CN102254394A - Antitheft monitoring method for poles and towers in power transmission line based on video difference analysis - Google Patents

Antitheft monitoring method for poles and towers in power transmission line based on video difference analysis Download PDF

Info

Publication number
CN102254394A
CN102254394A CN2011101442975A CN201110144297A CN102254394A CN 102254394 A CN102254394 A CN 102254394A CN 2011101442975 A CN2011101442975 A CN 2011101442975A CN 201110144297 A CN201110144297 A CN 201110144297A CN 102254394 A CN102254394 A CN 102254394A
Authority
CN
China
Prior art keywords
image
target
sigma
alpha
video
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011101442975A
Other languages
Chinese (zh)
Inventor
黄新波
李文静
陶保震
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Polytechnic University
Original Assignee
Xian Polytechnic University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Polytechnic University filed Critical Xian Polytechnic University
Priority to CN2011101442975A priority Critical patent/CN102254394A/en
Publication of CN102254394A publication Critical patent/CN102254394A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses an antitheft monitoring method for poles and towers in a power transmission line based on video difference analysis. The method comprises the following steps of: acquiring power transmission line video signals by a camera, and transmitting the acquired power transmission line video signals to a monitoring center through a video server; intercepting digital images of the power transmission line needed to be monitored from a video stream by the monitoring center to get a monitored target image; performing pretreatment by a neighborhood averaging method; modeling via a Gaussian mixture method to generate a background image; dividing a moving target in the current frame through a background difference method to implement target detection; identifying the moving target via a method of a support vector machine to obtain a main monitoring target object; and tracking the target object to determine whether the target object has burglary behaviors. The monitoring method disclosed by the invention determines whether somebody wants to steal electric wires, tower materials and the like by detecting, identifying and tracking human bodies, non-human objects and the like, and gives an alarm in time; and devices used in the monitoring method are simple and economic.

Description

A kind of electric power line pole tower anti-thefting monitoring method based on the video variance analysis
Technical field
The invention belongs to video image and handle and transmission line of electricity on-line monitoring technique field, relate to a kind of electric power line pole tower anti-thefting monitoring method, be specifically related to a kind of electric power line pole tower anti-thefting monitoring method based on the video variance analysis.
Background technology
After domestic most of rural area and backcountry switched in succession, shaft tower was in the open air mostly, lacked special messenger's nurse, gave some lawless person's opportunities.Stolen cases such as the round steel, angle steel under the copper core, ground wire, ground lead in aerial high-voltage electric wire and the outdoor power transformer have taken place in a lot of areas.As the material base of electric power industry development, high-voltage power line frequently stolen brings heavy economic losses for power department and users.In order effectively to frighten criminal, stop to steal taking place frequently of electric power facility, just must develop effective transmission line of electricity guard against theft and alarm system.In recent years, many novel shaft tower guard against theft and alarm systems have been researched and developed both at home and abroad, as microwave induced formula burglary-resisting system, based on the acceleration transducer burglary-resisting system, based on the burglary-resisting system of vibration transducer and radar detedtor, induction type burglary-resisting system etc., the system of these systems constitutes similar substantially, and total system is by detecting extension set, Surveillance center, patrolling and examining composition of personnel.A detection extension set is installed on each basic shaft tower, detecting extension set is made up of front end sensors part and single-chip microcomputer or DSP processing section, the status information of mobile object or collection shaft tower are received the information of vibration around the detection shaft tower, use sound and light alarm to warn criminal in case of necessity.Center host monitoring software is in the background work pattern, when receiving the information that certain basic shaft tower sends, activates monitoring software, and the monitor staff determines stolen information by understanding short message content, in time informs the personnel of patrolling and examining.And the method needs a lot of sensors, complex structure, and it is cumbersome that system installs, and processing procedure is more complicated also.
Summary of the invention
The purpose of this invention is to provide a kind of electric power line pole tower anti-thefting monitoring method, solved the problem of existing shaft tower guard against theft and alarm system complex structure, installation trouble, complex disposal process based on the video variance analysis.
The technical solution adopted in the present invention is, a kind of electric power line pole tower anti-thefting monitoring method based on the video variance analysis is specifically implemented according to following steps:
Step 1:, the transmission line of electricity vision signal that collects is sent to Surveillance center by video server by camera collection transmission line of electricity vision signal; Surveillance center intercepts the digital picture of the transmission line of electricity that needs supervision, the target image that obtains monitoring from video flowing;
Step 2: the target image of the supervision that step 1 is obtained adopts neighborhood averaging to carry out pre-service;
Step 3: the pretreated image that step 2 is obtained adopts the mixed Gaussian method to carry out modeling, the generation background image;
Step 4: after treating the background image generation of step 3, adopt the background subtraction point-score that the moving target in the present frame is cut apart, realize target detection;
Step 5: the image after the target detection that the method that adopts support vector machine obtains step 4 carries out moving target identification, obtains main monitoring objective object;
Step 6: the image after the Target Recognition that step 5 is obtained carries out target following, determines the destination object behavior of whether committing theft.
Characteristics of the present invention also are,
Wherein the neighborhood averaging in the step 2 is carried out pre-service, specifically implements according to following steps:
At image space, suppose original image f that a secondary N * N pixel is arranged (x, y), the operation of removing each the pixel point value in the alternative image with the mean value of several pixels in the neighborhood, through obtain after the smoothing processing sub-picture g (x, y):
g ( x , y ) = 1 M Σ ( m , n ) ∈ S f ( m , n ) ,
In the formula: x, y=0,1,2 ..., N-1; S is that (x y) puts the set of the coordinate of field mid point, but wherein do not comprise (x, y) point; M is the sum of set internal coordinate point.
Wherein adopt the mixed Gaussian method to carry out modeling in the step 3, specifically implement according to following steps:
The gray-scale value of each pixel is described with K Gaussian distribution, and the K value gets 3~5, and the size of K value depends on that calculator memory reaches the rate request to algorithm, the K value is big more, the ability of handling grey scale change is strong more, and the corresponding required processing time is also just long more, definition pixel gray-scale value variable X tExpression, its probability density function can be represented with following K three-dimensional Gaussian function:
P ( X t = Σ i = 1 k ω i , t · η ( X t , μ i , t , Σ i , t ) ,
ω in the formula I, tBe i Gaussian distribution in t weight constantly, and have
Figure BDA0000065304470000033
η (X t, μ I, t, ∑ I, t) be t i Gaussian distribution constantly, its average is μ I, t, covariance is a ∑ I, t,
η ( X t , μ i , t , Σ i , t ) = 1 ( 2 π ) n 2 | Σ i , t | 1 / 2 e - 1 2 ( X t - μ i , t ) T Σ i , t - 1 ( X t , μ i , t ) ,
In the formula, i=1 ..., K; N represents X tDimension, R, G, three passages of B are separate, and identical variance is arranged, and then have
Figure BDA0000065304470000035
Figure BDA0000065304470000036
The expression variance, I representation unit battle array.
Wherein adopt the background subtraction point-score that the moving target in the present frame is cut apart in the step 4, realize target detection, specifically implement according to following steps:
At first establish B kBe background image, f kBe current frame image, difference image is D k, D then k(x, y)=| f x(x, y)-B K-1(x, y) |, establish R kBe bianry image after the difference; To R kCarry out connectivity analysis, when the area in the zone of a certain connection greater than certain threshold value, think that then the target that detects occurs, and think that the zone of this connection is exactly detected target image,
Figure BDA0000065304470000041
The binary-state threshold of T for setting.
Image after the target detection that the method that wherein adopts support vector machine in the step 5 obtains step 4 carries out moving target identification, specifically implements according to following steps:
A. linear separability situation:
The general type g of space neutral line discriminant function (x, y)=ω TX+b, the classifying face equation is ω TX+b=0 carries out normalization with discriminant function, and all samples of two classes are all satisfied | g (x) | 〉=1, this moment is from the nearest sample of classifying face | g (x) |=1, and require classifying face to all samples can both be correct classification, require it to satisfy exactly:
y iTx+b)-1≥0,i=1,2,...,n,
Be that those samples that equal sign is set up are support vector in the formula, the gap size in the classification space of two class samples:
M?arg?in=2/||w||,
Therefore, optimal classification face problem can be expressed as following about fasciculation problem, promptly at condition y iTX+b)-1 〉=0, i=1,2 ..., under the constraint of n, ask function
Figure BDA0000065304470000042
Minimum value, the Lagrange function that is defined as follows:
L ( w , b , α ) = 1 2 w T w - Σ i = 1 n α i [ y i ( w T x i + b ) - 1 ] ,
Wherein, α i" 0 be the Lagrange coefficient, following formula respectively to w, b, α iAsk partial differential and make them equal 0:
∂ L ∂ w = 0 ⇒ w = Σ i = 1 n α i y i x i ,
∂ L ∂ b = 0 ⇒ Σ i = 1 n α i y i = 0 ,
∂ L ∂ α i = 0 ⇒ α i [ y i ( w T x i + b ) - 1 ] = 0 ,
More than three formulas add that former constraint condition can change into former problem the dual problem of convex quadratic programming
max Σ i = 1 n a i - Σ i = 1 n Σ j = 1 n α i α j y i y j ( x i T x j ) ,
A wherein i" 0, i=1 ..., n,
Figure BDA0000065304470000055
If Be optimum solution, then
w * = Σ i = 1 n a i * y i x i ,
Figure BDA0000065304470000058
Non-vanishing sample is support vector, and therefore, the overall coefficient vector of optimal classification face is the linear combination of support vector, b *By constraint condition α i[y i(w Tx i+ b)-1]=0 to find the solution, the optimal classification function of trying to achieve thus is:
f ( x ) = sgn ( ( w * ) T x + b * ) = sgn ( Σ i = 1 n a i * y i x i * x + b * ) ,
Sgn () is a sign function;
B. the non-linear situation of dividing:
In the time can not separating 2 class points fully, introduce slack variable ξ with a lineoid ii〉=0, i=1 n), makes lineoid ω TX+b=0 satisfies:
y iTx i+b)≥1-ξ i
As 0<ξ i<1 o'clock sample point x iStill correctly classified, and worked as ξ i〉=1 o'clock sample point x iDivided by wrong, introduce following objective function:
ψ ( w , ξ ) = 1 2 w T w + C Σ i = 1 n ξ i ,
Wherein C is a positive constant, is called penalty factor, and this moment, SVM realized by quadratic programming:
max Σ i = 1 n a i - 1 2 Σ i = 1 n Σ j = 1 n α i α j y i y j ( x i T x j ) ,
0≤a wherein i≤ C, i=1 ..., n, Σ i = 1 n a i y i = 0 .
Wherein the image after the Target Recognition that in the step 6 step 5 is obtained carries out target following, specifically implements according to following steps:
1) in video sequence image, detects new moving target and moving region;
2) moving target of new detection is cut apart;
3) extract the feature of new moving target, and set up the object matching template;
4) with the forecast model target of prediction in next position that constantly may occur, determine next hunting zone of target constantly;
5) To Template with previous moment carries out match search in the hunting zone of prediction, seeks best match position;
6) utilize the target image that matches, revise the template data of tracked target, alternately repeat said process.
The invention has the beneficial effects as follows, in to human body around the electric power line pole tower and non-human body movement monitoring on-line monitoring process, determine whether that by detection, identification, tracking the someone wants to implement theft electric wire, tower material etc., and in time report to the police, and equipment is simple, economical human body and non-human body etc.
Description of drawings
Fig. 1 is certain original image of physical activity around shaft tower constantly in the inventive method;
Fig. 2 handles the background image that the back generates through mixed Gauss model in the inventive method;
Fig. 3 is the principle of work of background subtraction point-score in the inventive method;
Fig. 4 is based on the architecture of the image classification of SVM in the inventive method;
Fig. 5 is the target image through monitoring behind background difference and the image classification in the inventive method;
Fig. 6 is the process flow diagram of motion target tracking in the inventive method;
Fig. 7 is one group of result figure of target following in the inventive method;
Fig. 8 is the process flow diagram of the inventive method.
Embodiment
The present invention is described in detail below in conjunction with the drawings and specific embodiments.
The present invention is based on the electric power line pole tower anti-thefting monitoring method of video variance analysis, as shown in Figure 8, specifically implement according to following steps:
Step 1: by camera collection transmission line of electricity vision signal, it is sent back Surveillance center by transmission channel in real time in the mode of video flowing through video server; Surveillance center intercepts the digital picture of the transmission line of electricity that is monitored from video flowing, the target image that obtains monitoring;
Step 2: the target image of the supervision that step 1 is obtained adopts neighborhood averaging to carry out pre-service to improve picture quality, for the succeeding target recognition and tracking is provided convenience.Specifically implement according to following steps:
