Frequently Asked Questions (FAQ)
Answers to frequently asked questions regarding Isarsoft Perception.
About Isarsoft Perception
What is Isarsoft Perception?
Isarsoft Perception video analytics turns any camera into a smart sensor.
Supported features include:
- People Flow Analytics
- Traffic Flow Analytics
- Crowd Analytics
Isarsoft Perception can capture occupancy, line-counting, trajectories, dwell time, velocities, geolocation, alarms and much more.
Why should I use Isarsoft Perception?
Whether the goal is to make better decisions, improve efficiency, increase customer satisfaction or harden security - Isarsoft Perception real-time video analysis adds value for planning, operation and security.
Who uses Isarsoft Perception?
Isarsoft Perception is used by corporations and institutions worldwide in over 1.000 installations.
Is Video Analytics more accurate than sensors?
Yes, in many real-world, dynamic or crowded settings, Video Analytics tends to deliver higher accuracy than traditional sensor-based counting.
Which object categories are supported by Isarsoft Perception?
Within the application creation the user can choose from different models. The people model supports the detection of persons. The traffic model supports pedestrians, bicycles, motorcycles, cars, vans, busses, trucks and heavy-trucks. The transport model supports people, bicycles, luggage, wheelchairs and trains.
How long does it usually take from purchase to start of operation?
It typically takes 4-8 weeks from purchase to start of operation.
What is the pricing model for Isarsoft Perception?
Isarsoft Perception is available in three different tiers: Starter, Advanced and Enterprise. Contact us to learn more.
How to get support?
Isarsoft, as well as our qualified partners and integrators, are glad to support you from conception to implementation and operation. Reach out to us via the contact page.
Integration in infrastructure
Is Isarsoft Perception compatible with existing camera systems?
Isarsoft Perception is compatible with all major security cameras and leading video management systems (VMS).
How many cameras can be processed by Isarsoft Perception?
The number of cameras a single server can process depends on the build-in hardware. A high performance server can process over 100 cameras in parallel, realtime. In a multi-server setup several servers can be fused to share the load.
How can fisheye cameras be used with Isarsoft Perception?
Fisheye cameras which support on-camera dewarping can be used similar to regular cameras. Depending on the dewarping configuration of the camera, two or four streams are available for further processing.
Does Isarsoft Perception support thermal cameras?
Thermal cameras are typically used for fire detection, intrusion detection and road traffic analysis. Isarsoft Perception does not yet support thermal cameras. However, Isarsoft Perception delivers good results with regular security cameras at day and night either through available light sources or infrared light emitted by the security camera.
Can Isarsoft Perception be connected via LTE or LoRaWAN?
Isarsoft Perception can be installed on rugged edge devices. The data produced by Isarsoft Perception can easily be send through LTE or 5G and with some limitations also via LoRaWAN.
How can Isarsoft Perception be connected to other systems?
Isarsoft Perception is build for maximum connectivity. Other systems can seamlessly and securely be connected with Isarsoft Perception through the GraphQL API, the Python SDK or Isarsoft Perception Cloud Connector. A complete overview is available on the integrations page.
Data privacy and information security
Is Isarsoft Perception privacy compliant?
Yes, Isarsoft Perception complies with relevant privacy policies such as the GDPR. Additionally Isarsoft is ISO 27001 certified by TÜV Süd, underscoring our commitment to the highest standards of privacy, information security and risk management.
Is Isarsoft Perception secure?
Isarsoft Perception implements state of the art information security measures and has been successfully deployed in corporate IT environments.
Where is the data processed and is an internet connection required?
Depending on the version, Isarsoft Perception can be installed on cameras, edge and server hardware. Data processing takes place locally and does not require an Internet connection. The collected, anonymous metadata can be transmitted to third-party systems for further processing.
How much data is produced by Isarsoft Perception?
Isarsoft Perception transforms video data into metadata. The amount of data produced by Isarsoft Perception depends on how many cameras are being processed and which analytical features are activated through the configuration.
Re-ID
What is re-identification (Re-ID) in people counting?
Re-ID is an AI technique that recognizes the same person across multiple video frames, cameras, or viewpoints without identifying who they are. It simply ensures that one person is counted once, even if they appear several times. Video data is anonymized and re-id works without face-recognition.
Is Re-ID anonymous and privacy compliant?
Yes, Re-ID works anonymously and privacy compliant. The software does not identify people personally, it does not store faces, personal data, or identity. It only uses abstract visual features (like colors, shapes, and movement patterns) to match whether two detections belong to the same individual.This makes Re-ID privacy-friendly and compliant with regulations such as GDPR when implemented correctly.
Which personal data is collected for Re-ID exactly?
For Re-ID, no direct identification data such as faces or names are processed, nor is any biometric data. The system merely translates fleeting visual characteristics such as the color of clothing or objects carried by the person into an abstract numerical code known as a feature vector. This vector is neither readable by humans nor can it be converted back into an image. This also means that long-term recognition is not possible with Re-ID. If a person changes their jacket, they will no longer be recognized. This vector is considered a short-term pseudonymized feature for a maximum of 2 hours before it is irrevocably deleted. The final results are purely anonymized statistics (e.g., "the average length of stay is 42 minutes"). Consequently, inferring the real identity of individuals is technically impossible.
What data is stored for Re-ID and for how long?
Isarsoft Perception processes live video images from the cameras on a local computer using AI. The live image evaluation occurs as follows:
1. Object DetectionThe software identifies the following in individual frames of the live video:
Object category: person, bicycle, bus, piece of luggage, etc.
Object position in the image
Object size in the image
This information is hereafter referred to as a Bounding Box.
2. Trajectory CollectionThrough continuous object detection, trajectories can be recorded over time based on the movement of the bounding boxes. These allow for conclusions regarding the direction of movement, duration in the image, virtual line crossings, and presence in virtual zones. Trajectories are generally camera-bound. This means that as soon as a person leaves the camera's field of view, the trajectory ends. Recognition is impossible if they re-enter the image.
3. Recognition (Re-ID)To determine the length of stay in a building, the temporary storage of a feature vector is required to recognize the person when they leave. The feature vector is a 500-dimensional numerical sequence that contains no directly interpretable appearance characteristics. Since this vector is not human-readable and cannot be traced back to an image, it serves exclusively for mathematical similarity comparison for short-term recognition.The software generates this vector once when entering the building and again when exiting. If two vectors are similar, the person is considered recognized. The time difference between entry and exit is the length of stay. The feature vector is deleted after recognition or after a maximum of 2 hours.
4. Permanent Storage (Final Result)After the feature vector is deleted, only the anonymized, purely statistical metadata remains in the system (e.g., length of stay: 15 minutes). Since these aggregated numbers no longer have any personal reference, they can be stored for long-term analysis.
How can personal reference be excluded in Re-ID?
To exclude personal reference, Isarsoft Perception operates as follows:
No Personal Identification:No direct identification data (faces, names) and no biometric data are processed.
No Video Storage (RAM Processing):Live video streams are analyzed only fleetingly in the RAM and discarded within fractions of a millisecond. No storage of image or video material occurs on hard drives. Only pseudonymized feature vectors are stored for a maximum of 2 hours.
Strict Data Minimization: The result of the analysis consists of purely statistical metadata (e.g., aggregated counts and stay durations) sent to the target platform. Any personal reference is excluded here.
Can staff be excluded from counting with Re-ID?
Yes, staff will be automatically excluded from counting. The system learns which individuals repeatedly appear for long periods, marking them as staff. This guarantees a high quality of collected data.