Archive for the ‘security’ Category

How to Select a Night Vision Camera

Friday, April 9th, 2010

What you need to know about IR-illumination capabilities of CCTV cameras, and why the “green” movement makes them a new opportunity for security designers and integrators.

image

Designers might want to check out the latest technological developments in cameras with built-in IR illumination as a potential add-on sale for both residential and commercial applications.

The night vision camera trend is being spurred partly by “green” initiatives because people don’t want to waste money on electricity to maintain outdoor flood lights.

Indeed, with enlightened ‘green clients’ you can sell the ROI for the installation of a night vision camera for exterior (or interior) security use vs. the cost of lighting.

How IR Illumination Works

Without any light source in some cases, cameras can clearly capture crisp images for use at night, potentially opening up a whole new market. CCTV cameras have always been primarily a commercial offering, but lower cost bullet and discrete dome units are well suited for resi applications.

IR illuminators offer the camera the ability, in essence, to capture the wavelength of light that is not visible to humans.

IR illuminators can be built into the camera or be a separate attachment. Generally there are three wavelengths of IR illuminators for night vision cameras:

  • 730 nm (nanometers) — Produces red glow about half the strength of stop light and offers the best visibility.
  • 830 nm — Most common strength that is used for semi-covert applications and produces a slight red glow.
  • 940 nm — Designed for covert applications. It can produce an image from full blackness, but can only view a short distance.

There are two types of IR illuminators:

  • Thermal IR — These detect heat. They are ideal for detection, but not for identification.
  • Active IR — These detect motion and offer crisper images.

Cameras are available that offer a combination of both technologies.

It’s a myth that if there is no light, there will be no picture. This is a  not generally correct, You can get a picture, but it’s not a good idea due to quality of the recorded images using the general product selection Low-lux cameras that are available for use in low-light situations.

However, these cameras, which do not have IR illuminators, are likely to produce a “noisy and grainy” picture. Also, if the images are being recorded on a DVR, they will take up a lot of space and bandwidth.

Likewise, if the images are being sent over an IP network, they require 40 percent more bandwidth for transmission.

Questions When specifing Low-Light Cameras

There are four key questions to ask with specifing a low-light camera:

  1. How far? Distance needed to capture images will determine focal length, beam angle and IR illuminator width.
  2. How wide? The wider the lens, the shorter the distance.
  3. Is there light at the scene? Some lighting looks good aesthetically, but is not good for image capture.
  4. What is the environment at the scene? Is the camera going to exposed to vibration, heat , saltwater, etc.

Night vision cameras themselves are getting greener. New units draw as little as 25 watts to 45 watts of power to see as far as 700 feet. Those same cameras used to require 500 watts to 1,000 watts.

Finally, designers should know that IR illuminators degrade at about 20 percent per year. Bosch has introduced a new technology called Black Diamond (pdf) to minimize degradation by automatically turning off the power to the illuminator during daylight hours.

Gatwick electronic border security ‘catches criminal’

Monday, April 5th, 2010

15 March 2010


A criminal has been stopped from entering the UK at Gatwick by an electronic system designed to enhance border security at the airport.

The UK Border Agency reports the convicted foreign drug smuggler was halted because of the hi-tech monitoring system, which checks passenger data against watchlists.

He was intercepted by officials at the facility’s south terminal after boarding a flight to Britain as the National Border Targeting Centre monitors passengers and crew members entering the country.

The e-Borders system flagged the arrival of the 40-year-old Lithuanian national, who had been deported in 2002 after a conviction for attempted cocaine smuggling.

Gatwick Airport UK Border Agency assistant director Nick Crouch said: “e-Borders has already had a huge impact, helping us catch more than 5,400 criminals including rapists and murderers.”

Borders are increasingly being secured by a range of measures, including the installation of biometric technology such as eye, facial or fingerprint scans.

What is Biometrics?

Monday, April 5th, 2010

A Biometric System is a system for the automated recognition of individuals based on their behavioural and biological characteristics.

Fingerprints, face geometry, iris patterns and hand geometry are examples of biological characteristics, while dynamic signature recognition (the way in which a signature is written rather than the resulting graphic) is an example of a behavioural characteristic. In reality, most biometric characteristics comprise elements of both biology and behaviour.

Speaker recognition for example, depends on biological factors such as the shape of the vocal tract as well as behavioural influences such as the region of upbringing. Conversely, biological characteristics such as fingerprints are affected by behaviour when placing a finger onto a sensor.

Biological and behavioural characteristics of an individual are those that can be detected and from which distinguishing repeatable biometric features can be extracted for the purpose of automated recognition of individuals.

order viagra in canada

Biological and behavioural characteristics are physical properties of body parts, physiological and behavioural processes created by the body and combinations of any of these. Distinguishing does not necessarily imply individualization.

Wherever there is a need to identify or verify a human being there is a potential application for biometrics. This includes entry control to buildings and secure areas including countries, as well as logical access control to resources such as bank accounts and entitlement services.

Traditional methods to secure such applications include magnetic and smart cards, tokens as well as passwords and PINs. However, when it comes to identity assurance, biometric technologies have an unsurpassed advantage: they are intrinsically linked to the person.

As the number and scale of deployments of biometric recognition systems increase, biometrics is moving from an era where vendor-specific products, techniques and solutions were acceptable, into an era where interoperability is important and conformance to standards is required by most procurers of biometric products.