contains three parts: an input layer, hidden layers, and an output layer. Hidden layers are so named because there are no connections to them from the neural network’s input and output interfaces.

For example, an object detection neural network may have the following layers: input layer (contains a still image of a scene), hidden layers (detect moving object, detect object parts, classify object parts, classify object) output layer (provide information on an object).

For bicycle detection, let’s say that the layer for “detected object parts” identifies wheels, handlebars, frame and cyclist. The layer for “classify object parts” differentiates between a bicycle wheel and a motorcycle wheel. The layer for “classify object” concludes it’s a bicycle, not a motorcycle.

How many hidden layers there are depends upon how challenging the various steps to object recognition are and how much software is required for each step. What if a cyclist’s backpack must be detected? What about a second rider on the bicycle? Do colors matter? Does object speed matter?

The term “deep” refers to neural network software that has many hidden layers, the number of layers determining the depth. A simple neural network has one or two hidden layers between the input and output layers; three or more hidden layers makes it a deep learning neural network.

The Value of Deep Learning

One purpose of machine learning is to perform information processing better, faster and/or cheaper than a human. Being better relates not just to task accuracy, but to bigger picture aspects as well. Can a robot perform inspections as well as a human in areas where environmental hazards pose a human life safety risk? In such a case, being close to human performance ultimately has a benefit of saving lives.

Machine Learning Increases Performance

I researched video analytics advances in 2016 and wrote a technical paper for the Security Industry Association titled, “The State of Security Video Analytics” (https://bit.ly/advanced-security-video-analytics). This paper explains, with illustrations, how machine-learning video analytics software creates data models of the cameras’ fields of view, and updates them in real time, building on what it has learned. Recording based on motion detection, for example, has always been a challenge for outdoor cameras. It required manually creating motion masks in the configuration of the camera or video management system to block out the parts of the field of view where clouds or trees would create irrelevant motion.

This approach doesn’t work if the moving parts of the scene are behind moving people or vehicles because those are areas of interest and masking them off defeats the purpose of the camera. Motion masks can’t address rain or snow. However, the new generation of smart analytics can distinguish between clouds, trees, and relevant foreground motion, using machine learning to do so no motion masks or special configuration is required. The analytics are self-configuring.

Deep Learning Tops All Previous Performance

In 2018, breakthroughs in deep learning began appearing in security video analytics, with accuracy rates between 95 percent and 98 percent. Much of the information available on the web regarding deep learning almost immediately does a deep dive into “neural networks.”

These new analytics are working so well for most applications, not only are vendors willing to talk about their accuracy rates and success stories, but they are also willing to discuss the applications and conditions where the accuracy rates fall below 95 percent. One explanation is, that level of accuracy is not always needed. Another is that security video analytics had an early disappointing history and the analytics vendors don’t want that to happen again.

How to Manage High-Camera-Count Deployments

How to Manage High-Camera-Count Deployments

Most organizations with large numbers of cameras can’t keep up without incurring a huge labor cost that’s out of proportion to the cost of the camera system. It’s typically been a lost cause. Now, however – if you have AXIS cameras with firmware 4.40 or later, you can use the newly-released free AXIS Device Manager software.
Technology Lifecycle Management

Technology Lifecycle Management

IT has practiced technology lifecycle management for decades, under various names like product lifecycle management and systems lifecycle management. Compared to IT, the physical security industry has paid little attention to the management of deployed products and systems, which is why security practitioners as periodically asked questions like this one by their organization’s IT group.
Cyber Security Profiles for Physical Security Systems

Cyber Security Profiles for Physical Security Systems

Over the past year, news media have covered several major cyberattacks on Internet-connected video security cameras and recording systems. This has many corporate IT departments concerned about the vulnerabilities of networked electronic physical security systems, especially video camera systems.
Security Design Conference for Consultants and Engineers

Security Design Conference for Consultants and Engineers

Long overdue, there is finally a security event where security design consultants and engineers can put their heads together with leading manufacturers, to address security design challenges and get up-to-date on the details of security technology innovation, as well technology current and future directions.
Project Management for the 21st Century

Project Management for the 21st Century

Electronic physical security systems are built using information technology. So, an IT project manager with an excellent track record would seem to be in a good position to manage a physical security system deployment project. However, the reality is that for many physical security system projects, especially those that are large or complex, it takes industry-specific knowledge to successfully apply project management skills during project planning and deployment.
Addressing Corporate Liabilities of Sharing Security Video

Addressing Corporate Liabilities of Sharing Security Video

In our September/October issue’s column, “What Are the Risks Involved in Sharing Video?”, we looked at some practical reasons for providing other business units with access to security video, and what risks can be involved. This column addresses issues of corporate liability, and presents some measures that can be used to mitigate those risks.
What are the Risks Involved in Sharing Video?

What are the Risks Involved in Sharing Video?

This question came from a security manager at a manufacturing plant, who several years ago added cameras to the facility’s security surveillance system to support safety, manufacturing and quality investigations. The new video coverage saves more than $100K each year in eliminating product run discards, has helped improve training, and has documented false injury claims—also saving money and avoiding adverse publicity.
IT and Security Robotics

IT and Security Robotics

Based upon this reader’s question, it looks like the word is starting to get out about the usefulness of using unmanned ground vehicles (UGVs) for security patrols and inspections.