CN108629322A - Monitoring method, device and the computer readable storage medium of a suspect - Google Patents

Monitoring method, device and the computer readable storage medium of a suspect Download PDF

Info

Publication number
CN108629322A
CN108629322A CN201810449826.4A CN201810449826A CN108629322A CN 108629322 A CN108629322 A CN 108629322A CN 201810449826 A CN201810449826 A CN 201810449826A CN 108629322 A CN108629322 A CN 108629322A
Authority
CN
China
Prior art keywords
suspect
illegal activities
behavioral data
event trace
personnel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810449826.4A
Other languages
Chinese (zh)
Inventor
董慧
严斌峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201810449826.4A priority Critical patent/CN108629322A/en
Publication of CN108629322A publication Critical patent/CN108629322A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/40Scenes; Scene-specific elements in video content
    • G06V20/41Higher-level, semantic clustering, classification or understanding of video scenes, e.g. detection, labelling or Markovian modelling of sport events or news items
    • G06V20/42Higher-level, semantic clustering, classification or understanding of video scenes, e.g. detection, labelling or Markovian modelling of sport events or news items of sport video content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects
    • G06V20/53Recognition of crowd images, e.g. recognition of crowd congestion
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Computational Linguistics (AREA)
  • Software Systems (AREA)
  • Alarm Systems (AREA)

Abstract

The present invention provides a kind of monitoring method of a suspect, device and computer readable storage mediums.This method includes:Obtain the event trace behavioral data into a suspect of monitoring area;Event trace behavioral data and the characteristic in illegal activities feature database are compared, to judge whether event trace behavioral data includes illegal activities;If event trace behavioral data includes illegal activities, it is determined that the affiliated a suspect of the event trace behavioral data is lawbreaker.Whether it is that lawbreaker carries out automatic decision to a suspect according to event trace behavioral data, improves the efficiency of investigation lawbreaker, can find the illegal activities of a suspect in time.

Description

Monitoring method, device and the computer readable storage medium of a suspect
Technical field
The present embodiments relate to video and technical field of image processing more particularly to a kind of monitoring sides of a suspect Method, device and computer readable storage medium.
Background technology
In order to ensure the security of the lives and property of the people, at the train station, airport, subway station, square, supermarket, market etc. Densely populated region is all provided with security means, wherein video monitoring is current most common security means.
In existing video surveillance program, the method that manpower is investigated is used substantially to the monitoring of a suspect.It is existing Not only efficiency is low for the monitoring method of a suspect, but also time-consuming and laborious, and a staff stares at a lot of monitored pictures simultaneously It is investigated, it is understood that there may be can not find the defect of a suspect's illegal activities in time.
Invention content
The embodiment of the present invention provides a kind of monitoring method of a suspect, device and computer readable storage medium, solves The existing monitoring method inefficiency to a suspect, it is time-consuming and laborious, it can not find the skill of a suspect's illegal activities in time Art problem.
The embodiment of the present invention provides a kind of monitoring method of a suspect, including:
Obtain the event trace behavioral data into a suspect of monitoring area;
The event trace behavioral data is compared with the characteristic in illegal activities feature database, described in judgement Whether event trace behavioral data includes illegal activities;
If the event trace behavioral data includes illegal activities, it is determined that the affiliated of the event trace behavioral data can The personnel of doubting are lawbreaker.
Further, the affiliated a suspect of method as described above, the determination event trace behavioral data is separated After method personnel, further include:
Obtain image and the current location of the lawbreaker;
Generate primary alarm label;
The image of the lawbreaker, current location and primary alarm label are sent to the mobile end of Security Personnel End.
Further, method as described above, it is described to obtain the event trace behavior into a suspect of monitoring area Before data, further include:
Face characteristic extraction is carried out to the image of a suspect, to obtain the face characteristic value of a suspect.
The face characteristic value of a suspect and the facial image in current monitor video are compared in real time, judged With the presence or absence of the matched personnel of face characteristic value with a suspect in the current monitor video;
If there are the matched personnel of face characteristic value with a suspect in the current monitor video, two are generated Grade alarm tag;
Image, the current location of personnel will be matched in the current monitor video with the face characteristic value of a suspect And second-level alarm label is sent to the mobile terminal of the Security Personnel.
Further, method as described above, it is described to obtain the event trace behavior into a suspect of monitoring area Before data, further include:
Acquire the illegal activities data in a variety of densely populated public place video datas;
Feature extraction is carried out to the illegal activities data, to obtain illegal activities characteristic;
Illegal activities feature database is built according to the illegal activities characteristic.
The embodiment of the present invention provides a kind of monitoring device of a suspect, including:
Acquisition module, for obtaining the event trace behavioral data into a suspect of monitoring area;
Judgment module, for carrying out pair the characteristic in the event trace behavioral data and illegal activities feature database Than to judge whether the event trace behavioral data includes illegal activities;
Determining module, if including illegal activities for the event trace behavioral data, it is determined that the event trace row It is lawbreaker for the affiliated a suspect of data.
Further, device as described above further includes:Generation module and sending module;
The acquisition module is additionally operable to obtain image and the current location of the lawbreaker;
The generation module, for generating primary alarm label;
The sending module, for the image of the lawbreaker, current location and primary alarm label to be sent to The mobile terminal of Security Personnel.
Further, device as described above further includes:Characteristic extracting module;
The characteristic extracting module carries out face characteristic extraction, described in acquisition for the image to a suspect The face characteristic value of a suspect.
The judgment module is additionally operable to the face figure in the face characteristic value of a suspect and current monitor video As being compared in real time, judge in the current monitor video with the presence or absence of matched with the face characteristic value of a suspect Personnel;
The generation module, if being additionally operable to the face characteristic value for having with a suspect in the current monitor video Matched personnel then generate second-level alarm label;
The sending module is additionally operable to match with the face characteristic value of a suspect in the current monitor video Image, current location and the second-level alarm label of personnel are sent to the mobile terminal of the Security Personnel.
Further, device as described above further includes:Acquisition module and structure module;
The acquisition module, for acquiring the illegal activities data in a variety of densely populated public place video datas;
The characteristic extracting module is additionally operable to carry out feature extraction to the illegal activities data, to obtain illegal activities Characteristic;
The structure module, for building illegal activities feature database according to the illegal activities characteristic.
The embodiment of the present invention provides a kind of monitoring device of a suspect, including:
Memory, processor and computer program;
Wherein, the computer program is stored in the memory, and is configured as being executed with reality by the processor Existing method as described in any one of the above embodiments.
The embodiment of the present invention provides a kind of computer readable storage medium, is stored thereon with computer program, the calculating Machine program is executed by processor to realize method as described in any one of the above embodiments.
The embodiment of the present invention provides a kind of monitoring method of a suspect, device and computer readable storage medium, passes through Obtain the event trace behavioral data into a suspect of monitoring area;By event trace behavioral data and illegal activities feature Characteristic in library is compared, to judge whether event trace behavioral data includes illegal activities;If event trace behavior Data include illegal activities, it is determined that the affiliated a suspect of the event trace behavioral data is lawbreaker.According to activity Whether track behavioral data is that lawbreaker carries out automatic decision to a suspect, improves the efficiency of investigation lawbreaker, energy Enough illegal activities for finding a suspect in time.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair Some bright embodiments for those of ordinary skill in the art without having to pay creative labor, can be with Obtain other attached drawings according to these attached drawings.
Fig. 1 is the flow chart of the monitoring method embodiment one of a suspect of the present invention;
Fig. 2 is the flow chart of the monitoring method embodiment two of a suspect of the present invention;
Fig. 3 is the structural schematic diagram of the monitoring device embodiment one of a suspect of the present invention;
Fig. 4 is the structural schematic diagram of the monitoring device embodiment two of a suspect of the present invention.
Specific implementation mode
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art The every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
It should be appreciated that term "and/or" used herein is only a kind of incidence relation of description affiliated partner, indicate There may be three kinds of relationships, for example, A and/or B, can indicate:Individualism A, exists simultaneously A and B, individualism B these three Situation.In addition, character "/" herein, it is a kind of relationship of "or" to typically represent forward-backward correlation object.
Depending on context, word as used in this " if " can be construed to " ... when " or " when ... When " or " in response to determination " or " in response to detection ".Similarly, depend on context, phrase " if it is determined that " or " if detection (condition or event of statement) " can be construed to " when determining " or " in response to determination " or " when the detection (condition of statement Or event) when " or " in response to detection (condition or event of statement) ".
Fig. 1 is the flow chart of the monitoring method embodiment one of a suspect of the present invention, as shown in Figure 1, the present embodiment is held Row main body is the monitoring device of a suspect, and the monitoring device of a suspect can be integrated in computer, tablet device, service Device is calculated with independent in the equipment with processing capacity, and service is provided to the user with webpage or client.Then the present embodiment carries The monitoring method of a suspect of confession includes following steps.
Step 101, the event trace behavioral data into a suspect of monitoring area is obtained.
Wherein, a suspect is the personnel for making abnormal behaviour, and abnormal behaviour is that have very maximum probability that illegal criminal will occur The suspicious actions of crime.It will such as occur to steal or plunder the suspicious actions before breaking laws and commit crime.
In the present embodiment, a suspect is identified in advance, know method for distinguishing can be by the facial image of personnel with Image in a suspect's face database matches, and identifies a suspect.Or the recognition methods of a suspect is:It obtains The event trace behavioral data into each personnel of monitoring area is taken, by event trace behavioral data and abnormal behavior library In characteristic compared, with judge event trace behavioral data whether include abnormal behaviour data, if event trace row Include abnormal behaviour data for data, it is determined that the affiliated personnel of the event trace behavioral data are a suspect, the present embodiment In to identify a suspect method do not limit.
Specifically, in the present embodiment, multiple monitoring devices, monitoring device pair are installed in densely populated public place in advance Behavioral data into each personnel of monitoring area stores.After identifying a suspect, if a suspect enters prison Region is controlled, then obtains the behavioral data of each a suspect from multiple monitoring devices, and by the behavior number of same a suspect According to being spliced sequentially in time, the event trace behavioral data of each a suspect is formed.The activity of each a suspect Track behavioral data can indicate concrete behavior of each a suspect in each zone of action.
In the present embodiment, to the event trace behavioral data of certain a suspect illustrate for:Zhang is suspicious Personnel, 8 points into supermarket is entered in the morning, pushes shopping cart, Imported Milk area is gone to from fruit area, be then put into a tank milk powder It has arrived in handbag, and has gone to prepared food area, condiment area, 9 points are left from Non-Purchase Exit.
Step 102, event trace behavioral data and the characteristic in illegal activities feature database are compared, to judge Whether event trace behavioral data includes illegal activities.
In the present embodiment, illegal activities feature database is built in advance, is stored in illegal activities feature database a large amount of illegal The characteristic of behavior.Wherein, illegal activities are that delinquent behavior occurs.It such as steals, plunder or abducts and is illegal Criminal offence.
In the present embodiment, to the characteristic of super incity illegal activities by taking densely populated public place is supermarket as an example Illustrate for:Sky shopping cart is not originally whatever carried or push, stretches out one's hand catch to fill with an article suddenly Car rapidly leaves and arrearage;Deliberately crowded with people and unexpected handle stretches to others' pocket;It is put after article tag is torn Enter in packet rather than in shopping cart;Embrace by children by force suddenly etc..
It is understood that illegal activities characteristic can be added or correct according to actual conditions.
Step 103, if event trace behavioral data includes illegal activities, it is determined that the institute of the event trace behavioral data Category a suspect is lawbreaker.
It specifically, can be at interval of preset time period by event trace behavioral data and illegal activities feature in the present embodiment Whether the characteristic in library is compared, judge in event trace behavioral data to include illegal activities data, if event trace Behavioral data includes illegal activities data, it is determined that the affiliated personnel of the event trace behavioral data are lawbreaker, if living Do not include illegal activities data in dynamic rail mark behavioral data, then continues the event trace behavior number for obtaining next preset time period According to, and whether the event trace behavioral data is judged including illegal activities data again, until a suspect leaves The densely populated public place.
The monitoring method of a suspect provided in this embodiment enters the activity of a suspect of monitoring area by acquisition Track behavioral data;Event trace behavioral data and the characteristic in illegal activities feature database are compared, to judge to live Whether dynamic rail mark behavioral data includes illegal activities;If event trace behavioral data includes illegal activities, it is determined that the activity The affiliated a suspect of track behavioral data is lawbreaker.Whether it is illegal to a suspect according to event trace behavioral data Personnel carry out automatic decision, improve the efficiency of investigation lawbreaker, can find the illegal activities of a suspect in time.
Fig. 2 is the flow chart of the monitoring method embodiment two of a suspect of the present invention, as shown in Fig. 2, the present embodiment provides A suspect monitoring method, be on the basis of the monitoring method embodiment one of a suspect of the present invention, to step 101 Further refinement, and further comprise to by the image of a suspect, current location and second-level alarm mark in current monitor video The step of signing and issuing the mobile terminal for giving Security Personnel, and by the image of the lawbreaker in current monitor video, present bit It sets and the step of primary alarm label is sent to the mobile terminal of Security Personnel, then the monitoring of a suspect provided in this embodiment Method includes the following steps.
Step 201, the illegal activities data in a variety of densely populated public place video datas are acquired.
Wherein, densely populated public place includes at least:Railway station, airport, subway station, square, supermarket, market, may be used also To include other densely populated public places, this is not limited in the present embodiment.
Wherein, include the behavioral data of a large amount of personnel in the video data of acquisition, in the behavioral data of a large amount of personnel Extract illegal activities data.Wherein, illegal activities data include at least:Stealing data plunder behavioral data, abduct row For data, fraudulent buying and selling behavioral data, fraudulent act data.
Step 202, feature extraction is carried out to illegal activities data, to obtain illegal activities characteristic.
Specifically, in the present embodiment, feature extraction is carried out to illegal activities data using feature extraction algorithm, is disobeyed with obtaining Judicial act characteristic.
Wherein, in the present embodiment, the classification of the algorithm of feature extraction is not limited.
Step 203, illegal activities feature database is built according to illegal activities characteristic.
Illegal activities characteristic is stored and builds illegal activities feature database into database.Wherein, type of database It does not limit, such as can be MySQL database, oracle database etc..
It is understood that if illegal activities feature database has built completion, subsequently when the monitoring of progress a suspect not Step 201- steps 203 are executed again.
Step 204, face characteristic extraction is carried out to the image of a suspect, to obtain the face characteristic value of a suspect.
Further, in this embodiment carrying out face characteristic to the image of a suspect using face characteristic extraction algorithm Extraction, extracts the face characteristic value of a suspect.
Step 205, the face characteristic value of a suspect and the facial image in current monitor video are compared in real time.
Step 206, judge with the presence or absence of the matched personnel of face characteristic value with a suspect in current monitor video, if It is to then follow the steps 207, otherwise, executes step 205.
It is illustrated in conjunction with step 205- steps 206.Further, in this embodiment by by the face of a suspect Characteristic value in current monitor video facial image carry out real time contrast judge in current monitor video whether there is with it is suspicious The matched personnel of face characteristic value of personnel judge whether a suspect enters in a certain densely populated public place.If There are the matched personnel of face characteristic value with a suspect in current monitor video, then it is a certain to illustrate that a suspect has entered The monitoring area of densely populated public place, if there is no match with the face characteristic value of a suspect in current monitor video Personnel, then continue in real time to be compared the face characteristic value of a suspect and the facial image in current monitor video.
Step 207, second-level alarm label is generated.
Step 208, the face characteristic value with a suspect in current monitor video is matched to image, the current location of personnel And second-level alarm label is sent to the mobile terminal of Security Personnel.
It is illustrated in conjunction with step 207- steps 208.Further, in this embodiment if existing in current monitor video With the matched personnel of face characteristic value of a suspect, then generate second-level alarm label and by current monitor video with suspicious people Image, current location and the second-level alarm label of the face characteristic value matching personnel of member is sent to the mobile terminal of Security Personnel, So that Security Personnel knows that a suspect's wears figure and features and specific location by mobile terminal, which is started simultaneously Manpower monitors.
Wherein, second-level alarm label is while starting the label for carrying out manpower monitoring to a suspect.
Step 209, the event trace behavioral data into a suspect of monitoring area is obtained.
Further, in this embodiment obtaining the event trace behavioral data into a suspect of monitoring area, specifically Including:
First, acquisition enters the behavioral data of each a suspect of monitoring area.
Specifically, it due to being provided with multiple monitoring devices in densely populated public place, is corresponded to from multiple monitoring devices Storage region acquisition enter monitoring area each a suspect behavioral data.
Then, the behavioral data of same a suspect is spliced sequentially in time based on face recognition technology, shape At the event trace behavioral data of each a suspect.
Specifically, all behavioral datas that face recognition technology obtains same a suspect are first passed through, and according to behavior number Temporal information in, sequentially in time splices behavioral data, forms the event trace behavior number of a suspect According to.
Wherein, face recognition technology can be any one in existing face recognition technology.
Step 210, event trace behavioral data and the characteristic in illegal activities feature database are compared, to judge Whether event trace behavioral data includes illegal activities, if so, thening follow the steps 211, otherwise, executes step 209.
Step 211, determine that the affiliated a suspect of the event trace behavioral data is lawbreaker.
It is illustrated in conjunction with step 210- steps 211.Further, in this embodiment by event trace behavioral data with Characteristic in illegal activities feature database is compared, to judge whether event trace behavioral data includes illegal activities, if Event trace behavioral data includes illegal activities, it is determined that the affiliated a suspect of the event trace behavioral data is lawbreaker Otherwise member continues to obtain the event trace behavioral data into a suspect of monitoring area.
Step 212, it obtains the image of lawbreaker and current location and generates primary alarm label.
Step 213, the image of lawbreaker, current location and primary alarm label are sent to the movement of Security Personnel Terminal.
It is illustrated in conjunction with step 212- steps 213.Further, in this embodiment determining the event trace behavior The affiliated a suspect of data is the image and present bit of acquisition lawbreaker from current monitor video after lawbreaker It sets, figure and features and specific location is worn with obtain lawbreaker.Primary alarm label is generated, which is to illegal The label that personnel are arrested.The image of lawbreaker, current location and primary alarm label are sent to Security Personnel's Mobile terminal carries out lawbreaker so that Security Personnel finds lawbreaker according to the image and current location of lawbreaker It arrests.
The monitoring method of a suspect provided in this embodiment, by acquiring a variety of densely populated public place video datas In illegal activities data, to illegal activities data carry out feature extraction, to obtain illegal activities characteristic, according to illegal row It is characterized data structure illegal activities feature database, face characteristic extraction is carried out to the image of a suspect, to obtain a suspect Face characteristic value, the face characteristic value of a suspect and the facial image in current monitor video are compared in real time, sentenced With the presence or absence of the matched personnel of face characteristic value with a suspect in disconnected current monitor video, if so, generating second-level alarm Label, and the face characteristic value with a suspect in current monitor video is matched into the image of personnel, current location and two level and is warned The mobile terminal for giving Security Personnel is signed and issued in bid quotation, obtains the event trace behavioral data into a suspect of monitoring area, Event trace behavioral data and the characteristic in illegal activities feature database are compared, to judge event trace behavioral data Whether include illegal activities, if so, determining that the affiliated a suspect of the event trace behavioral data is lawbreaker, obtains and disobey The image of method personnel and current location simultaneously generate primary alarm label, and the image of lawbreaker, current location and level-one are warned The mobile terminal for giving Security Personnel is signed and issued in bid quotation, is not only increased the efficiency of investigation lawbreaker, can be found in time suspicious The illegal activities of personnel, and Security Personnel can be notified to start artificial monitoring to a suspect in time and lawbreaker is implemented It arrests, the effective protection security of the lives and property of the people.
One of ordinary skill in the art will appreciate that:Realize that all or part of step of above-mentioned each method embodiment can lead to The relevant hardware of program instruction is crossed to complete.Program above-mentioned can be stored in a read/write memory medium.The program is being held When row, execution includes the steps that above-mentioned each method embodiment;And storage medium above-mentioned includes:ROM, RAM, magnetic disc or CD Etc. the various media that can store program code.
Fig. 3 is the structural schematic diagram of the monitoring device embodiment one of a suspect of the present invention, as shown in figure 3, the present embodiment The monitoring device of a suspect of offer includes:Acquisition module 31, judgment module 32 and determining module 33.
Wherein, acquisition module 31, for obtaining the event trace behavioral data into a suspect of monitoring area.Judge Module 32, for comparing event trace behavioral data and the characteristic in illegal activities feature database, to judge activity Whether track behavioral data includes illegal activities.Determining module 33, if including illegal activities for event trace behavioral data, Then determine that the affiliated a suspect of the event trace behavioral data is lawbreaker.
The monitoring device of a suspect provided in this embodiment can execute the technical solution of embodiment of the method shown in Fig. 1, Its implementing principle and technical effect is similar, and details are not described herein again.
Fig. 4 is the structural schematic diagram of the monitoring device embodiment two of a suspect of the present invention, as shown in figure 4, the present embodiment The monitoring device of a suspect of offer is on the basis of the monitoring device embodiment one of a suspect of the present invention, further, Further include:Generation module 41, sending module 42, characteristic extracting module 43, acquisition module 44 and structure module 45.
Further, acquisition module 31 are additionally operable to obtain image and the current location of lawbreaker.Generation module 41 is used In generation primary alarm label.Sending module 42, for sending out the image of lawbreaker, current location and primary alarm label Give the mobile terminal of Security Personnel.
Further, characteristic extracting module 43 carry out face characteristic extraction for the image to a suspect, can with acquisition The face characteristic value for the personnel of doubting.Judgment module 32, being additionally operable to will be in the face characteristic value of a suspect and current monitor video Facial image is compared in real time, is judged in current monitor video with the presence or absence of the matched people of face characteristic value with a suspect Member.Generation module 41 is given birth to if being additionally operable to the matched personnel of face characteristic value for having with a suspect in current monitor video At second-level alarm label.Sending module 42 is additionally operable to the face characteristic value with a suspect in current monitor video matching people Image, current location and the second-level alarm label of member is sent to the mobile terminal of Security Personnel.
Further, acquisition module 44, for acquiring the illegal activities in a variety of densely populated public place video datas Data.Characteristic extracting module 43 is additionally operable to carry out feature extraction to illegal activities data, to obtain illegal activities characteristic. Module 45 is built, for building illegal activities feature database according to illegal activities characteristic.
The monitoring device of a suspect provided in this embodiment can execute the technical solution of embodiment of the method shown in Fig. 2, Its implementing principle and technical effect is similar, and details are not described herein again.
The embodiment of the present invention also provides a kind of monitoring device of a suspect, including:Memory, processor and computer Program.
Wherein, computer program stores in memory, and is configured as being executed by processor to realize that the present invention is suspicious Method in the monitoring method embodiment one of personnel or the monitoring method embodiment two of a suspect of the present invention.
The embodiment of the present invention also provides a kind of computer readable storage medium, is stored thereon with computer program, computer Program is executed by processor with the monitoring of the monitoring method embodiment one or a suspect of the present invention of realizing a suspect of the present invention Method in embodiment of the method two.
Finally it should be noted that:The above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Present invention has been described in detail with reference to the aforementioned embodiments for pipe, it will be understood by those of ordinary skill in the art that:Its according to So can with technical scheme described in the above embodiments is modified, either to which part or all technical features into Row equivalent replacement;And these modifications or replacements, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme.

Claims (10)

1. a kind of monitoring method of a suspect, which is characterized in that including:
Obtain the event trace behavioral data into a suspect of monitoring area;
The event trace behavioral data is compared with the characteristic in illegal activities feature database, to judge the activity Whether track behavioral data includes illegal activities;
If the event trace behavioral data includes illegal activities, it is determined that the affiliated suspicious people of the event trace behavioral data Member is lawbreaker.
2. according to the method described in claim 1, it is characterized in that, the determination event trace behavioral data it is affiliated suspicious Personnel be lawbreaker after, further include:
Obtain image and the current location of the lawbreaker;
Generate primary alarm label;
The image of the lawbreaker, current location and primary alarm label are sent to the mobile terminal of Security Personnel.
3. according to the method described in claim 2, it is characterized in that, described obtain the activity into a suspect of monitoring area Before the behavioral data of track, further include:
Face characteristic extraction is carried out to the image of a suspect, to obtain the face characteristic value of a suspect.
The face characteristic value of a suspect and the facial image in current monitor video are compared in real time, described in judgement With the presence or absence of the matched personnel of face characteristic value with a suspect in current monitor video;
If there are the matched personnel of face characteristic value with a suspect in the current monitor video, two level police is generated Bid quotation label;
Image, the current location and two of personnel will be matched in the current monitor video with the face characteristic value of a suspect Grade alarm tag is sent to the mobile terminal of the Security Personnel.
4. method according to any one of claim 1-3, which is characterized in that described to obtain into the suspicious of monitoring area Before the event trace behavioral data of personnel, further include:
Acquire the illegal activities data in a variety of densely populated public place video datas;
Feature extraction is carried out to the illegal activities data, to obtain illegal activities characteristic;
Illegal activities feature database is built according to the illegal activities characteristic.
5. a kind of monitoring device of a suspect, which is characterized in that including:
Acquisition module, for obtaining the event trace behavioral data into a suspect of monitoring area;
Judgment module, for the event trace behavioral data to be compared with the characteristic in illegal activities feature database, To judge whether the event trace behavioral data includes illegal activities;
Determining module, if including illegal activities for the event trace behavioral data, it is determined that the event trace behavior number According to affiliated a suspect be lawbreaker.
6. device according to claim 5, which is characterized in that further include:Generation module and sending module;
The acquisition module is additionally operable to obtain image and the current location of the lawbreaker;
The generation module, for generating primary alarm label;
The sending module, for the image of the lawbreaker, current location and primary alarm label to be sent to security The mobile terminal of personnel.
7. device according to claim 6, which is characterized in that further include:Characteristic extracting module;
The characteristic extracting module carries out face characteristic extraction for the image to a suspect, described suspicious to obtain The face characteristic value of personnel.
The judgment module, be additionally operable to by the facial image in the face characteristic value of a suspect and current monitor video into Row compares in real time, judges in the current monitor video with the presence or absence of the matched people of face characteristic value with a suspect Member;
The generation module matches if being additionally operable to exist in the current monitor video with the face characteristic value of a suspect Personnel, then generate second-level alarm label;
The sending module is additionally operable to that personnel will be matched with the face characteristic value of a suspect in the current monitor video Image, current location and second-level alarm label be sent to the mobile terminal of the Security Personnel.
8. according to the device described in any one of claim 5-7, which is characterized in that further include:Acquisition module and structure module;
The acquisition module, for acquiring the illegal activities data in a variety of densely populated public place video datas;
The characteristic extracting module is additionally operable to carry out feature extraction to the illegal activities data, to obtain illegal activities feature Data;
The structure module, for building illegal activities feature database according to the illegal activities characteristic.
9. a kind of monitoring device of a suspect, which is characterized in that including:
Memory, processor and computer program;
Wherein, the computer program is stored in the memory, and is configured as being executed to realize such as by the processor Method described in any one of claim 1-4.
10. a kind of computer readable storage medium, which is characterized in that be stored thereon with computer program, the computer program It is executed by processor to realize the method as described in any one of claim 1-4.
CN201810449826.4A 2018-05-11 2018-05-11 Monitoring method, device and the computer readable storage medium of a suspect Pending CN108629322A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810449826.4A CN108629322A (en) 2018-05-11 2018-05-11 Monitoring method, device and the computer readable storage medium of a suspect

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810449826.4A CN108629322A (en) 2018-05-11 2018-05-11 Monitoring method, device and the computer readable storage medium of a suspect

Publications (1)

Publication Number Publication Date
CN108629322A true CN108629322A (en) 2018-10-09

Family

ID=63692865

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810449826.4A Pending CN108629322A (en) 2018-05-11 2018-05-11 Monitoring method, device and the computer readable storage medium of a suspect

Country Status (1)

Country Link
CN (1) CN108629322A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109472731A (en) * 2018-11-07 2019-03-15 武汉烽火众智数字技术有限责任公司 A kind of suspicious object determines method and device
CN109766816A (en) * 2019-01-03 2019-05-17 中国联合网络通信集团有限公司 Monitoring method, device and storage medium
CN109903500A (en) * 2019-04-01 2019-06-18 广东职业技术学院 Unmanned pharmacy's safety monitoring burglary-resisting system
CN110069339A (en) * 2019-01-10 2019-07-30 中国电子科技集团公司电子科学研究院 A kind of Distributed identification tracking system
CN110491004A (en) * 2019-08-14 2019-11-22 金陵科技学院 A kind of residential communities personnel security management system and method
CN111027518A (en) * 2019-12-26 2020-04-17 广州市炬盾科技发展有限公司 Suspicious crowd intelligent alarm method and device, computer equipment and storage medium
CN111217055A (en) * 2018-11-27 2020-06-02 深圳利万联科技有限公司 Garbage putting supervision method, device, server and system
CN111339366A (en) * 2019-12-26 2020-06-26 广州市炬盾科技发展有限公司 Big data video retrieval method and device, computer equipment and storage medium
CN111552007A (en) * 2020-05-26 2020-08-18 上海量卿科技有限公司 Inspection system and method
CN112330742A (en) * 2020-11-03 2021-02-05 盈合(深圳)机器人与自动化科技有限公司 Method and device for recording activity routes of key personnel in public area
CN112507772A (en) * 2020-09-03 2021-03-16 广州市标准化研究院 Face recognition security system and suspicious person detection and early warning method
CN113205056A (en) * 2021-05-12 2021-08-03 延边国泰新能源汽车有限公司 Active image recognition early warning system based on public safety problem and processing method thereof
CN113343743A (en) * 2020-03-03 2021-09-03 杭州海康威视系统技术有限公司 Target person identification method and device, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103246869A (en) * 2013-04-19 2013-08-14 福建亿榕信息技术有限公司 Crime monitoring method based on face recognition technology and behavior and sound recognition
CN104202578A (en) * 2014-09-27 2014-12-10 江阴延利汽车饰件股份有限公司 Method for automatically identifying criminal suspects
CN106033530A (en) * 2015-03-11 2016-10-19 中兴通讯股份有限公司 Identification method and apparatus for suspected person

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103246869A (en) * 2013-04-19 2013-08-14 福建亿榕信息技术有限公司 Crime monitoring method based on face recognition technology and behavior and sound recognition
CN104202578A (en) * 2014-09-27 2014-12-10 江阴延利汽车饰件股份有限公司 Method for automatically identifying criminal suspects
CN106033530A (en) * 2015-03-11 2016-10-19 中兴通讯股份有限公司 Identification method and apparatus for suspected person

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109472731A (en) * 2018-11-07 2019-03-15 武汉烽火众智数字技术有限责任公司 A kind of suspicious object determines method and device
CN111217055A (en) * 2018-11-27 2020-06-02 深圳利万联科技有限公司 Garbage putting supervision method, device, server and system
CN111217055B (en) * 2018-11-27 2021-12-10 深圳正品创想科技有限公司 Garbage putting supervision method, device, server and system
CN109766816A (en) * 2019-01-03 2019-05-17 中国联合网络通信集团有限公司 Monitoring method, device and storage medium
CN110069339A (en) * 2019-01-10 2019-07-30 中国电子科技集团公司电子科学研究院 A kind of Distributed identification tracking system
CN110069339B (en) * 2019-01-10 2022-06-24 中国电子科技集团公司电子科学研究院 Distributed recognition tracking system
CN109903500A (en) * 2019-04-01 2019-06-18 广东职业技术学院 Unmanned pharmacy's safety monitoring burglary-resisting system
CN110491004A (en) * 2019-08-14 2019-11-22 金陵科技学院 A kind of residential communities personnel security management system and method
CN110491004B (en) * 2019-08-14 2021-06-25 金陵科技学院 Resident community personnel safety management system and method
CN111027518A (en) * 2019-12-26 2020-04-17 广州市炬盾科技发展有限公司 Suspicious crowd intelligent alarm method and device, computer equipment and storage medium
CN111339366A (en) * 2019-12-26 2020-06-26 广州市炬盾科技发展有限公司 Big data video retrieval method and device, computer equipment and storage medium
CN113343743A (en) * 2020-03-03 2021-09-03 杭州海康威视系统技术有限公司 Target person identification method and device, electronic equipment and storage medium
CN113343743B (en) * 2020-03-03 2024-02-13 杭州海康威视系统技术有限公司 Target person identification method, device, electronic equipment and storage medium
CN111552007A (en) * 2020-05-26 2020-08-18 上海量卿科技有限公司 Inspection system and method
CN112507772A (en) * 2020-09-03 2021-03-16 广州市标准化研究院 Face recognition security system and suspicious person detection and early warning method
CN112330742A (en) * 2020-11-03 2021-02-05 盈合(深圳)机器人与自动化科技有限公司 Method and device for recording activity routes of key personnel in public area
CN113205056A (en) * 2021-05-12 2021-08-03 延边国泰新能源汽车有限公司 Active image recognition early warning system based on public safety problem and processing method thereof
CN113205056B (en) * 2021-05-12 2023-08-22 延边国泰新能源汽车有限公司 Active image recognition early warning system based on public safety problem and processing method thereof

Similar Documents

Publication Publication Date Title
CN108629322A (en) Monitoring method, device and the computer readable storage medium of a suspect
CN108664608A (en) Recognition methods, device and the computer readable storage medium of a suspect
WO2019153193A1 (en) Taxi operation monitoring method, device, storage medium, and system
CA2884670C (en) System and method for generating an activity summary of a person
RU2753959C2 (en) Video analysis module and method for generating materials for investigating user's behavior
CN111008568B (en) Ticket escape detection method and related device thereof
TW201214339A (en) Auditing video analytics through essence generation
TW201723967A (en) Financial terminal security system and financial terminal security method
CN107480625A (en) A kind of authentication identifying method based on recognition of face
CN101692281A (en) Safety monitoring method, safety monitoring device and automatic teller machine (ATM) system
CN108171187A (en) A kind of abnormal behaviour automatic identifying method and device based on the extraction of bone point
CN112330742A (en) Method and device for recording activity routes of key personnel in public area
CN111126167A (en) Method and system for quickly identifying series activities of multiple specific persons
CN111080307A (en) Intelligent trading and social contact method and system based on quantum AI remote sensing vision
CN111191498A (en) Behavior recognition method and related product
CN113537165B (en) Detection method and system for pedestrian alarm
Kaluža et al. Detection of suspicious behavior from a sparse set of multiagent interactions
Shankar et al. Intelligent video analytics (iva) and surveillance system using machine learning and neural networks
CN113469080A (en) Individual, group and scene interactive collaborative perception method, system and equipment
Pannirselvam et al. A Comprehensive Study on Automated Anomaly Detection Techniques in Video Surveillance
Srivastava et al. Anomaly Detection Approach for Human Detection in Crowd Based Locations
Kanwal et al. Large Scale Hierarchical Anomaly Detection and Temporal Localization
Nithesh et al. Anomaly Detection in Surveillance Videos Using Deep Learning
CN112991717B (en) Vehicle track display method and related product
Daniyal et al. Abnormal motion detection in crowded scenes using local spatio-temporal analysis

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181009