Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

The H.264 Bit Rate “Balancing Act”

By Keven Marier
Keven Marier
June 1, 2012

Much has been written about the significant bandwidth and storage savings H.264 provides when compared to MJPEG or MPEG4 Part 2. A related topic is the various ways H.264 can be configured and the resulting impact to image quality. Resolution, lighting, scene activity, bit rate, rate type, I-frame interval and compression all dramatically change how image quality is captured, transmitted and stored. This creates a “balancing act” between network bandwidth controls and image quality that isn’t easy to execute successfully because of the wide range of parameters in use. Some network camera deployments are overly concerned with bandwidth or storage consumption and consequently limit the cameras’ bit rate, resulting in low image quality. Other deployments are not concerned with bandwidth and allow an unlimited bit rate. However, they leave the cameras’ default compression setting, causing the same effect: poor image quality.

  

Image Size (H)/(V) Versus Image Quality

When asked “What makes up image quality?” the majority of professionals in the industry will say resolution, or the number of megapixels. Resolution is the leading image quality measurement; however it doesn’t translate directly to image quality. Resolution is the easiest parameter to select and compare between camera manufacturers or models and is thought to be representative of image quality, when it actually only determines image quality potential. What resolution technically determines is the maximum horizontal (H) and vertical (V) pixel count. When someone says they want a five-megapixel camera, they are saying they want a camera with a maximum resolution of 2560 (H) x 1920 (V).  However, what they are implying is that this camera has very high image quality. Camera manufacturers configure the resolution in a similar way. While this variable is the easiest to select and configure, a horizontal and vertical resolution is only one of several important configurable quality parameters on the camera.

 

H.264 Bit Rate = “Actual” Image Quality

Most camera manufacturers either require or allow their cameras to configure a limit on the bandwidth used per second by the camera. Sony, for example, uses the bit rate parameter to determine the image quality and bandwidth used by their cameras. This creates a tradeoff between bandwidth and image quality. The bit rate range is selectable from 64 Kbps to 8192 Kbps for a two to three megapixel camera, and Sony recommends setting a higher bit rate to achieve a higher image quality.

Axis, on the other hand, provides another configurable parameter on its cameras called compression, which allows you to select how much to compress the image. Axis sets this value to 30 as a default, and it can be configured within a range of 0 to 100.  The image quality impact of this parameter is exactly the same as Sony’s bit rate parameter. This can sometimes confuse users who switch between cameras because with Sony the higher the “bit rate” the better the image quality, and with Axis the lower the “compression” the better the image quality.

 

Rate Type

Bit rate type is one of the most misunderstood bandwidth and image quality camera configuration parameters in the industry. The types available are variable or constant bit rate – or VBR and CBR. CBR allows you to fix the bit rate stream, regardless of scene activity, complexity and resolution. The caveats being that if you set the cap too high, you can waste bandwidth; too low, and it could cause issues with increased image compression or a drop in frame rate. Variable means that network bandwidth fluctuates based upon what is happening within the camera’s field of view and changing scene complexity. However, competing manufacturers implement different variables that have confusing or opposite effects on image quality.

Axis, VIVOTEK and other camera manufacturers use VBR to allow higher quality images regardless of the amount of bandwidth used. For users concerned with increased bandwidth usage, Axis provides an option to set a cap on the video stream using CBR. If the output rate hits its cap, the user can configure the camera to prioritize frames per second, image quality or neither. Sony uses a term called adaptive rate control, which automatically lowers image quality or frames per second based upon available network bandwidth to create an “optimized” viewing experience. However, even though bandwidth will fluctuate due to changing scene complexity, in some cases a VBR camera will produce lower bandwidth than a CBR camera if the fixed bit rate is higher than the actual bit rate caused by the scene being viewed. Testing is critical to determining end-results.

 

Read the Fine Print

What can be done to avoid this confusion? Read the fine print and use the bandwidth calculation tools offered by many manufacturers. Systems are engineered and sold to accommodate high bit rates, but the cameras are only streaming low bit rates. Additionally, if you adjust I-frame frequency, or use network Quality of Service, image quality can be further impacted. So, when balancing all the bits on the network, don’t forget that the surveillance mission requires specific “image quality.”  Don’t limit surveillance capabilities, because the network is running faster than you think.   

KEYWORDS: H.264 network camera video compression

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Keven Marier is the founder and CEO of Connex International, Inc. He has a 20-year background in technology consulting, publishing and educating within the physical security technology and enterprise IT industries. Connex International Inc. is a 55-person global professional services company providing services to security manufacturers, distributors, systems integrators and end-users in 14 different languages.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Keven Marier

    How to Measure the Effect of Megapixels

    See More
  • Keven Marier

    Software in the Middle of the New Physical Security Economy

    See More
  • Bill Marier

    Platforms for the Future

    See More

Related Products

See More Products
  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • 150 things.jpg

    The Handbook for School Safety and Security

  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

See More Products

Events

View AllSubmit An Event
  • December 19, 2011

    H.264

    H.264 is becoming an industry explosion and with good reason. Besides the fact that it enables higher image quality network video, it also acts as a significant way to reduce the price tag of your installation. We'll explain how to leverage H.264 to cost savings in this detailed presentation.
  • March 5, 2012

    H.264

    H.264 is becoming an industry explosion and with good reason. Besides the fact that it enables higher image quality network video, it also acts as a significant way to reduce the price tag of your installation. We'll explain how to leverage H.264 to cost savings in this detailed presentation.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!