ebook img

CCTV Surveillance. Analog and Digital Video Practices and Technology PDF

646 Pages·2005·22.73 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview CCTV Surveillance. Analog and Digital Video Practices and Technology

Photo Credits Thepublisherandauthorwouldliketothankthelistedmanufacturersforthephotographsusedinthefigures. AcceleElectronics 8-9A,8-9B AllanBroadband 25-14A AmericanDynamics 12-1,17-1E Avida 2-7C,2-7E,2-7G,2-7H,2-16A,2-16B,2-17A,2-17B,2-17C,2-17D,2-17E, 2-17F,4-18A,4-27C,4-27D,4-27E,4-30,4-33A,4-33B,4-36,4-37,4-38,4-40, 15-2A,15-2C,15-8A,15-8C,15-10B,15-12,15-15A,15-15B,16-7,18-5A, 18-6A,18-6B,18-7,18-10,18-11A,18-11B,18-14A,18-14B,18-20A,18-23D, 18-24,19-22A,19-22B,21-2A,21-2B,21-4A,21-4B,21-4C,22-4A,22-4C,22-5, 22-10B,22-10C,22-23A,22-23B,22-25,22-26,22-27 AxisCommunications 5-14B,7-28A,7-34A,7-34B,7-35A,7-35B CBCAmerica 15-9A CanonUSA 4-14A CasioUSA 7-36A Cohu,Inc. 2-10A,2-10F ContropUSA 17-24 COP-USA 18-19B DellStar 6-35A D-Link 7-36B Digispec 13-8A FMSystems 25-13B GlobalSolar 23-11A,23-11C Gossen 25-15A Greenlee 25-21A,25-21B Gyrozoom 4-14B Hitachi 2-26D,17-22A HoneywellSecurity 9-12C,15-2D,15-7D,15-10D,15-13,22-10B ICU 13-8C,13-8D IFS/GESecurity 6-28,6-30 IkegamiElectronics(U.S.A.Inc.) 2-10C,4-38,8-5A IntegralTech 7-36C Intellicom 25-22A,25-22B InternationalFiberSystems 6-28,6-30 Ipix 2-15B InstrumentationTechSystems 16-6A,16-6B Keithley 25-14B LeaderInstruments 25-1A,25-2A,25-2B,25-2C,25-6A,25-10,25-11 LoweringSystems 14-8C,14-8D Mace 15-10C Mannix 25-15B Marshall 8-16A Mitsubishi 2-28A,10-1 NVT 6-9A,6-9B Omniscope 2-15A PanasonicSecuritySystems Coverimage(bottom),2-10B,2-26A,2-26C,2-27B,2-27C,5-14A,8-9D,14-4B, 14-5B,14-6A,15-2B,17-2,18-20B,20-4A,20-4B,20-5B Parkut 22-26,22-27 Pelco 14-5C,15-7C,15-14B,15-17,17-1A,17-1C,17-11B Pentax 2-7A,2-14,4-12A Radiant 13-8B Rainbow 4-12B,4-19,4-22A,4-22B RF-Links 18-25B RemoteVideoSurveillance 9-12B SanyoSecurityProducts Cover image (middle right), 2-27A, 5-14C, 8-5B, 8-9C, 9-12A, 14-1A, 15-6C, 15-6D,15-10A,17-1D SagebrushTechnology 17-14 Selectronic 8-10A Semco 6-38C SOHOware 7-10 SonyElectronics 4-26,4-31,5-22,7-28B,14-1B,14-4A,17-22B SmarterSystems 23-13 Tektronix 25-1B,25-1C,25-6B,25-13A Thorlabs 25-17 Trango 6-35B,6-35C Uni-SolarOvonic 23-11B Vicon 2-26B, 2-30A, 2-30C, 14-3, 14-5A, 14-5D, 14-6B, 15-1A, 15-1B, 15-5, 15-6A, 15-6B,15-9B,15-11,15-14A,15-14C,15-19B,17-1B,17-10A,17-11A Videolarm 2-29E,14-7A,14-7B,14-7C,14-8A,14-8B,15-7A,15-8B,15-8D,15-9C,15-14D, 15-19A,17-13,17-15A,17-15B,22-4B Watec 18-19A,18-19C Winsted 20-2A,20-2B,20-3A,20-3B Foreword AfewyearsagoIhadtheprivilegeofaddressingaCongres- on video surveillance and related technologies. I have sional Subcommittee on Technology and Procurement had the privilege of knowing and working with Herman Policy, chaired by Congressman Tom Davis. In addition for many years. He is a consummate professional who to examining GSA’s efforts to secure federal buildings, has the innate ability to explain the technical aspects of the Subcommittee was interested in hearing and learn- this emerging technology in a manner we can all under- ing about new physical security technology. When I leaf stand and put into practice. Herman’s first book, CCTV through the pages of this book, I again realize the enor- Surveillance – Video Practices and Technology, is considered, mity of the task undertaken by the Subcommittee, the bymostofusintheindustry,tobethebibleofCCTV,and necessity for doing so, and the importance of this type of I fully expect this revised edition will rise to even greater informationtonotonlysecurityprofessionals,butnowto popularity. ITprofessionalsaswell. In the pages following, readers will find concise and Closedcircuittelevision(CCTV)andotherrelatedvideo intelligent descriptions of the analog and digital video security and surveillance technology has advanced fur- practices and technology we have all grown up with. But ther and faster in the period from 2001 