H.264 adapted for CCTV

CCTV Handbook 2011 Surveillance

Compression is not always compression. Geutebrück discusses H.264.

For the security industry, the major attraction of the H.264 standard is the prospect of high levels of compression and low storage costs. However, as a result of its multimedia heritage, the vast majority of H.264 implementations come with annoying drawbacks: inability to crawl backwards frame by frame, jerky images in fast forward and fast rewind, latencies and unnecessary costs. Although it is quite possible to produce an H.264 product without these negative side effects, very few have done it. One reason for this is that developing a video surveillance-friendly implementation involves a basic design rethink and some in-depth consideration of where and when, and what kind of data compression is necessary or desirable.

Like MPEG-2 and MPEG-4 before it, H.264 also uses differential compression. Whereas the earlier M-JPEG standard compresses each individual image in a video sequence independently from all other images, differential processes only consider the changes between one image and the previous and/or the following images. This approach does drastically reduce the amount of data that has to be stored, but it means that for successful decoding, all the frames used for compression are also needed for decompression, ie, the whole P-chain or group of pictures (GoP) beginning with the independent I-frame. If this GoP is not available in its entirety then compression errors or artifacts are produced, and if the chains are long, gaps of several seconds can result.

The drawbacks of P-chains

In video surveillance, it is useful to be able to discard individual pictures from a sequence. Time lapse recording for instance uses selective discarding to save much more storage space than any compression process can. Yet with most H.264 implementations, time-lapse recording is simply not possible. In addition, there are many monitoring situations where smooth live video is required for display, but one frame per second may be adequate for documentation purposes. With M-JPEG you can control live video and recording frame rates separately, but not with most H.264 products. Typical compromises get round this by either recording with a higher picture rate than necessary, or suffering a jerky live display with the same reduced picture rate as the recording. The paradoxical result of the first compromise is that despite using H.264, storage costs can be even greater than with M-JPEG.

Without the ability to discard frames video analysis may cost more. This is because the system load is minimised by matching the number of analysed frames per second with the speed of the observed event. Hence, for a wide-angle camera where only relatively slow movement occurs in the scene, a handful of pictures per second may suffice to capture all relevant information. But with P-chain restrictions in force, the analysis channel still has to process 25 pictures per second – and processing five times the data inevitably means higher costs.

Ease of use

In surveillance applications, ease of use is a major issue as it influences the effectiveness of the whole operation. Operators want to crawl forwards and backwards frame by frame, to run video forwards and backwards without losing track of the action, to view fully synchronised recordings from several cameras at once to analyse the same event from different angles. And most importantly, to experience no delay in camera reaction when sending its commands via the operator keyboard – a feature that most standardised H264 structure IP systems cannot achieve.

Yet P-chains here represent an annoying irritant at best and a security risk at worst, causing jumps during picture navigation and making video replay uncomfortable for users. Ironically, the overall effect of P-chains and the limitations they impose is to lead systems to be bigger than necessary in order to ensure that appropriately high picture rates, qualities and resolutions are available if there is an alarm. This is surely a wasteful approach.

Security-optimised H.264 structures

Yet, within the H.264 framework there are other ways of structuring the compression process which do not involve chains. For example, each P frame may be generated by only referring to the I frame. This structure allows individual P frames to be discarded without affecting the decompression of other images in the GoP, but it is seldom used because it reduces compression efficiency. Closer examination though shows that any disadvantage is more than offset by gains in flexibility and the ability to employ other video surveillance cost-reduction processes such as time-lapse recording, ‘fading long term memory’ as well as independent control of display and recording rates. And, free from the constriction of P-chains, this kind of encoder can generate new I-frames at will, thus enabling video characteristics to be changed instantly and surveillance process latencies to be eliminated. Although still a minority, products using this kind of structure do now exist.

For more information contact Geutebrück, +27(0)11 867 6585, [email protected], www.geutebruck.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Get the AI fundamentals right
Technews Publishing SMART Security Solutions Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...
SMART Surveillance Conference in Johannesburg
Arteco Global Africa Technews Publishing SMART Security Solutions Axis Communications SA neaMetrics Editor's Choice Surveillance Security Services & Risk Management Logistics (Industry) AI & Data Analytics
SMART Security Solutions hosted its annual SMART Surveillance Conference in Johannesburg in July, welcoming several guests, sponsors, and speakers for an informative and enjoyable day examining the evolution of the surveillance market.

Read more...
LiDAR protects railways from new and existing dangers
Surveillance
3D LiDAR (Light Detection and Ranging) sensors are being installed to monitor rail traffic and ensure safety of passengers as well as individuals walking near the tracks, or trying to perform dangerous stunts for social media.

Read more...
Securing South Africa’s logistics sector
Secutel Technologies Products & Solutions Surveillance Logistics (Industry)
Unlike traditional guarding services, Visual Verifier operates on an ‘Always On’ principle, ensuring continuous 24/7 coverage of warehouses, depots, transit hubs, and delivery points.

Read more...
Unlock the future of security operations in Bloemfontein
DeepAlert News & Events Surveillance
Security professionals and business leaders are invited to revolutionise their offsite monitoring operations at the DeepAlert Product Road Show, taking place on 16 – 17 September 2025, at the Schoemanspark Golf Club, Bloemfontein.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
Secure, modernise and optimise CCTV
Surveillance Products & Solutions
Industrial and commercial organisations are navigating complex digital transformation processes. With SecuVue, companies can bridge the gap between operational technology and information technology for safer, smarter operations.

Read more...
Eagle Eye Precision Person & Vehicle Detection
Surveillance Products & Solutions AI & Data Analytics
Eagle Eye’s new Precision Person & Vehicle Detection feature detects people and vehicles at long distances with high accuracy and is especially designed for customers who actively monitor for intruders

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.