IP Camera
   HOME

TheInfoList



OR:

An Internet Protocol camera, or IP camera, is a type of
digital video camera A video camera is an optical instrument that captures videos (as opposed to a movie camera, which records images on film). Video cameras were initially developed for the television industry but have since become widely used for a variety of other ...
that receives control data and sends image data via an
IP network The Internet protocol suite, commonly known as TCP/IP, is a framework for organizing the set of communication protocols used in the Internet and similar computer networks according to functional criteria. The foundational protocols in the suit ...
. They are commonly used for
surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as c ...
, but, unlike analog
closed-circuit television Closed-circuit television (CCTV), also known as video surveillance, is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly t ...
(CCTV) cameras, they require no local recording device, only a
local area network A local area network (LAN) is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building. By contrast, a wide area network (WAN) not only covers a larger ...
. Most IP cameras are
webcam A webcam is a video camera which is designed to record or stream to a computer or computer network. They are primarily used in videotelephony, livestreaming and social media, and security. Webcams can be built-in computer hardware or peripheral d ...
s, but the term ''IP camera'' or netcam usually applies only to those that can be directly accessed over a network connection. Some IP cameras require support of a central
network video recorder A network video recorder (NVR) is a specialized computer system that includes a software program that records video in a digital format to a disk drive, USB flash drive, SD memory card or other mass storage device. An NVR contains no dedicated vi ...
(NVR) to handle the recording, video and alarm management. Others are able to operate in a decentralized manner with no NVR needed, as the camera is able to record directly to any local or remote storage media. The first IP Camera was invented by
Axis Communications Axis Communications AB is a Swedish manufacturer of network cameras, access control, and network audio devices for the physical security and video surveillance industries. History Axis Communications was founded in 1984 by Martin Gren, Mika ...
in 1996.


History

The first centralized IP camera, the ''AXIS Neteye 200'', was released in 1996 by
Axis Communications Axis Communications AB is a Swedish manufacturer of network cameras, access control, and network audio devices for the physical security and video surveillance industries. History Axis Communications was founded in 1984 by Martin Gren, Mika ...
. Although the product was advertised to be accessible from anywhere with an internet connection, the camera was not capable of streaming real-time video, and was limited to returning a single image for each request in the
Common Intermediate Format CIF (''Common Intermediate Format'' or ''Common Interchange Format''), also known as FCIF (''Full Common Intermediate Format''), is a standardized format for the picture resolution, frame rate, color space, and color subsampling of digital video ...
(CIF). This limitation can be attributed to the lack of powerful
integrated circuits An integrated circuit or monolithic integrated circuit (also referred to as an IC, a chip, or a microchip) is a set of electronic circuits on one small flat piece (or "chip") of semiconductor material, usually silicon. Large numbers of tiny ...
capable of handling image processing at the time of release. As a result, the camera was aimed primarily at the tourism industry, and not intended to replace traditional analog CCTV systems. The first decentralized IP camera was released in 1999 by Mobotix. The camera's
Linux Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, which ...
system contained video, alarm, and recording management functions. In 2005, the first IP camera with onboard video content analytics ( VCA) was released by Intellio. This camera was able to detect a number of different events, such as if an object was stolen, a human crossed a line, a human entered a predefined zone, or if a car moved in the wrong direction. With advancements in
cloud infrastructure Cloud computing is the on-demand availability of computer system resources, especially data storage ( cloud storage) and computing power, without direct active management by the user. Large clouds often have functions distributed over mul ...
,
Ring Ring may refer to: * Ring (jewellery), a round band, usually made of metal, worn as ornamental jewelry * To make a sound with a bell, and the sound made by a bell :(hence) to initiate a telephone connection Arts, entertainment and media Film and ...
(owned by Amazon, U.S.), released its first IP Camera doorbell targeted for home use in 2014. The device offered quick setup, cloud-based recording, and motion detection. The device retailed for $199 USD. As of 2021, Ring has sold millions of units. With the success of IP Cameras, other companies such as
Nest A nest is a structure built for certain animals to hold eggs or young. Although nests are most closely associated with birds, members of all classes of vertebrates and some invertebrates construct nests. They may be composed of organic materia ...
(owned by Google, U.S.) released similar cloud-based devices.


Standards

Previous generations of analog CCTV cameras use established broadcast television formats (e.g. CIF,
NTSC The first American standard for analog television broadcast was developed by National Television System Committee (NTSC)National Television System Committee (1951–1953), Report and Reports of Panel No. 11, 11-A, 12–19, with Some supplement ...
,
PAL Phase Alternating Line (PAL) is a colour encoding system for analogue television. It was one of three major analogue colour television standards, the others being NTSC and SECAM. In most countries it was broadcast at 625 lines, 50 fields (25 ...
, and
SECAM SECAM, also written SÉCAM (, ''Séquentiel de couleur à mémoire'', French for ''color sequential with memory''), is an analog color television system that was used in France, some parts of Europe and Africa, and Russia. It was one of th ...
). Since 2000, there has been a shift in the consumer TV business towards high-definition (HD) resolutions (e.g.
1080P 1080p (1920×1080 progressively displayed pixels; also known as Full HD or FHD, and BT.709) is a set of HDTV high-definition video modes characterized by 1,920 pixels displayed across the screen horizontally and 1,080 pixels down the screen vert ...
(Full-HD),
4K resolution 4K resolution refers to a horizontal display resolution of approximately 4,000 pixels. Digital television and digital cinematography commonly use several different 4K resolutions. In television and consumer media, 38402160 (4K Ultra-high-definitio ...
(Ultra-HD) and 16:9 widescreen format). IP cameras may differ from one another in resolution, features,
video encoding In information theory, data compression, source coding, or bit-rate reduction is the process of encoding information using fewer bits than the original representation. Any particular compression is either lossy or lossless. Lossless compression ...
schemes, available network protocols, and the API for video management software. To address IP video surveillance standardization issues, two industry groups formed in 2008: the Open Network Video Interface Forum (
ONVIF ONVIF (the Open Network Video Interface Forum) is a global and open industry forum with the goal of facilitating the development and use of a global open standard for the interface of physical IP-based security products. ONVIF creates a standar ...
) and the
Physical Security Interoperability Alliance The Physical Security Interoperability Alliance (PSIA) is a global consortium of more than 65 physical security manufacturers and systems integrators focused on promoting interoperability of IP-enabled security devices and systems across the physi ...
(PSIA). PSIA was founded by 20 member companies including
Honeywell Honeywell International Inc. is an American publicly traded, multinational conglomerate corporation headquartered in Charlotte, North Carolina. It primarily operates in four areas of business: aerospace, building technologies, performance ma ...
,
GE Security GE Security was a division of General Electric's GE Enterprise Solutions. It was acquired by UTC on March 1, 2010, and became part of UTC Fire & Security. GE Security's division provides intrusion alarm systems, integrated security systems, fir ...
, and
Cisco Cisco Systems, Inc., commonly known as Cisco, is an American-based multinational digital communications technology conglomerate corporation headquartered in San Jose, California. Cisco develops, manufactures, and sells networking hardware, ...
. ONVIF was founded by
Axis Communications Axis Communications AB is a Swedish manufacturer of network cameras, access control, and network audio devices for the physical security and video surveillance industries. History Axis Communications was founded in 1984 by Martin Gren, Mika ...
, Bosch and
Sony , commonly stylized as SONY, is a Japanese multinational conglomerate corporation headquartered in Minato, Tokyo, Japan. As a major technology company, it operates as one of the world's largest manufacturers of consumer and professional ...
. Each group now has numerous additional members, thus cameras and recording hardware that operate under the same standard are compatible with each other.


Technology

Network Cameras are developed for both enterprise and consumer use. Consumer IP cameras used for home security typically send live video to a companion app on a user's device. They generally connect to the internet through
Wi-Fi Wi-Fi () is a family of wireless network protocols, based on the IEEE 802.11 family of standards, which are commonly used for local area networking of devices and Internet access, allowing nearby digital devices to exchange data by radio wave ...
or an Ethernet cable. Unlike consumer IP Cameras, Enterprise IP Cameras often offer higher video resolution, video analytics, and are mostly accessed though
HTTP The Hypertext Transfer Protocol (HTTP) is an application layer protocol in the Internet protocol suite model for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web, ...
and
real time streaming protocol The Real Time Streaming Protocol (RTSP) is an application-level network protocol designed for multiplexing and packetizing multimedia transport streams (such as interactive media, video and audio) over a suitable transport protocol. RTSP is us ...
(RTSP). IP cameras used to be more common in businesses rather than in homes, but that is no longer the case. A 2016 survey of 2,000 Americans revealed 20% of them owned home security cameras. This crossover to IP cameras in home use is partly due to the device's self-installation. IP cameras typically don't require professional installation saving time for home and business owners. One of the most popular abilities that consumer-level home security cameras have is to view their footage via a
mobile app A mobile application or app is a computer program or software application designed to run on a mobile device such as a phone, tablet, or watch. Mobile applications often stand in contrast to desktop applications which are designed to run on d ...
. Many cameras offer features such as a
wide-angle lens In photography and cinematography, a wide-angle lens refers to a lens whose focal length is substantially smaller than the focal length of a normal lens for a given film plane. This type of lens allows more of the scene to be included in the ...
, low-light or
night vision Night vision is the ability to see in low-light conditions, either naturally with scotopic vision or through a night-vision device. Night vision requires both sufficient spectral range and sufficient intensity range. Humans have poor night vi ...
capabilities, and motion detection. Most are developed to send out notifications via an application such as when motion is detected. Video clips can be stored in a local device such as a micro-SD Card or through a cloud service. The market size of home security systems reached $4.8 billion in 2018. It had a
compound annual growth rate Compound annual growth rate (CAGR) is a business and investing specific term for the geometric progression ratio that provides a constant rate of return over the time period. CAGR is not an accounting term, but it is often used to describe some ele ...
of 22.4% between 2011 and 2018. People in countries that suffer from high crime rates, particularly robbery and theft, are keen to adopt home security cameras.
The US The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 states, a federal district, five major unincorporated territori ...
and
China China, officially the People's Republic of China (PRC), is a country in East Asia. It is the world's most populous country, with a population exceeding 1.4 billion, slightly ahead of India. China spans the equivalent of five time zones and ...
have a high implementation rate of
residential security Home security includes both the security hardware placed on a property and individuals' personal security practices. Security hardware includes doors, locks, alarm systems, lighting, motion detectors, and security camera systems. Personal se ...
cameras. Major key players in the home security market are
Nest A nest is a structure built for certain animals to hold eggs or young. Although nests are most closely associated with birds, members of all classes of vertebrates and some invertebrates construct nests. They may be composed of organic materia ...
(owned by Google, U.S.),
Ring Ring may refer to: * Ring (jewellery), a round band, usually made of metal, worn as ornamental jewelry * To make a sound with a bell, and the sound made by a bell :(hence) to initiate a telephone connection Arts, entertainment and media Film and ...
(owned by Amazon, U.S.), and Arlo (owned by Netgear, U.S.). In the alarm security industry key players are ADT (U.S.),
Vivint Vivint is a public smart home company in the United States and Canada. It was founded by Keith Nellesen and Todd Pedersen in 1999. In 2012, The Blackstone Group acquired Vivint for more than $2 billion. In January 2020, the company completed ...
(U.S.), and
SimpliSafe SimpliSafe is an American home security company based in Boston, Massachusetts. The company produces and sells self-installed wireless security systems. History SimpliSafe was founded in 2006 by then-Harvard Business School students, Chad and E ...
(U.S.). The largest IP Camera manufactures are Hikvision Digital Technology (China),
Axis Communications Axis Communications AB is a Swedish manufacturer of network cameras, access control, and network audio devices for the physical security and video surveillance industries. History Axis Communications was founded in 1984 by Martin Gren, Mika ...
(Sweden), and Dahua (China)


IP camera types

Depending on their functionality, IP Cameras are generally classified as fixed, varifocal, or pan–tilt–zoom (PTZ camera). Fixed cameras feature an immobile perspective on the subject, whereas varifocal cameras have the ability to remotely adjust the zoom of the image. In addition, PTZ cameras have the ability to direct the camera assembly in any direction remotely. This can be used to track motion or manually adjust the monitoring area. IP Cameras can be designed for indoor or outdoor use. Outdoor cameras are often rated
IP65 The IP code or ingress protection code indicates how well a device is protected against water and dust. It defined by the International Electrotechnical Commission (IEC) under the international standard IEC 60529 which classifies and p ...
/IP67 in order to withstand outdoor conditions. IP Cameras can offer a variety of digital imaging technologies such as multi-sensor cameras, panoramic cameras, and
thermal imaging Infrared thermography (IRT), thermal video and/or thermal imaging, is a process where a thermal camera captures and creates an image of an object by using infrared radiation emitted from the object in a process, which are examples of infrared i ...
cameras.


Cloud and local storage

Some camera manufacturers offer cloud subscriptions where users may remotely view and download recent video clips by paying recurring subscription fees. Cloud subscription plans typically come with several days of looping storage, and the videos will be overwritten beyond this duration. Some cameras include a micro
SD card Secure Digital, officially abbreviated as SD, is a proprietary non-volatile flash memory card format developed by the SD Association (SDA) for use in portable devices. The standard was introduced in August 1999 by joint efforts between SanDis ...
slot so users can store videos locally. Most IP Cameras can be programmed to overwrite old video once the storage medium is full. Accessing the video on the camera can normally be done via a direct network connection to the device.


Considerations


Potential benefits

Previous generation cameras transmitted
analog video Video is an electronic medium for the recording, copying Copying is the duplication of information or an artifact based on an instance of that information or artifact, and not using the process that originally generated it. With analog f ...
signals. IP cameras send images digitally using the transmission and security features of the
TCP/IP The Internet protocol suite, commonly known as TCP/IP, is a framework for organizing the set of communication protocols used in the Internet and similar computer networks according to functional criteria. The foundational protocols in the suit ...
protocol. Advantages to this approach include: * Two-way audio via a single network cable allows users to listen to and speak to the subject of the video (e.g., a clerk assisting a customer through step-by-step instructions) * Use of a
Wi-Fi Wi-Fi () is a family of wireless network protocols, based on the IEEE 802.11 family of standards, which are commonly used for local area networking of devices and Internet access, allowing nearby digital devices to exchange data by radio wave ...
or
wireless network A wireless network is a computer network that uses wireless data connections between network nodes. Wireless networking is a method by which homes, telecommunications networks and business installations avoid the costly process of introducing ...
*
Distributed artificial intelligence Distributed Artificial Intelligence (DAI) also called Decentralized Artificial Intelligence is a subfield of artificial intelligence research dedicated to the development of distributed solutions for problems. DAI is closely related to and a pred ...
(DAI)—as the camera can contain video analytics that analyze images * Secure data transmission through encryption and authentication methods such as
WPA WPA may refer to: Computing *Wi-Fi Protected Access, a wireless encryption standard *Windows Product Activation, in Microsoft software licensing * Wireless Public Alerting (Alert Ready), emergency alerts over LTE in Canada * Windows Performance An ...
or
WPA2 Wi-Fi Protected Access (WPA), Wi-Fi Protected Access II (WPA2), and Wi-Fi Protected Access 3 (WPA3) are the three security and security certification programs developed after 2000 by the Wi-Fi Alliance to secure wireless computer networks. The All ...
, TKIP or AES * Remote accessibility that lets users view live video from any device with sufficient access privileges *
Power over Ethernet Power over Ethernet, or PoE, describes any of several standards or ad hoc systems that pass electric power along with data on twisted-pair Ethernet cabling. This allows a single cable to provide both data connection and electrical power to d ...
(PoE) to supply power through the Ethernet cable and operate without a dedicated power supply * Better image resolution, typically four times the resolution of an analog camera


Artificial intelligence and Internet privacy

The
American Civil Liberties Union The American Civil Liberties Union (ACLU) is a nonprofit organization founded in 1920 "to defend and preserve the individual rights and liberties guaranteed to every person in this country by the Constitution and laws of the United States". T ...
(ACLU) has expressed privacy concerns if AI is widely practiced. AI is capable of tracking movements and studying behaviors; moreover, AI can also recognize emotions, and further predict patterns of movement.


Facial recognition system

Facial recognition identifies a human face by analyzing facial features from a picture or video, an example of
biometrics Biometrics are body measurements and calculations related to human characteristics. Biometric authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify i ...
. If a camera allows users to set up a database that includes family members and close friends, the system may distinguish whether someone exists in the database. If the camera is capable of providing accurate facial recognition, it can tell if the person it detects is authorized (in the database). The detection of unauthorized persons may prompt the owner to call law enforcement. The footage can be used as a means of identifying and apprehending offenders.


Potential concerns

Concerns include: *
Privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of a ...
concerns * Average higher purchase cost per camera * Security can be compromised by insecure credentials, given that the camera can be accessed independently of a video recorder. * Public internet connection video can be complicated to set up or using the
peer-to-peer Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network. They are said to form a peer-to-peer n ...
(P2P) network. *Data storage capacity concerns


Hacking

If video is transmitted over the public
internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
rather than a private network or intranet, CCTV devices potentially becomes open to a wider audience including
hackers A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term ''hacker'' has become associated in popu ...
. Malicious actors can access private CCTV systems to disable, manipulate, or observe security measures– as well as gain further access to the private network it's connected to, often referred to colloquially as pivoting. This risk can be mitigated by securing the network via
Firewall Firewall may refer to: * Firewall (computing), a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts * Firewall (construction), a barrier inside a building, designed to limit the spr ...
rules designed to restrict access to the device, and by keeping
software Software is a set of computer programs and associated documentation and data. This is in contrast to hardware, from which the system is built and which actually performs the work. At the lowest programming level, executable code consists ...
and
firmware In computing, firmware is a specific class of computer software that provides the low-level control for a device's specific hardware. Firmware, such as the BIOS of a personal computer, may contain basic functions of a device, and may provide h ...
up to date. In 2012, users of 4chan hacked into thousands of streaming personal IP cameras by exploiting a vulnerability in some models of
TRENDnet TRENDnet is a global manufacturer of computer networking products headquartered in Torrance, California, in the United States. It sells networking and surveillance products especially in the small to medium business (SMB) and home user market seg ...
home security cameras. In 2014, it was reported that a site indexed 73,011 locations worldwide with security cameras that used default usernames and passwords, and were therefore, unprotected. Automated services like Shodan.io constantly scan residential and commercial IP blocks to automatically detect and catalog open ports and services, including those commonly used for IP cameras.


See also

*
Closed-circuit television camera A closed-circuit television camera can produce images or recordings for surveillance or other private purposes. Cameras can be either video cameras, or digital stills cameras. Walter Bruch was the inventor of the CCTV camera. The main purpose o ...
*
Dashcam A dashboard camera or simply dashcam, also known as car digital video recorder (car DVR), driving recorder, or event data recorder (EDR), is an onboard camera that continuously records the view through a vehicle's front windscreen and sometimes ...
*
Remote camera A remote camera, also known as a trail camera or game camera, is a camera placed by a photographer in areas where the photographer generally cannot be at the camera to snap the shutter. This includes areas with limited access, tight spaces where a ...


References


External links

* {{DEFAULTSORT:Ip Camera Surveillance Internet Protocol Video Video surveillance 20th-century inventions Cloud storage Facial recognition software Privacy Hacking (computer security) Artificial intelligence Wireless Battery (electricity) Internet protocols