to 2005 than in moreimportant,Hermanhasincluded,inthisrevisededi- any prior comparable time period. IP cameras, mapping, tion, his explanation of the newest audio/video informa- servers, platforms, LANs, WANs, and VPNs, wireless, dig- tiontechnology(AV/IT)developments,productsutilizing ital migration, algorithms, etc. are all converging along the technology and applications for same. Security pro- with other related security system technologies such as fessionals,systemintegrators,architectsandengineers,IT access control, life safety, intrusion alarms, etc. with the managers, or end users who are looking for a resource intent to configure fully integrated systems. This is the to help them navigate this complex field of IP Video new direction for the security industry as digital technol- Security will not be disappointed. The material is well ogyhasbecomepervasiveacrossallproductlines,opening researched and thoughtfully laid out to help insure the the door to more software-oriented control platforms on reader’sunderstandingandtohopefullyallowthemtogo theenterpriselevel. ontodesigning,installing,andusingdigitalvideosurveil- So who is the better person to chronicle, explain, and lancetoitsfullestcapacity. put these terms and technology into perspective than Herman Kruegle, one of the industry’s foremost experts FrankAbram xi Preface Following the same philosophy contained in the first edi- ThisnewrevisededitionofCCTVSurveillanceincludes tion, the second edition is written for and contains infor- the new digital video technology and contains eight new mation valuable to the end-user as well as the technical chapters: practitioner. Each chapter begins with an overview and Chapter7 DigitalTransmission,Video, then presents equipment available with their characteris- CommunicationsandControl tics,features,andapplication. Chapter10 HardCopyVideoPrinters The first edition of CCTV Surveillance in 1995 asked Chapter12 QuadsandMultiplexers the question “why write a CCTV surveillance book?”. At Chapter14 DomeCameras that time, analog CCTV had progressed from a vacuum Chapter20 ControlRoom/ConsoleDesign tube to a solid state technology that provided reliable, Chapter21 RapidDeploymentVideoSystems longlife small cameras produced at prices affordable for Chapter24 Video-SecuritySystemsIntegration mostsecurityapplications. Chapter25 VideoSystemTestEquipment Adecadelater,significantadvanceshavebeenmadein camerasensors,computers,anddigitaltransmissiontech- Chapter7—Wiredandwirelessdigitaltransmissionrep- nology to warrant a complete review of CCTV’s role in resents possibly the most significant technology advance- the security industry. The migration from legacy analog ment in the video security industry. It makes use of the components to digital technology and the emergence of Internet and intranets for remote video, data, and audio the Internet have accelerated the utilization of Internet communication over existing hard wire communication protocol (IP) video and remote monitoring in security. links. Chapter 7 includes an analysis of digital wireless The internet has permitted the widespread interconnec- video transmission using the family of 802.11x protocol tionofothertechnologiesincludingintrusionandfireand spread spectrum technology (SST). Prior to 1995–98 the intrusionalarmsystems,accesscontrol,andothercommu- Internetwasnotavailableforcommercialuseandremote nicationsandcontrol. video monitoring and control was accomplished primar- The ease of interconnection afforded by digital trans- ily over existing telephone lines or expensive satellite mission of video and other pertinent security data any- links with limited functionality. Ease of installation, cam- where in a facility, local environment or globally, engen- era addressing, and identification using IP cameras has ders a new meaning to video transmission and remote openedanewvistainvideotransmissionandremotemon- viewing. itoring. The explosion of