Designing a video surveillance solution requires decisions on 8 fundamental questions. This in-depth tutorial helps beginners understand the options and tradeoffs involved in designing a solid surveillance solution.
This is an introduction to help those new to video surveillance (and the first chapter of the free Video Surveillance ebook). Its goal is to quickly identify the key aspects of video surveillance design, not to examine the many details and edge cases in such designs.
[NOTE: This report was first released in 2008 and was substantially rewritten in 2012 to reflect new technological developments.]
The 8 fundamental questions are:
1. Cameras
Cameras are literally the eyes of a video surveillance system. Cameras should be deployed in critical areas to capture relevant video.
But before that, let’s know something about the Motion (Surveillance Software), which is the heart of this project. Motion is free, open source motion detector CCTV software, developed for Linux. It detects the motion and start recording video of it.
The two basic principles of camera deployment are (1) use chokepoints and (2) cover assets.
Chokepoints are areas where people or vehicles must pass to enter a certain area. Examples include doorways, hallways and driveways. Placing cameras at chokepoints is a very cost-effective way to document who entered a facility.
Assets are the specific objects or areas that need security. Examples of assets include physical objects such as safes and merchandise areas as well as areas where important activity occurs such as cash registers, parking spots or lobbies. What is defined as an asset is relative to the needs and priorities of your organization.
Once you determine what areas you want to cover, there are 4 camera characteristics to decide on:
Most organizations will mix and match a number of different camera types. For instance, an organization may use infrared fixed cameras around a perimeter with a PTZ overlooking the parking lot. On the inside, they may have a fixed megapixel camera covering the warehouse and a number of fixed IP cameras covering the entrance and hallways.
2. Connectivity
In professional video surveillance, cameras are almost always connected to video management systems for the purpose of recording and managing access to video. There are two main characteristics to decide on for connectivity.
3. Video Management System
Video management systems are the hub of video surveillance solutions, accepting video from cameras, storing the video and managing distribution of video to viewers.
There are 4 fundamental options in video management systems. Most organizations choose 1 of the 4. However, as companies may have multiple types when they transition between one and another.
4. Storage
Surveillance video is almost always stored for later retrieval and review. The average storage duration is around 30 days. However, a small percentage of organization store video for much shorter (7 days) or for much longer (some for a few years).
The two most important drivers for determining storage duration is the cost of storage and the security threats an organization faces.
While storage is always getting cheaper, video surveillance demands huge amount of storage. For comparison, Google's email service offer about 7 GB of free email storage. This is considered to be an enormous amount for email. However, a single camera could consume that much storage in a day. It is fairly common for video surveillance systems to require multiple TBs of storage even with only a few dozen cameras. Because storage is such a significant cost, numerous techniques exist to optimize the use of storage.
The type of security threats also impact determining storage duration. For instance, a major threat at banks is the report of fraudulent investigations. These incidents are often not reported by affected customers until 60 or 90 days after the incident. As such, banks have great need for longer term storage. By contrast, casinos usually know about issues right away and if a problem is to arise they learn about it in the same week. Casinos then, very frequently, use much shorter storage duration (a few weeks is common).
Four fundamental types of storage may be selected:
The clear majority of surveillance projects still prefer using internal or direct attached storage. However, networked storage is gaining in popularity. See our report on surveillance storage preferences for more.
Storage Redundancy: A second, yet still important aspect is whether your surveillance storage has redundancy, specifically how capable it is to survive a hard drive crash. In the old days, this was rare. However, this is now becoming more and more common. See our report on storage redundancy / RAID use.
5. Recording Video
Users face 3 important choices in how they record video:
Recording resolution is limited to what the camera can capture. If you buy an Standard Definition camera, you can never record it at High Definition resolution. On the flipside, typically users record at the highest resolution the camera can capture.
One of the toughest choices is to record continuously or based on motion. They both have tradeoffs. Continuous ensures video is always recorded but wastes storage space. Motion based saves significantly on storage but increase the risk that important video will be risked. Overall, most systems use motion based today. See our recording mode statistics report.
Finally, when setting up recording, frame rate selection is important. You can low and use 1fps and have a slide show or high and use 30fps like TV. Our statistics on frame rate usage shows that 6-10 fps is most common. See our frame rate recording statistics report.
6. Video Analytics
Video analytics scan incoming video feeds to (1) optimize storage or (2) to identify threatening/interesting events.
Storage optimization is the most commonly used application of video analytics. In its simplest form, video analytics examines video feeds to identify changes in motion. Based on the presence or absence of motion, the video management system can decide not to store video or store video at a lower frame rate or resolution. Because surveillance video captures long periods of inactivity (like hallways and staircases, buildings when they are closed, etc.), using motion analytics can reduce storage consumption by 60% - 80% relative to continuously recording.
