CN112200145A - Remote identification method for public security - Google Patents

Remote identification method for public security Download PDF

Info

Publication number
CN112200145A
CN112200145A CN202011209013.1A CN202011209013A CN112200145A CN 112200145 A CN112200145 A CN 112200145A CN 202011209013 A CN202011209013 A CN 202011209013A CN 112200145 A CN112200145 A CN 112200145A
Authority
CN
China
Prior art keywords
image
gabor
face image
monitored
person
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202011209013.1A
Other languages
Chinese (zh)
Inventor
汤荣贵
王长军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Wanwei Technology Co ltd
Original Assignee
Shanghai Wanwei Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Wanwei Technology Co ltd filed Critical Shanghai Wanwei Technology Co ltd
Priority to CN202011209013.1A priority Critical patent/CN112200145A/en
Publication of CN112200145A publication Critical patent/CN112200145A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/40Extraction of image or video features
    • G06V10/50Extraction of image or video features by performing operations within image blocks; by using histograms, e.g. histogram of oriented gradients [HoG]; by summing image-intensity values; Projection analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/22Status alarms responsive to presence or absence of persons

Abstract

The invention discloses a remote identification method of public safety, which comprises the following steps: s1, collecting image information: acquiring image information of an object to be monitored through a camera mechanism and sending the image information to a processor; s2, analyzing and comparing the images; s3, alarming and reminding; s4, voice notification is carried out; s5, observing the integrity of the monitored object; and S6, identifying the identity of the person. The public facility is monitored by the camera shooting mechanism, monitoring personnel are conveniently reminded through the alarm function, when abnormal conditions occur, the monitoring personnel can immediately process the abnormal conditions, loss is reduced, meanwhile, the voice notification function is utilized, warning is conveniently sent, the condition that people intentionally damage the safety of the public facility is reduced, the safety of the public facility is improved, in addition, the identity of people damaging the public facility is conveniently recognized through recognizing the identity of the people, related legal responsibility is conveniently pursued, education is carried out, and the quality improvement of people is facilitated.

Description

Remote identification method for public security
Technical Field
The invention belongs to the technical field of public safety, and particularly relates to a remote identification method of public safety.
Background
Public safety, refers to the stable external environment and order required by society and citizens to engage in and carry out normal life, work, learning, entertainment and communications. The public safety management refers to the sum of various administrative activities performed by the national administrative authorities in order to maintain the public safety and order of the society, guarantee the legal interests of the citizens, and ensure the normal progress of various activities of the society.
Although the public security identification method and system for crowd sensing big data disclosed by the No. CN105022835B realize the idea of applying big data crowd sensing and multimedia deep learning to track and identify specific riot and terrorist targets, form a set of omnibearing and multi-modal public security search and identification system, make up the current situations of detection blind spots and insufficient effective audio and video of the traditional special security platform, but do not solve the problems of the existing remote identification method for public security: the safety identification of public facilities can be poor, people who intentionally destroy the safety of the public facilities are inconvenient to find, legal responsibility is inconvenient to follow, the risk that the public facilities are intentionally destroyed is increased, and therefore the remote identification method for the public safety is provided.
Disclosure of Invention
The present invention aims to provide a remote identification method for public security to solve the problems in the background art.
In order to achieve the purpose, the invention provides the following technical scheme:
a public safety remote identification method comprises the following steps:
s1, collecting image information: acquiring image information of an object to be monitored through a camera mechanism and sending the image information to a processor;
s2, image analysis and comparison: the processor processes the image by using image analysis software, compares the image information of the object to be monitored with the image information of the previous time period, judges whether the image information of the object to be monitored is changed, if not, the step is ended, and if so, the step goes to S3;
s3, alarming and reminding: the processor sends the change condition of the image information of the object to be monitored to the alarm mechanism, and the alarm mechanism reminds monitoring personnel;
s4, voice notification: the monitoring personnel inform the personnel at the position of the monitored object to be far away from the object to be monitored by using a voice transmission device;
s5, observing the integrity of the monitored object: after S4, the monitoring person observes the integrity of the monitored object through the camera mechanism, if the monitored object is not damaged, the step is finished, and if the monitored object is damaged intentionally or seriously by the person, the step is carried out to S6;
s6, character identity recognition: after the monitoring personnel receive the alarm information, the monitoring influence information is utilized, the person in the image is identified by the face characteristics, the person identity of the face image to be identified is determined, the processor sends the identification result to the client, the person is searched by the identity information of the person, and corresponding legal responsibility is carried out according to the behavior of the person.
Preferably, the camera shooting mechanism in S1 includes a camera, and the camera shooting mechanism further includes a storage module, where the storage module is used to store the influence information of the monitored object, and the storage module includes an SD card.
Preferably, the flow of the image analysis software in S2 is as follows: firstly, carrying out image analysis on an input image, automatically extracting characteristic values according to the color, shape and texture characteristics of an object or an area in the image and the combination of the characteristics, and then generating a classification function by the characteristic values; when image retrieval is carried out, image analysis is carried out on each given query graph, and image characteristic vectors are extracted; substituting the characteristic vector of the image into a classification function, calculating whether the image is matched with the initial image of the monitored object by using the classification function, and further judging whether the image information of the monitored object changes.
Preferably, the image feature vectors are screened according to the importance of features, and the feature vectors are substituted into a support vector classification function based on a radial basis kernel function.
Preferably, the alarm mechanism comprises an audible and visual alarm, and the audible and visual alarm is used for emitting sound and light and timely reminding monitoring personnel.
Preferably, the voice transmission device includes a microphone and a speaker, the microphone is disposed in the working range of the monitoring person, and the speaker is disposed on one side of the camera mechanism.
Preferably, the specific method for identifying the person in the image by using the facial features in S6 is as follows: in the training stage of the standard face image, the server side carries out illumination preprocessing, Gabor filtering, Gabor coefficient normalization, sub-window analysis and Gabor histogram statistics on the standard face image to obtain Gabor histogram features of the standard face image, pairwise combination is carried out on the standard face image, a weak classifier is constructed according to the Gabor histogram features of the standard face image, the weak classifier is screened out by using a preferred algorithm to form a strong classifier, and the Gabor histogram features of the standard face image corresponding to the strong classifier are the optimal Gabor histogram features of the standard face image; in the identification stage of the remote face image, the server side carries out illumination preprocessing, Gabor filtering, Gabor coefficient normalization, sub-window analysis and Gabor histogram statistics on the face image to be identified received from the client side, extracts the optimal Gabor histogram characteristics of the face image to be identified, compares the optimal Gabor histogram characteristics with the optimal Gabor histogram characteristics of a standard face image one by one to generate a sample to be identified, and classifies the sample to be identified according to a strong classifier obtained in the training stage, so that the character identity of the face image to be identified is determined.
Preferably, the process of the Gabor coefficient normalization is as follows: and carrying out normalization processing on Gabor coefficients of the pixel points obtained after the face image is subjected to Gabor filtering, so that values of the amplitude and the phase of the face image subjected to Gabor filtering are discretized.
Preferably, the process of sub-window analysis and Gabor histogram statistics is as follows: and extracting a statistical histogram of the Gabor coefficient corresponding to the face image in the sub-window area as Gabor histogram features of the face image.
Compared with the prior art, the invention has the beneficial effects that: the public facility is monitored by the camera shooting mechanism, monitoring personnel are conveniently reminded through the alarm function, when abnormal conditions occur, the monitoring personnel can immediately process the abnormal conditions, loss is reduced, meanwhile, the voice notification function is utilized, warning is conveniently sent, the condition that people intentionally damage the safety of the public facility is reduced, the safety of the public facility is improved, in addition, the identity of people damaging the public facility is conveniently recognized through recognizing the identity of the people, related legal responsibility is conveniently pursued, education is carried out, and the quality improvement of people is facilitated.
Drawings
Fig. 1 is a flowchart of a public safety remote identification method of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
Referring to fig. 1, the present invention provides a technical solution:
a public safety remote identification method comprises the following steps:
s1, collecting image information: acquiring image information of an object to be monitored through a camera mechanism and sending the image information to a processor;
s2, image analysis and comparison: the processor processes the image by using image analysis software, compares the image information of the object to be monitored with the image information of the previous time period, judges whether the image information of the object to be monitored is changed, if not, the step is ended, and if so, the step goes to S3;
s3, alarming and reminding: the processor sends the change condition of the image information of the object to be monitored to the alarm mechanism, and the alarm mechanism reminds monitoring personnel;
s4, voice notification: the monitoring personnel inform the personnel at the position of the monitored object to be far away from the object to be monitored by using a voice transmission device;
s5, observing the integrity of the monitored object: after S4, the monitoring person observes the integrity of the monitored object through the camera mechanism, if the monitored object is not damaged, the step is finished, and if the monitored object is damaged intentionally or seriously by the person, the step is carried out to S6;
s6, character identity recognition: after the monitoring personnel receive the alarm information, the monitoring influence information is utilized, the person in the image is identified by the face characteristics, the person identity of the face image to be identified is determined, the processor sends the identification result to the client, the person is searched by the identity information of the person, and corresponding legal responsibility is carried out according to the behavior of the person.
In this embodiment, preferably, the camera shooting mechanism in S1 includes a camera, and the camera shooting mechanism further includes a storage module, where the storage module is used to store the influence information of the monitored object, and the storage module includes an SD card.
In this embodiment, preferably, the flow of the image analysis software in S2 is as follows: firstly, carrying out image analysis on an input image, automatically extracting characteristic values according to the color, shape and texture characteristics of an object or an area in the image and the combination of the characteristics, and then generating a classification function by the characteristic values; when image retrieval is carried out, image analysis is carried out on each given query graph, and image characteristic vectors are extracted; substituting the characteristic vector of the image into a classification function, calculating whether the image is matched with the initial image of the monitored object by using the classification function, and further judging whether the image information of the monitored object changes.
In this embodiment, preferably, the image feature vectors are screened according to the importance of features, and the feature vectors are substituted into a support vector classification function based on a radial basis kernel function.
In this embodiment, preferably, the alarm mechanism includes an audible and visual alarm, and the audible and visual alarm is used for emitting sound and light and is used for timely reminding monitoring personnel.
In this embodiment, it is preferable that the voice transmission device includes a microphone and a speaker, the microphone is disposed in a working range of the monitoring person, and the speaker is disposed on a side of the camera mechanism.
In this embodiment, preferably, the specific method for identifying the person in the image by using the facial features in S6 is as follows: in the training stage of the standard face image, the server side carries out illumination preprocessing, Gabor filtering, Gabor coefficient normalization, sub-window analysis and Gabor histogram statistics on the standard face image to obtain Gabor histogram features of the standard face image, pairwise combination is carried out on the standard face image, a weak classifier is constructed according to the Gabor histogram features of the standard face image, the weak classifier is screened out by using a preferred algorithm to form a strong classifier, and the Gabor histogram features of the standard face image corresponding to the strong classifier are the optimal Gabor histogram features of the standard face image; in the stage of identity recognition of the remote face image, the server side carries out illumination preprocessing, Gabor filtering, Gabor coefficient normalization, sub-window analysis and Gabor histogram statistics on the face image to be recognized received from the client side, then extracts the optimal Gabor histogram characteristics of the face image to be recognized, compares the optimal Gabor histogram characteristics with the optimal Gabor histogram characteristics of the standard face image one by one to generate a sample to be recognized, and then classifies the sample to be recognized according to a strong classifier obtained in the stage of training, thereby determining the figure body of the face image to be recognized.
In this embodiment, preferably, the process of the Gabor coefficient normalization is as follows: and carrying out normalization processing on Gabor coefficients of the pixel points obtained after the face image is subjected to Gabor filtering, so that values of the amplitude and the phase of the face image subjected to Gabor filtering are discretized.
In this embodiment, preferably, the process of sub-window analysis and Gabor histogram statistics is as follows: and extracting a statistical histogram of the Gabor coefficient corresponding to the face image in the sub-window area as Gabor histogram features of the face image.
Example 2
Referring to fig. 1, the present invention provides a technical solution: a public safety remote identification method comprises the following steps:
s1, collecting image information: acquiring image information of an object to be monitored through a camera mechanism and sending the image information to a processor;
s2, image analysis and comparison: the processor processes the image by using image analysis software, compares the image information of the object to be monitored with the image information of the previous time period, judges whether the image information of the object to be monitored is changed, if not, the step is ended, and if so, the step goes to S3;
s3, alarming and reminding: the processor sends the change condition of the image information of the object to be monitored to the alarm mechanism, and the alarm mechanism reminds monitoring personnel;
s4, voice notification: the monitoring personnel inform the personnel at the position of the monitored object to be far away from the object to be monitored by using a voice transmission device;
s5, observing the integrity of the monitored object: after S4, the monitoring person observes the integrity of the monitored object through the camera mechanism, if the monitored object is not damaged, the step is finished, and if the monitored object is damaged intentionally or seriously by the person, the step is carried out to S6;
s6, character identity recognition: after the monitoring personnel receive the alarm information, the monitoring influence information is utilized, the person in the image is identified by the face characteristics, the person identity of the face image to be identified is determined, the processor sends the identification result to the client, the person is searched by the identity information of the person, and corresponding legal responsibility is carried out according to the behavior of the person.
In this embodiment, preferably, the camera shooting mechanism in S1 includes a camera, and the camera shooting mechanism further includes a storage module, where the storage module is used to store the influence information of the monitored object, and the storage module includes an SD card.
In this embodiment, preferably, the flow of the image analysis software in S2 is as follows: firstly, carrying out image analysis on an input image, automatically extracting characteristic values according to the color, shape and texture characteristics of an object or an area in the image and the combination of the characteristics, and then generating a classification function by the characteristic values; when image retrieval is carried out, image analysis is carried out on each given query graph, and image characteristic vectors are extracted; substituting the characteristic vector of the image into a classification function, calculating whether the image is matched with the initial image of the monitored object by using the classification function, and further judging whether the image information of the monitored object changes.
In this embodiment, preferably, the image feature vectors are screened according to the importance of features, and the feature vectors are substituted into a support vector classification function based on a radial basis kernel function.
In this embodiment, preferably, the alarm mechanism includes an audible and visual alarm, and the audible and visual alarm is used for emitting sound and light and is used for timely reminding monitoring personnel.
In this embodiment, it is preferable that the voice transmission device includes a microphone and a speaker, the microphone is disposed in a working range of the monitoring person, and the speaker is disposed on a side of the camera mechanism.
The working principle and the advantages of the invention are as follows: the public facility is monitored by the camera shooting mechanism, monitoring personnel are conveniently reminded through the alarm function, when abnormal conditions occur, the monitoring personnel can immediately process the abnormal conditions, loss is reduced, meanwhile, the voice notification function is utilized, warning is conveniently sent, the condition that people intentionally damage the safety of the public facility is reduced, the safety of the public facility is improved, in addition, the identity of people damaging the public facility is conveniently recognized through recognizing the identity of the people, related legal responsibility is conveniently pursued, education is carried out, and the quality improvement of people is facilitated.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that various changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, and these improvements and refinements should also be construed as within the scope of the invention.

