Cookie Settings

We use our own and third-party cookies to analyze our services and show you advertising related to your preferences based on a profile developed from your browsing habits (e.g. pages visited). You can accept all these cookies by clicking on the ACCEPT button or configure them or refuse their use by clicking on the COOKIE CONFIGURATION section.

For more information, see the Cookies Policy and Cookie List of our website.

Your preferences






How to Build an AI-Powered Video Recorder

Xavier Oliva
Senior Key Account Manager, Lanaccess
Telecommunications Engineer
Lecturer, Pompeu Fabra University, Barcelona

20 October 2025

Share

Table of contents

Artificial intelligence has become a core component of modern video surveillance solutions.
While model training remains a resource-intensive, centralised process in data centres,
inference – the practical application of AI – needs to take place closer to the edge (in cameras
and video recorders) for reasons of connectivity, bandwidth and security.
This article outlines key hardware design principles, architectural decisions and use cases for
metadata exploitation, and concludes with a legal note on facial recognition.

From Cloud AI to Edge AI

In recent years, investment in data centres for generative AI and language models have
increased. It is important to distinguish between two phases:

  • Training: Creating and fine-tuning models; requires large computing clusters and is carried out centrally.
  • Inference: Operational use of AI to respond to new inputs; in video surveillance, it is optimal to execute it close to the data source.

Why Edge AI in CCTV?

  • Isolation: Many security systems operate without an internet connection.
  • Bandwidth: Video is data-intensive; sending raw streams to a data centre for
    inference is inefficient and costly.

Specific Features of CCTV Systems

Unlike other AI domains, video surveillance works with continuous video streams under
demanding conditions. This requires technological decisions based on reliability, efficiency
and cybersecurity from hardware design through to data exploitation.

Video Recorder Design Principles:

  • Energy Efficiency and Thermal Management: More power ≠ better if it
    compromises operating temperature. Proper sizing minimises overheating and
    facilitates heat dissipation.
  • Reliability and Lifespan: Avoid thermal bottlenecks and fragile mechanical
    components such as fans, which are frequent points of failure. In real-world
    environments (cabinets, vandal-proof enclosures, dusty or vibrating spaces), fans
    significantly reduce durability and increase failure rates.
  • Built-in Cybersecurity: If the system itself is a security device, it must be secure by
    design. It must be protected against cyberattacks and always available to respond to a
    security incident.

Real-world cases exist where clients encountered camera model changes introducing fans
without prior notice. Although seemingly minor, this can have serious consequences: in
installations with vandal-proof enclosures or confined spaces, ventilation is insufficient,
causing overheating and accelerating component wear, leading to premature failure.

Esquema videograbadores Lanaccess
Diagram illustrating the challenges faced by a video recorder in modern video surveillance

Where Should Intelligence Reside?

In Cameras: First Line

Wherever possible, algorithms should run directly in the camera itself: this is closest to the
video source and avoids unnecessary data transfer. Object detection, classification, attribute
generation, area entry or line crossing are examples of such analytics.

In Video Recorders: Second Line

The video recorder acts as an aggregator and reinforcement layer:

  • Management of alerts and metadata generated by the camera’s AI.

  • Combined storage of video and metadata to enable efficient searches.

  • Additional inference when algorithms not supported by the camera are required or when custom algorithms are needed for specific use cases. The AI processor can be more powerful than those in cameras, as recorders are usually installed in more protected environments.

Hardware Strategies for AI in Recorders

  • Single, high-performance CPU (main CPU also running AI): simple to integrate, but increases power consumption and heat, reducing reliability.
  • Dedicated AI coprocessor (additional NPU/GPU/ASIC): separates functions, activates as needed and allows capacity to scale without overloading the system. It can be integrated into the NVR or housed in an adjacent module working in tandem.

Separating the AI from the main CPU therefore reduces thermal risk and makes scaling by
project easier.

Xavier Oliva, AEINSE partner and KAM at Lanaccess, presenting at the III AEINSE Security Engineering Congress on the content of this article.

Exploitation: From Event to Insight

Operational Alerts

AI helps operators in the control room prioritise alerts such as intrusions, loitering,
abandoned objects or line crossings. The value lies in accuracy and minimising false alerts.

Efficient Searches with Metadata

AI generates structured metadata (object type: person/vehicle/bicycle/car, colour, attributes). Storing this alongside video allows near-instant searches without reanalysing
hours of footage. Examples:

  • “Red van between 10:00 and 11:00 at the north entrance.”
  • “Person with a backpack seen in the reception area today.”

Connectors to LLMs allow natural language queries when connectivity exists: “Show me all incidents involving bicycles this morning.”

Statistics and BI

Beyond security, metadata feeds business intelligence: footfall analysis, peak activity periods, object type distribution, seasonality… This informs decisions like increasing staff in
critical areas or redesigning access flows.

Legal Framework: Facial Recognition

Facial recognition raises legitimate concerns: mass surveillance versus utility in crime prevention, particularly in cases of terrorism or locating abducted persons. Under the current legislative framework, based on the EU AI Act and GDPR, operational deployment requires a specific national law that enables and regulates its use with appropriate safeguards. Until such a law exists, its use in real-time applications is practically prohibited.

For other AI applications in security, there is ongoing debate, with differences across European countries based on the interpretations of national data protection authorities.

Contact our team to learn how we can integrate artificial intelligence into your video
surveillance systems without changing your existing security infrastructure.