Audio for Surveillance Systems Tutorial

Author: John Honovich, Published on Oct 05, 2011

One topic on which we regularly receive questions is the use of audio in surveillance systems, and what products and installation standards should be used.  In this update, we'll cover the basics of using audio with IP surveillance systems including:

  • How to Select a Microphone
  • How to Select a Speaker
  • The Pros and Cons of Built in Speakers
  • VMS Integration

[UPDATE: See our newer, in-depth Audio Surveillance Guide]

Audio Basics

Before connecting any audio source to a camera, first it is key to understand what types of inputs the camera can accept, and what these terms mean. Typically, audio inputs on cameras will accept either mic or line level signal. This, simply put, refers to the amount of voltage which the source device outputs. A microphone creates a very small amount of voltage when someone speaks into it, typically in the range of ten-thousandths of a volt. A line level signal, on the other hand, is approximately one volt. So, plugging a mic into a line level input will result in extremely faint audio, if any, and plugging a line level source into a mic input will result in loud, distorted audio. Some cameras may accept either, but require it to be manually switched to the proper level, either via dip switches or the web interface. Input and output levels can normally be found on the camera's spec sheet, as is shown on this spec sheet for the Panasonic WV-SF346 (page two, right column). Typically, line level sources are preferred, as microphones require more gain to amplify, and introduce more noise into the signal.

There are several types of outputs in the audio world, as well. For our purposes, we typically only need to know two: line level (covered above) and low-impedence (4- or 8-ohm). Most cameras will output line level only, which must then be connected to a powered speaker. That is, a speaker with a built-in amplifier, which must be powered separately. Some new products, such as the Axis P8221 I/O module also have low-impedence outputs, in Axis' case, a 4-ohm speaker output. This allows a speaker to be directly connected to the I/O module, with no external amplifier or power required, which makes cabling much simpler.

Selecting Microphones

When selecting a microphone, we must consider how the microphone will be used and where it will be mounted, which determines what pickup pattern is required. Microphones may be either directional or omnidirectional, depending on what is required. If mounting a microphone in the ceiling of an interview room, for example, we most likely would want to use an omnidirectional microphone. If mounting a microphone in a wallplate near an entry door, however, we could use a directional, hemispherical microphone, since it does not need to pick up audio in all directions.

Selecting Speakers

In selecting speakers, again, first consider what the speaker will be used for. Which will determine its size and power. If it's simply to talk to a visitor at the door, a few watts from a 3" or 4" speaker will be more than sufficent. If the speaker is to be used to alert subjects in a car dealership lot afterhours that they're under surveillance, a 15-30 watt horn is more appropriate, for better throw distance and volume. Manufacturers such as Bogen and Valcom are the largest distributors of powered speakers. Sony also recently released their own powered horn for use with surveillance systems, which accepts 24VAC power and line level input. This is useful since most powered systems require DC power supplies, while 24VAC is more likely to be used for surveillance.

Built-In Audio

Many manufacturers, such as Panasonic, ACTi, and Vivotek provide models with biult-in microphones. Cameras such as the Axis M1054 and Brickcom CB-100A cube cameras take it one step further, building a speaker into the camera. Built-in audio is, undoubtedly, the simplest way to add audio to the surveillance system, as no external connections are required. However, it lacks the same flexibility and choice of equipment of other cameras. Installing a camera with built-in audio may be a good choice for a secure vestibule, since it's a small, enclosed area. Relying on these microphones in an interview setting, however, may not provide the quality of audio needed or desired. Built-in audio is not really a common feature, with very few of the big names providing cameras with this functionality.

VMS Selection

Most of the major VMS players support bi-directional audio from IP cameras. However, this support may vary from manufacturer to manufacturer, and from model to model within a given manufacturer's line. Always verify the needed audio support is there before selecting cameras. Looking at Genetec's compatibility list, for example, we can see that some models don't support audio, some support audio in, and some support full bi-directional audio.

Some systems also allow a microphone or speaker attached to one camera to be associated with other cameras. This may be handy for an interview room equipped with multiple cameras, for example, allowing the full interview to be seen/heard on each of them. Associating a speaker with multiple cameras would allow an operator to alert intruders in a perimeter, for example, no matter which of the perimeter cameras he or she was viewing at the moment.

