IP Video Surveillance
   HOME

TheInfoList



OR:

An Internet Protocol camera, or IP camera, is a type of
digital video camera A video camera is an optical instrument that captures videos (as opposed to a movie camera, which records images on film). Video cameras were initially developed for the television industry but have since become widely used for a variety of other ...
that receives control data and sends image data via an IP network. They are commonly used for
surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as c ...
, but, unlike analog
closed-circuit television Closed-circuit television (CCTV), also known as video surveillance, is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly t ...
(CCTV) cameras, they require no local recording device, only a local area network. Most IP cameras are webcams, but the term ''IP camera'' or netcam usually applies only to those that can be directly accessed over a network connection. Some IP cameras require support of a central
network video recorder A network video recorder (NVR) is a specialized computer system that includes a software program that records video in a digital format to a disk drive, USB flash drive, SD memory card or other mass storage device. An NVR contains no dedicated vi ...
(NVR) to handle the recording, video and alarm management. Others are able to operate in a decentralized manner with no NVR needed, as the camera is able to record directly to any local or remote storage media. The first IP Camera was invented by Axis Communications in 1996.


History

The first centralized IP camera, the ''AXIS Neteye 200'', was released in 1996 by Axis Communications. Although the product was advertised to be accessible from anywhere with an internet connection, the camera was not capable of streaming real-time video, and was limited to returning a single image for each request in the Common Intermediate Format (CIF). This limitation can be attributed to the lack of powerful integrated circuits capable of handling image processing at the time of release. As a result, the camera was aimed primarily at the tourism industry, and not intended to replace traditional analog CCTV systems. The first decentralized IP camera was released in 1999 by Mobotix. The camera's Linux system contained video, alarm, and recording management functions. In 2005, the first IP camera with onboard video content analytics ( VCA) was released by Intellio. This camera was able to detect a number of different events, such as if an object was stolen, a human crossed a line, a human entered a predefined zone, or if a car moved in the wrong direction. With advancements in cloud infrastructure,
Ring Ring may refer to: * Ring (jewellery), a round band, usually made of metal, worn as ornamental jewelry * To make a sound with a bell, and the sound made by a bell :(hence) to initiate a telephone connection Arts, entertainment and media Film and ...
(owned by Amazon, U.S.), released its first IP Camera doorbell targeted for home use in 2014. The device offered quick setup, cloud-based recording, and motion detection. The device retailed for $199 USD. As of 2021, Ring has sold millions of units. With the success of IP Cameras, other companies such as Nest (owned by Google, U.S.) released similar cloud-based devices.


Standards

Previous generations of analog CCTV cameras use established broadcast television formats (e.g. CIF, NTSC, PAL, and SECAM). Since 2000, there has been a shift in the consumer TV business towards high-definition (HD) resolutions (e.g.
1080P 1080p (1920×1080 progressively displayed pixels; also known as Full HD or FHD, and BT.709) is a set of HDTV high-definition video modes characterized by 1,920 pixels displayed across the screen horizontally and 1,080 pixels down the screen vert ...
(Full-HD),
4K resolution 4K resolution refers to a horizontal display resolution of approximately 4,000 pixels. Digital television and digital cinematography commonly use several different 4K resolutions. In television and consumer media, 38402160 (4K Ultra-high-definitio ...
(Ultra-HD) and 16:9 widescreen format). IP cameras may differ from one another in resolution, features,
video encoding In information theory, data compression, source coding, or bit-rate reduction is the process of encoding information using fewer bits than the original representation. Any particular compression is either lossy or lossless. Lossless compression ...
schemes, available network protocols, and the API for video management software. To address IP video surveillance standardization issues, two industry groups formed in 2008: the Open Network Video Interface Forum ( ONVIF) and the
Physical Security Interoperability Alliance The Physical Security Interoperability Alliance (PSIA) is a global consortium of more than 65 physical security manufacturers and systems integrators focused on promoting interoperability of IP-enabled security devices and systems across the physi ...
(PSIA). PSIA was founded by 20 member companies including Honeywell,
GE Security GE Security was a division of General Electric's GE Enterprise Solutions. It was acquired by UTC on March 1, 2010, and became part of UTC Fire & Security. GE Security's division provides intrusion alarm systems, integrated security systems, fire ...
, and Cisco. ONVIF was founded by Axis Communications, Bosch and Sony. Each group now has numerous additional members, thus cameras and recording hardware that operate under the same standard are compatible with each other.


Technology

Network Cameras are developed for both enterprise and consumer use. Consumer IP cameras used for home security typically send live video to a companion app on a user's device. They generally connect to the internet through Wi-Fi or an Ethernet cable. Unlike consumer IP Cameras, Enterprise IP Cameras often offer higher video resolution, video analytics, and are mostly accessed though HTTP and real time streaming protocol (RTSP). IP cameras used to be more common in businesses rather than in homes, but that is no longer the case. A 2016 survey of 2,000 Americans revealed 20% of them owned home security cameras. This crossover to IP cameras in home use is partly due to the device's self-installation. IP cameras typically don't require professional installation saving time for home and business owners. One of the most popular abilities that consumer-level home security cameras have is to view their footage via a mobile app. Many cameras offer features such as a wide-angle lens, low-light or
night vision Night vision is the ability to see in low-light conditions, either naturally with scotopic vision or through a night-vision device. Night vision requires both sufficient spectral range and sufficient intensity range. Humans have poor night vi ...
capabilities, and
motion detection Motion detection is the process of detecting a change in the position of an object relative to its surroundings or a change in the surroundings relative to an object. It can be achieved by either mechanical or electronic methods. When it is done by ...
. Most are developed to send out notifications via an application such as when motion is detected. Video clips can be stored in a local device such as a micro-SD Card or through a cloud service. The market size of home security systems reached $4.8 billion in 2018. It had a compound annual growth rate of 22.4% between 2011 and 2018. People in countries that suffer from high crime rates, particularly robbery and theft, are keen to adopt home security cameras.
The US The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 states, a federal district, five major unincorporated territori ...
and
China China, officially the People's Republic of China (PRC), is a country in East Asia. It is the world's most populous country, with a population exceeding 1.4 billion, slightly ahead of India. China spans the equivalent of five time zones and ...
have a high implementation rate of residential security cameras. Major key players in the home security market are Nest (owned by Google, U.S.),
Ring Ring may refer to: * Ring (jewellery), a round band, usually made of metal, worn as ornamental jewelry * To make a sound with a bell, and the sound made by a bell :(hence) to initiate a telephone connection Arts, entertainment and media Film and ...
(owned by Amazon, U.S.), and Arlo (owned by Netgear, U.S.). In the alarm security industry key players are ADT (U.S.), Vivint (U.S.), and SimpliSafe (U.S.). The largest IP Camera manufactures are
Hikvision Hangzhou Hikvision Digital Technology Co., Ltd., often shortened to Hikvision, is a Chinese state-owned manufacturer and supplier of video surveillance equipment for civilian and military purposes, headquartered in Hangzhou, Zhejiang. Due to it ...
Digital Technology (China), Axis Communications (Sweden), and Dahua (China)


IP camera types

Depending on their functionality, IP Cameras are generally classified as fixed, varifocal, or pan–tilt–zoom (PTZ camera). Fixed cameras feature an immobile perspective on the subject, whereas varifocal cameras have the ability to remotely adjust the zoom of the image. In addition, PTZ cameras have the ability to direct the camera assembly in any direction remotely. This can be used to track motion or manually adjust the monitoring area. IP Cameras can be designed for indoor or outdoor use. Outdoor cameras are often rated
IP65 The IP code or ingress protection code indicates how well a device is protected against water and dust. It defined by the International Electrotechnical Commission (IEC) under the international standard IEC 60529 which classifies and p ...
/IP67 in order to withstand outdoor conditions. IP Cameras can offer a variety of digital imaging technologies such as multi-sensor cameras, panoramic cameras, and thermal imaging cameras.


Cloud and local storage

Some camera manufacturers offer cloud subscriptions where users may remotely view and download recent video clips by paying recurring subscription fees. Cloud subscription plans typically come with several days of looping storage, and the videos will be overwritten beyond this duration. Some cameras include a micro SD card slot so users can store videos locally. Most IP Cameras can be programmed to overwrite old video once the storage medium is full. Accessing the video on the camera can normally be done via a direct network connection to the device.


