{"id":5898,"date":"2024-03-20T11:29:30","date_gmt":"2024-03-20T09:29:30","guid":{"rendered":"https:\/\/security-robotics.de\/?p=5898"},"modified":"2024-04-22T15:31:28","modified_gmt":"2024-04-22T13:31:28","slug":"video-analysis","status":"publish","type":"post","link":"https:\/\/security-robotics.de\/en\/glossary\/video-analysis","title":{"rendered":"Video analysis"},"content":{"rendered":"\n<p><a rel=\"popover\" data-title=\"video analysis\" data-post-id=\"5898\" class=\"sr-glossary-link\" aria-label=\"Video analysis\" href=\"https:\/\/security-robotics.de\/en\/glossary\/video-analysis\">Video analysis<\/a> is the automatic evaluation of video data using algorithms, software and, increasingly, AI support. Various characteristics and behaviours are recognised, interpreted and evaluated in real time in order to identify specific events, objects or behavioural patterns. In the security sector, <span data-title=\"video analysis\" data-post-id=\"5898\" class=\"sr-glossary-link\" aria-label=\"Video analysis\" data-href=\"https:\/\/security-robotics.de\/en\/glossary\/video-analysis\">video analysis<\/span> is often used to analyse surveillance video, detect suspicious activity, recognise or identify unauthorised persons or automatically raise the alarm in the event of certain incidents.<\/p>","protected":false},"excerpt":{"rendered":"<p>Video analysis is the automatic evaluation of video data using algorithms, software and, increasingly, AI support. Various characteristics and behaviours are recognised, interpreted and evaluated in real time in order to identify specific events, objects or behavioural patterns. In the security sector, video analysis is often used to analyse surveillance video, detect suspicious activity, recognise [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[388],"tags":[411],"class_list":["post-5898","post","type-post","status-publish","format-standard","hentry","category-glossary","tag-video-analysis"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.1 (Yoast SEO v24.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Video analysis - Security Robotics<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/security-robotics.de\/en\/glossary\/video-analysis\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Video analysis\" \/>\n<meta property=\"og:description\" content=\"Video analysis is the automatic evaluation of video data using algorithms, software and, increasingly, AI support. Various characteristics and behaviours are recognised, interpreted and evaluated in real time in order to identify specific events, objects or behavioural patterns. In the security sector, video analysis is often used to analyse surveillance video, detect suspicious activity, recognise [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/security-robotics.de\/en\/glossary\/video-analysis\" \/>\n<meta property=\"og:site_name\" content=\"Security Robotics\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-20T09:29:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-22T13:31:28+00:00\" \/>\n<meta name=\"author\" content=\"Michael Engel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Engel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/security-robotics.de\/en\/glossary\/video-analysis\",\"url\":\"https:\/\/security-robotics.de\/en\/glossary\/video-analysis\",\"name\":\"Video analysis - Security Robotics\",\"isPartOf\":{\"@id\":\"https:\/\/security-robotics.de\/en#website\"},\"datePublished\":\"2024-03-20T09:29:30+00:00\",\"dateModified\":\"2024-04-22T13:31:28+00:00\",\"author\":{\"@id\":\"https:\/\/security-robotics.de\/en#\/schema\/person\/28cc52f7777054d66557d928ef562e56\"},\"breadcrumb\":{\"@id\":\"https:\/\/security-robotics.de\/en\/glossary\/video-analysis#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/security-robotics.de\/en\/glossary\/video-analysis\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/security-robotics.de\/en\/glossary\/video-analysis#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\/\/security-robotics.de\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Video analysis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/security-robotics.de\/en#website\",\"url\":\"https:\/\/security-robotics.de\/en\",\"name\":\"Security Robotics\",\"description\":\"Innovative Security-Roboter | \u00dcberwachung, Messung, Zutritt\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/security-robotics.de\/en?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/security-robotics.de\/en#\/schema\/person\/28cc52f7777054d66557d928ef562e56\",\"name\":\"Michael Engel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/security-robotics.de\/en#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1d4d5fa3248381de9f4886ea0db0aec3f525afddc61e6d24f41910856cf22706?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1d4d5fa3248381de9f4886ea0db0aec3f525afddc61e6d24f41910856cf22706?s=96&d=mm&r=g\",\"caption\":\"Michael Engel\"},\"url\":\"https:\/\/security-robotics.de\/en\/author\/m-engel\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Video analysis - Security Robotics","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/security-robotics.de\/en\/glossary\/video-analysis","og_locale":"en_US","og_type":"article","og_title":"Video analysis","og_description":"Video analysis is the automatic evaluation of video data using algorithms, software and, increasingly, AI support. Various characteristics and behaviours are recognised, interpreted and evaluated in real time in order to identify specific events, objects or behavioural patterns. In the security sector, video analysis is often used to analyse surveillance video, detect suspicious activity, recognise [&hellip;]","og_url":"https:\/\/security-robotics.de\/en\/glossary\/video-analysis","og_site_name":"Security Robotics","article_published_time":"2024-03-20T09:29:30+00:00","article_modified_time":"2024-04-22T13:31:28+00:00","author":"Michael Engel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Michael Engel","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/security-robotics.de\/en\/glossary\/video-analysis","url":"https:\/\/security-robotics.de\/en\/glossary\/video-analysis","name":"Video analysis - Security Robotics","isPartOf":{"@id":"https:\/\/security-robotics.de\/en#website"},"datePublished":"2024-03-20T09:29:30+00:00","dateModified":"2024-04-22T13:31:28+00:00","author":{"@id":"https:\/\/security-robotics.de\/en#\/schema\/person\/28cc52f7777054d66557d928ef562e56"},"breadcrumb":{"@id":"https:\/\/security-robotics.de\/en\/glossary\/video-analysis#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/security-robotics.de\/en\/glossary\/video-analysis"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/security-robotics.de\/en\/glossary\/video-analysis#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/security-robotics.de\/en"},{"@type":"ListItem","position":2,"name":"Video analysis"}]},{"@type":"WebSite","@id":"https:\/\/security-robotics.de\/en#website","url":"https:\/\/security-robotics.de\/en","name":"Security Robotics","description":"Innovative Security-Roboter | \u00dcberwachung, Messung, Zutritt","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/security-robotics.de\/en?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/security-robotics.de\/en#\/schema\/person\/28cc52f7777054d66557d928ef562e56","name":"Michael Engel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/security-robotics.de\/en#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1d4d5fa3248381de9f4886ea0db0aec3f525afddc61e6d24f41910856cf22706?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1d4d5fa3248381de9f4886ea0db0aec3f525afddc61e6d24f41910856cf22706?s=96&d=mm&r=g","caption":"Michael Engel"},"url":"https:\/\/security-robotics.de\/en\/author\/m-engel"}]}},"_links":{"self":[{"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/posts\/5898","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/comments?post=5898"}],"version-history":[{"count":1,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/posts\/5898\/revisions"}],"predecessor-version":[{"id":5918,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/posts\/5898\/revisions\/5918"}],"wp:attachment":[{"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/media?parent=5898"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/categories?post=5898"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/security-robotics.de\/en\/wp-json\/wp\/v2\/tags?post=5898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}