Beruflich Dokumente
Kultur Dokumente
Video Perimeter
Application Paper
SIA Standards Perimeter Security Subcommittee
Table of Contents
Acknowledgements ............................................................................................................... 3
Section 1: Goal Definition ...................................................................................................... 4
Section 2: Detection System Performance Evaluation ............................................................ 9
Section 3: Assessment Camera Performance Validation ....................................................... 14
Section 4: Integrated Video System Considerations .............................................................. 17
SIA Standards would like to thank the following individuals for their contributions to this application
paper and their participation in the SIA Standards Perimeter Security Subcommittee.
© 2015, Security Industry Association. All rights reserved. Except as expressly granted by the Security
Industry Association, no other implied or express license or right is made or granted by Security Industry
Association to this work. Moreover, the documentation cannot be used, displayed, excerpted, modified,
distributed, or offered for resale or use, without the prior written consent of the Security Industry
Association.
Video Perimeter Security Application Paper 3
Section 1: Goal Definition
High-profile security breaches around the world highlight the need for accurate, dependable video
perimeter systems to protect critical assets. Perimeters are the first line of defense for protection of
people, facilities and assets; any threat that is eliminated or mitigated at the perimeter no longer poses
a threat inside a facility.
Video perimeter systems combine the strengths of machines and people. Upon detection, cameras are
able to “see” what is happening over site perimeters, and people, when armed with accurate
information, can make fast and appropriate response decisions. In order to do this in the most effective
way, it is important to follow best practices of site design and camera deployment. This document is
intended to assist with these important tasks.
1.1
Before engaging in a video deployment for a large, outdoor perimeter it is important to define the
detection, identification, and operational requirements of the site. In some cases these requirements
may already be defined. In certain industries such as nuclear, there are numerous safety and security
standards that are required by regulation. In many other industries there are public safety codes that
should be followed and must inform the security decisions. A map of the site which includes a bird’s eye
view of the perimeter to be secured and immediate surroundings is highly recommended. This view
gives the best canvas to model field of views from devices. A Security Plan which details the steps to
follow for alarm response should also be clearly defined.
Most commercially available devices should be able to detect objects of these sizes, however factors
such as camouflaging and speed of approach must be taken into account when selecting a device.
Devices must be able to deliver enough pixels on target at or before a critical range to detect the
presence or motion of these common object types.
The answers to these questions will determine the device needed to provide enough pixels on target at
the critical range to recognize or identify the target. The most common measure of “detectability” for
video surveillance is the Johnson Criteria which defines the number of pixels on target required based
on the approximate dimensions of an object. While models such as the Johnson Criteria have been
established to assist with determining range, they primarily refer to the detection limit of the image
sensor within the camera. Later, we will discuss the Johnson Criteria as it compares to the distance an
automated camera can detect motion of security relevance.
Figure 1.2 Johnson Criteria – Pixels on Target for Detection, Recognition and Identification
The Security Plan should dictate the type of system need although finer details can also be created in
tandem with the system install. The philosophy should detail at the very least:
What are the different alert types? (e.g. critical, of interest, normal behavior, nuisance)
What are the different alert responses (alarm, perimeter fortification, deployment of guards,
clear/override)?
Natural lighting considerations such as the position of the sun in relation to target approaches can
greatly reduce the functional range of detect of surveillance equipment when operating in the visible
spectrum. Long wave infrared Thermal (LWIR) cameras can help manage these situations assuming they
are optimized for 24 hour use through image processing.
Moreover geographical constrains such as terrain, bodies of water or natural occlusions can negatively
affect the stated detection performance of a device in experimental conditions. It is strongly
recommended that these uncontrollable environmental factors are considered when selecting devices,
determining detection ranges for the system and determining camera placement.
Additionally, there are site-generated obscurants that may be able to be controlled such as steam,
smoke and glare – common elements in industrial facilities.
Prior to performance validation, detailed maps and/or diagrams of the system installation and coverage
areas should be available. Diagrams of the installation should include all infrastructure associated with
the system including but not limited to mounting structures, brackets, height, and direction (N, S, E, W).
Coverage area maps should document known blind spots, existing structures, ground cover and natural
reference points. Markers should be installed at designated locations to identify start and/or stop points
for the validation scenarios (i.e. the system detection area covers 2,000’ so markers are placed every
500’ to establish zones for conducting the performance tests).
During the performance validation, the following factors should be considered for human detection:
Pace: Faster than normal (run), normal (walk), slower than normal (slow walk)
minimum
Faster than
90° angle midway
normal
maximum
minimum
Straight toward
midway
camera
maximum
Upright
minimum
None
Normal 90° angle midway
maximum
minimum
maximum
minimum
Slower than
Belly crawl 90° angle
normal
maximum
A stated in the goal definition, there are a number of environmental factors that will affect the detection
performance of the system. Some can be controlled and others cannot. Weather, for example, can
cause the detection ranges of certain devices to decline. Rainfall, snow and fog are direct obscurants
while wind can affect both the stability of the device and its components and interact with other
Moreover, there are site-generated obscurants that may be able to be controlled such as steam, smoke
and glare – common elements in industrial facilities. It is recommended that these types of obscurants
be directed away from fields of view when possible. Good perimeter maintenance such as pruning of
foliage and removal of waste and clutter can help to ensure clear sight of intrusions. Another way to
ensure devices perform as expected is proper mounting and stabilization considerations. Devices should
be mounted and housed in such a way that external factors such as weather and birds cannot
manipulate them.
To provide complete coverage, each camera must overlap and include the blind spot of the camera in
front of it. All effective perimeter security systems should be designed with such a “zero blind spot”
approach.
An automated video intrusion system operates by detecting targets that move into a camera’s detection
area. The installer should test to determine the system’s true detection distances in order to design a
dependable system with no coverage gaps.
Every camera has a specific field of view which is determined by its lens. Visible cameras typically offer a
variable lens which can be zoomed or widened in the field. Most thermal cameras have a fixed lens and
specific field of view. When using automated cameras with fixed lenses, it is important to place the
camera along the perimeter system to detect intruders within the camera’s capable field of view. Some
manufacturers offer web-based tools that are able to assist lens selection and camera placement along
the perimeter to avoid gaps.
2.4.5 Approaches
Targets can approach a camera directly or across its field of view. Targets which come straight toward
an automated camera generate the least motion and are the hardest to detect. For this reason, it is
important to follow the guidance under Detection Range to determine the automated system’s inbound
detection distance.
While models such as the Johnson Criteria have been established to assist with determining range, they
primarily refer to the detection limit of the image sensor within the camera. Real-world security
applications are based on automated detection range, which is defined as the ability of an automated
camera to detect motion of security relevance (usually people or vehicles), while ignoring other motions
such as blowing debris and foliage. Such automated detection requires more than the < 2 pixels of
movement prescribed by the Johnson criteria.
For real-world automated detection applications, use the following recommended target sizes for each
scenario at a minimum of 24 pixels:
Sometimes, a target might be partially occluded by objects in the camera’s field of view. For instance,
you may need to detect a person passing on the other side of a low wall which is half a person’s height,
Prior to performance validation, detailed maps and/or diagrams of the system installation and coverage
areas should be available. Diagrams of the installation should include all infrastructure associated with
the system including but not limited to mounting structures, brackets, height, and direction (N, S, E, W).
Coverage area maps should document known blind spots, existing structures, ground cover and natural
reference points. Markers should be installed at designated locations to identify start and/or stop points
for the validation scenarios (i.e. the system detection area covers 2,000’ so markers are placed every
500’ to establish zones for conducting the performance tests).
Sufficient detail and clarity is available to determine if a human-sized target is determined to be a threat
or non-threat based on the type of clothing worn, equipment carried and/or other contextual clues. All
properties of Detection- and Recognition-level imaging still apply. Additionally, body movements,
different uniform types, and the presence of headgear, backpacks or other objects can be determined.
Sufficient detail and clarity is available to allow for an already familiar human-sized target to be
determined as a specific individual. All properties of Detection-, Recognition- and Identification-level
images still apply. Additionally, the target’s type of headgear can be distinguished (e.g. bicycle helmet
or soldier’s helmet), and specific objects on the body can be determined (weapons, phones, etc.).
During the day, capturing usable images requires appropriate camera and lens to the desired number of
pixels on target. As long as the camera and lens are property set up and in good working condition, the
In addition to the challenges of daytime video surveillance, light on target is the most obvious influence
on nighttime image quality. Video noise is the limiting factor for nighttime video imaging. Visible
cameras have built-in image optimization (frame integration, AGC) that will try to produce a minimum
image brightness. If the video signal isn't high enough, the camera will increase gain to make the image
brighter, but does so at the expense of image detail due to increased noise. Thermal cameras are not
affected by these concerns but will not provide the necessary detail for identification. For a given
camera and lens combination, there is a direct relationship between the amount of illumination on
target and video image quality that can be used to predict imaging performance at night.
Being too rigid on geometry alone doesn’t address the real world needs of assessment. Pixels on target
alone is actually a low-level way to derive assessment. Aspect Ratio may be the first thing people use to
assess a target, which does not have a lot to do with pixels on target. If we’re talking about visible light
cameras, things that will challenge a visible light camera will be different than with a thermal camera.
Resolution as required by the system primary function should be measured in pixels per foot (ppf). The
pixels per foot calculation should be derived for both horizontal and vertical pixels and is equal to the
imager’s pixel dimensions divided by the corresponding field of view linear dimension (feet).
The use of video cameras and encoding technology with built-in pixel counting should be considered as
an enhancement to the design process, measurement, and verification of pixels on target.
The size of the object(s) in the scene content should be considered in the design of the system and
related to the systems primary function. Smaller objects should require more optical zoom or higher
resolution image capture assuming sufficient lighting. HDTV video cameras should be required in
systems where the object(s) of interest occupy 10 percent or less of the vertical field of view. Refresh or
display rate in frames or images per second (fps) for the assessment function should be matched for the
target velocity with faster targets requiring a higher frame rate.
The display rate for the assessment function should be matched to the percentage that the object(s) of
interest occupy within the field of view, together with the object’s speed and trajectory.
3.4 Positioning
Device placement is critical for successful identification as it ensures that persons or objects are
captured at a favorable angle. If, for example, cameras are placed high above the ground, images will
Video Perimeter Security Application Paper 15
have a birds-eye-view perspective, making objects distorted and difficult to assess. Devices should be
firmly fixed in order to minimize blur and vibrations caused by camera movement.
Stability can be challenging if the camera is mounted on a tall pole and you are using a zoom lens with a
long focal length. Then, even small vibrations will translate to large movements in the resulting image.
3.5 Illumination
Lighting level should be considered in the assessment system design process. The ability for the
assessment device to render images that match the primary function should be considered. Lighting is
measured as reflected and the scene environment should be considered, together with the scene’s light
sources. The performance of the assessment device to produce suitable images should be measured
through site testing with actual test objects or test charts to include but not limited to ISO 12233 Digital
Imaging Test Chart, ISO Camera Test Charts, and ACCU CHART HDTV Test Chart (below).
Perimeter surveillance cameras located in areas such as airports must be able to detect and analyze a
vehicle or a person in an unauthorized location, and notify airport law enforcement. Although these
cameras are not actively observed, video analytics within the camera and at a VMS provided a real-time
notification of a possible threat.
The requirements for a complete Video Surveillance System for a large perimeter may include:
Lighting: existing, with specific improvements for higher traffic or known points of access with
white LED fixtures; or thermal cameras which are unaffected by lighting can be used
Source: Camera with built-in removable storage, continuous secondary recording in the event of
infrastructure outage
Rules Engine: to trigger alerts and create event files, typically provided by a VMS
Storage: local Network Attached Storage (NAS) or Cloud Storage if allowed by site policy.
Display: Command Center Display array controlled directly by the system’s rules engine or
Physical Security Information Management (PSIM) gateway application; mobile appliances with
smart transcoding.
Current evolving capabilities which further extend the security framework of the network infrastructure
components to the system include creating a “trust model”, or high assurance identity and access
control framework that use a security technique known as public key infrastructure, or (PKI) to
implement cryptographic requirements for authenticating Non-Person Entities (NPEs) such as cameras
or other sources. , Through PKI, video is encrypted during transmission over fixed and wireless networks,
as well as stored in mobile, network attached, or cloud hosted storage repositories.
4.2.4 Compression
Advanced video solutions are enabled through the increasing efficiency of network camera compression
schemes. Video compression in modern networked video cameras is performed using either h.264 or
Motion JPEG codecs.
The latest iteration of MPEG-4—MPEG-4 Part 10, h.264 or the Advanced Video Codec (AVC)—is the
most efficient commonly used compression technology to date. To view compressed video, it is
necessary to decode it. Fixed and mobile devices today typically decode h.264 video streams.
Previously thought to be too complex and processor intensive, h.264 decoding is now so common that
the designer has the choice of using software or hardware decoders, allowing DMC to be viewed
everywhere there is internet or network connectivity. The next generation of this compression
specification h.265 has recently been developed and device manufacturers are in the beginning stages
of implementing them into commercially available products.
Visual Deterrents – Visual deterrents such as signage, lights, and even placing cameras in the
sightline of threats can be a visual deterrent; however it is always recommended that all cameras
are functional.
Physical Deterrents – Barriers, bollards, gates, fences and locks are the traditional physical
deterrents that prevent breach. These should always be used and operational.