Claims (9)

1. A public safety remote identification method is characterized by comprising the following steps:
s1, collecting image information: acquiring image information of an object to be monitored through a camera mechanism and sending the image information to a processor;
s2, image analysis and comparison: the processor processes the image by using image analysis software, compares the image information of the object to be monitored with the image information of the previous time period, judges whether the image information of the object to be monitored is changed, if not, the step is ended, and if so, the step goes to S3;
s3, alarming and reminding: the processor sends the change condition of the image information of the object to be monitored to the alarm mechanism, and the alarm mechanism reminds monitoring personnel;
s4, voice notification: the monitoring personnel inform the personnel at the position of the monitored object to be far away from the object to be monitored by using a voice transmission device;
s5, observing the integrity of the monitored object: after S4, the monitoring person observes the integrity of the monitored object through the camera mechanism, if the monitored object is not damaged, the step is finished, and if the monitored object is damaged intentionally or seriously by the person, the step is carried out to S6;
s6, character identity recognition: after the monitoring personnel receive the alarm information, the monitoring influence information is utilized, the person in the image is identified by the face characteristics, the person identity of the face image to be identified is determined, the processor sends the identification result to the client, the person is searched by the identity information of the person, and corresponding legal responsibility is carried out according to the behavior of the person.
2. A public safety remote identification method according to claim 1, wherein: the camera shooting mechanism in the S1 comprises a camera and a storage module, wherein the storage module is used for storing the influence information of the monitored object and comprises an SD card.
3. A public safety remote identification method according to claim 1, wherein: the flow of the image analysis software in S2 is as follows: firstly, carrying out image analysis on an input image, automatically extracting characteristic values according to the color, shape and texture characteristics of an object or an area in the image and the combination of the characteristics, and then generating a classification function by the characteristic values; when image retrieval is carried out, image analysis is carried out on each given query graph, and image characteristic vectors are extracted; substituting the characteristic vector of the image into a classification function, calculating whether the image is matched with the initial image of the monitored object by using the classification function, and further judging whether the image information of the monitored object changes.
4. A public safety remote identification method according to claim 3, wherein: the image feature vectors are screened according to the importance of features, and the feature vectors are substituted into a support vector classification function based on a radial basis kernel function.
5. A public safety remote identification method according to claim 1, wherein: the alarm mechanism comprises an audible and visual alarm which is used for emitting sound and light and reminding monitoring personnel in time.
6. A public safety remote identification method according to claim 1, wherein: the voice transmission device comprises a microphone and a loudspeaker, the microphone is arranged in the working range of monitoring personnel, and the loudspeaker is arranged on one side of the camera shooting mechanism.
7. A public safety remote identification method according to claim 1, wherein: the specific method for identifying the person in the image by using the face features in S6 is as follows: in the training stage of the standard face image, the server side carries out illumination preprocessing, Gabor filtering, Gabor coefficient normalization, sub-window analysis and Gabor histogram statistics on the standard face image to obtain Gabor histogram features of the standard face image, pairwise combination is carried out on the standard face image, a weak classifier is constructed according to the Gabor histogram features of the standard face image, the weak classifier is screened out by using a preferred algorithm to form a strong classifier, and the Gabor histogram features of the standard face image corresponding to the strong classifier are the optimal Gabor histogram features of the standard face image; in the identification stage of the remote face image, the server side carries out illumination preprocessing, Gabor filtering, Gabor coefficient normalization, sub-window analysis and Gabor histogram statistics on the face image to be identified received from the client side, extracts the optimal Gabor histogram characteristics of the face image to be identified, compares the optimal Gabor histogram characteristics with the optimal Gabor histogram characteristics of a standard face image one by one to generate a sample to be identified, and classifies the sample to be identified according to a strong classifier obtained in the training stage, so that the character identity of the face image to be identified is determined.
8. A public safety remote identification method according to claim 7, wherein: the process of Gabor coefficient normalization is as follows: and carrying out normalization processing on Gabor coefficients of the pixel points obtained after the face image is subjected to Gabor filtering, so that values of the amplitude and the phase of the face image subjected to Gabor filtering are discretized.
9. A public safety remote identification method according to claim 8, wherein: the process of sub-window analysis and Gabor histogram statistics is as follows: and extracting a statistical histogram of the Gabor coefficient corresponding to the face image in the sub-window area as Gabor histogram features of the face image.
CN202011209013.1A 2020-11-03 2020-11-03 Remote identification method for public security Withdrawn CN112200145A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011209013.1A CN112200145A (en) 2020-11-03 2020-11-03 Remote identification method for public security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011209013.1A CN112200145A (en) 2020-11-03 2020-11-03 Remote identification method for public security

Publications (1)

Publication Number Publication Date
CN112200145A true CN112200145A (en) 2021-01-08

Family

ID=74032975

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011209013.1A Withdrawn CN112200145A (en) 2020-11-03 2020-11-03 Remote identification method for public security

Country Status (1)

Country Link
CN (1) CN112200145A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116740654A (en) * 2023-08-14 2023-09-12 安徽博诺思信息科技有限公司 Substation operation prevention and control method based on image recognition technology

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116740654A (en) * 2023-08-14 2023-09-12 安徽博诺思信息科技有限公司 Substation operation prevention and control method based on image recognition technology
CN116740654B (en) * 2023-08-14 2023-11-07 安徽博诺思信息科技有限公司 Substation operation prevention and control method based on image recognition technology

Similar Documents

Publication Publication Date Title
CN110569720B (en) Audio and video intelligent identification processing method based on audio and video processing system
US6975346B2 (en) Method for suspect identification using scanning of surveillance media
WO2019127274A1 (en) Alarm method and device for criminal activity, storage medium and server
CN108647582A (en) Goal behavior identification and prediction technique under a kind of complex dynamic environment
CN103714631B (en) ATM cash dispenser intelligent monitor system based on recognition of face
CN109376577A (en) Video synthesis analysis method and system
CN106355154B (en) Method for detecting frequent passing of people in surveillance video
CN111127830A (en) Alarm method, alarm system and readable storage medium based on monitoring equipment
CN108583592A (en) A kind of subway service on buses or trains job information acquisition intelligent detecting method
CN112565676A (en) Method, system and equipment for identifying violation of on-duty personnel based on intelligent camera
KR101957677B1 (en) System for learning based real time guidance through face recognition and the method thereof
Nojiri et al. Discussion on machine learning and deep learning based makeup considered eye status recognition for driver drowsiness
KR101372860B1 (en) System for searching video and server for analysing video
CN111862413A (en) Method and system for realizing epidemic situation resistant non-contact multidimensional identity rapid identification
CN112183219A (en) Public safety video monitoring method and system based on face recognition
CN114666546B (en) Monitoring method and device for communication iron tower and communication iron tower
Moorthy et al. CNN based smart surveillance system: a smart IoT application post covid-19 era
CN112200145A (en) Remote identification method for public security
CN112804492B (en) Communication prompting method and device for electronic peepholes
CN109640041A (en) Intelligent video analysis system
CN108694388B (en) Campus monitoring method and device based on intelligent camera
CN112738471A (en) Security monitoring data processing method based on Internet of things and artificial intelligence and cloud communication server
CN111126186A (en) Human body target identity recognition method and device
Shamnath et al. Human Suspicious Activity Detection Using Ensemble Machine Learning Techniques
KR20150031059A (en) The Development Of CCTV For Security By Pattern Recognition Technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20210108

WW01 Invention patent application withdrawn after publication