Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

A ‘Codec’ Moment

September 1, 2004
There are frame- and stream-based codecs, here compared by features. The comparison of latency, quality and application, provided by the author, shows that security buyers seeking network-based surveillance video need to match codec with the type of use of the system as well as the take into consideration the bandwidth of the network. Advances going forward will impact the codec features charted here.
When deploying network-based video surveillance applications, security buyers must understand video encoding/decoding (codec) schemes. There are a number of different standard codec schemes, each designed for different purposes. Understanding the tradeoffs among these different codecs is important in designing a system that meets the customer’s requirements for image quality, resolution, bandwidth and archive duration.

Video compression through codecs is the process of reducing the number of bits needed to represent a given set of data. Compression works by eliminating redundancies in the raw data. In video encoding, further compression can be achieved by reducing detail, color, size and luminescence from the video signal

An example of stream-based encoding to handle security video images.

Basics of compression

Codecs reduce the space required to store video and, more importantly, reduce the bandwidth needed to transmit it across a network. This reduction is critical because raw video files are extremely large. A relatively small number of cameras delivering uncompressed video can quickly overwhelm even the most robust networks and storage systems. Video compression is required simply to make network video viewing, storage and management feasible.

Frame-based codecs employ intra-frame compression using a mathematical algorithm acting on pixels within the frame. The two most common frame-based codecs are MJPEG and Wavelet. Frame-based codecs are preferred for many security applications because each frame represents only data that is collected at that single point in time. This can make them more appropriate for forensic purposes, where the viewer is studying each individual frame for information.

Stream-based codecs employ algorithms that encode one complete frame at a specified interval, and then encode the inter-frame differences of subsequent frames for the balance of the interval. Decoders then decompress each key frame and use the difference information to recreate the subsequent frames until the next key frame is reached. Examples of stream-based codecs are MPEG-1, MPEG-2 and MPEG-4.

Stream-based codecs are popular for applications where smooth motion is important for live viewing of the video and network capacity is limited. The disadvantage of stream-based codecs is that they often have minimum bandwidth requirements. If bandwidth drops anywhere on the network, the video can become unusable. Stream-based codecs also introduce additional latency into the system, as multiple frames need to be cached and processed before video is displayed. Finally, stream-based codecs are sometimes considered less appropriate for forensic purposes because they have the characteristic of combining information from different frames and different points in time to build an interim frame that represents only what should be happening at that point.

An example of a design in which data travels, in part, over a wide area network or the Internet.
Motion JPEG remains the most popular encoding technique for real-time security applications for which image quality is valued more highly than smooth motion. MJPEG also scales nicely to accommodate variability in available bandwidth.

For high frame rate video on high bandwidth networks, MPEG-2 can be a viable choice. MPEG-2 delivers very smooth motion and is more efficient than MJPEG at high frame rates. It is useful in command and control applications where video is displayed on large screens and video quality is important. MPEG-4 is also beginning to emerge as a useful encoding technique, particularly for wireless and other low bandwidth networks. MPEG-4 will eventually support a wide range of quality/bandwidth choices and may replace MPEG-2 in many surveillance applications.

Some vendors offer proprietary codecs with a variety of performance claims and rationales. While this approach may work in a standalone system like a digital video recorder, network-based video applications should be built using industry-standard codecs. The advantages of multiple suppliers, reduced cost, future expansion capabilities and compatibility with other systems far outweigh any claimed performance gain from a proprietary system.

When looking for video distribution platforms, security equipment end users as well as their systems integrators and consultants should look for systems that allow them to work with multiple industry standard codecs that support a full range of applications, such as broadcast-quality video to a command center, remote monitoring over the Internet and access to video through wireless Web-enabled PDAs. An open system architecture based on industry standard codecs allows systems to evolve over time, taking advantage of new technologies as they become available.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • A Teaching Moment

    See More
  • Dedicated Micros Announces DV-IP Codec

    See More
  • Employee works from home with online devices

    Meeting the moment for hybrid work cybersecurity

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • Optimizing Social Media from a B2B Perspective

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing