|By Business Wire||
|April 14, 2014 10:40 AM EDT||
Canadians are hooked on crime dramas, and some shows are so convincing that our perception of what forensic technology can do has been skewed – especially when it comes to video surveillance.
According to a survey by Leger* for Axis Communications, the global leader in network video surveillance, 68% of Canadians said they watch crime dramas like CSI, Criminal Minds, Castle and Law and Order. Of those surveyed, most believe image enhancement techniques and intelligent software are readily available to help law enforcement easily identify suspects. Yet nearly 75% of surveillance cameras sold worldwide today remain analog (IHS Research), which is why security video often shown on the evening news is grainy and of poor quality, making identification difficult.
Key findings of the survey include:
- 71% of Canadians think recorded surveillance footage can be enhanced in a lab using software.
- Most Canadians have very little idea how long surveillance video is generally stored, with 27% admitting they have no idea and 26% believing video is stored indefinitely.
- Three-quarters of Canadians believe facial recognition software can easily pick individual faces out of a crowd for identification, with crime drama fans even more likely to believe this.
“When TV crime technicians produce an accurate photo of a suspect from the reflection off someone’s sunglasses, it makes for good entertainment but it’s not realistic,” said Bob Moore, country manager, Canada, Axis Communications. “IP camera innovations have improved image quality and image usability exponentially, but if police are dealing with low-resolution video common in the real world today, there is nothing that can be done to enhance the image.”
The surveillance industry is currently undergoing a shift from analog CCTV to IP video, with IP cameras expected to begin out-shipping their analog predecessors in 2017. This is because IP video offers much improved functionality closer to the technology shown on TV, including HDTV-quality video, ease-of-use, speed of forensic search, intelligent analytics and low-light recording in color.
Surveillance Cameras: Myths vs. Reality
Myth: Surveillance video quality can be enhanced in a lab using
Reality: “What you see is what you get,” said Moore. “If you don’t start out with high resolution video, enlarging it will result in a bigger, blurrier, more pixelated image. Video clarity cannot be fixed after the fact. As a rule of thumb, an image must supply 80 pixels from ear to ear to ID a face.”
Myth: Surveillance video is stored indefinitely.
Reality: “In Canada, there are no legal guidelines regarding how long surveillance video is stored, but as a general rule 31 days is the average most video is stored before being overwritten. After all, it is data,” said Moore. “In practical terms, it’s really an issue of storage and how much an organization has available to keep. Video that is pulled to be used as evidence in a case, however, could be kept indefinitely.”
Myth: Facial recognition software can pick someone out of a crowd.
Reality: “There have been impressive strides in facial recognition analytics, but it is not as prevalent as TV producers would have you believe. The technology works best in controlled conditions,” said Moore. “Some buildings employ facial recognition software to automatically open doors for authorized people, but the person must look directly into the camera and, most importantly, their faces must be stored on a database for comparison. This is much different than picking a random face out of a moving crowd.”
Myth: Most surveillance is monitored in real time.
Reality: “The opposite is actually true,” said Moore. “Ninety-nine percent of security video is deleted without ever being seen. Of the video that is seen, only one percent of that is viewed live. Most security video is not monitored live by a person because of the expense involved. Thankfully innovations in IP video are moving video surveillance from a forensics-only tool to a proactive one.”
“Today’s IP cameras offer more flexibility and advantages than older analog models and hopefully provide real Canadian crime fighters with the images they need to do their jobs,” said Moore. “While it was good to see that 47% of Canadians do not believe crime dramas provide an accurate depiction of how security equipment is used, one-third still believe these myths to be true. With IP video, we’re vastly ahead of the quality and ability of outdated analog CCTV, but haven’t yet caught up to Hollywood.”
*Editor’s note: A survey of 1,500 Canadians was completed online between October 29 and 31, 2013, using Leger’s online panel, LegerWeb. A probability sample of the same size would yield a margin of error of +/- 2.5%, 19 times out of 20.
About Axis Communications
Axis offers intelligent security solutions that enable a smarter, safer world. As the global market leader in network video, Axis is driving the industry by continually launching innovative network products based on an open platform—delivering high value to its customers and carried through a global partner network. Axis has long-term relationships with partners and provides them with knowledge and ground-breaking network products in existing and new markets.
Axis has more than 1,600 dedicated employees in more than 40
countries around the world, supported by a network of over 60,000
partners across 179 countries. Founded in 1984, Axis is a Sweden-based
company listed on NASDAQ OMX Stockholm under the ticker AXIS.
For more information about Axis, please visit our website www.axis.com.
Chris Van Tuin, Chief Technologist for the Western US at Red Hat, has over 20 years of experience in IT and Software. Since joining Red Hat in 2005, he has been architecting solutions for strategic customers and partners with a focus on emerging technologies including IaaS, PaaS, and DevOps. He started his career at Intel in IT and Managed Hosting followed by leadership roles in services and sales engineering at Loudcloud and Linux startups.
Oct. 8, 2015 08:00 PM EDT Reads: 158
The IoT market is on track to hit $7.1 trillion in 2020. The reality is that only a handful of companies are ready for this massive demand. There are a lot of barriers, paint points, traps, and hidden roadblocks. How can we deal with these issues and challenges? The paradigm has changed. Old-style ad-hoc trial-and-error ways will certainly lead you to the dead end. What is mandatory is an overarching and adaptive approach to effectively handle the rapid changes and exponential growth.
Oct. 8, 2015 08:00 PM EDT
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. Migration to cloud shifts computing resources from your data center, which can yield significant advantages provided that the cloud vendor an offer enterprise-grade quality for your application.
Oct. 8, 2015 08:00 PM EDT Reads: 225
Manufacturing has widely adopted standardized and automated processes to create designs, build them, and maintain them through their life cycle. However, many modern manufacturing systems go beyond mechanized workflows to introduce empowered workers, flexible collaboration, and rapid iteration. Such behaviors also characterize open source software development and are at the heart of DevOps culture, processes, and tooling.
Oct. 8, 2015 08:00 PM EDT Reads: 1,070
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
Oct. 8, 2015 07:30 PM EDT Reads: 167
The APN DevOps Competency highlights APN Partners who demonstrate deep capabilities delivering continuous integration, continuous delivery, and configuration management. They help customers transform their business to be more efficient and agile by leveraging the AWS platform and DevOps principles.
Oct. 8, 2015 07:30 PM EDT Reads: 214
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new da...
Oct. 8, 2015 07:30 PM EDT Reads: 241
As-a-service models offer huge opportunities, but also complicate security. It may seem that the easiest way to migrate to a new architectural model is to let others, experts in their field, do the work. This has given rise to many as-a-service models throughout the industry and across the entire technology stack, from software to infrastructure. While this has unlocked huge opportunities to accelerate the deployment of new capabilities or increase economic efficiencies within an organization, i...
Oct. 8, 2015 07:15 PM EDT Reads: 230
There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting. In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, will show how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants will get the download information, scripts, and complete en...
Oct. 8, 2015 07:15 PM EDT Reads: 255
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at @DevOpsSummit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
Oct. 8, 2015 07:15 PM EDT Reads: 192
Today’s connected world is moving from devices towards things, what this means is that by using increasingly low cost sensors embedded in devices we can create many new use cases. These span across use cases in cities, vehicles, home, offices, factories, retail environments, worksites, health, logistics, and health. These use cases rely on ubiquitous connectivity and generate massive amounts of data at scale. These technologies enable new business opportunities, ways to optimize and automate, al...
Oct. 8, 2015 07:15 PM EDT Reads: 134
Containers are revolutionizing the way we deploy and maintain our infrastructures, but monitoring and troubleshooting in a containerized environment can still be painful and impractical. Understanding even basic resource usage is difficult - let alone tracking network connections or malicious activity. In his session at DevOps Summit, Gianluca Borello, Sr. Software Engineer at Sysdig, will cover the current state of the art for container monitoring and visibility, including pros / cons and li...
Oct. 8, 2015 07:00 PM EDT Reads: 179
Between the compelling mockups and specs produced by analysts, and resulting applications built by developers, there exists a gulf where projects fail, costs spiral, and applications disappoint. Methodologies like Agile attempt to address this with intensified communication, with partial success but many limitations. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a revolutionary model enabled by new technologies. Learn how busine...
Oct. 8, 2015 06:45 PM EDT Reads: 255
IT data is typically silo'd by the various tools in place. Unifying all the log, metric and event data in one analytics platform stops finger pointing and provides the end-to-end correlation. Logs, metrics and custom event data can be joined to tell the holistic story of your software and operations. For example, users can correlate code deploys to system performance to application error codes.
Oct. 8, 2015 06:45 PM EDT Reads: 202