high-capacity magnetic disk, solid Chapter10—Thischapterdescribesthenewtechnolog- state, and optical data storage memories has permitted icaladvancesmadeinhard-copyprintersthatimprovethe the generation of new products including digital video quality and reduce the cost of monochrome and color recorders(DVR)anddatacompressionalgorithmstocom- video printouts. The advances in ink-jet and laser printer pressandstorevideoimagesandreplacethetime-honored technologiesusinginexpensive,largesolidstatememories magneticvideocassetterecorder(VCR). andhighresolutionlinearCCDimagershavebeendriven In this second edition of CCTV Surveillance, I have bytheconsumerandbusinessmarkets,andhavegiventhe attempted to add these new technologies to the “non- securityindustryaccesstolow-cost,color,hardcopyprints changing” basic technologies covered in the first edition. rivalingphotographicresolutionandquality. Physics does not change—only the technology and prod- Chapter12—Whileavailablein1995,multiplexershave uctsdo. taken on new importance because of the significant xiii xiv Preface increaseinthenumberofcamerasusedinatypicalsecu- RDSsystemsarecarriedfromonelocationtoanotherand rityinstallationandtheirabilitytobeintegratedintoDVRs deployed quickly to set up an alarm perimeter and real- thatwerenotavailablefiveyearsago. time video monitoring and recording. Analog or digital Chapter 14—Dome cameras are now everywhere in transmissionallowslocalorremotemonitoring.Afteruse, security systems. In 1995 they were used primarily in theRDSequipmentisdisassembledandstoredinitscarry- selected locations: casinos, department stores, supermar- ingcase,readyforanotherdeployment.Themuchsmaller kets, malls, and in outdoor parking lot applications. The sizeofthevideoandalarmequipmenthasacceleratedits public at large has accepted their presence almost every- useandacceptance. where. Domes are easy to install and can be small and Chapter 22—The Video Applications chapter has been aesthetic.Domecamerasareadjustableinpointingdirec- updated and expanded to include digital video applica- tion(manualormotorized,panandtilt),andmanyhave tions including the combination of legacy analog and IP motorizedzoomlensestochangethecamerafieldofview cameras. One video monitoring application uses on-site (FOV). The use of small dome cameras has exploded local networks and a second application uses the Inter- becauseofsignificantcostreductionandsophisticationof netandIPcameras,signalrouters,andserversforremote pointing and zooming capabilities. Fast pan/tilt camera site video monitoring. Security applications require com- moduleswithremotecontrolviaanalogordigitalcommu- plete integration of communication, video, alarm, access nications over two-wire or wireless communication links control, and fire to provide monitoring by the local secu- arereasonsfortheirpopularity. rity force, and corporate executives at a local or remote Chapter20—ConsolesandControlRoomshavebecome site(s). The integration of these security functions pro- morecomplexandrequiremoredesignattentionfortheir videsthesafetyandsecuritynecessarytoprotectpersonnel successfulimplementation.Thischapteranalyzesthecon- andassetsatanyfacility. sole and security control room with regard to lighting, Chapter 25—Installation and maintenance of video monitor locations, operator control placement, and the equipment requires the use of video and computer test other human factors required for guard efficiency and equipment.Priortothewidespreaduseofdigitaltechnol- comfort. ogy in security systems, a limited range of test equipment Chapter 21—There has always been a requirement for was used. Now with the many computer interfaces and atransportableRapidDeploymentSecurity(RDS)systems Internet protocols and connection to the Internet, more having video and alarm intrusion equipment for protect- sophisticatedtestequipmentandsomeknowledgeofsoft- ingpersonnelandassets.ThePost-911erawithrealterror