SlideShare a Scribd company logo
Theory of Bouguet’s MatLab Camera Calibration
               Toolbox: Stereo

                           Yuji Oyamada

                           1 HVRL,   University
       2 Chair   for Computer Aided Medical Procedure (CAMP)
                      Technische Universit¨t M¨nchen
                                          a   u


                           June 5, 2012
Variables                                                                Optimization



                                     Variables
       Assumption:
            • N cameras observing L key-points resulting M images for each
              sequence.
            • The cameras are fixed meaning relative positions among them
              are same through the sequence.
       Variables:
            • aj : Intrinsic parameters of j-th camera.
            • bij : Extrinsic parameters of i-th image of j-th camera.
            • xijk : k-th key-point of i-th image of j-th camera.
       where
            • j = 1, . . . , N
            • i = 1, . . . , M
            • k = 1, . . . , Lij
Variables                                                              Optimization



                                     Variables



       The set of extrinsic parameters {bij } has redundancy because the
       cameras are fixed.
       Introduce another variable r:
            • bi : Extrinsic parameters of i-th image of 1st camera.
            • rj : Extrinsic parameters of j-th camera w.r.t. 1st camera.
       Note that r1 is equivalent to identity matrix.
Variables                                                                                 Optimization



                                                Variables



       We have observation vector x and parameters vector p where

            x = (x111 , . . . , x11L11 , x1N1 , . . . , x1NL1N , . . . , xMN1 , . . . , xMNLMN )
              = (x11 , x1N , . . . , xMN , . . . , xMN )
            p = (a1 , . . . , aN , r2 , . . . , rN , b1 , . . . , bM )

       where xij = (xij1 , . . . , xijLij )
Variables                                                                              Optimization



                            Non-linear optimization


       Finds optimal parameters p as

                                                        M   N   Lij
              a r ˆ
            {{ˆj }{ˆj }{bi }} = arg       min                         vijk dist(ˆijk , xijk )2
                                                                                x
                                      {aj }{rj }{bi }
                                                        i=1 j=1 k=1

       where
            • ˆijk = Q(aj , bi ) denotes a reprojected point of xijk with
              x
              parameters aj and bi ,
            • a visibility term vijk = 1 iff k-th point is visible in i-th image
              observed by j-th camera.
Variables                                              Optimization



                    Normal equations



                         J Jδ = −J

       where
                    ∂ˆ
                     x       ∂ˆ ∂ˆ ∂ˆ
                              x x x
               J=      =                  = [ARB]
                    ∂p       ∂a ∂r ∂b
                    ∂ˆ
                     x         ∂ˆ
                                x         ∂ˆ
                                           x
               A=      ,R =       ,B =
                    ∂a         ∂r         ∂b
                     ∂ˆij
                       x           ∂ˆij
                                    x           ∂ˆij
                                                 x
               Aij =      , Rij =       , Bij =
                     ∂aj           ∂rj          ∂bi
Variables                                    Optimization



            Structure of Jacobian matrix J
Variables                                                              Optimization



                                   Sparse LM



            • LM is suitable for minimization w.r.t. a small number of
              parameters.
            • The central step of LM, solving the normal equations,
                • has complexity N 3 in the number of parameters and
                • is repeated many times.
            • The normal equation matrix has a certain sparse block
              structure.
Variables                                                              Optimization



                                      Sparse LM



            • Let p ∈ RM be the parameter vector that is able to be
                partitioned into parameter vectors as p = (a , b ) .
            • Given a measurement vector x ∈ RN
            • Let     x   be the covariance matrix for the measurement vector.
            • A general function f : RM → RN takes p to the estimated
                measurement vector ˆ = f (p).
                                   x
            •     denotes the difference x − ˆ between the measured and the
                                            x
                estimated vectors.
Variables                                                         Optimization



                                Sparse LM


       The set of equations Jδ =    solved as the central step in the LM
       has the form
                                          δa
                           Jδ = [A|B]            = .
                                          δb
                                         −1            −1
       Then, the normal equations J      x Jδ = J      x    to be solved
       at each step of LM are of the form
                    −1             −1                        −1
              A     x A   A        x B      δa         A     x
                    −1             −1             =          −1
              B     x A   B        x B
                                            δb         B     x
Variables                                                             Optimization



                                         Sparse LM

       Let
                             −1
            • U=A            x A
                              −1
            • W=A             x B
                             −1
            • V=B            x B
       and ·∗ denotes augmented matrix by λ.
       The normal equations are rewritten as

              U∗        W      δa         A
                                     =
              W         V∗     δb         B
                    ∗          ∗−1
                 U − WV              W    0    δa       A   − WV∗−1   B
             →                                      =
                     W                    V∗   δb              B

       This results in the elimination of the top right hand block.
Variables                                                           Optimization



                                  Sparse LM


       The top half of this set of equations is


                    (U∗ − WV∗−1 W )δa =           A   − WV∗−1   B



       Subsequently, the value of δa may be found by back-substitution,
       giving

                               V ∗ δb =   B   − W δa
Variables                                                       Optimization



                                Sparse LM

       p = (a , b ) , where a = (fc , cc , alpha c , kc ) and
       b = ({omc i Tc i })
       The Jacobian matrix is
                              ∂ˆ
                               x   ∂ˆ ∂ˆ
                                    x x
                         J=      =   ,   = [A, B]
                              ∂p   ∂a ∂b

       where
        ∂ˆ
         x   ∂ˆ ∂ˆ
               x    x       ∂ˆ
                             x       ∂ˆ
                                      x
           =     ,      ,         ,
        ∂a   ∂fc ∂cc ∂alpha c ∂kc
        ∂ˆ
         x      ∂ˆx       ∂ˆ
                           x            ∂ˆ
                                         x    ∂ˆ
                                               x           ∂ˆ
                                                            x     ∂ˆ
                                                                   x
           =          ,        ,··· ,              ··· ,
        ∂b   ∂omc 1 ∂Tc 1             ∂omc i ∂Tc i       ∂omc N ∂Tc N
Variables                                                          Optimization



                                Sparse LM


       The normal equation is rewritten as

                A                   A
                    A B + λI ∆p = −                x
                B                   B
                 N       N
                                     
                    Ai Ai           Ai Bi      
                                             + λI ∆p = − A   x
                                               
                  i=1
             →  N             i=1
                                 N                         B   x
                                               
                      Bi Ai           Bi Bi
                                               
                    i=1         i=1
Variables                                                                    Optimization



                                   Sparse LM



                    N
                                                                             
                         A i Ai   A1 B1 · · ·      Ai Bi   ···      AN BN 
                                                                          
                   i=1                                                    
                
                    B1 A1         B1 B1                                   
                                                                           
            J J=
                      .
                       .                   ..                              
                      .                        .                          
                                                                           
                
                    Bi Ai                          Bi Bi                  
                                                                           
                      .
                       .                                    ..             
                      .                                         .         
                     BN AN                                           BN BN
Variables                                       Optimization



                Sparse LM



                         N
                                           
                              Ai       x   
                                           
                        i=1                
                     
                         B1        x
                                            
                                            
            J       =
                           .
                            .
                                            
                x           .               
                                           
                     
                         Bi        x
                                            
                                            
                              .
                               .
                                            
                              .            
                          BN        x
Variables                                                     Optimization



                               Sparse LM


       When each image has different number of corresponding points
       (Mi = Mj , if i = j), each Ai and Bi have different size as
Variables                                                        Optimization



                                Sparse LM


       However, the difference does not matter because

                               A A ∈ Rdint ×dint
                               A B ∈ Rdint ×dex
                               B A ∈ Rdex ×dint
                               B B ∈ Rdex ×dex

       where dint denotes dimension of intrinsic params and dex denotes
       dimension of extrinsic params.

More Related Content

What's hot

Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...
Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...
Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...
BMS Institute of Technology and Management
 
Camera parameters
Camera parametersCamera parameters
Camera parameters
TheYacine
 
Object detection technique using bounding box algorithm for
Object detection technique using bounding box algorithm forObject detection technique using bounding box algorithm for
Object detection technique using bounding box algorithm for
VESIT,Chembur,Mumbai
 
Camera calibration technique
Camera calibration techniqueCamera calibration technique
Camera calibration technique
Krzysztof Wegner
 
Digital Image Processing Fundamental
Digital Image Processing FundamentalDigital Image Processing Fundamental
Digital Image Processing Fundamental
Thuong Nguyen Canh
 
Review : PolarMask: Single Shot Instance Segmentation with Polar Representati...
Review : PolarMask: Single Shot Instance Segmentation with Polar Representati...Review : PolarMask: Single Shot Instance Segmentation with Polar Representati...
Review : PolarMask: Single Shot Instance Segmentation with Polar Representati...
Dongmin Choi
 
Heuristic search
Heuristic searchHeuristic search
Heuristic search
Soheil Khodayari
 
2018.02 intro to visual odometry
2018.02 intro to visual odometry2018.02 intro to visual odometry
2018.02 intro to visual odometry
BrianHoltPhD
 
Chapter 9 morphological image processing
Chapter 9   morphological image processingChapter 9   morphological image processing
Chapter 9 morphological image processing
Ahmed Daoud
 
Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)
VARUN KUMAR
 
Video Transformers.pptx
Video Transformers.pptxVideo Transformers.pptx
Video Transformers.pptx
Sangmin Woo
 
Data Closed Loop in Simulation Test of Autonomous Driving
Data Closed Loop in Simulation Test of Autonomous DrivingData Closed Loop in Simulation Test of Autonomous Driving
Data Closed Loop in Simulation Test of Autonomous Driving
Yu Huang
 
标量量化
标量量化标量量化
标量量化
wtyru1989
 
PR-393: ResLT: Residual Learning for Long-tailed Recognition
PR-393: ResLT: Residual Learning for Long-tailed RecognitionPR-393: ResLT: Residual Learning for Long-tailed Recognition
PR-393: ResLT: Residual Learning for Long-tailed Recognition
Sunghoon Joo
 
カラーチャートを用いた複数の再撮モニタ とカメラの最適色補正論文
カラーチャートを用いた複数の再撮モニタ とカメラの最適色補正論文カラーチャートを用いた複数の再撮モニタ とカメラの最適色補正論文
カラーチャートを用いた複数の再撮モニタ とカメラの最適色補正論文doboncho
 
Self-supervised Learning from Video Sequences - Xavier Giro - UPC Barcelona 2019
Self-supervised Learning from Video Sequences - Xavier Giro - UPC Barcelona 2019Self-supervised Learning from Video Sequences - Xavier Giro - UPC Barcelona 2019
Self-supervised Learning from Video Sequences - Xavier Giro - UPC Barcelona 2019
Universitat Politècnica de Catalunya
 
Machine learning of structured outputs
Machine learning of structured outputsMachine learning of structured outputs
Machine learning of structured outputszukun
 
A Comparative Study of Histogram Equalization Based Image Enhancement Techniq...
A Comparative Study of Histogram Equalization Based Image Enhancement Techniq...A Comparative Study of Histogram Equalization Based Image Enhancement Techniq...
A Comparative Study of Histogram Equalization Based Image Enhancement Techniq...
Shahbaz Alam
 
Predictive uncertainty of deep models and its applications
Predictive uncertainty of deep models and its applicationsPredictive uncertainty of deep models and its applications
Predictive uncertainty of deep models and its applications
NAVER Engineering
 
Hu moments
Hu momentsHu moments
Hu moments
Shahid Rajaee
 

What's hot (20)

Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...
Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...
Ph.D Dissertation Defense Slides on Efficient VLSI Architectures for Image En...
 
Camera parameters
Camera parametersCamera parameters
Camera parameters
 
Object detection technique using bounding box algorithm for
Object detection technique using bounding box algorithm forObject detection technique using bounding box algorithm for
Object detection technique using bounding box algorithm for
 
Camera calibration technique
Camera calibration techniqueCamera calibration technique
Camera calibration technique
 
Digital Image Processing Fundamental
Digital Image Processing FundamentalDigital Image Processing Fundamental
Digital Image Processing Fundamental
 
Review : PolarMask: Single Shot Instance Segmentation with Polar Representati...
Review : PolarMask: Single Shot Instance Segmentation with Polar Representati...Review : PolarMask: Single Shot Instance Segmentation with Polar Representati...
Review : PolarMask: Single Shot Instance Segmentation with Polar Representati...
 
Heuristic search
Heuristic searchHeuristic search
Heuristic search
 
2018.02 intro to visual odometry
2018.02 intro to visual odometry2018.02 intro to visual odometry
2018.02 intro to visual odometry
 
Chapter 9 morphological image processing
Chapter 9   morphological image processingChapter 9   morphological image processing
Chapter 9 morphological image processing
 
Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)Image Restoration (Digital Image Processing)
Image Restoration (Digital Image Processing)
 
Video Transformers.pptx
Video Transformers.pptxVideo Transformers.pptx
Video Transformers.pptx
 
Data Closed Loop in Simulation Test of Autonomous Driving
Data Closed Loop in Simulation Test of Autonomous DrivingData Closed Loop in Simulation Test of Autonomous Driving
Data Closed Loop in Simulation Test of Autonomous Driving
 
标量量化
标量量化标量量化
标量量化
 
PR-393: ResLT: Residual Learning for Long-tailed Recognition
PR-393: ResLT: Residual Learning for Long-tailed RecognitionPR-393: ResLT: Residual Learning for Long-tailed Recognition
PR-393: ResLT: Residual Learning for Long-tailed Recognition
 
カラーチャートを用いた複数の再撮モニタ とカメラの最適色補正論文
カラーチャートを用いた複数の再撮モニタ とカメラの最適色補正論文カラーチャートを用いた複数の再撮モニタ とカメラの最適色補正論文
カラーチャートを用いた複数の再撮モニタ とカメラの最適色補正論文
 
Self-supervised Learning from Video Sequences - Xavier Giro - UPC Barcelona 2019
Self-supervised Learning from Video Sequences - Xavier Giro - UPC Barcelona 2019Self-supervised Learning from Video Sequences - Xavier Giro - UPC Barcelona 2019
Self-supervised Learning from Video Sequences - Xavier Giro - UPC Barcelona 2019
 
Machine learning of structured outputs
Machine learning of structured outputsMachine learning of structured outputs
Machine learning of structured outputs
 
A Comparative Study of Histogram Equalization Based Image Enhancement Techniq...
A Comparative Study of Histogram Equalization Based Image Enhancement Techniq...A Comparative Study of Histogram Equalization Based Image Enhancement Techniq...
A Comparative Study of Histogram Equalization Based Image Enhancement Techniq...
 
Predictive uncertainty of deep models and its applications
Predictive uncertainty of deep models and its applicationsPredictive uncertainty of deep models and its applications
Predictive uncertainty of deep models and its applications
 
Hu moments
Hu momentsHu moments
Hu moments
 

Viewers also liked

11 industrialisasi dan perkembangan sektor industri
11 industrialisasi dan perkembangan sektor industri11 industrialisasi dan perkembangan sektor industri
11 industrialisasi dan perkembangan sektor industri
firman sahari
 
Пушкин в рисунках В. Е. Маковского = Pushkin in Figures Vladimir Makovsky
Пушкин в рисунках В. Е. Маковского = Pushkin in Figures Vladimir MakovskyПушкин в рисунках В. Е. Маковского = Pushkin in Figures Vladimir Makovsky
Пушкин в рисунках В. Е. Маковского = Pushkin in Figures Vladimir Makovsky
Зональная научная библиотека имени В. А. Артисевич
 
ΠΑΙΔΙ: ΔΙΑΤΡΟΦΗ ΚΑΙ ΦΡΟΝΤΙΔΑ
ΠΑΙΔΙ: ΔΙΑΤΡΟΦΗ ΚΑΙ ΦΡΟΝΤΙΔΑΠΑΙΔΙ: ΔΙΑΤΡΟΦΗ ΚΑΙ ΦΡΟΝΤΙΔΑ
ΠΑΙΔΙ: ΔΙΑΤΡΟΦΗ ΚΑΙ ΦΡΟΝΤΙΔΑ
Direction Business Network
 
Greektown
GreektownGreektown
Greektown
Vaishal Kaila
 
Рождённые Отечественной...
Рождённые Отечественной...Рождённые Отечественной...
Рождённые Отечественной...
Natali Ivanova
 
2007-02-14 - Microsoft Executive Circle - Mobile Security
2007-02-14 - Microsoft Executive Circle - Mobile Security2007-02-14 - Microsoft Executive Circle - Mobile Security
2007-02-14 - Microsoft Executive Circle - Mobile Security
Jaap van Ekris
 
Industrialisasi
IndustrialisasiIndustrialisasi
Industrialisasi
Muhammad Geraldi
 
El aprendizaje psicologia
El aprendizaje psicologia El aprendizaje psicologia
El aprendizaje psicologia
Gabriela Velasco
 
наследството на древните траки
наследството на древните тракинаследството на древните траки
наследството на древните траки
Milena Petkova
 

Viewers also liked (13)

Future
FutureFuture
Future
 
11 industrialisasi dan perkembangan sektor industri
11 industrialisasi dan perkembangan sektor industri11 industrialisasi dan perkembangan sektor industri
11 industrialisasi dan perkembangan sektor industri
 
Пушкин в рисунках В. Е. Маковского = Pushkin in Figures Vladimir Makovsky
Пушкин в рисунках В. Е. Маковского = Pushkin in Figures Vladimir MakovskyПушкин в рисунках В. Е. Маковского = Pushkin in Figures Vladimir Makovsky
Пушкин в рисунках В. Е. Маковского = Pushkin in Figures Vladimir Makovsky
 
ΠΑΙΔΙ: ΔΙΑΤΡΟΦΗ ΚΑΙ ΦΡΟΝΤΙΔΑ
ΠΑΙΔΙ: ΔΙΑΤΡΟΦΗ ΚΑΙ ΦΡΟΝΤΙΔΑΠΑΙΔΙ: ΔΙΑΤΡΟΦΗ ΚΑΙ ΦΡΟΝΤΙΔΑ
ΠΑΙΔΙ: ΔΙΑΤΡΟΦΗ ΚΑΙ ΦΡΟΝΤΙΔΑ
 
Smsparking.001
Smsparking.001Smsparking.001
Smsparking.001
 
Greektown
GreektownGreektown
Greektown
 
Рождённые Отечественной...
Рождённые Отечественной...Рождённые Отечественной...
Рождённые Отечественной...
 
2007-02-14 - Microsoft Executive Circle - Mobile Security
2007-02-14 - Microsoft Executive Circle - Mobile Security2007-02-14 - Microsoft Executive Circle - Mobile Security
2007-02-14 - Microsoft Executive Circle - Mobile Security
 
Sharon.001
Sharon.001Sharon.001
Sharon.001
 
Industrialisasi
IndustrialisasiIndustrialisasi
Industrialisasi
 
El aprendizaje psicologia
El aprendizaje psicologia El aprendizaje psicologia
El aprendizaje psicologia
 
Kiribati
KiribatiKiribati
Kiribati
 
наследството на древните траки
наследството на древните тракинаследството на древните траки
наследството на древните траки
 

Similar to Bouguet's MatLab Camera Calibration Toolbox for Stereo Camera

Linearprog, Reading Materials for Operational Research
Linearprog, Reading Materials for Operational Research Linearprog, Reading Materials for Operational Research
Linearprog, Reading Materials for Operational Research
Derbew Tesfa
 
Higher-order Factorization Machines(第5回ステアラボ人工知能セミナー)
Higher-order Factorization Machines(第5回ステアラボ人工知能セミナー)Higher-order Factorization Machines(第5回ステアラボ人工知能セミナー)
Higher-order Factorization Machines(第5回ステアラボ人工知能セミナー)
STAIR Lab, Chiba Institute of Technology
 
M098 outcomes and assessment matrix
M098 outcomes and assessment matrixM098 outcomes and assessment matrix
M098 outcomes and assessment matrixchairsty
 
Simplex3
Simplex3Simplex3
Simplex3
Bhanu Sharma
 
Maths-->>Eigenvalues and eigenvectors
Maths-->>Eigenvalues and eigenvectorsMaths-->>Eigenvalues and eigenvectors
Maths-->>Eigenvalues and eigenvectors
Jaydev Kishnani
 
CBSE Class 12 Mathematics formulas
CBSE Class 12 Mathematics formulasCBSE Class 12 Mathematics formulas
CBSE Class 12 Mathematics formulas
Parth Kshirsagar
 
Kernel based models for geo- and environmental sciences- Alexei Pozdnoukhov –...
Kernel based models for geo- and environmental sciences- Alexei Pozdnoukhov –...Kernel based models for geo- and environmental sciences- Alexei Pozdnoukhov –...
Kernel based models for geo- and environmental sciences- Alexei Pozdnoukhov –...
Beniamino Murgante
 
Engg maths k notes(4)
Engg maths k notes(4)Engg maths k notes(4)
Engg maths k notes(4)
Ranjay Kumar
 
Deep learning book_chap_02
Deep learning book_chap_02Deep learning book_chap_02
Deep learning book_chap_02
HyeongGooKang
 
Rational Exponents
Rational ExponentsRational Exponents
Rational ExponentsPhil Saraspe
 
Algebric Functions.pdf
Algebric Functions.pdfAlgebric Functions.pdf
Algebric Functions.pdf
MamadArip
 
Advanced functions ppt (Chapter 1) part i
Advanced functions ppt (Chapter 1) part iAdvanced functions ppt (Chapter 1) part i
Advanced functions ppt (Chapter 1) part iTan Yuhang
 
Advanced functions part i
Advanced functions part iAdvanced functions part i
Advanced functions part iXin Wei
 
Notes 6-2
Notes 6-2Notes 6-2
Notes 6-2
Jimbo Lamb
 
Stochastic Approximation and Simulated Annealing
Stochastic Approximation and Simulated AnnealingStochastic Approximation and Simulated Annealing
Stochastic Approximation and Simulated Annealing
SSA KPI
 
Rank awarealgs small11
Rank awarealgs small11Rank awarealgs small11
Rank awarealgs small11Jules Esp
 
Rank awarealgs small11
Rank awarealgs small11Rank awarealgs small11
Rank awarealgs small11Jules Esp
 
4. Linear Algebra for Machine Learning: Eigenvalues, Eigenvectors and Diagona...
4. Linear Algebra for Machine Learning: Eigenvalues, Eigenvectors and Diagona...4. Linear Algebra for Machine Learning: Eigenvalues, Eigenvectors and Diagona...
4. Linear Algebra for Machine Learning: Eigenvalues, Eigenvectors and Diagona...
Ceni Babaoglu, PhD
 
Linear regression, costs & gradient descent
Linear regression, costs & gradient descentLinear regression, costs & gradient descent
Linear regression, costs & gradient descent
Revanth Kumar
 

Similar to Bouguet's MatLab Camera Calibration Toolbox for Stereo Camera (20)

Linearprog, Reading Materials for Operational Research
Linearprog, Reading Materials for Operational Research Linearprog, Reading Materials for Operational Research
Linearprog, Reading Materials for Operational Research
 
Higher-order Factorization Machines(第5回ステアラボ人工知能セミナー)
Higher-order Factorization Machines(第5回ステアラボ人工知能セミナー)Higher-order Factorization Machines(第5回ステアラボ人工知能セミナー)
Higher-order Factorization Machines(第5回ステアラボ人工知能セミナー)
 
M098 outcomes and assessment matrix
M098 outcomes and assessment matrixM098 outcomes and assessment matrix
M098 outcomes and assessment matrix
 
Simplex3
Simplex3Simplex3
Simplex3
 
Maths-->>Eigenvalues and eigenvectors
Maths-->>Eigenvalues and eigenvectorsMaths-->>Eigenvalues and eigenvectors
Maths-->>Eigenvalues and eigenvectors
 
CBSE Class 12 Mathematics formulas
CBSE Class 12 Mathematics formulasCBSE Class 12 Mathematics formulas
CBSE Class 12 Mathematics formulas
 
Functions
FunctionsFunctions
Functions
 
Kernel based models for geo- and environmental sciences- Alexei Pozdnoukhov –...
Kernel based models for geo- and environmental sciences- Alexei Pozdnoukhov –...Kernel based models for geo- and environmental sciences- Alexei Pozdnoukhov –...
Kernel based models for geo- and environmental sciences- Alexei Pozdnoukhov –...
 
Engg maths k notes(4)
Engg maths k notes(4)Engg maths k notes(4)
Engg maths k notes(4)
 
Deep learning book_chap_02
Deep learning book_chap_02Deep learning book_chap_02
Deep learning book_chap_02
 
Rational Exponents
Rational ExponentsRational Exponents
Rational Exponents
 
Algebric Functions.pdf
Algebric Functions.pdfAlgebric Functions.pdf
Algebric Functions.pdf
 
Advanced functions ppt (Chapter 1) part i
Advanced functions ppt (Chapter 1) part iAdvanced functions ppt (Chapter 1) part i
Advanced functions ppt (Chapter 1) part i
 
Advanced functions part i
Advanced functions part iAdvanced functions part i
Advanced functions part i
 
Notes 6-2
Notes 6-2Notes 6-2
Notes 6-2
 
Stochastic Approximation and Simulated Annealing
Stochastic Approximation and Simulated AnnealingStochastic Approximation and Simulated Annealing
Stochastic Approximation and Simulated Annealing
 
Rank awarealgs small11
Rank awarealgs small11Rank awarealgs small11
Rank awarealgs small11
 
Rank awarealgs small11
Rank awarealgs small11Rank awarealgs small11
Rank awarealgs small11
 
4. Linear Algebra for Machine Learning: Eigenvalues, Eigenvectors and Diagona...
4. Linear Algebra for Machine Learning: Eigenvalues, Eigenvectors and Diagona...4. Linear Algebra for Machine Learning: Eigenvalues, Eigenvectors and Diagona...
4. Linear Algebra for Machine Learning: Eigenvalues, Eigenvectors and Diagona...
 
Linear regression, costs & gradient descent
Linear regression, costs & gradient descentLinear regression, costs & gradient descent
Linear regression, costs & gradient descent
 

More from Yuji Oyamada

Vision Based Analysis on Trajectories of Notes Representing Ideas Toward Work...
Vision Based Analysis on Trajectories of Notes Representing Ideas Toward Work...Vision Based Analysis on Trajectories of Notes Representing Ideas Toward Work...
Vision Based Analysis on Trajectories of Notes Representing Ideas Toward Work...
Yuji Oyamada
 
Deep Convolutional 3D Object Classification from a Single Depth Image and Its...
Deep Convolutional 3D Object Classification from a Single Depth Image and Its...Deep Convolutional 3D Object Classification from a Single Depth Image and Its...
Deep Convolutional 3D Object Classification from a Single Depth Image and Its...
Yuji Oyamada
 
Single Camera Calibration Using Partially Visible Calibration Objects Based o...
Single Camera Calibration Using Partially Visible Calibration Objects Based o...Single Camera Calibration Using Partially Visible Calibration Objects Based o...
Single Camera Calibration Using Partially Visible Calibration Objects Based o...
Yuji Oyamada
 
鳥取Python勉強会 第7回
鳥取Python勉強会 第7回鳥取Python勉強会 第7回
鳥取Python勉強会 第7回
Yuji Oyamada
 
鳥取python勉強会 第1回
鳥取python勉強会 第1回鳥取python勉強会 第1回
鳥取python勉強会 第1回
Yuji Oyamada
 
鳥取python勉強会 第2回
鳥取python勉強会 第2回鳥取python勉強会 第2回
鳥取python勉強会 第2回
Yuji Oyamada
 
Eigen vector
Eigen vectorEigen vector
Eigen vector
Yuji Oyamada
 
Comparison Singular and Non-singular
Comparison Singular and Non-singularComparison Singular and Non-singular
Comparison Singular and Non-singular
Yuji Oyamada
 

More from Yuji Oyamada (8)

Vision Based Analysis on Trajectories of Notes Representing Ideas Toward Work...
Vision Based Analysis on Trajectories of Notes Representing Ideas Toward Work...Vision Based Analysis on Trajectories of Notes Representing Ideas Toward Work...
Vision Based Analysis on Trajectories of Notes Representing Ideas Toward Work...
 
Deep Convolutional 3D Object Classification from a Single Depth Image and Its...
Deep Convolutional 3D Object Classification from a Single Depth Image and Its...Deep Convolutional 3D Object Classification from a Single Depth Image and Its...
Deep Convolutional 3D Object Classification from a Single Depth Image and Its...
 
Single Camera Calibration Using Partially Visible Calibration Objects Based o...
Single Camera Calibration Using Partially Visible Calibration Objects Based o...Single Camera Calibration Using Partially Visible Calibration Objects Based o...
Single Camera Calibration Using Partially Visible Calibration Objects Based o...
 
鳥取Python勉強会 第7回
鳥取Python勉強会 第7回鳥取Python勉強会 第7回
鳥取Python勉強会 第7回
 
鳥取python勉強会 第1回
鳥取python勉強会 第1回鳥取python勉強会 第1回
鳥取python勉強会 第1回
 
鳥取python勉強会 第2回
鳥取python勉強会 第2回鳥取python勉強会 第2回
鳥取python勉強会 第2回
 
Eigen vector
Eigen vectorEigen vector
Eigen vector
 
Comparison Singular and Non-singular
Comparison Singular and Non-singularComparison Singular and Non-singular
Comparison Singular and Non-singular
 

Recently uploaded

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 

Recently uploaded (20)

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 

Bouguet's MatLab Camera Calibration Toolbox for Stereo Camera

  • 1. Theory of Bouguet’s MatLab Camera Calibration Toolbox: Stereo Yuji Oyamada 1 HVRL, University 2 Chair for Computer Aided Medical Procedure (CAMP) Technische Universit¨t M¨nchen a u June 5, 2012
  • 2. Variables Optimization Variables Assumption: • N cameras observing L key-points resulting M images for each sequence. • The cameras are fixed meaning relative positions among them are same through the sequence. Variables: • aj : Intrinsic parameters of j-th camera. • bij : Extrinsic parameters of i-th image of j-th camera. • xijk : k-th key-point of i-th image of j-th camera. where • j = 1, . . . , N • i = 1, . . . , M • k = 1, . . . , Lij
  • 3. Variables Optimization Variables The set of extrinsic parameters {bij } has redundancy because the cameras are fixed. Introduce another variable r: • bi : Extrinsic parameters of i-th image of 1st camera. • rj : Extrinsic parameters of j-th camera w.r.t. 1st camera. Note that r1 is equivalent to identity matrix.
  • 4. Variables Optimization Variables We have observation vector x and parameters vector p where x = (x111 , . . . , x11L11 , x1N1 , . . . , x1NL1N , . . . , xMN1 , . . . , xMNLMN ) = (x11 , x1N , . . . , xMN , . . . , xMN ) p = (a1 , . . . , aN , r2 , . . . , rN , b1 , . . . , bM ) where xij = (xij1 , . . . , xijLij )
  • 5. Variables Optimization Non-linear optimization Finds optimal parameters p as M N Lij a r ˆ {{ˆj }{ˆj }{bi }} = arg min vijk dist(ˆijk , xijk )2 x {aj }{rj }{bi } i=1 j=1 k=1 where • ˆijk = Q(aj , bi ) denotes a reprojected point of xijk with x parameters aj and bi , • a visibility term vijk = 1 iff k-th point is visible in i-th image observed by j-th camera.
  • 6. Variables Optimization Normal equations J Jδ = −J where ∂ˆ x ∂ˆ ∂ˆ ∂ˆ x x x J= = = [ARB] ∂p ∂a ∂r ∂b ∂ˆ x ∂ˆ x ∂ˆ x A= ,R = ,B = ∂a ∂r ∂b ∂ˆij x ∂ˆij x ∂ˆij x Aij = , Rij = , Bij = ∂aj ∂rj ∂bi
  • 7. Variables Optimization Structure of Jacobian matrix J
  • 8. Variables Optimization Sparse LM • LM is suitable for minimization w.r.t. a small number of parameters. • The central step of LM, solving the normal equations, • has complexity N 3 in the number of parameters and • is repeated many times. • The normal equation matrix has a certain sparse block structure.
  • 9. Variables Optimization Sparse LM • Let p ∈ RM be the parameter vector that is able to be partitioned into parameter vectors as p = (a , b ) . • Given a measurement vector x ∈ RN • Let x be the covariance matrix for the measurement vector. • A general function f : RM → RN takes p to the estimated measurement vector ˆ = f (p). x • denotes the difference x − ˆ between the measured and the x estimated vectors.
  • 10. Variables Optimization Sparse LM The set of equations Jδ = solved as the central step in the LM has the form δa Jδ = [A|B] = . δb −1 −1 Then, the normal equations J x Jδ = J x to be solved at each step of LM are of the form −1 −1 −1 A x A A x B δa A x −1 −1 = −1 B x A B x B δb B x
  • 11. Variables Optimization Sparse LM Let −1 • U=A x A −1 • W=A x B −1 • V=B x B and ·∗ denotes augmented matrix by λ. The normal equations are rewritten as U∗ W δa A = W V∗ δb B ∗ ∗−1 U − WV W 0 δa A − WV∗−1 B → = W V∗ δb B This results in the elimination of the top right hand block.
  • 12. Variables Optimization Sparse LM The top half of this set of equations is (U∗ − WV∗−1 W )δa = A − WV∗−1 B Subsequently, the value of δa may be found by back-substitution, giving V ∗ δb = B − W δa
  • 13. Variables Optimization Sparse LM p = (a , b ) , where a = (fc , cc , alpha c , kc ) and b = ({omc i Tc i }) The Jacobian matrix is ∂ˆ x ∂ˆ ∂ˆ x x J= = , = [A, B] ∂p ∂a ∂b where ∂ˆ x ∂ˆ ∂ˆ x x ∂ˆ x ∂ˆ x = , , , ∂a ∂fc ∂cc ∂alpha c ∂kc ∂ˆ x ∂ˆx ∂ˆ x ∂ˆ x ∂ˆ x ∂ˆ x ∂ˆ x = , ,··· , ··· , ∂b ∂omc 1 ∂Tc 1 ∂omc i ∂Tc i ∂omc N ∂Tc N
  • 14. Variables Optimization Sparse LM The normal equation is rewritten as A A A B + λI ∆p = − x B B  N N    Ai Ai Ai Bi    + λI ∆p = − A x    i=1 →  N i=1 N B x    Bi Ai Bi Bi    i=1 i=1
  • 15. Variables Optimization Sparse LM N    A i Ai A1 B1 · · · Ai Bi ··· AN BN     i=1    B1 A1 B1 B1   J J=  . . ..   . .     Bi Ai Bi Bi    . . ..   . .  BN AN BN BN
  • 16. Variables Optimization Sparse LM N    Ai x     i=1    B1 x   J =  . .  x .      Bi x    . .   .  BN x
  • 17. Variables Optimization Sparse LM When each image has different number of corresponding points (Mi = Mj , if i = j), each Ai and Bi have different size as
  • 18. Variables Optimization Sparse LM However, the difference does not matter because A A ∈ Rdint ×dint A B ∈ Rdint ×dex B A ∈ Rdex ×dint B B ∈ Rdex ×dex where dint denotes dimension of intrinsic params and dex denotes dimension of extrinsic params.