This is the 51st article in the award-winning “Real Words or Buzzwords?” series about how real words become empty words and stifle technology progress, also published on SecurityInfoWatch.com.
By Ray Bernard, PSP, CHS-III
Once seen as just a marketing term, ‘smart codecs’ have revolutionized video compression.
All-in-one RWOB
MAXIMIZE YOUR SECURITY OPERATIONS CAPABILITIES
Upgrade your security operations effectiveness through Security Technology Strategic Planning. Provably get more for your company's security technology investment.
★ ★ ★ GET NOTIFIED! ★ ★ ★
SIGN UP to be notified by email the day a new Real Words or Buzzwords? article is posted!
Real Words or Buzzwords?
The Award-Winning Article Series
#1 Proof of the buzzword that killed tech advances in the security industry—but not other industries.
#2 Next Generation (NextGen): A sure way to tell hype from reality.
#3 Customer Centric: Why all security industry companies aren't customer centric.
#4 Best of Breed: What it should mean to companies and their customers.
#5 Open: An openness scale to rate platforms and systems
#6 Network-friendly: It's much more than network connectivity.
#7 Mobile first: Not what it sounds like.
#8 Enterprise Class (Part One): To qualify as Enterprise Class system today is world's beyond what it was yesterday.
#9 Enterprise Class (Part Two): Enterprise Class must be more than just a top-level label.
#10 Enterprise Class (Part Three): Enterprise Class must be 21st century technology.
#11 Intuitive: It’s about time that we had a real-world testable definition for “intuitive”.
#12 State of the Art: A perspective for right-setting our own thinking about technologies.
#13 True Cloud (Part One): Fully evaluating cloud product offerings.
#14 True Cloud (Part Two): Examining the characteristics of 'native-cloud' applications.
#15 True Cloud (Part Three): Due diligence in testing cloud systems.
#16 IP-based, IP-enabled, IP-capable, or IP-connectable?: A perspective for right-setting our own thinking about technologies.
#17 Five Nines: Many people equate high availability with good user experience, yet many more factors are critically important.
#18 Robust: Words like “robust” must be followed by design specifics to be meaningful.
#19 Serverless Computing – Part 1: Why "serverless computing" is critical for some cloud offerings.
#20 Serverless Computing – Part 2: Why full virtualization is the future of cloud computing.
#21 Situational Awareness – Part 1: What products provide situational awareness?
#22 Situational Awareness – Part 2: Why system designs are incomplete without situational awareness?
#23 Situational Awareness – Part 3: How mobile devices change the situational awareness landscape?
#24 Situational Awareness – Part 4: Why situational awareness is a must for security system maintenance and acceptable uptime.
#25 Situational Awareness – Part 5: We are now entering the era of smart buildings and facilities. We must design integrated security systems that are much smarter than those we have designed in the past.
#26 Situational Awareness – Part 6: Developing modern day situational awareness solutions requires moving beyond 20th century thinking.
#27 Situational Awareness – Part 7: Modern day incident response deserves the help that modern technology can provide but doesn’t yet. Filling this void is one of the great security industry opportunities of our time.
#28 Unicity: Security solutions providers can spur innovation by envisioning how the Unicity concept can extend and strengthen physical access into real-time presence management.
#29 The API Economy: Why The API Economy will have a significant impact on the physical security industry moving forward.
#31 The Built Environment: In the 21st century, “the built environment” means so much more than it did just two decades ago.
#32 Hyper-Converged Infrastructure: Hyper-Converged Infrastructure has been a hot phrase in IT for several years, but do its promises hold true for the physical security industry?
#33 Software-Defined: Cloud-computing technology, with its many software-defined elements, is bringing self-scaling real-time performance capabilities to physical security system technology.
#34 High-Performance: How the right use of "high-performance" can accelerate the adoption of truly high-performing emerging technologies.
#35 Erasure Coding: Why RAID drive arrays don’t work anymore for video storage, and why Erasure Coding does.
#36 Presence Control: Anyone responsible for access control management or smart building experience must understand and apply presence control.
#37 Internet+: The Internet has evolved into much more than the information superhighway it was originally conceived to be.
#38 Digital Twin: Though few in physical security are familiar with the concept, it holds enormous potential for the industry.
#39 Fog Computing: Though commonly misunderstood, the concept of fog computing has become critically important to physical security systems.
#40 Scale - Part 1: Although many security-industry thought leaders have advocated that we should be “learning from IT,” there is still insufficient emphasis on learning about IT practices, especially for large-scale deployments.
#41 Scale - Part 2: Why the industry has yet to fully grasp what the ‘Internet of Things’ means for scaling physical security devices and systems.
#42 Cyberspace - Part 1: Thought to be an outdated term by some, understanding ‘Cyberspace’ and how it differs from ‘Cyber’ is paramount for security practitioners.
#43 Cyber-Physical Systems - Part 1: We must understand what it means that electronic physical security systems are cyber-physical systems.
#44 Cyberspace - Part 2: Thought to be an outdated term by some, understanding ‘Cyberspace’ and how it differs from ‘Cyber’ is paramount for security practitioners.
#45 Artificial Intelligence, Machine Learning and Deep Learning: Examining the differences in these technologies and their respective benefits for the security industry.
#46 VDI – Virtual Desktop Infrastructure: At first glance, VDI doesn’t seem to have much application to a SOC deployment. But a closer look reveals why it is actually of critical importance.
#47 Hybrid Cloud: The definition of hybrid cloud has evolved, and it’s important to understand the implications for physical security system deployments.
#48 Legacy: How you define ‘legacy technology’ may determine whether you get to update or replace critical systems.
#49 H.264 - Part 1: Examining the terms involved in camera stream configuration settings and why they are important.
#50 H.264 - Part 2: A look at the different H.264 video frame types and how they relate to intended uses of video.
#51 H.264 - Part 3: Once seen as just a marketing term, ‘smart codecs’ have revolutionized video compression.
#52 Presence Technologies: The proliferation of IoT sensors and devices, plus the current impacts of the COVID-19 pandemic, have elevated the capabilities and the importance of presence technologies.
#53 Anonymization, Encryption and Governance: The exponential advance of information technologies requires an exponential advance in the application of data protection.
#54 Computer Vision: Why a good understanding of the computer vision concept is important for evaluating today’s security video analytics products.
#55 Exponential Technology Advancement: The next 10 years of security technology will bring more change than in the entire history of the industry to now.
#56 IoT and IoT Native: The next 10 years of security technology will bring more change than in the entire history of the industry to now.
#57 Cloud Native IoT: A continuing look at what it means to have a 'True Cloud' solution and its impact on today’s physical security technologies.
#58 Bluetooth vs. Bluetooth LE: The next 10 years of security technology will bring more change than in the entire history of the industry to now.
#59 LPWAN - Low-Power Wide Area Networks: Emerging IoT smart sensor devices and systems are finding high-ROI uses for building security and safety.
#60 Edge Computing and the Evolving Internet: Almost 15 billion personal mobile devices and over 22 billion IoT devices operating daily worldwide have shifted the Internet’s “center of gravity” from its core to its edge – with many implications for enterprise physical security deployments
#61 Attack Surface: (Published as a Convergence Q&A Column article)An attack surface is defined as the total number of all possible entry points for unauthorized access into any system.
#62 Autonomous Compute Infrastructure: We’re on the brink of a radical new approach to technology, driven by autonomous operations.
#63 Physical Security Watershed Moment: We have reached a juncture in physical security technology that is making most of our past thinking irrelevant.
#64 Access Chaos: For 50 years we have had to live with physical access control systems that were not manageable at any large scale.
#65 AI and Automatiom: Will engineering talent, business savvy and capital investment from outside the physical security industry bring technology startups that transform reactive security to proactive and preventive security operations?
#66 Interoperability: Over the next five years, the single greatest determinant of the extent to which existing security industry companies will thrive or die is interoperability.
#67 AI Model : One key factor affects the accuracy, speed and computational requirements of AI
#68 Interoperability – Part 2: There are two types of security system interoperability – both of which are important considerations in the design of security systems and the selection of security system products.
#69 Interoperability – Part 3: There are two types of security system interoperability – both of which are important considerations in the design of security systems and the selection of security system products.
#70 Operationalizing AI: AI is not a product, but a broad category of software that enables products and systems to do more than ever before possible. How do we put it to good use?
#71 Shallow IT Adoption – Part 1: It’s not just about being IT compliant, it’s also about leveraging IT capabilities to properly serve the needs and wants of today’s technologically savvy customers.
#72 E-waste – an important security system design issue: Now e-waste is an important design issue not just because of growing e-waste regulations, but because educated designers can save enterprise security system customers a lot of money.
#73 LRPoE - Long Reach Power over Ethernet: A dozen factors have improved the business attractiveness of network cameras, making it more desirable to place cameras further from existing IT closets than the 328 foot limitation of standard Ethernet cable.
#74 NIST Declares Physical Access Control Systems are OT: Does it really mean anything that OT has joined the parade of labels (IT, IoT, and then IIoT) variously getting applied to security systems?
#75 Future Ready: Google sees the term "future-ready" trending up across many subject domains. But does that term apply to the physical security industry and its customers?
#76 Data KLiteracy: AI needs data. Thus, the ability of any department or division in an organization (including security) to use AI effectively depends on its ability to effectively obtain and utilize data – including security.
#77 Security Intelligence (upcoming): AI brings two kinds of intelligence to physical security systems – people bring the third.
More to come about every other week.
This article continues the discussion about the H.264/H.265 MPEG video standards, including the manufacturer innovations in smart codecs (once a marketing buzzword but now a very meaningful term). The reasons for discussing this complex video topic are presented in the Part 1 and Part 2 articles.
Those reasons include that video compression impacts video system cost and performance. Video compression reduces the burden on video networks and lowers data storage requirements. At the same time, it increases the data processing requirements – computer memory size and processing power.
Additionally, techniques such as motion-based recording can create problems of their own, such as spiking the processing and storage requirements by five times or more when rains, snow or lots of activity cause recording to be continuous on all outdoor cameras. On the other hand, the right AI-based video analytics can detect the difference between meaningless background changes like snow or rain and can eliminate the recording-spike phenomenon. Of course, running those kinds of analytics also increases the computer video processing power requirements.
There is some good financial news when you consider the exponential advancement of computing hardware and software technology and the two technology megatrends that result from it: decreasing technology costs and increasing technology capabilities. This means that shorter computing hardware lifecycles are appropriate for premises-based computing and storage so that you can stay ahead of the general need to increase the use of video and video analytics, and not run out of computing and storage capacity – potentially compromising security operations and investigations effectiveness.
Furthermore, utilizing a true cloud-based video VMS service and cloud-based analytics means having instantly-expanding compute and storage resources can give you a video technology infrastructure that expands and contracts with your actual usage on a minute-to-minute basis.
Evidence of the cost and capabilities megatrends having an impact is the move that Eagle Eye Networks made in early 2019 to cut its subscription prices by up to 45%. Smart cities are finding that a well-designed cloud-based approach to video can reduce the costs and efforts of video deployments for security and city operations by more than half, as Mexico City recently learned.
Now, back to our topic: smart codecs.
Today’s Codecs
As explained in the previous article, the first generation of video codec technology (codec being short for coding/decoding) dealt with improvements in compressing each video image. But they still sent the visually-same image over and over again when the scene the camera was viewing didn’t change. The next generation of codecs began sending partial images – only the parts that changed – in between the full images. This approach can reduce video storage dramatically, sometimes more than 80%.
Today’s video compression standards are very flexible due to the wide range of devices and software that video streams to across a wide variety of devices and networks, including the Internet. Thus, today’s security video technology benefits from the many advances made in video processing for movies, television and Internet video streaming. For example, the H. 264 video standard is at version 26 as of June 2019.
The result is that security camera makers can develop smart codecs that optimize video compression to minimize bandwidth and storage requirements while optimizing video quality based on the content and purpose of the video. This is done using the approaches specified in the H.264 and H.265 standards.
Smart Codecs
Originally, codecs set one compression level, one frame rate, and one I-frame interval (defining a group of pictures [GOP] that start with an initial full-image frame followed by a number of image-change frames, as explained in the Part 2 article) that all remained constant for a stream of video. Today’s smart codecs can change any or all of these values depending upon what’s happening in the video scene. Thus, smart codecs now can have:
- Dynamic Compression. Continuously identify the regions of interest (ROI), such as image areas with people and vehicles, and maintain high quality/low compression for those image regions in each frame, applying low quality/high compression for other regions.
- Dynamic I-frames. Increase the number of full-image frames (I-frames) in a video stream when there is activity, which reduces the compression artifacts (image distortion) for the frames in between the I-frames .
- Dynamic FPS. Increase the number of frames sent per second, increasing the smoothness of moving people and objects, and assuring that important actions (such as a shoplifter hiding an item) aren’t missed.
A smart codec with dynamic FPS adjustment allows you to have fewer frames per second when there is no activity, providing the greatest savings in video storage without compromising the video quality of scene activity.
It is important to get the specifics about what any particular smart codec does, and to make sure the codec’s performance is appropriate for the type of scene and the activity in it. Dynamic FPS is important, for example, for street intersections, retail stores, airport checkpoints, transportation terminals, stairwells, doorways and hallways.
For example, Axis Communications created Zipstream and Avigilon created HDSM SmartCodec (HDSM stands for High Definition Stream Management). The Axis and Avigilon smart codecs adjust all three smart codec capabilities listed above. Most camera codecs address only the first two.
It’s also important to discover what specific smart codes settings you should use for a particular camera’s scene, given that the manufacturer’s default settings won’t be suitable for all camera scenes and activities.
Video Processing Requirements
Keep in mind that the better the video compression, the greater the computing power required to decompress the video. While smart codecs help reduce network bandwidth utilization and video storage requirements, they increase the video processing and memory requirements of video servers and sometimes of the devices for video viewing. Add video analytics into the mix, and it is likely time to give serious thought to what your future roadmap should look like for security video technology.
Ray Bernard, PSP CHS-III, is the principal consultant for Ray Bernard Consulting Services (RBCS), a firm that provides security consulting services for public and private facilities (www.go-rbcs.com). He is the author of the Elsevier book Security Technology Convergence Insights available on Amazon. Mr. Bernard is a Subject Matter Expert Faculty of the Security Executive Council (SEC) and an active member of ASIS International.