Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Seeing Value in CMOS

January 1, 2008
"Advancing CMOS chips are grabbing more attention for security applications," said James He.


James He is chief operating officer at OmniVision Technologies. In this Visions, he talks with Security Magazine about the CMOS role in security.

Security: First if all, what types of image sensors are commonly used in security applications? Can you give an overview of what, in your opinion, the relative strengths of different imaging sensor types are?

He: There are two main types of image sensors commonly used in the security market – CCD (Charge Coupled Display) and CMOS (Complementary Metal Oxide Semiconductor).

For many years CCD had the larger market share and was the “technology of choice” as it was the only really viable solution. CCD offered high-performance imaging compared to previous generations of CMOS sensors, but demanded that the product be sufficiently large to house multiple system components. CCD solutions often comprised expensive multi-chip systems, were also complex, and based on a highly specialized process. As a result, users had to contend with the resolution, range and temperature limitations of CCD sensors - issues that are important in security applications.

Over the past several years, CMOS technology has evolved and made headway in entry-level commercial security applications. This advance is a result of lower power requirements along with significant improvements in performance and sensitivity. As pixel sizes have become progressively smaller, CMOS-based solutions became more cost-effective. CMOS image sensors integrate circuitry on a single chip in a compact design and enable a smaller camera unit than those found in competing CCD systems. CMOS image sensors typically use just 1/10th of the power used by CCD devices, a factor which, when multiplied out over today’s large security networks, equates to substantial financial savings for the user. CMOS image sensors are less expensive to manufacture and are typically sold at a lower cost, again lowering overall system cost, meaning further cost savings to manufacturers.

Security: How do you expect to see CMOS image sensors being employed in the commercial and domestic security markets, especially considering the different requirements of low-end, medium and high-end systems?

He: We expect to see cameras using CMOS sensors become firmly established as the technology of choice for security applications in terms of market share. We are already seeing the mass market deployment of CMOS sensors in the Asian OEM and ODM markets, where we have many customers in the Webcam and security camera sectors.

The accepted path for technology is that it moves from high-end applications down to mass production as it becomes more cost-effective. The commercial security camera domain does not follow this trend, as we are seeing CMOS sensors, currently at the heart of the majority of consumer cameras, quickly gaining traction in high-end commercial applications. The gap in image quality between CCD and CMOS image sensors has narrowed greatly – so much so that a new wave of CMOS-based cameras is making its way into production and into mid- and high-level applications.

We feel that the industry is now starting to see that CMOS imaging solutions offer a combination of lower cost, rapidly advancing performance, less power drain, dramatic advances in light sensitivity, and a critical size advantage. CMOS sensors increasingly address the high-volume, space-constrained needs of commercial surveillance, where performance is the end goal.

The new generation of CMOS-based systems owes its increasing popularity to the complexity of commercial surveillance equipment entering the marketplace. The focus of this equipment is on size, low power, the ability to support intelligent, anywhere/anytime security, and having the video output available globally. The fundamental issues at work to provide this complex equipment involve the number of chips, the total integration of necessary features and the best resolution across often widely varying environmental conditions.

Security: What are the key considerations, in your opinion, when designing a camera or video security system?

He: One key element in the design of a camera-based security system is the actual image sensor used. Different applications have, of course, different demands, but also some common requirements. The performance of any particular sensor needs to be sufficient to meet or exceed the expectations of the industry. Image quality, performance in varying light conditions and at varying temperatures, are all important elements in sensor choice, allied to the overall bill of materials, ease of integration into a camera design or security system, and end user installation, operation and maintenance.

Connectivity is an extremely important design consideration for the security market. Looking at connecting technologies, we see wireless connectivity and secure Internet playing a larger role in security applications.

IP cameras can be networked either wirelessly or via cable for on-site or remote monitoring via the Web, both for commercial and domestic security applications. IP cameras give the benefit of higher resolution (no longer limited to NTSC/PAL standards) and broader accessibility (from point-to-point CCTV to an Internet accessible network).

IP-based security will allow for the adoption of much more sophisticated software applications and also facilitate the adoption of digital output CMOS sensors with higher resolution levels and additional features, such as enhanced night vision.

Security: Looking to the future, which areas do you feel will be most important as the technological demands of the security market increase?

He: There are three main factors that will become critical to address the demands of the security market: intelligence, integration and innovation.

Intelligence: Commercial security cameras have become smarter. As a result, it is becoming increasingly necessary to intelligently analyze collected data in real time. CMOS technology first enables intelligence by providing enhanced digital details required by motion detection, face recognition and other image analysis applications. CMOS enables a user to access a segment of the image rather than looking at the entire image captured. Each CMOS active pixel sensor cell can be addressed and read individually using a simple addressing technique. Competitive technologies require the entire contents to be read out, which in turn negatively affects performance.

Smart CMOS-based cameras make real-time decisions that dramatically enhance both performance and quality of image. The result is a higher level of security protection and the ability to avoid the errors inherent in consistent human monitoring of surveillance video.

Integration: Further integration is an area we feel will be critical in future applications. With CMOS sensors, for example, the ability to receive and convert light to digital output is embedded on the sensor. Several features reside in the one-chip solution, including analog-to-digital conversion, electronic shutter, trans-impedance amplifiers, and sample-and-hold circuitry, as well as application related features such as back light compensation and lens distortion correction. When the majority of high-end surveillance cameras were analog, the need for multiple chips wasn’t an issue. Today as a rapidly growing number of surveillance cameras are digital, it is. The one chip solution allows for smaller cameras without a performance penalty.

Innovation: As CMOS technology continues to make headway into high-performance applications, there are a number of advances. For instance, the number of transistors in each pixel is rising. Today, up to seven transistors are resident in each pixel. Each pixel in effect becomes a camera - and photo quality is dramatically enhanced since auto exposure is performed on the complete array. CMOS is the only technology that can deliver a camera on a chip where the only ancillary elements are an oscillator and a power supply.

Innovations such as color HDR (high dynamic range) enable CMOS sensors to function much like the human eye, adapting to rapidly changing light conditions.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Are CMOS & Image Analysis the Next Trends?

    See More
  • online identity

    Deepfakes: When seeing is no longer believing

    See More
  • State and Federal Securities Regulators Seeing Fraud Scheme “Mutations”

    See More

Related Products

See More Products
  • Hospitality-Security.gif

    Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • Physical-Layer-Security.gif

    Physical Layer Security in Wireless Communications

  • s in europe.jpg

    Surveillance in Europe

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!