Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

A ‘Codec’ Moment

September 1, 2004
There are frame- and stream-based codecs, here compared by features. The comparison of latency, quality and application, provided by the author, shows that security buyers seeking network-based surveillance video need to match codec with the type of use of the system as well as the take into consideration the bandwidth of the network. Advances going forward will impact the codec features charted here.
When deploying network-based video surveillance applications, security buyers must understand video encoding/decoding (codec) schemes. There are a number of different standard codec schemes, each designed for different purposes. Understanding the tradeoffs among these different codecs is important in designing a system that meets the customer’s requirements for image quality, resolution, bandwidth and archive duration.

Video compression through codecs is the process of reducing the number of bits needed to represent a given set of data. Compression works by eliminating redundancies in the raw data. In video encoding, further compression can be achieved by reducing detail, color, size and luminescence from the video signal

An example of stream-based encoding to handle security video images.

Basics of compression

Codecs reduce the space required to store video and, more importantly, reduce the bandwidth needed to transmit it across a network. This reduction is critical because raw video files are extremely large. A relatively small number of cameras delivering uncompressed video can quickly overwhelm even the most robust networks and storage systems. Video compression is required simply to make network video viewing, storage and management feasible.

Frame-based codecs employ intra-frame compression using a mathematical algorithm acting on pixels within the frame. The two most common frame-based codecs are MJPEG and Wavelet. Frame-based codecs are preferred for many security applications because each frame represents only data that is collected at that single point in time. This can make them more appropriate for forensic purposes, where the viewer is studying each individual frame for information.

Stream-based codecs employ algorithms that encode one complete frame at a specified interval, and then encode the inter-frame differences of subsequent frames for the balance of the interval. Decoders then decompress each key frame and use the difference information to recreate the subsequent frames until the next key frame is reached. Examples of stream-based codecs are MPEG-1, MPEG-2 and MPEG-4.

Stream-based codecs are popular for applications where smooth motion is important for live viewing of the video and network capacity is limited. The disadvantage of stream-based codecs is that they often have minimum bandwidth requirements. If bandwidth drops anywhere on the network, the video can become unusable. Stream-based codecs also introduce additional latency into the system, as multiple frames need to be cached and processed before video is displayed. Finally, stream-based codecs are sometimes considered less appropriate for forensic purposes because they have the characteristic of combining information from different frames and different points in time to build an interim frame that represents only what should be happening at that point.

An example of a design in which data travels, in part, over a wide area network or the Internet.
Motion JPEG remains the most popular encoding technique for real-time security applications for which image quality is valued more highly than smooth motion. MJPEG also scales nicely to accommodate variability in available bandwidth.

For high frame rate video on high bandwidth networks, MPEG-2 can be a viable choice. MPEG-2 delivers very smooth motion and is more efficient than MJPEG at high frame rates. It is useful in command and control applications where video is displayed on large screens and video quality is important. MPEG-4 is also beginning to emerge as a useful encoding technique, particularly for wireless and other low bandwidth networks. MPEG-4 will eventually support a wide range of quality/bandwidth choices and may replace MPEG-2 in many surveillance applications.

Some vendors offer proprietary codecs with a variety of performance claims and rationales. While this approach may work in a standalone system like a digital video recorder, network-based video applications should be built using industry-standard codecs. The advantages of multiple suppliers, reduced cost, future expansion capabilities and compatibility with other systems far outweigh any claimed performance gain from a proprietary system.

When looking for video distribution platforms, security equipment end users as well as their systems integrators and consultants should look for systems that allow them to work with multiple industry standard codecs that support a full range of applications, such as broadcast-quality video to a command center, remote monitoring over the Internet and access to video through wireless Web-enabled PDAs. An open system architecture based on industry standard codecs allows systems to evolve over time, taking advantage of new technologies as they become available.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

World Cup trophy beside goal

World Cup Safety and Security Is About More than Just Crime

Woman in suit

Can the Industry Do More for Women in Security?

Art museum

Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security

NYPD car

Explosives Thrown in Attempted Terrorist Attack Near NYC Mayor’s Home

American flag

Security Leaders Discuss Trump’s Cyber Strategy for America

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • A Teaching Moment

    See More
  • Dedicated Micros Announces DV-IP Codec

    See More
  • Employee works from home with online devices

    Meeting the moment for hybrid work cybersecurity

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security book.jpg

    Security Investigations: A Professional’s Guide

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing