The Case for Deploying H.265 in Video Surveillance

SPONSORED

The Case for Deploying H.265 in Video Surveillance

As the security industry continues to embrace 4K, Ultra HD and other high-resolution imaging formats with high bitrates, recording and storing surveillance video has become one of the main challenges facing end users and systems integrators. Since typical video surveillance installation requires 24/7 recording and live viewing, the cost of moving potentially large amounts of data across a facility’s infrastructure, decoding high-resolution video and storing this data can significantly increase the cost of the entire surveillance system. The latest developments in video compression techniques can help solve this problem.

H.264 vs H.265 explained

H.265 (also known as High Efficiency Video Coding, or HEVC) is the latest in a long line of video compression standards. Like its predecessor, H.264, H.265 was initially developed for the broadcast industry by the ITU-T Video Coding Experts Group and the ISO/IEC Moving Pictures Experts Group.

However, as good as H.264 is for SD and HD resolutions, its ability to evolve to handle the demands of the latest high-resolution imaging formats, such as 4K, is limited since 4K stored in H.264 creates a proportionally larger file. H.265 expands on the efficiencies of the H.264 compression standard by generating the highest-quality images in the smallest video file possible.

H.265 essentially offers the same level of picture quality as H.264, but with a more efficient codec, so there's less data to manage. H.265 uses only half the bit rate of H.264. It significantly reduces bandwidth and storage requirements which effectively lowers infrastructure costs and ultimately makes high-resolution surveillance systems more affordable. Decoding H.265 streams requires more computational power when viewing. However, most VMS systems easily leverage GPU-accelerated decoding power available from off-the-shelf video cards to achieve the required performance at little to no extra cost. When recording H.265, the NVR simply sees a smaller file to be stored since no decoding is necessary until playback is required.

Does it make sense for everyone?

As with all new technologies, the optimal time to make the transition depends on the user’s situation and requirements. Here are some sensible recommendations to help installers and end users who are thinking about new systems, or considering upgrades, decide on the best path to H.265:

1. Completely new systems

If a new business, building or campus under construction needs a completely new system, push to specify a fully H.265 system. There is no reason to install a waning technology now when the advantages of the new system are so clear, and the time to install the appropriate infrastructure is during construction. Specifying the H.265 end point equipment (cameras and recorders) may cost more than H.264 equipment today, but the infrastructure savings should more than offset that difference over time.

2.  Upgrading an existing system

Next to a completely new installation, a full upgrade of an existing system is the largest possible project – and if the wiring needs to be replaced, the project can easily cost more than an entirely new system. It is critical to plan carefully, and work with an installer/integrator experienced with upgrade projects. If the entire system must be pulled and replaced, then follow the recommendation above, knowing that the new system will be an investment with a long-planned life. If the existing IP-wired infrastructure is in good condition, it is highly likely you can upgrade the endpoints to H.265-capable devices and gain all the benefits of the latest protocols with only a fraction of the cost of a new system.

3. Upgrading a part of a system, or adding a new section onto an existing system

To help end users gradually transition to H.265, it is best to choose cameras that employ a triple codec that enables simultaneous streaming of H.265, H.264 and MJPEG formats. Once a budget is available, the NVRs can be upgraded and the cameras can be set to operate using H.265. In a similar vein, a new extension of the system can be installed with H.265 capability (in a newly constructed wing, for example) but set to operate using the older protocol for a time to integrate into the existing system. A popular hybrid workflow for multi-stream capable cameras is to stream lower-res H.264 thumbnails in a live x by y grid view and simultaneously record a high-resolution H.265 stream. When an operator clicks on an image to enlarge, many VMS systems can automatically switch to the high-resolution H.265 stream for maximum clarity. This saves valuable compute resources when decoding multiple live images simultaneously.

Hanwha and H.265

Hanwha continues to set the standard for high performance surveillance technologies as one of the security industry’s first manufacturers to incorporate H.265 compression into its products. The company was one of the earliest adopters of the standard having recognized the ability of H.265 to further increase the value proposition for its leading lines of IP and megapixel cameras.

To help end users transition to H.265 technologies, Hanwha cameras employ a triple codec that enables simultaneous streaming of H.265, H.264 and MJPEG formats. With this, video can be recorded and viewed in different formats; it also facilitates integration with third-party systems that do not yet support H.265, allowing users to deploy the industry’s best cameras with migration to H.265 once VMS support is provided.

Additionally, by applying Hanwha’s WiseStream II compression technology codec to H.265 and H.264, users can benefit from significantly reduced bandwidth consumption and storage requirements. WiseStream can automatically and dynamically identify and generate high-quality images of areas of motion within a scene while applying greater compression to background areas. WiseStream can also dynamically adjust the I-Frame interval of video depending on the scene, motion present and network activity.

For example, the 4K WiseNet Premium Series supports WiseStream and H.265 coding technology to provide large images for video surveillance using the same data bandwidth as a 1080p full HD legacy system using H.264 coding.

Hanwha cameras currently featuring H.265 compression include the WiseNet P Series; the WiseNet Q Series; the SNV-8081R 5 Megapixel Vandal-Resistant Network IR Dome Camera; and the SNO-8081R 5 Megapixel IR Bullet Camera. Hanwha is incorporating H.265 compression into all of its IP megapixel camera introductions.

Hanwha also offers several H.265 NVRs which have been designed to enable users to gain maximum benefit from their investment in Wisenet cameras by taking advantage of the very latest network video recording technology.

Conclusion

There is value in having better quality images and fast frame rates but the related increases in bandwidth and storage requirements often make it difficult for organizations with limited budgets to take advantage of higher quality video deployments. H.265 represents another leap forward in video compression technology and offers the potential to reduce these costs and make 4K and other higher-resolution video formats more accessible for security applications.

With H.265, the professional security market will continue to develop and deploy more advanced high-resolution, high-performance cameras, and users will be able to send more video data over their existing infrastructure, or achieve the same information content with less infrastructure. The professional security market benefits from this important technical achievement.

About the Author

Paul Kong is the Technical Director for Hanwha Techwin America.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3