Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Finding Storage Solutions for Day-to-Night Surveillance

By Keven Marier
May 1, 2012

Many within the surveillance industry are deploying IP video surveillance cameras and networked recorders using the same design and engineering strategies used for building analog CCTV camera and DVR-based systems. On the surface this makes sense: surveillance is surveillance; the fundamental optics and geometry remains the same regardless of the medium. What isn’t the same is how the IP systems operate under day and night conditions.

As H.264 adoption rates increase, many security executives are finding that during the night recording activity and, consequently, storage consumption increase significantly. The reason isn’t due to activity in the field of view; it is because of the way H.264 works and the way surveillance recorders use video motion detection to determine when to record.

All compression – H.264, MPEG-4 or MJPEG – faces exactly the same challenge: when there is less light, the image will get noisier and cause the compression to be less efficient. Analog systems do the same inside the DVR. Fortunately for IP users, new technologies offer the flexibility to cope with the situation.  

 

H.264 vs. MJPEG

In the past, MJPEG was the predominant recording format, each frame was a full picture of the scene, and bandwidth was consistent between frames regardless of motion. H.264 video streams consist of one full picture every second called an “I” frame, separated by a series of “P” frames, representing changes against the last “I” frame. This is how H.264 streams use up to 80 percent less bandwidth and storage compared to MJPEG.  However, in low-light scenarios, H.264 camera bandwidth and storage consumption can double, reducing the savings compared to MJPEG. As a camera switches to night mode, the camera’s imager increases the gain to compensate for the low lighting which increases the image “noise,” often seen as static in the video.

 

Motion Recording

Further compounding this H.264 issue: many network video recorders use video motion detection as the single means of determining when to record. A typically designed system will record less than 15 percent of the daylight hours due to motion; however, at night, this can skyrocket to more than 90 percent. The reason is again due to an increase in the gain. This creates a lot of noise in the image, which collectively is seen as substantial motion by the video motion detection system. This tells the NVR to record the H.264 video, and now the increased bandwidth in the camera stream becomes two times the storage of the daytime video as well. 

 

Mega Pixel Multiplier

A key enabler of H.264 adoption has been the increased demand for megapixel and HD cameras. Previously, with MJPEG the storage and bandwidth consumption was cost-prohibitive for high-resolution imaging technologies. Take, for example, a 1-megapixel camera using MJPEG at 10 FPS with zero compression. This generates 16.4 megabits per second in bandwidth, compared to 2.5 megabits per second with H.264 at the exact same settings. This is an 85-percent savings in bandwidth and storage. So, many more megapixel cameras are being used. In addition, megapixel cameras have less light sensitivity than standard resolution analog cameras, which increases the amount of time the cameras are operating in a “noisy” mode. This situation contains factors which lead to unexpected storage and bandwidth consumption: Increased numbers and resolution of megapixel cameras, increased hours of “noisy” operation and recording during low-light periods make the gap between day- and night-recording requirements even bigger.

 

More Cameras and Longer Retention Times

Finally, two more factors are making an impact on storage strategies. IP surveillance products are reducing total system cabling cost, which allows customers to shift budget resources to invest in more camera locations than was possible with coaxial and fiber optic connected cameras. Second, security departments are expected to retain video surveillance recordings for longer periods of time, exacerbating the need for a new strategy.

 

Same Problem, New Strategy

Balancing day- and night-surveillance requirements isn’t a new problem; however, the impact of not acknowledging the difference is now seen: systems are consuming significantly more storage by recording non-events at night.  The compounding effects of H.264, the percentage of motion recording, and megapixel cameras deployed in the CCTV analog way (without adjusting the default camera parameters) results in a “noisy” surveillance operation.

Small changes can go a long way in preventing this. Adding devices like PIR or IR illuminators can dramatically reduce the amount of storage consumed at night by increasing the accuracy of motion detection during low light hours. Developments in today’s latest IP cameras and in-camera chip technology enable much better noise reduction capabilities inside the camera so as not to negatively affect storage. Efficiently designed video analytics can also filter out “noise” in the scene by triggering recording only on events that are object-based.

The bottom line: Test and tune the system during both modes of operation so you’re not surprised by the amount of nighttime and low light storage.   

KEYWORDS: IP video surveillance motion detection security systems security video video surveillance news

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Keven Marier is the founder and CEO of Connex International, Inc. He has a 20-year background in technology consulting, publishing and educating within the physical security technology and enterprise IT industries. Connex International Inc. is a 55-person global professional services company providing services to security manufacturers, distributors, systems integrators and end-users in 14 different languages.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Six Common Mistakes in Day to Night Surveillance

    See More
  • Adapting Surveillance for Security-as-a-Service

    See More
  • How to Manage Surveillance Over the Private Cloud

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing