Surveillance Strategies

The Business Case for Image Quality

The security industry has adopted some bad habits from the IT industry. These habits are most noticeable in systems that can be described as “over built” and “under delivered.”  The trend of building overly complex systems creates challenges for systems integrators, and is a huge strain on end user’s security budget. This problem exists due to a lack of knowledge and experience with the complex surveillance technologies used in today’s networked video world. The following illustrates the most common over/under design issues in surveillance systems, which continue to get worse.

 

Over Pixelated, Under Displayed

One of the biggest problems with most system designs today is a camera and display resolution mismatch. These design flaws waste system processing, networking and budgetary resources. Camera resolutionshave always followed the display standards: VGA, D1, 4CIF, and HD, which are standards that describe both a camera and display resolution. With analog video it is easy to match four CIF resolution cameras into a 4CIF display. With  HD and megapixel cameras and multiple image aspect ratios (4:3, 16:9, 9:16), cameras are generating larger images with more pixels than the video display technologies can display without discarding pixels.

Demand for HD and megapixel cameras continues to increase these problems. One major benefit of megapixel cameras has been to increase the pixels per foot calculation used to quantify image quality. A second benefit is the ability to digitally zoom into the image while retaining identifying detail. However, the realities are that megapixel resolutions are being displayed in 16+plus camera views on monitors running less than 1920x1080 resolution, which is 2.1 million pixels. So the resulting situation is 16, 2.1 megapixel HD cameras, (which combined, equals 33.6 megapixels of resolution) on a single display that will discard (33.6 Mp minus 2.1 Mp) 31.5 million (94 percent) pixels of camera resolution. However, the network will still have to carry the traffic, and the workstation will have to decode and process all 33.6 million pixels of data, only to have the display throw it away. This creates a display environment that cannot use the high-resolution camera capabilities without digitally zooming. So in a live view it makes no sense to use high-resolution cameras. A better option is to dual stream a much lower live view resolution, with a megapixel resolution recorded where the digital zoom feature can be used for investigation.

 

Over Complex, Under Serviced

Another common issue is with overly complicated network design used by the physical security systems integrators who lack expertise with advanced networking technologies. It has become a common practice to design systems that use multicast network designs for live video streams because of the theoretical bandwidth limitations that may exist within a segment of the network. Most systems integrators and IT departments can’t actually service, troubleshoot or support multicast networks because they don’t have the necessary competency.  When networks are over complicated they require more service and expertise. Further complicating the problem is the practice of sharing the networking hardware between a customer’s IT department and the security integrators without sharing administration software access to the networking hardware. This makes it impossible for systems integrators to troubleshoot without the IT department, which leads to extended service outages and insecure buildings.

 

Over Priced, Under Used

Storage and server systems being specified today for surveillance systems are often heavily over priced and under utilized because they were designed for IT data centers and not surveillance systems. The results are security departments that over invest in server and storage technologies that don’t improve the security of the organization, and take budget away from more cameras and better video management software. Many hardware manufacturers who make storage systems are not providing accurate design and engineering requirements, which confuses the industry. The simple fact is that you can add more storage and servers any time after the initial design with little to no disruption to the production surveillance environment.

 

The Over/Under Lessons

If the industry continues over building and under delivering surveillance systems, the overall market growth will slow down until design competency of consultants, A&E’s, systems integrators and IT departments can catch up. This will only happen when common, standards based design fundamentals are created and adopted by the industry. 

Did you enjoy this article? Click here to subscribe to Security Magazine. 

Recent Articles by Keven Marier

You must login or register in order to post a comment.

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

July 2014

2014 July

In the July issue of Security Magazine, read about how the NFL is balancing security with fan experience to make sure sporting events are running smoothly. If you're doing any traveling this summer, be sure to read the 5 hot spots for business travel security, also, employers can track on-the-go employees with new mobile apps. Also, check out the latest news and industry innovations for the security industry.

Table Of Contents Subscribe

Adopting New Technology

How long do you wait before adopting a new technology?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+