TWI338504B - - Google Patents

Download PDF

Info

Publication number
TWI338504B
TWI338504B TW95143183A TW95143183A TWI338504B TW I338504 B TWI338504 B TW I338504B TW 95143183 A TW95143183 A TW 95143183A TW 95143183 A TW95143183 A TW 95143183A TW I338504 B TWI338504 B TW I338504B
Authority
TW
Taiwan
Prior art keywords
frame
location
intelligent monitoring
video
module
Prior art date
Application number
TW95143183A
Other languages
Chinese (zh)
Other versions
TW200824433A (en
Original Assignee
Univ Nat Chiao Tung
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Univ Nat Chiao Tung filed Critical Univ Nat Chiao Tung
Priority to TW95143183A priority Critical patent/TW200824433A/en
Publication of TW200824433A publication Critical patent/TW200824433A/en
Application granted granted Critical
Publication of TWI338504B publication Critical patent/TWI338504B/zh

Links

Landscapes

  • Alarm Systems (AREA)
  • Closed-Circuit Television Systems (AREA)

Description

1338504 九、發明說明: 【發明所屬之技術領域】 本發明係關於一種智慧型監控系統;特別關於一種 透過監控攝影機進行監控所需之視訊分析與儲存方 法。 【先前技術】 不論是金融_献經常會有大4現金的触,大乡會裝設柄 機,-方面嚇阻歹徒不要有非份之想,另—方_提供警^在^ 辦搶案的資料。只是,-般攝影機_固定位置、狀拍攝角度 進行拍攝,舒採咖粒置特定範_來_攝,因此對於有 心閃避被減的人,仍可辭沒辦法補朗完整㈣像。' 為了克服這侧題,已有廠商提出中華關專利公告號第则_ 號「以影像齡之物體追聰^識技術為基礎的儲存及翻裝置」, 並藉著追财狀對狀場所作_彡監控,尤其是針對會移_ 物體(例如人員)進行監控。 為了能夠藉著追财式針騎定場所作錄影監控,除了追蹤技術 本身以外’更需要如中華民國專利公告號第㈣咖號「追縱式 攝影機結構」。有了此嶋影機之後,在接受到相對的控制命令 後’便能使其__影辆作垂直、水平,進行無縫、無 5 死角的拍攝動作。 =概若能加讀靡控的話,將妓更 糸為。為此,中華民國公告號第46 : 對象進二:對特定特徵物,進而允許或不允許特定 超商的人員都必須脫去牛赚說’為強迫母個進入 亦即賴㈣㈣存在時, ”覚員未脱去*全帽時,自動Η就不會開啟。 入術中’除了上述追縱、辨識等應用,還把遠端監控也納 單來講,遠端監控主要是將攝影機拍攝到的視訊傳 控域,再朗監控主機進行視靖料_錢將攝影機 的視HI透過&線網路傳遊到錶端、移動裝置。 如中華民·告號㈣G53_4號專利「絲式影像監控系統」, 其主要是儲存入侵物件前後固定時間的視訊影像,並提供使用者 可藉由網際網路去取得當時影像。 除了上述網路監控外,還可制移祕更高的GPRS來達到遠端監 控目的。如中華民國公告號第M287021號專利「具整合封包無線 電服務(GPRS)之監簡影裝置」’其主要賴影機錄到的入侵物 件影像資料’透過整合封包無線電服務㈣S)傳送至使用者手 機並讓使用者利用簡訊服務(SMS)傳送簡訊控制指令,去控制監 控攝影機。在此習知技術中,雖然可利用SMS來控麵影機,但 無法在透過SMS傳紐制命令給攝频,額賴看人侵影像, 故無法讓制者可真即時監控。 無法㈣監控關題’如中咖公告號第_脇號 ^ ^翻職賴㈣敍料」,其轉簡频拍攝到的 …彳視訊讀’透過無線鳴傳送至網路值器,使用者再 透過網際鱗連翻關職去取得監控·,_所提供 的"面控制監控攝影機以達到即時監控。1338504 IX. Description of the Invention: [Technical Field] The present invention relates to an intelligent monitoring system; and more particularly to a video analysis and storage method required for monitoring through a surveillance camera. [Prior technology] Whether it is financial _ offer often there will be a big 4 cash touch, Daxiang will install a handle machine, - the side will frustrate the culprits not to have a non-participation, another - _ provide police ^ in the ^ to do the case data of. Just, the general camera _ fixed position, shape shooting angle to shoot, Shu Cai coffee grain set a specific fan _ to _ photo, so for those who have the heart dodge reduction, you can still replenish the complete (four) image. In order to overcome this problem, the manufacturer has proposed the Chinese Patent Publication No. _ No. _ "Storage and Turning Device Based on Image Age Objects", and by the pursuit of the situation _彡Monitoring, especially for moving objects such as people. In order to be able to monitor the location of the video for the video surveillance, in addition to the tracking technology itself, it is more necessary to have the "No. With this camera, after receiving the relative control command, the __ shadow can be made vertical and horizontal, and seamless, no 5 dead angle shooting action. = If you can add reading control, you will change it. To this end, the Republic of China Announcement No. 46: Objects go into two: for certain characteristics, and then allow or disallow specific super-business people must take off the cow earning that 'for the forced mother to enter, that is, Lai (four) (four) exists," When the employee does not take off the *full cap, the automatic Η will not open. In addition to the above application of tracking, identification, etc., the remote monitoring is also included, the remote monitoring is mainly taken by the camera. Video surveillance domain, and then monitor the host to view the material _ money to the camera's visual HI through the & line network to travel to the table end, mobile devices. Such as the Chinese people, the number (4) G53_4 patent "silk image monitoring system The main purpose is to store video images of fixed time before and after the intrusion of objects, and to provide users with the Internet to obtain the current image. In addition to the above network monitoring, it is also possible to transfer a higher GPRS to achieve remote monitoring purposes. For example, the Republic of China Announcement No. M287021, "Integrated Packet Radio Service (GPRS) Supervision and Shadow Device", which transmits video data of intruding objects recorded by the main camera, is transmitted to the user's mobile phone through the integrated packet radio service (4) S). And let the user use the SMS service (SMS) to send SMS control commands to control the surveillance camera. In this prior art, although SMS can be used to control the face machine, it is impossible to transmit the frequency through the SMS transmission command, and the amount of the image is invaded by the viewer, so that the system can not be monitored immediately. Unable to (4) monitor the title 'such as the Chinese coffee announcement number _ threat number ^ ^ turn over the blame (four) narration", which was transferred to the short-cut video... 彳 video read 'transmitted to the network value through the wireless sound, the user Through the Internet scales to turn over the post to get monitoring, _ provided by the "face control surveillance camera to achieve real-time monitoring.

_ ’透__路或3G/GPRS作遠端監控,有著諸多的便利與 好處’但疋不論是’娜鱗或3G/GpRs,麵寬上仍射限若同 =監控數個場鱗,不巧全部都發生關,而同時都在傳遞當時 :像時’極谷易因線路謹塞,而無法接收到任何影像或訊息。就 A用依序播放上述視訊影像,以避免·而無法收到任何影像 或訊心但疋萬一真正有入侵情況發生的影片,是被排在比較後 面的順序時’等伽者逐-觀看才制時,人侵者恐怕早已離開 現場了。_ 'Through __ road or 3G/GPRS for remote monitoring, there are many conveniences and benefits', but whether it is 'Na scale or 3G/GpRs, the width is still the same as the limit = monitor several field scales, no All of them happened to be off, and at the same time they were all passed at the same time: like the time, 'The Valley is easy to receive any images or messages because of the line. Play the above video images in sequence with A to avoid · and can't receive any images or news. But in case the video that really has an intrusion happens, it is ranked in the order of comparison. When the system is formed, the invaders may have left the scene.

為了解決透過網際網路或3G/GpRS作遠端監控上的問題,即盡可 能減少對頻寬的使用4,⑽射實有必要(糖有人侵者時)時 才使用頻寬,進而達到真正的即時監控。除此之外,在本發明中 仍沿用上述追縱、遙控攝影機、人臉_等特性,以強化本發明 糸統的監控能力!> 1338504 【發明内容】 本發明之主要目的在提供一種智慧型監控分析系統與方法,其藉 著預先儲存疑似入侵者的影像或圖像,來提供給相關者(例如屋L) 自行判定是否確實有人侵物件(例如小偷),不會因電腦誤判而至導 致不必要的慌|匕。 本發明之:欠要目的在提供-種智慧型監控分㈣雌方法,其需 鲁要監控大量的場所時,為了減少頻寬上的負擔,絲傳送相: 每個場所的圖像(比較不佔頻寬),然後在使用者確認疑似有小偷 時,才播放事先儲存的入侵者影像,作更進一步的確認。 ⑴ 基於上述目的,在本發明智慧型監控分析系統與方法中,先判斷 並揭取疑似入侵物件的輪廊,然後依據此輪廟持續追縱並透過攝 .影機持續拍攝,並將所獲得影片暫存起來,最後透過各種通訊管 道’以上述影片中最清晰畫面(佔用較少頻寬)通化主,若確定 籲確實疑似小偷時,才佔職多頻寬來實際下載與播放該影片。疋 關於本發明之優點與精神可以藉由以下的發明詳述及所附圖式得 到進一步的瞭解。 -- 寸 【實施方式】 在本發明智慧型監控分㈣、統與方法中,可大致區分成傳送清晰 晝面(即含有人侵者_)、傳送場所細t_含有入侵者的 影片)、遙控攝影機方位這r:夫4 _ 化一大部分,並將於底下分別詳細描述其 UJ8504 流程。 >閱第ΙΑ 1β圖’第1A,為本發明傳送清晰晝面之示意圖。 ^圖所示’本發明智慧型監控編統H)主要包含攝影機 、 ^人侵判斷模组16、_追縱模組18、影像資料庫2G、清晰畫 秘組22、發賴組24,縣察覺有射认侵者的人侵物件時T 把相對的清晰畫面傳送至用戶端裝置12。這其中,攝影機Μ會對 預定的場所進行拍攝,並獲得連續拍攝的複數筆場所圖框 (frame)。右本發日騎财數個綠監控的場所時, 所安裝相對的攝影機14。 琢 2來說’本發明智慧魏控分析魏1Q料縣人侵判斷模組 “判斷攝❸機14所提供的場所圖框,是否有人侵物件(例如小 偷)。若初步判斷有人侵物件時,便會擷取疑似人侵物件的物件輪 =當偵測追賴組18接峨物件輪廓後,就能依據此輪廓持 攸縱並透過攝影機14持續拍攝’並將所麟則暫存至影像資 料庫20中。最後’透過各種可能的通訊管道(例如網際網路、 3主G/GPRS、傳真㈣’將清楚晝面模組22從上_中挑選出最 =畫面(佔職少頻寬的例如卿檔)傳遞給用戶端m(例 王土夕 ° ^侵判斷模組16在娜疑似人侵物件的物件輪廓時,會先利用影 2減(例如和空的場景影像作相減)、影像二值化後得到可疑物 〜像’再利用形態學(m〇rphc)1〇gy )去除影像雜訊和使用 1338504 CCL( C〇nnected c_纖t㈣一)及最小矩形_),而獲 得上述物件輪廓。 , 又 侧追縱模組18控腦雜Η作賴工作,主要是在場所圖框 中含有入侵物件時,才開始將相關於入侵物件的該些筆場所圖框 :存成場所視訊職,並直到場所難中不再含有人侵物件。 =晰里面模、组22主要藉著對場所圖框作物件切割、特徵萃取、特 徵分析等料’從含有人·件的·筆場所難中,找出物件 輪廓佔用場所圖框的比例最大和/或物件輪齡有可辨識之人臉 之相對的場所圖框,並將相對的場所圖框錢成清晰畫面。以人 為如人臉、身高等’必須要輕易能從清晰晝面(或關鍵晝面) 付头才足以供屋主欺是否為小偷,才關於清晰畫面。以 =為例,車牌影像必須要出現在影像中,方為清晰晝面。此外, 清晰晝面模組的另-方法,在於讓物件的各部分能被清晰顯示。 /人為例’如頭、手、躺幹、腳等部位,背部的衣服圖案花紋等, /員出_關鍵晝面中;以車為例,正面與背面之影像,涵蓋車燈 形狀、車頭造型、車尾之鱗等,都含括在晝面巾,將有助於以 人工或自動影像分析方法建立車子之索引龍。由於人的正背面 與柯的正背面無法於—張影像中同時出現,因此關鍵之清晰晝 °、不/、U象。原則上來說,物件清晰與否,受到三個因 素的影響’即攝影機、環境、與物件。攝影機的解析度、光圈焦 距的調整等’則會影響物件崎較。魏的亮歧^夠,是 1338504 否有背景#?遮蔽物件’也會影響物件的清晰度^此外,物件本身 的移動速度、姿態方式是奴面朝向攝影鮮,也會辟清晰度。 為達上述齡清晰畫面之目的,本技術騎對—段影# t每張影 像進行特徵分析’鋪徵分析包含物賴雛度分析、物件顏色 分析、物件紐分析、物件職分析、物件祕分析、物件正背 面偵測等六類。物件馳程度分析,可透财賴測(EdgeIn order to solve the problem of remote monitoring through the Internet or 3G/GpRS, that is, to minimize the use of bandwidth 4, (10) it is necessary to shoot (when the sugar is invaded), then use the bandwidth to achieve true Instant monitoring. In addition, in the present invention, the above-mentioned characteristics such as tracking, remote control camera, face _, etc. are still used to enhance the monitoring capability of the system of the present invention! > 1338504 SUMMARY OF THE INVENTION The main object of the present invention is to provide an intelligent monitoring and analysis system and method for pre-storing images or images of suspected intruders to provide relevant parties (for example, house L) to determine whether or not It is true that some invaders (such as thieves) will not cause unnecessary panic due to computer misjudgment. The invention has the following advantages: the purpose of providing a kind of intelligent monitoring and monitoring (four) female method, in order to monitor a large number of places, in order to reduce the burden on the bandwidth, the silk transmission phase: the image of each place (less In the case of a user who confirms that there is a suspected thief, the previously stored intruder image is played for further confirmation. (1) Based on the above purpose, in the intelligent monitoring and analysis system and method of the present invention, the wheel corridor of the suspected invading object is first judged and extracted, and then the temple is continuously tracked and continuously photographed through the camera, and obtained. The film is temporarily stored, and finally through the various communication channels 'to the clearest picture (occupying less bandwidth) in the above video, the master of the game, if it is determined that the suspect is a thief, only