Normally, the VMS client supports this audio by adding a push-to-talk button associated with the camera. Pushing the button activates the speaker associated with the camera, and the operator is able to speak through a PC-connected microphone. Depending on setup, the microphone attached to the camera may be left open at all times, or triggered on event. Again, this varies based on the client software, and features may vary from manufacturer to manufacturer.

 

1 report cite this report:

Surveillance Camera Specification Guide on Aug 19, 2013
Anyone reviewing RFPs knows there are countless common problems, with 'good' specs seemingly few and far between: RFPs copied from more than 10...
Comments : PRO Members only. Login. or Join.

Related Reports

Burglar Alarm Sirens Guide on Mar 27, 2017
Sirens are used to alert users to an alarm condition. In this note, we examine how to choose, locate, and install alarm sirens, including Siren...
Axis Camera Vulnerabilities From Google Researcher Analyzed on Mar 23, 2017
A Google security researcher has reported 6 vulnerabilities for Axis cameras, affecting multiple models and firmware versions. In this report, we...
OpenEye Takes Aim At Exacq on Mar 23, 2017
First Milestone targeted Exacq with a takeover offer, and now OpenEye is gunning for them with an offer to swap out Exacq for their cloud-managed...
Glass Break Sensor Tutorial on Mar 21, 2017
Burglars often break glass windows to get into a house. Using glass break detectors in conjunction with alarm contacts is a good way to protect the...
VMS Update Automation Compared on Mar 20, 2017
Updating VMS software can be a tedious and time consuming processing, which historically has required users to access each machine, download update...
Alarm Panic Switches Tutorial on Mar 16, 2017
Panic switches allow silently triggering an alarm system when it is otherwise disarmed. In this tutorial we explain and contrast the 7 most common...
Environmental Sensors For Burglar Alarm Tutorials on Mar 15, 2017
Intrusion detection systems can be used to alert users to environmental issues. By connecting sensors that monitor the heat, humidity, and...
DMP Intrusion Tested (XR Series) on Mar 09, 2017
DMP is a major provider of intrusion systems, but lacks the global brand recognition of some of its rivals (such as Bosch, Honeywell, DSC, or...
SimpliSafe Camera Tested on Mar 07, 2017
SimpliSafe ia one of the most controversial companies in the industry, as they have become the symbol of the DIY threat to traditional alarm...
Alarm Contacts Tutorial on Mar 07, 2017
Contacts are the devices that tell an alarm panel when an entryway is open or closed. The act of opening or closing an entryway, such as a door or...

Most Recent Industry Reports

Chinese Government Spies on Churches With Video Surveillance on Mar 27, 2017
The Chinese government is using video surveillance to spy on churches in China, reports UCANews, explaining: The [Chinese government]...
Burglar Alarm Sirens Guide on Mar 27, 2017
Sirens are used to alert users to an alarm condition. In this note, we examine how to choose, locate, and install alarm sirens, including Siren...
Dahua Distributor Bad Breakup on Mar 27, 2017
A Dahua distributor in Europe claims that Dahua took over his top customers, revoked his distributorship status, and left him with a large amount...
Everbridge Mass Notification Service Examined on Mar 24, 2017
Everbridge is expanding in the security space. In January 2017 Everbridge acquired PSIM platform IDV, and have also begun integrating with other...
Hikvision Removing Auto 'Phone Home' on Mar 24, 2017
Facing pressure over their cameras auto phoning home and their Chinese government ownership, Hikvision has begun quietly removing automatic...
Axis Camera Vulnerabilities From Google Researcher Analyzed on Mar 23, 2017
A Google security researcher has reported 6 vulnerabilities for Axis cameras, affecting multiple models and firmware versions. In this report, we...
OpenEye Takes Aim At Exacq on Mar 23, 2017
First Milestone targeted Exacq with a takeover offer, and now OpenEye is gunning for them with an offer to swap out Exacq for their cloud-managed...
Lock Keyways For Access Control Guide on Mar 23, 2017
Lock keyways can be the difference between a lock working or not. Understanding keyways is important for access control. Indeed, a member recently...
Broken Browser Support for Video Surveillance on Mar 22, 2017
Modern web browsers have left the security industry behind. Current Chrome, Firefox, and Microsoft Edge browsers do not support NPAPI plugins,...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact