Security

Security Applications for Embedded Vision

Vision security, or intelligent video, provides perimeter intrusion detection

Vision products have been used in the physical security market for a number of years. The technology is commonly referred to as video content analysis (VCA) or intelligent video in the physical security industry. It is used in virtual tripwire applications, providing perimeter intrusion detection for high-risk facilities such as airports and critical infrastructure.

Typical projects use video analytics to generate real-time alerts when an object is identified and tracked through a pre-defined area. Operators, based in the central control room, can manage more video streams as they are not required to identify intruders purely from watching the monitors. Instead, the vision product will identify and alert the operator when there is a potential security issue. It is then up to the human operator to decide how best to deal with the threat.

Other applications of vision products in the security space include wrong-way detection and trajectory tracking. These types of algorithm can be used in airport exit lanes, where security managers want to identify people entering the restricted area from the main terminal. This responsibility has historically been given to security guards; however, vision technology can reduce security guard costs for airport operators and increase the accuracy of the security system.

Other applications in the security market include behavior recognition algorithms such as “slip and fall” and abandoned/left object detection. These applications are less developed than the perimeter detection systems, but will provide powerful tools for security managers over the coming years.

What are the primary vision products used in security?

The primary vision products in the physical security market are network cameras, encoders, NVRs (network video recorders), DVRs (digital video recorders) and intelligent appliances. Established video surveillance vendors supply the majority of these products. These vendors either develop analytics in-house or embed third party algorithms from video content analysis software developers. Consequently, growth in the market is heavily driven by what these vendors decide to do and the extent to which they commit to intelligent video.

Over the last couple of years, the video surveillance market has also seen “low-end” analytics, such as camera tamper detection and video motion detection, become a standard feature on many vendors’ product ranges. These applications have developed from a distinct video analytics market to a product feature used as a differentiator. “Low-end” analytics are embedded on cameras, encoders and storage devices.

AI-generated Heat Maps Keep Seniors and their Privacy Safe

This blog post was originally published at NVIDIA’s website. It is reprinted here with the permission of NVIDIA. By 2030, more than one in five Americans will be 65 or older, becoming the United States’ largest group of seniors ever. Silicon Valley-based startup Butlr has developed an AI platform designed to keep seniors safe while

Read More »

BrainChip Gives the Edge to Search and Rescue Operations

Laguna Hills, Calif. – April 16, 2025 – BrainChip Holdings Ltd (ASX: BRN, OTCQX: BRCHF, ADR: BCHPY), the world’s first commercial producer of ultra-low power, fully digital, event-based, neuromorphic AI, today announced that it has partnered with ARQUIMEA on an AI-powered detection solution that enhances water safety. ARQUIMEA has demonstrated BrainChip’s Akida with a Prophesee event-based

Read More »

Visidon Exhibiting at ISC West

Meet Our Team at the Premier U.S. Security Trade Event We’re excited to announce that we’ll be showcasing our latest security and surveillance innovations at ISC West 2025, the leading security trade event in the U.S.! The event takes place from March 31 to April 4 at the Venetian Expo in Las Vegas, bringing together

Read More »

Single- vs. Multi-camera Systems: The Ultimate Guide

This blog post was originally published at e-con Systems’ website. It is reprinted here with the permission of e-con Systems. Single and multiple camera setups play a vital role in today’s vision systems, enhancing applications such as Automated sports broadcasting, Industrial robots, Traffic monitoring and more. Explore the key differences, advantages, and real-world applications of

Read More »

“Implementing AI/Computer Vision for Corporate Security Surveillance,” a Presentation from VMware

Prasad Saranjame, former Head of Physical Security and Resiliency at VMware, presents the “Implementing AI/Computer Vision for Corporate Security Surveillance” tutorial at the May 2024 Embedded Vision Summit. AI-enabled security cameras offer substantial benefits for corporate security and operational efficiency. However, successful deployment requires thoughtful selection of use cases and meticulous attention to managing the

Read More »

“Innovative Applications of Computer Vision for Power Utility Infrastructure Inspection,” a Presentation from Buzz Solutions

Vikhyat Chaudhry, Co-Founder, Chief Technology Officer and Chief Operating Officer of Buzz Solutions, presents the “Innovative Applications of Computer Vision for Power Utility Infrastructure Inspection” tutorial at the May 2024 Embedded Vision Summit. In this presentation, Chaudhry delves into an innovative application of computer vision for power utility infrastructure inspection. He begins with an overview

Read More »

IDTechEx Company Profile: Ambarella

This market research report was originally published at Ambarella’s website. It is reprinted here with the permission of Ambarella. Note: This article was originally published on the IDTechEx subscription platform. It is reprinted here with the permission of IDTechEx – the full profile including SWOT analysis and the IDTechEx index is available as part of

Read More »

Scalable Public Safety with On-device AI: How Startup FocusAI is Filling Enterprise Security Market Gaps

This blog post was originally published at Qualcomm’s website. It is reprinted here with the permission of Qualcomm Enterprise security is not just big business, it’s about keeping you safe: Here’s how engineer-turned-CTO Sudhakaran Ram collaborated with us to do just that. Key Takeaways: On-device AI enables superior enterprise-grade security. Distributed computing cost-efficiently enables actionable

Read More »

Untether AI Demonstration of Video Analysis Using the runAI Family of Inference Accelerators

Max Sbabo, Senior Application Engineer at Untether AI, demonstrates the company’s latest edge AI and vision technologies and products at the 2024 Embedded Vision Summit. Specifically, Sbabo demonstrates his company’s its AI inference technology with AI accelerator cards that leverage the capabilities of the runAI family of ICs in a PCI-Express form factor. This demonstration

Read More »

Top Camera Features that Empower Smart Traffic Management Systems

This blog post was originally published at e-con Systems’ website. It is reprinted here with the permission of e-con Systems. Traffic systems leverage camera solutions to empower smart cities to handle major traffic challenges. Some of their capabilities include real-time monitoring, incident detection, and law enforcement. Discover the camera’s role in these systems and the

Read More »

Here you’ll find a wealth of practical technical insights and expert advice to help you bring AI and visual intelligence into your products without flying blind.

Contact

Address

Berkeley Design Technology, Inc.
PO Box #4446
Walnut Creek, CA 94596

Phone
Phone: +1 (925) 954-1411
Scroll to Top