occupy the multi-bandwidth to actually download and play the film. The advantages and spirit of the present invention will be further understood from the following detailed description of the invention and the accompanying drawings. - Inch [Embodiment] In the intelligent monitoring sub-group (four), system and method of the present invention, it can be roughly divided into a clear transmission face (that is, a person who invades a person), a transfer place fine t_a film containing an intruder, The remote camera position is a large part of the r_fu 4 _, and the UJ8504 process will be described in detail below. > Read the first 1β map '1A, which is a schematic diagram of the transmission of the clear face of the present invention. ^ The intelligent intelligent monitoring system H of the present invention mainly includes a camera, a human intrusion judging module 16, a _ chasing module 18, a video database 2G, a clear painting group 22, a squaring group 24, and a county. When it is perceived that a person invading the invaders invades the object, T transmits a relatively clear picture to the client device 12. Among them, the camera 拍摄 shoots the predetermined place and obtains a series of multiple shot frames. When the right side of the day is riding a number of green monitoring places, the opposite camera 14 is installed.琢 2 ' 本 本 本 本 本 本 本 本 本 本 本 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏 魏The object wheel of the suspected person invading the object will be captured. When the tracking group 18 is connected to the contour of the object, the contour can be continued according to the contour and continuously photographed through the camera 14 and the lining is temporarily stored in the image data. In the library 20. Finally, through the various possible communication channels (such as the Internet, 3 main G/GPRS, fax (four)' will clear the face module 22 from the top _ out of the most = picture (occupy less bandwidth) For example, the Qing file) is transmitted to the client m (for example, when the object is suspected of invading the object, the image is first subtracted (for example, subtracted from the empty scene image), Obtaining suspicious objects after image binarization ~ like 'reuse morphology (m〇rphc) 1〇gy) to remove image noise and use 1338504 CCL (C〇nnected c_fiber t (four) one) and minimum rectangle _) The contour of the above objects. When the frame contains intrusive objects, the frame of the pens related to the invading objects will be started: the location will be recorded and the object will not be invaded until the place is difficult. By cropping, feature extraction, feature analysis, etc. on the frame of the site, it is difficult to find out the proportion of the frame occupied by the contour of the object and/or the wheel age of the object. The opposite part of the face of the face, and the relative position of the frame money into a clear picture. People such as human face, height, etc. 'must be able to easily pay from the clear face (or key face) enough Whether the owner is a thief is a clear picture. For example, the license plate image must appear in the image for clarity. In addition, the other method of clearing the face module is to let the parts of the object Can be clearly displayed. / Human example - such as the head, hands, lying, feet, etc., the back of the clothes pattern, etc., / member out _ key 昼 face; take the car as an example, the front and back images, covering the car Lamp shape, head shape The scales on the rear of the car, etc., are included in the face towel, which will help to establish the index dragon of the car by manual or automatic image analysis. Since the front side of the person and the front side of the cow cannot simultaneously appear in the image, The key is clear 昼°, not /, U. In principle, whether the object is clear or not is affected by three factors 'ie camera, environment, and object. The resolution of the camera, the adjustment of the aperture of the aperture, etc.' will affect The object is more sturdy. Wei's bright ambiguity ^ is enough, is 1338504, there is background #? Covering objects' will also affect the clarity of the object ^ In addition, the moving speed and posture of the object itself is the slave face to the photography, it will also clear In order to achieve the clear picture of the above-mentioned age, this technology rides the characteristics of each image of the segment---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Six categories of objects, such as front and back detection. Analysis of the degree of the object, can be measured by the wealth (Edge

Detect ion)或High-pass Filter等技術,抽取物件影像中的邊緣 或高頻訊息以分析其模糊程度。物件紋理分析,可有助於抽取物 件身上之圖案,可制High-passFi 11er或馬可规機場(Markov Random Field)等來絲。物件顏色分析,可透過顏色在色彩空間 中的分佈獅’進行群粒(Glustering)或高斯混合模型法 (GaussianMlxture Models)來擷取顏色資訊,例如擷取膚色⑼化 Color)資訊。物件形狀分析’以分析物件的形狀資訊,如長度、 寬度、轴心、軸距、面積、輪鱗’可透過—般統計方法或如主 動輪廓法(Active toitoui·)來完成。物件動態分析,有助於瞭解 物件的移動方向,可透過Bl〇ekMatGhing、光流法(㈣⑺丨F1〇w) 等來完成。物件正#面分析,可透過人臉_、車關測、動態 分析所得之物件移動方向等來完成。 根據以上之六種分析方法得到物件的諸多特徵,並進行以期望 值的極大化來挑選關鍵晝面,如下公式所示:Techniques such as Detect ion or High-pass Filter extract edge or high frequency information from the image of the object to analyze its blur. Object texture analysis can help extract patterns from objects, such as High-passFi 11er or Markov Random Field. Object color analysis allows you to capture color information, such as skin color (9) color, by Glustering or Gaussian Mlxture Models. The shape analysis of the object is performed by analyzing the shape information of the object, such as length, width, axis, wheelbase, area, and wheel scale, by a general statistical method or by Active Toitoui. The dynamic analysis of the object helps to understand the direction of movement of the object, which can be done by Bl〇ekMatGhing, optical flow method ((4)(7)丨F1〇w). The object is analyzed by face analysis, which can be done through the face _, the car off measurement, and the moving direction of the object obtained by dynamic analysis. According to the above six analysis methods, the characteristics of the object are obtained, and the key surface is selected by maximizing the expected value, as shown in the following formula:

Keyframes = arg max 0(/,, Λ, /3,Λ, /5, /J Framet) 1338504 其中的/,代絲賴_度分析所得之—組量聽,蛾表物件 顏色分析麟之傾驗,/3代絲倾理分析所得之一 組量化特雜’錢絲件職讀所得之—組量轉徵值4 代表物件祕分析所得之—組量化特徵值,械表物件正背面偵 之—組量化特·;斤撕代表某幾張影㈣/1知齡) 代表從某魏雜練_,並計算其符合職之紐分數。 _代表將分數最大的幾張晝面拿出來,作為關鍵畫面。其中的期 望函數(X)可採用常見之線性加權法來計算:Keyframes = arg max 0 (/,, Λ, /3, Λ, /5, /J Framet) 1338504 where /, Daisi Lai _ degree analysis - the amount of listening, moth table object color analysis / / 3 generations of silk analysis of the analysis of a group of special miscellaneous 'money wire pieces of the job - the amount of the transfer value of 4 represents the object of the analysis of the analysis of the group of quantitative feature values, the mechanical object is on the back of the detection - The group quantifies the special; the pound tear represents a certain number of shadows (four) / 1 knowledgeable age) represents the score from a certain Wei _, and calculates its score for the match. _ represents the few points with the highest scores as a key picture. The expectation function (X) can be calculated by the common linear weighting method:

叫,Λ,/3,以,Λ) = M W ⑽ W 祕式中加權值越大的特徵代表其對影像的清晰度越重要。該公 ^亦可進一步延伸,不僅一組量化特徵值有—個加權值,亦可以 母個特徵值都有—個⑽應的加權值: 〇C/i,-Wr_,) = W+... + v^ 其中的/)“.Λ為六種分析方法總共得到的糊量化特徵值。 晰全==之ΤΙ分析與期望值極大化等步驟,即可完成最清 晰旦面的擷取。此外,有時為了要進行 ::更詳細的物件清晰晝面,可進行「物件切割:: 二有二:::’並分析各部位一 顏色訊崎知妒方絲將求勒職頭部之 。于口"。_徵,此特徵可供作為清晰晝面函數令 12 1338504 的特徵值。以車為例’可蝴車子的車頭、車舰、車尾、行李 相等部位’並分析各雜的職贿,如此會比做 模糊程度,更明確的研判出影像清晰度。 如 如第1B_示’若本發明I統有數個需要監控的場所時,則可透 過每個場所安裝的攝影機14把上述清晰畫面全部都傳遞至用戶端 裝置12。用戶端裝置12會透過顯示模組34將顯示器3〇所顯示的 晝面’切割成相對的區塊咖〜30d,以便同時呈現來自不同場所的 清晰畫面。 如此-來’除了藉著影錄料庫2Q預先齡疑似人侵者的影像或 圖像,來提供給相關者(例如屋主)自行判定是否確實有入侵物件 (例如小偷)’不會因電腦誤判而導致不必要亂,就算需要監 控大里的場所時,僅先傳送相對於每個場所的圖像(比較不佔頻 見)’然後在使用者確駿似有小糾,才紐事先齡在影像資 料庫20的人侵者影像’作更進—步的確認。這樣,不但可以減少 頻寬上的負擔,更能同時監控數個場所。 在說明如何播放事先儲存在影像資料庫2G的入侵者影像之前,先 回過頭來·上縣統巾域傳遞的手段。在每個場所的攝影機 14與入㈣嶋組丨6和/或制追_組丨8之間可制傳輸距離 較遠的網際網路或是類比缓線(有線或無線均可),而在發送模組 24與用戶端裝置12之間’則相對於用戶端裝置12的不同而有不 同的管道。若用户端裝置12為支援GPRS或3G的行動電話(例如 13 1338504 GSMCGlobal System for Mobile Communications) >CDMA(Code division multiple access) ^ WCDMA(Wideband Code Division Multiple Access)手機)時,其管道則為GpRS或3G網路 ,所以相 對地發送模纽24可採用腿s(Multimedia叫,Λ,/3,以,Λ) = M W (10) The feature with a larger weight value in the secret is the more important it is to the sharpness of the image. The public ^ can be further extended, not only a set of quantized feature values have a weighting value, but also the parental feature values have a weighting value of (10): 〇C/i, -Wr_,) = W+... + v^ where /) ". Λ is the total of the measurable eigenvalues obtained by the six analysis methods. After the complete analysis = ΤΙ analysis and the expectation of the maximum value, the clearest surface can be obtained. Sometimes in order to carry out:: A more detailed object is clear and kneading, you can carry out "object cutting: two two:::" and analyze each part of the color, the color of the news, the square wire will seek the head of the head. The mouth ". _ sign, this feature can be used as a eigenvalue of the clear face function command 12 1338504. Take the car as an example of 'the car head, the car, the tail, the baggage equivalent parts' and analyze the various jobs Bribery, it is more clear than the degree of ambiguity, to determine the clarity of the image. As shown in Figure 1B_, if the invention has several places to be monitored, the above-mentioned camera 14 can be installed through each location. The clear pictures are all transmitted to the client device 12. The client device 12 transmits the display mode. 34 cut the facet displayed on the display 3〇 into the opposite block coffee ~ 30d, in order to simultaneously present a clear picture from different places. So - to 'except by the shadow record library 2Q pre-aged suspected invaders The image or image is provided to the relevant person (such as the homeowner) to determine whether there is an intrusive object (such as a thief). 'There will be no unnecessary confusion caused by the computer misjudgment. Even if it is necessary to monitor the location of the place, only the relative information is transmitted first. The image of each place (compared to the frequency of seeing) 'and then the user seems to have a small correction, the new inferior age in the image database 20 of the invaders image 'for further step-by-step confirmation. Not only can it reduce the burden on the bandwidth, but also can monitor several places at the same time. Before explaining how to play the intruder image stored in the image database 2G beforehand, please go back to the means of passing the county. Each location's camera 14 and the incoming (four) 嶋 group 丨 6 and / or the _ group 丨 8 can be transmitted over a long distance Internet or analog slow line (wired or wireless), while sending Module 24 and user There is a different conduit between the devices 12 relative to the client device 12. If the client device 12 is a mobile phone supporting GPRS or 3G (for example, 13 1338504 GSMC Global System for Mobile Communications) >CDMA (Code division multiple Access) ^WCDMA (Wideband Code Division Multiple Access) when the pipeline is GpRS or 3G network, so the relative module 24 can be used to use legs s (Multimedia

Messaging Service)方 式傳送上述清晰晝面。若用戶端裝置12為支援網際網路和劉覽器 的電腦裝置時’其管道就為網際網路,所以發送模組24可採用 TCP/IP協定來傳送上述清晰晝面。The Messaging Service) delivers the above-mentioned clarity. If the client device 12 is a computer device supporting the Internet and the browser, the pipe is the Internet, so the transmitting module 24 can transmit the above-mentioned clear face by using the TCP/IP protocol.

不過’不卿哪種官道或手段傳送清晰畫面,都可關時傳遞入侵 訊息(例如:系統發現疑似入侵者丨請注意!),並附上相對於清 晰晝面的場所視訊_之資源地址(㈣⑽⑽鐵L⑽攸, 祖)和顧場所視賴穌身,續供制者從如㈣圖所示 之顯示器.30令選擇性收看場所視訊播案。需特別注意的是,若需 要直接傳輕所視賴案本身,絲藉由如第2β圖咐之格式轉 換換組26來轉換成用戶端裝置丨2所能支援的格式。 請參閱第㈣㈣’第2A〜㈣本剌傳輯職鋪案之示意 圖。如第2A圖所示,本發明知# 科恥慧处控分析系統H)主要仍包含 =ι、入侵判斷模組16、_追賴組18、影像資跡 >月晰晝面模組22、發送模組24,還 還進―步包含格式轉換模組26。 右使用者從如第1B圖所示之顯 30a之後,本發明夺统1〇gp‘# —面中、擇了左上角的區塊 料枝.㈣即會透過格式轉換模 視訊播案(相對於區塊咖所 把相對的场所 所』不的凊晰畫面)轉換成多種格式(例 1338504 如 3GPP (Third-Generation Partnership Program) 、 3GPP2 (Third-Generation Partnership Program 2) ' OMA (Open Mobile Alliance)),以提供給發送模組24實際傳送場所視訊檔案至相對 的用戶端裝置12,如第2B圖所示。 倘若格式轉換模組26於使用者選擇了區塊後才開始進行格式轉 換,常造成的問題是制者需等練長賴才能觀看錄影晝面,However, 'do not know which kind of official channel or means to send a clear picture, you can pass the intrusion message when you close (for example, the system finds the suspected intruder, please pay attention!), and attach the location video address relative to the clear face. ((4) (10) (10) Iron L (10) 攸, ancestor) and the place of interest depend on the body, and the continuation of the supplier from the display of the (. It should be noted that if the case itself is directly transmitted, the screen is converted into a format supported by the client device 丨2 by converting the group 26 as in the second figure. Please refer to (4) (4) '2A ~ (4) Schematic diagram of the book. As shown in FIG. 2A, the present invention is mainly composed of =1, the intrusion determination module 16, the _ ranching group 18, the image traits, and the monthly stencil module 22 The sending module 24 further includes a format conversion module 26. After the right user from the display 30a as shown in FIG. 1B, the present invention wins the 1〇gp'#-face, selects the block in the upper left corner. (4) will convert the mode video broadcast through the format (relative In the block business, the relative location of the site is converted into a variety of formats (eg 1338504) such as 3GPP (Third-Generation Partnership Program), 3GPP2 (Third-Generation Partnership Program 2) OMA (Open Mobile Alliance) ), to provide the transmitting module 24 to actually transmit the location video file to the opposite client device 12, as shown in FIG. 2B. If the format conversion module 26 starts the format conversion after the user selects the block, the problem often arises is that the system has to wait for a long time to watch the video.

因此另-方法是在侧追賴組18與清啦賴組22分別執行 追縱錄影與產生清啦面之後,立即使格捕顯組Μ將該次物 件的圖框轉換為視訊職’並儲存起來。如此,#伽者選擇了 區塊30a之後,即可立即播放已轉換儲存之物件錄影片段。 若用戶端裝置12為手機時,那麼發送模組24則採用符合手機視 訊串流訊號·式(3gP、_) ’實際傳送場所視訊難至 用戶端裝置12。若用戶端裝置12為電腦時,發送模_可採用例 如WMA的格式傳送檔案。 請參閱第3A侧,第3A〜3B為本發料控攝影機方位之示咅圖。 如第3B圖所示’本發明智慧型監控分析系統1〇主要仍包 機14、入侵判斷模組16、_追縱模組ΐδ、影像資料庫2。、: 晰晝面模組22、發送模組24、格式轉換模組沈。 / 為了讓使时也能透戶魏置丨2 -’使用者可透過如第3A圖所示之操:兄有更進 紐來减操賴雜14。_纽,錢岐透顯作介面1 1338504 ’,操作模組36便會如第3b圖所示 而使攝影機14移動至相對於方位資 下達往右移動的方位資訊之後 把方位資訊傳達至攝影機14, 訊的位置來拍攝場所。 除此之外,偵測追縱模組18在入侵判斷模組16提供入侵物件的 物件輪廓時,狀相對的場所圖框中含有人侵物件時,會使可上、 下、左、右移動的攝影機14,自動地對準入侵物件的中心點進行 ^ 拍攝,以便獲得最完整的晝面。 2參Μ 4A〜4B圖’請參閱第4A,圖為本發日种心點拍攝之示 意圖。如第4A圖所示,入侵判斷模組16可把所接收到的場所圖 框劃分成九個控制格(在中央的控制格為控制格4〇小舉例來說, 右入知物件只橫跨到控制格40a、杨,並且入侵物件的中心點只 落在控制格働時,便會使攝影機14自動地往右移動,以便讓入 侵齡的中心點落在控制格術中。若入侵物件的中心點本來就 春已洛在控制格他時,便不會送出控制訊號給攝影機u,而攝影 機14就維持原狀不動。如此,攝影機14就能自動持續追縱入侵 物件讓入知物件保持在監控攝影機Μ的監視晝面中,直到入侵 物件移動監控攝影機14所能監視之範圍外為止β 藉由以上較佳具體實關之魏,鱗望能更加清楚描述本發明 之特徵與精神’而麟以上騎揭露的麵具體實關來對本發 明之範嘴加以限制。相反地’其目的是希望能涵蓋各種改變及具 相等性的安排於本發明所欲申請之專利範圍的範疇内。 16 1338504 【圖式簡單說明】 第1A〜1B為本發明傳送清晰畫面之示意圖。 第2A〜2B為本發明傳送場所視訊檔案之示意圖。 第3A〜3B為本發明遙控攝影機方位之示意圖。 第4A〜4B圖為本發明中心點拍攝之示意圖。 【主要元件符號說明】 10智慧型監控分析系統 12用戶端裝置 14攝影機 16入侵判斷模組 18偵測追蹤模組 20影像資料庫 • 22清晰畫面极組 24發送模組 26格式轉換模組 30顯示器 30a〜30d區塊 32操作介面 34顯示模組 36操作模組 17 1338504 40a〜40b控制格Therefore, in another method, after the side tracking group 18 and the Qing Lai group 22 respectively perform the tracking video and the clearing surface, the grid capture frame is immediately converted into the video frame and stored. stand up. In this way, after the gamma selects the block 30a, the converted video clip of the object can be played immediately. If the client device 12 is a mobile phone, then the transmitting module 24 uses the mobile video stream signal (3gP, _)' to actually transmit the location video to the client device 12. If the client device 12 is a computer, the transmission module can transmit the file in a format such as WMA. Please refer to the 3A side, and the 3A to 3B are the schematic diagrams of the orientation of the hair-control camera. As shown in Fig. 3B, the intelligent monitoring and analysis system 1 of the present invention mainly includes the packet 14, the intrusion judging module 16, the _ tracking module ΐδ, and the image database 2. , the clear face module 22, the sending module 24, and the format conversion module sink. / In order to make it possible for the user to be able to use the user's position, the user can pass the operation as shown in Figure 3A: the brother has more to do the game. _ New, Money 岐 through the display interface 1 1338504 ', the operation module 36 will move the camera 14 to the orientation information relative to the orientation to the right as shown in Figure 3b, and then convey the orientation information to the camera 14 , the location of the news to shoot the location. In addition, when the intrusion determination module 16 provides the object outline of the invading object, the detection tracking module 18 moves the upper, lower, left and right when the object frame in the opposite position contains the invading object. The camera 14 automatically shoots at the center point of the invading object to obtain the most complete face. 2 Μ Μ 4A~4B 图 图 Please refer to section 4A, which is the intention of the shooting of the heart. As shown in FIG. 4A, the intrusion determination module 16 can divide the received location frame into nine control cells (the control cell in the center is the control cell 4, for example, the right input object only spans When the control points 40a, Yang, and the center point of the invading object only fall on the control grid, the camera 14 is automatically moved to the right so that the center point of the invading age falls in the control grid. If the center of the invading object When the spring is already in control, the control signal will not be sent to the camera u, and the camera 14 will remain intact. Thus, the camera 14 can automatically continue to track the invading objects and keep the objects in the surveillance camera. In the monitoring surface of the cymbal, until the intrusion object movement monitoring camera 14 can monitor the range of β, by the above-mentioned better specific implementation of the Wei, the scale can more clearly describe the characteristics and spirit of the present invention. The disclosure is to be construed as limiting the scope of the invention. The object of the invention is intended to cover various modifications and equivalents. 16 1338504 [Simple description of the drawings] 1A to 1B are schematic diagrams for transmitting a clear picture according to the present invention. 2A to 2B are schematic diagrams of video files of a transmission place according to the present invention. 3A to 3B are schematic diagrams showing the orientation of a remote control camera of the present invention. 4A to 4B are schematic diagrams of the center point shooting of the present invention. [Main component symbol description] 10 intelligent monitoring and analyzing system 12 user terminal device 14 camera 16 intrusion judging module 18 detecting tracking module 20 image database • 22 Clear picture pole group 24 transmission module 26 format conversion module 30 display 30a~30d block 32 operation interface 34 display module 36 operation module 17 1338504 40a~40b control grid

1818

Claims (1)

1338504 十、申請專利範圍: 、一種智慧型監控分析丰 刀啊糸統如用以監控一埸所 該智慧型監控分析系統包含: ===:),得_攝 、、、从 I 小 /71 丨人T.j卿丨棋1338504 X. Patent application scope: A smart monitoring and analysis tool, such as the monitoring system, is used to monitor the intelligent monitoring and analysis system including: ===:), get _ photo,,, from I small / 71 T人Tj卿丨棋 出含有-人侵物件,並從相對的料所圖框 中榻取出該入侵物件的一物件輪廓. 憤測追縱模組,係用以在該人侵判斷模組提供 該入侵物件的該物件輪廓時’判定相對的該 場所圖框中含有該入侵物件時,開始將含有 該入侵物件的該些筆場所圖框儲存成一場所 視訊檔案;An object-containing object that is invaded and removed from the frame of the opposite material. The intrusive tracking module is used to provide the object of the invading object in the intrusion determination module. When the contour is in the opposite position, the intrusion object is included in the map frame, and the pen field frames containing the invading object are initially stored as a local video file; 一清晰晝面模組,係用以從含有該入侵物件的該 些筆場所圖框令,找出該物件輪廓佔用該場 所圖框的比例最大之該場所圖框,並將該場 所圖框定義成一清晰晝面;以及 一發送模組’係用以傳遞該清晰晝面、關於該場 所視sfl檔案之資源地址(Uniform Resource Locator, URL)和/或該場所視訊檔案本身至 19 一用戶端裝置。 2如申凊專利範圍第1項所述之智慧型監控分析系 、'’ /、中。亥偵測追縱模組在該場所圖框中含有該 入侵物件時,開始將相關於該入侵物件的該些筆 場所圖框儲存成該場所視訊檔案,直到該場所圖 框中不再含有該入侵物件。 3、 如申請專利範圍第1項所述之智慧型監控分析系 統’其中該清晰晝面、該場所視訊檔案的格式均 相對於該用戶端裝置所能展示的格式。 4、 如申請專利範圍第丨項所述之智慧型監控分析系 統,其中該用戶端裝置可為支援GPRS*3G網路的 行動電話、或是支援網際網路和瀏覽器的電腦裝 置。 " 5、 如申凊專利範圍第1項所述之智慧型監控分析系 統’其中該用戶端裝置進一步包含: 一顯示模組,係用以透過一顯示器呈現該清晰畫 面或/和該場所視訊檔案; 一操作模組,係用以提供一操作介面來接收使用 者所指*的-方位f訊,並使該攝影機移動 至相對於該方位資訊的位置來拍攝該場所。 20 1338504 6、 如申請專利範圍第5項所述之智慧型監控分析系 統,其中當該用戶端裝置接收到來自該發送模組 所傳遞的該清晰晝面、關於該場所視訊樓案之資 源地址(Uniform Resource Locator,URL)和 / 或 該場所視訊檔案本身之後,使用者要求播放該場 所視訊檔案時,該顯示模組會依據該場所視訊檔 案之資源地址,以串流封包格式傳送該場所視訊 檔案,並透過該顯示器呈現該場所視訊檔案。 7、 如申請專利範圍第1項所述之智慧型監控分析系 統,其中該偵測追蹤模組在該入侵判斷模組提供 該入侵物件的該物件輪廓時,判定相對的該場所 圖框中含有該入侵物件時,使該攝影機對準該入 侵物件的甲心點進行拍攝。 8、 如申請專利範圍第i項所述之智慧型監控分析系 統,其中該清晰畫面模組係用以從含有該入侵物 件的該些筆場所圖框中,找出該物件輪廓含有可 ㈣之人臉之相對的該場所圖框,並將相對的該 %所圖框定義成一清晰晝面。 9、 —種智慧型監控分析方法,係用以監控一場所, 該智慧型監控分析方法包含: 21 1338504 I:::而獲得連續拍攝的複數筆場所圖樞 從該些筆場所圖框中找出含有-入侵物件; “物:的。亥场所圖框中擷取出該入侵物件的-物件輪廓; 判定相對的該場所圖樞 肀s有έ亥入钕物件時,開 。:有該入侵物件的該些筆場所圖框儲存 成一場所視訊檔案; k含有该入侵物件的該吡 ^ ^ ^ 二聿琢所圖框中,找出該 力郭佔用該場所圖框的比例最 所圖框,並將兮j日此人两 將5亥%所圖框定義成一清晰書 面;以及 傳=清晰晝面、闕於該場所視訊標案之資源地 nif〇rm Resource Locator, URL)^/^ 該場所視訊檔案本身至一用戶端 ^如^㈣_第9項所述之智慧型監控分析方 將,關中該場所圖框中含有該入侵物件時,開始 將相關於該入侵物來 場所視訊㈣,直❹^場所圖框儲存成該 侵物件。 “亥场所圖框中不再含有該入 22 ^申凊專利範圍第9項所述之智慧型監控分析方 相其中该清晰畫面、該場所視訊檔案的格式均 十於该用戶端裝置所能展示的格式。 、如申請專利範圍第9項所述之智慧型監控分析方 〜其中該用戶端裝置可為支援GPRS或3G網路的 仃動電話、或是支援網際網路和瀏覽器的電腦裝 置。 13' 、如申請專利範圍第9項所述之智慧型監控分析方 法,其中該用戶端裝置進一步包含: 一顯示模組’係用以透過一顯示器呈現該清晰晝 面或/和該場所視訊槽案; 操作杈組,係用以提供一操作介面來接收使用 者所指示的一方位資訊,並使該攝影機移動 至相對於該方位資訊的位置來拍攝該場所。 14、如申請專利範圍第13項所述之智慧型監控分析 方法,其中當該用戶端裝置接收到來自該發送模 組所傳遞的該清晰晝面、關於該場所視訊檔案之 資源地址(Uniform Resource L〇cat〇r,url^〇/ 或該場所視訊檔案本身之後,使用者要求播放該 場所視訊檔案時,該顯示模組會依據該場所視訊 23 槽案之資源地址,以串 訊樓案,並透過㈣'傳送柄所視 X ‘.,,員不器呈現該場所視訊檔案。 15\.如申請專利範”9項所述之智慧型監控分析方 去八中判疋相對的該場所圖框中含有該入侵物 件時,使該攝影機對準該入侵物件的中心點進行 拍攝。 16、如申請專利範圍第9項所述之智慧型監控分析方 法,進一步包含: 從含有該入侵物件的該些筆場所圖框中,找出嗜 物件輪廓含有可辨識之人臉之相對的該場所圖 框,並將相對的該場所圖框定義成一清晰晝面。 24A clear facet module is configured to find the place frame of the object frame that has the largest proportion of the place frame from the pen place frame containing the invading object, and define the place frame frame Forming a clear face; and a sending module 'for transmitting the clear face, the resource address (Uniform Resource Locator, URL) of the place sfl file and/or the location video file itself to 19 a client device . 2 As for the intelligent monitoring and analysis department described in item 1 of the scope of the patent application, '’ /, medium. When the intrusion object is included in the location frame, the black detection tracking module starts to store the pen field frames related to the intrusion object into the location video file until the location frame no longer contains the Invasive objects. 3. The intelligent monitoring and analysis system as described in claim 1 of the patent application, wherein the format of the visual file of the location is relative to the format that the client device can display. 4. The intelligent monitoring and analysis system as described in the scope of the patent application, wherein the client device can be a mobile phone supporting a GPRS*3G network or a computer device supporting the Internet and a browser. < 5, the intelligent monitoring and analysis system of claim 1, wherein the client device further comprises: a display module for presenting the clear picture or/and the location video through a display An operation module is configured to provide an operation interface for receiving a position-orientation signal that the user refers to, and moving the camera to a position relative to the orientation information to capture the location. 20 1338504 6. The intelligent monitoring and analysis system according to claim 5, wherein the client device receives the clear address transmitted from the sending module, and the resource address of the video building in the location. (Uniform Resource Locator, URL) and/or after the video file itself, when the user requests to play the video file of the location, the display module transmits the location video in a streaming packet format according to the resource address of the video file of the location. File and display the location video file through the display. 7. The intelligent monitoring and analysis system according to claim 1, wherein the detection and tracking module determines that the relative location of the object is included in the intrusion determination module to provide the object contour of the intrusion object. When the object is invaded, the camera is aimed at the nail point of the invading object. 8. The intelligent monitoring and analysis system of claim i, wherein the clear picture module is used to find the outline of the object from the pen-like frame containing the invading object (4) The opposite part of the face of the face, and the relative frame of the % is defined as a clear face. 9, a kind of intelligent monitoring and analysis method, used to monitor a place, the intelligent monitoring analysis method includes: 21 1338504 I::: and obtain a continuous shooting of multiple pen maps from the pen place frame The inclusion-intrusion object; "object: the outline of the object of the invading object in the frame of the sea; the relative position of the site is determined to be open when the object is opened. The pen place frames are stored as a place video file; k containing the invading object in the frame of the pico ^ ^ 2聿琢, to find out the most frame of the proportion of the frame occupied by the force, and This will be defined as a clear written copy of the frame of the person, and the source of the video of the location of the video. Nif〇rm Resource Locator, URL)^/^ The intelligent monitoring and analysis party described in the file itself to a user terminal, such as ^(4)_9, will start the video related to the intrusion when the intrusion object is contained in the location box (4). ^Place frame is stored as the invasion The object of the intelligent monitoring and analysis method mentioned in item 9 of the patent application scope is no longer included in the frame of the sea. The clear picture of the video file of the place is 10 The format that can be displayed. For example, the smart monitoring and analysis party described in claim 9 can be a mobile phone supporting GPRS or 3G network, or a computer device supporting the Internet and a browser. The intelligent monitoring and analysis method according to claim 9, wherein the client device further comprises: a display module for presenting the clear face or/and the location video slot through a display The operation group is configured to provide an operation interface for receiving a position information indicated by the user, and moving the camera to a position relative to the position information to photograph the location. 14. The intelligent monitoring and analysis method according to claim 13, wherein the client device receives the clear picture transmitted from the sending module, and the resource address of the video file of the place (Uniform Resource) After L〇cat〇r, url^〇/ or the video file itself of the location, when the user requests to play the video file of the location, the display module will use the resource address of the location video 23 to solve the case. And through the (four) 'transport handle X'., the staff does not present the video file of the place. 15\. If the application of the patent model, the smart monitoring and analysis party to the eight to determine the relative location map When the frame contains the intrusion object, the camera is aimed at the center point of the invading object. 16. The intelligent monitoring and analysis method according to claim 9 of the patent application, further comprising: the In the pen map frame, find the object frame with the identifiable face of the object, and define the relative frame as a clear face.
TW95143183A 2006-11-22 2006-11-22 Intelligent monitoring and analyzing system and method thereof TW200824433A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW95143183A TW200824433A (en) 2006-11-22 2006-11-22 Intelligent monitoring and analyzing system and method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW95143183A TW200824433A (en) 2006-11-22 2006-11-22 Intelligent monitoring and analyzing system and method thereof

Publications (2)

Publication Number Publication Date
TW200824433A TW200824433A (en) 2008-06-01
TWI338504B true TWI338504B (en) 2011-03-01

Family

ID=44771495

Family Applications (1)

Application Number Title Priority Date Filing Date
TW95143183A TW200824433A (en) 2006-11-22 2006-11-22 Intelligent monitoring and analyzing system and method thereof

Country Status (1)

Country Link
TW (1) TW200824433A (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI416068B (en) 2009-12-10 2013-11-21 Ind Tech Res Inst Object tracking method and apparatus for a non-overlapping-sensor network
TWI456530B (en) * 2012-09-24 2014-10-11 Nat Univ Chin Yi Technology Portable anti-invasion alarm system and method using the same
TWI564822B (en) 2015-11-20 2017-01-01 晶睿通訊股份有限公司 Preselectable Video File Playback System, Method Using The Same, and Computer Program Product Using The Same
TWI632814B (en) * 2016-11-11 2018-08-11 財團法人工業技術研究院 A video frame generating method and system thereof

Also Published As

Publication number Publication date
TW200824433A (en) 2008-06-01

Similar Documents

Publication Publication Date Title
CN103635953B (en) User's certain content is used to strengthen the system of viewdata stream
US9516281B1 (en) Systems and methods for automated cloud-based analytics for security surveillance systems with mobile input capture devices
US9514371B1 (en) Systems and methods for automated cloud-based analytics and 3-dimensional (3D) display for surveillance systems
RU2597232C1 (en) Method for providing a video in real time and device for its implementation, as well as a server and a terminal device
US9516279B1 (en) Systems and methods for automated cloud-based 3-dimensional (3D) analytics for surveillance systems
JP6134825B2 (en) How to automatically determine the probability of image capture by the terminal using context data
JP5612310B2 (en) User interface for face recognition
US8891826B2 (en) Image processing system, image processing method, and computer program
US9516278B1 (en) Systems and methods for automated cloud-based analytics and 3-dimensional (3D) playback for surveillance systems
WO2018058899A1 (en) Sound volume adjusting method and apparatus of intelligent terminal
CN103635954A (en) A system to augment a visual data stream based on geographical and visual information
CN103621131A (en) A method for spatially-accurate location of a device using audio-visual information
CN112672208B (en) Video playing method, device, electronic equipment, server and system
WO2021068553A1 (en) Monitoring method, apparatus and device
JPWO2014030407A1 (en) Control device and storage medium
TWI338504B (en)
JP2006513657A (en) Adding metadata to images
TWI430664B (en) Intelligent Image Monitoring System Object Track Tracking System
CN103220469A (en) Camera smart box, camera data processing system and camera data processing method
KR20120036494A (en) Method and system for providing real-time broadcasting information
CN111800604A (en) Method and device for detecting human shape and human face data based on gun and ball linkage
CN108174261B (en) Mobile phone system for intercepting and downloading monitoring video image
WO2021102760A1 (en) Method and apparatus for analyzing behavior of person, and electronic device
CN111695589A (en) Intelligent homeland Internet of things cloud monitoring method and artificial intelligent robot system
CN112055168B (en) Video monitoring method, system and monitoring server

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees
MM4A Annulment or lapse of patent due to non-payment of fees