User's Manual
Table Of Contents
- Software Installation on page 10
- Overview
- VIVOTEK’s FE9380 and FE9382 are two H.265 fisheye fixed dome network cameras, both featuring a detailed 5-Megapixel CMOS sensor that produces superb image clarity. By employing H.265 compression technology and VIVOTEK’s Smart Stream III technology, these
- The cameras are both equipped with a removable IR-cut filter and WDR Pro technology, empowering the cameras to maintain optimal image quality around the clock and unparalleled visibility in high-contrast lighting environments. Moreover, the cameras are de
- * Depending on scene being monitored.
- Revision History
- Read Before Use
- Package Contents
- Symbols and Statements in this Document
- Physical Description
- LED Definition
- Hardware Installation
- Software Installation
- Network Deployment
- Accessing the Network Camera
- Using RTSP Players
- Using 3GPP-compatible Mobile Devices
- Using VIVOTEK Recording Software
- Main Page
- Client Settings
- Configuration
- System > General settings
- System > Homepage layout
- System > Logs
- System > Parameters
- System > Maintenance
- Media > Image
- Media > Video
- Media > Audio
- Media profiles
- Network > General settings
- Network > Streaming protocols
- Network > QoS (Quality of Service)
- Network > SNMP (Simple Network Management Protocol)
- Network > FTP
- Bonjour
- Security > User accounts
- Security > HTTPS (Hypertext Transfer Protocol over SSL)
- Security > Access List
- Security > IEEE 802.1x
- PTZ > PTZ settings
- Event > Event settings
- Applications > Motion detection
- Applications > Smart VCA
- Applications > DI and DO
- Applications > Tampering detection
- Applications > Audio detection
- Applications > Shock detection
- Applications > Package management - a.k.a., VADP (VIVOTEK Application Development Platform)
- Recording > Recording settings
- Storage
- Storage > SD card management
- Storage > NAS management
- Storage > Content management
- Appendix
VIVOTEK
User's Manual - 155
Applications > Tampering detection
This section explains how to set up camera tamper detection. With tamper detection, the camera
is capable of detecting incidents such as redirection, blocking or defocusing, or even spray
paint.
Please follow the steps below to set up the camera tamper detection function:
1. Click to select the checkbox before tampering conditions: Tampering detection, Image too
dark, Image too bright, and Image too blurry. Enter the tamper trigger duration. (10 sec. ~ 10
min.). The duraction species the set of time before the tampering is considered as a real
alarm. This helps avoid false alarms by short-lived changes.
The tamper alarm will be triggered only when the tampering factor (the difference between
current frame and pre-saved background) exceeds the trigger threshold. Conditions such
as image too dark, too bright, or too blurry (defocused) can also be congured as tampering
conditions. The Trigger threshold determines how sensitive your is tamper detection setting.
Lower the threshold number, easier to trigger.
Too bright: shining a flash light. The average lighting level of the scene is taken into
consideration.
Too dark: covering the objective or spraying paint.
Too blurry: blurry scene can be the result of strong interference on the device, such as EMI
interference.
2. You can configure Tampering Detection as a trigger element to the proactive event
configurations in Event -> Event settings -> Trigger. For example, when the camera is
tampered with, camera can be congured to send the pre- and post-event video clips to a
networked storage device. Please refer to page 133 for detailed information.