Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Six Common Mistakes in Day to Night Surveillance

By Keven Marier
April 1, 2013

While there are hundreds of articles, product descriptions and manufacturer specifications on what makes a “true” day/night surveillance camera, there may be a misunderstanding of how to design them into today’s networked surveillance systems. On the surface the industry has a very good understanding of the many camera specification requirements that make up today’s day/night cameras. However, what is needed in the night-networked surveillance industry is the same level of understanding in designing the day-networked camera operations. The current system design strategy is the result of not understanding the implications of larger resolutions, encoded with H.264, and scaled into very large deployments with unlimited storage capabilities. In addition, there are now advancing imager/sensor technologies that are able to record in color in very low light. All of this may lead to a failure of design strategies and tools, which may or may not have kept pace with the innovation and the multiplying effects of combining these together. 

Here are six common mistakes that are made with the design of and how you can avoid them.

 

1. Mega Night Pixel Problems

            When all the industry had for camera resolutions were NTSC or PAL standards, the differences in storage between day and night was very small. However, the image sizes of today’s megapixel camera resolutions are creating images much larger than the CCTV NTSC/PAL standards and, thus, the differences between day and night operations become much larger. With so many additional pixels, night sensitivity is an issue with multi-megapixel cameras. Many times these new resolutions perform poorly during the night, creating false video motion recording events of massively large file sizes. This creates huge differences in the amount of video being recorded between day and night operations, and the night storage performance problems and capacity planning challenges occur when these two factors are not calculated separately from the daytime surveillance design.

 

2. Day/Night H.264 Strategies

            The many benefits that H.264 brought to the surveillance market have not been realized in night operations. That is because during night operations when the imager gets “noisy” the average image sizes go way up toward what you would expect from an MPEG4 or, in some instances, as bad as MJPEG sizes. All of this creates higher bandwidth, more motion detection-based recording and increased storage.

 

3. Larger Deployments = Larger Design Mistakes

            During the last five years, the average camera count per site deployment has been rising, well above the typical 16. This is a direct result of the network-based technologies that today’s video management software is designed to enable. The challenge this poses is when larger systems are not designed correctly for night operations, larger systems will have larger mistakes. 

 

4. Unlimited Storage of Night Surveillance

            During the CCTV era, DVRs had limited recording capabilities, which could be viewed now as a benefit when trying to limit storage design mistakes:  Storage was based on every 16-camera DVR. The hard disks being utilized were small compared to today’s multi-terabyte capacities being offered. Increases in capacities and lower cost per terabyte have largely been seen as a benefit to the market. The downside is the market has seen the proliferation of an “over- building” of storage systems and thus, perhaps, not much motivation to improve design strategies.  

 

5. Advanced Imagers Complicate Basic Design Requirements

            The interesting impact of the technical advances of new imagers and sensors being able to view in color during night operations has lead to confusion as to the original objective of a surveillance system. What used to be a very clear purpose of either detection or identification has now been complicated with color. While these technologies improve image usability, the system design costs are not so clearly understood.

 

6. Compounding Effects

            Day/night camera operations have developed into a new critical area of design because of all the new network camera technologies combined with new video management system capabilities; the industry is challenged with compounding technology effects. When considered separately, all of the above technical advances are truly better than the past. However, what remains a challenge is how well the system design tools are dealing with nighttime surveillance operations. 

            So what is the solution? One solution is the use of thermal cameras, which can be used to accompany visible light cameras to handle the night requirement. It is true that megapixel visible camera have poor light sensitivity, therefore they should not be used in that application. Thermal cameras can solve several night imaging requirements for pro-active detection applications, as they use far less bandwidth than megapixel cameras, especially when the megapixel units also get noisy. Thermal cameras also can be used to cover much more area than visible light or IR illuminated cameras at night.   

 

This article was previously published in the print magazine as "Twists and Turns of Day to Night."

KEYWORDS: day/night camera megapixel surveillance night surveillance video surveillance storage

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Keven Marier is the founder and CEO of Connex International, Inc. He has a 20-year background in technology consulting, publishing and educating within the physical security technology and enterprise IT industries. Connex International Inc. is a 55-person global professional services company providing services to security manufacturers, distributors, systems integrators and end-users in 14 different languages.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Finding Storage Solutions for Day-to-Night Surveillance

    See More
  • Surveillance ‘In The Dark’

    See More
  • How to Manage Surveillance Over the Private Cloud

    See More

Related Products

See More Products
  • s in europe.jpg

    Surveillance in Europe

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing