Wednesday, December 31, 2014

Protect your home use Security Cameras

I want to protect my home and use Security Cameras

So I want to protect my home.   I need a video surveillance system for night or in areas with low light. So looks like the best option would be infrared security cameras that capture images even in the dark.

So what is an infrared camera exactly?

An infrared camera works by calculating the brightness of a room or particular area. They feature special LED lighting which can be seen on the outside lens. These LEDs are able to capture light from the regions of electromagnetic spectrum that allow an image to be created even if there is little visible light. For this reason we refer to IR cameras as having night vision.

An infrared security camera will switch its mode to infrared only when the light drops below a certain level. It captures black and white images at that point.

Interesting side note, IR Illuminators allow many objects to be penetrated, such as the haze, fog and smoke. Infrared Illuminators are used typically for a low light environment. Sometimes, when the IR array is focused narrowly or the hold is not strong enough the external IR Illuminator will give an extra sharp image. It can provide an additional infrared light source that is invisible to the naked eye normally.

If you are going to use infrared security cameras outdoors, the best option would be to choose those that can stand up to the natural elements as well as tampering from criminals.   I found several options that allow for the greatest flexibility including direct bright light, vandal resistant, weather proof and cost effective.

Friday, December 19, 2014

Value of Video Verification

The Value of Video Verification

A CCTV system tracks the inside and outside of a building and sends the indications to a screen. If you’re worried about the safety of your workspace, CCTV installations in India will assist you in protecting your property from anywhere at any time. CCTV services are also being used as an extra weapon in the war against crime in several countries around the world. This blog post will show you how CCTV video is crucial in criminal investigations. 

We will attempt to explain the significance of identifying the charged individual in light of Section 9 of the Indian Evidence Act, 1872 (subsequently referred to as “IEA”). In situations where there is no one to determine the identification of the convicted person, the performance of the offence may be proven by circumstantial evidence. CCTV footage is one example of such evidence. Secondly, this article examines the nature of CCTV footage using different case laws and asks if a lawsuit can be formed strictly on the grounds of a single element of CCTV footage. Finally, to prevent misunderstandings, here we will examine the procedure of electronic evidence admissibility in court in light of Section 65(b) of the IEA.

Video verification adds significant value to security and operations by transforming raw CCTV footage into actionable, reliable intelligence. Its core benefits lie in improving response accuracy, providing strong legal evidence, and delivering broader operational insights.

Key Benefits of CCTV Video Verification

Enhanced Security and Emergency Response 

·        False Alarm Reduction: Video verification allows trained operators or AI systems to visually confirm the cause of an alarm (e.g., distinguishing a pet from an intruder) before dispatching emergency services. This significantly reduces false alarms, which drain resources and can lead to fines.

·        Prioritized Emergency Response: Alarms that have been visually verified as genuine emergencies often receive a higher priority and faster response from police and other emergency services.

·        Proactive Intervention: With live monitoring and verification, operators can issue real-time audio warnings to deter intruders, often preventing an incident from escalating further.

·        Accurate Threat Assessment: Visual confirmation provides detailed information about the nature and severity of an incident, allowing for a more appropriate and measured response from security personnel and first responders. 

Investigative and Legal Value

·        Strong Evidence: Verified CCTV footage provides objective visual documentation that carries significant weight in legal proceedings and insurance claims. It can support or disprove witness testimonies and other evidence.

·        Suspect Identification and Elimination: The footage aids investigators in identifying suspects, tracking their movements (entry/exit routes, timelines), and can also help eliminate innocent individuals from inquiries.

·        Admissibility in Court: When handled correctly (maintaining a clear "chain of custody," proper storage, and technical authentication via a certificate of integrity), footage is highly admissible as evidence in court, which can lead to early guilty pleas and save trial costs.

·        Dispute Resolution: Objective visual records can quickly resolve disputes between customers, employees, or other parties, potentially saving businesses substantial litigation costs. 

Operational and Business Intelligence

Beyond security, video verification offers valuable operational insights: 

·        Remote Monitoring and Management: Business owners and managers can remotely access live or recorded footage from anywhere, enabling effective oversight across multiple locations and reducing the need for physical inspections.

·        Efficiency Improvements: Footage can be analyzed to identify operational inefficiencies, improve staffing levels during peak times, monitor equipment condition for maintenance, and verify cleaning or contractor work quality.

·        Employee Safety and Productivity: Monitoring work areas ensures compliance with safety regulations and encourages adherence to best practices, helping to protect employees and boost productivity. 

In essence, the value of CCTV video verification lies in its ability to transform passive surveillance into an active, intelligent, and multi-purpose tool that enhances safety, streamlines operations, and provides legally sound documentation.

Admissibility of E-evidence in criminal proceedings

Where every electronic evidence is being used as proof, Section 65(b) of the IEA requires that the substance of the electronic record be proven. The main objective of Section 65(b) is to protect supplementary evidence. In the case of Arjun Panditrao Khotkar vs Kailash Kushanrao Gorantyal, the Supreme Court reconsidered Section 65(b) of the IEA, resolving the conflicted status of Section 65(b) in The Indian Evidence Act, 1872.

The Court reversed the decision in the case of Shafhi Mohammad vs State of Himachal Pradesh, holding that the certification needed under Section 65b (4) is a prerequisite to the permissibility of proof using testimony. According to a three-judge panel in the case of Anvar P.V. vs P.K. Basheer, an electronic document exists. The Lord’s Bench Arjun Panditrao’s recent judgment explained about the certificate under the Section. By stating, “If the final text is submitted even before Court for review, Section 64b (4) is not required for Examination, then the situation in terms of the certificate requirement has become transparent”.

In the case of CCTV, the image is captured by the sensors and transformed to digital by the DVR ( Digital Video Recorder). Since it stores data in electronic form, the DVR is an electronic record. If the DVR is presented to the Court, it will be considered the main evidence by Section 62 of the IEA unless the original document is presented to the Court for review, and the provisions of Section 65b (4) of the IEA will not apply. Nevertheless, if a huge proportion of devices are mounted and the data is collected, It is not necessary to put the whole set up just before Court because it is technically held on massive servers. The only other choice in this situation is to transfer the files from the massive server to a CD or USB and then present it to the Court. Since the USB and CD are not primary evidence, complying with Section 65b(4) is required.

The person in charge of the server must provide you with a certificate. The primary objective of the certificate is to ensure the proper workplace environment of the device from which the electronic record is generated well before the Court for review, such that it can be known that the material has not been interfered with by others or ill-treated as a result of a computer malfunction. The certificate has not been made a requirement to confirm the accuracy of the content of the computer-generated records.

Mandatory requirement

If the requirements in Section 65b(2) are met, any information found in an electronic record, which is printed on paper, stored, registered, or copied in optical or magnetic media created by a machine, is considered to have been a piece of information (under the Evidence Act) despite anything in the Evidence Act. If the requirements in Section 65b(2) are met, the material over which the information contained inside an electronic record is published, or the optical or magnetic media-generated either by software where such data is stored, recorded, or replicated, shall be admissible in any proceeding as proof of any nature of the initial or of any truth specified, despite evidence or production of the original.

When a claim in the proof is obtained under Section 65b, Section 65b(4) enables the creation of a certificate that, among other things, identifies the electronic copy containing the statement, explains how it was generated, and specifies the system used to make the electronic record to demonstrate that it was generated by a compliant system.

Important case laws 

K. Ramajayam Vs Inspector of Police

In the case of K. Ramajayam Vs Inspector of Police; Dhanaram and Gunaram were brothers who owned and operated “Balaji Pawn Brokers,” a pawnbroking and jewelry shop. Around 8:00 a.m., the deceased Gunaram opened the store. Dhanaram arrived around 9:00 a.m. and stayed for a while before leaving for another job. He was surprised to see his brother lying in a pool of blood when he returned to the shop around midnight. He sounded the alarm, and nearby shop owners arrived. Aside from the homicide, 935 grams of gold were stolen. The plaintiffs’ counsel relied heavily on the Supreme Court ruling in PV Anvar Vs PV Basheer, which defined Sections 65A and 65(b) of the Indian Evidence Act, 1872. The Supreme Court decided that encrypted data on a CD which lacks a Section 65(b) certificate is invalid proof.

According to the prosecutor’s office, the Supreme Court claimed in the same situation as the applicant that when an electronic record is provided as direct information under Section 62, it is permissible in complying with the terms outlined in Section 65(b). In the current situation, vast institutions are involved.

The tribunal held that while Section 2(t) of the IT Act, 2000 does not explicitly define electronic evidence, the complete databases could be taken into courtrooms under such circumstances. Since the defendant was explicitly captured on camera when committing his crime in this case, the CCTV footage should be considered electronic proof.

The appellant/conviction suspect’s under Section 404 of the Indian Penal Code, 1860, as well as the penalty levied on him was overturned. The convictions of suspects were upheld under Sections 449, 392, and 302. The punishments levied for the offences under Sections 449 and 392 of the Indian Penal Code are also enforced. The death penalty levied for the violation of Section 302 is overturned. Instead, the accused/appellant is sentenced to life in jail. The convicted will be sentenced to a minimum of 25 years in prison, during which time he will not be eligible for any constitutional relief or plea agreement.

Anvar P.V. Vs. P.K. Basheer & Ors.

In this case, the Judicial Branch has resolved the problems surrounding the admissibility of electronic evidence that arose from numerous contradictory decisions and also the procedures adopted by various High Courts and Trial Courts. The Court has interpreted Sections 22A, 45A, 59, 65A, 65(b), and 65(c) of the Evidence Act, holding that secondary information on CDs, DVDs, and Pen Drives is not permissible without even a certificate under Section 65b (4) of the Evidence Act. It’s been established that electronic evidence obtained without even a certificate under Section 65(b) of the Evidence Act cannot be proven by oral evidence, and also that the expert advice obtained under Section 45A of the Evidence Act cannot be used to make this electronic evidence permissible.

The decision will have far-reaching consequences throughout all contexts where even the prosecutor depends on electronic evidence, especially in anti-corruption trials where audio-video recordings are transmitted to the court on CD/DVD. In all such places, where the CD/DVD is transmitted without the need for certification under Section 65(b) of the Evidence Act, the CD/DVD is inadmissible, and the Court cannot look into more expert opinion as to their authenticity, as the Supreme Court Judgment shows.

It was also noted that all of these precautions are taken to protect the origin and reliability, which are the dual key components of reliable source electronic documents that were hoped to be used as evidence. “Since electronic records are more vulnerable to modification, deletion, transposition, excision, and other forms of fraud, a trial based solely on electronic records may result in a miscarriage of justice”.

Conclusion

In today’s world, CCTV cameras are almost everywhere to keep crime at bay. CCTV video has been used by law enforcement authorities to solve crimes and arrest criminals on several occasions. The CCTV captures a truthful image of the events, and the Courts make a significant impact on its integrity as a result of its accuracy. After the IEA introduced Section 65(b), the Supreme Court has issued several judgments emphasizing the value of electronic evidence admissibility.

It can be used as sufficient proof if the surveillance video is reliable, the source of the recording is known, and it meets the requirements of Section 65(b) of the IEA. Based on certain characteristics of CCTV, a substantiated claim can be formed. Since eye witnesses’ statements could vary from one another and they have the propensity and potential to amend their statements, CCTV proof cannot be said to be equal to witness testimony. Nevertheless, sufficient quality CCTV footage reveals the real event of the incident, and certain documentation can be used to conclude the homicide and identify the suspect.

 

Tuesday, December 2, 2014

Basic Things to Know About CCTV as a Technician

Some Basic Things to Know About CCTV as a Technician, If you are manager just share this with your team.

Cable Running
Many facilities use closed circuit television (CCTV) as part of an overall security system. Cameras mounted on buildings or ceilings transmit signals to a central monitoring room. CCTV takes two forms ---hard-wired or wireless. A technician just starting out in CCTV has to gain a knowledge base of how CCTV works, so he will be able to install, test and troubleshoot systems. Do not run 3+1/4+1 CCTV Cable, use RG11, RG6, RG59 only. Find-out the length of Video Cable from DVR to Camera, it should be on limit. Do not overlapping with High voltage wire. Do not join the Video Cable, use complete length ( One drum Video Cable its 305Mtr) of wire. If cable layed in out door use Armour cable.


RG 59 which can transmit signals up to 200 metres. This distances are for a single run of cable with no amplifiers or in-line correctors.

RG 11 which can transmit signals up to 270 metres. It is more expensive because it is thicker. This distance are for a single run of cable with no amplifiers or in-line correctors.

RG 6 which can transmit signals up to 400 metres. It is more expensive because it is thicker. This distances are for a single run of cable with no amplifiers or in-line correctors.

Twisted pair cable is a good alternative to coaxial cable if the length of the run is more than a few hundred metres. With pure cooper twisted pair, runs of up to 600 metres can be used without any in-line repeaters.

Troubleshooting Signal Loss
The picture on the monitor should never be fuzzy or have interference patterns. If it does, signal loss is occurring somewhere in the system. Technicians have specialized testing equipment and know how to use them in order to troubleshoot systems. Usually, a technician starts at the camera and works her way back to the receiver. She/he checks each connection until the test equipment indicates a loss. Some common problems are corrosion due to moisture inside the connectors or cables chewed through by animals.

Camera Installation
CCTV technicians can't be afraid of heights. Cameras are mounted high on the sides of buildings, or high in the ceiling areas of stores. You have to use a boom lift to reach spots to mount cameras. If you suffer from heights, becoming a CCTV Technician may not be a valid career path.
Cables are installed from the camera to the receiver station. You will have to drill through masonry block and below floor to run the cable. Be prepared to navigate through tight cramped quarters to get the cable from the camera to the receiver. Bring along a change of clothes, since you will get dirty in the process.

CCTV Camera Installation Tips:-
1. Test all equipment before installation. Therefore equipment can be replaced before arrival on-site if needed.
2. Ensure the mounting brackets of outdoor speed domes are properly sealed to prevent condensation in the camera housing.
3. Ensure sufficient space for camera, lens and connectors when choosing camera housing.
4. Avoid direct sunlight on equipment as it raises the temperature of the equipment.
5. Position cameras out of reach of vandals or 'curious' people.
6. Mount good quality mounting brackets in a stable location to avoid unstable or vibrating images caused by vibration or wind.
7. CS Mount cameras placed inside, at industrial or dusty/damp installations should be placed into outdoor camera housings.
8. Avoid installing cameras too high above the subject thus preventing 'top-of-head' video images
9. Ensure camera mounting poles are mechanically secure to avoid vibration on camera images
10. Before connecting power, ensure the supply is 12VDC regulated.

CCTV Cabling Tips:
1. Avoid running video cable parallel to AC power cables, especially those carrying high current.
2. RG59U Coax runs should not exceed 180m for colour and 280m for B/W
3.Avoid sharp bends when cabling
4. Avoid cable joins and using BNC barrels
5. Avoid over-tightening cable-ties
6. Ensure use of proper co-ax wire-stripping and crimping tools
7. Ensure BNC Connectors are properly crimped
8. Use Rubber BNC Boots after crimping to protect crimped area and bend radius
9. Mark or label camera and data signal cables
10. Outdoor cable runs should be housed in UV-proof conduit
11. In lightning prone areas, install surge protection devices

Final Testing and Teaching

A technician tests the system after it's installed. This involves knowing how to aim the cameras, knowing how to operate the monitoring equipment in the security room and knowing how to instruct the final operators of the system. You have to be part teacher. You may have to deal with people who have no knowledge of how a CCTV system is operated, so you have to use layperson-friendly language during the training process.

As you are a Engineer / Technician remember this few points:
Visually inspect all major components and connections for signs of deterioration or damage
Check all control equipment (DVRs, VCRs, monitors, multiplexers, video switchers, telemetry units etc) for correct operation
Check mains & power supplies and stand-by batteries including charging rates.
Check environmental conditions for adverse effects, including growth or shrubbery obscuring camera views
Check time and date settings in equipment and update the settings as appropriate
Check integrity of all cabling and sample check external insulation for damage
Clean cable fixings for security
Check auxiliary lighting equipment, infra-red units and photocells (if any) for correct operation
Check air vents are clear in all control equipment including PCs
Clean cameras, lenses and housing surfaces as necessary
Check al glands and seals on external equipment
Clean control equipment surfaces including PC (if applicable)
Establish regular back-ups are taken
Check camera is aligned to user specification, pictures for correct field of view and adjust as necessary
Check brackets, towers and fixings for corrosion or damage. Check clamping bolts/brackets are tightened correctly
Check wash/wipe units and wiper blades (if any) for correct operation and fill washer reservoir where necessary
Check quality of recording during day time and night time modes
Check pan and tilt assembly (if any) including fixings, electrical connections and functions.
Check the satisfactory CCTV transmission of images to remote site (if applicable)
Check warning signs are in place
Check all camera presets
Check all alarm presets

Wednesday, November 26, 2014

PoE network camera in Global market

Development of PoE network camera in Global market

Since the launching of Power over Ethernet (PoE) standard, global enterprise are eager to utilize this emerging technology in just a few years. According the latest survey, in just six years from 2008 to now, the annual increasing rate of power equipment with PoE technology will reach 33%. In 2014, global market of power devices with PoE technology will be over $5.2 billion, compound annual growth rate will be 38%.

Along with the development of worldwide security market, users start to consider deploying some network cameras and other network security devices. Network surveillance based on PoE is more and more accepted by users and have great development.
PoE (Power over Ethernet) means keeping the current Ethernet cat-5 deployment, assure interface AP for wireless network security cameras and other IP signal devise based on IP signal, at the same time, it is able to power ac electric for those kinds of devices. PoE technology use one general Ethernet cable to transmit Ethernet signal and ac electrical source simultaneously, allowing power and date to be integrated into the same cable system. In the case of guaranteeing the construction cable safety, keep normal answer operation. PoE network camera use PoE technology to realize the network video surveillance, which has power device function to use direct current main provided by power device equipment to transmit to power device via twisted-pair.
Compared to normal network camera, PoE network camera has following advantages: apart from power the connected device through Ethernet cable, PoE reduce the investment cost, as a result, it decrease the overall the deployment costs to  organize the device based on IP infrastructure. Poe not only provide the need for installing wall power connection, which dramatically reduce the plug costs related supporting end devices but also install the network connection device on the place where is hard to deploy the local alternating current power supply, to some content, provide more flexibility. We can separate PoE network camera form power device end in the practice, which can be divide into two types, normal cameras and PoE adaptor. Front end has Ethernet switch for PoE power, and back end has PoE adaptor, which will transmit the twisted cable power to network camera for the working power. Because power device is able to identify the rate of power, when we use ups to power, the advantage of saving energy is more obvious.

About Wireless Hacking

About Wireless Hacking


Wireless networks broadcast their packets using radio frequency or optical wavelengths. A modern laptop computer can listen in. Worse, an attacker can manufacture new packets on the fly and persuade wireless stations to accept his packets as legitimate.

The step by step procedures in wireless hacking can be explained with help of different topics as follows:-


1) Stations and Access Points :- A wireless network interface card (adapter) is a device, called a station, providing the network physical layer over a radio link to another station.

An access point (AP) is a station that provides frame distribution service to stations associated with it.

The AP itself is typically connected by wire to a LAN. Each AP has a 0 to 32 byte long Service Set Identifier (SSID) that is also commonly called a network name. The SSID is used to segment the airwaves for usage.



2) Channels :- The stations communicate with each other using radio frequencies between 2.4 GHz and 2.5 GHz. Neighboring channels are only 5 MHz apart. Two wireless networks using neighboring channels may interfere with each other.



3) Wired Equivalent Privacy (WEP) :- It is a shared-secret key encryption system used to encrypt packets transmitted between a station and an AP. The WEP algorithm is intended to protect wireless communication from eavesdropping. A secondary function of WEP is to prevent unauthorized access to a wireless network. WEP encrypts the payload of data packets. Management and control frames are always transmitted in the clear. WEP uses the RC4 encryption algorithm.



4) Wireless Network Sniffing :- Sniffing is eavesdropping on the network. A (packet) sniffer is a program that intercepts and decodes network traffic broadcast through a medium. It is easier to sniff wireless networks than wired ones. Sniffing can also help find the easy kill as in scanning for open access points that allow anyone to connect, or capturing the passwords used in a connection session that does not even use WEP, or in telnet, rlogin and ftp connections.



5 ) Passive Scanning :- Scanning is the act of sniffing by tuning to various radio channels of the devices. A passive network scanner instructs the wireless card to listen to each channel for a few messages. This does not reveal the presence of the scanner. An attacker can passively scan without transmitting at all.



6) Detection of SSID :- The attacker can discover the SSID of a network usually by passive scanning because the SSID occurs in the following frame types: Beacon, Probe Requests, Probe Responses, Association Requests, and Reassociation Requests. Recall that management frames are always in the clear, even when WEP is enabled.

When the above methods fail, SSID discovery is done by active scanning



7) Collecting the MAC Addresses :- The attacker gathers legitimate MAC addresses for use later in constructing spoofed frames. The source and destination MAC addresses are always in the clear in all the frames.



8) Collecting the Frames for Cracking WEP :- The goal of an attacker is to discover the WEP shared-secret key. The attacker sniffs a large number of frames An example of a WEP cracking tool is AirSnort ( http://airsnort.shmoo.com ).



9) Detection of the Sniffers :- Detecting the presence of a wireless sniffer, who remains radio-silent, through network security measures is virtually impossible. Once the attacker begins probing (i.e., by injecting packets), the presence and the coordinates of the wireless device can be detected.



10) Wireless Spoofing :- There are well-known attack techniques known as spoofing in both wired and wireless networks. The attacker constructs frames by filling selected fields that contain addresses or identifiers with legitimate looking but non-existent values, or with values that belong to others. The attacker would have collected these legitimate values through sniffing.



11) MAC Address Spoofing :- The attacker generally desires to be hidden. But the probing activity injects frames that are observable by system administrators. The attacker fills the Sender MAC Address field of the injected frames with a spoofed value so that his equipment is not identified.



12) IP spoofing :- Replacing the true IP address of the sender (or, in rare cases, the destination) with a different address is known as IP spoofing. This is a necessary operation in many attacks.



13) Frame Spoofing :- The attacker will inject frames that are valid but whose content is carefully spoofed.



14) Wireless Network Probing :- The attacker then sends artificially constructed packets to a target that trigger useful responses. This activity is known as probing or active scanning.



15) AP Weaknesses :- APs have weaknesses that are both due to design mistakes and user interfaces



16) Trojan AP :- An attacker sets up an AP so that the targeted station receives a stronger signal from it than what it receives from a legitimate AP.



17) Denial of Service :- A denial of service (DoS) occurs when a system is not providing services to authorized clients because of resource exhaustion by unauthorized clients. In wireless networks, DoS attacks are difficult to prevent, difficult to stop. An on-going attack and the victim and its clients may not even detect the attacks. The duration of such DoS may range from milliseconds to hours. A DoS attack against an individual station enables session hijacking.



18) Jamming the Air Waves :- A number of consumer appliances such as microwave ovens, baby monitors, and cordless phones operate on the unregulated 2.4GHz radio frequency. An attacker can unleash large amounts of noise using these devices and jam the airwaves so that the signal to noise drops so low, that the wireless LAN ceases to function.



19) War Driving :- Equipped with wireless devices and related tools, and driving around in a vehicle or parking at interesting places with a goal of discovering easy-to-get-into wireless networks is known as war driving. War-drivers (http://www.wardrive.net) define war driving as “The benign act of locating and logging wireless access points while in motion.” This benign act is of course useful to the attackers.

Regardless of the protocols, wireless networks will remain potentially insecure because an attacker can listen in without gaining physical access.



Tips for Wireless Home Network Security

1) Change Default Administrator Passwords (and Usernames)

2) Turn on (Compatible) WPA / WEP Encryption

3) Change the Default SSID

4) Disable SSID Broadcast
5) Assign Static IP Addresses to Devices
6) Enable MAC Address Filtering
7) Turn Off the Network During Extended Periods of Non-Use
8) Position the Router or Access Point Safely

Lets find out how best to protect your system from online attacks.
a)    First up don’t allow your CCTV system to respond to a ping request. You don’t want any other internet device to be able to see if your device can “talk” to it. You will be the only one able to do this once you log in to your password encrypted software. Turn the option to receive Pings off in your DVR (digital video recorder) and also in your router. You can also change the port names on the DVR if allowed.
b)    If this function is not feasible, alter the router setups to utilize Port Forwarding, so that web traffic on a certain inbound port number will be sent to the appropriate port of the DVR on your network.
c)    As mentioned above modify the password on the CCTV System with lower and uppercase leTter$ + $ymb0ls- THIS IS A NECESSITY. Make it super complicated.
d)    See to it that you regularly update the firmware on the CCTV System to keep it up to day with the latest security threats. Manufactures will regularly update their software to counteract new threats they have detected.
e)    Configure your router’s Firewall software– Unless you want to give any person on the web access to your CCTV system. With the firewall program that comes along with your router you can also ban particular IP (Internet Protocol) and MAC (computer identification nodes) addresses from accessing your CCTV system.

Monday, November 24, 2014

To 4K or not 4K video or Ultra HD

To 4K or not to 4K video or Ultra HD
Our industry’s seemingly insatiable appetite for more and more resolution has now produced a wave of interest in 4K cameras that promise exceptional clarity and sharpness, akin to the big screen, Ultra HD television sets found in consumer electronics stores and an increasing number of North American homes.
The jury is still out on whether there is an immediate need for the resolution that can overcome the downsides of increased storage and bandwidth required for running 4K cameras in a surveillance operation. Like so many things, if the cost of the camera, cost of the supporting system infrastructure and components were of no concern, this new format would likely be a more viable and attractive option for many security applications.

Here are four things to consider before making the leap to investing in and deploying 4K video:

1. What will I get with 4K that is not possible at lower resolution?
There’s no doubt that 4K technology is light years ahead of analog quality, but the reality is that the increased clarity and sharpness provided by that level of resolution is often over and beyond what is required and able to be managed by a typical security operation. For many reasons, full HD/1080P is the most commonly used resolution for new systems. The majority of security systems in use for live monitoring situation do not really benefit from such a resolution, as the human eye is well served with the details of a 1080P picture. Higher resolutions pay out when more details are required in forensic investigations.

2. Double the resolution, double the processing requirements
Users typically want to see more than one camera on one monitor, and only  occasionally switch to full screen modes. With 4K, the clarity of that multi camera view would be no clearer than what would be viewed from a lower resolution camera. In addition, delivering streams from multiple 4K cameras presents some technical challenges. The client PC and graphics card must handle a significant flow of data. The best approach is to have the live view limited to only enough resolution for the video size and screen resolution of the display.
Today a typical approach to balance PC power requirements and quality uses lower resolution streams for live view, while recording in the highest resolutions. 4K resolution taxes the workload on the network because recording the highest resolution means the full stream content moves from the camera to the NVR.

3. Limitations on form factors, lenses
The availability of affordable high resolution optics is just not there yet, and a dome style camera with a typical curved dome bubble cannot transmit the 4K resolution. In addition, a true 8MP resolution lens with appropriate coverage for the 4K sensor is quite large, which would render a 4K version of the compact dome camera (the market’s favorite form factor) essentially not possible.  The dome camera would get physically bigger which, for many customers, is a negative.

4.  Bandwidth and storage requirements
From a cost perspective, quadrupling the resolution from full HD to 4K won’t quite double the camera price. However, on the recording side it will most definitely demand more than double the storage requirements when operating under the same conditions.

Bandwidth consumption is related to processor power available on the camera. For example, the average full HD cameras deliver about 6Mbps at 30 ips. On the bright side, some manufacturers are offering full HD models with advanced compression capabilities that can reduce bandwidth consumption to about 3Mbps, with the next iteration to handle 4K video at full HD bandwidth consumption levels. Additionally new compression standards such as H.265 HVEC (High Efficiency Video Encoding) will make higher resolution bandwidth more practical for surveillance.

So where does this leave you, 4K today or not just yet? For some customers a bigger number is frequently perceived as a better solution but surveillance installations should focus on the reason the system investment is being made in the first place; protection of personnel and protection of assets. It is far from a one size fits all decision and resolution is an important tool in the system solution.

Next benchmark for video surveillance cameras is going to be the Ultra HD standard, with a resolution of 3840 x 2160 – around 8MP. Given the challenges networks may face carrying Ultra HD video streams it’s hard to say just when we will see the technology reach a tipping point.

THERE are a couple of signs worth paying attention to with Ultra HD (commonly called 4K in consumer and CCTV industries). The first is that UHD consumer monitors, which are now dropping in price at a time many homeowners’ first 1080p HD monitors may be starting to look a little tired. Something else to bear in mind is the consensus forming in digital photography that 8MP is the sweet spot that allows the best balance of low light performance and high resolution.

As most readers know, the more pixels you cram onto an imager, the smaller those pixels must be. And the smaller the pixels, the less light they can absorb. Double the number of pixels on a 1/3-inch HD sensor and you halve the light reaching the sensor. The result is that more pixels does not a perfect camera make – not unless sensor sizes increase. If it’s all about display images today, then 3MP cameras with a 1080p resolution are ideal.

But if you need digital zoom or you use a UHD monitor, then Ultra HD cameras should be a consideration. If you zoom in 2x digital with an Ultra HD image then you are viewing at 2MP, which is pretty good considering how quickly it takes an HD camera to burrow down under 4CIF when digital zoom is applied. 

Something else to bear in mind when considering digital image quality is that pixels on a digital camera’s sensor capture light in red, blue or green – not all colours at once. A layout will be a pair of green, a red and a blue in a grid pattern and onboard software then nuts out the colour value for pixels. This means there’s signal attenuating averaging going on in the background - one colour per 4 pixels.

A camera’s digital engine is also working hard to stave off false colours and moire – spacial aliasing that causes false patterns in a scene. Camera engines will blur an image slightly then sharpen it in order to lose such artifacts. Clearly, the more pixels, the more work the camera processor has to get through and this can be noticeable as latency or blurring if there’s sudden movement – like cars moving at right angles across a scene.

Lenses are another issue. An Ultra HD camera is going to need a quality lens and there’s no doubt that plenty of 1080p cameras are being sold with lenses that are not perfect. Sure, things look good in the centre of the image but out towards the edges details get muddy, especially on the sorts of deep zooms that might motivate a buyer to choose Ultra HD in the first place.

Sensor noise is also something that has to be considered at multiple levels. In low light, cameras increase exposure, elevating noise levels. Furthermore, pixel measurements are never perfect and the flaws in these signals show up on a monitor as noise. It’s unhelpful during the day and blinding at night. Digital noise reduction is the answer but DNR processing doesn’t just lose noise, it sloughs fine detail off a scene. When you look at a camera being tested in low light you can often see the areas where DNR has scrubbed and smudged a scene free of detail. It’s not a good look.

Engineers can build high resolution imagers with fewer noise problems but they need to be big – 1-inch or 1/1.5 inch sensors are ideal. A 1/1.5-inch sensor has 4x the area of the 1/3-inch sensors that typically run inside 1080p CCTV cameras. No wonder GBO’s S1080 camera (BGWT sells them in Australia) with its monster 1-inch sensor has such a great image in low light.

If the sensors are large enough, the lenses are good enough, the network is capable enough and the storage sufficient, then Ultra HD cameras will give end users a lot more detail than 3MP 1080p cameras can. But this capability has to be balanced against many things. Image quality is about more than megapixel count. 

“If a sensor is of the similar size as the equivalent HD sensor and it has 4x the pixels - low light performance will be 4x lower. And streaming bandwidth will be close to 4x larger unless better compression is used”

Keep in mind,
4K =     8.3 megapixels, aspect ratio 16:9 Horizontal resolution
1080p= 2.1 megapixel,  aspect ratio 16:9 Vertical resolution
720p=   1.3 megapixel,  aspect ratio 16:9 Vertical resolution

D1=      0.4 megapixel,  aspect ratio   4:3 Vertical resolution