Hardware compression vs software compression

June 2005 Information Security

Since the beginning of digital CCTV there has been a division between the embedded and the PC-based systems. Both parties have valid arguments as to what qualities make theirs best.

One of the key differences between these systems is how they compress the images they capture. PC-based systems use software processes to compress the images captured. This is known as software compression (SWC). Embedded systems employ a process known as hardware compression (HWC). A PC-based (SWC) DVR consists of a PC motherboard, RAM and CPU, as well as a video capture card, or cards, which plug into one or more PCI slots on the motherboard. All of this equipment is known as hardware. The capture card has one or more chipsets on it responsible for capturing frames from each video signal connected to the card. The number of chips on the card will determine the speed of the card or how many frames per second in total the card can capture. So for example, a 16 channel capture card that captures 100 fps in total captures 6,25 fps per channel, or a 16-channel card capturing 400 fps in total captures 25 fps per channel. These images or frames are captured by hardware and then sent to the CPU where, using the appropriate algorithms in the software, these images are compressed and stored to the hard drive as a video file.

With hardware compression these images are captured and compressed entirely by the hardware. This process is not dependent on any software environment. Hardware compression has usually only been used by embedded DVRs. However, in the constant quest to keep improving and evolving their products, both PC-based capture card manufacturers and embedded manufacturers have been finding new ways to add features and stability to their products. For instance embedded systems have been introducing Linux embedded operating systems in order to add some of the flexibility of the PC-based systems. At the same time the PC-based systems have been chasing after the stability boasted of by the embedded system.

One of the problems that PC-based systems struggle with is 'CPU loading'. CPU loading is when the central processing unit (CPU) in the PC is over working. This is usually not a problem on systems that run a slower frame rate. However, with faster realtime systems where the processor has 400 images to compress every second, the CPU is running at near maximum capacity. Why is this a problem? Well for several reasons.

Firstly, not all frames are the same size, or they do not all require the same amount of work to process, which means the work load varies constantly irrespective of the type of compression codec being used. Also, the CPU needs to process things like GUI (graphic user interface) changes, as well as handle playback functions and other functions such as motion detection, network operation etc. With the CPU already near saturation point should the CPU suddenly receive several large frames successively or need to run several other processes simultaneously, it can quite easily be taken over saturation point.

This is not normally a problem in your normal everyday PCs because tasks simply just wait their turn for time with the CPU, but in a DVR it is a problem, a big problem! Frames cannot wait to be processed, because at 400 frames every second they start piling up pretty quickly and when that happens you get 'frame drops'. This means that frames are simply ignored and they are lost. Sometimes your natural eye cannot see this and so it goes unnoticed. But in severe cases the CPU simply says: 'I have had enough' and stops working altogether. That is what happens when the PC stops responding and hangs or crashes. This is a problem that embedded systems are not normally troubled by, but every PC-based system is, to some extent, affected by this.

Up to now no one has successfully merged hardware compression with the software environment of a PC. At Securex 2005, Sentient Technologies launched the arrival of SkyView DVRs in South Africa, boasting its top-of-the-range Hardware Compression DVR Capture Card. The SZT-MP4 is the perfect marriage of all of the strongest features of both embedded and PC-based DVRs, but at the same time eliminates the problems that have plagued so many other PC-based systems. And this is not all, because of its hardware compression it can record true 25 fps from each channel, up 32 channels of video and audio at 704 x 576 (PAL) resolution without losing one single frame. It is hardly surprising, that with its superb features SkyView has becomes Taiwan's top selling DVR and fast stealing the hearts of many SA clients.

Rodney Siems
Rodney Siems

For more information contact Rodney Siems, Sentient Technologies, 021 422 2960, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Managed security solutions for organisations of all sizes
Information Security News & Events
Cyber attackers have become significantly more sophisticated and determined, targeting businesses of all sizes. PwC’s Global Digital Trust Insights Survey 2025 Africa and South Africa highlights the urgent need for organisations to implement robust cyber risk mitigation strategies.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Check Point launches open, vendor-neutral MDR services
Information Security News & Events Products & Solutions
New Check Point MDR 360° and MXDR 360° offerings deliver 24/7 managed continuous threat monitoring protection across endpoints, cloud and network environments with built-in identity threat detection and 160+ integrations across hybrid, multi-vendor environments.

Read more...
Credential theft surges in South Africa
NEC XON Information Security
NEC XON issues a critical cybersecurity warning about the dual threat of massive credential theft and AI-powered cyberattacks sweeping across the region, with an increasing number of incidents and evolving threat tactics.

Read more...
Want effective Attack Surface Management? Think like an attacker.
Information Security
Effective ASM requires companies to think like attackers, anticipate risks, and act decisively to reduce exposure by knowing their environment, deploying a structured approach, leveraging capable tools, and addressing both internal and external risks.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
POPIA non-compliance puts municipalities at risk
Information Security Government and Parastatal (Industry)
Digital responsibility must go beyond POPIA compliance to recognising that privacy and service delivery are fundamentally linked. Despite this, only 51 out of 257 municipalities submitted their mandatory data protection and access to information reports in 2024.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.