CN111311862A - Monitoring method for suspicious personnel or suspicious behaviors - Google Patents

Monitoring method for suspicious personnel or suspicious behaviors Download PDF

Info

Publication number
CN111311862A
CN111311862A CN202010138409.5A CN202010138409A CN111311862A CN 111311862 A CN111311862 A CN 111311862A CN 202010138409 A CN202010138409 A CN 202010138409A CN 111311862 A CN111311862 A CN 111311862A
Authority
CN
China
Prior art keywords
suspicious
monitoring system
monitoring
behaviors
personnel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010138409.5A
Other languages
Chinese (zh)
Inventor
史冬华
周彬
韩伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Zhongshu Intelligent Information Technology Co ltd
Original Assignee
Jiangsu Zhongshu Intelligent Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Zhongshu Intelligent Information Technology Co ltd filed Critical Jiangsu Zhongshu Intelligent Information Technology Co ltd
Priority to CN202010138409.5A priority Critical patent/CN111311862A/en
Publication of CN111311862A publication Critical patent/CN111311862A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a method for monitoring suspicious people or suspicious behaviors. The method comprises the following steps: the method comprises the following steps that a camera monitors and records image content and sound content in real time, the camera transmits the image content and the sound content to a monitoring system, and the monitoring system is divided into an image monitoring system and a sound monitoring system; the image monitoring system monitors the image content and judges whether suspicious persons or suspicious behaviors exist or not, and the sound monitoring system monitors the sound content and judges whether suspicious behaviors exist or not; when suspicious people or suspicious behaviors are monitored, the camera automatically focuses on the occurrence area of the suspicious people or the suspicious behaviors; tracking the face of a suspicious person, and taking high-definition pictures; recording the latest other characteristics of the suspicious personnel; the security personnel confirm the suspicious person or suspicious act on site. The invention can effectively and timely monitor suspicious personnel or suspicious behaviors, and then can effectively prevent illegal behaviors through manual investigation of security personnel.

Description

Monitoring method for suspicious personnel or suspicious behaviors
Technical Field
The invention relates to the technical field of security monitoring, in particular to a method for monitoring suspicious people or suspicious behaviors.
Background
At present, the number of floating population is large, many lawbreakers often utilize security vulnerabilities of community buildings to carry out some illegal behaviors such as theft, robbery and the like, although the existing community security system comprises a monitoring system consisting of cameras, the existing community security system cannot prevent some illegal behaviors, and images recorded by the cameras can only be reserved for later-stage evidence use.
Disclosure of Invention
The invention aims to provide a detection method for prejudging suspicious persons or suspicious behaviors.
The technical scheme adopted by the invention for solving the technical problems is as follows:
a method of monitoring a suspect person or suspect behaviour, the method comprising:
the method comprises the following steps that a camera monitors and records image content and sound content in real time, the camera transmits the image content and the sound content to a monitoring system, and the monitoring system is divided into an image monitoring system and a sound monitoring system;
the image monitoring system monitors the image content and judges whether suspicious persons or suspicious behaviors exist or not, and the sound monitoring system monitors the sound content and judges whether suspicious behaviors exist or not;
when suspicious people or suspicious behaviors are monitored, the camera automatically focuses on the occurrence area of the suspicious people or the suspicious behaviors;
tracking the face of a suspicious person, and taking high-definition pictures;
recording the latest other characteristics of the suspicious personnel;
the security personnel confirm the suspicious person or suspicious act on site.
Furthermore, the suspicious people comprise case-involved people and blacklist people, the image monitoring system monitors face data, compares the face data with a public security population database and a local population database, and judges whether the face data is the suspicious people.
Further, the suspicious behavior comprises the situation that the video monitoring system monitors that a person stays at the door without entering the door, the video monitoring system monitors other distress images, and the sound monitoring system monitors strong sound fluctuation.
Further, the suspicious behavior further includes when the camera is damaged or cannot record the image content after being covered.
Further, the other features include the latest face avatar, the latest clothing and clothing, and the height of the suspicious person.
Further, the monitoring system comprises a plurality of servers, a plurality of computers, a plurality of video recorders, an alarm and a software monitoring control system, the monitoring system is communicated with a public security end database through a dedicated line, the servers comprise a database server, an application program server and a Web server, the video recorders are used for recording and storing the image content and the sound content of the cameras, the computers are used for controlling the software monitoring control system, and the software monitoring control system is used for realizing the judgment, analysis, recording, storage or statistic work of suspicious personnel or suspicious behaviors.
Furthermore, the monitoring system transmits the images recorded by the camera to a plurality of display screens in real time through a decoder for real-time monitoring and early warning.
Furthermore, the camera is an automatic focusing camera and has a face tracking function.
The invention has the beneficial effects that:
through the cooperation of the image monitoring system and the sound monitoring system, a plurality of cameras are reasonably arranged, suspicious persons or suspicious behaviors can be effectively and timely monitored through real-time monitoring, analysis and early warning of the cameras, then the occurrence of illegal behaviors can be effectively prevented through manual examination of security personnel,
drawings
FIG. 1 is a schematic view of a monitoring method according to the present invention;
FIG. 2 is a block diagram of the hardware components of the system according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of the operation of an embodiment of the present invention;
FIG. 4 is a schematic diagram of an image monitoring system according to an embodiment of the present invention;
FIG. 5 is a schematic diagram of the operation of a sound monitoring system according to an embodiment of the present invention;
FIG. 6 is a display diagram of a monitor display screen according to an embodiment of the present invention;
fig. 7 is a display screen monitoring display diagram of a suspicious person or activity being monitored according to an embodiment of the present invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in detail below. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein.
It will be understood that when an element is referred to as being "secured to" another element, it can be directly on the other element or intervening elements may also be present. When an element is referred to as being "connected" to another element, it can be directly connected to the other element or intervening elements may also be present.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
A method for monitoring suspicious persons or suspicious behaviors, as shown in fig. 1, the method comprises the following steps:
step S11: the camera monitors and records the image content and the sound content in real time, the camera transmits the image content and the sound content to a monitoring system, and the monitoring system is divided into an image monitoring system and a sound monitoring system;
step S12: the image monitoring system monitors image content and judges whether suspicious persons or suspicious behaviors exist or not, and the sound monitoring system monitors sound content and judges whether suspicious behaviors exist or not;
step S13: when suspicious people or suspicious behaviors are monitored, the camera automatically focuses on the occurrence area of the suspicious people or the suspicious behaviors;
step S14: for suspicious people, the camera tracks the faces of the suspicious people and takes high-definition pictures;
step S15: recording the latest other characteristics of the suspicious personnel;
step S16: the security personnel confirm the suspicious person or suspicious act on site.
As shown in fig. 2, the hardware system for monitoring suspicious persons or suspicious acts is schematically composed of a monitoring module, the monitoring module is composed of a plurality of cameras, the plurality of cameras are automatic focusing cameras, the monitoring system comprises a plurality of servers, a computer, a video recorder, an alarm and a software monitoring control system, the monitoring system is communicated with a public security end database through a private line, the servers comprise a database server, an application program server and a Web server, the video recorder is used for recording and storing the image content and the sound content of the camera, the computer is used for controlling the software monitoring control system, and the software monitoring control system is used for realizing the judgment, analysis, recording, storage or statistical work of suspicious personnel or suspicious behaviors. The monitoring system transmits images recorded by the camera to the display screens in real time through the decoder for real-time monitoring and early warning, when the camera monitors that suspicious people or suspicious behaviors occur, the display screen monitoring the area can automatically amplify and display, and triggers the alarm to give an alarm to prompt whether the suspicious people exist or not or the suspicious behaviors occur. As shown in fig. 6, when the area corresponding to the camera with the number of 24 has the occurrence of the suspicious behavior, the display area corresponding to the camera with the number of 24 is automatically enlarged and displayed, and an alarm is triggered to give an alarm.
As shown in fig. 3, which is a schematic view of the monitoring system for determining suspicious people and suspicious behaviors, the monitoring system monitors and records image content and sound content in real time through a camera, determines whether the monitoring system is a suspicious person or a suspicious behavior, and after the monitoring system determines that the monitoring system is a suspicious person or a suspicious behavior, the camera automatically focuses on an occurrence area of the suspicious person or the suspicious behavior, and simultaneously automatically amplifies a monitoring video of the area on a display screen, and triggers an alarm of the monitoring system to send a prompt sound. And then tracking the face of the suspicious person by the camera, carrying out high-definition photographing, and recording the latest other characteristics of the suspicious person, including the latest face head portrait, the latest clothes and the height of the suspicious person. The monitoring system extracts face photos of suspicious persons, compares the face photos manually again, judges whether the suspicious persons are involved persons or not, contacts police officers at the first time if the suspicious persons are involved persons, confirms the suspicious persons or suspicious behaviors on site by security personnel if the suspicious persons or the suspicious behaviors are not involved persons, confirms that the criminal behaviors occur, hands over the criminal persons to a police station if the suspicious persons or the suspicious behaviors are confirmed, generates misunderstanding if the suspicious persons or the suspicious behaviors do not exist, updates a local population database, and eliminates amplification warning of a display screen.
As shown in fig. 4, a working diagram of the image monitoring system for determining suspicious persons or suspicious behaviors is shown:
a: monitoring face data, comparing the face data with a local population database, and judging as suspicious people when the local database has no person or blacklist people;
b: monitoring face data, comparing the face data with a public security population database, and judging as suspicious people when related to case-related people;
c: after the time that the person stays at the door is monitored to exceed the set time (30 seconds for the moment), and the person does not enter the door, the person is judged to be a suspicious person or a suspicious behavior;
d: after the person wanders back and forth at the doorway and does not enter the doorway, the person is judged as a suspicious person or behavior;
e: when a distress signal graph is monitored, if the SOS is detected, the SOS is judged to be suspicious;
f: and when the camera is damaged or covered without any influence, the suspicious behavior is judged.
As shown in fig. 5, a working diagram of the sound monitoring system for determining suspicious behavior is shown:
a: when strong sound fluctuation is monitored, and decibels exceed a set value (or noisy sound or impact sound and the like), the behavior is judged to be suspicious;
b: when the distress sound is monitored, the sound monitoring system identifies and judges the sound to be suspicious behavior.
The cameras are reasonably arranged, suspicious people or suspicious behaviors can be effectively and timely monitored through real-time monitoring, analysis and early warning of the cameras, and then the occurrence of illegal behaviors can be effectively prevented through manual investigation of security personnel.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the present invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (8)

1. A method of monitoring suspicious persons or suspicious acts, characterized by: the method comprises the following steps:
s11: the method comprises the following steps that a camera monitors and records image content and sound content in real time, the camera transmits the image content and the sound content to a monitoring system, and the monitoring system is divided into an image monitoring system and a sound monitoring system;
s12: the image monitoring system monitors the image content and judges whether suspicious persons or suspicious behaviors exist or not, and the sound monitoring system monitors the sound content and judges whether suspicious behaviors exist or not;
s13: when suspicious people or suspicious behaviors are monitored, the camera automatically focuses on the occurrence area of the suspicious people or the suspicious behaviors;
s14: tracking the face of a suspicious person, and taking high-definition pictures;
s15: recording the latest other characteristics of the suspicious personnel;
s16: the security personnel confirm the suspicious person or suspicious act on site.
2. A method of monitoring suspicious persons or suspicious acts according to claim 1, characterized in that: the suspicious personnel comprise case-involved personnel and blacklist personnel, the image monitoring system monitors face data, compares the face data with a public security population database and a local population database, and judges whether the suspicious personnel are suspicious personnel or not.
3. A method for monitoring suspicious persons or suspicious acts according to claim 2, characterized in that: the suspicious behaviors comprise the fact that monitoring personnel of the image monitoring system stay at the door without entering the door, the image monitoring system monitors other distress images and the sound monitoring system monitors strong sound fluctuation.
4. A method of monitoring suspicious persons or suspicious acts according to claim 3, characterized in that: the suspicious behavior further comprises when the video camera is damaged or cannot record the image content after being covered.
5. A method of monitoring suspicious persons or suspicious acts according to claim 1, characterized in that: the other features include the latest face avatar, the latest clothing and clothing, and the height of the suspect.
6. A method for monitoring suspicious persons or suspicious acts according to any one of claims 1-5, characterized in that: the monitoring system comprises a plurality of servers, a computer, a video recorder, an alarm and a software monitoring control system, the monitoring system is communicated with a public security end database through a dedicated line, the servers comprise a database server, an application program server and a Web server, the video recorder is used for recording and storing the image content and the sound content of the camera, the computer is used for controlling the software monitoring control system, and the software monitoring control system is used for realizing the judgment, analysis, recording, storage or statistical work of suspicious personnel or suspicious behaviors.
7. The method according to claim 6, wherein the method comprises the following steps: and the monitoring system transmits the images recorded by the camera to a plurality of display screens in real time through a decoder for real-time monitoring and early warning.
8. A method for monitoring suspicious persons or suspicious acts according to any one of claims 1-5, characterized in that: the camera is an automatic focusing camera and has a face tracking function.
CN202010138409.5A 2020-03-03 2020-03-03 Monitoring method for suspicious personnel or suspicious behaviors Pending CN111311862A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010138409.5A CN111311862A (en) 2020-03-03 2020-03-03 Monitoring method for suspicious personnel or suspicious behaviors

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010138409.5A CN111311862A (en) 2020-03-03 2020-03-03 Monitoring method for suspicious personnel or suspicious behaviors

Publications (1)

Publication Number Publication Date
CN111311862A true CN111311862A (en) 2020-06-19

Family

ID=71152036

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010138409.5A Pending CN111311862A (en) 2020-03-03 2020-03-03 Monitoring method for suspicious personnel or suspicious behaviors

Country Status (1)

Country Link
CN (1) CN111311862A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111212274A (en) * 2020-03-03 2020-05-29 江苏中数智慧信息科技有限公司 Intelligent building security system
CN114187723A (en) * 2021-11-25 2022-03-15 深圳市中西视通科技有限公司 Security monitoring method

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103327122A (en) * 2013-07-11 2013-09-25 北京信息科技大学 Intelligent remote monitoring system
CN105376522A (en) * 2015-02-10 2016-03-02 山东华光光电子有限公司 Infrared thermal imager with optical warning device and application thereof
CN106022233A (en) * 2016-05-12 2016-10-12 广东履安实业有限公司 Face capture and personnel positioning alarm camera
CN106652293A (en) * 2016-12-30 2017-05-10 安徽杰瑞信息科技有限公司 Intelligent district online safety and protection monitoring system
CN107169906A (en) * 2017-04-16 2017-09-15 悠泊物联网科技(上海)有限公司 A kind of smart security guard and alarm control system
CN109326073A (en) * 2018-09-04 2019-02-12 重庆工业职业技术学院 A kind of wireless sensor network safety defense monitoring system based on multipoint positioning
KR20190035187A (en) * 2017-09-26 2019-04-03 주식회사 삼알글로벌 Sound alarm broadcasting system in monitoring area
CN109714572A (en) * 2018-12-28 2019-05-03 深圳市微纳感知计算技术有限公司 A kind of intelligent safety and defence system of sound view linkage
CN209543514U (en) * 2018-11-19 2019-10-25 厦门银江智慧城市技术股份有限公司 Monitoring and alarm system based on recognition of face
US20190373222A1 (en) * 2018-05-29 2019-12-05 Era Digital Media Co., Ltd. Portable remote surveillance device and system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103327122A (en) * 2013-07-11 2013-09-25 北京信息科技大学 Intelligent remote monitoring system
CN105376522A (en) * 2015-02-10 2016-03-02 山东华光光电子有限公司 Infrared thermal imager with optical warning device and application thereof
CN106022233A (en) * 2016-05-12 2016-10-12 广东履安实业有限公司 Face capture and personnel positioning alarm camera
CN106652293A (en) * 2016-12-30 2017-05-10 安徽杰瑞信息科技有限公司 Intelligent district online safety and protection monitoring system
CN107169906A (en) * 2017-04-16 2017-09-15 悠泊物联网科技(上海)有限公司 A kind of smart security guard and alarm control system
KR20190035187A (en) * 2017-09-26 2019-04-03 주식회사 삼알글로벌 Sound alarm broadcasting system in monitoring area
US20190373222A1 (en) * 2018-05-29 2019-12-05 Era Digital Media Co., Ltd. Portable remote surveillance device and system
CN109326073A (en) * 2018-09-04 2019-02-12 重庆工业职业技术学院 A kind of wireless sensor network safety defense monitoring system based on multipoint positioning
CN209543514U (en) * 2018-11-19 2019-10-25 厦门银江智慧城市技术股份有限公司 Monitoring and alarm system based on recognition of face
CN109714572A (en) * 2018-12-28 2019-05-03 深圳市微纳感知计算技术有限公司 A kind of intelligent safety and defence system of sound view linkage

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111212274A (en) * 2020-03-03 2020-05-29 江苏中数智慧信息科技有限公司 Intelligent building security system
CN114187723A (en) * 2021-11-25 2022-03-15 深圳市中西视通科技有限公司 Security monitoring method

Similar Documents

Publication Publication Date Title
US10587460B2 (en) Systems and methods for correlating sensory events and legacy system events utilizing a correlation engine for security, safety, and business productivity
US7679507B2 (en) Video alarm verification
JP3974038B2 (en) Intruder detection using trajectory analysis in surveillance and reconnaissance systems
US8730040B2 (en) Systems, methods, and apparatus for monitoring and alerting on large sensory data sets for improved safety, security, and business productivity
US20050132414A1 (en) Networked video surveillance system
WO2016150045A1 (en) Housebreaking alarm method and device
US20030117280A1 (en) Security communication and remote monitoring/response system
CN111212274A (en) Intelligent building security system
US20050146606A1 (en) Remote video queuing and display system
US8781296B2 (en) Auditing system for misuse of an image information
US20040168194A1 (en) Internet tactical alarm communication system
CN109784231B (en) Security information management method, device and storage medium
CN111311862A (en) Monitoring method for suspicious personnel or suspicious behaviors
CN112383615A (en) Residential building entrance guard security system and method based on edge calculation
CN111985428A (en) Security detection method and device, electronic equipment and storage medium
CN112102574B (en) Intelligent alarm system for security room
US20090153660A1 (en) Surveillance system and method including active alert function
US11790743B2 (en) System and method for property monitoring
CN212624326U (en) Intelligent recognition alarm system
JP4588566B2 (en) Elevator control device
JP2005215996A (en) Apparatus and method for managing monitor picture
CN211457260U (en) Intelligent building security system
US20180124361A1 (en) Identity association for security monitoring
CN115758311A (en) Data display method and display system
WO2022009356A1 (en) Monitoring system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200619