User's Manual of ICA-3480F/ICA-4480F
Figure 6-23
Here you can choose up to 3 occlusion areas. Hold down the left mouse button and drag to
select the area in the area. Region 1, Region 2 and Region 3 below will show the
corresponding coordinates, width, and height of the region. If you want to delete a region, click
on the corresponding "Delete" button. Click on the "Apply" after completing the setting.
③ Video Tampering
The Video Tampering function is used to detect whether a monitoring area is blocked by
human factors and other factors during a certain period of time. When the area of the device is
blocked, the IP camera will alarm according to the settings. When the occlusion alarm is
generated, the occlusion alarm cause can be quickly discharged and the monitoring screen
can be restored.
The specific operation steps are as follows:
Step 1: In the main interface click on the "Config Events Ordinary Events Video
Tampering" to enter the video tampering settings interface, as shown in Figure 6-24:
56