Tuesday, March 11, 2014

Security Camera with VMS and Access Control Integration

Controlling access to business facilities and private property is often a requirement in today’s world, even more so than in the past.

Application varies, of course, but you might see anything from keypads to biometric scanners on doors, gates, or other entry and access points throughout a facility. These systems are in place to protect company assets and employees from both internal and external threats.

In the past, integrating these access control systems with security cameras to create a more comprehensive solution

Now, however, with advances in IP network surveillance and access control technology, we can design and implement much more complex and useful systems that integrate high quality CCTV cameras with access control systems.and allow for true identification and cataloging of individuals or vehicles was difficult, clunky, low quality, and plagued with functionality issues.

CCTV Camera & Access Control Integration Video

These complete access control surveillance systems capture photo and video of the user, which is then attached to the access logs for archival and review purposes. Data is transmitted over the facilities computer network, stored using network attached storage devices, and is even accessible via mobile devices.
More complex security camera and access control systems use facial or license plate recognition, along with other forms of authentication, to allow or deny entry to individuals or vehicles.
Administrators can review video and data logs, and even control access functionality, such as locking or unlocking a door, remotely from their phone, tablet, or laptops. Real-time text and e-mail alerts, multi-level authorization, event triggered recording, and integration with alarm and fire systems are all features we also include in many installations.

This type of access control functionality was unheard of just a few short years ago, when it was only seen in TV shows and movies, but is becoming more commonplace today as companies and enterprises tighten security to cut internal losses and protect themselves from external threats.

Both Access Control software and Video Management Software (VMS) have become vital components in modern security systems. However, many are confused as to how exactly the two should be deployed.

It is important to get this right, as the two have very different strengths and features, and deploying the wrong one as the front end could leave end users without features that could be useful, or even vital to their security system.

In this article, we will examine the strengths of both Access Control and VMS, and how the two can be used to enhance each other and provide a better all-round security system.

The Strength of Access Control
Access Control systems are designed with immediacy in mind. Whenever someone interacts with the system, by swiping an ID card for example, the system immediately informs the operator who is requesting clearance, and what they are attempting to access.
It does this by accessing an extensive database, which can include information such as names, pass codes etc.

One striking aspect of this process is how the system relies on the person in question co-operating with it; in order to be effective, it requires the subject to willingly interact with the system. Let's take, as an example, a member of staff walking up to a door to swipe their ID card; they actively wish to be identified as they know they are.

Access Control software, even with video integration, is designed for this type of installation. Video functionality is often a basic “live video” pop up, giving visual verification along with the Access Control database information.

Unfortunately, Access Control systems are ill-equipped to deal with an intruder actively seeking to bypass the system by forcing entry through a door or gate. It is also limited when dealing with intruders bypassing controlled entry points altogether by forcing entry through a window or fence. In cases such as this, basic video display in the Access Control software provides limited information beyond the initial alarm, making it difficult to establish precisely what happened and has limited pre and post-event video analysis capabilities.

The Advantages of Video Management
This is where VMS comes into its own, with its more proactive nature allowing it to detect intruders whether they choose to engage with the surveillance system or not.
This means that VMS can provide a complete visual account of events before during and after an incident, leaving operators in no doubt as to what transpired.

Indeed, the ability to review evidence from before during and after an event is one of VMS' greatest strengths. Designed with a more forensic-based approach in mind, VMS features tools, such as thumbnails and bookmarks, to allow specific clips to be marked, searched and reviewed effortlessly. The footage can then be easily exported to the appropriate authorities.

This means that VMS can quickly establish a detailed timeline of events leading up to and following the main incident, which can provide vital information in an investigation, or key evidence in a trial. IndigoVision's Control Center even water marks video, both at the point of recording and again at the point of export, to guarantee that the video is authentic and has not been tampered with.

The superior analytics the VMS supports such as motion detection are another asset, as they offer a wider variety of logics to trigger alarms. In the case of IndigoVision's Control Center there is an additional benefit in the form of Activity Controlled Frame rate, which allows cameras to function at low frame rate and only increase to full frame rate if an analytic is triggered with no impact on video quality, while greatly reducing storage.

It is also worth noting that the VMS offers far more comprehensive surveillance, for example if a building is protected by Access Control alone and a car outside is stolen, the system will be of limited help. A strong VMS however could capture the incident and provide valuable evidence to resolve the situation.
So while Access Control performs one specific function exceptionally well, VMS is able to provide the security surveillance for a variety of areas of the property to be secured, creating a more adaptable and comprehensive surveillance system. All of these features mean that VMS is highly effective in open areas, areas of high traffic where checkpoints are not feasible, or areas with multiple points of entry, such as an airport.

Integration – The Best of Both
With this in mind, it should come as no surprise to learn that Access Control and VMS providers have been working to integrate with one another.

This allows Access Control systems to employ more video functionality such as live & playback video and PTZ control & export, while VMS can monitor Access Control events such as elevator control, card tracing and advanced door monitoring.

In most cases though, it is still best to deploy Access Control and VMS side by side, as this creates a more robust and well-rounded system. If the security system has been designed around limited entry points, with Access Control entry, and the operator only requires a basic visual verification, then Access Control software may be sufficient.

However, the more advanced analytics and forensic capabilities of VMS, combined with its versatility and wider coverage, make it better suited for monitoring larger areas with numerous entry points. Therefore in these environments, VMS should be the front-end, with an integrated Access Control plugin to allow management of events and alarms.

Wednesday, February 26, 2014

P2P Networking – the fast way to connect camera

A Peer to Peer network (often shortened to P2P) is a connection process where two or more IP Camera / DVR/ NVR / PCs connected to each other can share resources , peripherals as equals  without the need of a central dedicated server.

It is a distributed application architecture that divides tasks / workloads among Peers. Peers refer to the workstations connected to the P2P network which are participants in the application and which are all equally able to perform any function necessary for the network. A computer connected to this network is called a node.


The reason for the popularity of a P2P network is that it can be set up anywhere- Homes, offices, online business etc. The only requirement is that all the participants of the network should be using the same or a compatible program, (client), to connect to each other.

The first P2P app was Napster, released in 1999.

Basic overview
In a P2P network each node is essentially a client as well as a server, thereby eliminating the need for special high performance machines to act as servers. Accessing files is basically governed by the user setting different sharing permissions on their own machines.

Advantages
Due to the inherent characteristic of P2P networks it is the clients who are responsible for providing network resources such as bandwidth, system power, and storage. This feature is tremendously useful to original content distributors, because it reduces the setup as well as running costs very small.

Due to the decentralized nature of the network, if one peer  ceases to function properly, it does not affect the whole network. As long as there is even one properly functioning PC, the network will be alive.

Also important to note is the lack of a system administrator or a central authority. This leads to a more efficient and stable network owing to lack of a full staff needed to ensure smooth running.

Weaknesses
Just like any kind of file sharing system, users are vulnerable to malicious attacks from harmful content that may allow remote access to the user’s PC. This can even affect the whole network.

Network Security
For one thing, sharing files with random strangers on the internet does call for some sort of caution. It is recommended that you at least have a firewall or an antivirus scanning each of your downloads to protect against potential backdoors and malware. Another way would be to just use trusted sources.
P2P networks represent one of the most important issues in the ongoing controversy of network neutrality. Internet Service Providers have been known to cut off P2P file sharing traffic on account of its high bandwidth usage.


But still we can expect this form of networking to only grow and grow more for its pros far outweigh its cons.

So P2P is a standard approach to network design that eliminates the need for dedicated servers. P2P is also a popular term for freely available Internet file sharing software systems.

Tuesday, February 18, 2014

What’s New in SQL Server 2014 since SQL Server 2008

Whats New in SQL Server 2014 since SQL Server 2008
PERFORMANCE & SCALE
o        In-Memory OLTP
o        Enhanced In-Memory ColumnStore for DW
o        Support for 640 logical proc. & 4 TB memory
o        Support to 15,000 partitions
o        Resource Governor IO governance
o        Buffer Pool Extension to SSDs
o        Query optimization enhancements
o        SysPrep at cluster level
o        Predictable performance with tiering of compute, network, and storage with Windows Server 2012 R2
o        Data Compression with USC-2 Unicode support
o        Backup Compression

HIGH AVAILABILITY
o        SQL Server AlwaysOn
o        Delayed Durability
o        Recovery Advisor
o        Windows Server Core
o        Live Migration
o        Online Operations enhancements
o        Clustered Shared Volume support, VHDX support (Windows Server 2012 R2)
o        Manage on-premises and cloud apps (System Center 2012 R2)

SECURITY
o        User-Defined Server Roles
o        Default Schema for Groups
o        SQL Server Audit
o        SQL Server Fine-grained Auditing
o        Enhanced separation of duty
o        CC certification at High Assurance Level
o        Backup encryption support

PROGRAMMABILITY
o        SQL Server Data Tools
o        Local DB runtime (Express)
o        Data-tier Application Component project template
o        Data-Tier Application Framework (DAC Fx)
o        Query optimization enhancements
o        Interoperability support (ADO.NET, ODBC, JDBC, PDO, ADO APIs and .NET C/C++, Java, Linux, and PHP platforms)

T-SQL ENHANCEMENTS
o        Enhanced support for ANSI SQL standards
o        Transact-SQL Static Code Analysis tools
o        Transact-SQL code snippets
o        Intellisense

UNSTRUCTURED & COMPLEX DATA SUPPORT
o        FileTable built on FILESTREAM
o        Remote Blob Storage with SharePoint 2010
o        Statistical Semantic Search
o        Spatial features, including Full Globe & arcs
o        Large user-defined data types

MANAGEABILITY
o        Distributed Replay
o        Contained Database Authentication
o        System Center Management Pack for SQL Server 2012
o        Windows PowerShell 2.0 support
o        Multi-server Management with SQL Server Utility Control Point
o        Data-Tier Application Component

ACCESS ANY DATA
o        Power Query
o        Windows Azure HDInsight Service
o        Analytics Platform System (PDW V2)
o        Mash up data from different sources, such as Oracle & Hadoop

INSIGHTS WITH FAMILIAR TOOLS
o        Power BI in Office 365
o        Power Map for Excel
o        Mobile interfaces for Power BI

COMPLETE BI SOLUTION
o        SQL Server BI Edition
o        HA for StreamInsight, complex event processing
o        BI Semantic Model
o        SQL Server Data Tools support for BI
o        Change Data Capture for Oracle

ANALYSIS SERVICES
o        Import PowerPivot models into Analysis Services
o        Enhancements on productivity, performance

REPORTING SERVICES
o        Power View
o        Configurable reporting alerts
o        Reporting as SharePoint Shared Service
o        Report Builder 3.0

DATA QUALITY SERVICES
o        Build organizational knowledge base
o        Connect to 3rd party data cleansing providers

MASTER DATA SERVICES
o        Master Data Hub
o        Master Data Services Add-in for Microsoft Excel

INTEGRATION SERVICES
o        Graphical tools in SSIS
o        Extensible object model
o        SSIS as a Server
o        Broader data integration with more sources; DB vendors, cloud, Hadoop
o        Pipeline improvements

HYBRID CLOUD SOLUTIONS
o        Simplified backup to Windows Azure
o        Support for backup of previous versions of SQL Server to Windows Azure
o        Cloud back-up encryption support
o        Simplified cloud Disaster Recovery with AlwaysOn replicas in Windows Azure VMs

EASY ON-RAMP TO THE CLOUD
o        New Windows Azure Deployment UI for SQL Server
o        Larger SQL Server VMs and memory sizes now available in Windows Azure
o        DAC enhancements: Import/export with Windows Azure SQL Database

COMPLETE AND CONSISTENT FROM ON-PREM TO CLOUD
o        SQL Server Data Tools
o        License Mobility (with SA)
o        Resource Governor enhancements
o        Snapshot backups to Windows Azure via SQL Server Management Studio

Wednesday, February 5, 2014

Most Ignored CCTV Codes and Laws

artical we discuss Most Ignored CCTV Codes and Laws.

Let’s be honest, not all security integrators and installers take the proper precautions to make sure they aren’t violating any CCTV “laws” before installing. Many install them on the notion of protecting property, keeping an eye on employees, or some other common video surveillance goal. We forget that there are rules that we need to follow. It’s all fun and games until you go to court for misuse of CCTV video. Below you will find a list of 10 most ignored Codes or Laws for security camera usage for the distributor and the consumer. So avoid getting in trouble by taking a look at this list of laws and code of conduct.

What are the most ignored CCTV codes?

Staff should be informed of any cameras placed in their working area:
This is a courtesy act, but is not required, unless the cameras are observing unionized  labor workers. In the case of a union, they must be notified if a hidden camera is going to be installed and used. Cameras are usually placed in working areas to keep employees on their best behavior, and warning them they are being watched is only fair. Some employment contracts may include a clause about hidden cameras.

Sales staff should inform the consumer of the advantages and weaknesses of each product:
Not all customers are tech savvy and know how to read spec sheets, so it is the salesperson’s responsibility to inform (enlighten) the client of such things. This is often overlooked and ignored. Some Technical background Sales people / Technician or Engineer always offers the best products, and will list for you any disadvantages a product has.

Sales Staff need to communicate to the customer how to maintain product:
This includes how to clean it and how to install it in order to keep the product working and in good shape.  Some expert sales staff always educates there customers on products and are trained to ask about the area the camera will be installed in to give corresponding care instructions.

Police are limited in their surveillance operations:
Because of the fourth amendment, police cannot install cameras with audio surveillance without a warrant. For instance, installing ‘bugs’ for investigations may be permissible if they have a probable cause. A public phone booth, however, is a place where installing audio surveillance is not permissible.


Except for law enforcement purposes, footage should not be given to any other third party:
This code is completely disregarded. Sometimes videos are posted online for entertainment or other purposes. If you go to Youtube and search CCTV, you will find many videos there, which is in complete violation of this code.

Although nannies do not have to be notified, it is still courteous to tell her she is being observed:
The footage of the nanny abusing the child was used as evidence even though it came from a hidden camera. This was ruled under the notion that one should not expect privacy in other people’s homes.

Cameras should be positioned only to view the premises:
Anything outside of your property is not your business, so anybody not visiting your property should not be caught on your footage. Some states prohibit cameras from pointing into other people’s houses or backyards, as it is a violation of privacy.  You can use Privacy Making to block out sensitive areas that you do not wish to monitor.

Some states require security cameras in certain areas:
Some states, require the installation of cameras at certain cabarets and public dance halls. This is required in the case of a crime, and is given to the cops immediately for investigation.

Regardless of the state, it is almost always illegal to record a conversation to which you are not a party, do not have consent to tape, and could not naturally overhear (RCFP):
This means any situation in which you would have eavesdropped on that conversation but recorded it, is illegal. In the following states, the one recording must notify everyone being recorded that the recording is taking place: Mumbai, Chennai, Bengaluru, Kolkata & New Delhi.

It is prohibited to place hidden cameras in private places:
In some states prohibit the placement and use of covert cameras without the permission of those being recorded. They must be warned that they are being watched and recorded. So what is a private place? It is anywhere where the person has an expectation of privacy, or outside of the public sector, i.e., bathroom, locker room, hotel room, or fitting room.

So when you are installing your surveillance system, make sure to continue by these rules. This will ensure your videos will be admissible as evidence in a court of law. When signing your employment contract, pay attention to the small things they add in there.

Thursday, January 30, 2014

Multiple CCTV Camera Over Single Coax

This equipment allow the user to send multiple video signals over a single coax cable. Perfect solution to applications where additional cameras are needed, but only a single coax cable is available. Simply attach each camera to a unique single channel injector, then use a combiner to send them all together. Additional injectors may be added and combined anywhere along the cable to add additional cameras. The video extractors are available in 4, 8, & 16 channels, and may also be placed anywhere along the coax run to selectively extract the desired cameras at that location. The out of box Video signal strength allows for runs up to 1000 ft. and beyond. Amplifiers are available if greater distances are required.
Image quality plummets for CCTV systems that extend beyond about 200 meters. Strengthening transmission signals over coax requires expensive amplification, fault correction and surge protection technology. As a result, more security professionals are choosing Transition Networks media converters to leverage their existing copper network infrastructure and add fiber optics capabilities for maximum video security performance.

Benefits of fiber:-

  • Extend video coverage without any signal degradation up to 10km (6.2 miles).
  • More bandwidth for next-generation equipment and applications.
  • Immune to electrical interference that could degrade signal or cause interference.


Sunday, January 26, 2014

What’s New in SQL Server 2014 since SQL Server 2012

Whats New in SQL Server 2014 since SQL Server 2012
PERFORMANCE & SCALE
o        In-Memory OLTP
o        Enhanced In-Memory ColumnStore for DW
o        Buffer Pool Extension to SSDs
o        Enhanced Query Processing
o        Resource Governor adds IO governance
o        SysPrep at cluster level
o        Predictable performance with tiering of compute, network, and storage with Windows Server 2012 R2.

HIGH AVAILABILITY
o        Enhanced AlwaysOn, with 8 secondaries and Replica Wizard
o        Delayed Durability
o        Clustered Shared Volume support, VHDX support (Windows Server 2012 R2)
o        Manage on-premises and cloud apps (System Center 2012 R2)

SECURITY
o        Enhanced separation of duty
o        CC certification at High Assurance Level for 2014
o        Backup encryption support

PROGRAMMABILITY
o        Query optimization enhancements

EASY ACCESS TO DATA, BIG & SMALL
o        Power Query
o        Windows Azure HDInsight Service
o        Analytics Platform System (PDW V2)

POWERFUL INSIGHTS WITH FAMILIAR TOOLS
o        Power BI in Office 365
o        Power Map for Excel
o        Mobile interfaces for Power BI

HYBRID CLOUD SOLUTIONS
o        Simplified backup to Windows Azure
o        Support for backup of previous versions of SQL Server to Windows Azure
o        Cloud back-up encryption support
o        Simplified cloud Disaster Recovery with AlwaysOn replicas in Windows Azure VMs

EASY ON-RAMP TO THE CLOUD
o        New Windows Azure Deployment UI for SQL Server
o        Larger SQL Server VMs and memory sizes now available in Windows Azure

This list also includes some technologies that work together with SQL Server such as Azure, System Center, Excel 2013, Power BI for Office 365 and others.

Wednesday, January 1, 2014

Ground loop problems in Camera output

Ground loops effect in video output
As the source and destination of a video signal can be at differing ac or dc earth potentials, earth loop currents flow and cause longitudinal hum to be introduced into the video signal. Video hum is low frequency (50 or 60 Hz mains frequency or it's harmonics) noise from the ground lines which has influenced the video signal, causing degradation of the displayed signal. Video hum is usually observed as bars rolling vertically through the video image, video hum may also cause video distortion or even tearing of the picture in severe cases. Video hum maybe a problem in any system where video sources and display devices are connected to different A/C power sources with varying grounding potentials.

Typically the humming can be seen as slowly vertically moving horizonal bars in normal TV video signals. The same kind of bars can be also seen in computer screen, but typically they are not as visible because bars are moving so fast that you see them as some strange flashing in screen.