Considerations


Potential benefits

Previous generation cameras transmitted analog video signals. IP cameras send images digitally using the transmission and security features of the TCP/IP protocol. Advantages to this approach include: * Two-way audio via a single network cable allows users to listen to and speak to the subject of the video (e.g., a clerk assisting a customer through step-by-step instructions) * Use of a Wi-Fi or wireless network * Distributed artificial intelligence (DAI)—as the camera can contain video analytics that analyze images * Secure data transmission through encryption and authentication methods such as WPA or
WPA2 Wi-Fi Protected Access (WPA), Wi-Fi Protected Access II (WPA2), and Wi-Fi Protected Access 3 (WPA3) are the three security and security certification programs developed after 2000 by the Wi-Fi Alliance to secure wireless computer networks. The All ...
, TKIP or
AES AES may refer to: Businesses and organizations Companies * AES Corporation, an American electricity company * AES Data, former owner of Daisy Systems Holland * AES Eletropaulo, a former Brazilian electricity company * AES Andes, formerly AES Gener ...
* Remote accessibility that lets users view live video from any device with sufficient access privileges * Power over Ethernet (PoE) to supply power through the Ethernet cable and operate without a dedicated power supply * Better image resolution, typically four times the resolution of an analog camera


Artificial intelligence and Internet privacy

The American Civil Liberties Union (ACLU) has expressed privacy concerns if AI is widely practiced. AI is capable of tracking movements and studying behaviors; moreover, AI can also recognize emotions, and further predict patterns of movement.


Facial recognition system

Facial recognition Facial recognition or face recognition may refer to: * Face detection, often a step done before facial recognition * Face perception, the process by which the human brain understands and interprets the face * Pareidolia, which involves, in part, se ...
identifies a human face by analyzing facial features from a picture or video, an example of biometrics. If a camera allows users to set up a database that includes family members and close friends, the system may distinguish whether someone exists in the database. If the camera is capable of providing accurate facial recognition, it can tell if the person it detects is authorized (in the database). The detection of unauthorized persons may prompt the owner to call law enforcement. The footage can be used as a means of identifying and apprehending offenders.


Potential concerns

Concerns include: *
Privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of a ...
concerns * Average higher purchase cost per camera * Security can be compromised by insecure credentials, given that the camera can be accessed independently of a video recorder. * Public internet connection video can be complicated to set up or using the peer-to-peer (P2P) network. *Data storage capacity concerns


Hacking

If video is transmitted over the public internet rather than a private network or
intranet An intranet is a computer network for sharing information, easier communication, collaboration tools, operational systems, and other computing services within an organization, usually to the exclusion of access by outsiders. The term is used in c ...
, CCTV devices potentially becomes open to a wider audience including
hackers A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term ''hacker'' has become associated in popu ...
. Malicious actors can access private CCTV systems to disable, manipulate, or observe security measures– as well as gain further access to the private network it's connected to, often referred to colloquially as pivoting. This risk can be mitigated by securing the network via
Firewall Firewall may refer to: * Firewall (computing), a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts * Firewall (construction), a barrier inside a building, designed to limit the spre ...
rules designed to restrict access to the device, and by keeping software and
firmware In computing, firmware is a specific class of computer software that provides the low-level control for a device's specific hardware. Firmware, such as the BIOS of a personal computer, may contain basic functions of a device, and may provide h ...
up to date. In 2012, users of
4chan 4chan is an anonymous English-language imageboard website. Launched by Christopher "moot" Poole in October 2003, the site hosts boards dedicated to a wide variety of topics, from anime and manga to video games, cooking, weapons, television, ...
hacked into thousands of streaming personal IP cameras by exploiting a vulnerability in some models of
TRENDnet TRENDnet is a global manufacturer of computer networking products headquartered in Torrance, California, in the United States. It sells networking and surveillance products especially in the small to medium business (SMB) and home user market seg ...
home security cameras. In 2014, it was reported that a site indexed 73,011 locations worldwide with security cameras that used
default Default may refer to: Law * Default (law), the failure to do something required by law ** Default (finance), failure to satisfy the terms of a loan obligation or failure to pay back a loan ** Default judgment, a binding judgment in favor of ei ...
usernames and passwords, and were therefore, unprotected. Automated services like Shodan.io constantly scan residential and commercial IP blocks to automatically detect and catalog open ports and services, including those commonly used for IP cameras.


See also

* Closed-circuit television camera * Dashcam * Remote camera


References


External links

* {{DEFAULTSORT:Ip Camera Surveillance Internet Protocol Video Video surveillance 20th-century inventions Cloud storage Facial recognition software Privacy Hacking (computer security) Artificial intelligence Wireless Battery (electricity) Internet protocols