wareandcomputerprogrammingisnecessary.Parameters threats has initiated the need for RDS equipment to pro- tobetestedandmonitoredinclude:(a)videosignallevel tect military, government, business, and other personnel and quality; (b) control data signals for pan, tilt, zoom, on travel. The majority of these systems consist of alarm focus;and(c)digitalsignalprotocolsformultiplexers,IP intrusionandanalogordigitalvideoviewingsystem.These cameras,signalroutersandservers,DVRs,etc. Acknowledgments Over the years I have had opportunities to speak with IacknowledgetheinitialencouragementofKevinKopp many individuals who provided technical insight in video andeditorialadviceofGregFranklinatButterworth(now technologyandelectro-optics.Iparticularlyappreciatethe Elsevier)duringtheformativestagesofthefirsteditionof discussions with Stanley Dolin and Lee Gallagher, on the CCTVSurveillancein1995.IthankallstaffatElsevierfor subjectsofoptics,thephysicsoflighting,lenses,andopti- bringingoutthissecondeditionsuccessfully:PamChester cal sensors. I found very helpful the technical discussions forherassistanceintheformulationofthisedition,Mark on cameras with Frank Abram, Sanyo Security Products, Listewnik for his constant encouragement, professional and Victor Houk. I thank Dr. Gerald Herskowitz, Stevens suggestions, and diligence in bringing this large project InstituteofTechnologyforcontributingtothefiber-optic toasuccessfulconclusion,JeffFreelandforprovidingthe section in Chapter 6 and reviewing other sections on meticulousfinaleditingandeffortincompletingthislarge videotransmission.IthankRobertWimmerandFredrick endeavor. Nilsson for their excellent technical articles in security I gratefully acknowledge the dedication, patience, and journals, company publications, as well as technical sem- skill of my wife, Carol, in assisting in the preparation of inars on many aspects of video security. Thanks to Char- thisbook. lie Pierce for his interest in my book over the years and I would like to thank the manufacturers for the use of enthusiasmandexcellenceinpresentingstimulatingedu- themanyphotographsthatillustratethecomponentsused cational video seminars. Eric Kruegle, Avida Inc., con- invideosecurityapplications.Eachofthemcontributeto tributedhisexpertiseonvariousaspectsofdigitalvideo.In the education of the security professional and assist the particularIappreciatehishelpinwiredandwirelessvideo consultant, systems integrator, and end user in designing transmission, compression, and encryption in Chapter 7. andimplementingthebestsecuritysystempossible. Eric was also instrumental in keeping my computer alive, andIthankhimforrescuingmelateatnightfrommissing filesandsoftwaresurprises. xv PART I Chapter 1 Video’s Critical Role in the Security Plan CONTENTS 1.1 ProtectionofAssets of an assets protection program are: (1) an adequate 1.1.1 Overview plan designed to prevent losses from occurring, (2) ade- 1.1.2 Background quatecountermeasurestolimitunpreventablelosses,and 1.2 TheRoleofVideoinAssetProtection (3)supportoftheprotectionplanbytopmanagement. 1.2.1 Video as Part of the Emergency and DisasterPlan 1.2.1.1 Protecting Life and Minimizing Injury 1.1.1 Overview 1.2.1.2 ReducingExposureofPhysicalAssets andOptimizingLossControl Most situations today require a complete safety/security 1.2.1.3 Restoring Normal Operations plan.Theplanshouldcontainrequirementsforintrusion Quickly detection,videoassessment,firedetection,accesscontrol, 1.2.1.4 DocumentinganEmergency and full two-way communication. Critical functions and 1.2.1.5 Emergency Shutdown and locations must be monitored using wired and wireless Restoration backupcommunications. 