The picture below is a real world example of the effects of a ground loop and what it causes a a video picture received from the cable TV network:
Ad you can see that video signal has strong hummign bars and other interference in it. Those have entered the cable TV signal because of ground loops in the system. Ground loops in the video systems can have following effects:

•Hum Bars: The mains frequency (50 Hz or 60 Hz) can cause stationaly or moving horizonal humming bar to appear on the video signal (as shown on the picture above). If you have light dimmers nearby those humming bars can easily become quite severe and easily visible.
•RF Interference: Herring bone interference on video line is caused by a ground loop (that includes your coax shield) acting as an AM radio antenna. Any large loop of wire makes a good AM antenna. These antennas are especially adept at picking up AM broadcasts if most of the loop is vertical.
•Cross-Talk: Ground loops can cause one signal to interfere with another, because every cable should ideally return through the corresponding shield conductor, but there's an alternative path through the other shield conductor which causes undesirable voltage differences to nearby cables.

Isolating video signal is more complicated than isolating audio or antenna signals, because the DC level of the video signal is important and video signals have very high frequency spectrum (normal composite video can have bandwidth from 50 Hz to 6 Mhz).

Isolating video signal needs typically active technology which involves electro-optical isolation or differential amplifier with a floating ground on the input connector. Those both technologies are usable in real world situations. Differential input with floating ground works nicely for small ground potential differences and this approach is used in some professiona video equipments (some video projectors I have seen have had differential inputs and option to disconnect input ground connection). Differential inputs are also used in applications where a video signal is transmitted through twisted pair wiring (some CCTV applications which use twisted pair interfacing equipments).

Electro-optical isolation works well in applications where complete electrical isolation is necessary. There are some this type of isolation devices on the market and some special video distribution amplifiers have this kind of option built in.

Ground loop elemination does not always ask for a complete isolation of the grounds. There are passive hum suppressor transformers which will very effectively remove the hum from the video signal (typically around 40 dB hum level reduction), but do not effect the video signal otherwise. Those special transformers act like a common mode coils, which stop the annoying ground loop currents on the shield of the coaxial calbe, but provide a straight path for the signal inside the cable. This kind of devices are capable of passing the signals from DC to tens of MHz without problems. This type of hum suppression transformers have found their way to the professional video application (rental companies) and comouter video applivations (computer to video projector connections). The transformers of this type are usually called "hum bug transformers", "humbucking transformers", "anti-hum video transformers" or "hum suppressor transformers". Generally term hum-bugger refers to any circuit (often a special coil) that introduces a small amount of voltage at power-line frequency into the video path to cancel unwanted ac hum.

There are also special wideband isolation transformer which can isolate video signals. A transformer which can nicely transfer the whole video frequency spectrum without much distortion is very hard to produce so there are not many of them on the market. Some of the isolation transformers are only designed for CCTV application, where more signal distortion is accepted than in broadcast industry.

The choke (humbugging transformer) is primarily used in Broadcast TV because it passes the DC component of the signal. It is used in studio, and in remote ENG. The isolation transformer is primarily used in CCTV: security, manufacturing, avionics, display, etc.

Differential video amplifiers
Differential amplifier approach uses an operational Amplifier. Operational Amplifiers only amplify the difference between the two input lines. This method eliminates common mode noise between the incoming signals by making A-B=C, as only the difference between A & B are amplified. Operational amplifiers is maintain wide bandwidth signals throughout your system while eliminating ground loop problems that are caused by power and video. Diffeerential video amplifier inputs are used in some video equipments (typically some video projectors) and video distribution amplifiers to fight against ground loop problems.

Differential video amplifiers have a limitation on their input voltage range which gives some limitations how much common mode signal those circuits can tolerate. If the ground potential difference is more than few volts, then operational amplifier based isolators don't work effectively. Too high voltage difference can cause problems from very distorted video signal to damaged differential video amplifier. If the voltage difference is a substantial proportion of the DC supply voltage of the amplifier, you will probably have trouble using an amplifier alone.

It is a good idea to measure the voltage difference before using differential video amplifiers to be sure not to damagze them. Measuring can be done using a multimeter (check using both AC and DC ranges) or better using a scope earthed to the mains supply, and put the probe on the earth connection of the incoming video cable. If you many potential difference which are many volts, then you have quite propably something wrong in the grounding of the building and you should consult a qualified electrician to check and correct this potentially dangerous problem.


Good back porch black level clamp
If the video signal input has well designed fast black level clamp circuitry that can also solve small common mode noice problems caused by ground loop. Back porch ground level clamp circuit adjusts the black level of the video circuits according the incoming video signal. If black level clamp circuit is active circuitry which samples the black level saparately for every can line the ground loop bars are quite effectively eliminated because the the low frequency noise (50 Hz power or harmonics) is sampled at start of every scan line and suppressed then from the rest of the line. This works quite nicely with those low frequency humming bars, especially if combined with differential video inputs. back porch black level clamp system does not help in fighting against higher frequency noise which might be injected to the video system through the ground loop.

Active video isolators
Video Isolator passes a video signal from its input to its output with no electrical connection and is able to provide complete isolation, for the video signal, passing through it. Having the Video Isolator in the video signal path makes it possible to have Standard Safety earthing of all equipment with no associated earth loop problems. In the studio, feeds between different buildings are no longer a problem and it is no longer necessary to run technical earth to non critical locations such as viewing rooms.

Electro-optical isolators convert video signal voltage to blinking LED and other part of the circuit receives that light and convert it to back video signal voltage. This method guarantees very good isolation (complete galvanic isolation), but has typically bandwidth and linearity problems. Poor bandwidth will result in fuzzy images and poor linearity will result in an inability to produce the same gain for all signal levels (most noticeable in gray-scale patters).

Anti-hum video transformers
Anti-hum video transformers are not real transformers, they are common mode chokes! Anti-hum transformers work as a series inductor offering a series impedance to the circulating earth currents thus effectively reducing the current flowing in the loop which will reduce the voltage dops on the cable shields and equipment (that reduces hum). Those coils can reduce the currents on cable shield very effectively because they have very high impedance at 60 Hz and above and there presents a high impedance to common mode signal differentials between the input and output. Earth loops typically have low resistance a quite the inductance will not have to be very huge to start to help. The coil itself will then have quite much voltage difference on the input and output grounds (the potential difference is now over the transformer insted of distributed to whole cable), but the common mode coil construction guarantees that this difference is not supped to the differential signal inside the cable. Since the signal and ground lead are coincident, the differential signal is unaffected.

Hum reduction transformers or common mode coils are constructed with either 75 Ohm twisted pair (made of fine wire) or coaxial cable wrapped around a very high permeability core. Most basic hum isolation transformers are basically just coax cable wound on a toroid-type core. They work by mutual inductance. The coax cable is wound around a transformer core so that both the inner and shield of the cable become inductors. The tight coupling ensures that any voltage in the shield caused by variations in earth potential are transformed into the inner conductor.

The method is an ancient idea and can cope with very large ground loop signals, and has very large bandwidth with very little loss. This type of anti-humming transformer also provides DC continuity between the input and output leads which is a good thing. transformer does not stop ground loop current flowing (the amout of current is lower bause the added indictance) but the transformer reduces the current cancel the effect of ground loop current. Good one can reduce the ground loop effect up to 40-50 dB.

Hum isolation transformers are effective solutions for hummign problems. The downside of them is that they are somehow bulky devices because of the large core needed to do the job. The boxes I have seen have been packed in metal case have weighted at least one kilogram. Hum isolation transformers are typically stand-alone passive boxes which are added to video system when problems are encountered.

Video isolation transformers
There are special wideband isolation transformer which can isolate video signals, but not without problems. The design of a high bandwidth transformer which can go to very low frequencies is very hard. You have to always make some compromises on low and high frequency responses (highest components of composite video cna be attenuated even few dB). All real isolation transformers have one serious drawback which can't be avoided: they can't pass the DC level through. So any system that relies on the video having any particular DC reference will not function properly. There are many video systems around which need particular DC reference level, but there are many which are AC coupled.

Some of the isolation transformers are only designed for CCTV other not so demanding applications application, where more signal distortion is accepted than in broadcast industry. So a video isolation transformer might be OK for a security camera installation if a complete isolation is needed, but I would not put it on any professional video studio system.