Depth of Field Tutorial

Author: John Honovich, Published on Oct 19, 2012

Ignore depth of field concerns for 95%+ of surveillance applications, despite what you hear. While this is a common consideration in digital photography, its goals and logistics differ. In this note, we explain the drivers, why it is generally not a surveillance concern and the exceptional application where it is plus what can be done.

Photographers Often Prefer Shallow Fields of View

************* ***** **** ** ********* * ********** ******* ** *** field ** **** ***** *********** ******** *** *** **********. ** do ****, **** ****** *** ***** ** *****. **** * look ** *** ***** *****. * ************ ***** **** ****** prefer *** *** ** *** ***** ** **** **** ********** the *********:

photog depth

*******, ** ************, ** ** *** ********. *** ****** ****** want * **** **** ***** ** ***** ** **** *** do *** **** ******* **** ***** ***** ********* *** ***** investigations.

Drivers ** **** ***** ** *****

*** ****** * ******* ** ** *** ***** ** *** FoV *** ********* *** ***** ** ***** **** **. **** can ****** ****** ******* *** ******* ** ********** ***** ***** to *** ****** ** * **** **** ****. ****'* ** example **** ******** ************ *** ******* ** **** *****:

close to camera

****** ** * ****, ***** ** ***** ** **** *** at * ****, ** ** **** ******.

***, ****'* ** ******* ***** *** ******* ** *** ********** **** ** **** *** *** ******* ** *** ***** of *** ***:

far but tight

In ************, *** * ****** *****

**%+ ** **** ***** ************ ******** **:

  • **** ***** ***** (*.*., * - ***)
  • **** ******** * ** **** **** **** **** *** ******

******* ** ****, ******* ***** ** ***** ** ****** *** a ****** ***** *******. ****** ** ****** *** *** ** these ********** **** ** ****** ** ** **** *** *** cause *** ******** ** *** *****.

Calculate *** ********

***** ** ***** **** *** ** ********** **************. **** ** a ********* ** ***** ********** ** *********.

***** ** * ***** * ****** ***** ******* *** *** drivers *** *** ********** ** ******:

The ************ *********

*** **** ******, ****** ***** ********** *********, ** **** * surveillance ****** **** * **** **** ** ******* *** **** the ******. ***** ** ** ******* ******* **** * *** foot *******.

fuzzy far

** ********* *** ******* ***** ** ***** *****, ******** ****-**** ** ****** *** **** *******.

*******, *** ********* ********** **** ** ** ***:

  • *** * ****** **** **** ** ***** **** *** **** and **** ** ***** *****. ** **** **** **** *** automatically ****** *** **** ******* ******** ***** ** ***** ********.
  • ****** **** *** **** **** ** ***** **/* ** ******** you **** ******. ******* **** *** **** **** ****** ******** image ******* **** **** ******** *** *****.

*** ** ***, ** *** ***** ***** ***** ** ***** but ** *** **** * **** **** ***** ** ** an *****, ***** ********* ***** *** ********* *** ****** ********.

Test **** *********

**** **** * ******** **** ***

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Tutorials

Introducing Effective PPF (ePPF) - Improving Video Surveillance Designs on Jun 11, 2018
Pixel density (PPF / PPM) is the best metric the industry has to define and project video quality. It allows simple communication of estimated...
H.265 / HEVC Codec Tutorial on Jun 07, 2018
H.265 support has improved significantly in 2018, with H.265 camera/VMS compatibility increased compared to only a year ago, and more manufacturers...
Keypads For Access Control Tutorial on May 31, 2018
Keypad readers present huge risks to even the best access systems. If deployed improperly, keypads let people through locked doors almost as if...
Installing Box Cameras Indoors Tutorial on May 22, 2018
This tutorial starts our physical installation for video surveillance series, starting with Box Cameras, one of the oldest and most basic types....
Installing Cameras in Plenums Tutorial on May 15, 2018
There is often confusion about plenum ceilings, with misinformation about what is required when running cables through them and mounting cameras...
Access Visitor Management Systems Guide on May 11, 2018
"Who are you, and why are you here?" Facilities that implement Visitor Management Systems hope they never need to ask that question to anyone,...
Access Control Card Printers Guide on May 03, 2018
Card printers are a core component of professional access control systems, often used as photos IDs and prominently displayed. Modern badges put...
Access Control Levels and Schedules Tutorial on May 01, 2018
Configuring access levels and setting up schedules is central to maintaining facility security. Many people may need to enter areas but most do not...
Forced Door Alarms For Access Control Tutorial on Apr 04, 2018
One of the most important access control alarms is also often ignored. "Forced Door" provides a vital and even critical notification against...
Understanding The 20+ Lock Functions on Mar 27, 2018
While locks can look the same, they may operate in significantly different ways. To make understanding them simpler, widely adopted industry...

Most Recent Industry Reports

'Secure Channel' OSDP Access Control Examined on Jun 21, 2018
Despite claiming to be better than Wiegand, OSDP's initial releases did not address the lack of encryption between reader and controller, leaving...
Most Wanted Improvements In Manufacturer Technical Support (Statistics) on Jun 21, 2018
5 key areas of improvement and 1 clear wanted support feature were voiced by 140+ integrator responses to: What improvement in manufacturer...
Last Chance - Save $50 - July 2018 IP Networking Course on Jun 20, 2018
Today, Thursday the 21st is the last chance to save $50 on registration. Register now and save. This is the only networking course designed...
GDPR / ICO Complaint Filed Against IFSEC Show Facial Recognition on Jun 20, 2018
IPVM has filed a complaint against IFSEC’s parent company UBM based on our concern that the conference violates core GDPR principles on...
IFSEC Final Show Report on Jun 20, 2018
IPVM is live from London reporting on the IFSEC show. The Chinese have taken over the UK, centered on Hikvision, flanked by Dahua, Huawei and a...
Mobotix Releases 'Move' Into 21st Century on Jun 20, 2018
For years, Mobotix stood resolutely against, well, every other manufacturer, selling it as a virtue: MOBOTIX equipment is designed with no...
Cybersecurity Startup VDOO Disclosing 10 Manufacturer Vulnerabilities Starting With Axis And Foscam on Jun 20, 2018
Cybersecurity startup VDOO has uncovered significant vulnerabilities in Axis cameras along with many others not yet disclosed. In this report, we...
Axis Guardian - Cloud VMS And Alarm Monitoring - Released on Jun 19, 2018
Axis has struggled to deliver a cloud-based managed service video platform. Video service providers have utilized AVHS for over a decade, and have...
IPVM Vulnerability Scanner Released on Jun 18, 2018
IPVM is proud to announce video surveillance's first and only cybersecurity vulnerability scanner. This tool allows quickly and simply...
Hikvision Corrects False Cybersecurity Announcement on Jun 18, 2018
Hikvision has corrected a false cybersecurity announcement that claimed a British government-sponsored program endorsed the cybersecurity of...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact