Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

VIDEO SURVEILLANCE: Check the Patterns

By Brooks McChesney
February 6, 2006
Pattern recognition can reach conclusions based on a facility’s video or images from a wider range of captures.


Pattern recognition is one of the best ways to link isolated incidents into a common enterprise. As such systems continue to mature, they will enable the highest levels of security. By capturing, recording and analyzing multiple inputs, pattern recognition software “connects the dots,” so security, law enforcement and first responders not only anticipate, but prevent threatened incidents from occurring.

The evolution of pattern recognition has its roots in the dramatic advances in intelligent video surveillance software.

Historically, there has really only been one basic tool for monitoring security video – the re-wind button. As a result, it’s been primarily restricted to forensic search. Today, intelligent video can provide instantaneous recognition of events as they occur in a single camera view. The next major advancement will come as intelligent video deploys across multiple cameras in a single facility or across multiple enterprises. With this advance, discrete activities will be linked into a common system to detect suspicious patterns of activity.

Value of Pattern Recognition

Examples of various activities that pattern recognition software is uniquely capable of detecting include people repeatedly observed taking pictures of a facility at different times or locations, or the same people making frequent visits in order to track schedules and learn how a particular facility is used and operated.

Pattern recognition provides a strength unique to software – a level of discernment that can identify patterns often overlooked by humans. A simple example is a security officer watching a perimeter at an airport or high rise office building. A car is parked along the fence on a Monday morning, but unless the officer investigates, it’s unknown whether this is an employee on break, just someone watching airplanes take off or a suspicious vehicle. If the same car appears at a different place along the fence on a Wednesday, the same officer may not be on duty, or he or she may not remember it. Even more significant, if the same car appears at the perimeter at other airports in the region, there is little probability that humans would be able to connect the incidents. Software can better identify such connections as a pattern emerges.

Pattern recognition detects repeated elements in two ways: Either the software looks at a number of data points and begins to create its own pattern (as in the case of a car parked multiple times along a fence), or the pattern is identified by an input such as a wiretap which directs the software to look for a particular type of pattern such as repeated visits to a facility by the same group of people. In both approaches, multiple inputs are key.

The purpose is to provide actionable information to help humans respond more rapidly and effectively. The more data points observed, the clearer the pattern becomes. In addition, results from stand-alone sensors such as smoke detectors, biometrics and card readers can be stitched into the framework of video to provide “video plus” awareness.

For example, access denials followed by a tailgating violation in a common zone may indicate that the individual was intentionally trying to evade detection and not just an employee leading a guest into a secure zone. In this way, integration of many inputs into a common data file helps responders quickly ascertain what is occurring, analyze it and take appropriate action.

The U.S. Department of Homeland Security (DHS) has expressed interest in monitoring information from video surveillance cameras installed at airports across the nation to detect patterns on a larger scale. Today, adjacent facilities in high-asset industries such as petrochemical production are beginning to design command and control facilities to share information about events along their common perimeters. Concerns such as suspicious objects left behind, loitering and vehicles improperly parked can be analyzed to comprehend whether an event or incident is happening in more than one location and to differentiate random occurrences from those with an increased level of intent.

This is the power and potential of pattern recognition.

Remote Viewing Goes Intelligent

Pattern recognition is nothing without the ability to collect video and sensor data as well as provide it to security in the field.

One example: Smiths Detection of Pine Brook, N.J., recently acquired LiveWave, a U.S. company that has developed software systems which network large numbers of sensors and video cameras with connections to remote viewing and recording stations. The goal: to fulfill a growing requirement for integrated packages of detection sensors and control systems, managed as a total security solution.

The technology concentrates on enabling security video systems for enterprise-wide network distribution, which is considered a core technology for an increasing number of security applications, notably in the mass transit and event security markets.

Why Network?

Intelligent video can go hand-in-hand with networking.

For almost a decade, enterprise security executives have discussed convergence, the bringing together of the security infrastructure with that of the information technology (IT) department. For many, this simply meant the co-mingling of physical and logical. But, the greater majority saw advantages in a converged system, including increased flexibilities in access to information, ease in distribution and storage of images, scalability and the other advantages such integration brings, according to Robert Siegel, GE, general manager, video and software solutions.

Integration has become vital to success. Siegel reports that, in recent surveys of customers using security equipment, integration is almost always listed as a top priority. Today’s end-users are technology savvy.

In this new world of physical access control and IT convergence, “open” is the operative word. Multi-vendor support is only achievable through the use of IT standards such as XML, TCP/IP, SNMP, LDAP and SMTP. The platform must support commercial off-the-shelf operating systems such as Red Hat Linux and Microsoft Windows in its many flavors, database platforms such as Microsoft SQL Server, MSDE, Informix, IBM DB2 Universal Server and Oracle Server, user directories such as LDAP and MS Active Directory, report generators such as Crystal Reports and common administrative utilities for system backups and fault tolerance. Likewise, it must seamlessly integrate with external applications, such as time and attendance systems, and peripheral devices such as printers.

With such standards, enterprises are able to achieve real time, bi-directional data exchange and actions between security systems and other infrastructure and applications, including their video surveillance, HR and ERP systems.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Brooks McChesney is president and chief executive officer of Vidient Systems, Inc., which designs, develops and deploys behavior recognition software.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Check the Live Video: Georgia Thief Clearly Seen Thanks to College’s IP Camera

    See More
  • Dallas City Hall Invests in a $300,000 Security Makeover: Check the Video

    See More
  • Want Security IP Video Standards? Check out ISC West ONVIF Event

    See More

Related Products

See More Products
  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing