
Knife Detection System
AI-powered real time knife detection to help prevent assaults and robberies
Book a demoRelated materials
FAQ
Scylla knife detection is an algorithm designed to detect knives in video streams from both stationary and moving cameras. It provides real-time video analytics that are not affected by background scenes or motion. Upon detection, an alert is triggered and distributed with the time, location, a screenshot, and a short video clip.
If two weapons are shown simultaneously, the system will focus on and detect only one at a time. A "hawk eye" mechanism zooms in on one weapon to check it more closely and alerts if needed. Once an alert is sent for the first weapon, the system may then switch its focus to the second object.
Scylla's AI modules have four sensitivity levels: Super Sensitive, Sensitive, Normal, and Selective. "Normal" is the default setting and, along with "Sensitive," is recommended for a production environment. "Super Sensitive" can be used for demos but may generate a high number of false positives, while "Selective" detects only high-confidence events and produces minimal false positives but might miss some borderline cases.
The Knife Detection system is primarily designed to detect knives held in a person's hands. While it may occasionally detect an unpossessed knife, this is not its specific design purpose. Knives hidden in pockets or tucked into trousers are not detected.
When a knife is detected, the system instantly triggers an alert. This alert is sent to a dashboard for security camera operators and can also be delivered to a mobile app. The alert includes a short video snippet and a screenshot of the detection, providing crucial context, time, and location information for immediate situational awareness.
Yes, Scylla's AI-powered solutions are designed for seamless integration. The knife detection system can be integrated with a wide range of modern cameras, networks, and Video Management Systems (VMS), allowing organizations to leverage their existing security infrastructure and avoid costly hardware overhauls. This flexibility makes it a cost-effective way to upgrade security capabilities.