At first the video image to input carries out simple time or spatial filtering, comprise level and smooth, the enhancing, recovery of image etc., purpose is to suppress unwanted distortion, noise or strengthens the characteristics of image that some helps subsequent treatment, improve picture quality, for the succeeding target recognition and tracking is provided convenience.In particular cases also need change frame resolution sizes and frame per second at some, or the synchronization video video recording that multiple-camera obtains is carried out image co-registration etc.This invention adopts neighborhood averaging that image is carried out pre-service.
The basic thought of neighborhood averaging is, at image space, suppose original image f that a secondary N * N pixel is arranged (x, y), the operation of removing each the pixel point value in the alternative image with the mean value of several pixels in the neighborhood.Through obtain after the smoothing processing sub-picture g (x, y).
g ( x , y ) = 1 M Σ ( m , n ) ∈ S f ( m , n ) - - - ( 1 )
In the formula: x, y=0,1,2 ..., N-1; S is that (x y) puts the set of the coordinate of field mid point, but wherein do not comprise (x, y) point; M is the sum of set internal coordinate point.
Step 3: the pretreated image that step 2 is obtained carries out modeling, and with the generation background image, its model parameter can adaptive updates, to handle multiple change of background simultaneously.What generation background partly adopted is that the mixed Gaussian method is carried out modeling, because the actual environment more complicated, so consideration is adopted a plurality of Gauss model hybrid modelings to these multi-modal situations, but and its model parameter adaptive updates, adapt to the background of various variations.Specifically implement according to following steps:
Because the shaft tower installation environment more complicated in the reality had both comprised also comprising night daytime, often also have the tree that shakes, with the wind and moving crops, the cloud that waves etc. on every side, complete static background is non-existent at all.For example, a pixel may be represented sky in certain frame, but then may represent leaf in another frame, and then may represent branch in other frames.Pixel brightness value under each state or color value are different, so consider to use a plurality of Gauss models to come hybrid modeling to these multi-modal situations.
The mixed Gauss model modeling principle is as follows: the gray-scale value of each pixel is described with K Gaussian distribution, usually the K value gets 3~5, the size of K value depends on that calculator memory reaches the rate request to algorithm, the K value is big more, the ability of handling grey scale change is strong more, and the corresponding required processing time is also just long more.Definition pixel gray-scale value variable X tExpression, its probability density function can be represented with following K three-dimensional Gaussian function:
P ( X t = Σ i = 1 k ω i , t · η ( X t , μ i , t , Σ i , t ) - - - ( 2 )
ω in the formula I, tBe i Gaussian distribution in t weight constantly, and have
Figure BDA0000065304470000083
η (X t, μ I, t, ∑ I, t) be t i Gaussian distribution constantly, its average is μ I, t, covariance is a ∑ I, t
η ( X t , μ i , t , Σ i , t ) = 1 ( 2 π ) n 2 | Σ i , t | 1 / 2 e - 1 2 ( X t - μ i , t ) T Σ i , t - 1 ( X t , μ i , t ) - - - ( 3 )
In the formula, i=1 ..., K; N represents X tDimension, in order to reduce calculated amount, it has been generally acknowledged that R, G, a B3 passage are separate, and identical variance arranged then have
Figure BDA0000065304470000092
Figure BDA0000065304470000093
The expression variance, I representation unit battle array.As shown in Figures 1 and 2, be respectively certain original image of physical activity and handle the background image that the back generates around shaft tower constantly through mixed Gauss model.
Step 4: after the background image for the treatment of step 3 generates, need cut apart to the moving target in the present frame, can be according to the background subtraction point-score etc., subtract each other with current environment background estimating image and current frame image, realize target detection.Specifically implement according to following steps:
On the basis of computing before, we have well generated the background area of image, next are exactly to utilize the method for background difference to detect target.The background subtraction separating method subtracts each other with current environment background estimating image and current frame image exactly, realizes target detection.
As shown in Figure 3, its principle is as follows: at first establishing Bk is background image, f kBe current frame image, difference image is D k, D then k(x, y)=| f x(x, y)-B K-1(x, y) |, establish R kBe bianry image after the difference.To R kCarry out connectivity analysis, when the area in the zone of a certain connection greater than certain threshold value, think that then the target that detects occurs, and think that the zone of this connection is exactly detected target image.
Figure BDA0000065304470000094
The binary-state threshold of T for setting.
Step 5: the image after the target detection that step 4 is obtained carries out moving target identification: at first carry out filtering by numerous nontarget areas also being taken as for some reason the image that foreground detection comes out, all section objects are carried out area selection, gray scale selection, morphology processing etc., extract the moving target of present frame.But, usually still have being detected of other like this with the similar especially foreground area of target prospect, some wild animals such as wild boar for example, the activity of automobile etc., so its feature of moving target selective extraction of again needs being discerned, carry out image classification identification with the sorter that trains, to determine main monitoring objective object accurately.Specifically implement according to following steps:
Method with support vector machine is carried out the target image Classification and Identification, and support vector machine realizes it being by certain Nonlinear Mapping (kernel function) of selecting in advance input vector to be mapped to a high-dimensional feature space, structure optimal classification lineoid in this space.
A. linear separability situation: SVM is that optimal classification face under the linear separability situation proposes.So-called optimal classification face requires the classifying face not only can two class sample points are faultless separately exactly, and will make the classification gap maximum of two classes.D be space neutral line discriminant function general type g (x, y)=ω TX+b, the classifying face equation is ω TX+b=0, we carry out normalization with discriminant function, and all samples of two classes are all satisfied | g (x) | 〉=1, this moment is from the nearest sample of classifying face | g (x) |=1, and require classifying face to all samples can both be correct classification, require it to satisfy exactly
y iTx+b)-1≥0,i=1,2,...,n (5)
Be that those samples that equal sign is set up are called support vector in the formula.The gap size in the classification space of two class samples:
M?arg?in=2/||w|| (6)
Therefore, optimal classification face problem can be expressed as following about fasciculation problem, promptly under the constraint of condition (5), asks function
Figure BDA0000065304470000101
Minimum value.For this reason, the Lagrange function that can be defined as follows:
L ( w , b , α ) = 1 2 w T w - Σ i = 1 n α i [ y i ( w T x i + b ) - 1 ] - - - ( 7 )
Wherein, α i" 0 be the Lagrange coefficient, our problem is that w and b are asked Lagrange minimum of a function value.Wushu (7) is respectively to w, b, α iAsk partial differential and make them equal 0:
∂ L ∂ w = 0 ⇒ w = Σ i = 1 n α i y i x i - - - ( 8 )
∂ L ∂ b = 0 ⇒ Σ i = 1 n α i y i = 0 - - - ( 9 )
∂ L ∂ α i = 0 ⇒ α i [ y i ( w T x i + b ) - 1 ] = 0 - - - ( 10 )
More than three formulas add that former constraint condition can change into former problem the dual problem of convex quadratic programming:
max Σ i = 1 n a i - Σ i = 1 n Σ j = 1 n α i α j y i y j ( x i T x j ) - - - ( 11 )
A wherein i" 0, i=1 ..., n, Σ i = 1 n a i y i = 0 ,
This is with quadratic function mechanism problem under the individual inequality constrain, has unique optimum solution.If
Figure BDA0000065304470000116
Be optimum solution, then
w * = Σ i = 1 n a i * y i x i - - - ( 12 )
Figure BDA0000065304470000118
Non-vanishing sample is support vector, and therefore, the overall coefficient vector of optimal classification face is the linear combination of support vector.b *Can be by constraint condition α i[y i(w Tx i+ b)-1]=0 to find the solution, the optimal classification function of trying to achieve thus is
f ( x ) = sgn ( ( w * ) T x + b * ) = sgn ( Σ i = 1 n a i * y i x i * x + b * ) - - - ( 13 )
Sgn () is a sign function.
B. the non-linear situation of dividing
When can not be with a lineoid fully separately the time 2 class points (have only base point by mistake minute), can introduce slack variable ξ ii〉=0, i=1 n), makes lineoid ω TX+b=0 satisfies:
y iTx i+b)≥1-ξ i (14)
As 0<ξ i<1 o'clock sample point x iStill correctly classified, and worked as ξ i〉=1 o'clock sample point x iDivided by wrong.For this reason, introduce following objective function:
ψ ( w , ξ ) = 1 2 w T w + C Σ i = 1 n ξ i - - - ( 15 )
Wherein C is a positive constant, is called penalty factor, and this moment, SVM can realize by quadratic programming (dual program):
max Σ i = 1 n a i - 1 2 Σ i = 1 n Σ j = 1 n α i α j y i y j ( x i T x j ) - - - ( 16 )
0≤a wherein i≤ C, i=1 ..., n,
Figure BDA0000065304470000123
Figure 4 shows that architecture based on the image classification of SVM.Figure 5 shows that the target image that monitors through behind background difference and the image classification.
Step 6: the image after the Target Recognition that step 5 is obtained carries out target following, after monitoring destination object, because destination object is in constantly moving, the movement position of destination object is inequality in every two field picture, then need to adopt series of algorithms etc. that target image is followed the tracks of, to determine the destination object behavior of whether committing theft.As shown in Figure 6, specifically implement according to following steps:
Motion target tracking is exactly to find out the position sequence of wherein interested moving target in continuous every two field picture in one section sequence image.The purpose of motion target tracking is exactly by analyzing and researching to sequence image, calculate displacement, movement velocity, the quantity of moving target and the kinematic parameters such as movement locus of moving target of moving target in sequential frame image, for the high level of image is understood and analysis provides foundation.The principle of target following is found out the target accurate location exactly in the next frame image.General tracking is the image that at first extracts tracked target, sets up a template, carries out the full figure coupling then in the next frame image, and the ferret out image is up to the position of finding coupling.Its detailed tracking process prescription of one group of result figure that is illustrated in figure 7 as target following is as follows:
(1) in video sequence image, detects new moving target and moving region;
(2) moving target of new detection is cut apart;
(3) extract the feature of new moving target, and set up the object matching template;
(4) position that may occur in next moment with the forecast model target of prediction is to determine next hunting zone of target constantly.
(5) To Template with previous moment carries out match search in the hunting zone of prediction, seek best match position, can in entire image, search for object like this, and only just can search target near the search window predicted position, thereby can improve search precision, quickening search speed greatly.If when in estimation range, not finding target, will carry out special circumstances and handle.(as blocking situation, pause conditions etc.)
(6) utilize the target image that matches, revise the template data of tracked target, this process constantly alternately repeats.
Step 7: the result after the tracking that obtains according to step 6, if monitor the whereabouts of same target in the continuous n width of cloth image, then start and report to the police, the monitoring personnel will carry out key monitoring to it, have larceny to notify the personnel of patrolling and examining to rush towards the scene immediately in case find it.Otherwise repeat above each step.
The present invention is based on the digital remote image processing techniques, with the digital picture that intercepts in the video flowing that is sent to Surveillance center is research object, adopt a kind of new algorithm mainly in order to the activity of the human body in the piece image around monitoring, the identification shaft tower, when finding that the pedestrian that monitors commits theft suspicion, in time report to the police, for guaranteeing that the electric power enterprise production safety provides a kind of new accurate means directly perceived, has very important realistic meaning.

Claims (6)

1. the electric power line pole tower anti-thefting monitoring method based on the video variance analysis is characterized in that, specifically implements according to following steps:
Step 1:, the transmission line of electricity vision signal that collects is sent to Surveillance center by video server by camera collection transmission line of electricity vision signal; Surveillance center intercepts the digital picture of the transmission line of electricity that needs supervision, the target image that obtains monitoring from video flowing;
Step 2: the target image of the supervision that step 1 is obtained adopts neighborhood averaging to carry out pre-service;
Step 3: the pretreated image that step 2 is obtained adopts the mixed Gaussian method to carry out modeling, the generation background image;
Step 4: after treating the background image generation of step 3, adopt the background subtraction point-score that the moving target in the present frame is cut apart, realize target detection;
Step 5: the image after the target detection that the method that adopts support vector machine obtains step 4 carries out moving target identification, obtains main monitoring objective object;
Step 6: the image after the Target Recognition that step 5 is obtained carries out target following, determines the destination object behavior of whether committing theft.
2. the electric power line pole tower anti-thefting monitoring method based on the video variance analysis according to claim 1 is characterized in that the neighborhood averaging in the described step 2 is carried out pre-service, specifically implements according to following steps:
At image space, suppose original image f that a secondary N * N pixel is arranged (x, y), with the operation of each the pixel point value in the mean value alternative image of several pixels in the neighborhood, through obtain after the smoothing processing sub-picture g (x, y):
g ( x , y ) = 1 M Σ ( m , n ) ∈ S f ( m , n ) ,
In the formula: x, y=0,1,2 ..., N-1; S is that (x y) puts the set of the coordinate of field mid point, but wherein do not comprise (x, y) point; M is the sum of set internal coordinate point.
3. the electric power line pole tower anti-thefting monitoring method based on the video variance analysis according to claim 1 is characterized in that, adopts the mixed Gaussian method to carry out modeling in the described step 3, specifically implements according to following steps:
The gray-scale value of each pixel is described with K Gaussian distribution, and the K value gets 3~5, and the size of K value depends on that calculator memory reaches the rate request to algorithm, the K value is big more, the ability of handling grey scale change is strong more, and the corresponding required processing time is also just long more, definition pixel gray-scale value variable X tExpression, its probability density function can be represented with following K three-dimensional Gaussian function:
P ( X t = Σ i = 1 k ω i , t · η ( X t , μ i , t , Σ i , t ) ,
ω in the formula I, tBe i Gaussian distribution in t weight constantly, and have
Figure FDA0000065304460000022
η (X t, μ I, t, ∑ I, t) be t i Gaussian distribution constantly, its average is μ I, t, covariance is a ∑ I, t,
η ( X t , μ i , t , Σ i , t ) = 1 ( 2 π ) n 2 | Σ i , t | 1 / 2 e - 1 2 ( X t - μ i , t ) T Σ i , t - 1 ( X t , μ i , t ) ,
In the formula, i=1 ..., K; N represents X tDimension, R, G, three passages of B are separate, and identical variance is arranged, and then have
Figure FDA0000065304460000024
Figure FDA0000065304460000025
The expression variance, I representation unit battle array.
4. the electric power line pole tower anti-thefting monitoring method based on the video variance analysis according to claim 1, it is characterized in that, adopt the background subtraction point-score that the moving target in the present frame is cut apart in the described step 4, realize target detection, specifically implement according to following steps:
At first establish B kBe background image, f kBe current frame image, difference image is D k, D then k(x, y)=| f x(x, y)-B K-1(x, y) |, establish R kBe bianry image after the difference; To R kCarry out connectivity analysis, when the area in the zone of a certain connection greater than certain threshold value, think that then the target that detects occurs, and think that the zone of this connection is exactly detected target image,
Figure FDA0000065304460000031
The binary-state threshold of T for setting.
5. the electric power line pole tower anti-thefting monitoring method based on the video variance analysis according to claim 1, it is characterized in that, image after the target detection that the method that adopts support vector machine in the described step 5 obtains step 4 carries out moving target identification, specifically implements according to following steps:
A. linear separability situation:
The general type g of space neutral line discriminant function (x, y)=ω TX+b, the classifying face equation is ω TX+b=0 carries out normalization with discriminant function, and all samples of two classes are all satisfied | g (x) | 〉=1, this moment is from the nearest sample of classifying face | g (x) |=1, require classifying face to all samples can both be correct classification, require it to satisfy exactly:
y iTx+b)-1≥0,i=1,2,...,n,
Be that those samples that equal sign is set up are support vector in the formula, the gap size in the classification space of two class samples:
M?arg?in=2/||w||,
Therefore, optimal classification face problem can be expressed as following about fasciculation problem, promptly at condition y iTX+b)-1 〉=0, i=1,2 ..., under the constraint of n, ask function
Figure FDA0000065304460000032
Minimum value, the Lagrange function that is defined as follows:
L ( w , b , α ) = 1 2 w T w - Σ i = 1 n α i [ y i ( w T x i + b ) - 1 ] ,
Wherein, α i" 0 be the Lagrange coefficient, following formula respectively to w, b, α iAsk partial differential and make them equal 0:
∂ L ∂ w = 0 ⇒ w = Σ i = 1 n α i y i x i ,
∂ L ∂ b = 0 ⇒ Σ i = 1 n α i y i = 0 ,
∂ L ∂ α i = 0 ⇒ α i [ y i ( w T x i + b ) - 1 ] = 0 ,
More than three formulas add that former constraint condition can change into former problem the dual problem of convex quadratic programming:
max Σ i = 1 n a i - Σ i = 1 n Σ j = 1 n α i α j y i y j ( x i T x j ) ,
A wherein i" 0, i=1 ..., n,
Figure FDA0000065304460000046
If
Figure FDA0000065304460000047
Be optimum solution, then
w * = Σ i = 1 n a i * y i x i ,
Figure FDA0000065304460000049
Non-vanishing sample is support vector, and therefore, the overall coefficient vector of optimal classification face is the linear combination of support vector, b *By constraint condition α i[y i(w Tx i+ b)-1]=0 to find the solution, the optimal classification function of trying to achieve thus is:
f ( x ) = sgn ( ( w * ) T x + b * ) = sgn ( Σ i = 1 n a i * y i x i * x + b * ) ,
Sgn () is a sign function;
B. the non-linear situation of dividing:
In the time can not separating 2 class points fully, introduce slack variable ξ with a lineoid ii〉=0, i=1 n), makes lineoid ω TX+b=0 satisfies:
y iTx i+b)≥1-ξ i
As 0<ξ i<1 o'clock sample point x iStill correctly classified, and worked as ξ i〉=1 o'clock sample point x iDivided by wrong, introduce following objective function:
ψ ( w , ξ ) = 1 2 w T w + C Σ i = 1 n ξ i ,
Wherein C is a positive constant, is called penalty factor, and this moment, SVM realized by quadratic programming:
max Σ i = 1 n a i - 1 2 Σ i = 1 n Σ j = 1 n α i α j y i y j ( x i T x j ) ,
0≤a wherein i≤ C, i=1 ..., n, Σ i = 1 n a i y i = 0 .
6. the electric power line pole tower anti-thefting monitoring method based on the video variance analysis according to claim 1 is characterized in that the image after the Target Recognition that in the described step 6 step 5 is obtained carries out target following, specifically implements according to following steps:
1) in video sequence image, detects new moving target and moving region;
2) moving target of new detection is cut apart;
3) extract the feature of new moving target, and set up the object matching template;
4) with the forecast model target of prediction in next position that constantly may occur, determine next hunting zone of target constantly;
5) To Template with previous moment carries out match search in the hunting zone of prediction, seeks best match position;
6) utilize the target image that matches, revise the template data of tracked target, alternately repeat said process.
CN2011101442975A 2011-05-31 2011-05-31 Antitheft monitoring method for poles and towers in power transmission line based on video difference analysis Pending CN102254394A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011101442975A CN102254394A (en) 2011-05-31 2011-05-31 Antitheft monitoring method for poles and towers in power transmission line based on video difference analysis

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011101442975A CN102254394A (en) 2011-05-31 2011-05-31 Antitheft monitoring method for poles and towers in power transmission line based on video difference analysis

Publications (1)

Publication Number Publication Date
CN102254394A true CN102254394A (en) 2011-11-23

Family

ID=44981633

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011101442975A Pending CN102254394A (en) 2011-05-31 2011-05-31 Antitheft monitoring method for poles and towers in power transmission line based on video difference analysis

Country Status (1)

Country Link
CN (1) CN102254394A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102901910A (en) * 2012-11-02 2013-01-30 智眼天下通(北京)科技发展有限公司 Monitoring method and system for high-voltage overhead line corridor
CN102903120A (en) * 2012-07-19 2013-01-30 中国人民解放军国防科学技术大学 Time-space condition information based moving object detection method
CN102955940A (en) * 2012-11-28 2013-03-06 山东电力集团公司济宁供电公司 System and method for detecting power transmission line object
CN103338336A (en) * 2013-07-03 2013-10-02 国家电网公司 Video detection method for firework early warning of overhead power transmission line passage
CN104077872A (en) * 2014-05-13 2014-10-01 国家电网公司 Anti-external force monitoring early warning method of electric transmission line based on image recognition
CN106971500A (en) * 2017-05-04 2017-07-21 国网山东省电力公司武城县供电公司 The safe distance warning device and method of transformer
CN107119657A (en) * 2017-05-15 2017-09-01 苏州科技大学 A kind of view-based access control model measures foundation ditch monitoring method
CN109460705A (en) * 2018-09-26 2019-03-12 北京工业大学 Oil pipeline monitoring method based on machine vision
CN111223079A (en) * 2019-12-31 2020-06-02 国网北京市电力公司 Power transmission line detection method and device, storage medium and electronic device
CN113128463A (en) * 2021-05-07 2021-07-16 支付宝(杭州)信息技术有限公司 Image recognition method and system
CN114445992A (en) * 2022-02-14 2022-05-06 扬州大学 Real-time video monitoring method
CN115147450A (en) * 2022-09-05 2022-10-04 中印云端(深圳)科技有限公司 Moving target detection method and detection device based on motion frame difference image

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
姚辉: "移动目标视频跟踪关键技术的研究", 《中国优秀硕士学位论文全文数据库信息科技辑》 *
张光伟: "视频序列中入侵目标检测算法研究", 《中国优秀硕士学位论文全文数据库信息科技辑》 *
王亮芬: "摄像机情况下目标检测及轨迹分析", 《中国优秀硕士学位论文全文数据库信息科技辑》 *
王建鹏: "矿山变形灾害监测相关理论及模型研究", 《中国博士学位论文全文数据库基础科学辑》 *
王慧琴: "《数字图像处理》", 30 November 2006, 北京邮电大学出版社 *

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102903120A (en) * 2012-07-19 2013-01-30 中国人民解放军国防科学技术大学 Time-space condition information based moving object detection method
CN102901910B (en) * 2012-11-02 2016-08-03 智眼天下通(北京)科技发展有限公司 The monitoring method of high-voltage overhead line corridor and system thereof
CN102901910A (en) * 2012-11-02 2013-01-30 智眼天下通(北京)科技发展有限公司 Monitoring method and system for high-voltage overhead line corridor
CN102955940A (en) * 2012-11-28 2013-03-06 山东电力集团公司济宁供电公司 System and method for detecting power transmission line object
CN103338336B (en) * 2013-07-03 2016-09-21 国家电网公司 A kind of video detecting method of overhead power transmission line passage pyrotechnics early warning
CN103338336A (en) * 2013-07-03 2013-10-02 国家电网公司 Video detection method for firework early warning of overhead power transmission line passage
CN104077872A (en) * 2014-05-13 2014-10-01 国家电网公司 Anti-external force monitoring early warning method of electric transmission line based on image recognition
CN106971500A (en) * 2017-05-04 2017-07-21 国网山东省电力公司武城县供电公司 The safe distance warning device and method of transformer
CN107119657A (en) * 2017-05-15 2017-09-01 苏州科技大学 A kind of view-based access control model measures foundation ditch monitoring method
CN107119657B (en) * 2017-05-15 2019-04-26 苏州科技大学 A kind of view-based access control model measurement pit retaining monitoring method
CN109460705A (en) * 2018-09-26 2019-03-12 北京工业大学 Oil pipeline monitoring method based on machine vision
CN111223079A (en) * 2019-12-31 2020-06-02 国网北京市电力公司 Power transmission line detection method and device, storage medium and electronic device
CN113128463A (en) * 2021-05-07 2021-07-16 支付宝(杭州)信息技术有限公司 Image recognition method and system
CN114445992A (en) * 2022-02-14 2022-05-06 扬州大学 Real-time video monitoring method
CN115147450A (en) * 2022-09-05 2022-10-04 中印云端(深圳)科技有限公司 Moving target detection method and detection device based on motion frame difference image

Similar Documents

Publication Publication Date Title
CN102254394A (en) Antitheft monitoring method for poles and towers in power transmission line based on video difference analysis
CN108709633B (en) Distributed optical fiber vibration sensing intelligent safety monitoring method based on deep learning
EP3633615A1 (en) Deep learning network and average drift-based automatic vessel tracking method and system
CN110650316A (en) Intelligent patrol and early warning processing method and device, electronic equipment and storage medium
CN104378582A (en) Intelligent video analysis system and method based on PTZ video camera cruising
CN103810717B (en) A kind of human body behavioral value method and device
CN101635835A (en) Intelligent video monitoring method and system thereof
CN102164270A (en) Intelligent video monitoring method and system capable of exploring abnormal events
CN104123544A (en) Video analysis based abnormal behavior detection method and system
CN105631427A (en) Suspicious personnel detection method and system
CN104966304A (en) Kalman filtering and nonparametric background model-based multi-target detection tracking method
CN102521565A (en) Garment identification method and system for low-resolution video
WO2004042673A2 (en) Automatic, real time and complete identification of vehicles
Piciarelli et al. Surveillance-oriented event detection in video streams
CN101727672A (en) Method for detecting, tracking and identifying object abandoning/stealing event
Singh et al. IoT based weapons detection system for surveillance and security using YOLOV4
Lumentut et al. Evaluation of recursive background subtraction algorithms for real-time passenger counting at bus rapid transit system
CN104159088A (en) System and method of remote monitoring of intelligent vehicle
Chauhan et al. Study of moving object detection and tracking for video surveillance
CN109977796A (en) Trail current detection method and device
CN112733770A (en) Regional intrusion monitoring method and device
CN101286238A (en) Bionic intelligent monitoring system
CN114898287A (en) Method and device for dinner plate detection early warning, electronic equipment and storage medium
Zhang et al. Vehicle detection and tracking in remote sensing satellite vidio based on dynamic association
CN102419906A (en) Automatic traffic flow detecting system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20111123