CN102289908A - Image analysis-based independent association real-time anti-theft system - Google Patents
Image analysis-based independent association real-time anti-theft system Download PDFInfo
- Publication number
- CN102289908A CN102289908A CN2011102192318A CN201110219231A CN102289908A CN 102289908 A CN102289908 A CN 102289908A CN 2011102192318 A CN2011102192318 A CN 2011102192318A CN 201110219231 A CN201110219231 A CN 201110219231A CN 102289908 A CN102289908 A CN 102289908A
- Authority
- CN
- China
- Prior art keywords
- real
- time
- camera
- burglary
- alarm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000010191 image analysis Methods 0.000 title abstract description 13
- 238000004458 analytical method Methods 0.000 claims description 16
- 238000010835 comparative analysis Methods 0.000 claims 2
- 238000013480 data collection Methods 0.000 abstract description 6
- 238000012544 monitoring process Methods 0.000 description 17
- 238000010219 correlation analysis Methods 0.000 description 16
- 238000000034 method Methods 0.000 description 12
- 230000008569 process Effects 0.000 description 10
- 238000007726 management method Methods 0.000 description 6
- 238000012545 processing Methods 0.000 description 6
- 230000008901 benefit Effects 0.000 description 3
- 230000008859 change Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000007418 data mining Methods 0.000 description 2
- 230000007123 defense Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 230000006855 networking Effects 0.000 description 2
- 238000010223 real-time analysis Methods 0.000 description 2
- 230000008521 reorganization Effects 0.000 description 2
- 238000003287 bathing Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000002996 emotional effect Effects 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 230000006698 induction Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 230000003340 mental effect Effects 0.000 description 1
- 238000012806 monitoring device Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 239000000523 sample Substances 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 230000033772 system development Effects 0.000 description 1
- 230000026676 system process Effects 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Images
Landscapes
- Alarm Systems (AREA)
Abstract
本发明提供一种基于图像分析的自主关联实时防盗系统,主要包括建立图像数据采集及目标对象特征信息集合部分、摄像头对采集的图像进行关联度对比分析系统以及自动报警系统部分,通过互联网相连接。本发明具有比较高的实时性、安全性、防盗性、可靠性,适用于宾馆、幼儿园等场所。
The present invention provides an autonomous correlation real-time anti-theft system based on image analysis, which mainly includes the establishment of image data collection and target object feature information collection part, the camera system for comparing the correlation degree of the collected images and the automatic alarm system part, which are connected through the Internet . The invention has relatively high real-time performance, security, anti-theft performance and reliability, and is suitable for hotels, kindergartens and other places.
Description
技术领域 technical field
本发明涉及一种防盗系统,具体涉及一种基于图像分析的自主关联实时防盗系统。The invention relates to an anti-theft system, in particular to an autonomously associated real-time anti-theft system based on image analysis.
背景技术 Background technique
目前,在一些特定的公共场所,如:博物馆,电影院、网吧、饭店、宾馆、停车场、儿童游乐场、小学或幼儿园等发生财物被盗或小孩被陌生人领走等事件时有发生。在这些场所,往往均安装了摄像头等类似监控装置,却不能及时避免事件的发生,只能在事后报警由公安人员根据现场录像等资料进行破案。另外,还有一些防盗措施。通过安装一些微型开关通过报警防止犯罪嫌疑人对诸如博物馆、网吧等的藏品和计算机部件进行盗窃;在停车场设置一些类似千斤顶的装置,将停放的汽车的驱动部分抬高,防止车辆被盗;对于诸如皮箱、旅行包、手提包等随身物品,设置一对具有应答发射功能的小装置,当物件离开主人一定距离时就发出报警声;在小学或幼儿园,给家长发接送卡,凭卡领人。从上述措施,可以看出目前这些场合的防盗措施是被动、死板和不安全的。At present, in some specific public places, such as: museums, movie theaters, Internet cafes, restaurants, hotels, parking lots, children's playgrounds, primary schools or kindergartens, property theft or children being taken away by strangers often occur. In these places, cameras and other similar monitoring devices are often installed, but they cannot avoid the occurrence of incidents in time. They can only call the police afterwards and the public security personnel can solve the case based on on-site video and other materials. In addition, there are some anti-theft measures. Prevent criminal suspects from stealing collections and computer components such as museums and Internet cafes by installing some micro-switches and alarms; set up some jack-like devices in the parking lot to raise the driving part of the parked car to prevent theft of the vehicle; For personal items such as suitcases, travel bags, handbags, etc., set up a pair of small devices with response emission function, and when the object leaves a certain distance from the owner, an alarm will sound; leader. From the above measures, it can be seen that the anti-theft measures in these occasions are passive, rigid and unsafe.
许多公共场合均安装具备摄像头,自感应红外传感器等监控系统,该系统仅能对所限辖区域进行录像监控,为事发后的取证、分析和处理提供证据。这种监控系统广泛应用于博物馆、网吧、饭店、宾馆、幼儿园与小学、公共洗浴中心和停车场等。Many public places are equipped with monitoring systems such as cameras and self-sensing infrared sensors. This system can only conduct video surveillance of restricted areas to provide evidence for evidence collection, analysis and processing after the incident. This monitoring system is widely used in museums, Internet cafes, restaurants, hotels, kindergartens and primary schools, public bathing centers and parking lots.
该监控系统的缺点主要为被动事后取证,不能有效防止财物、汽车的失窃以及冒领儿童等事件的发生。如顾客进入宾馆时携带一个手提包,当该手提包被其他人从客房中盗走时,监控系统只记录了小偷出入宾馆的过程,却未能即时自动识别出小偷携带客人的手提包离开时而报警,此过程只能在事发后根据相关证据调查处理,因此整个手提包被盗以及案发犯罪嫌疑人逃离现场过程缺乏报警时实性,造成监控系统的“监”而不“控”的尴尬局面,带给客户和商家造成的大量精神和物质损失。The shortcoming of this monitoring system is mainly passive evidence collection after the event, which cannot effectively prevent the theft of property and cars, and the occurrence of false claims of children. For example, when a customer enters a hotel with a handbag, when the handbag is stolen from the guest room by others, the monitoring system only records the process of the thief entering and leaving the hotel, but fails to immediately and automatically recognize that the thief is carrying the guest’s handbag and leaves and calls the police , this process can only be investigated and dealt with after the incident based on relevant evidence. Therefore, the process of the entire handbag being stolen and the criminal suspect fleeing the scene lacked real-time alarming, resulting in the embarrassment of "monitoring" rather than "control" by the monitoring system. The situation has brought a lot of mental and material losses to customers and businesses.
现在多数网吧均采用如下主要防盗形式:Most Internet cafes now adopt the following main anti-theft forms:
(1)网吧出入口及室内安装闭路监控系统:主要监视网吧的进出人员大致情况,可以帮助从整体上掌握网吧的流动人员动向。(1) Closed-circuit monitoring system installed at the entrance and exit of Internet cafes and indoors: it mainly monitors the general situation of people entering and leaving Internet cafes, and can help to grasp the movement of mobile personnel in Internet cafes as a whole.
(2)网吧内部主机监控系统:主要采用改装防盗加锁机箱或者在机箱内部安装电子磁铁开关,来监控网吧内的主机情况。每台电脑和网管监控设备相连接,一旦有人打开主机箱或者搬走显示器,网管系统就语音报警。(2) Internal host monitoring system of Internet cafes: Mainly use modified anti-theft lock chassis or install electronic magnet switches inside the chassis to monitor the host computer conditions in Internet cafes. Each computer is connected to the network management monitoring equipment. Once someone opens the main box or removes the monitor, the network management system will give a voice alarm.
(3)增加网管的巡视人员。(3) Increase the inspection staff of the network management.
其主要缺点,对第一种形式,采用闭路监控摄像头进行监控的保护,效果不仅受到监控人员的工作时间长短、情绪态度和工作方法等因素影响,而且本身存在监控死角,当室内环境污浊或者灯光暗淡监控图像也未必清晰,网吧失窃现象必然会发生。一般整套的闭路监控系统价格也比较昂贵。第二种形式是采用防盗锁只能对一般的小偷起到防盗作用,专业的小偷仍然可以开锁盗窃。采用磁铁感应开关对所处环境要求也比较严格,一旦有电磁干扰设备存在就会失灵,因此该装置的工作稳定性也较差,也起不到报警的作用。第三种形式虽然增加了网管巡视人员的数量,安全性也将提高,但是网吧电脑部件被盗本身是小概率事件,这就带来了人力资源和财力的浪费,其性价比不高并不符合网吧赢利的根本目的。Its main disadvantage is that for the first form, the use of closed-circuit surveillance cameras for monitoring protection, the effect is not only affected by factors such as the working hours, emotional attitudes, and working methods of the monitoring personnel, but also has monitoring dead spots. When the indoor environment is dirty or the lighting Dim monitoring images may not be clear, and Internet cafe theft is bound to happen. Generally, the whole set of closed-circuit monitoring system is also more expensive. Second kind of form is to adopt anti-theft lock and can only play anti-theft effect to general thief, and professional thief can still unlock and steal. The use of magnet induction switches also requires stricter environmental requirements. Once there is electromagnetic interference equipment, it will fail. Therefore, the working stability of the device is also relatively poor, and it cannot function as an alarm. Although the third form increases the number of network management patrol personnel, the security will also be improved, but the theft of computer components in Internet cafes is a small probability event, which brings a waste of human resources and financial resources, and its cost performance is not high. The fundamental purpose of Internet cafes to make money.
发明内容 Contents of the invention
本发明,针对上述多种措施存在缺陷,提出一种基于图像分析的自主关联实时防盗系统,采用图像处理技术,对目标进行主动识别、分析和关联度判断,建立一种关联模型,该模型包括被保护的人、与人相关的物品、目标对象之间的属性关系、目标出现时间及特定空间等元素,把该模型中的各个元素处理构成一个相互关联的模块,模块内的所有元素强制组成具有一定关联度的集合。系统把集合内的所有相关联元素由综合数据库处理阈值化,并把这些阈值化的数据存储于主机以便随时调取。例如,物体和物体所处地理位置、人和物体、大人和小孩、旅客和客房、停车场和汽车等关联集合。只有集合内的所有元素被判定为相互关联,不能与其他非关联对象如其他人太靠近或处于接近的时间过长,否则,系统将对目标进行预警提示或报警,对被关联的目标对象进行主人确认,确保财物、车辆和小孩等保护目标处于安全状态。In view of the defects in the above-mentioned various measures, the present invention proposes a self-associated real-time anti-theft system based on image analysis, which adopts image processing technology to actively identify, analyze and judge the degree of association of the target, and establishes an association model, which includes Protected people, objects related to people, attribute relationships between target objects, target appearance time and specific space, etc., each element in the model is processed to form an interrelated module, and all elements in the module are compulsively composed A collection with a certain degree of association. The system thresholds all associated elements in the set by the comprehensive database, and stores these thresholded data in the host computer for retrieval at any time. For example, objects and their geographic location, people and objects, adults and children, passengers and guest rooms, parking lots and cars, etc. Only all the elements in the collection are judged to be related to each other, and they cannot be too close to other non-related objects such as other people or stay close for too long, otherwise, the system will give an early warning prompt or alarm to the target, and carry out The owner confirms that the protection targets such as property, vehicles and children are in a safe state.
其技术方案为:Its technical solution is:
一种基于图像分析的自主关联实时防盗系统,主要包括建立图像数据采集及目标对象特征信息集合部分、摄像头对采集的图像进行关联度对比分析系统以及自动报警系统部分,通过互联网相连接。An autonomous correlation real-time anti-theft system based on image analysis, which mainly includes the establishment of image data collection and target object feature information collection, the camera's correlation analysis system for the collected images, and the automatic alarm system, which are connected through the Internet.
进一步优选,所述建立图像数据采集及目标对象特征信息集合部分包括摄像头、音频视频传输器、应用系统主机、数据库综合应用服务器。Further preferably, the part for establishing image data collection and target object characteristic information collection includes a camera, an audio and video transmitter, an application system host, and a database comprehensive application server.
进一步,所述摄像头有线或者无线摄像头。Further, the camera is a wired or wireless camera.
本发明的一个实施例中,所述摄像头为具有高清摄像机、镜头和旋转云台集成的摄像头。In one embodiment of the present invention, the camera is a camera integrated with a high-definition camera, a lens and a rotating pan/tilt.
本发明一种基于图像分析的自主关联实时防盗系统,所述摄像头对采集的图像进行关联度对比分析系统包括具有防盗系统功能主机及联网主机。The present invention is an image analysis-based self-associated real-time anti-theft system. The system for comparing and analyzing the correlation degree of images collected by the camera includes a host computer with an anti-theft system function and a networked host computer.
关联度分析:指在系统发展过程中,如果两个因素变化的态势是一致的,即同步变化程度较高,则可以认为两者关联较大;反之,则两者关联度较小。因此,关联度分析对于一个系统发展变化态势提供了量化的度量,非常适合动态(Dynamic)的历程分析。Correlation analysis: it means that in the process of system development, if the change trend of two factors is consistent, that is, the degree of synchronous change is high, it can be considered that the correlation between the two is relatively large; otherwise, the correlation between the two is small. Therefore, correlation analysis provides a quantitative measurement of the development and change of a system, which is very suitable for dynamic process analysis.
本发明中的‘关联度分析’和现有的关联度分析概念不太一致,现有关联分析概念多指如果两个或多个事物之间存在一定的关联,其中一个事物就能通过其他事物进行预测,比如股市利用关联度分析概念能预测股市的大体走向、超市商品的摆放位置恰当能提高商场的销售额、数据挖掘中利用关联度分析能对常见的类进行分类和聚类,找出数据的趋势和走向等。本发明中的关联度是强制关联关系,相距太远的个体不在系统保护范围之内的就不具有关联关系,比如两个目标出现在同一个系统,系统将这两个目标强制关联在一起,如果两个目标离开的距离超出了系统规定的阈值范围,这种关联关系就不存在了,系统对进入系统范围的前后两种关联度进行自主分析并进行对比,系统发现两种关联度分析结果遭到破坏,系统经过判断就会触发报警系统进行预警或者报警。本发明系统关联度分析的第二层涵义就是,比如一个人和他所带的物品相关联构成一个关联度集合,人和具体带的物品种类属性无关,人可以带任何物品,只要人和物品落入系统保护范围,系统就会把这个两个对象强制关联在一起。不在所述范围之内的,均不在系统保护范围之内。比如,一个宾客进入宾馆手提提包,那么这个宾客就和这个提包相关联,如果还是这个宾客进入宾馆领的一个小孩,那么这个宾客就和小孩相关联。这个宾客和系统外的任何事物都无关。The 'correlation analysis' in the present invention is not quite consistent with the existing concept of correlation analysis. The existing concept of correlation analysis mostly means that if there is a certain correlation between two or more things, one of them can pass through other things. Prediction, for example, the stock market can use the concept of correlation analysis to predict the general trend of the stock market, the proper placement of supermarket products can increase the sales of shopping malls, and the use of correlation analysis in data mining can classify and cluster common classes. Data trends and trends. The degree of association in the present invention is a mandatory association relationship. Individuals who are too far apart are not within the scope of protection of the system. For example, if two objects appear in the same system, the system will forcibly associate these two objects together. If the distance between the two targets exceeds the threshold range stipulated by the system, this correlation does not exist. The system independently analyzes and compares the two correlation degrees before and after entering the system range, and the system finds two correlation degree analysis results If it is damaged, the system will trigger the alarm system for early warning or alarm after judgment. The second meaning of the correlation degree analysis of the system of the present invention is that, for example, a person is associated with the items he carries to form a correlation degree set, and the person has nothing to do with the type and attribute of the specific item. The person can carry any item, as long as the person and the item If it falls into the protection scope of the system, the system will forcibly associate the two objects together. Those that are not within the stated scope are not within the protection scope of the system. For example, if a guest enters a hotel with a handbag, then the guest is associated with the bag. If the guest enters the hotel to pick up a child, then the guest is associated with the child. This guest has nothing to do with anything outside the system.
进一步优选,所述联网主机为处于不同地理位置的多台主机。Further preferably, the networked hosts are multiple hosts located in different geographic locations.
本发明一种基于图像分析的自主关联实时防盗系统,所述自动报警系统为报警器、用户手机、电话、其他主机。The present invention is an image analysis-based self-associated real-time anti-theft system, wherein the automatic alarm system is an alarm, a user's mobile phone, a telephone, and other hosts.
进一步优选,所述报警器为有线或无线。Further preferably, the alarm is wired or wireless.
与现有技术相比,本发明的关键技术是,对采集的目标影像资料及图片进行实时处理,被系统处理过的数据元素具有以下性质:Compared with the prior art, the key technology of the present invention is to process the collected target image data and pictures in real time, and the data elements processed by the system have the following properties:
(1)集合内所有元素具有强制关联性;(1) All elements in the set have mandatory association;
(2)集合内的所有元素均阈值化;(2) All elements in the set are thresholded;
(3)集合内任何元素的关联性被破坏时,经系统判断都会触发报警器预警提示或报警。(3) When the correlation of any element in the set is destroyed, the system will trigger an alarm warning prompt or alarm after the system judges.
对经系统处理过的数据建立关联阈值集合并存放于主机综合数据库,综合应用数据库对存储的数据进行装载、编辑、检索、更新、分类再组织等相关操作,当系统再次取得目标的关联阈值时就进行目标匹配,可以达到实时的处理。当达到报警条件则及时报警。这个系统的报警过程非常短暂,具有比较高的实时性、安全性、防盗性、可靠性,本发明不需要增加额外的硬件资源即可实现有效防盗,具有节约资源、节省成本和提高破案效率等优点。Establish a collection of association thresholds for the data processed by the system and store them in the host comprehensive database. The comprehensive application database performs related operations such as loading, editing, retrieval, updating, classification and reorganization of the stored data. When the system obtains the target association threshold again Just perform target matching, which can achieve real-time processing. When the alarm condition is reached, the alarm will be called in time. The alarm process of this system is very short, and has relatively high real-time performance, safety, anti-theft, and reliability. The present invention can realize effective anti-theft without adding additional hardware resources, and has the advantages of saving resources, saving costs, and improving the efficiency of solving crimes, etc. advantage.
附图说明 Description of drawings
下面结合附图和实施例对本发明的技术方案进一步说明。The technical solution of the present invention will be further described below in conjunction with the accompanying drawings and embodiments.
图1是本发明基于图像分析的自主关联实时防盗系统结构图;Fig. 1 is a structural diagram of the present invention's self-associated real-time anti-theft system based on image analysis;
图2及图3是本发明基于图像分析的自主关联实时防盗系统流程图。Fig. 2 and Fig. 3 are the flowcharts of the self-associated real-time anti-theft system based on image analysis of the present invention.
具体实施方式 Detailed ways
参照图1、图2、图3,一种基于图像分析的自主关联实时防盗系统,主要包括建立图像数据采集及目标对象特征信息集合部分、摄像头对采集的图像进行关联度对比分析系统以及自动报警系统部分,通过互联网相连接。Referring to Figure 1, Figure 2, and Figure 3, an image analysis-based self-associated real-time anti-theft system mainly includes the establishment of image data collection and target object feature information collection, a system for comparing and analyzing the image collected by the camera, and an automatic alarm The system part is connected through the Internet.
(1)建立图像数据采集及目标对象特征信息集合部分(1) Establish image data collection and target object feature information collection part
此部分主要内容为:摄像探头实时监控信息点的实时状态(不同的环境可以经过联网设置多个摄像装置),对出现的目标对象进行实时的摄像及图片抓取。同时,系统采集目标对象其他相关信息。系统对采集的图像数据和目标对象特征集合元素进行实时处理,主要操作包括的集合元素的装载、编辑、检索、更新、分类再组织等,建一个关联度集合存储于综合数据库。实现形式如下例所示:The main content of this part is: the camera probe monitors the real-time status of information points in real time (multiple camera devices can be set up through networking in different environments), and performs real-time camera and picture capture of the target objects that appear. At the same time, the system collects other relevant information of the target object. The system processes the collected image data and feature set elements of the target object in real time. The main operations include loading, editing, retrieval, updating, classification and reorganization of the set elements, and builds a set of correlations and stores it in the comprehensive database. The implementation form is shown in the following example:
例1监控系统对进入宾馆的宾客以及和其随身携带的相关物品构成系统,摄像头采集宾客的特征、和宾客相关的物品特征、宾客出现的时间及地点,同时与宾客登记入住的身份、联系方式、一行人数、入住房间号等信息相关联。Example 1 The monitoring system constitutes a system for the guests entering the hotel and the related items they carry with them. The camera collects the characteristics of the guests, the characteristics of the items related to the guests, the time and place of the guests, and at the same time, the identity and contact information of the guests are registered. , the number of people in a group, the room number and other information.
例2在幼儿园门口或特定小孩接送地点安装此系统,此系统对首次出现的小孩及其家长进行图像采集,并将目标对象的其它信息录入,建立一个特定关联度集合。此集合包括小孩和家长的基本特征,具体可包括小孩和家长的外貌特征、关系属性、姓名、年龄、住址以及联系方式等。Example 2 Install this system at the gate of the kindergarten or at a specific pick-up location for children. The system collects images of children who appear for the first time and their parents, and enters other information of the target object to establish a set of specific correlations. This collection includes the basic characteristics of the child and the parent, specifically the appearance characteristics, relationship attributes, name, age, address, and contact information of the child and the parent.
(2)摄像头对采集的图像进行关联度对比分析系统(2) The camera performs a correlation analysis system on the collected images
摄像头对采集的图像数据进行实时关联度阈值分析,并与数据库首次目标录入的相关数据资料进行关联度比对,当不符合时及进行判断发出报警信号。The camera performs real-time correlation degree threshold analysis on the collected image data, and compares the correlation degree with the relevant data entered in the database for the first time. When it does not match, it will judge and send an alarm signal.
例如,首次进入宾馆的宾客和随身携带的提包(或者该宾客未带提包进入宾馆),系统已经将其捆绑为一个强制关联集合,该集合元素包括宾客的外貌特征、身份证、入住房间号、联系方式等信息都与该提包相关联,当发现该提包被其他人领走(或该宾客携带他人的提包),监控系统发现此种非法关联关系与预先设定的关联关系不符合,则防盗系统进行自动分析判断并报警。For example, the guest who enters the hotel for the first time and the bag he carries with him (or the guest enters the hotel without a bag), the system has bundled them into a mandatory association set, and the set elements include the guest's appearance characteristics, ID card, room number, Information such as contact information is associated with the bag. When it is found that the bag has been taken away by someone else (or the guest is carrying someone else’s bag), and the monitoring system finds that this illegal relationship does not match the preset relationship, the anti-theft The system automatically analyzes and judges and alarms.
(3)自动报警系统部分(3) Automatic alarm system part
当自动报警控制器收到报警指令时,现场报警器报警的同时,可通过Modem、网络、GSM等设备转发信息到其它的MTSW(报警接受中心软件)管理计算机或用户手机,以达到联防的目的。When the automatic alarm controller receives the alarm command, the on-site alarm can forward the information to other MTSW (alarm receiving center software) management computer or user mobile phone through Modem, network, GSM and other equipment at the same time to achieve the purpose of joint defense .
进一步优选,所述建立图像数据采集及目标对象特征信息集合部分包括摄像头、音频视频传输器、应用系统主机、数据库综合应用服务器。Further preferably, the part for establishing image data collection and target object characteristic information collection includes a camera, an audio and video transmitter, an application system host, and a database comprehensive application server.
音频视频传输器将摄像头采集的图片或视频数据传输到数据库综合应用系统。使用该传输器可保证摄像头采集的影像及图片数据在经线缆传输后更加清晰不失真,具有抗干扰能力强、传输距离远、布线容易、价格低廉等优点。The audio and video transmitter transmits the picture or video data collected by the camera to the comprehensive application system of the database. The use of this transmitter can ensure that the image and picture data collected by the camera are clearer and undistorted after being transmitted through the cable. It has the advantages of strong anti-interference ability, long transmission distance, easy wiring, and low price.
数据库综合应用系统,该系统可以建立、使用和维护数据库,对数据库进行统一的管理和控制,以保证数据库的安全性、可靠性、实时性和完整性。Database comprehensive application system, the system can establish, use and maintain the database, manage and control the database in a unified way, so as to ensure the security, reliability, real-time and integrity of the database.
数据库综合应用服务器可实现多用户多应用程序并行的去建立、修改和询问数据库,为用户提供综合数据库服务。The database integrated application server can realize multi-users and multi-application programs to create, modify and query databases in parallel, and provide users with integrated database services.
在本发明的一个实施例中,所述摄像头为有线或者无线摄像头。In one embodiment of the present invention, the camera is a wired or wireless camera.
进一步优选,所述摄像头为具有高清摄像机、镜头和旋转云台集成的摄像头。Further preferably, the camera is a camera integrated with a high-definition camera, a lens and a rotating pan/tilt.
本发明基于图像分析的自主关联实时防盗系统,所述摄像头对采集的图像进行关联度对比分析系统包括具有防盗系统功能主机及联网主机。The present invention is based on an image analysis-based self-associated real-time anti-theft system. The system for comparing and analyzing the correlation degree of images collected by the camera includes a host with an anti-theft system function and a networked host.
本发明中的‘关联度分析’和现有的关联度分析概念不太一致,现有关联分析概念多指如果两个或多个事物之间存在一定的关联,其中一个事物就能通过其他事物进行预测,比如股市利用关联度分析概念能预测股市的大体走向、超市商品的摆放位置恰当能提高商场的销售额、数据挖掘中利用关联度分析能对常见的类进行分类和聚类,找出数据的趋势和走向等。本发明中的关联度是强制关联关系,相距太远的个体不在系统保护范围之内的就不具有关联关系,比如两个目标出现在同一个系统,系统将这两个目标强制关联在一起,如果两个目标离开的距离超出了系统规定的阈值范围,这种关联关系就不存在了,系统对进入系统范围的前后两种关联度进行自主分析并进行对比,系统发现两种关联度分析结果遭到破坏,系统经过判断就会触发报警系统进行预警或者报警。本发明系统关联度分析的第二层涵义就是,比如一个人和他所带的物品相关联构成一个关联度集合,人和具体带的物品种类属性无关,人可以带任何物品,只要人和物品落入系统保护范围,系统就会把这个两个对象强制关联在一起。不在所述范围之内的,均不在系统保护范围之内。比如,一个宾客进入宾馆手提提包,那么这个宾客就和这个提包相关联,如果还是这个宾客进入宾馆领的一个小孩,那么这个宾客就和小孩相关联。这个宾客和系统外的任何事物都无关。The 'correlation analysis' in the present invention is not quite consistent with the existing concept of correlation analysis. The existing concept of correlation analysis mostly means that if there is a certain correlation between two or more things, one of them can pass through other things. Prediction, for example, the stock market can use the concept of correlation analysis to predict the general trend of the stock market, the proper placement of supermarket products can increase the sales of shopping malls, and the use of correlation analysis in data mining can classify and cluster common classes. Data trends and trends. The degree of association in the present invention is a mandatory association relationship. Individuals who are too far apart are not within the scope of protection of the system. For example, if two objects appear in the same system, the system will forcibly associate these two objects together. If the distance between the two targets exceeds the threshold range stipulated by the system, this correlation does not exist. The system independently analyzes and compares the two correlation degrees before and after entering the system range, and the system finds two correlation degree analysis results If it is damaged, the system will trigger the alarm system for early warning or alarm after judgment. The second meaning of the correlation degree analysis of the system of the present invention is that, for example, a person is associated with the items he carries to form a correlation degree set, and the person has nothing to do with the type and attribute of the specific item. The person can carry any item, as long as the person and the item If it falls into the protection scope of the system, the system will forcibly associate the two objects together. Those that are not within the stated scope are not within the protection scope of the system. For example, if a guest enters a hotel with a handbag, then the guest is associated with the bag. If the guest enters the hotel to pick up a child, then the guest is associated with the child. This guest has nothing to do with anything outside the system.
具有防盗系统功能主机,具有处理影像及图像数据的自主关联度分析的功能,此功能是自主分析处理摄像头采集的影像及图片资料建立目标对象关联度的关键步骤。将强制关联的目标对象元素化、阈值化、建立关联度集合,使得只有集合内的所有元素具有关联度关系,当实时分析集合内元素的关联度被破坏时,达到报警器预警或报警条件时,则通过联网向其他主机、报警器、用户手机等方式发送相关报警信息。可通过Modem、网络、GSM等设备转发信息到其它的报警接受中心。The host with the anti-theft system function has the function of independent correlation analysis of processing images and image data. This function is a key step to independently analyze and process images and picture data collected by cameras to establish the correlation degree of target objects. Elementize, threshold, and establish an association degree set for the target object of mandatory association, so that only all elements in the collection have an association degree relationship. When the association degree of the elements in the real-time analysis set is destroyed, when the alarm warning or alarm condition is reached , then send relevant alarm information to other hosts, alarms, and user mobile phones through networking. The information can be forwarded to other alarm reception centers through Modem, network, GSM and other equipment.
在本发明的一个实施例中,所述联网主机为处于不同地理位置的多台主机。In one embodiment of the present invention, the networked hosts are multiple hosts located in different geographic locations.
本发明基于图像分析的自主关联实时防盗系统,所述自动报警系统为报警器、用户手机、电话、其它主机。The present invention is an autonomous associated real-time anti-theft system based on image analysis, and the automatic alarm system is an alarm, a user's mobile phone, a telephone, and other hosts.
进一步优选,所述报警器为有线或无线。Further preferably, the alarm is wired or wireless.
本发明基于图像分析的自主关联实时防盗系统工作过程:The working process of the self-associated real-time anti-theft system based on image analysis in the present invention:
(1)摄像头实时采集的影像及图片数据传送到音频视频传输器处理。经过处理的数据可实现低失真,数据还原,减少数据经传输过程中的失真及干扰。音频视频传输器将处理的影像及图片数据传输至数据库综合应用服务器处理存储。(1) The image and picture data collected by the camera in real time are sent to the audio and video transmitter for processing. The processed data can achieve low distortion, data restoration, and reduce distortion and interference during data transmission. The audio and video transmitter transmits the processed image and picture data to the database comprehensive application server for processing and storage.
(2)装载有防盗系统功能的主机及联网主机,应用系统相关功能对采集数据进行处理,包括数据的自主关联度分析、对关联数据进行阈值化、建立关联元素集合、把和目标相关联的人、物体、时间、特定空间以及其它相关联的元素,组合为受系统保护的元素集合存储于数据库综合应用系统。(2) Hosts equipped with anti-theft system functions and networked hosts, apply system-related functions to process the collected data, including independent correlation analysis of data, thresholding associated data, establishing associated element sets, and People, objects, time, specific space and other related elements are combined into a set of elements protected by the system and stored in the comprehensive application system of the database.
(3)当经系统处理的目标数据对象的相应关联阈值对比分析关系被破坏时,则经系统判断后发出实时预警提示或报警,平时系统则进行布防实时监控。(3) When the corresponding association threshold comparison analysis relationship of the target data object processed by the system is destroyed, the system will issue a real-time early warning prompt or alarm after the system judges, and the system will carry out real-time monitoring of arming at ordinary times.
(4)主机对采集的数据进行实时分析,当达到报警条件时,主机则向报警器发送预警或报警指令,同时主机可通过Modem、网络、GSM等设备转发信息到其它的报警接受中心的管理计算机或用户手机,以达到联防的目的。(4) The host computer conducts real-time analysis on the collected data. When the alarm condition is met, the host computer sends an early warning or alarm command to the alarm device, and at the same time, the host computer can forward the information to other alarm receiving centers for management through Modem, network, GSM and other equipment. Computer or user mobile phone, in order to achieve the purpose of joint defense.
本发明的实施方式不限于此,任何相同功能设备的等效替换都可以落入其保护范围。The embodiments of the present invention are not limited thereto, and any equivalent replacement of devices with the same function may fall within its protection scope.
Claims (8)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201110219231.8A CN102289908B (en) | 2011-08-02 | 2011-08-02 | Based on the independent association real-time anti-theft system of graphical analysis |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201110219231.8A CN102289908B (en) | 2011-08-02 | 2011-08-02 | Based on the independent association real-time anti-theft system of graphical analysis |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN102289908A true CN102289908A (en) | 2011-12-21 |
| CN102289908B CN102289908B (en) | 2016-02-17 |
Family
ID=45336287
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201110219231.8A Expired - Fee Related CN102289908B (en) | 2011-08-02 | 2011-08-02 | Based on the independent association real-time anti-theft system of graphical analysis |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN102289908B (en) |
Cited By (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104200558A (en) * | 2014-08-29 | 2014-12-10 | 中国电子科技集团公司第二十九研究所 | Security sending and pickup control system based on biometric feature recognition and security sending and pickup control method based on biometric feature recognition |
| CN105096501A (en) * | 2014-04-25 | 2015-11-25 | 北京奇虎科技有限公司 | Intelligent terminal equipment anti-theft method and intelligent terminal equipment |
| CN107146188A (en) * | 2017-04-21 | 2017-09-08 | 杭州承扬自动化科技有限公司 | A kind of intelligent city service platform of multifunction |
| CN107920224A (en) * | 2016-10-08 | 2018-04-17 | 杭州海康威视系统技术有限公司 | A kind of abnormality alarming method, equipment and video monitoring system |
| CN108682018A (en) * | 2018-05-26 | 2018-10-19 | 任阿毛 | The instant detection platform of equipment degree of lacking |
| CN109115461A (en) * | 2018-05-26 | 2019-01-01 | 任阿毛 | A kind of method that equipment degree of lacking detects immediately |
| CN112036380A (en) * | 2020-11-03 | 2020-12-04 | 深兰人工智能芯片研究院(江苏)有限公司 | Theft detection method and device |
| CN112989887A (en) * | 2019-12-16 | 2021-06-18 | 深圳云天励飞技术有限公司 | File merging method and device and electronic equipment |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1851767A (en) * | 2006-04-29 | 2006-10-25 | 重庆赋仁科技发展有限公司 | Wireless small-sized monitoring control system |
| CN101093603A (en) * | 2007-07-03 | 2007-12-26 | 北京智安邦科技有限公司 | Module set of intellective video monitoring device, system and monitoring method |
| CN201160304Y (en) * | 2007-12-27 | 2008-12-03 | 广东亿迅科技有限公司 | Commercial-scale digital remote network video monitor system |
| CN101727672A (en) * | 2008-10-24 | 2010-06-09 | 云南正卓信息技术有限公司 | Method for detecting, tracking and identifying object abandoning/stealing event |
-
2011
- 2011-08-02 CN CN201110219231.8A patent/CN102289908B/en not_active Expired - Fee Related
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1851767A (en) * | 2006-04-29 | 2006-10-25 | 重庆赋仁科技发展有限公司 | Wireless small-sized monitoring control system |
| CN101093603A (en) * | 2007-07-03 | 2007-12-26 | 北京智安邦科技有限公司 | Module set of intellective video monitoring device, system and monitoring method |
| CN201160304Y (en) * | 2007-12-27 | 2008-12-03 | 广东亿迅科技有限公司 | Commercial-scale digital remote network video monitor system |
| CN101727672A (en) * | 2008-10-24 | 2010-06-09 | 云南正卓信息技术有限公司 | Method for detecting, tracking and identifying object abandoning/stealing event |
Non-Patent Citations (1)
| Title |
|---|
| 张纪明: "基于数字网络的安全防范系统的设计与实现", 《中国优秀硕士学位论文全文数据库 信息科技辑》, no. 3, 15 September 2007 (2007-09-15), pages 5 - 28 * |
Cited By (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN105096501A (en) * | 2014-04-25 | 2015-11-25 | 北京奇虎科技有限公司 | Intelligent terminal equipment anti-theft method and intelligent terminal equipment |
| CN109461276A (en) * | 2014-04-25 | 2019-03-12 | 北京奇虎科技有限公司 | Intelligent terminal theft preventing method and intelligent terminal |
| CN104200558A (en) * | 2014-08-29 | 2014-12-10 | 中国电子科技集团公司第二十九研究所 | Security sending and pickup control system based on biometric feature recognition and security sending and pickup control method based on biometric feature recognition |
| CN107920224A (en) * | 2016-10-08 | 2018-04-17 | 杭州海康威视系统技术有限公司 | A kind of abnormality alarming method, equipment and video monitoring system |
| CN107920224B (en) * | 2016-10-08 | 2020-02-18 | 杭州海康威视系统技术有限公司 | A kind of abnormal alarm method, equipment and video monitoring system |
| CN107146188A (en) * | 2017-04-21 | 2017-09-08 | 杭州承扬自动化科技有限公司 | A kind of intelligent city service platform of multifunction |
| CN108682018A (en) * | 2018-05-26 | 2018-10-19 | 任阿毛 | The instant detection platform of equipment degree of lacking |
| CN109115461A (en) * | 2018-05-26 | 2019-01-01 | 任阿毛 | A kind of method that equipment degree of lacking detects immediately |
| CN112989887A (en) * | 2019-12-16 | 2021-06-18 | 深圳云天励飞技术有限公司 | File merging method and device and electronic equipment |
| CN112989887B (en) * | 2019-12-16 | 2024-06-11 | 深圳云天励飞技术有限公司 | File merging method and device and electronic equipment |
| CN112036380A (en) * | 2020-11-03 | 2020-12-04 | 深兰人工智能芯片研究院(江苏)有限公司 | Theft detection method and device |
| CN112036380B (en) * | 2020-11-03 | 2021-03-02 | 深兰人工智能芯片研究院(江苏)有限公司 | Theft detection method and device |
Also Published As
| Publication number | Publication date |
|---|---|
| CN102289908B (en) | 2016-02-17 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN102289908B (en) | Based on the independent association real-time anti-theft system of graphical analysis | |
| JP5794599B1 (en) | Digital fine security system, method and program | |
| JP5780570B1 (en) | Digital loss / accident defense system, method and program | |
| CN103839346B (en) | A kind of intelligent door and window anti-intrusion device and system, intelligent access control system | |
| US20160351031A1 (en) | Warning System and Method Using Spatio-Temporal Situation Data | |
| CN108198292A (en) | A kind of domestic monitoring method based on intelligent cloud lock, system | |
| US20040161133A1 (en) | System and method for video content analysis-based detection, surveillance and alarm management | |
| US20040240542A1 (en) | Method and apparatus for video frame sequence-based object tracking | |
| US10922547B1 (en) | Leveraging audio/video recording and communication devices during an emergency situation | |
| CN1656503A (en) | Vision-based operating method and system | |
| KR20080024541A (en) | Video Surveillance System with Video Primitives | |
| CN108629322A (en) | Monitoring method, device and the computer readable storage medium of a suspect | |
| CN205029794U (en) | Intelligence lock, based on security protection device and security protection system of intelligent lock | |
| CN102968873A (en) | A parking lot warning system | |
| CN108009488A (en) | The street security joint defense system of Behavior-based control analysis | |
| JP2004021310A (en) | Security management system | |
| CN111212274A (en) | Intelligent building security system | |
| CN114446004A (en) | a security system | |
| JP2020198475A (en) | Person monitoring system and person monitoring method | |
| CN208433076U (en) | Safety precaution and emergency commading system and wisdom prison system | |
| WO2021186610A1 (en) | Digital/autofile/security system, method, and program | |
| JP3160430U (en) | Suspicious person alarm system | |
| TWI713368B (en) | Image device and method for detecting a thief | |
| US11587420B2 (en) | Systems and methods of combining RFID and VMS for people tracking and intrusion detection | |
| CN111768580A (en) | Indoor anti-theft system and anti-theft method based on edge gateway |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C53 | Correction of patent of invention or patent application | ||
| CB03 | Change of inventor or designer information |
Inventor after: Chen Gouxi Inventor after: Wang Bo Inventor after: Zhang Pengcheng Inventor after: Zhang Meng Inventor after: Yang Qiuxiang Inventor before: Chen Gouxi Inventor before: Wang Bo Inventor before: Pan Guangzhen Inventor before: Yang Qiuxiang |
|
| COR | Change of bibliographic data |
Free format text: CORRECT: INVENTOR; FROM: CHEN GOUXI WANG BO PAN GUANGZHEN YANG QIUXIANG TO: CHEN GOUXI WANG BO ZHANG PENGCHENG ZHANG MENG YANG QIUXIANG |
|
| CB03 | Change of inventor or designer information |
Inventor after: Chen Gouxi Inventor after: Wang Bo Inventor after: Wen Tao Inventor after: Yang Qiuxiang Inventor before: Chen Gouxi Inventor before: Wang Bo Inventor before: Zhang Pengcheng Inventor before: Zhang Meng Inventor before: Yang Qiuxiang |
|
| COR | Change of bibliographic data | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant | ||
| CF01 | Termination of patent right due to non-payment of annual fee | ||
| CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160217 Termination date: 20190802 |
