CN111311862A - Monitoring method for suspicious personnel or suspicious behaviors - Google Patents
Monitoring method for suspicious personnel or suspicious behaviors Download PDFInfo
- Publication number
- CN111311862A CN111311862A CN202010138409.5A CN202010138409A CN111311862A CN 111311862 A CN111311862 A CN 111311862A CN 202010138409 A CN202010138409 A CN 202010138409A CN 111311862 A CN111311862 A CN 111311862A
- Authority
- CN
- China
- Prior art keywords
- suspicious
- monitoring system
- monitoring
- behaviors
- personnel
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19602—Image analysis to detect motion of the intruder, e.g. by frame subtraction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
- H04N7/181—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
Landscapes
- Engineering & Computer Science (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Alarm Systems (AREA)
Abstract
The invention discloses a method for monitoring suspicious people or suspicious behaviors. The method comprises the following steps: the method comprises the following steps that a camera monitors and records image content and sound content in real time, the camera transmits the image content and the sound content to a monitoring system, and the monitoring system is divided into an image monitoring system and a sound monitoring system; the image monitoring system monitors the image content and judges whether suspicious persons or suspicious behaviors exist or not, and the sound monitoring system monitors the sound content and judges whether suspicious behaviors exist or not; when suspicious people or suspicious behaviors are monitored, the camera automatically focuses on the occurrence area of the suspicious people or the suspicious behaviors; tracking the face of a suspicious person, and taking high-definition pictures; recording the latest other characteristics of the suspicious personnel; the security personnel confirm the suspicious person or suspicious act on site. The invention can effectively and timely monitor suspicious personnel or suspicious behaviors, and then can effectively prevent illegal behaviors through manual investigation of security personnel.
Description
Technical Field
The invention relates to the technical field of security monitoring, in particular to a method for monitoring suspicious people or suspicious behaviors.
Background
At present, the number of floating population is large, many lawbreakers often utilize security vulnerabilities of community buildings to carry out some illegal behaviors such as theft, robbery and the like, although the existing community security system comprises a monitoring system consisting of cameras, the existing community security system cannot prevent some illegal behaviors, and images recorded by the cameras can only be reserved for later-stage evidence use.
Disclosure of Invention
The invention aims to provide a detection method for prejudging suspicious persons or suspicious behaviors.
The technical scheme adopted by the invention for solving the technical problems is as follows:
a method of monitoring a suspect person or suspect behaviour, the method comprising:
the method comprises the following steps that a camera monitors and records image content and sound content in real time, the camera transmits the image content and the sound content to a monitoring system, and the monitoring system is divided into an image monitoring system and a sound monitoring system;
the image monitoring system monitors the image content and judges whether suspicious persons or suspicious behaviors exist or not, and the sound monitoring system monitors the sound content and judges whether suspicious behaviors exist or not;
when suspicious people or suspicious behaviors are monitored, the camera automatically focuses on the occurrence area of the suspicious people or the suspicious behaviors;
tracking the face of a suspicious person, and taking high-definition pictures;
recording the latest other characteristics of the suspicious personnel;
the security personnel confirm the suspicious person or suspicious act on site.
Furthermore, the suspicious people comprise case-involved people and blacklist people, the image monitoring system monitors face data, compares the face data with a public security population database and a local population database, and judges whether the face data is the suspicious people.
Further, the suspicious behavior comprises the situation that the video monitoring system monitors that a person stays at the door without entering the door, the video monitoring system monitors other distress images, and the sound monitoring system monitors strong sound fluctuation.
Further, the suspicious behavior further includes when the camera is damaged or cannot record the image content after being covered.
Further, the other features include the latest face avatar, the latest clothing and clothing, and the height of the suspicious person.
Further, the monitoring system comprises a plurality of servers, a plurality of computers, a plurality of video recorders, an alarm and a software monitoring control system, the monitoring system is communicated with a public security end database through a dedicated line, the servers comprise a database server, an application program server and a Web server, the video recorders are used for recording and storing the image content and the sound content of the cameras, the computers are used for controlling the software monitoring control system, and the software monitoring control system is used for realizing the judgment, analysis, recording, storage or statistic work of suspicious personnel or suspicious behaviors.
Furthermore, the monitoring system transmits the images recorded by the camera to a plurality of display screens in real time through a decoder for real-time monitoring and early warning.
Furthermore, the camera is an automatic focusing camera and has a face tracking function.
The invention has the beneficial effects that:
through the cooperation of the image monitoring system and the sound monitoring system, a plurality of cameras are reasonably arranged, suspicious persons or suspicious behaviors can be effectively and timely monitored through real-time monitoring, analysis and early warning of the cameras, then the occurrence of illegal behaviors can be effectively prevented through manual examination of security personnel,
drawings
FIG. 1 is a schematic view of a monitoring method according to the present invention;
FIG. 2 is a block diagram of the hardware components of the system according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of the operation of an embodiment of the present invention;
FIG. 4 is a schematic diagram of an image monitoring system according to an embodiment of the present invention;
FIG. 5 is a schematic diagram of the operation of a sound monitoring system according to an embodiment of the present invention;
FIG. 6 is a display diagram of a monitor display screen according to an embodiment of the present invention;
fig. 7 is a display screen monitoring display diagram of a suspicious person or activity being monitored according to an embodiment of the present invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in detail below. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein.
It will be understood that when an element is referred to as being "secured to" another element, it can be directly on the other element or intervening elements may also be present. When an element is referred to as being "connected" to another element, it can be directly connected to the other element or intervening elements may also be present.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
A method for monitoring suspicious persons or suspicious behaviors, as shown in fig. 1, the method comprises the following steps:
step S11: the camera monitors and records the image content and the sound content in real time, the camera transmits the image content and the sound content to a monitoring system, and the monitoring system is divided into an image monitoring system and a sound monitoring system;
step S12: the image monitoring system monitors image content and judges whether suspicious persons or suspicious behaviors exist or not, and the sound monitoring system monitors sound content and judges whether suspicious behaviors exist or not;
step S13: when suspicious people or suspicious behaviors are monitored, the camera automatically focuses on the occurrence area of the suspicious people or the suspicious behaviors;
step S14: for suspicious people, the camera tracks the faces of the suspicious people and takes high-definition pictures;
step S15: recording the latest other characteristics of the suspicious personnel;
step S16: the security personnel confirm the suspicious person or suspicious act on site.
As shown in fig. 2, the hardware system for monitoring suspicious persons or suspicious acts is schematically composed of a monitoring module, the monitoring module is composed of a plurality of cameras, the plurality of cameras are automatic focusing cameras, the monitoring system comprises a plurality of servers, a computer, a video recorder, an alarm and a software monitoring control system, the monitoring system is communicated with a public security end database through a private line, the servers comprise a database server, an application program server and a Web server, the video recorder is used for recording and storing the image content and the sound content of the camera, the computer is used for controlling the software monitoring control system, and the software monitoring control system is used for realizing the judgment, analysis, recording, storage or statistical work of suspicious personnel or suspicious behaviors. The monitoring system transmits images recorded by the camera to the display screens in real time through the decoder for real-time monitoring and early warning, when the camera monitors that suspicious people or suspicious behaviors occur, the display screen monitoring the area can automatically amplify and display, and triggers the alarm to give an alarm to prompt whether the suspicious people exist or not or the suspicious behaviors occur. As shown in fig. 6, when the area corresponding to the camera with the number of 24 has the occurrence of the suspicious behavior, the display area corresponding to the camera with the number of 24 is automatically enlarged and displayed, and an alarm is triggered to give an alarm.
As shown in fig. 3, which is a schematic view of the monitoring system for determining suspicious people and suspicious behaviors, the monitoring system monitors and records image content and sound content in real time through a camera, determines whether the monitoring system is a suspicious person or a suspicious behavior, and after the monitoring system determines that the monitoring system is a suspicious person or a suspicious behavior, the camera automatically focuses on an occurrence area of the suspicious person or the suspicious behavior, and simultaneously automatically amplifies a monitoring video of the area on a display screen, and triggers an alarm of the monitoring system to send a prompt sound. And then tracking the face of the suspicious person by the camera, carrying out high-definition photographing, and recording the latest other characteristics of the suspicious person, including the latest face head portrait, the latest clothes and the height of the suspicious person. The monitoring system extracts face photos of suspicious persons, compares the face photos manually again, judges whether the suspicious persons are involved persons or not, contacts police officers at the first time if the suspicious persons are involved persons, confirms the suspicious persons or suspicious behaviors on site by security personnel if the suspicious persons or the suspicious behaviors are not involved persons, confirms that the criminal behaviors occur, hands over the criminal persons to a police station if the suspicious persons or the suspicious behaviors are confirmed, generates misunderstanding if the suspicious persons or the suspicious behaviors do not exist, updates a local population database, and eliminates amplification warning of a display screen.
As shown in fig. 4, a working diagram of the image monitoring system for determining suspicious persons or suspicious behaviors is shown:
a: monitoring face data, comparing the face data with a local population database, and judging as suspicious people when the local database has no person or blacklist people;
b: monitoring face data, comparing the face data with a public security population database, and judging as suspicious people when related to case-related people;
c: after the time that the person stays at the door is monitored to exceed the set time (30 seconds for the moment), and the person does not enter the door, the person is judged to be a suspicious person or a suspicious behavior;
d: after the person wanders back and forth at the doorway and does not enter the doorway, the person is judged as a suspicious person or behavior;
e: when a distress signal graph is monitored, if the SOS is detected, the SOS is judged to be suspicious;
f: and when the camera is damaged or covered without any influence, the suspicious behavior is judged.
As shown in fig. 5, a working diagram of the sound monitoring system for determining suspicious behavior is shown:
a: when strong sound fluctuation is monitored, and decibels exceed a set value (or noisy sound or impact sound and the like), the behavior is judged to be suspicious;
b: when the distress sound is monitored, the sound monitoring system identifies and judges the sound to be suspicious behavior.
The cameras are reasonably arranged, suspicious people or suspicious behaviors can be effectively and timely monitored through real-time monitoring, analysis and early warning of the cameras, and then the occurrence of illegal behaviors can be effectively prevented through manual investigation of security personnel.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the present invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (8)
1. A method of monitoring suspicious persons or suspicious acts, characterized by: the method comprises the following steps:
s11: the method comprises the following steps that a camera monitors and records image content and sound content in real time, the camera transmits the image content and the sound content to a monitoring system, and the monitoring system is divided into an image monitoring system and a sound monitoring system;
s12: the image monitoring system monitors the image content and judges whether suspicious persons or suspicious behaviors exist or not, and the sound monitoring system monitors the sound content and judges whether suspicious behaviors exist or not;
s13: when suspicious people or suspicious behaviors are monitored, the camera automatically focuses on the occurrence area of the suspicious people or the suspicious behaviors;
s14: tracking the face of a suspicious person, and taking high-definition pictures;
s15: recording the latest other characteristics of the suspicious personnel;
s16: the security personnel confirm the suspicious person or suspicious act on site.
2. A method of monitoring suspicious persons or suspicious acts according to claim 1, characterized in that: the suspicious personnel comprise case-involved personnel and blacklist personnel, the image monitoring system monitors face data, compares the face data with a public security population database and a local population database, and judges whether the suspicious personnel are suspicious personnel or not.
3. A method for monitoring suspicious persons or suspicious acts according to claim 2, characterized in that: the suspicious behaviors comprise the fact that monitoring personnel of the image monitoring system stay at the door without entering the door, the image monitoring system monitors other distress images and the sound monitoring system monitors strong sound fluctuation.
4. A method of monitoring suspicious persons or suspicious acts according to claim 3, characterized in that: the suspicious behavior further comprises when the video camera is damaged or cannot record the image content after being covered.
5. A method of monitoring suspicious persons or suspicious acts according to claim 1, characterized in that: the other features include the latest face avatar, the latest clothing and clothing, and the height of the suspect.
6. A method for monitoring suspicious persons or suspicious acts according to any one of claims 1-5, characterized in that: the monitoring system comprises a plurality of servers, a computer, a video recorder, an alarm and a software monitoring control system, the monitoring system is communicated with a public security end database through a dedicated line, the servers comprise a database server, an application program server and a Web server, the video recorder is used for recording and storing the image content and the sound content of the camera, the computer is used for controlling the software monitoring control system, and the software monitoring control system is used for realizing the judgment, analysis, recording, storage or statistical work of suspicious personnel or suspicious behaviors.
7. The method according to claim 6, wherein the method comprises the following steps: and the monitoring system transmits the images recorded by the camera to a plurality of display screens in real time through a decoder for real-time monitoring and early warning.
8. A method for monitoring suspicious persons or suspicious acts according to any one of claims 1-5, characterized in that: the camera is an automatic focusing camera and has a face tracking function.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010138409.5A CN111311862A (en) | 2020-03-03 | 2020-03-03 | Monitoring method for suspicious personnel or suspicious behaviors |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010138409.5A CN111311862A (en) | 2020-03-03 | 2020-03-03 | Monitoring method for suspicious personnel or suspicious behaviors |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111311862A true CN111311862A (en) | 2020-06-19 |
Family
ID=71152036
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010138409.5A Pending CN111311862A (en) | 2020-03-03 | 2020-03-03 | Monitoring method for suspicious personnel or suspicious behaviors |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111311862A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111212274A (en) * | 2020-03-03 | 2020-05-29 | 江苏中数智慧信息科技有限公司 | Intelligent building security system |
CN114187723A (en) * | 2021-11-25 | 2022-03-15 | 深圳市中西视通科技有限公司 | Security monitoring method |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103327122A (en) * | 2013-07-11 | 2013-09-25 | 北京信息科技大学 | Intelligent remote monitoring system |
CN105376522A (en) * | 2015-02-10 | 2016-03-02 | 山东华光光电子有限公司 | Infrared thermal imager with optical warning device and application thereof |
CN106022233A (en) * | 2016-05-12 | 2016-10-12 | 广东履安实业有限公司 | Face capture and personnel positioning alarm camera |
CN106652293A (en) * | 2016-12-30 | 2017-05-10 | 安徽杰瑞信息科技有限公司 | Intelligent district online safety and protection monitoring system |
CN107169906A (en) * | 2017-04-16 | 2017-09-15 | 悠泊物联网科技(上海)有限公司 | A kind of smart security guard and alarm control system |
CN109326073A (en) * | 2018-09-04 | 2019-02-12 | 重庆工业职业技术学院 | A kind of wireless sensor network safety defense monitoring system based on multipoint positioning |
KR20190035187A (en) * | 2017-09-26 | 2019-04-03 | 주식회사 삼알글로벌 | Sound alarm broadcasting system in monitoring area |
CN109714572A (en) * | 2018-12-28 | 2019-05-03 | 深圳市微纳感知计算技术有限公司 | A kind of intelligent safety and defence system of sound view linkage |
CN209543514U (en) * | 2018-11-19 | 2019-10-25 | 厦门银江智慧城市技术股份有限公司 | Monitoring and alarm system based on recognition of face |
US20190373222A1 (en) * | 2018-05-29 | 2019-12-05 | Era Digital Media Co., Ltd. | Portable remote surveillance device and system |
-
2020
- 2020-03-03 CN CN202010138409.5A patent/CN111311862A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103327122A (en) * | 2013-07-11 | 2013-09-25 | 北京信息科技大学 | Intelligent remote monitoring system |
CN105376522A (en) * | 2015-02-10 | 2016-03-02 | 山东华光光电子有限公司 | Infrared thermal imager with optical warning device and application thereof |
CN106022233A (en) * | 2016-05-12 | 2016-10-12 | 广东履安实业有限公司 | Face capture and personnel positioning alarm camera |
CN106652293A (en) * | 2016-12-30 | 2017-05-10 | 安徽杰瑞信息科技有限公司 | Intelligent district online safety and protection monitoring system |
CN107169906A (en) * | 2017-04-16 | 2017-09-15 | 悠泊物联网科技(上海)有限公司 | A kind of smart security guard and alarm control system |
KR20190035187A (en) * | 2017-09-26 | 2019-04-03 | 주식회사 삼알글로벌 | Sound alarm broadcasting system in monitoring area |
US20190373222A1 (en) * | 2018-05-29 | 2019-12-05 | Era Digital Media Co., Ltd. | Portable remote surveillance device and system |
CN109326073A (en) * | 2018-09-04 | 2019-02-12 | 重庆工业职业技术学院 | A kind of wireless sensor network safety defense monitoring system based on multipoint positioning |
CN209543514U (en) * | 2018-11-19 | 2019-10-25 | 厦门银江智慧城市技术股份有限公司 | Monitoring and alarm system based on recognition of face |
CN109714572A (en) * | 2018-12-28 | 2019-05-03 | 深圳市微纳感知计算技术有限公司 | A kind of intelligent safety and defence system of sound view linkage |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111212274A (en) * | 2020-03-03 | 2020-05-29 | 江苏中数智慧信息科技有限公司 | Intelligent building security system |
CN114187723A (en) * | 2021-11-25 | 2022-03-15 | 深圳市中西视通科技有限公司 | Security monitoring method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10587460B2 (en) | Systems and methods for correlating sensory events and legacy system events utilizing a correlation engine for security, safety, and business productivity | |
US7679507B2 (en) | Video alarm verification | |
JP3974038B2 (en) | Intruder detection using trajectory analysis in surveillance and reconnaissance systems | |
US8730040B2 (en) | Systems, methods, and apparatus for monitoring and alerting on large sensory data sets for improved safety, security, and business productivity | |
US20050132414A1 (en) | Networked video surveillance system | |
WO2016150045A1 (en) | Housebreaking alarm method and device | |
US20030117280A1 (en) | Security communication and remote monitoring/response system | |
CN111212274A (en) | Intelligent building security system | |
US20050146606A1 (en) | Remote video queuing and display system | |
US8781296B2 (en) | Auditing system for misuse of an image information | |
US20040168194A1 (en) | Internet tactical alarm communication system | |
CN109784231B (en) | Security information management method, device and storage medium | |
CN111311862A (en) | Monitoring method for suspicious personnel or suspicious behaviors | |
CN112383615A (en) | Residential building entrance guard security system and method based on edge calculation | |
CN111985428A (en) | Security detection method and device, electronic equipment and storage medium | |
CN112102574B (en) | Intelligent alarm system for security room | |
US20090153660A1 (en) | Surveillance system and method including active alert function | |
US11790743B2 (en) | System and method for property monitoring | |
CN212624326U (en) | Intelligent recognition alarm system | |
JP4588566B2 (en) | Elevator control device | |
JP2005215996A (en) | Apparatus and method for managing monitor picture | |
CN211457260U (en) | Intelligent building security system | |
US20180124361A1 (en) | Identity association for security monitoring | |
CN115758311A (en) | Data display method and display system | |
WO2022009356A1 (en) | Monitoring system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200619 |