High quality lenses and developments in UD technology are already pushing low light development forward
A bright, high quality lens, a responsive high sensitivity sensor and great image
processing produce a good low light performance
 

If you’ve been to any surveillance trade show, or picked up an industry magazine in the past few years, you will have noticed that almost every camera manufacturer seems to be talking about low light. Some have specific, dedicated low light products with named technologies, while others claim low light capabilities across their whole product range. Either way, camera performance in low light is a focus for all manufacturers, including Canon.

The Challenges With Low Light Technology

In the days of analog cameras, there was a clear and understood method for judging low light performance but in the move to IP, something appears to have got lost in translation. Now, two cameras may be specified to offer color images at 0.5 lux at 50 IRE, but the images produced may be very different. As a result, there is confusion amongst installers and end users who are directly comparing camera performance on specification alone. At the same time, customers seem to be expecting a camera that can deliver exceptional low light performance and high resolution. It’s only when it comes to trying out their preferred solution in situ that they realize that it’s not possible to maximize these two capabilities in one camera.

Because of this confusion customers are losing trust in the market. But there is a simple fix. Installers and customers need to test products in their actual installation environment to find the best fit. Many manufacturers offer loan schemes where customers can test a camera before making a final decision to check that it is the best possible solution for them. We believe this is an absolute must.

Uses For Low Light Cameras

One example of a low light installation is the British Library. Due to the building’s architecture, the museum needed an effective monitoring system that would work in a low light environment. By selecting the Canon VB-H610D, the security team is able to capture an image and zoom in up to four times whilst still maintaining image detail. The Smart Shade Control (SSC) function helps to optimize exposure, improving highlights and correcting dark areas in backlit scenes. It also converts hard-to-see silhouettes into clearly identifiable objects.

The Library’s Magna Carta exhibition in particular benefits from Canon’s low light performance. As one of the most famous documents in the world, it has to be kept in an environment with carefully controlled lighting due to its age and fragility. This is a common problem with older texts and artefacts, making low light capabilities essential in museum and library environments for protecting valuable assets.


The British Library required an effective monitoring system for a low light environment
Due to the carefully controlled lighting of the Magna Carta exhibition in the
British Library, low light performance cameras were a must

The Technology Behind Great Low Light Performance

Great low light performance comes from a combination of using a bright, high quality lens, a responsive high sensitivity sensor and great image processing. Nevertheless whilst many companies may promote their image processing it really is almost impossible to have good low light performance without first having a good lens.

A lens with a wide aperture lets more light into the camera and on to the sensor. Cameras also need to use high quality lenses that use ultra-low dispersion (UD) glass. UD marks a huge step forward in lens technology, as it reduces color flaws, minimizes blurring at the edge of images and compensates for any astigmatism in the lens.

The sensors used are also important. Each sensor is made up of individual pixels, and for the best response or sensitivity, as much light as possible is needed to hit each pixel. Clearly the bigger the pixel the better the low-light performance of the sensor and hence the camera. However, the physical size of the sensor needs to be considered in the design and cost of the product, so in general a sensor with bigger pixels is a sensor with lower resolution.

The Future Of Low And Difficult Light Imaging

High quality lenses and developments in UD technology are already pushing low light development forward, but there’s still room for improvement. Sensor sensitivities will increase which will take low light performance to new levels – and we will see the high-resolution products of tomorrow delivering the low light performance we see from lower resolution cameras today.

At Canon we’re also working on delivering low light performance which is more “useable”. In zoom lenses, low light performance changes as the lens zooms in on an object, moving from its wide-angle to its telephoto position.

Canon has recently announced that it is developing a high-sensitivity network camera equipped with a fast high-magnification lens, capable of long-range image capture in ultra-low light conditions. While on paper the specifications will remain very similar to other models, the performance will be 8x as bright at distance.

The most important thing for installers and customers to remember is always to test to find the best solution. Specifications alone will not define the best network camera when it comes to low light performance. Technology in this area will continue to progress in leaps and bounds and I’m excited to see how low light performance will develop across the industry.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

Author profile

Julian Rutland European NVS Marketing Director, Canon Europe Ltd

In case you missed it

What Is The Impact Of Remote Working On Security?
What Is The Impact Of Remote Working On Security?

During the coronavirus lockdown, employees worked from home in record numbers. But the growing trend came with a new set of security challenges. We asked this week’s Expert Panel Roundtable: What is the impact of the transition to remote working/home offices on the security market?

Water Plant Attack Emphasizes Cyber’s Impact On Physical Security
Water Plant Attack Emphasizes Cyber’s Impact On Physical Security

At an Oldsmar, Fla., water treatment facility on Feb. 5, an operator watched a computer screen as someone remotely accessed the system monitoring the water supply and increased the amount of sodium hydroxide from 100 parts per million to 11,100 parts per million. The chemical, also known as lye, is used in small concentrations to control acidity in the water. In larger concentrations, the compound is poisonous – the same corrosive chemical used to eat away at clogged drains. The impact of cybersecurity attacks The incident is the latest example of how cybersecurity attacks can translate into real-world, physical security consequences – even deadly ones.Cybersecurity attacks on small municipal water systems have been a concern among security professionals for years. The computer system was set up to allow remote access only to authorized users. The source of the unauthorized access is unknown. However, the attacker was only in the system for 3 to 5 minutes, and an operator corrected the concentration back to 100 parts per million soon after. It would have taken a day or more for contaminated water to enter the system. In the end, the city’s water supply was not affected. There were other safeguards in place that would have prevented contaminated water from entering the city’s water supply, which serves around 15,000 residents. The remote access used for the attack was disabled pending an investigation by the FBI, Secret Service and Pinellas County Sheriff’s Office. On Feb. 2, a compilation of breached usernames and passwords, known as COMB for “Compilation of Many Breaches,” was leaked online. COMB contains 3.2 billion unique email/password pairs. It was later discovered that the breach included the credentials for the Oldsmar water plant. Water plant attacks feared for years Cybersecurity attacks on small municipal water systems have been a concern among security professionals for years. Florida’s Sen. Marco Rubio tweeted that the attempt to poison the water supply should be treated as a “matter of national security.” “The incident at the Oldsmar water treatment plant is a reminder that our nation’s critical infrastructure is continually at risk; not only from nation-state attackers, but also from malicious actors with unknown motives and goals,” comments Mieng Lim, VP of Product Management at Digital Defense Inc., a provider of vulnerability management and threat assessment solutions.The attack on Oldsmar’s water treatment system shows how critical national infrastructure is increasingly becoming a target for hackers as organizations bring systems online “Our dependency on critical infrastructure – power grids, utilities, water supplies, communications, financial services, emergency services, etc. – on a daily basis emphasizes the need to ensure the systems are defended against any adversary,” Mieng Lim adds. “Proactive security measures are crucial to safeguard critical infrastructure systems when perimeter defenses have been compromised or circumvented. We have to get back to the basics – re-evaluate and rebuild security protections from the ground up.” "This event reinforces the increasing need to authenticate not only users, but the devices and machine identities that are authorized to connect to an organization's network,” adds Chris Hickman, Chief Security Officer at digital identity security vendor Keyfactor. “If your only line of protection is user authentication, it will be compromised. It's not necessarily about who connects to the system, but what that user can access once they're inside. "If the network could have authenticated the validity of the device connecting to the network, the connection would have failed because hackers rarely have possession of authorized devices. This and other cases of hijacked user credentials can be limited or mitigated if devices are issued strong, crypto-derived, unique credentials like a digital certificate. In this case, it looks like the network had trust in the user credential but not in the validity of the device itself. Unfortunately, this kind of scenario is what can happen when zero trust is your end state, not your beginning point." “The attack on Oldsmar’s water treatment system shows how critical national infrastructure is increasingly becoming a target for hackers as organizations bring systems online for the first time as part of digital transformation projects,” says Gareth Williams, Vice President - Secure Communications & Information Systems, Thales UK. “While the move towards greater automation and connected switches and control systems brings unprecedented opportunities, it is not without risk, as anything that is brought online immediately becomes a target to be hacked.” Operational technology to mitigate attacks Williams advises organizations to approach Operational Technology as its own entity and put in place procedures that mitigate against the impact of an attack that could ultimately cost lives. This means understanding what is connected, who has access to it and what else might be at risk should that system be compromised, he says. “Once that is established, they can secure access through protocols like access management and fail-safe systems.”  “The cyberattack against the water supply in Oldsmar should come as a wakeup call,” says Saryu Nayyar, CEO, Gurucul.  “Cybersecurity professionals have been talking about infrastructure vulnerabilities for years, detailing the potential for attacks like this, and this is a near perfect example of what we have been warning about,” she says.  Although this attack was not successful, there is little doubt a skilled attacker could execute a similar infrastructure attack with more destructive results, says Nayyar. Organizations tasked with operating and protecting critical public infrastructure must assume the worst and take more serious measures to protect their environments, she advises. Fortunately, there were backup systems in place in Oldsmar. What could have been a tragedy instead became a cautionary tale. Both physical security and cybersecurity professionals should pay attention.

How Have Security Solutions Failed Our Schools?
How Have Security Solutions Failed Our Schools?

School shootings are a high-profile reminder of the need for the highest levels of security at our schools and education facilities. Increasingly, a remedy to boost the security at schools is to use more technology. However, no technology is a panacea, and ongoing violence and other threats at our schools suggest some level of failure. We asked this week’s Expert Panel Roundtable: How have security solutions failed our schools and what is the solution?