Using video analytics to identify threatening/interesting events is the more 'exciting' form of video analytics. Indeed, generally when industry people talk of video analytics, this is their intended reference. Common examples of this are perimeter violation, abandoned object, people counting and license plate recognition. The goal of these types of video analytics is to pro-actively identify security incidents and to stop them in progress (e.g., perimeter violation spots a thief jumping your fence so that you can stop them in real time, license plate recognition identifies a vehicle belonging to a wanted criminal so you can apprehend him).
These video analytics have been generally viewed as a disappointment. While many observers believe that video analytics will improve, the video analytics market is currently contracting (in response to its issues and the recession). Learn more about the challenges in video analytics.
7. Viewing Video
Surveillance video is ultimately viewed by human beings. Most surveillance video is never viewed. Of the video that is viewed, the most common use is for historical investigations. Some surveillance video is viewed live continuously, generally in retail (to spot shoplifters) and in public surveillance (to identify criminal threats. Most live video surveillance is done periodically in response to a 'called-in' threat or to check up on the status of a remote facility.
4 fundamental options exist for viewing video.
8. Integrating Video with Other Systems
Many organizations use surveillance video by itself, simply pulling up the video management systems' client application to watch applications. However, for larger organizations and those with more significant security concerns, this is an inefficient and poor manner to perform security operations. Instead, these organizations prefer an approach similar to the military's common operational picture (COP) where numerous security systems all display on a singular interface. Three ways exist to deliver such integration with video surveillance:
Learn more about options for integrating video with other systems.
Evaluating Specific Products - The Next Step
If you feel comfortable with the key decisions to be made, you may want to start examining what companies provide the best products for your need. You can learn more specific companies by reading the IPVM Buyer's Guide.
Choosing security cameras isn’t the only important step in implementing video surveillance. The video management software behind the camera must support the functions the user is looking for.
Before we move on to looking at the best video management software, it is crucial to understand the value of having an integrated solution compared with separated cameras and video management software.
Although having separate cameras and video management software allows you to be a bit more flexible, as you can mix and match cameras that you already own, which can also mean it works out cheaper in the short term, the issue of compatibility should not be taken lightly. You will need some technical knowledge to pair camera and VMS and considerable technical knowledge to maintain this pairing bug-free.
Having an integrated hardware and software solution saves you frustration at the beginning of the process as it comes ready to use out-of-the-box and you're spared further frustration in the long-term, as it does not require any maintenance related to compatibility. Integrated solutions also often pair very well with other security-related software solutions. If your budget allows it, we would recommend you choose this type of solution but, in case this is not possible, the separated solution will do the job.
Refer to the list below for the best video surveillance software on the market.
iSpy is an open-source security program that connects to IP cameras or webcams. The software supports unlimited cameras and allows viewer access on the iSpy website or on individual devices. iSpy also has a text to speech component. This allows someone to communicate with visitors via the camera as well as monitor and listen to any microphones. Other functions include notifications when motion is detected or systematic time-lapses and snapshots. iSpy is a trusted video surveillance software, with more than 2 million users worldwide. The software is free to download and use, but accessing cameras remotely requires a paid subscription. Additionally, there are some restrictions in terms of computer compatibility that may require a user to download an older version of the software.
EyeLine Video Management Software is an attractive option for customers looking for a security software option that supports many cameras. EyeLine can monitor and record over 100 camera sources simultaneously. The software allows you to watch footage in real-time on-site or online with a remote login. The motion detection component saves space by only recording footage when something is happening on camera. Some customers have had issues with certain cameras being supported, so it is recommended to stick with USB connected webcams.
ContaCam software positions itself as being fast, light, and versatile enough to meet any security needs. Setup of cameras is easy, requiring users to simply decide between motion detection or continuous recording, enter a camera name, and configure how long files should be kept. The software offers a daily summary video creation option and is well integrated with technology for license plate recognition. ContaCam is known to have stable performance but occasional difficulties when pairing with IP cameras.
ZoneMinder is a popular option for both home and business security. The software is known to be incredibly easy to set up and works with a wide variety of security cameras. Customers have few negative responses to this software as it is more than just a single piece of software - it’s a whole suite of apps. These applications work together to provide quality business surveillance. ZoneMinder is well designed and makes it easy for any individual to find what they’re looking for quickly.
Ivideon is regarded as the better of the free IP camera recording software available. The software alerts users appropriately and promptly of any sound or unusual occurrences. The algorithms within the server detect movements as subtle as flickers in lighting fixtures that ordinary surveillance software systems don’t usually pick up. The base software is free, but customers must subscribe to use the cloud service. Additionally, the software tends to operate well, but some customers claim it is a bit basic compared to competitors.
Blue Iris is a popular cloud-based video surveillance system that allows anyone to view and control camera feeds remotely. The software is compatible with a huge selection of third-party cameras, but is known to run sluggishly with higher-end HD cameras. The full version of Blue Iris does not require any additional licensing for multiple cameras, and it is easy to combine all cameras at one property into a single, interconnected system. The software offers a large amount of video editing and playback options, but some customers have noted there are often time-lapse gaps.