Cameras capable of recording video at 60 frames per second (fps) are becoming widely available in the security industry. It’s important to understand what 60-fps brings to the table for the security industry and how to leverage the technology for particular scenarios.

Capturing video at 60-fps represents a unique application. System integrators typically use much lower frame rates, ranging from 7- to up to 30-fps. The potential for an incident might only represent 1%, or less, of the time a camera is recording. However, when a significant event does occur, it’s better to record at a higher frame rate, because incidents such as a car accident, an altercation, or someone running away are usually only seconds long. Depending on the lighting environment, and the camera setup at that time, you either captured plenty of details or you didn’t.

Casino And Stadium Security

For example, in casinos, hands, money and chips move around quickly. If there’s a dispute, footage needs to be examined frame-by-frame at a resolution that provides exacting detail. For this reason, Las Vegas casinos require at least 30-fps for any cameras covering gaming action.

Another example is a stadium; if you have a lower frame rate of 10-fps, it might look good when all the seats are empty and there is very little motion. On game day, things can look different. If there is an altercation, at that frame rate, it becomes difficult to ascertain the actual sequence of events. The quality of what is captured in those brief moments is where 60-fps recording pays off with its increased resolution and crystal-clear image detail.

Las Vegas casinos require at least 30-fps for any cameras covering gaming action
Casino footage needs to be examined frame-by-frame at a resolution that provides exacting detail.

Can My Infrastructure Handle 60-fps?

Running multiple streams of 60-fps 24/7 will consume network resources and storage space at an exponential rate, which is difficult to justify for most organizations. For 60-fps recording to be practical, H.265 encoding and other compression techniques are necessary. With H.265, there is no requirement to upgrade a network infrastructure. H.265 does require a more capable workstation to decode, view and playback video, but most VMS systems utilize GPUs for decoding, so this is a non-issue for most installations.

The best way to reduce network and storage bandwidth is to teach the camera not to run at its maximum frame rate when there is no motion. The frame rate can drop to 5- to 4-fps if there is no motion or other activity, but as soon as there is a visual or audible trigger, the camera can dynamically switch to its highest frame rate. Having analytics in-camera makes this simple to setup and should be part of a camera’s profile.

Performance Vs. Frame Rate

A camera capable of 60-fps output is considered a high-performance camera. It might be more beneficial to put that performance to use enabling features other than pure 60-fps output. Cameras with the power to output 60-fps should also be able to process more data in parallel than regular cameras.

This means that a 60-fps camera could also be used to send out multiple streams at lower frame rates. You might decide on a 30-fps stream to the recorder, with a 15-fps profile feeding a live view, and another 15-fps stream going to a cellphone app. In this way, a 60-fps camera can offer tremendous flexibility in how its power and processing are used.

Always remember to tune cameras for nighttime use as well.
Shutter speeds are typically reduced at night to get more light onto a camera’s sensor

WDR (wide dynamic range) has the ability to combine multiple exposures into a single image to allow us to see in the shadows while not overexposing highlights. WDR can also halve your frame rate. A typical 30-fps sensor with WDR enabled has an effective frame rate of 15-fps for motion because of the duplicate frames being used for exposures. Starting with a 60-fps camera, customers can utilize WDR and still have an impressive 30-fps frame rate for an incredible quality image.

Optimising Equipment For Low-light Usage

Shutter speeds are typically reduced at night to get more light onto a camera’s CMOS sensor. The sensitivity of the sensor and the lens f-stop will come into play, but in general, if you force the camera to run at 60-fps at night, it’s going to produce a darker image than a 15-fps or 30-fps camera.

A camera set at 15-fps may also produce more of a ghosting effect on fast moving objects. Ultimately, it’s the customer’s individual use case that should dictate what is most important between luminance and clarity for moving objects.

A powerful 60-fps camera can deliver the best tradeoff between low-light performance and frame rate, giving end users the best possible solution available for their unique requirements. Many VMS solutions can tell cameras to switch profiles at certain times of the day to capture optimal images based on the environment and time of day.

Again, 60-fps cameras can offer the most flexibility across all scenarios. It’s important to remember that most cameras look good in daylight, and since 99% of installations happen in the daytime, always remember to tune cameras for nighttime use as well.

Download PDF version

Author Profile

In case you missed it

Drawbacks Of PenTests And Ethical Hacking For The Security Industry
Drawbacks Of PenTests And Ethical Hacking For The Security Industry

PenTesting, also known as “ethical hacking” or “white-hat hacking,” has always been viewed as the “sexy” side of cybersecurity, a task that is far more exciting than monitoring systems for intrusions, shoring up defenses, or performing compliance audits. Numerous security conferences are devoted to the fine art of attempting to hack into systems – with an owner’s full knowledge and permission – and reporting on the results. At an organizational level within businesses, they also value PenTesting under the premise that it allows them to identify security vulnerabilities before cyber criminals can. There are some regulatory requirements like PCI-DSS that require penetration assessments as part of their PCI compliance. However, many organizations have come to over-rely on PenTesting, thinking that if all the issues were identified in a PenTest, they’re good to go. Not only is this not helping them improve their security posture, it is also leaving them with a false sense of security. A penetration test is a simulated, live attack on your environment by a white-hat hacker What Is PenTesting? A penetration test is a simulated, live attack on your environment by a white-hat hacker, customized to address specific problem areas, such as web-based applications, mobile applications and infrastructure services like border VPNs and firewalls. The PenTest may include different types of attacks based on the requested scope from an organization so that the tester attempts to come at each system from all sides, the way a cyber-criminal would. The goal is to identify which systems and data the tester was able to access and how an organisation can address the vulnerabilities that allowed them to get in. The Limitations Of PenTesting There is great value in performing periodic PenTests, which is why PCI DSS and other security standards mandate them. However, PenTesting has three significant limitations: PenTesting does not provide solutions Let’s be honest: No one likes reading technical reports, but typically, that's the only deliverable provided by a PenTester. The value of a PenTesting report varies wildly based on the scope of the testing, the PenTester’s technical expertise and their writing ability. The tester may miss some things, or not clearly convey their findings. Additionally, a PenTest is a snapshot in time and the PenTester could miss changes in the systems, configurations, attack vectors and application environments. Even if your system “passes” a PenTest, will it crumble in the face of a brand new, more powerful attack vector that emerges a week later? The worst type of “PenTest report” consist of an analyst producing nothing more than the results of a vulnerability scan. Even if the PenTester produces a well-written, comprehensive report filled with valuable, actionable information, it’s up to your organization to take the action, which leads to the next limitation of PenTesting. The value of a PenTesting report varies wildly based on the scope of the testing, the PenTester’s technical expertise and their writing ability PenTesters only exploit vulnerabilities and do not promote change PenTesting does not highlight the missing links in your organisation's technology stack that could help you address your security vulnerabilities. This is often in the guise of being agnostic to the technologies that exist because their expertise is only offensive security – unless, of course, the performing company has “magic software” to sell you. PenTests also do not help to develop your organizational processes. Additionally, they do not ensure that your employees have the knowledge and training needed to treat the identified fixes. Worst of all, if your in-house expertise is limited, any security issues that are identified during a PenTest aren't validated, which leads to a misrepresentation of their magnitude and severity while giving your team a false sense of security. PenTesters are self-serving Too often, PenTesting pits the assessment team against the organization; the goal of the assessment team is to find the best way to "shame" the business into remediation, purchasing the testing company’s “magic software”, then call it a day. Once the PenTesters find, for example, a privilege escalation or a way to breach PII, they stop looking for other issues. The testers then celebrate the success of finding a single “flag”. In the meantime, the business is left in a precarious situation, since other unidentified issues may be lurking within their systems. Shifting The Paradigm Of PenTesting The goal of PenTesters is to find the best way to "shame" the business into purchasing the testing company’s “magic software”, then call it a day Penetration testing can uncover critical security vulnerabilities, but it also has significant limitations and it’s not a replacement for continuous security monitoring and testing. This is not to say that all PenTesting is bad. PenTesting should be integrated into a comprehensive threat and vulnerability management program so that identified issues are addressed. The purpose of a mature vulnerability management program is to identify, treat and monitor any identified vulnerabilities over its lifecycle. Vulnerability Management Program Additionally, a vulnerability management program requires the multiple teams within an organisation to develop and execute on the remediation plan to address the vulnerability. A mature threat and vulnerability management plan takes time and is helpful to partner with a managed security services provider (MSSP) to help you in the following areas: Improve your cyber-risk management program so that you can identify and efficiently address vulnerabilities in your infrastructure, applications and other parts within your organisation’s ecosystem on a continuous basis; Perform retests to validate any problems identified through a vulnerability scan or a PenTest assessment; Ensure that your in-house staff has the knowledge, skills and tools they need to respond to incidents. Cyber risk management and remediation is a "team sport." While periodic testing conducted by an external consultant satisfies compliance requirements, it is not a replacement for continuous in-house monitoring and testing. To ensure that your systems are secure, you must find a partner who not only performs PenTesting but also has the engineering and development experience to assist you in fixing these types of complex problems in a cost-effective manner and ensuring that your systems are hardened against tomorrow’s attacks.

Intelligent Video Surveillance And Deep Learning Dominate MIPS 2018 Agenda
Intelligent Video Surveillance And Deep Learning Dominate MIPS 2018 Agenda

Milestone Systems is embracing artificial intelligence and deep learning in a big way at this week's yearly Milestone Community Days (MIPS 2018) in Las Vegas. The Danish company's theme is "Creating an Intelligent World," and Milestone's stated goal is to make "the Milestone community part of every surveillance installation in the world."   Science Fiction Becomes Reality In a presentation on opening day, Milestone CSMO Kenneth Hune Petersen pointed to the 2002 movie The Minority Report as highlighting a variety of gadgets and systems that seemed futuristic at the time but are now perfectly possible, and in some cases outdated. Movies have previously highlighted gadgets and systems that were futuristic, but are now perfectly possible, or outdated "If we dare to dream together we can make this a better world," says Petersen. "Through AI and machine learning, we can help define tomorrow. There's no doubt about it: There is a massive business opportunity for us in artificial intelligence." Despite all the talk about artificial intelligence, only about 0.5 percent of all the data in the world has currently been analyzed or used, says Peterson. "Our open platform technology is the foundation for intelligent video systems and our partners have the expertise and infrastructure needed to reach the next frontier in intelligent video solutions," said Bjørn Skou Eilertsen, Milestone Systems CTO. "Together, we can provide unlimited solutions for our customers." Deeper Integration And Broader Coverage Expanding the Milestone community this year has included the addition of 1,000 new models of supported hardware devices; there are currently more than 7,000 models supported. Milestone is also pursuing broader coverage of installations through their partners, with deeper integration of functionality, and by deepening existing relationships with customers. ‘Creating an intelligent world’ includes deep learning and lots of video systems, says Milestone at their annual conference Under new agreements, hardware partners such as Dell EMC and BCDVideo now provide XProtect Essential+ software pre-loaded on servers they sell. The focus at MIPS 2018 on AI included a presentation by Tanmay Bakshi, the "world's youngest IBM coder" and TED Talk speaker, at 14 years old. The prodigy, who has been coding since the age of 4, has worked with IBM and other companies on a variety of AI-related projects. Using deep learning with video is currently limited because so much video is unlabelled and unstructured In his MIPS 2018 keynote speech, Bakshi traced the development of AI through high-profile events, such as IBM's development of the "Watson" computer, which successfully competed on Jeopardy!, and Google's development of AlphaGo, a program that successfully plays the complex ancient board game, Go. Data Demands Deep-Learning Bakshi focused on security and healthcare as two disciplines where deep learning can potentially have a big impact. Using deep learning with video is currently limited because so much video is unlabeled and unstructured. Still, projections are that there will be a billion cameras worldwide by 2020, providing an over-abundance of data that demands the use of deep learning to make sense of it all. "There is a misconception that AI is meant to replace us, to make humans obsolete. AI is not replacing us. It is created by humans to amplify human skills. AI can reduce information overload to enable humans to work with the data more efficiently," said Bakshi. He suggested that AI is equivalent to IA; Bakshi's abbreviation meaning "intelligence augmented." Johnmichael O’Hare (left) of the Hartford Police Department, and Tanmay Bakshi (right) discusses key security issues of the modern day The ability to scale AI applications using "distributed deep learning" and graphics processing unit (GPU) hardware is paving the way for greater use of deep learning in video applications. Adam Scraba, Global Business Development Lead at NVIDIA, outlined the trends that are making the current "Big Bang" of deep learning possible. He said it is "the most exciting time in tech history," with "software that can write its own software" now among the tools that make previously unsolvable problems now solvable. AI-driven intelligent video analytics can now achieve "super-human" results, he said. An Intelligent World To Combat Crime Instead of sitting for hours staking out a suspected drug dealer alone, entire investigations now take hours instead of days A success story about the game-changing capabilities of video data was supplied by Hartford, Conn.'s Capital City Crime Center (C4). The Hartford police department uses video data in a "predictive policing" approach. They have created an "intelligent world with smart policing to combat drug trafficking," according to C4 Supervisor Johnmichael O'Hare of the Hartford Police Department. Instead of sitting for hours staking out a suspected drug dealer, for example, video of a site can be analyzed to determine areas with higher levels of foot traffic that indicate drug buys. The result is investigations that take hours instead of days. Hartford incorporates several technologies, including ShotSpotter gunshot detection, Briefcam video synopsis and other systems, all tied together using the Milestone platform. More than 700 attendees make MIPS 2018 the largest such event ever, and exhibits by around 60 Milestone partner companies attest to the continuing expansion of the Milestone community. [Main image:Tanmay Bakshi (left) and Johnmichael O’Hare of the Hartford Police Department (right) discuss key security issues of the modern day]

Has The Gap Closed Between Security Fiction And Security Reality?
Has The Gap Closed Between Security Fiction And Security Reality?

Among its many uses and benefits, technology is a handy tool in the fantasy world of movie and television thrillers. We all know the scene: a vital plot point depends on having just the right super-duper gadget to locate a suspect or to get past a locked door. In movies and TV, face recognition is more a super power than a technical function. Video footage can be magically enhanced to provide a perfect image of a license plate number. We have all shaken our heads in disbelief, and yet, our industry’s technical capabilities are improving every day. Are we approaching a day when the “enhanced” view of technology in movies and TV is closer to the truth? We asked this week’s Expert Panel Roundtable: How much has the gap closed between the reality of security system capabilities and what you see on TV (or at the movies)?