CN107944433A - Security protection monitors method and security protection monitoring system - Google Patents
Security protection monitors method and security protection monitoring system Download PDFInfo
- Publication number
- CN107944433A CN107944433A CN201711397562.4A CN201711397562A CN107944433A CN 107944433 A CN107944433 A CN 107944433A CN 201711397562 A CN201711397562 A CN 201711397562A CN 107944433 A CN107944433 A CN 107944433A
- Authority
- CN
- China
- Prior art keywords
- data
- security protection
- filing
- protection monitoring
- shooting
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 67
- 238000000034 method Methods 0.000 title claims abstract description 50
- 238000012545 processing Methods 0.000 claims abstract description 53
- 230000001815 facial effect Effects 0.000 claims abstract description 21
- 238000004458 analytical method Methods 0.000 claims abstract description 14
- 230000007613 environmental effect Effects 0.000 claims description 6
- 238000007621 cluster analysis Methods 0.000 claims description 5
- 230000003542 behavioural effect Effects 0.000 claims description 3
- 239000004744 fabric Substances 0.000 claims description 3
- 230000000694 effects Effects 0.000 description 12
- 238000005516 engineering process Methods 0.000 description 6
- 230000008901 benefit Effects 0.000 description 5
- 238000007726 management method Methods 0.000 description 5
- 235000019504 cigarettes Nutrition 0.000 description 4
- 238000005286 illumination Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 238000007405 data analysis Methods 0.000 description 3
- 238000011835 investigation Methods 0.000 description 3
- 241000406668 Loxodonta cyclotis Species 0.000 description 2
- 230000007123 defense Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000009545 invasion Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 238000009825 accumulation Methods 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000009172 bursting Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000013480 data collection Methods 0.000 description 1
- 238000007418 data mining Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 230000004069 differentiation Effects 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000035800 maturation Effects 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 230000000630 rising effect Effects 0.000 description 1
- 238000012216 screening Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/23—Clustering techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/94—Hardware or software architectures specially adapted for image or video understanding
- G06V10/95—Hardware or software architectures specially adapted for image or video understanding structured as a network, e.g. client-server architectures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Evolutionary Computation (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Bioinformatics & Computational Biology (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Artificial Intelligence (AREA)
- Evolutionary Biology (AREA)
- Life Sciences & Earth Sciences (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Human Computer Interaction (AREA)
- Alarm Systems (AREA)
- Image Processing (AREA)
Abstract
Disclose a kind of the security protection monitoring method and security protection monitoring system of distributed shooting centralized processing, in multiple default place distributed arrangement face recognition devices, each face recognition device collection and identification facial image, each face recognition device is handled to obtain the filing data based on identification object using identifying that object carries out facial image filing as target, the filing data upload to cloud server by preset format, and cloud server is to the filing data clusters analysis.
Description
Technical field
The invention belongs to technical field of security and protection, and method is monitored more particularly to a kind of security protection of distributed shooting centralized processing
With security protection monitoring system.
Background technology
At present, face recognition technology is increasingly becoming one kind with the maturation of camera, algorithm, data volume etc. condition
Bottom application tool class technology, is constantly popularized.
But push face recognition technology application one of universalness to premise is that with opening and shares
Data platform, allows enough identification scenes and brings this platform into seek unity of standard and get off.
In simple terms, using pursue and capture an escaped prisoner, hit abduct, searching person and object as target application scenarios, with the proviso that identification system
System, especially face identification system must have enough data sources.
The Skynet system that present public opinion is propagandized, due to the cost for being related to arranging camera, the policy in each city pushes away
Into dynamics, the difference factor such as people's acceptance level, in fact, being still difficult to realize commercialization.
The application is directed to a kind of business model innovation implemented from data acquisition end to improve above-mentioned present situation.
By extensive, inexpensive or even free mode, camera is configured to fixed-site, and configures unified data
Processing and upload platform, so as in a wide range of rapid advantage for obtaining data acquisition.
The fixed-site includes the larger life nodes of flow of the people such as Mini Supermarkets, coffee bar, bar, cigarette and wine shop, Internet bar,
The camera and its monitoring system that above-mentioned low cost even provides free, can not only help these fixed-sites to realize bursting tube
Reason, moreover it is possible to by unified data processing form and port, realize big data collection and utilize, with carrying for data acquisition amount
Rise, which can provide commercial applications and business data analysis in itself, can help to realize to floor activity crowd's
Service, including advertising, interest analysis etc..
It is in short, existing as follows on technical scheme technical problem to be solved, its specific requirements:
1. fixed-site arranges security protection camera, and possesses unified data processing port and outlet
Need voluntarily to configure the mode of anti-theft image pick-up head compared to traditional small StoreFront, small paving, small-sized management place and
Speech, present applicant proposes the family place even agreed in such fixed management place by kinsfolk, is freely installed for it
The way of security protection camera, and unified face recognition technology and classification, archiving method are used for such security protection camera,
Data are uploaded into cloud server by preset format, it is achieved thereby that the high value for being lost in data utilizes.
2. cloud server is managed collectively the data from distributed security camera
Cloud server can be according to the characteristics of the fixation management place that camera is installed, come pair for setting it to be identified
The characteristic and feature of elephant, so that recognition accuracy is further increased, and based on the number from substantial amounts of distributed camera
According to cloud server can realize the cluster analysis of data in certain area or a certain range, be found from data mining
To new value.
3. the camera arrangement realized based on data sharing principle
Arrange that camera is used as security protection supervision equipment for user by the cost well below psychological expectation of customer price, use
Family itself can obtain the controlled security protection monitoring system of a set of authority, and safety-protection system developer can pass through large-scale data
Realize the application value of bigger, each side can therefrom benefit.
The content of the invention
For problems of the prior art, the present invention provides a kind of security protection monitoring side of distributed shooting centralized processing
Method and security protection monitoring system, it is acquired and is identified by distributed arrangement face recognition device, is then based on identification object
Filing processing is carried out, cloud server is uniformly sent to and is uniformly processed, memory space is saved, improves the image of shooting
The service efficiency of data and not invasion of privacy, can provide the data service of high quality with low cost.
The purpose of the present invention is be achieved by the following technical programs:
An aspect of of the present present invention, a kind of security protection monitoring method of distributed shooting centralized processing include the following steps:
In multiple default place distributed arrangement face recognition devices, each face recognition device collection and identification face figure
Picture, each face recognition device are handled to obtain returning based on identification object using identifying that object carries out facial image filing as target
File data, the filing data upload to cloud server by preset format, and cloud server is to the filing data clusters
Analysis.
In a kind of security protection monitoring method of distributed shooting centralized processing, the preset format includes identification pair
Attribute data, face recognition device attribute data, face recognition device shooting time data and/or the default place attribute number of elephant
According to.
In a kind of security protection monitoring method of distributed shooting centralized processing, identifying the attribute data of object includes
Gender, behavioral data and/or clothing appearance data.
In a kind of security protection monitoring method of distributed shooting centralized processing, default place attribute data includes field
Institute's title, location type and/or place business hours.
In a kind of security protection monitoring method of distributed shooting centralized processing, the filing data obtain local use
Family uploads cloud server after authorizing, the filing data upload to cloud server by default port.
In a kind of security protection monitoring method of distributed shooting centralized processing, the filing data are stored in face
Identification equipment or local memory device.
In a kind of security protection monitoring method of distributed shooting centralized processing, the filing data periodically upload cloud
Server is held, the filing data upload to cloud server by default port.
In a kind of described security protection monitoring method of distributed shooting centralized processing, by predetermined filing data it is independent on
Cloud server is passed, cloud server analyzes the predetermined filing data clusters.
In a kind of security protection monitoring method of distributed shooting centralized processing, cloud server is based on recognition of face
The place that equipment is installed sets the attribute data of the identification object.
In a kind of security protection monitoring method of distributed shooting centralized processing, face recognition device collection and identification
Meet the facial image of preset condition, the preset condition includes identification angle, recognition of face integrity degree and/or environmental light intensity.
In a kind of security protection monitoring method of distributed shooting centralized processing, return described in the storage of security protection monitoring system
File data is to replace the facial image of shooting.
According to another aspect of the present invention, a kind of security protection prison for the security protection monitoring method for implementing distributed shooting centralized processing
Viewing system includes face recognition device and cloud server of the distributed arrangement in multiple default places, and face recognition device includes
File the archiver handled to identify that object carries out facial image as target, cloud server is included to filing data clusters analysis
Cluster device.
In the security protection monitoring system, cloud server includes processor, hard disk, memory, bus and is used for and people
Face identification equipment is with the communication port of unified form interaction.
According to another aspect of the invention, a kind of application of cloth shooting centralized processing, it is distributed in multiple default places
Arrange face recognition device, each face recognition device is handled to obtain base to identify that object carries out facial image filing as target
In the filing data of identification object, the filing data share to cloud server by preset format, and cloud server is based on
Predetermined scene carries out cluster analysis.
Compared with prior art, the present invention has technique effect beneficial below:
In the prior art, the occupied space of prior art real-time recording is larger, so as to preserve data time cycle
It is limited, can not meets that the needs of later inquiring about, video are usual only for untreated asperity data after some long-times
Can manually it analyze or manual identified, service efficiency is low, and can not carry out data analysis.Do not invent and pass through distributed arrangement
Face recognition device is acquired and identifies, is then based on identification object and carries out filing processing, is uniformly sent to cloud server
Be uniformly processed, save memory space, improve shooting view data service efficiency and not invasion of privacy, can be with
Low cost provides the data service of high quality.
Described above is only the general introduction of technical solution of the present invention, in order to cause the technological means of the present invention clearer
Understand, reach the degree that those skilled in the art can be practiced according to the content of specification, and in order to allow the present invention
Above and other objects, features and advantages can become apparent, below with the present invention embodiment illustrate
Explanation.
Brief description of the drawings
By reading the detailed description hereafter in preferred embodiment, the advantages of present invention is various other and benefit
It will be clear understanding for those of ordinary skill in the art.Figure of description is only used for showing the purpose of preferred embodiment,
And it is not considered as limitation of the present invention.It should be evident that drawings discussed below is only some embodiments of the present invention,
For those of ordinary skill in the art, without creative efforts, can also be obtained according to these attached drawings
Other attached drawings.
In the accompanying drawings:
Fig. 1 is that the step of security protection of the distributed shooting centralized processing of one embodiment of the present of invention monitors method is illustrated
Figure;
Fig. 2 is the structure diagram of the security protection monitoring system of one embodiment of the present of invention.
The present invention is further explained below in conjunction with drawings and examples.
Embodiment
The specific embodiment of the present invention is more fully described below with reference to accompanying drawings.Although show the present invention's in attached drawing
Specific embodiment, it being understood, however, that may be realized in various forms the present invention without should be limited by embodiments set forth here
System.Conversely, there is provided these embodiments are to be able to be best understood from the present invention, and can be complete by the scope of the present invention
Be communicated to those skilled in the art.
It should be noted that some vocabulary has been used to censure specific components among specification and claim.Ability
Field technique personnel it would be appreciated that, technical staff may call same component with different nouns.This specification and right
It is required that not in a manner of the difference of noun is used as and distinguishes component, but differentiation is used as with the difference of component functionally
Criterion."comprising" or " comprising " as mentioned in working as in specification in the whole text and claim are an open language, therefore should be solved
It is interpreted into " including but not limited to ".Specification subsequent descriptions for implement the present invention better embodiment, so it is described description be with
For the purpose of the rule of specification, the scope of the present invention is not limited to.Protection scope of the present invention, which is worked as, regards appended right
It is required that subject to institute's defender.
For ease of the understanding to the embodiment of the present invention, done further by taking several specific embodiments as an example below in conjunction with attached drawing
Explanation, and each attached drawing does not form the restriction to the embodiment of the present invention.
Fig. 1 is that the step of security protection of the distributed shooting centralized processing of one embodiment of the present of invention monitors method is illustrated
Figure, the security protection monitoring method of distribution shooting centralized processing include the following steps:
Security protection monitoring system is in multiple default place distributed arrangement face recognition devices, each face recognition device collection
With identification facial image, each face recognition device is handled to be based on using identifying that object carries out facial image filing as target
Identify the filing data of object, the filing data upload to cloud server by preset format, and cloud server is to described
File data clusters analysis.
The security protection monitoring system based on camera of the prior art, is typically arranged in including one or more camera
In the predeterminated position of some fixed-site, then by real-time video transmission and display system, in one or several monitoring dresses
Put, while display or timesharing show the content taken by these cameras.For the content that these are photographed, the security protection
Monitoring system usually backs up in the preset memory of system within a certain period of time, is called or is reviewed with standby user.Consider
It is larger to storage occupied space, when after one section of long period, meeting be deleted less standby using possibility successively according to the time
Part video recording.
Above-mentioned implementation is although fairly simple, but since the occupied space of real-time recording is larger, institute is so as to preserve
The time cycle of data is limited, usually in the time range of 1 week to 3 months or so it is also possible to inquire Backup Data,
Time, more usually data just no longer saved long.For later the demand of inquiry can not meet after some long-times.In addition, these
Video is untreated asperity data, when to remove to find object interested from these data, is typically only capable to depend on people
Work point is analysed or manual identified.Manual analysis will find the relevant informations such as reliable time, place, manual identified and then lean on not
Interruption browses whole video data.These occupation modes will all cause not convenient.
The security protection monitoring method of the distributed shooting centralized processing of the present invention proposes further improvement of existing technologies.
One is to the people to get off captured by multiple cameras of security protection monitoring system, recognition of face is carried out, and according to recognition of face
As a result, establish archives for the object, and by the corresponding face recognition result of the archives, according to situation about constantly gathering afterwards,
Filing is recorded.In one embodiment, by taking some cigarette and wine shop as an example, when the camera in security protection monitoring system collects
During one face in accordance with preset condition, these usual preset conditions include that illumination is suitable, angle is suitable, blocks less, photo picture
Plain rate enough etc. condition, this face is defined as user's first 1.And the relevant information that this is recognized to the user's first is returned
Shelves, these relevant informations can include the position of acquisition camera, time, the gender of user judge according to identification situation, clothing
Feature whether there is cap, mask, dressing colour system etc..When acquisition time is sufficiently long, the accumulation of the user's quantity is likely to be breached first
The rank of 5000- first 10000, while the multiple filing result for same customer wherein also occurs.Such as above-mentioned first 1
Number, the filing that may can have the customer to occur in the purchase cigarette district of cigarette and wine shop at night in afternoon on every Wendesdays, on every Fridays records.So
Record due to being not related to the privacy informations such as the name of the customer, occupation, identity, do not injure the interests of customer,
But for such data future, there may be great application value.
Further, since employ the operation filed to recognition result, the feature of this identification object can be with some
The relatively good face of shooting is opened to represent identity, is represented data acquisition content with action message, user property, is greatly simplified
The cost of data storage, and also so that data have obtained preliminary screening and processing.Overcome what is proposed before completely, security protection
The shortcomings that storage pressure is big caused by monitoring system only simply retains video data, and data are inconvenient for use.
The second is the video content collected for multiple cameras of security protection monitoring system carried out recognition of face and
Data after filing processing, can periodically upload to and be arranged at cloud server to file arrangement, in case big data analysis uses.
The data of servers archive beyond the clouds, not only include in above-mentioned fixed management place collection, are defined according to preset rules
Form, such as:Outside user name such as first 1, gender, camera position, time information, above-mentioned fixation can also be included
The relevant information of management place, such as:Place title, location type, place business hours etc..So from multiple fixed operation fields
File the big data got, due to have passed through the processing of unified form in advance, by the application value with bigger and improve
Service efficiency.
In another embodiment of the present invention, enumerate one embodiment from another angle and confirm above-mentioned value.It is in
The porch entrance and kitchen entrance in front yard have been respectively arranged security protection camera system, which works according to above-mentioned principle.
Since family's privacy is more demanding, under the pre-setting of the system, the object which is identified only is stored in this
Ground, is subject to the monitor closely of household operation personnel, so as to avoid information-leakage.It is appreciated that since shooting kitty may
Occur and the number of activity be limited, the home cinema head even across the data acquisition of 3 months, may also can only successful collection arrive
The object of 40 or so, including information such as family fixed member, the short-term member of family, visitors.Not to cloud service
In the case that device is sent, the recognition result of the system can help kinsfolk to do some activity analyses or enjoyment analysis.So
And, it is assumed that when old man or child in kinsfolk wander away, kinsfolk can select rapidly to image above-mentioned security protection
The object information collected in head system is sent to cloud server, is believed by cloud server according to the object sent
Breath, is compared under targetedly camera resource, so as to be hopeful that the member that wanders away can be found.It is appreciated that this
Although when Household security system be not able to tell that the information such as the name of this missing member of cloud server, identity, by
In providing reliable facial recognition data, cloud server can obtain the camera of numerous occasions from it and go in real time
Search and compare face recognition result, if cloud server control camera include at the train station, airport, long-distance vapour
Restaurant, coffee-house, the camera of rest area near the ground such as station, then would be possible to abducted kinsfolk is such as small
Child finds;If it is included in storefront, the bus stop field such as StoreFront, cafe nearby in the camera of cloud server control
Camera, then would be possible to find missing kinsfolk such as old man.And due to the operation of the system
All the time the identity information of kinsfolk is not revealed, and can be urgent also without cumbersome enrollment process of reporting a case to the security authorities and put on record
In the case of kinsfolk's positioning searching provide one hope.
In addition, for converging in daily routines, look for people, go astray from the group after give for change, scene, the present invention such as recall after lost article and all carry
A possibility is supplied.Net can be realized by the mobile equipment such as mobile phone in household safety-protection camera system and household operation personnel
In the case that network controls, the demand realizes that process can fully achieve intelligent, long-range, it would be possible to produces more applied fields
Scape.
Likewise, since what is stored in the security protection camera system is only the filing data based on identification object, without
It is related to the actual information of object, then more privacy leakages will not be caused.Such as although in household safety-protection camera system
In system, object may often be worn arbitrarily, or even compare exposure, but due to identifying that what is filed is only the recognition of face knot of object
Fruit and archives, so when transferring these information, can't cause to perplex.With the lifting of degree of recognition, one family is wanted
Confirm whether oneself member has gone to friend house to visit, can not only be confirmed by direct-dial telephone, can also be not desired to implement phone
When confirmation, by the present invention method and system can realize, as long as the two families all installed it is of the present invention
Security protection camera system, and all Object identifying authority has been opened to cloud server, then cloud server can be complete rapidly
Into this contrast, and system cost is very cheap.
In a kind of preferred embodiment of the security protection monitoring method of distributed shooting centralized processing of the present invention, institute
Stating preset format includes attribute data, face recognition device attribute data, the face recognition device shooting time number of identification object
According to and/or default place attribute data.Position data of the face recognition device attribute data for example including face recognition device and/
Or environmental data, environmental data such as ambient light, illumination light, shooting angle, indoor and outdoor surroundings etc..It is typically include normal illumination
At the access to elevators in market under environment, or exhibition detector gate under normal illumination environment.Under such environment, due to being room
It is interior, so the cover material such as usually identified object has higher probability to uncap, mask;Since ambient light is normal, so can
Brightness when ensureing to take pictures, while the possibility of the sunglasses of the outdoor wearing of object excision is higher;Due in channel position,
It is so higher by the possibility of the passage;Since passage is more narrow, so the identification object passed through at the same time will not be too many;By
In similar elevator or the passage of detector gate, so object has higher possible positive face towards front direction of travel.The present invention's
In a kind of preferred embodiment of the security protection monitoring method of distributed shooting centralized processing, face recognition device attribute data
Such as resolution ratio, clarity, signal-to-noise ratio and/or white balance parameter including face recognition device.Face recognition device attribute number
Angle, recognition of face integrity degree and/or environmental light intensity are identified according to may also include.
In a kind of preferred embodiment of the security protection monitoring method of distributed shooting centralized processing of the present invention, know
The attribute data of other object includes gender, behavioral data and/or clothing appearance data.Clothing appearance data are for example including dress ornament face
Color, clothing type and/or hair style type etc..
In a kind of preferred embodiment of the security protection monitoring method of distributed shooting centralized processing of the present invention, in advance
If place attribute data includes place title, location type and/or place business hours.
In a kind of preferred embodiment of the security protection monitoring method of distributed shooting centralized processing of the present invention, institute
State filing data and cloud server is uploaded to by default port.
In a kind of preferred embodiment of the security protection monitoring method of distributed shooting centralized processing of the present invention, cloud
End server sets the attribute data of the identification object based on the place that face recognition device is installed.
In a kind of preferred embodiment of the security protection monitoring method of distributed shooting centralized processing of the present invention, people
Face identification equipment gathers and identifies the facial image for meeting preset condition, and the preset condition includes identification angle, recognition of face
Integrity degree and/or environmental light intensity.
In a kind of preferred embodiment of the security protection monitoring method of distributed shooting centralized processing of the present invention, institute
State filing data and periodically upload cloud server.
In a kind of preferred embodiment of the security protection monitoring method of distributed shooting centralized processing of the present invention, institute
State filing data and be stored in face recognition device or local memory device.
In a kind of preferred embodiment of the security protection monitoring method of distributed shooting centralized processing of the present invention, institute
State after filing data obtain local user's mandate and upload cloud server, the filing data upload to high in the clouds by default port
Server.The security of data can so be lifted, for local user, without using when, privacy will not be caused to let out
For dew, it is necessary to when use, cloud server can just be sent by being authorized by local user.
, will in a kind of preferred embodiment of the security protection monitoring method of distributed shooting centralized processing of the present invention
Predetermined filing data individually upload cloud server, and cloud server analyzes the predetermined filing data clusters.At this
In a kind of preferred embodiment of the security protection monitoring method of distributed shooting centralized processing of invention, security protection monitoring system is deposited
The filing data are stored up to replace the facial image of shooting.
In one embodiment, face recognition device of the invention has the ability to carry out filing processing for identification data.With
Exemplified by the vehicle identification of highway, in expressway access, crucial current mouth, each outlet, a certain spy can be accurately obtained
Determine the current data of vehicle, which includes the time that vehicle passes through the locality, profile vehicle photo etc..If
Can will be identifying every time as a result, once confirm it is errorless after, all classification put in order with the relevant recognition result of the Vehicle Object,
Then it is capable of the account of the history of one object of fast reaction.
In the prior art, do not regarded completely based on one generally only using identifying that object does filing processing as target
Frequency record is preserved, and the holding time is often a shorter time.So a common example is, it is multiple when needing
When interrogating and examining the situation for asking some object, a feasible method, often goes to infer that the object may be at which according to existing clue
Which position a period appears in, and then goes to look back this section of video content by way of manually investigating.Such mode was both held
Object easily is can not find, and it is neither possible to realizing instantaneity, is often taken very long.
In one embodiment, by the filing based on identification object, and position, recognition time, knowledge will be identified accordingly
The all filings of the information such as other remarks are handled.
The people of the present invention files data, can realize that substantial amounts of derivative purposes, such as the movable floor manager need to seek
When looking for site of activity welcome guest, which may be in the bad dressing room of certain signal of communication, at this time, can be rapid
The recognition result archive information based on the welcome guest is transferred, judges historical activity information of the welcome guest in museum, according to its work
Dynamic rail mark is inferred to the position at the most possible place of the welcome guest.In above-mentioned example, director, welcome guest etc. are to recognize in advance with identity
The object of information is demonstrate,proved, system has the certification object of identity according to these, to do 1 comparison than N, then files its recognition result
Into system, in case follow-up use.In fact, it can also be come for the object without clear and definite identity by way of newly-built archives
Implement filing.For example system puts in order the user's identification object new when shooting obtains a new user to entrance for the first time
In customer data base, then in whole active procedure, the recognition result of the user is constantly photographed, and the knowledge of enriching constantly
The historical activity information of other object.It is useful in that, effectively help system user can do scene investigation.So-called scene investigation,
For example guess including identity.Object of one frequent activities near activity working space, it may be possible to which one does not arrange showing for identity
The movable support staff in field;Object of one frequent activities near entrance a, it may be possible to ox;It is more believable having
In the case of identifying object filing archives, many scene investigations and analysis can be made based on the archives, and this scene is arranged
It is close to instantaneity to look into the result of analysis feedback.
Fig. 2 is the structure diagram of the security protection monitoring system of one embodiment of the present of invention, and one kind implements distributed shooting
The security protection monitoring system of the security protection monitoring method of centralized processing is set including recognition of face of the distributed arrangement in multiple default places
Standby 1 and cloud server 2, face recognition device include filing the archiver handled to identify that object carries out facial image as target
3, cloud server 2 includes the cluster device 4 to filing data clusters analysis.
The security protection monitoring system that distribution camera as described above is formed with cloud server passes through free or low cost
Shared camera arrangement mode, rapidly arrange enough distributed camera safety-protection system in different zones.Due to taking the photograph
As the cost of head, safety-protection system software all can drastically decline with the rising of amount of purchase, its average unit cost.And distribution shooting
Head safety-protection system installs more, can to realize effective application scenarios in a urban area or an extensive area
Just more, security protection monitoring system is included based on being internally integrated the application of data with being obtained by distributed camera safety defense monitoring system
The application for the data come, and the combination of two kinds of applications.The application for being internally integrated data is usually to have a figure in internal system
As database, system acquisition to recognition of face object be constantly compared with internal image data base, so as to be thought
The result wanted.Briefly, such as, internal system is integrated with the database or runaway convict's database of a working employee, then
As long as the human face photo of system acquisition target, is then compared relative to interior data storehouse, with regard to that can judge whether be this
Department employee and let pass, also either determine whether runaway convict and dispose and arrest.It can be obtained largely by safety defense monitoring system
Object data and filing be formed as a new database.In the present invention, these a large amount of object datas obtained may
It not can determine that its identity or specific object, be only as user's first 1 like what is referred in the above-described embodiments
Numbering, but be only face recognition result based on this object and the typical facial photo of the object collected, also can
Implement recognition of face contrast similarly to the prior art, so as to complete the concrete scene applications such as the search to the user's first 1.And
And in the present invention in the case where that need not confirm identity, it can complete to monitor the whereabouts of the user's first 1, need to verify
When identity, the verification of identity can be completed by other means naturally, this verification include obtaining with system other
Image data base with identity is compared, it might even be possible to arranges possible insider to point out.
The present invention security protection monitoring system preferred embodiment in, cloud server include processor, hard disk, memory,
Bus and the communication port for being interacted with face recognition device 1 with unified form.
In one embodiment, cloud server 2 includes general cloud server, digital signal cloud server, special
Integrated circuit ASIC or on-site programmable gate array FPGA.
In one embodiment, the cloud server 2 includes memory, and the memory includes one or more read-only
Memory ROM, random access memory ram, flash memory or Electrical Erasable programmable read only memory EEPROM.
According to another aspect of the invention, a kind of application of cloth shooting centralized processing, it is distributed in multiple default places
Arrange face recognition device, each face recognition device is handled to obtain base to identify that object carries out facial image filing as target
In the filing data of identification object, the filing data share to cloud server by preset format, and cloud server is based on
Predetermined scene carries out cluster analysis.
According to the specific embodiment of the application, in one scenario, be exactly such as stay at home, the security protection camera in shop
It is common distributed camera in fact, the day net camera for the public safety that then public security system is arranged in street corner is exactly special need
The camera asked, so the collection information of common distribution camera, may not usually upload, but it is in need when, can
With the sample that will wherein collect, Skynet system is shared with, then requires Skynet system help to retrieve and applied analysis.
In the scene previously with regard to activity, for cloud server according to the needs for finding director, cloud server is based on should
Activity scene carries out the cluster analysis of the identification such as director, performer.
Although embodiment of the present invention is described above in association with attached drawing, the invention is not limited in above-mentioned
Specific embodiments and applications field, above-mentioned specific embodiment are only schematical, directiveness, rather than restricted
's.Those of ordinary skill in the art are under the enlightenment of this specification and in the scope for not departing from the claims in the present invention and being protected
In the case of, the form of many kinds can also be made, these belong to the row of protection of the invention.
Claims (10)
1. a kind of security protection monitoring method of distributed shooting centralized processing, it includes the following steps:
In multiple default place distributed arrangement face recognition devices, each face recognition device collection and identification facial image,
Each face recognition device is handled to obtain the filing based on identification object using identifying that object carries out facial image filing as target
Data, the filing data upload to cloud server by preset format, and cloud server is to the filing data clusters point
Analysis.
A kind of 2. security protection monitoring method of distributed shooting centralized processing according to claim 1, it is characterised in that:It is described
Preset format includes the attribute data, face recognition device attribute data, face recognition device shooting time data of identification object
And/or default place attribute data, identifying the attribute data of object includes gender, behavioral data and/or clothing appearance data, in advance
If place attribute data includes place title, location type and/or place business hours.
A kind of 3. security protection monitoring method of distributed shooting centralized processing according to claim 1, it is characterised in that:It is described
Filing data are stored in face recognition device or local memory device.
A kind of 4. security protection monitoring method of distributed shooting centralized processing according to claim 1, it is characterised in that:It is described
Filing data obtain and cloud server are uploaded after local user authorizes, and the filing data upload to high in the clouds by default port and take
Business device.
A kind of 5. security protection monitoring method of distributed shooting centralized processing according to claim 1, it is characterised in that:Will be pre-
Fixed filing data individually upload cloud server, and cloud server analyzes the predetermined filing data clusters.
A kind of 6. security protection monitoring method of distributed shooting centralized processing according to claim 2, it is characterised in that:High in the clouds
Server sets the attribute data of the identification object based on the place that face recognition device is installed.
A kind of 7. security protection monitoring method of distributed shooting centralized processing according to claim 1, it is characterised in that:Face
Identification equipment gathers and identifies the facial image for meeting preset condition, and the preset condition includes identifying that angle, recognition of face are complete
Whole degree and/or environmental light intensity.
A kind of 8. security protection monitoring method of distributed shooting centralized processing according to claim 1, it is characterised in that:Security protection
Monitoring system storage is described to file data to replace the facial image of shooting.
A kind of 9. security protection monitoring system for the security protection monitoring method for implementing the distributed shooting centralized processings of any one of claim 1-8
System, it is characterised in that security protection monitoring system includes distributed arrangement in the face recognition device (1) in multiple default places and high in the clouds
Server (2), face recognition device include filing the archiver (3) handled, cloud to identify that object carries out facial image as target
Server (2) is held to include the cluster device (4) to filing data clusters analysis.
10. a kind of application of cloth shooting centralized processing, it is characterised in that in multiple default place distributed arrangement recognitions of face
Equipment, each face recognition device are handled to obtain based on identification object using identifying that object carries out facial image filing as target
File data, the filing data share to cloud server by preset format, and cloud server is carried out based on predetermined scene
Cluster analysis.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711397562.4A CN107944433A (en) | 2017-12-21 | 2017-12-21 | Security protection monitors method and security protection monitoring system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711397562.4A CN107944433A (en) | 2017-12-21 | 2017-12-21 | Security protection monitors method and security protection monitoring system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107944433A true CN107944433A (en) | 2018-04-20 |
Family
ID=61942112
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711397562.4A Pending CN107944433A (en) | 2017-12-21 | 2017-12-21 | Security protection monitors method and security protection monitoring system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107944433A (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108717210A (en) * | 2018-07-12 | 2018-10-30 | 青岛陶知电子科技有限公司 | A kind of intelligence dangerous goods detection gate equipment and remote intelligent control system |
CN109118413A (en) * | 2018-08-21 | 2019-01-01 | 北京深瞐科技有限公司 | Urban activity demographics method and device thereof, computer-readable medium |
CN109710780A (en) * | 2018-12-28 | 2019-05-03 | 上海依图网络科技有限公司 | A kind of archiving method and device |
CN109740003A (en) * | 2018-12-28 | 2019-05-10 | 上海依图网络科技有限公司 | A kind of archiving method and device |
CN109800664A (en) * | 2018-12-28 | 2019-05-24 | 上海依图网络科技有限公司 | A kind of method and device of determining passerby track |
CN109800329A (en) * | 2018-12-28 | 2019-05-24 | 上海依图网络科技有限公司 | A kind of monitoring method and device |
CN110390031A (en) * | 2019-06-28 | 2019-10-29 | 深圳市商汤科技有限公司 | Information processing method and device, vision facilities and storage medium |
CN110602453A (en) * | 2019-09-09 | 2019-12-20 | 金鹏电子信息机器有限公司 | Internet of things big data intelligent video security monitoring system |
CN110688912A (en) * | 2019-09-09 | 2020-01-14 | 南昌大学 | IPv6 cloud interconnection-based online face search positioning system and method |
CN110805845A (en) * | 2019-11-07 | 2020-02-18 | 毛春根 | Corridor sound control lamp |
CN110863678A (en) * | 2019-11-07 | 2020-03-06 | 毛春根 | Bus station platform |
CN111263126A (en) * | 2020-03-31 | 2020-06-09 | 陈小河 | Video intelligent identification and information push precaution management system |
-
2017
- 2017-12-21 CN CN201711397562.4A patent/CN107944433A/en active Pending
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108717210A (en) * | 2018-07-12 | 2018-10-30 | 青岛陶知电子科技有限公司 | A kind of intelligence dangerous goods detection gate equipment and remote intelligent control system |
CN109118413A (en) * | 2018-08-21 | 2019-01-01 | 北京深瞐科技有限公司 | Urban activity demographics method and device thereof, computer-readable medium |
CN109710780B (en) * | 2018-12-28 | 2022-03-15 | 上海依图网络科技有限公司 | Archiving method and device |
CN109710780A (en) * | 2018-12-28 | 2019-05-03 | 上海依图网络科技有限公司 | A kind of archiving method and device |
CN109740003A (en) * | 2018-12-28 | 2019-05-10 | 上海依图网络科技有限公司 | A kind of archiving method and device |
CN109800664A (en) * | 2018-12-28 | 2019-05-24 | 上海依图网络科技有限公司 | A kind of method and device of determining passerby track |
CN109800329A (en) * | 2018-12-28 | 2019-05-24 | 上海依图网络科技有限公司 | A kind of monitoring method and device |
CN109800664B (en) * | 2018-12-28 | 2024-01-12 | 上海依图网络科技有限公司 | Method and device for determining passersby track |
CN109740003B (en) * | 2018-12-28 | 2024-01-09 | 上海依图网络科技有限公司 | Filing method and device |
CN110390031A (en) * | 2019-06-28 | 2019-10-29 | 深圳市商汤科技有限公司 | Information processing method and device, vision facilities and storage medium |
CN110688912A (en) * | 2019-09-09 | 2020-01-14 | 南昌大学 | IPv6 cloud interconnection-based online face search positioning system and method |
CN110602453A (en) * | 2019-09-09 | 2019-12-20 | 金鹏电子信息机器有限公司 | Internet of things big data intelligent video security monitoring system |
CN110863678A (en) * | 2019-11-07 | 2020-03-06 | 毛春根 | Bus station platform |
CN110805845A (en) * | 2019-11-07 | 2020-02-18 | 毛春根 | Corridor sound control lamp |
CN111263126A (en) * | 2020-03-31 | 2020-06-09 | 陈小河 | Video intelligent identification and information push precaution management system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107944433A (en) | Security protection monitors method and security protection monitoring system | |
US11721186B2 (en) | Systems and methods for categorizing motion events | |
US11587320B2 (en) | Methods and systems for person detection in a video feed | |
US10192415B2 (en) | Methods and systems for providing intelligent alerts for events | |
US11062580B2 (en) | Methods and systems for updating an event timeline with event indicators | |
US10957171B2 (en) | Methods and systems for providing event alerts | |
US20210125475A1 (en) | Methods and devices for presenting video information | |
US11011035B2 (en) | Methods and systems for detecting persons in a smart home environment | |
US9489580B2 (en) | Method and system for cluster-based video monitoring and event categorization | |
US7814061B2 (en) | Method for preserving privacy with image capture | |
US20120207356A1 (en) | Targeted content acquisition using image analysis | |
US9626365B2 (en) | Content clustering system and method | |
CN108351965A (en) | The user interface of video frequency abstract | |
CN115966313A (en) | Integrated management platform based on face recognition | |
US10755414B2 (en) | Detecting and monitoring a user's photographs for health issues | |
CN113625603B (en) | Security monitoring management system and method based on big data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180420 |