Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

How to Select a Camera for your Industrial Application

October 15, 2008

There are several selection criteria that vision developers or users should keep in mind when selecting a camera for their vision system.


Field of View (FOV) and Resolution Requirements

The field of view (FOV) and the detail size that need to be resolved in the image will determine the sensor size and amount of pixels required. A simple calculation of the number of pixels necessary to resolve a defect of a known size will provide minimum number of pixels per mm which in turn multiplied by the longest dimension of the FOV will provide the required resolution. The sensor size depends on the FOV and the optics.


Image Quality

Against common perception, image quality goes far beyond resolution. Vision users have to consider advantages of CCD vs. CMOS based cameras and, especially in the case of high-end quantitative applications, specifications such as readout noise, dark noise, SNR and light sensitivity should play an important role in the selection process.


Frame Rate

Frame rate in conjunction with resolution and the number of bytes per pixel determine the amount of data that needs to be transferred and processed. For example, a camera with a 1280 x 1024 (SXGA) resolution at 30 frames per second (fps) and 8bits (or 1 Byte) per pixel will require

a data bandwidth of approximately 50MBytes/sec. This is below the PCI bus limit (~100MB/sec) and is within the capabilities of 1394.b or Gigabit Ethernet interfaces. Anything beyond 100MB/sec will require a frame grabberbased system with Camera Link® interface and PC with PCI Express® bus.



Interface Type

Beyond the frame rate and bandwidth requirements, data transfer reliability is an important factor in choosing a suitable camera interface type. Vision users that consider deterministic data transfer as their first priority prefer to use systems with analog or digital cameras connected to capture boards with on-board memory buffers that guarantee lossless image transfer. Among the non-frame grabber interfaces, IEEE-1394 through the IIDC standard offers excellent provisions for reliable isochronous image transfer with minimal CPU usage.

Another important factor that comes into play when choosing the interface is cost. Analog cameras on average cost less than digital cameras and are built utilizing a single, well-established interface. Typically, the more cameras that are required to perform a single vision task, a frame grabber-based solution becomes most cost effective. On the other hand, with systems using digital cameras, the advantages are features and performance: high resolution options, high frame rate capability and image quality. The cost of cabling cost is also becoming an advantage with non-frame grabber digital interfaces. Overall, the cost gap between these two technologies is rapidly closing.


Support and Software Drivers

Vision users should always look for a vendor that provides reliable drivers, a user friendly software developer kit (SDK) and good technical support. The software component of a vision system is increasingly becoming the most important factor in determining the amount of resources and time that will need to be invested. Simplifying this effort is a clear trend in today’s machine vision industry.


Form Factor and Reliability

Form factor is an obvious consideration. Regarding product reliability, with so many choices available today, vision users should seriously consider a manufacturer with solid reputation. After all, cameras are the “eyes” of their system and the last thing they need is to go “blind” in the middle of a critical task!

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cybersecurity

    How to select a cybersecurity framework to protect your greatest assets: People, property and data

    See More
  • software developer

    How to assess your organization’s application security

    See More
  • bodyguard-enews

    How to Select a Proficient Executive Protection Team

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing