Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

IP Centric Calls for Scalable Compression

By Yuzo Shida
June 5, 2006
JPEG2000 can provide resolutions and picture sizes to suit the application. Click image for larger view


Video compression, the shrinking of a video file to a fraction of its original size by reducing redundancies in the image, is an essential part of digital surveillance systems.

Though all compression algorithms accomplish this in one way or another, the choice of compression techniques used for a given surveillance system largely determines its performance capabilities, features and limitations. As such, a myriad of algorithms exist – Motion JPEG (MJPEG), MPEG2, MPEG4 and H.264, to name a few.

A more recent compression “player,” JPEG2000, uses wavelets for its compression. It’s configured differently than the others in that the structure of the compressed data allows it to provide flexible mechanisms to access different representations of the original image. In this author’s view, video encoding in the MJPEG or MPEG format is analogous to a TV program being recorded on an analog tape (a form of compression in the analog domain). By itself, the recorded tape is completely useless, and only becomes useful when it is put into a video player. Only when the tape is being played back on a player can the video be reprocessed or scaled. In the case of JPEG or MPEG, digital imaging has not advanced beyond the capabilities of analog imaging. A JPEG2000 codestream, on the other hand, is scalable, allowing it to be restructured, without recoding, to deliver the aspects of the image required by each of the target display environments.

Advantages over similar technologies

JPEG2000 has several advantages over MPEG4/H.264. The first is latency; temporal compression schemes such as MPEG have longer encode and decode times compared to JPEG2000. While this may not be important in applications where video is stored for playback at a later time, it is critical with video over IP and when interactive camera control is required during a live security video feed. For example, it would be very difficult for an operator to accurately track a moving person or object with a pan and tilt camera if there existed even a-half second delay between the operator’s control and the camera’s actual movement.

Another advantage is image quality. MPEG encoders usually filter or scale the image before encoding to ease the enormous processing task required. This degrades the image quality of the video. Rapid movement may also blur images, further reducing image quality. JPEG2000, which compresses image on a frame-by-frame basis, does not have these issues and is perceived by many to have superior image quality, especially in still images. In addition, the Spectrum Coalition for Public Safety – a national coalition of cities, states and public safety associations organized to support critical public safety wireless applications – has indicated that “MPEG4 is not admissible in court” in a recent document submitted to the FCC.

The right compression fit

Despite these drawbacks compared to JPEG2000, MPEG4 and H.264 have the distinct advantage of being more efficient in compressing video than JPEG2000, making them appropriate for use in surveillance applications that have lower bandwidth and storage requirements, the need for continuous 30-fps video and limited image quality needs. However, surveillance applications that require low latency, high image quality, image scalability and the assurance of court admissibility may be better suited with a surveillance system that uses the JPEG2000 (or wavelet) algorithm.

It is imperative for end-users to understand what the surveillance system is required to capture (Still image? 30-fps video?), and the limitations involved in its implementation (budget, network bandwidth, wireless necessity, court admissibility, etc). v

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Yuzo Shida is with Analog Devices, Wilmington, Mass. More information on IP video and video compression at www.securitymagazine.com and use the LINX service, powered by Google. Also visit Zalud’s Blog, updated daily, at http://blog.securitymag.com for perspectives and opinions on IP video.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Investing for the Future with Video-Centric PSIM

    See More
  • Shared, Scalable and Simple IP Video Storage Introduced

    See More
  • Scalable IP Video Surveillance Storage

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing