CN113450522B - Video cable mixing intrusion detection method, electronic device and storage medium - Google Patents

Video cable mixing intrusion detection method, electronic device and storage medium Download PDF

Info

Publication number
CN113450522B
CN113450522B CN202110590119.9A CN202110590119A CN113450522B CN 113450522 B CN113450522 B CN 113450522B CN 202110590119 A CN202110590119 A CN 202110590119A CN 113450522 B CN113450522 B CN 113450522B
Authority
CN
China
Prior art keywords
detection result
mixing
line
touch
video
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110590119.9A
Other languages
Chinese (zh)
Other versions
CN113450522A (en
Inventor
魏紫薇
徐狄权
刘溯
蒲涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Dahua Technology Co Ltd
Original Assignee
Zhejiang Dahua Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Dahua Technology Co Ltd filed Critical Zhejiang Dahua Technology Co Ltd
Priority to CN202110590119.9A priority Critical patent/CN113450522B/en
Publication of CN113450522A publication Critical patent/CN113450522A/en
Application granted granted Critical
Publication of CN113450522B publication Critical patent/CN113450522B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19606Discriminating between target movement or movement in an area of interest and other non-signicative movements, e.g. target movements induced by camera shake or movements of pets, falling leaves, rotating fan
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

The application relates to a video cable mixing intrusion detection method, an electronic device and a storage medium, wherein the video cable mixing intrusion detection method comprises the following steps: acquiring a first detection result aiming at a first wire mixing and a second detection result aiming at a second wire mixing, wherein the first wire mixing and the second wire mixing are arranged at the security and protection perimeter in the monitoring video at intervals; according to the method and the device, whether the video accompanying line invasion action occurs or not is judged according to whether the first detection result, the second detection result and the relation between the first detection result and the second detection result meet corresponding preset conditions or not, and if yes, decision making and alarming are carried out.

Description

Video cable mixing intrusion detection method, electronic device and storage medium
Technical Field
The present application relates to the field of cable-mixing detection, and in particular, to a method and an apparatus for detecting intrusion by mixing video cable, an electronic apparatus, and a storage medium.
Background
With the increasing amount of monitoring data, monitoring personnel need to spend a lot of time to manually filter the data and select useful video information from the data, and the tedious and repeated work often makes the monitoring personnel unconscious. There is a pressing need for a product that is easier to work with and easier to operate and manage by monitoring personnel to replace the existing systems. Therefore, the intelligent video technology is produced at the same time and enters the life of people. Intelligent video introduces computer vision methods into intelligent monitoring. This technology includes the automatic detection of moving or still objects, object classification and behavioral understanding from a sequence of video images in order to create a mapping between the images and the image descriptions, thereby enabling a computer to analyze and understand the content in the video frames. The mixed line target detection technology is an important technology in intelligent video analysis, and has wide application prospects in the applications of intrusion detection, people flow statistics and the like.
The existing line-blending detection method mainly comprises the steps of marking a line blending line in a video, and determining whether a target crosses a set warning line by judging whether a target detection frame in the video touches the line blending line, but grass, leaves and the like can touch the line blending line when wind blows in the environment in scenes such as grasslands, leaves and the like, and under the conditions, the traditional line-blending detection method is easy to cause false alarm.
At present, an effective solution is not provided aiming at the problem of easily causing false alarm in the related technology.
Disclosure of Invention
The embodiment of the application provides a video cable mixing intrusion detection method, an electronic device and a storage medium, so as to at least solve the problem of easily causing false alarm in the related technology.
In a first aspect, an embodiment of the present application provides a video cable mixing intrusion detection method, including:
the method comprises the steps of obtaining a first detection result aiming at a first mixing line and a second detection result aiming at a second mixing line, wherein the first mixing line and the second mixing line are arranged at a security and protection perimeter in a monitoring video at intervals;
and judging whether a video wire mixing invasion action occurs according to whether the first detection result, the second detection result and the relation between the first detection result and the second detection result meet corresponding preset conditions, and if so, performing decision-making alarm.
In some embodiments, the first detection result and/or the second detection result comprises at least one of: whether touch occurs, the characteristics of the touch target, the touch time and the touch direction.
In some embodiments, the determining whether the video cable-scrambling intrusion behavior occurs according to whether the first detection result, the second detection result, and the relationship between the first detection result and the second detection result satisfy the corresponding preset conditions includes:
judging whether the first detection result and the second detection result meet a first preset condition or not; and if so, judging whether the video cable mixing invasion action occurs according to whether the relation between the first detection result and the second detection result meets a second preset condition.
In some of these embodiments, the first preset condition includes: the first detection result comprises that the first wire mixing is touched, and the second detection result comprises that the second wire mixing is touched.
In some of these embodiments, the second preset condition includes at least one of:
the characteristics of the touch target in the first detection result are consistent with the characteristics of the touch target in the second detection result;
the time interval between the touch time in the first detection result and the touch time in the second detection result is less than or equal to a time threshold;
the touch direction in the first detection result is consistent with the touch direction in the second detection result, wherein the touch direction comprises a first touch direction and a second touch direction, the first touch direction is a direction in which the first mixing line faces the second mixing line, and the second touch direction is a direction in which the second mixing line faces the first mixing line.
In some of these embodiments, the time threshold is equal to or less than 30 seconds.
In some embodiments, before the obtaining the first detection result for the first swizzle and the second detection result for the second swizzle, the method further comprises:
a first stirring line and a second stirring line are arranged at a security and protection perimeter in a monitoring video, and the first stirring line and the second stirring line are associated.
In some embodiments, the setting of the first mixing line and the second mixing line in the monitoring video specifically includes:
and setting the first mixing line and the second mixing line according to the size proportional relation between the monitoring video and the actual scene, so that the distance between the first mixing line and the second mixing line meets the condition that the distance between the position corresponding to the first mixing line and the position corresponding to the second mixing line in the actual scene is more than 0 meter and less than 4 meters.
In some embodiments, the first mixing line and the second mixing line are arranged in parallel.
In a second aspect, an embodiment of the present application provides an electronic device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor executes the computer program to implement the method for detecting intrusion of a video cable according to the first aspect.
In a third aspect, an embodiment of the present application provides a storage medium, on which a computer program is stored, and when the program is executed by a processor, the method for detecting a video cable intrusion according to the first aspect is implemented.
Compared with the related art, the video cable mixing intrusion detection method, the electronic device and the storage medium provided by the embodiment of the application have the advantages that a first detection result for a first cable mixing and a second detection result for a second cable mixing are obtained, wherein the first cable mixing and the second cable mixing are arranged at intervals at a security and protection perimeter in a monitoring video; whether the first detection result, the second detection result and the relation between the first detection result and the second detection result meet corresponding preset conditions or not is judged, decision-making alarm is carried out according to the judgment result, the problem that false alarm is easily caused during wire mixing intrusion detection is solved, and intrusion target detection is realized and corresponding alarm is triggered according to the detection result.
The details of one or more embodiments of the application are set forth in the accompanying drawings and the description below to provide a more concise and understandable description of the application, and features, objects, and advantages of the application.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a block diagram of a hardware structure of an application terminal of a video cable mixing intrusion detection method according to an embodiment of the present application;
FIG. 2 is a flow chart of a method for detecting a garbled video intrusion according to an embodiment of the present application;
FIG. 3 is a flow chart of yet another method for video cable-around intrusion detection according to an embodiment of the present application;
FIG. 4 is a flow chart of yet another method for detecting a garbled video intrusion according to an embodiment of the present application;
fig. 5 is a flow chart of another method for detecting a whistling intrusion of a video cable according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be described and illustrated below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments provided in the present application without any inventive step are within the scope of protection of the present application. Moreover, it should be appreciated that such a development effort might be complex and tedious, but would nevertheless be a routine undertaking of design, fabrication, and manufacture for those of ordinary skill having the benefit of this disclosure, given the benefit of this disclosure, without departing from the scope of this disclosure.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the specification. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is to be expressly and implicitly understood by one of ordinary skill in the art that the embodiments described herein may be combined with other embodiments without conflict.
Unless defined otherwise, technical or scientific terms referred to herein shall have the ordinary meaning as understood by those of ordinary skill in the art to which this application belongs. Reference to "a," "an," "the," and similar words throughout this application are not to be construed as limiting in number, and may refer to the singular or the plural. The present application is directed to the use of the terms "including," "comprising," "having," and any variations thereof, which are intended to cover non-exclusive inclusions; for example, a process, method, system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to the listed steps or elements, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. Reference to "connected," "coupled," and the like in this application is not intended to be limited to physical or mechanical connections, but rather can include electrical connections, whether direct or indirect. Reference herein to "a plurality" means greater than or equal to two. "and/or" describes the association relationship of the associated object, indicating that there may be three relationships, for example, "a and/or B" may indicate: a exists alone, A and B exist simultaneously, and B exists alone. Reference herein to the terms "first," "second," "third," and the like, are merely to distinguish similar objects and do not denote a particular ordering for the objects.
The method provided by the embodiment can be executed in a terminal, a computer or a similar operation device. Taking the example of the method running on a terminal, fig. 1 is a block diagram of a hardware structure of an application terminal of the video cable-mixing intrusion detection method according to the embodiment of the present application. As shown in fig. 1, the terminal may include one or more (only one shown in fig. 1) processors 102 (the processor 102 may include, but is not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA) and a memory 104 for storing data, and optionally, a transmission device 106 for communication functions and an input-output device 108. It will be understood by those skilled in the art that the structure shown in fig. 1 is only an illustration and is not intended to limit the structure of the terminal. For example, the terminal may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1.
The memory 104 may be used to store a computer program, for example, a software program and a module of an application software, such as a computer program corresponding to the video cable intrusion detection method in the embodiment of the present invention, and the processor 102 executes various functional applications and data processing by running the computer program stored in the memory 104, so as to implement the method described above. The memory 104 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory located remotely from the processor 102, which may be connected to the terminal over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device 106 is used to receive or transmit data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of the terminal. In one example, the transmission device 106 includes a Network adapter (NIC) that can be connected to other Network devices through a base station to communicate with the internet. In one example, the transmission device 106 may be a Radio Frequency (RF) module, which is used to communicate with the internet in a wireless manner.
Fig. 2 is a flowchart of a method for detecting mixed video cable intrusion according to an embodiment of the present application, and as shown in fig. 2, the flowchart includes the following steps:
step S201, a first detection result for a first wire mixing and a second detection result for a second wire mixing are obtained, where the first wire mixing and the second wire mixing are arranged at intervals at a security perimeter in a monitoring video.
In a cell monitoring scene, in order to ensure the safety of residents in a cell, a mixing line is arranged at a cell fence in a monitoring video to detect people invading the cell, and in order to avoid the influence of branches, leaves and grass at the cell fence on detection, a first mixing line and a second mixing line are arranged at intervals at the cell fence in the monitoring video.
Step S202, judging whether the video trace invasion action occurs according to whether the first detection result, the second detection result and the relation between the first detection result and the second detection result meet corresponding preset conditions, and if so, performing decision-making alarm.
If the first mixing line and the second mixing line are arranged at the fence of the community in the monitoring video at intervals, and a person is found to touch the first mixing line and the second mixing line, the person sequentially passes through the first mixing line and the second mixing line from one side of the first mixing line, and the time interval of the person passing through the two mixing lines is smaller than the set time interval, the person is judged to invade the community, and an alarm is triggered to inform residents and police in the community.
Through the steps S201 to S202, a first detection result for a first cable mixing and a second detection result for a second cable mixing are obtained, wherein the first cable mixing and the second cable mixing are arranged at intervals at a security and protection perimeter in a monitoring video; whether the first detection result, the second detection result and the relation between the first detection result and the second detection result meet corresponding preset conditions or not is judged, decision-making alarm is carried out according to the judgment result, the problem that false alarm is easily caused during wire mixing intrusion detection is solved, and intrusion target detection is realized and corresponding alarm is triggered according to the detection result.
In some embodiments, the first detection result and/or the second detection result includes at least one of: whether touch occurs or not, the characteristics of the touch target, the touch time and the touch direction.
In some embodiments, the step S202 of determining whether the video cable intrusion behavior occurs according to whether the first detection result, the second detection result and the relationship between the first detection result and the second detection result satisfy the corresponding predetermined condition includes the following steps:
step S2020, determining whether the first detection result and the second detection result satisfy a first preset condition;
step S2021, if yes, determining whether a video cable-mixing intrusion behavior occurs according to whether a relationship between the first detection result and the second detection result satisfies a second preset condition.
Through the steps, under the condition that the first detection result and the second detection result meet the first preset condition, whether the relation between the first detection result and the second detection result meets the second preset condition or not is judged, if the relation between the first detection result and the second detection result meets the second preset condition, the video wire mixing invasion behavior is shown, the invasion target is detected through the association of two wire mixing, the influence of branches, leaves and grass of wire mixing accessories on the detection result is avoided, and the false alarm when the target is detected through one wire mixing is reduced.
In some of these embodiments, the first preset condition comprises: the first detection result comprises that the first wire mixing is touched, and the second detection result comprises that the second wire mixing is touched.
In this embodiment, if one of the first wire mixing line and the second wire mixing line is not touched, it is not determined whether the first detection result and the second detection result satisfy the second preset condition, and further the alarm is not triggered.
In some of these embodiments, the second preset condition includes at least one of:
the characteristics of the touch target in the first detection result are consistent with the characteristics of the touch target in the second detection result;
the time interval between the touch moment in the first detection result and the touch moment in the second detection result is less than or equal to a time threshold;
the touch direction in the first detection result is consistent with the touch direction in the second detection result, wherein the touch direction includes a first touch direction and a second touch direction, the first touch direction is a direction in which the first mixing line faces the second mixing line, and the second touch direction is a direction in which the second mixing line faces the first mixing line.
In this embodiment, if the characteristics of the touch target in the first detection result are the same as the characteristics of the touch target in the second detection result, it indicates that the same intrusion target triggers the first wire mixing and the second wire mixing.
In some embodiments, whether the relationship between the first detection result and the second detection result satisfies the second predetermined condition includes the following steps:
in step S210, it is determined whether the characteristics of the touch target in the first detection result are consistent with the characteristics of the touch target in the second detection result, if yes, the process proceeds to step S211.
In step S211, it is determined that the time interval between the touch time in the first detection result and the touch time in the second detection result is less than or equal to the time threshold, if yes, the process proceeds to step S212.
And step S212, triggering an alarm.
Through the steps, the alarm is triggered only when the relation between the first detection result and the second detection result is judged to meet the second preset condition, so that the generation of false alarm is reduced.
Alternatively, whether the relationship between the first detection result and the second detection result satisfies the second predetermined condition includes the following steps:
in step S220, it is determined whether the characteristics of the touch target in the first detection result are consistent with the characteristics of the touch target in the second detection result, if yes, the process proceeds to step S221.
Step S221, determining that the touch direction in the first detection result is consistent with the touch direction in the second detection result, if yes, entering step S222.
Step S222, triggering an alarm.
Through the steps, the alarm is triggered under the condition that the relation between the first detection result and the second detection result is judged to meet the second preset condition, and the generation of false alarm is reduced.
In some embodiments, whether the relationship between the first detection result and the second detection result satisfies the second predetermined condition includes the following steps:
in step S230, it is determined whether the characteristics of the touch target in the first detection result are consistent with the characteristics of the touch target in the second detection result, if yes, the process proceeds to step S231.
In step S231, it is determined that the time interval between the touch time in the first detection result and the touch time in the second detection result is less than or equal to the time threshold, and if yes, the process proceeds to step S232.
In step S232, it is determined that the touch direction in the first detection result is the same as the touch direction in the second detection result, and if yes, the process proceeds to step S233.
And step S233, triggering an alarm.
Through the steps, the alarm is triggered under the condition that the relation between the first detection result and the second detection result is judged to meet the second preset condition, and the generation of false alarm is reduced.
It should be noted that, in the above embodiments, the order of the steps is listed for illustration only, and this should not be construed as a limitation to the technical solution of the present application. In practical applications, the steps of determining may be performed in any order, that is, the order of performing steps S230 to S232 is not limited, for example, step S232 may be performed before step S231; similarly, the execution sequence between step S210 and step S211 and the execution sequence between step S220 and step S221 are not limited.
In some of these embodiments, the time threshold is equal to or less than 30 seconds.
In some embodiments, before obtaining the first detection result for the first swizzle line and the second detection result for the second swizzle line, the method further comprises: a first mixing line and a second mixing line are arranged at the security and protection perimeter in the monitoring video, and the first mixing line and the second mixing line are associated.
Through the mode, the two mixing lines are arranged in the monitoring video and are associated, and preparation is made for intrusion target detection according to the two mixing lines subsequently.
In some embodiments, the setting of the first mixing line and the second mixing line in the monitoring video specifically includes:
according to the size proportional relation between the monitoring video and the actual scene, a first mixing line and a second mixing line are arranged, so that the distance between the first mixing line and the second mixing line meets the condition that the distance between the position corresponding to the first mixing line and the position corresponding to the second mixing line in the actual scene is larger than 0 meter and smaller than 4 meters.
In a cell monitoring scene, in order to ensure the safety of residents in a cell, a wire mixing is arranged at a cell fence in a monitoring video to detect people invading the cell, in order to avoid the influence of branches, leaves and grass at the cell fence on detection, the influence range of the branches, leaves and grass is 2 meters, a person A is in the monitoring video, the height of the person A in the monitoring video is H, the height of the person A in the actual scene is H, the size proportional relation between the monitoring video and the actual scene is calculated according to the H and the H, and the distance between a first wire mixing and a second wire mixing in the monitoring video is obtained by multiplying the size proportional relation between the corresponding monitoring video and the actual scene by 2 meters.
Through the mode, the distance between the first mixing line and the second mixing line in the monitoring video can be set according to the actual monitoring scene.
In some embodiments, the first mixing line and the second mixing line are arranged in parallel.
Fig. 3 is a flowchart of another video cable-mixing intrusion detection method according to an embodiment of the present application, where as shown in fig. 3, the flowchart includes the following steps:
step S301, a first mixing line and a second mixing line are arranged at the security and protection perimeter in the monitoring video, and the first mixing line and the second mixing line are related.
According to the size proportion relation of the monitoring video and the actual scene, a first mixing line and a second mixing line are arranged, so that the distance between the first mixing line and the second mixing line meets the condition that the distance between the position corresponding to the first mixing line and the position corresponding to the second mixing line in the actual scene is larger than 0 meter and smaller than 4 meters, and the enabling of the first mixing line and the enabling of the second mixing line are related, wherein the arrangement directions of the first mixing line and the second mixing line are parallel.
In step S302, a first detection result for the first wire mixing and a second detection result for the second wire mixing are obtained.
The first detection result and/or the second detection result comprises at least one of the following: whether touch occurs, the characteristics of the touch target, the touch time and the touch direction.
Step S303, determining whether the first detection result and the second detection result satisfy a first predetermined condition.
The first preset condition includes: the first detection result comprises that the first mixing line touches, and the second detection result comprises that the second mixing line touches.
If the first detection result and the second detection result satisfy the first preset condition, the method proceeds to step S304, and if not, the method proceeds to step S306.
In step S304, it is determined whether the relationship between the first detection result and the second detection result satisfies a second predetermined condition.
The second preset condition includes at least one of:
(1) The characteristics of the touch target in the first detection result are consistent with the characteristics of the touch target in the second detection result.
(2) The time interval between the touch moment in the first detection result and the touch moment in the second detection result is less than or equal to a time threshold, wherein the time threshold is less than or equal to 30 seconds.
(3) The touch direction in the first detection result is consistent with the touch direction in the second detection result, wherein the touch direction includes a first touch direction and a second touch direction, the first touch direction is a direction in which the first wire mixing faces the second wire mixing, and the second touch direction is a direction in which the second wire mixing faces the first wire mixing.
If the relationship between the first detection result and the second detection result satisfies the second predetermined condition, the process proceeds to step S305, and if not, the process proceeds to step S306.
Step S305, an alarm is generated.
And step S306, ending the video cable mixing detection process.
Through the steps, a first detection result aiming at the first wire mixing and a second detection result aiming at the second wire mixing are obtained, whether the first detection result, the second detection result and the relation between the first detection result and the second detection result meet corresponding preset conditions or not is judged, decision alarm is carried out according to the judgment result, the problem of false alarm easily caused during wire mixing intrusion detection is solved, and the detection of an intrusion target and the triggering of corresponding alarm according to the detection result are realized.
Fig. 4 is a flowchart of another video cable mixing intrusion detection method according to an embodiment of the present application, and as shown in fig. 4, the flowchart includes the following steps:
step S401, setting intrusion rules of two mixing lines.
The method comprises the steps of obtaining a monitoring video through a camera, drawing two stirring lines in the monitoring video according to the perimeter position of security protection, wherein the two stirring lines are a first stirring line and a second stirring line respectively, and the size range of an invasion target is set.
In step S402, it is determined whether the enable associated with the two scramble lines is on, and if so, the process proceeds to step S403, and if not, the process proceeds to step S408.
The two mixing lines are associated through one enable, so that the detection result of the first mixing line and the detection result of the second mixing line can be obtained, and preparation is made for judging whether to alarm or not according to the detection results of the two mixing lines and the combination relation between the two mixing lines.
And step S403, setting a combination rule between the two mixing lines.
The combination rule between the two mixed lines comprises a time interval between the target crossing the first mixed line and the second mixed line and a direction relation between the target crossing the two mixed lines, the direction relation between the target crossing the two mixed lines comprises that the direction of the target crossing the first mixed line is consistent with the direction of the target crossing the second mixed line and the direction of the target crossing the first mixed line is inconsistent with the direction of the target crossing the second mixed line, and the directions of the two mixed lines comprise the left side of the mixed line and the right side of the mixed line.
Step S404, judging whether the target passes through the first wire mixing according to the intrusion rule, if so, entering step S405, and if not, entering step S408.
Detecting a target in a surveillance video based on a deep learning algorithm, identifying a target detection frame in the surveillance video, judging whether the target detection frame is in a set size range or not when the target detection frame is found to be in touch with a set first blending line, if so, entering step S405, and if not, entering step S408.
Step S405, judging whether the target passes through the second wire mixing according to the intrusion rule, if so, entering step S406, and if not, entering step S408.
Detecting a target in the surveillance video based on a deep learning algorithm, identifying a target detection frame in the surveillance video, judging whether the target detection frame is in a set size range or not when the target detection frame is found to be in touch with a set second blending line, if so, entering step S406, and if not, entering step S408.
Step S406, determining whether the relationship between the first wire-mixing detection result and the second wire-mixing detection result satisfies a combination rule between the two, if yes, going to step S407, otherwise, going to step S408.
Under the condition that the target passes through the first mixed line and the second mixed line, judging whether the direction of the target passing through the first mixed line is consistent with the direction of the target passing through the second mixed line, if so, judging whether the time interval of the target passing through the two mixed lines is smaller than a set threshold value S, wherein the threshold value S is determined according to the distance between the two mixed lines in the actual monitoring picture and the advancing speed of the target, if so, entering step S407, otherwise, entering step S408.
Step S407, an alarm is generated.
Step S408, the video cable mixing detection process is ended.
And (5) indicating that the target does not meet the alarm condition, and ending the video wire mixing detection process.
Assuming that people A and B appear in a camera picture, setting in advance that an alarm is generated when A crosses the left side of a first mixed line, A crosses the left side of a second mixed line and the time interval between the A crossing the first mixed line and the second mixed line is less than 8 seconds, setting that an alarm is generated when B crosses the right side of the first mixed line, B crosses the right side of the second mixed line and the time interval between the B crossing the first mixed line and the second mixed line is less than 8 seconds, and avoiding the alarm when a person crosses the two mixed lines and meets the following conditions:
(1) A passes through the left side of the first mixing line, and A does not pass through the second mixing line, so that no alarm is generated.
(2) A passes through the left side of the first mixing line, then A passes through the left side of the second mixing line, the interval time is more than 8 seconds, and no alarm is generated.
(3) A passes through the right of the first mixing line, and then A passes through the right of the second mixing line, no alarm is generated no matter how many intervals are.
(4) B passes through the left side of the first mixing line, and then B passes through the left side of the second mixing line, and no alarm is generated no matter how long the interval time is.
(5) B passes through the right side of the first mixing line, then B passes through the right side of the second mixing line, the interval time is more than 8 seconds, and no alarm is generated.
(6) B passes through the right side of the first mixing line, B does not pass through the second mixing line, and no alarm is generated.
Through the steps, two stirring lines are arranged according to the actual security and protection perimeter, and under the condition that the target simultaneously passes through the first stirring line and the second stirring line, if the direction of the target passing through the two stirring lines is consistent and the time interval between the target passing through the first stirring line and the second stirring line in sequence meets the preset threshold value S, an alarm is sent out, so that the linkage alarm between the two stirring lines is realized, and the false alarm is reduced.
Fig. 5 is a flowchart of another video cable mixing intrusion detection method according to an embodiment of the present application, and as shown in fig. 5, the flowchart includes the following steps:
step 501, setting an intrusion rule of three mixing lines.
The method comprises the steps of obtaining a monitoring video through a camera, drawing three mixing lines in the monitoring video according to the perimeter position of security protection, respectively setting a first mixing line, a second mixing line and a third mixing line according to the sequence that a target passes through the mixing lines, and setting intrusion rules of the first mixing line, the second mixing line and the third mixing line, wherein the intrusion rules include that the size range of an intruded target is set to be P.
Step S502 determines whether the enable associated with the three wire mixes is on, if so, the process proceeds to step S503, and if not, the process proceeds to step S509.
The three wire mixing lines are associated through one enable, so that the detection result of the first wire mixing line, the detection result of the second wire mixing line and the detection result of the third wire mixing line can be obtained, and preparation is made for judging whether to alarm or not according to the detection results of the three wire mixing lines and the combination relation among the three wire mixing lines.
Step S503, a combination rule among the three mixing lines is set.
The combination rule among the three mixed lines comprises a time interval when the target passes through the first mixed line and the second mixed line, a time interval when the target passes through the second mixed line and the third mixed line and a direction relation when the target passes through the three mixed lines, wherein the direction relation when the target passes through the three mixed lines comprises that the direction of the target passing through the three mixed lines is consistent and the direction of the target passing through the three mixed lines is inconsistent, and the directions of the three mixed lines comprise the left side of the mixed lines and the right side of the mixed lines.
Step S504 is to determine whether the target crosses the first wire mixing according to the intrusion rule, if yes, step S505 is performed, and if no, step S509 is performed.
Detecting a target in a surveillance video based on a deep learning algorithm, identifying a target detection frame in the surveillance video, setting the size range of the invaded target to be P, judging whether the size of the invaded target is in the range P or not when the target detection frame is found to be touched with a set first mixed line, if so, entering step S505, and if not, entering step S509.
Step S505, according to the intrusion rule, determines whether the target crosses the second wire mixing, if yes, the process goes to step S506, and if no, the process goes to step S509.
When the target detection frame is touched with the set second wire, whether the size of the invaded target is within the range P is judged, if yes, the step S506 is executed, and if not, the step S509 is executed.
Step S506, determining whether the target crosses the third wire mixing according to the intrusion rule, if yes, going to step S507, and if no, going to step S509.
When the target detection frame is touched with the set third wire, whether the size of the invaded target is within the range P is judged, if yes, the step S507 is executed, and if not, the step S509 is executed.
In step S507, it is determined whether the relationship between the first wire mixing detection result and the second wire mixing detection result satisfies a combination rule between the two, if yes, the process proceeds to step S508, and if no, the process proceeds to step S509.
If the target passes through the first mixed line, the second mixed line and the third mixed line, judging whether the direction of the target passing through the first mixed line is consistent with the direction of the target passing through the second mixed line and whether the direction of the target passing through the second mixed line is consistent with the direction of the target passing through the third mixed line, if the direction of the target passing through the first mixed line is consistent with the direction of the target passing through the second mixed line and the direction of the target passing through the third mixed line is consistent, judging whether the time interval of the target passing through the first mixed line and the second mixed line is smaller than a set first threshold value and whether the time interval of the target passing through the second mixed line and the third mixed line is smaller than a set second threshold value, wherein the first threshold value is determined according to the distance between the first mixed line and the second mixed line in an actual monitoring picture and the advancing speed of the target, the second threshold value is determined according to the distance between the second mixed line and the third mixed line in the actual monitoring picture and the advancing speed of the target, and whether the time interval of the target passing through the second mixed line in the actual monitoring picture and the actual monitoring picture is smaller than a set first threshold value and the time interval of the target is smaller than a set second mixed line, and the time interval of the target entering a second mixed line S508, and the second mixed line entering the step S509, and if the target entering the step.
Step S508, an alarm is generated.
In step S509, the video-blending detection process is ended.
And (5) indicating that the target does not meet the alarm condition, and ending the video wire mixing detection process.
Through the steps, three mixing lines are arranged according to the actual security and protection perimeter, and under the condition that the judging target simultaneously passes through the first mixing line, the second mixing line and the third mixing line, if the judging target passes through the three mixing lines in the same direction, the time interval between the first mixing line and the second mixing line which are sequentially passed through by the judging target meets the preset first threshold value, and the time interval between the second mixing line and the third mixing line which are sequentially passed through by the judging target meets the preset second threshold value, an alarm is given out, linkage alarm among the three mixing lines is realized, and false alarm is reduced.
The present embodiment also provides an electronic device comprising a memory having a computer program stored therein and a processor configured to execute the computer program to perform the steps of any of the above method embodiments.
Optionally, the electronic apparatus may further include a transmission device and an input/output device, wherein the transmission device is connected to the processor, and the input/output device is connected to the processor.
Optionally, in this embodiment, the processor may be configured to execute the following steps by a computer program:
and acquiring a first detection result aiming at the first wire mixing and a second detection result aiming at the second wire mixing, wherein the first wire mixing and the second wire mixing are arranged at the security and protection perimeter in the monitoring video at intervals.
And judging whether the first detection result, the second detection result and the relation between the first detection result and the second detection result meet corresponding preset conditions or not, and performing decision alarm according to the judgment result.
It should be noted that, for specific examples in this embodiment, reference may be made to examples described in the foregoing embodiments and optional implementations, and details of this embodiment are not described herein again.
In addition, in combination with the video cable mixing intrusion detection method in the foregoing embodiment, the embodiment of the present application may provide a storage medium to implement. The storage medium having stored thereon a computer program; the computer program, when executed by a processor, implements any of the above-described embodiments of a method for video cable intrusion detection.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above may be implemented by hardware instructions of a computer program, which may be stored in a non-volatile computer-readable storage medium, and when executed, may include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
It should be understood by those skilled in the art that various features of the above embodiments can be combined arbitrarily, and for the sake of brevity, all possible combinations of the features in the above embodiments are not described, but should be considered as within the scope of the present disclosure as long as there is no contradiction between the combinations of the features.
The above examples only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (8)

1. A video cable mixing intrusion detection method is characterized by comprising the following steps:
acquiring a first detection result aiming at a first wire mixing and a second detection result aiming at a second wire mixing, wherein the first wire mixing and the second wire mixing are arranged at a security and protection perimeter in a monitoring video at intervals;
judging whether a video trace invasion behavior occurs according to whether the first detection result, the second detection result and the relation between the first detection result and the second detection result meet corresponding preset conditions, and if so, performing decision-making alarm;
the judging whether the video accompanying line intrusion behavior occurs according to whether the first detection result, the second detection result and the relation between the first detection result and the second detection result meet corresponding preset conditions includes:
judging whether the first detection result and the second detection result meet a first preset condition or not; if so, judging whether a video cable mixing invasion behavior occurs according to whether the relation between the first detection result and the second detection result meets a second preset condition;
the first preset condition includes: the first detection result comprises that the first wire mixing is touched, and the second detection result comprises that the second wire mixing is touched;
the second preset condition includes at least one of:
the characteristics of the touch target in the first detection result are consistent with the characteristics of the touch target in the second detection result;
the time interval between the touch moment in the first detection result and the touch moment in the second detection result is less than or equal to a time threshold;
the touch direction in the first detection result is consistent with the touch direction in the second detection result, wherein the touch direction comprises a first touch direction and a second touch direction, the first touch direction is a direction in which the first wire mixing direction is towards the second wire mixing direction, and the second touch direction is a direction in which the second wire mixing direction is towards the first wire mixing direction.
2. The method of claim 1, wherein the first detection result and/or the second detection result comprises at least one of: whether touch occurs, the characteristics of the touch target, the touch time and the touch direction.
3. The video cable intrusion detection method of claim 1, wherein the time threshold is less than or equal to 30 seconds.
4. The method of claim 1, wherein prior to the obtaining the first detection result for the first scrambling and the second detection result for the second scrambling, the method further comprises:
a first mixing line and a second mixing line are arranged at the security and protection perimeter in the monitoring video, and the first mixing line and the second mixing line are associated.
5. The method of claim 4, wherein the step of setting a first cable mixing and a second cable mixing in the surveillance video comprises:
and setting the first mixing line and the second mixing line according to the size proportional relation between the monitoring video and the actual scene, so that the distance between the first mixing line and the second mixing line meets the condition that the distance between the position corresponding to the first mixing line and the position corresponding to the second mixing line in the actual scene is more than 0 meter and less than 4 meters.
6. The method of claim 1, wherein the first cable blend is disposed in a direction parallel to a direction of the second cable blend.
7. An electronic device comprising a memory and a processor, wherein the memory stores a computer program, and the processor is configured to execute the computer program to perform the video cable intrusion detection method of any one of claims 1 to 6.
8. A storage medium having a computer program stored thereon, wherein the computer program is configured to perform the method of video cable intrusion detection according to any one of claims 1 to 6 when the computer program is run.
CN202110590119.9A 2021-05-28 2021-05-28 Video cable mixing intrusion detection method, electronic device and storage medium Active CN113450522B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110590119.9A CN113450522B (en) 2021-05-28 2021-05-28 Video cable mixing intrusion detection method, electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110590119.9A CN113450522B (en) 2021-05-28 2021-05-28 Video cable mixing intrusion detection method, electronic device and storage medium

Publications (2)

Publication Number Publication Date
CN113450522A CN113450522A (en) 2021-09-28
CN113450522B true CN113450522B (en) 2022-10-04

Family

ID=77810391

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110590119.9A Active CN113450522B (en) 2021-05-28 2021-05-28 Video cable mixing intrusion detection method, electronic device and storage medium

Country Status (1)

Country Link
CN (1) CN113450522B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104902246A (en) * 2015-06-17 2015-09-09 浙江大华技术股份有限公司 Video monitoring method and device
CN104992149A (en) * 2015-06-24 2015-10-21 福建星网锐捷安防科技有限公司 Mixing line detection method, mixing line detection system, network video camera and monitoring system
CN105389920A (en) * 2015-11-30 2016-03-09 北京正安维视科技股份有限公司 Perimeter alarm method based on two-dimensional laser radar and video analysis

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3704706B2 (en) * 2002-03-13 2005-10-12 オムロン株式会社 3D monitoring device
AU2004262060B2 (en) * 2003-08-01 2009-10-01 Senstar Corporation Cable guided intrusion detection sensor, system and method
CN103152554B (en) * 2013-03-08 2017-02-08 浙江宇视科技有限公司 Intelligent moving target tracking device
CN107181929A (en) * 2016-03-11 2017-09-19 伊姆西公司 Method and apparatus for video monitoring
JP6915575B2 (en) * 2018-03-29 2021-08-04 京セラドキュメントソリューションズ株式会社 Control device and monitoring system
US20190310592A1 (en) * 2018-04-09 2019-10-10 Diveplane Corporation Computer based reasoning and artificial intelligence systems

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104902246A (en) * 2015-06-17 2015-09-09 浙江大华技术股份有限公司 Video monitoring method and device
CN104992149A (en) * 2015-06-24 2015-10-21 福建星网锐捷安防科技有限公司 Mixing line detection method, mixing line detection system, network video camera and monitoring system
CN105389920A (en) * 2015-11-30 2016-03-09 北京正安维视科技股份有限公司 Perimeter alarm method based on two-dimensional laser radar and video analysis

Also Published As

Publication number Publication date
CN113450522A (en) 2021-09-28

Similar Documents

Publication Publication Date Title
CN103270536B (en) Stopped object detection
CN112733690B (en) High-altitude parabolic detection method and device and electronic equipment
CN111083435A (en) Security monitoring method and device and computer readable storage medium
CN110659391A (en) Video detection method and device
CN111582060B (en) Automatic line drawing perimeter alarm method, computer equipment and storage device
CN114782897A (en) Dangerous behavior detection method and system based on machine vision and deep learning
CN112101202A (en) Construction scene recognition method and device and electronic equipment
CN114120171A (en) Fire smoke detection method, device and equipment based on video frame and storage medium
CN112215037B (en) Object tracking method and device, electronic equipment and computer readable storage medium
CN112052878A (en) Radar shielding identification method and device and storage medium
CN115620208A (en) Power grid safety early warning method and device, computer equipment and storage medium
CN113450522B (en) Video cable mixing intrusion detection method, electronic device and storage medium
CN111107152A (en) Internet of vehicles terminal intrusion processing method, device, equipment and storage medium
CN113505643A (en) Violation target detection method and related device
CN113887372A (en) Target aggregation detection method and computer-readable storage medium
CN116797993B (en) Monitoring method, system, medium and equipment based on intelligent community scene
CN110634120B (en) Vehicle damage judgment method and device
CN111104549A (en) Method and equipment for retrieving video
CN113837138B (en) Dressing monitoring method, dressing monitoring system, dressing monitoring medium and electronic terminal
CN113177917B (en) Method, system, equipment and medium for optimizing snap shot image
CN112329621A (en) Processing method, system, terminal and medium for abnormal behavior early warning data
CN114387544A (en) High-altitude parabolic detection method and system, electronic equipment and storage medium
CN112435475B (en) Traffic state detection method, device, equipment and storage medium
CN110740256B (en) Doorbell camera cooperation method and related product
CN113283286A (en) Driver abnormal behavior detection method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant