Www.axis.com Video analytics and security Philip Siow Senior Consultant South Asia Pacific.
Transcript of Www.axis.com Video analytics and security Philip Siow Senior Consultant South Asia Pacific.
www.axis.com
Video analytics and security
Philip Siow
Senior Consultant South Asia Pacific
www.axis.com
> The market is moving towards digital
> From CCTV to IP/Digital Surveillance
> From closed to open
> From fixed to flexible and scalable
> From security to secure intelligence
> From surveillance to
What is video surveillance today?
The future is information!
information
www.axis.com
Recognition
What is your surveillance need?
Detection Identification
3 Pixels 16 Pixels
? ?80 Pixels
?
www.axis.com
Resolution - Exposure - Shadows - Proportions
Can you recognize this face ?
www.axis.com
Fine Details8 pixels 64 pixels
Know your application demands!
www.axis.com
Demand for Automation & Analytics> Easy to install, configure and use Easy to manage, integrate and support A processor that meets the algorithm calculation
www.axis.com
> The image chip is the core component in a network camera or video encoder
– Axis ARTPEC is optimized for surveillance demands and usage
– Surveillance industry’s most advanced single-chip solution
– Image processing power for superior image quality
The core component in video surveillance products
7
www.axis.com
0
2040
6080
100
120140
160
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
Mp
ixel
/sec
3x the performance (60 Mpixel/second)
www.axis.com
License plate - 120m (394 ft) 35x optical zoom (15px)
www.axis.com
Axis Camera Application Platform
COMPATIBLEAPPLICATION
Axis network cameraor video encoder
AXIS CameraApplication Platform
COMPATIBLEAPPLICATION
COMPATIBLEAPPLICATION
Detection CountingRecognitionUnique IP video product meeting specific
end user needs!
www.axis.com
> Tampering alarms
> Tripwire or Cross Line detection
> Loitering detection
> Tailgating detection
> Counter-flow detection
> Left luggage detection
> Crowd detection
> Car pulled off the road
> Car made illegal U-turn
Examples of intelligent applications
www.axis.com
Securing Your Network Video
www.axis.com
Overview
> How do we achieve security?– System Design
– Secure the content
– Secure the environment
– Authenticate users and devices
www.axis.com
Securing the content
> Watermarking
> Digital signature cryptography
> Use to authenticate users
www.axis.com
Encryption of data – SSL/TLS
Encryption:
Uses an algorithm or cipher to scramble data which makes it unreadable to everyone except the recipient
>The most common way to secure content is using SSL/TLS encryption
>This runs ”on top” of TCP/IP
>When HTTP is secured it is referred to as HTTPS
> Commonly used in e-commerce applications, such as E-banking
> Prevents eavesdropping, tampering, and message forgery from man-in-the-middle attacks
www.axis.com
Camera - HTTPS and network video
> Use HTTPS for managementon public or semi-public networks
> Below are the settings on the camera
www.axis.com
Camera - WLAN/Camera configuration
SSID (Name of the WLANs) (Master) or Ad-hoc
Security: WEP, WPA/WPA2-PSK or WPA/WPA2-Enterprise
www.axis.com
Environment - Virtual Private Network (VPN)
> A virtual private network (VPN) uses an encryption protocol to provide a secure tunnel over unsecure networks, through which data can be safely transferred.
www.axis.com
Failover recording
> Temporary storing recordings on local SD card when network is disconnected
> Using Local Storage API together with extensions to the RTSP API
> Available for models supporting local storage
www.axis.com
Thank you!network video
innovation
glob
al
HD
TV
part
ner
netw
ork
leader
camera
protect
outdoor
image usability
leader
safe
ther
mal
easy installation
inte
llige
nt
open
integrationease of use
competence
megapixel
environment
worldwide
H.264
focus
Axis
video encoder
conv
erge
nce
Get the Axis picture. Stay one step ahead.