1.2.1.6 TestingthePlan Themostsignificantdrivingforcebehindtheexplosion 1.2.1.7 StandbyPowerandCommunications intheuseofclosed-circuittelevision(CCTV)hasbeenthe 1.2.2 SecurityInvestigations worldwide increase in theft and terrorism and the com- 1.2.3 Safety mensurate concern and need to protect personnel and 1.2.4 TheRoleoftheGuard assets.TheterroristattackonSeptember11,2001,brought 1.2.5 EmployeeTrainingandEducation aboutaquantumjumpandacompletereevaluationofthe 1.3 SynergythroughIntegration personnelandassetsecurityrequirementstosafe-guarda 1.3.1 IntegratedFunctions facility. To meet this new threat, video security has taken 1.3.2 SystemHardware ontheleadroleinprotectingpersonnelandassets.Today 1.4 Video’sRoleandItsApplications everystate-of-the-artsecuritysystemmustincludevideoas 1.4.1 VideoSystemSolutions akeycomponenttoprovidethe“remoteeyes”forsecurity, 1.4.2 Overtvs.CovertVideo fire,andsafety. 1.4.3 SecuritySurveillanceApplications The fateful day of September 11, 2001, has dramatized 1.4.4 SafetyApplications the importance of reliable communications and remote 1.4.5 VideoAccessControl visualization of images via remote video cameras. Many 1.5 TheBottomLine lives were saved (and lost) as a consequence of the voice, video,alarm,andfireequipmentinplaceandinuseatthe time of the fateful attack on the World Trade Center in NewYork.Theavailabilityofoperational wiredandwireless 1.1 PROTECTIONOFASSETS two-way communication between command and control headquarters and responders (police, fire, emergency) The protection of personnel and assets is a manage- played a crucial role in life and death. The availability ment function. Three key factors governing the planning (orabsence)atcommandpostsofreal-timevideoimages 1 2 CCTVSurveillance at crucial locations in the Twin Towers during the attack thieves but rather the deterrence of crime through secu- and evacuation contributed to the action taken by com- rity. A successful thief needs privacy—a video system can mandpersonnelduringthetragedy.Theuse(orabsence) denythatprivacy. ofwirelesstransmissionfromtheremotevideocamerasin Asasecurityby-product,videohasemergedasaneffec- theTwinTowersclearlyhadanimpactonthenumberof tive training tool for managers and security personnel. survivorsandcasualties. Every installation/establishment should have a security During the 1990s, video components (cameras, plan in place prior to an incident. Video-based training recorders, monitors, etc.) technology matured from the is easy to implement using the abundance of inexpen- legacyanalogtoadigitalimagingtechnologyandbecame sive camcorders and playback equipment available and compatible with computers and now forms an essential the commercial video production training video services part of the security solution. In the late 1990s, digi- available. The use of training videos results in standard- tal cameras were introduced into the consumer market, ized procedures and improved employee efficiency and thereby significantly reducing price and as a result found productivity. widespread use in the security industry. Simultaneously, Thepublicatlargehasacceptedtheuseofvideosystems powerfulmicroprocessors,largeharddiskcomputermem- in most public facilities. Video is being applied to reduce ory storage, and random access memory (RAM) became asset losses and increase corporate profits and bottom available from the personal computer/laptop industry, line.Manycasehistoriesshowthataftertheinstallationof therebyprovidingthecomputingpowernecessarytocon- video, shoplifting and employee thefts drop sharply. The trol, view, record, and play back digital CCTV cameras in numberoftheftscannotbecountedexactlybutshrinkage thesecuritysystem. canbemeasured.Ithasbeenshownthatvideoisaneffec- The home run came with the availability and explosive tivepsychologicaldeterrenttocrimeandaneffectivetool acceptance and use of the Internet (and intranet) as a forcriminalprosecution. new means of long distance two-way communication of Theft is not only the unauthorized removal of valuable voice,data,andmostimportantlyvideo.Foroveradecade propertybutalsotheremovalofinformation,suchascom- thelongdistancetransmissionofvideowaslimitedtoslow putersoftware,CDs,magnetictapeanddisks,opticaldisks, telephonetransmissionofvideoimages—snap-shots(slow- microfilm,andhardcopy.Videosurveillancesystemspro- scan video). The use of dedicated high speed (expen- videameansforsuccessfullydeterringsuchthieveryand/or sive)landlinesorexpensivesatellitecommunicationswas detectingorapprehendingoffenders.Theuseofvideopre- limited to government and large-clientele users. Now the vents the destruction of property, vandalizing buildings, Internetprovidesnear-live(nearreal-time)videotransmis- defacingelevatorinteriors,painting graffiti on art objects sioncommunicationsoveraninexpensive,easilyaccessible and facilities, stealing computers, and demolishing furni- worldwidetransmissionnetwork. tureorothervaluableequipment.Videooffersthegreatest Theapplicationandintegrationofvideointosafetyand potential benefit when integrated with other sensing sys- securitysystemshascomeofageasareliable,cost-effective tems and used to view remote areas. Video provides the means for assessing and responding to terrorist attacks “eyes” for many security devices and functions such as: andotherlife-threateningsituations.Videoisaneffective (1) fire sensors: smoke detector alarms, (2) watching for means for deterring crimes and protecting assets and for presence (or absence) of personnel in an area, (3) evac- apprehendingandprosecutingoffenders. uation of personnel—determining route for evacuation, Securitypersonneltodayhavetheresponsibilityformul- access (emergency or intruder) to determine response, tifaceted security and safety systems in which video often respond,andmonitorresponse.Whencombinedwithfire playsthekeyrole.Withtoday’sincreasinglaborcostsand andsmokedetectors,CCTVcamerasininaccessibleareas the need for each security officer to provide more func- canbeusedtogiveadvancewarningofafire. tionality, video more than ever before is earning its place Video is the critical link in the overall security of a asacost-effectivemeansforimprovingsecurityandsafety facilitybutorganizationsmustdevelopacompletesecurity whilereducingsecuritybudgets. plan rather than adopt piecemeal protection measures. Loss of assets and time due to theft is a growing can- Tooptimizeuseofvideotechnology,thepractitionerand cer on our society that eats away at the profits of every end user must understand all of its aspects—from light organizationorbusiness,beitgovernment,retail,service, sourcestovideomonitorsandrecorders.Thecapabilities or manufacturing. The size of the organization makes no and limitations of video during daytime and nighttime difference to the thief. The larger the organization, the operationmustalsobeunderstood. morethetheftoccursandthegreatertheopportunityfor losses. The more valuable the product, the greater the temptationforathieftostealit.Aproperlydesignedand 1.1.2 Background appliedvideosystemcanbeanextremelyprofitableinvest- ment for an institution to cut losses. The prime objective Throughout history, humans have valued their own life of the video system should not be the apprehension of and the lives of their loved ones above all else. Next Video’sCriticalRoleintheSecurityPlan 3 in value has been their property. Over the centuries by consumers (lower manufacturing costs), and the avail- many techniques have been developed to protect prop- ability of low-cost video cassette recorders (VCRs), digital erty against invaders or aggressors threatening to take or video recorders (DVRs), and personal computer (PC)- destroyit. basedequipment. Inthepastasinthepresent,manufacturing,industrial, The 1990s saw the integration of computer technology and government organizations have hired “watchmen” to withvideosecuritytechnology.Allcomponentsweresolid protect their facilities. These private security personnel state. Digital video technology needed large-scale digital wearing uniforms and using equipment much like the memories to manipulate and store video images and the police do are hired to prevent crime and bodily harm, computerindustryhadthem.Toachievesatisfactoryvideo