Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Turning to MPEG-4

March 8, 2004
The video transmission standard MPEG-4 is a popular enabling technology for digital security video over Internet Protocol (IP) networks. Initially targeting low bit-rate video applications, the standard has developed significantly over the last few years to encompass a range of applications from mobile phones to set-top boxes. In video over IP applications, MPEG-4 is capable of delivering extremely high-quality video. However, it is not the standard alone, but the implementation of it, that delivers this quality. Not all MPEG-4 implementations are the same.

Building on other well-proven international standards, such as MPEG-2 and H.261/H.263, MPEG-4 offers an interoperable solution for the compression, management and presentation of digital video and audio. Offering improved video compression and quality over its predecessors, combined with a non-discriminatory licensing authority, MPEG-4 has some distinct advantages.

Going beyond its predecessors MPEG-4 offers much more in terms of compression tools that target specific applications. This is achieved through a large array of profiles and levels, for both audio and video, as well as a rich layer of systems level solutions, such as a standardized file format and the management and presentation of multimedia data. Conversely, by not mandating the actual transport protocol, for delivering MPEG-4 data, the standard does not impose any restrictions on the physical communication medium.

One often-misunderstood aspect of the standards, such as MPEG-4, is the assumption that as an open standard, little scope is available to manufacturers to differentiate themselves from the competition. This is far from the truth. MPEG-4 only mandates the syntax of the bit stream that is produced. The standard does not instruct on the design or implementation of the bit stream encoder compression decompression or CODEC. As such the quality and performance of one MPEG-4 encoder may differ wildly from one product to the next.

Hardware vs. Software

Unlike software-based MPEG-4 video codecs, fully pipelined hardware MPEG-4 solutions require minimal software control for operation and provide a deterministic period of time to encode and decode each frame of video. This latter point is crucial and allows some equipment to operate in a mode where no video frames are ever dropped from the stream. When dealing with high resolution interlaced video security this is fundamental to avoid unpleasant jerky interlacing artifacts.

The rate at which data is generated by an MPEG-4 encoder is set by the encoder’s rate control algorithm. Typically, when motion occurs in the video, the encoder will adjust the pre-determined target bit rate, set by the network administrator, by lowering the quality of the compressed data, in order to transmit the more complex data for the same bandwidth. In security video applications this reduction in potentially both frame rate and quality is often the last mode of operation required during incident-driven motion. MPEG-4 suggests a relaxed rate control algorithm, useful for security video applications over Ethernet. Here the target bit rate is often a function of the recording medium, such as a networked video recorder, whereby the inherent flexibility in the transmission medium can allow for small instantaneous fluctuations in the target rate and hence far less impacted video quality during incident-driven motion.

Well-implemented MPEG-4 systems can produce extremely good quality video.

Sidebar: Police, Video and Privacy

Local police agencies in the United States now are seeing value in replicating networked security video used by overseas police operations for years.

From California to New York and from Minnesota to Louisiana, life safety and police departments are installing or expanding networked video inside facilities and in public places. Some advances have also caught the eye of organizations which are privacy-sensitive.

The Louisiana branch of the American Civil Liberties Union (ACLU) recently condemned efforts of St. Bernard Parish Sheriff Jack Stephens. He is seeking federal homeland security grants for video cameras.

The dustup in America is in sharp opposition to law enforcement experiences in countries such as Great Britain.

At the same time Sheriff Stephens is fighting off the ACLU, police in the British States of Jersey were gladly upgrading to digital transmission and recording. Covering the town area of St. Helier and the Police Headquarters, the analog system comprises a number of time-lapse VCRs with the help of systems integrator ADT Security Services.

Jersey Police developed demanding performance specifications. In particular, the system had to be capable of handling 60 camera inputs at 25 frames per second, at full resolution (4CIF) and with full-frame refresh, something that not many systems were able to achieve.

“The key issues are picture quality, recorded image integrity and authentication, and a reduction in the amount of officer time spent when retrieving archive recordings,” Gary Buesnel, head of communications for Jersey Police, says.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Simultaneous MPEG-4 and M-JPEG

    See More
  • World’s Smallest MPEG-4 Network Camera

    See More
  • Mobile DVR With MPEG-4 & Wireless

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • into to sec.jpg

    Introduction to Security, 10th Edition

See More Products

Events

View AllSubmit An Event
  • October 29, 2024

    Data-Driven Security: Turning Incidents into Strategic Assets

    ON DEMAND: Are you looking for tips on how to turn everyday data into a powerhouse for your security strategy? Join us for our webinar, "Data-Driven Security: Turning Incidents into Strategic Assets," and find out how to unlock the full potential of your incident data.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing