Téléphone France: 08 20 20 08 39

Suspicious behaviours detection by Video analytics


Suspect wandering on a parking : detection by intelligent video surveillanceWe propose two applications for two different situations : individual behavior detection (presented here) and crowd detection (there).


In a public area, when somebody has a suspicious behaviour, several indices can be used to raise an alarm depending on the situation. Here, the person seems to wander slowly among cars. EVITECH's Video analytics  software can automatically identify and raise these situations to the interest of guards  :

  • frequent stops,
  • wrong direction walk,
  • low or high speed,
  • crawling or squatting silhouette,
  • person staying or wandering to long in the area (using signature of the object),
  • too long stop close to a sensitive area,
  • same person seen successively under different cameras,
  • groups, group size,
  • abandoned object, tagging, laying object,
  • conditions combinations, other observations ...


Possibilities are without limit, especially with the target signature function that enables target tracking even in case of other persons crossing, and from a camera to another if the signature is shared on the camera network. Our integration teams are at your disposal for any case of situation where you want to study an opportunity.

The EVITECH Jaguar Intelligent video surveillance server



The smart video sensor connects any kind of image data (BNC, IP, WIFI, DSL, Firewire, ...), uncompresses all formats (PAL/SECAM, H.264, MPEG4, MJPEG, ...), and offers an intelligent analysis of images, resistant to any kind of outdoor conditions, for sensistive sites protection applications : intrusion detection, abnormal behaviour, abandoned object, ... It sends alarm messages through IP messages, dry contactors, e-mails, SMS or MMS via GSM/GPRS/UMTS ...




Here is the example of abandoning an object :


The EAGLE & JAGUAR software allow to detect abandoned, even small sized, objects, even very similar to other objects close from the laying location. On the images below (SONY tri-CCD camera), you can see a test under snow, a person laying a small white bag on the wall, just similar to a snow falling flake. In the first image, we see a person coming (P-1, for Person and first threat), with the bag. Biggests falling snowflakes (see on the upper left corner) are filtered by the software, they are not classified as a threat : they cannot raise an alarm.




In the second image, the person leaves while having laid the white bag on the wall. It is then detected as threat number two (I-2), where I stands for unclassified Ignored-type threat.




Falling snow is still unidentified as threat. At last, in the following image, the person has left the scene, and the bag is still there, as the last threat :




Conclusion : The software tells the operator that only two threats have been observed in the scene, despite the falling snowflakes : the person (P-1) and the bag (I-2). An alarm triggered on an immobile object will finally raise the expected alarm.

Tracking :

EAGLE & JAGUAR video analytics software detection and tracking functions can be used to track individuals or make statistical course analysis. A display mode with a display wire allows to see at every moment the origin of a target, and its stopping times. This tracking is done in spite of the crossings the individual can do while moving. Below, we can see the take-off track of an airplane (I-8 object), filmed with a B&W Sony camera :


video analytics plane tracking


In multi-camera modes, the target signature can be used to share information from a camera to another, and recognize the individual track. In particular, this functionality can operate even with wholes in the area coverage (the person being unseen between 2 cameras). When the individual is taken inside a group, the system will keep its signature to identify him again when he leaves this group.