Offering ready access to the security industry’s cutting-edge digital future, Intelligent Network Video provides the first complete reference for all those involved with developing, implementing, and maintaining the latest surveillance systems. Pioneering expert Fredrik Nilsson explains how IP-based
Intelligent Network Video: Understanding Modern Video Surveillance Systems
✍ Scribed by Fredrik Nilsson, Communications Axis
- Publisher
- CRC Press | Taylor & Francis Group
- Year
- 2024
- Tongue
- English
- Leaves
- 425
- Edition
- 3
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
The third edition traces the trajectory of video surveillance technology from its roots to its current state and into its potential future role in security and beyond. For the reader, it is an opportunity to explore what the latest technology has to offer, as well as to gain some insight into the direction that surveillance will take us in the years ahead. The revised edition of Intelligent Network Video is more comprehensive in every area than the first and second editions, printed in over 25,000 copies. There is also a new chapter on cybersecurity, as well as thoroughly revised chapters on cloud and analytics. The book takes the reader on a tour through the building blocks of intelligent network video – from imaging to network cameras and video encoders, through the IT technologies of network and storage and into video management, analytics, and system design.
✦ Table of Contents
Cover
Endorsements
Half Title
Title
Copyright
Contents
Acknowledgements
Introduction
About the author
1 The evolution of video surveillance systems
1.1 VCR-based analog CCTV systems
1.2 DVR-based analog CCTV systems
1.3 Network DVR–based analog CCTV systems
1.4 Video encoder–based network video systems
1.4.1 NVRs and hybrid DVRs
1.4.2 High-definition CCTV cameras
1.5 Network camera–based network video systems
2 The components of network video
2.1 Where is network video used?
2.2 The network camera
2.2.1 Network cameras today
2.3 The video encoder
2.4 The network
2.5 Servers and storage
2.6 Video management software
2.7 Video analytics
3 Network cameras
3.1 Network camera components
3.2 Types of network cameras
3.3 Fixed box cameras
3.4 Fixed dome cameras
3.5 Bullet cameras
3.6 Pan, tilt, zoom (PTZ) cameras
3.6.1 Pan, tilt, roll, and zoom (PTRZ)
3.6.2 Presets and guard tours
3.6.3 E-Flip
3.6.4 Auto-Flip
3.6.5 PTZ performance
3.6.6 Joystick control
3.7 Modular cameras
3.8 Thermal cameras
3.9 Panoramic cameras
3.9.1 Selecting the right viewing angle
3.9.2 Cameras with wide viewing angles
3.9.3 180° panoramic cameras
3.9.4 360° Panoramic cameras
3.9.5 Multisensor panoramic cameras
3.9.6 Comparing and combining panoramic and PTZ cameras
3.10 Onboard cameras
3.11 Body-worn cameras
3.12 Explosion-protected cameras
3.13 Bi-spectral PTZ cameras
3.14 Best practices
4 Camera technologies
4.1 Light
4.1.1 Characteristics of light
4.1.2 Illuminance
4.1.2.1 Definition of lux
4.1.2.2 Lux rating of network cameras
4.1.3 Color temperature
4.1.4 White balance
4.1.5 Invisible light
4.1.6 IR illuminators
4.1.7 Day-and-night applications
4.2 Lenses
4.2.1 Lens types
4.2.1.1 IR-coated lenses
4.2.2 Lens quality
4.2.3 Lens mount standards
4.2.4 Field of view (focal length)
4.2.5 Matching lens and sensor
4.2.6 Aperture (iris diameter)
4.2.7 Types of iris control
4.2.8 F-number (F-stop)
4.2.9 Depth of field
4.2.10 Focusing
4.2.11 Lenses for high-resolution cameras
4.3 Image sensors
4.3.1 Color filtering
4.3.2 CMOS and CCD technologies
4.3.2.1 CMOS technology
4.3.3 More about image sensors
4.3.4 High-resolution sensors
4.4 Image scanning techniques
4.4.1 Interlaced scanning
4.4.2 Deinterlacing techniques
4.4.3 Progressive scanning
4.5 Image processing
4.5.1 Exposure
4.5.2 Backlight compensation
4.5.3 Wide dynamic range (WDR)
4.5.3.1 Measuring dynamic range
4.5.3.2 Types of WDR
4.5.4 Bayer demosaicing
4.5.5 Noise
4.5.6 Sharpening and contrast
4.5.7 Aliasing
4.5.8 Image stabilization
4.5.9 Privacy masking
4.6 Resolution
4.6.1 NTSC and PAL resolutions
4.6.2 Megapixel resolutions
4.7 High-resolution cameras
4.7.1 The benefits of high resolution
4.7.2 High-resolution applications
4.7.3 The drawbacks of high resolution
4.7.4 High-definition television (HDTV) resolutions
4.7.5 Ultra-HD resolutions
4.7.6 Aspect ratios
4.8 Best practices
5 Thermal cameras
5.1 How thermal imaging works
5.1.1 The electromagnetic spectrum
5.1.2 Using thermal radiation to create images
5.2 The components of a thermal camera
5.2.1 Sensors
5.2.1.1 Cooled sensors
5.2.1.2 Uncooled sensors
5.2.2 Sensor resolutions
5.2.3 Lenses for thermal cameras
5.2.3.1 Calculation of focal length
5.2.4 Thermal enclosures
5.3 Presenting thermal images
5.3.1 Thermometric cameras
5.4 Determining detection range
5.4.1 The nomograph
5.4.2 Environmental considerations
5.4.2.1 Absorption
5.4.2.2 Scattering
5.5 Integrating thermal cameras with video analytics
5.6 Export regulations for thermal technologies
5.7 Best practices
6 Video compression technologies
6.1 The basics of compression
6.1.1 Image and video compression
6.1.2 Lossless and lossy compression
6.1.3 Block transform
6.1.4 Prediction
6.1.5 Latency
6.1.6 Jitter
6.1.7 Compression ratio
6.2 Compression standards
6.2.1 ITU and ISO
6.2.2 History of compression formats
6.3 Compression formats
6.3.1 JPEG
6.3.2 Motion JPEG
6.3.3 MPEG-4
6.3.4 H.264
6.3.5 H.265
6.4 More on JPEG compression
6.5 More on MPEG compression
6.5.1 Frame types
6.5.2 Group of pictures
6.5.3 Constant, maximum, and variable bitrates
6.5.4 Average bitrate
6.5.5 Profile@Level
6.5.6 The Baseline and Main profiles
6.5.7 Improving H.264 for surveillance
6.5.8 Licensing
6.5.9 Backward compatibility
6.6 Comparing standards
6.7 Best practices
7 Audio technologies
7.1 Use cases for audio
7.1.1 Listen and interact
7.1.2 Listen and witness
7.1.3 Record and store
7.1.4 Automatic intervention
7.2 Audio in surveillance systems
7.3 Audio modes
7.3.1 Simplex
7.3.2 Half-duplex
7.3.3 Full-duplex
7.4 Audio equipment
7.4.1 Sound input (microphones)
7.4.1.1 Condenser microphones
7.4.1.2 Electret condenser microphones
7.4.1.3 Dynamic microphones
7.4.1.4 Directional microphones
7.4.2 Audio output (speakers)
7.5 Acoustical adjustments
7.5.1 Volume and gain
7.5.2 Audio processing
7.5.3 Voice enhancement
7.5.4 Noise cancellation
7.5.5 Echo cancellation
7.6 Audio analytics
7.6.1 Audio detection alarm
7.6.2 Visualizing sound in video
7.7 Audio compression
7.7.1 Sampling rates
7.7.2 Bitrate
7.7.3 Software audio codecs
7.7.3.1 AAC-LC
7.7.3.2 G.711 PCM
7.7.3.3 G.726 ADPCM
7.7.3.4 LPCM
7.7.3.5 Opus
7.8 Audio and video synchronization
7.9 The future of audio in network video
7.10 Other audio devices in network video systems
7.10.1 Network speakers
7.10.2 Audio management software
7.10.3 Network intercom
7.10.4 Audio and I/O interface module
7.10.5 The SIP protocol
7.11 Best practices
8 Video encoders
8.1 The components of a video encoder
8.2 Stand-alone video encoders
8.3 Rack-mounted video encoders
8.4 Video encoders with PTZ cameras
8.5 Video decoder
8.6 Best practices
9 Networking technologies
9.1 The OSI reference model
9.1.1 Layer 1: The physical layer
9.1.2 Layer 2: The data-link layer
9.1.3 Layer 3: The network layer
9.1.4 Layer 4: The transport layer
9.1.5 Layer 5: The session layer
9.1.6 Layer 6: The presentation layer
9.1.7 Layer 7: The application layer
9.2 The TCP/IP reference model
9.2.1 The Internet Protocol (IP)
9.2.2 IPv4 addresses
9.2.3 Subnets
9.2.4 Network Address Translation (NAT)
9.2.5 Services and port numbers
9.2.6 Port forwarding
9.2.7 IPv6
9.2.8 IPv6 addresses
9.3 Managing IP addresses
9.3.1 Setting IP addresses
9.3.2 Manual address allocation
9.3.2.1 Dynamic address allocation
9.3.3 Configuration-free networking
9.3.3.1 UPnP® and Zeroconf
9.3.3.2 Bonjour®
9.3.3.3 MAC and IP address resolution
9.3.3.4 Address Resolution Protocol (ARP)
9.3.4 Domain Name System (DNS)
9.3.4.1 Dynamic DNS
9.4 Data transport
9.4.1 User Datagram Protocol (UDP)
9.4.2 Transmission Control Protocol (TCP)
9.5 Application layer protocols
9.5.1 HyperText Transfer Protocol (HTTP)
9.5.2 File Transfer Protocol (FTP)
9.5.3 Simple Network Management Protocol (SNMP)
9.5.4 Simple Mail Transfer Protocol (SMTP)
9.5.5 Real-time Transport Protocol (RTP)
9.5.6 Real-time Transport Streaming Protocol (RTSP)
9.5.7 Session Initiation Protocol (SIP)
9.6 Unicast, broadcast, and multicast
9.7 Quality of Service (QoS)
9.7.1 Definition
9.7.2 QoS in network video
9.8 Message Queuing Telemetry Transport (MQTT)
10 Wired networks
10.1 The evolution of Ethernet
10.1.1 10-Mbit/s Ethernet
10.1.2 Fast Ethernet
10.1.3 Gigabit Ethernet
10.1.4 10Gigabit Ethernet
10.1.5 The future of Ethernet
10.2 Network topologies
10.3 Network cabling
10.3.1 Twisted-pair cables and RJ45
10.3.2 Cable categories
10.3.3 Twisted-pair cable types
10.3.4 Fiber cable types
10.3.4.1 Fiber connectors
10.4 The basics of Ethernet
10.4.1 MAC addresses
10.4.2 Frames
10.4.3 Half-duplex and full-duplex
10.5 Networking equipment
10.5.1 Hubs
10.5.2 Switches
10.5.3 Routers
10.5.4 Firewalls
10.5.5 Bridges
10.5.6 Internet connections
10.6 Power over Ethernet
10.6.1 The 802.3 PoE standards
10.6.2 Midspans and splitters
10.7 Virtual local area networks (VLANs)
10.8 Cable installation considerations
10.8.1 Indoor cabling
10.8.2 Outdoor cabling
10.8.3 Underground cable runs
10.8.4 Terminating network cables
10.9 Best practices
11 Wireless networks
11.1 The basics of wireless networks
11.1.1 The wireless spectrum
11.1.2 Signal strength
11.1.3 Antennas
11.1.4 Radio wave propagation
11.2 Wireless network architecture
11.2.1 Point-to-point network
11.2.2 Point-to-multipoint network
11.2.3 Mesh network
11.3 802.11 WLAN standards
11.3.1 The 802.11b extension
11.3.2 The 802.11a extension
11.3.3 The 802.11g extension
11.3.4 The 802.11n extension
11.3.5 The 802.11ac extension
11.3.6 The 802.11s extension
11.3.7 The 802.11ax extension
11.3.8 Wi-Fi generation naming
11.4 The basics of 802.11 networks
11.4.1 Infrastructure network
11.4.2 802.11 frequencies
11.4.3 Channels
11.5 WLAN security
11.5.1 Wired Equivalent Privacy (WEP)
11.5.2 Temporary Key Integrity Protocol (TKIP)
11.5.3 Advanced Encryption Standard (AES)
11.5.4 Pre-Shared Key (PSK)
11.5.5 802.1X
11.5.6 Wi-Fi Protected Access®
11.6 Other wireless solutions
11.6.1 Bluetooth®
11.6.2 Universal Mobile Telecommunications System (UMTS)
11.6.3 Z-Wave®
11.6.4 Zigbee®
11.7 The performance of wireless networks
11.8 Best practices
12 Cybersecurity
12.1 What is cybersecurity?
12.1.1 Other risk management frameworks and standards
12.1.1.1 Standards for Attestation Engagements
12.1.1.2 The ISO/IEC 27001 standard
12.1.1.3 The Federal Information Security Management Act
12.1.1.4 The European Union Agency for Network and Information Security
12.2 Risk
12.3 Vulnerabilities
12.4 Threats
12.4.1 Intentional attacks
12.4.1.1 Opportunistic attacks
12.4.1.2 Targeted attacks
12.4.1.3 Actors
12.4.2 Who attacks what?
12.5 Mitigation of risk
12.5.1 Assets and resources
12.5.2 Security controls
12.6 Data security
12.6.1 Hardening guides
12.6.2 Vulnerability scanning
12.6.3 Penetration testing
12.6.4 Device inventory and management
12.6.5 Updated firmware
12.6.6 Limit exposure to the internet
12.7 Device security
12.7.1 Signed firmware
12.7.2 Secure boot
12.7.3 Secure identification
12.8 Network security
12.8.1 Authentication
12.9 Zero trust networking
12.10 Other techniques and protocols for cybersecurity
12.10.1 Limiting network exposure
12.10.1.1 Network isolation
12.10.1.2 IP filtering (IP tables)
12.10.2 Virtual Private Network (VPN)
12.10.3 HyperText Transfer Protocol Secure (HTTPS)
12.10.4 Secure Real-time Transport Protocol (SRTP)
12.11 Certificates
12.11.1 Certificate management
12.11.2 802.1X
12.11.3 802.1AR
12.12 Recovering from a cybersecurity event
12.12.1 Backups
12.13 Cybersecurity best practices
13 Servers and storage
13.1 Servers
13.1.1 Hardware platforms
13.1.2 Operating systems
13.1.3 Video file systems
13.2 Hard disks
13.2.1 The SCSI interface
13.2.2 The ATA and SATA interfaces
13.2.3 Hard disk failure
13.2.4 Solid-state drives
13.3 Storage architecture
13.3.1 Edge storage
13.3.2 Single-server storage
13.3.3 Network-attached storage (NAS)
13.3.4 Storage area network (SAN)
13.3.5 Internet Small Computer System Interface (iSCSI)
13.3.6 Cloud-based storage and hybrid systems
13.4 Redundancy
13.4.1 RAID systems
13.4.2 Data replication
13.4.3 Tape backup
13.4.4 Server clustering
13.4.5 Multiple servers
13.5 Best practices
14 Video management
14.1 Video management architectures
14.1.1 Server-based video management
14.1.1.1 Server with VMS software
14.1.1.2 Network video recorder (NVR)
14.1.2 Edge-based recording
14.1.3 Cloud-based video management
14.2 Other aspects of video management architecture
14.2.1 Open versus vendor-specific software
14.2.2 Protocols and APIs
14.2.3 Apps for smartphones and tablets
14.2.4 Scalability of video management software
14.2.5 Licensing of video management software
14.3 System features
14.3.1 Recording
14.3.1.1 Video recording
14.3.1.2 Audio recording
14.3.1.3 Recording and storage
14.3.1.4 Exporting files
14.3.2 Redaction
14.3.3 Viewing and searching
14.3.3.1 Live viewing
14.3.3.2 Viewing recordings
14.3.3.3 Multi-streaming
14.3.3.4 Search options
14.3.3.5 Similarity search
14.3.4 Mapping functionality
14.3.5 Event management
14.3.5.1 Edge-based event handling
14.3.5.2 Responses
14.3.6 Video analytics
14.3.6.1 Analytics in video management software
14.3.6.2 Analytics at the edge
14.3.7 Input and output ports
14.3.8 Log files
14.3.9 Administration and management features
14.3.9.1 Managing cameras
14.3.9.2 Time synchronization
14.3.9.3 User access control
14.3.10 Health monitoring
14.4 Integrated systems
14.4.1 Application programming interface
14.4.2 Point of sale (POS)
14.4.3 Physical access control
14.4.4 Building management
14.4.5 License plate recognition
14.4.6 Evidence Management Systems (EMS)
14.4.7 Industrial control systems
14.4.8 Radio-frequency identification (RFID)
14.5 Best practices
15 Cloud-based video solutions
15.1 Market drivers, size, and trends
15.1.1 Simplicity and scalability
15.1.2 Video Surveillance as a Service (VSaaS)
15.1.3 Responsibilities and purchasing decisions
15.2 Why use cloud video services?
15.2.1 Different needs, different services
15.2.1.1 Basic video surveillance
15.2.1.2 Integration with central alarm stations
15.2.1.3 Business intelligence
15.2.2 Edge analytics
15.3 Cloud considerations
15.4 Components of cloud video
15.5 Stakeholders of cloud video
15.5.1 The cloud service provider
15.5.2 The installer/integrator
15.5.3 The user
15.5.4 Other uses for cloud video
15.5.4.1 Camera streaming services
15.6 Cloud video architectures
15.7 Integration with other systems
15.7.1 Integration with physical access control
15.8 Best practices
16 Video analytics
16.1 What are video analytics?
16.2 The genesis of video analytics
16.3 Why video analytics?
16.3.1 Streamlining video surveillance operations
16.3.2 Managing stored video efficiently
16.3.3 Improving business operations
16.4 Artificial intelligence
16.4.1 Machine learning
16.4.2 Deep learning
16.4.3 Neural networks
16.4.4 Processor platforms for AI applications
16.5 Metadata
16.6 APIs and standards
16.7 Video analytics architectures
16.7.1 Server-based architecture
16.7.2 Cloud-based architecture
16.7.3 Edge analytics
16.7.4 Hybrid architecture
16.8 Integrating video analytics applications
16.9 Alarms: True or false?
16.10 Ethical considerations
16.11 Best practices
17 Video analytics applications
17.1 Categorizing video analytics
17.1.1 Categorizing video analytics by technology
17.1.1.1 Pixels, blobs, and objects
17.1.2 Categorizing video analytics by use
17.2 Analytics for security and safety
17.2.1 Video motion detection
17.2.1.1 The evolution of VMD
17.2.1.2 Tuning VMD parameters
17.2.1.3 VMD and radar
17.2.2 Object analytics
17.2.3 Camera tampering detection
17.2.4 Object tracking
17.2.4.1 Crossline detection
17.2.4.2 Intrusion detection
17.2.4.3 Object-left-behind
17.2.4.4 Loitering detection
17.2.5 Fire and smoke detection
17.2.6 Hard hat detection
17.2.7 Blocked exit detection
17.3 Analytics for operational efficiency
17.3.1 Object classification
17.3.2 Object and people counting
17.3.2.1 People counting in 3D
17.3.2.2 Customer traffic monitoring
17.3.2.3 Queue management
17.3.2.4 Tailgating
17.3.2.5 Dwell time and heat mapping
17.3.2.6 Other object counting applications
17.3.3 Traffic management
17.3.3.1 Incident detection
17.4 Hybrid analytics
17.4.1 PTZ autotracking
17.4.1.1 Gatekeeper
17.4.2 License plate recognition
17.4.3 Speed monitoring
17.4.4 Facial recognition
17.5 Sound identification
17.6 Video analytics and privacy
17.7 Realistic expectations on video analytics
17.8 Best practices
17.8.1 Video image quality
17.8.2 Efficient video algorithms
17.8.3 Computer processing power
17.8.4 Configuring and fine-tuning the system
18 System design considerations
18.1 Surveillance objective
18.2 Selecting a network camera
18.2.1 Type of camera
18.2.2 Image quality
18.2.3 Resolution
18.2.3.1 Determining the required resolution
18.2.4 Compression
18.2.5 Networking functionality
18.2.6 Other functionalities
18.2.7 Vendors
18.3 Installing a network camera
18.3.1 Add light if needed
18.3.1.1 Use IR light when white light is impracticable
18.3.2 Avoid direct sunlight and glare
18.3.3 Avoid backlight
18.3.4 Lens selection
18.4 Protecting a network camera
18.4.1 Camera enclosures in general
18.4.2 Transparent coverings
18.4.2.1 Overcoming the limitations of conventional domes
18.4.3 Positioning of fixed cameras
18.4.4 Environmental protection
18.4.5 Vandal and tampering protection
18.4.5.1 The goals of vandal protection
18.4.5.2 Mechanical design
18.4.5.3 Mounting
18.4.5.4 Camera placement
18.4.5.5 Protecting cameras with analytics
18.4.6 Mounting types
18.4.6.1 Ceiling mounts
18.4.6.2 Wall mounts
18.4.6.3 Pole mounts
18.4.6.4 Parapet mounts
18.4.6.5 Special mounts
18.4.7 Electromagnetic compatibility (EMC)
18.4.7.1 EMC standards
18.4.7.2 Emission
18.4.7.3 Immunity
18.4.7.4 Shielded or unshielded network cables
18.4.8 Media converters
18.4.8.1 PoE over coax
18.4.8.2 Ethernet-to-fiber converters
18.4.9 Safety of electrical equipment
18.4.10 Environmental ratings
18.4.10.1 IP ratings
18.4.10.2 NEMA ratings
18.4.10.3 IK ratings
18.4.10.4 Explosive atmospheres
18.4.10.5 IECEx and ATEX certifications
18.5 Storage and server considerations
18.5.1 System component distribution
18.5.2 Multi-site systems
18.5.3 Provisioning the server
18.5.4 Calculating storage
18.5.4.1 Bitrate and storage for H.264/H.265
18.5.4.2 Bitrate and storage for Motion JPEG
18.5.5 Bits or bytes?
18.5.5.1 Data sizes
18.5.5.2 Data transfer rates
18.6 Provisioning network bandwidth
18.6.1 Limiting the bandwidth
18.6.2 Network and system latency
18.6.3 Network cabling
18.6.3.1 Tips for better network cabling
18.6.3.2 Preparing the network cable
18.6.3.3 Certifying the cable installation
18.7 Tools for system design
18.7.1 Calculators and component selection tools
18.7.2 Comprehensive system design tools
18.7.3 CAD software plugins
18.7.3.1 Autodesk® Revit®
18.7.3.2 Bluebeam Revu®
18.8 Lifecycle management
18.8.1 System management
18.9 Maintenance
18.9.1 Planned maintenance
18.9.2 Unplanned maintenance
18.10 Legal aspects
Index
✦ Subjects
Video surveillance
📜 SIMILAR VOLUMES
Continuing in the tradition of the bestselling first edition, this book examines networked surveillance video solutions. It provides the latest details on industry hardware, software, and networking capabilities of the latest cameras and DVRs. It addresses in full detail updated specifications on MP
<p><span>The third edition traces the trajectory of video surveillance technology from its roots to its current state and into its potential future role in security and beyond. For the reader, it is an opportunity to explore what the latest technology has to offer, as well as to gain some insight in
Continuing in the tradition of the bestselling first edition, this book examines networked surveillance video solutions. It provides the latest details on industry hardware, software, and networking capabilities of the latest cameras and DVRs.<br>It addresses in full detail updated specifications on
<p>Belonging to the wider academic field of computer vision, video analytics has aroused a phenomenal surge of interest since the current millennium. Video analytics is intended to solve the problem of the incapability of exploiting video streams in real time for the purpose of detection or anticipa