anddeterorpreventtheftonthepremises.Theveryearly imagetransmissionandstorage,thevideosignalhadtobe guard companies were Pinkerton’s and Burns. Contract “compressed” to transmit it over the existing narrowband protection organizations were hired to safeguard their phonelinenetworks.Thevideo-computerindustryalready had compression for broadcast, industrial, and govern- employees and assets in emergency and personal threat mentrequirements.Thevideoindustryneededafastand situations. low-cost means to transmit the video images to remote Asignificantincreaseinguardusecamewiththestartof locations and the US government’s Defense Advanced WorldWarII.Manyguardswereemployedtosecureindus- Research Projects Agency (DARPA) had already devel- trial work sites manufacturing military equipment and oped the Internet, the predecessor of the World Wide doing classified work, and to guard government facilities. Web (WWW). The Internet (and intranet) communica- Private corporations obtained such protection through tionschannelsandtheWWWnowprovidethisextraordi- contractagenciestoguardclassifiedfacilitiesandwork. nary worldwide ability to transmit and receive video and In the early 1960s, as electronic technology advanced, audio,andcommunicateandcontroldataanywhere. alarm systems and video were introduced. Radio Corpo- rationofAmerica(RCA),Motorola,andGeneralElectric werethepioneeringcompaniesthatbeganmanufacturing 1.2 THEROLEOFVIDEOINASSETPROTECTION vacuum-tube television cameras for the security industry. Theuseofvideocamerasduringthe1960sand1970sgrew Video provides multiple functions in the overall security rapidly because of increased reliability, lower cost, and plan.Itprovidesthefunctionofassetprotectionbymoni- technologicalimprovementsinthetube-typecameratech- toringlocationofassetsandactivityintheirlocation.Itis nology. In the 1980s growth continued at a more modest usedtodetectunwantedentryintoafacilitybeginningat levelwithfurtherimprovementsinfunctionsandavailabil- a perimeter location and following an unauthorized per- ityofotheraccessoriesforvideosecuritysystems. sonthroughoutafacility.Figure1-1showsatypicalsingle The most significant advance in video technology dur- site video system using either legacy analog or digital, or ing the 1980s was the invention and introduction of the acombinationofbothtechnologies. solid-statevideocamera.Bytheearly1990sthesolid-state In a perimeter protection role, video is used with camera using the charged coupled device (CCD) image intrusion-detection alarm devices as well as video motion sensor was the choice for new security installations and detection to alert the guard at the security console that was rapidly replacing the tube cameras. In the past, the an intrusion has occurred. If an intrusion occurs, multi- camera—in particular, the vidicon tube sensor—was the ple CCTV cameras located throughout the facility follow criticalcomponentinthevideosystem.Thecameradeter- the intruder so that there is a proper response by guard minedtheoverallperformanceandqualityofvisualintel- personnel or designated employees. Management must ligence obtainable from the security system. The vidicon determinewhetherspecificguardreactionisrequiredand tube was the weakest link in the system and was sub- whattheresponsewillbe. ject to degradation with age and usage. The complexity Video monitoring allows the guard to be more effec- and variability of the image tube and its analog electri- tive,butitalsoimprovessecuritybypermittingthecamera cal nature made it less reliable than the other solid-state scene to be transmitted to other control centers or per- components. Performance varied considerably between sonnel.ThevideoimagecanbedocumentedwithaVCR, different camera models and camera manufacturers, and DVR,and/orprintedoutonahardcopyvideoprinter. as a function of temperature and age. By contrast, the Thevideosystemforthemultiplesiteapplicationisbest solid-state CCD sensor and newer metal oxide semicon- implementedusingacombinationofanalog/digitaloran ductor (MOS) and complimentary MOS (CMOS) sensor all-digitalsolution(Figure1-2). cameras have long life and are stable over all operating Local site installations already using analog video cam- conditions. Another factor in the explosive use of video eras, monitors, etc. can be retained and integrated with in security systems has been the rapid improvement in newdigitalInternetProtocal(IP)cameras,localareanet- equipment capability at affordable prices. This has been works (LANs), intranets, and the Internet to facilitate the result of the widespread use of solid-state camcorders remote site video monitoring. The digital transmission 4 CCTVSurveillance PERIMETER SECURITY ROOM PARKING LOT CCTV MONITORS/RECORDERS SURVEILLANCE AUDIO COMMUNICATIONS COMMAND AND CONTROL LOADING DOCK SURVEILLANCE INTRUDER PATH LOBBY SURVEILLANCE G FENCE LINE PERIMETER FACILITY PARKING LOT ENTRANCE SURVEILLANCE FIGURE1-1 Singlesitevideosecuritysystem network provides two-way communications of audio and evidence for criminal prosecution. This ability to provide controlsandexcellentvideoimagetransmissiontoremote a permanent record of evidence is of prime importance sites. The digital signals can be encrypted to prevent topersonnelresponsibleforprovidingsecurity. eavesdropping by unauthorized outside personnel. Using Prior to the mid-1990s the CCTV security industry pri- a digital signal backbone allows adding additional cam- marilyusedmonochromesolid-statecameras.Inthe1990s erastothenetworkorchangingtheirconfigurationinthe thewidespreaduseofcolorcamcordersinthevideocon- system. sumermarketacceleratedtheavailabilityofthesereliable, In the relatively short history of CCTV and video there stable, long-life cameras for the security industry. While have been great innovations in the permanent record- monochrome cameras are still specified in low light level ing of video images. These new technologies have been (LLL) and nighttime security applications, color is now brought about by the consumer demand for video cam- the norm in most security applications. The increased corders,thetelevisionbroadcastindustry,andgovernment sensitivity and resolution of color cameras and the signif- requirements for military and aerospace hardware and icant decrease in cost of color cameras have resulted in software. One result of these requirements was the devel- their widespread use. Many monochrome cameras being opmentoftheVCRandDVR.Theabilitytorecordvideo usedforLLLapplicationsarebeingaugmentedwithactive images provided the video security industry with a new infrared (IR) illuminators. Also coming into use is a new dimension, i.e. going beyond real-time camera surveil- generation of passive monochrome thermal IR imaging lance.TheavailabilityofVCRandDVRtechnologyresult- camerasthatdetectthedifferencesintemperatureofobjects ing from the consumer market has made possible the in the scene, compared to the scene background. These excellenttime-lapseVCRsandlargestoragePC-basedDVR camerasoperateintotaldarkness.Therehasalsobeenan systems.Thesetechnologiesprovidepermanentdocumen- explosion in the use of covert video surveillance through tationofthevideoimagesinanalog(magnetictape)and theuseofsmall,inexpensivecolorcameras. digital (solid state and hard disk drive) storage media. The development of smaller solid-state cameras has Theuseoftime-lapserecorders,computerharddisksand resultedinadecreaseinthesizeofancillaryvideoequip- videoprintersgivemanagementthetoolstopresenthard ment. Camera lenses, dome cameras, housings, pan/tilt

Description:
Content: Photo Credits, Pages v-viForeword, Page xiPreface, Pages xiii-xivAcknowledgments, Page xvChapter 1 - Video's Critical Role in the Security Plan, Pages 1-11Chapter 2 - Video Technology Overview, Pages 13-46Chapter 3 - Natural and Artificial Lighting, Pages 47-69Chapter 4 - Lenses and Optics,
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.