Surveillance Strategies

Six Common Mistakes in Day to Night Surveillance

While there are hundreds of articles, product descriptions and manufacturer specifications on what makes a “true” day/night surveillance camera, there may be a misunderstanding of how to design them into today’s networked surveillance systems. On the surface the industry has a very good understanding of the many camera specification requirements that make up today’s day/night cameras. However, what is needed in the night-networked surveillance industry is the same level of understanding in designing the day-networked camera operations. The current system design strategy is the result of not understanding the implications of larger resolutions, encoded with H.264, and scaled into very large deployments with unlimited storage capabilities. In addition, there are now advancing imager/sensor technologies that are able to record in color in very low light. All of this may lead to a failure of design strategies and tools, which may or may not have kept pace with the innovation and the multiplying effects of combining these together. 

Here are six common mistakes that are made with the design of and how you can avoid them.

 

1. Mega Night Pixel Problems

            When all the industry had for camera resolutions were NTSC or PAL standards, the differences in storage between day and night was very small. However, the image sizes of today’s megapixel camera resolutions are creating images much larger than the CCTV NTSC/PAL standards and, thus, the differences between day and night operations become much larger. With so many additional pixels, night sensitivity is an issue with multi-megapixel cameras. Many times these new resolutions perform poorly during the night, creating false video motion recording events of massively large file sizes. This creates huge differences in the amount of video being recorded between day and night operations, and the night storage performance problems and capacity planning challenges occur when these two factors are not calculated separately from the daytime surveillance design.

 

2. Day/Night H.264 Strategies

            The many benefits that H.264 brought to the surveillance market have not been realized in night operations. That is because during night operations when the imager gets “noisy” the average image sizes go way up toward what you would expect from an MPEG4 or, in some instances, as bad as MJPEG sizes. All of this creates higher bandwidth, more motion detection-based recording and increased storage.

 

3. Larger Deployments = Larger Design Mistakes

            During the last five years, the average camera count per site deployment has been rising, well above the typical 16. This is a direct result of the network-based technologies that today’s video management software is designed to enable. The challenge this poses is when larger systems are not designed correctly for night operations, larger systems will have larger mistakes. 

 

4. Unlimited Storage of Night Surveillance

            During the CCTV era, DVRs had limited recording capabilities, which could be viewed now as a benefit when trying to limit storage design mistakes:  Storage was based on every 16-camera DVR. The hard disks being utilized were small compared to today’s multi-terabyte capacities being offered. Increases in capacities and lower cost per terabyte have largely been seen as a benefit to the market. The downside is the market has seen the proliferation of an “over- building” of storage systems and thus, perhaps, not much motivation to improve design strategies.  

 

5. Advanced Imagers Complicate Basic Design Requirements

            The interesting impact of the technical advances of new imagers and sensors being able to view in color during night operations has lead to confusion as to the original objective of a surveillance system. What used to be a very clear purpose of either detection or identification has now been complicated with color. While these technologies improve image usability, the system design costs are not so clearly understood.

 

6. Compounding Effects

            Day/night camera operations have developed into a new critical area of design because of all the new network camera technologies combined with new video management system capabilities; the industry is challenged with compounding technology effects. When considered separately, all of the above technical advances are truly better than the past. However, what remains a challenge is how well the system design tools are dealing with nighttime surveillance operations. 

            So what is the solution? One solution is the use of thermal cameras, which can be used to accompany visible light cameras to handle the night requirement. It is true that megapixel visible camera have poor light sensitivity, therefore they should not be used in that application. Thermal cameras can solve several night imaging requirements for pro-active detection applications, as they use far less bandwidth than megapixel cameras, especially when the megapixel units also get noisy. Thermal cameras also can be used to cover much more area than visible light or IR illuminated cameras at night.   

 

This article was previously published in the print magazine as "Twists and Turns of Day to Night."

Did you enjoy this article? Click here to subscribe to Security Magazine. 

Recent Articles by Keven Marier

You must login or register in order to post a comment.

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

September 2014

2014 September

In the September issue of Security Magazine, find out who this year's most influential people are in the security industry are. Also, take a peek at the technology products that ASIS 2014 will be showcasing at the upcoming event. Read about the lessons learned from security at the World Cup, find out why tactical medical training is a must for your enterprise and how Atlanta increased security by sharing surveillance.
Table Of Contents Subscribe

Adopting New Technology

How long do you wait before adopting a new technology?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+