Share Email Print
cover

Proceedings Paper

Summary of results on optimal camera placement for boundary monitoring
Author(s): Robert J. Holt; Hong Man; Rainer Martini; Iraban Mukherjee; Ravi Netravali; Jing Wang
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

We consider the problems of placing cameras so that every point on a perimeter, that is not necessarily planar, is covered by at least one camera while using the smallest number of cameras. This is accomplished by aligning the edges of the cameras' fields of view with points on the boundary under surveillance. Taken into consideration are visibility concerns, where features such as mountains must not be allowed to come between a camera and a boundary point that would otherwise be in the camera's field of view. We provide a general algorithm that determines optimal camera placements and orientations. Additionally, we consider double coverings, where every boundary point is seen by at least two cameras, with selected boundary points and cameras situated such that the average calibration errors between adjacent cameras is minimized. We describe an iterative algorithm that accomplishes these tasks. We also consider a joint optimization algorithm, which strikes a balance between minimizing calibration error and the number of cameras required to cover the boundary.

Paper Details

Date Published: 9 April 2007
PDF: 12 pages
Proc. SPIE 6570, Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007, 657005 (9 April 2007); doi: 10.1117/12.719139
Show Author Affiliations
Robert J. Holt, CUNY (United States)
Hong Man, Stevens Institute of Technology (United States)
Rainer Martini, Stevens Institute of Technology (United States)
Iraban Mukherjee, Stevens Institute of Technology (United States)
Ravi Netravali, Stevens Institute of Technology (United States)
Jing Wang, Stevens Institute of Technology (United States)


Published in SPIE Proceedings Vol. 6570:
Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2007
Belur V. Dasarathy, Editor(s)

© SPIE. Terms of Use
Back to Top