CN108664608A - Recognition methods, device and the computer readable storage medium of a suspect - Google Patents

Recognition methods, device and the computer readable storage medium of a suspect Download PDF

Info

Publication number
CN108664608A
CN108664608A CN201810448414.9A CN201810448414A CN108664608A CN 108664608 A CN108664608 A CN 108664608A CN 201810448414 A CN201810448414 A CN 201810448414A CN 108664608 A CN108664608 A CN 108664608A
Authority
CN
China
Prior art keywords
data
behavioral data
event trace
personnel
suspect
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810448414.9A
Other languages
Chinese (zh)
Inventor
董慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201810448414.9A priority Critical patent/CN108664608A/en
Publication of CN108664608A publication Critical patent/CN108664608A/en
Pending legal-status Critical Current

Links

Landscapes

  • Alarm Systems (AREA)

Abstract

The present invention provides a kind of recognition methods of a suspect, device and computer readable storage mediums.This method includes:Obtain the event trace behavioral data into each personnel of monitoring area;Event trace behavioral data and the characteristic in abnormal behavior library are compared, to judge whether event trace behavioral data includes abnormal behaviour data;If event trace behavioral data includes abnormal behaviour data, it is determined that the affiliated personnel of the event trace behavioral data are a suspect.Due to whether being that a suspect judges to the personnel according to event trace behavioral data, it is no longer dependent on personnel at risk's face database, a suspect can be effectively identified according to behavioural characteristic, improve the accuracy of identification, and it can be identified before criminal offence occurs, the prevention in advance before breaking laws and commit crime can be carried out.

Description

Recognition methods, device and the computer readable storage medium of a suspect
Technical field
The present embodiments relate to video and technical field of image processing more particularly to a kind of identification sides of a suspect Method, device and computer readable storage medium.
Background technology
In order to ensure the security of the lives and property of the people, at the train station, airport, subway station, square, supermarket, market etc. Densely populated region is all provided with security means.Wherein, video monitoring is current most common security means.
In existing video surveillance program, including manual video monitoring method and intelligent video monitoring method.Artificial In video frequency monitoring method, need the monitoring personnel moment that attention is kept to concentrate, close observation.Judge that a suspect relies primarily on prison The profile of control personnel and experience.And intelligent video monitoring method mainly uses the inspection of face identification method progress a suspect It surveys.
Existing manual video monitoring method, monitoring personnel, which works long hours, is easy fatigue, causes quality monitoring to decline, supervises Control system can only often play the role of post-mordem forensics, have resulted in economic loss at this time, can not accomplish to prevent in advance.And show Some intelligent video monitoring methods depend on personnel at risk's face database, for not on personnel at risk's database list People, can not provide effective method, and the accuracy of identification can not ensure.
Invention content
The embodiment of the present invention provides a kind of recognition methods of a suspect, device and computer readable storage medium, solves The technical issues of in the prior art can not accomplishing to prevent to the manual identified method of a suspect in advance, also solves existing skill In art effective side can not be provided for the people not on personnel at risk's database list to the intelligent identification Method of a suspect The technical issues of method, the accuracy of identification can not ensure.
The embodiment of the present invention provides a kind of recognition methods of a suspect, including:
Obtain the event trace behavioral data into each personnel of monitoring area;
The event trace behavioral data is compared with the characteristic in abnormal behavior library, described in judgement Whether event trace behavioral data includes abnormal behaviour data;
If the event trace behavioral data includes abnormal behaviour data, it is determined that the event trace behavioral data it is affiliated Personnel are a suspect.
Further, method as described above, if the event trace behavioral data includes abnormal behaviour data, It determines that the affiliated personnel of the event trace behavioral data are a suspect, specifically includes:
If the event trace behavioral data includes abnormal behaviour data, judge different in the event trace behavioral data Whether the normal behavioral data corresponding abnormal behaviour duration is greater than or equal to preset time threshold;
If the abnormal behaviour duration is greater than or equal to preset time threshold, the event trace behavior number is judged According to include abnormal behaviour data number whether be greater than or equal to predetermined number threshold value;
If the number of the abnormal behaviour data is greater than or equal to predetermined number threshold value, it is determined that the event trace behavior number According to affiliated personnel be a suspect.
Further, method as described above, it is described to obtain the event trace behavior into each personnel of monitoring area Data specifically include:
Acquisition enters the behavioral data of each personnel of monitoring area;
The behavioral data of same personnel is spliced sequentially in time based on face recognition technology, forms each personnel Event trace behavioral data.
Further, method as described above, it is described to obtain the event trace behavior into each personnel of monitoring area Before data, further include:
Acquire the video data of a variety of densely populated public places;
Feature extraction is carried out to the video data and is classified, to obtain abnormal behavior data;
Abnormal behaviour database is built according to the abnormal behavior data.
The embodiment of the present invention provides a kind of identification device of a suspect, including:
Acquisition module, for obtaining the event trace behavioral data into each personnel of monitoring area;
Judgment module, for carrying out pair the characteristic in the event trace behavioral data and abnormal behavior library Than to judge whether the event trace behavioral data includes abnormal behaviour data;
Determining module, if including abnormal behaviour data for the event trace behavioral data, it is determined that the event trace The affiliated personnel of behavioral data are a suspect.
Further, device as described above, the determining module, is specifically used for:
If the event trace behavioral data includes abnormal behaviour data, judge different in the event trace behavioral data Whether the normal behavioral data corresponding abnormal behaviour duration is greater than or equal to preset time threshold;If the abnormal behaviour continues Time is greater than or equal to preset time threshold, then judges that the event trace behavioral data includes the number of abnormal behaviour data Whether predetermined number threshold value is greater than or equal to;If the number of the abnormal behaviour data is greater than or equal to predetermined number threshold value, Determine that the affiliated personnel of the event trace behavioral data are a suspect.
Further, device as described above, the acquisition module, is specifically used for:
Acquisition enters the behavioral data of each personnel of monitoring area;Based on face recognition technology by the row of same personnel Spliced sequentially in time for data, forms the event trace behavioral data of each personnel.
Further, device as described above further includes:
Acquisition module acquires the video data of a variety of densely populated public places;
Characteristic extracting module, for carrying out feature extraction to the video data and classifying, to obtain abnormal behavior Data;
Module is built, for building abnormal behaviour database according to the abnormal behavior data.
The embodiment of the present invention provides a kind of identification device of a suspect, including:
Memory, processor and computer program;
Wherein, the computer program is stored in the memory, and is configured as being executed with reality by the processor Existing method as described above.
The embodiment of the present invention provides a kind of computer readable storage medium, is stored thereon with computer program, the calculating Machine program is executed by processor to realize method as described above.
The embodiment of the present invention provides a kind of recognition methods of a suspect, device and computer readable storage medium, passes through Obtain the event trace behavioral data into each personnel of monitoring area;By event trace behavioral data and abnormal behavior Characteristic in library is compared, to judge whether event trace behavioral data includes abnormal behaviour data;If event trace Behavioral data includes abnormal behaviour data, it is determined that the affiliated personnel of the event trace behavioral data are a suspect.Due to root Whether it is that a suspect judges to the personnel according to event trace behavioral data, is no longer dependent on personnel at risk's human face data Library can effectively identify a suspect according to behavioural characteristic, improve the accuracy of identification, and illegal criminal can occur Crime is identified before being, can carry out the prevention in advance before breaking laws and commit crime.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair Some bright embodiments for those of ordinary skill in the art without having to pay creative labor, can be with Obtain other attached drawings according to these attached drawings.
Fig. 1 is the flow chart of the recognition methods embodiment one of a suspect of the present invention;
Fig. 2 is the flow chart of the recognition methods embodiment two of a suspect of the present invention;
Fig. 3 is the structural schematic diagram of the identification device embodiment one of a suspect of the present invention;
Fig. 4 is the structural schematic diagram of the identification device embodiment two of a suspect of the present invention.
Specific implementation mode
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art The every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
It should be appreciated that term "and/or" used herein is only a kind of incidence relation of description affiliated partner, indicate There may be three kinds of relationships, for example, A and/or B, can indicate:Individualism A, exists simultaneously A and B, individualism B these three Situation.In addition, character "/" herein, it is a kind of relationship of "or" to typically represent forward-backward correlation object.
Depending on context, word as used in this " if " can be construed to " ... when " or " when ... When " or " in response to determination " or " in response to detection ".Similarly, depend on context, phrase " if it is determined that " or " if detection (condition or event of statement) " can be construed to " when determining " or " in response to determination " or " when the detection (condition of statement Or event) when " or " in response to detection (condition or event of statement) ".
Fig. 1 is the flow chart of the recognition methods embodiment one of a suspect of the present invention, as shown in Figure 1, the present embodiment is held Row main body is the identification device of a suspect, and the identification device of a suspect is integrated in computer, platform device or server Or other have independent calculating in the equipment of processing capacity, and service, then this implementation are provided a user by webpage or client The recognition methods for a suspect that example provides includes following steps.
Step 101, the event trace behavioral data into each personnel of monitoring area is obtained.
Specifically, in the present embodiment, multiple monitoring devices, monitoring device pair are installed in densely populated public place in advance Behavioral data into each personnel of monitoring area stores.The behavior number of each personnel is obtained from multiple monitoring devices According to, and the behavioral data of same person is spliced sequentially in time, form the event trace behavioral data of each personnel. The event trace behavioral data of each personnel can indicate concrete behavior of each personnel in each zone of action.
In the present embodiment, to the event trace behavioral data of certain personnel illustrate for:8 points of Zhang morning into Enter supermarket, pushes shopping cart, go to prepared food area from fruit area returns to fruit area again, but does not do shopping, and finally goes to payment area, After the pocket of previous purchaser is greater than or equal to 2 minutes, 9 points are left from Non-Purchase Exit.
Step 102, event trace behavioral data and the characteristic in abnormal behavior library are compared, to judge Whether event trace behavioral data includes abnormal behaviour data.
In the present embodiment, abnormal behavior library is built in advance, a large amount of exception is stored in abnormal behavior library The characteristic of behavior.Wherein, abnormal behaviour is that have very maximum probability that delinquent suspicious actions will occur.Will such as it occur Suspicious actions before stealing or robbery etc. are delinquent.
In the present embodiment, to the characteristic of super incity abnormal behaviour by taking densely populated public place is supermarket as an example Illustrate for:It does not do shopping into supermarket, pushes empty wagons and gyrate;Push empty wagons or the empty-handedly yield outside supermarket It patrols;Specially stare at the shopping cart after others pays the bill or wallet, handbag etc..
It is understood that abnormal behavior data can be added or correct according to actual conditions.
Step 103, if event trace behavioral data includes abnormal behaviour data, it is determined that the event trace behavioral data Affiliated personnel are a suspect.
It specifically, can be at interval of preset time period by event trace behavioral data and abnormal behavior in the present embodiment Whether the characteristic in library is compared, judge in event trace behavioral data to include abnormal behaviour data, if event trace Behavioral data includes abnormal behaviour data, it is determined that the affiliated personnel of the event trace behavioral data are a suspect, if living Do not include abnormal behaviour data in dynamic rail mark behavioral data, then continues the event trace behavior number for obtaining next preset time period According to, and whether the event trace behavioral data is judged including abnormal behaviour data again, until the personnel leave the people The intensive public place of mouth.
The recognition methods of a suspect provided in this embodiment enters the activity of each personnel of monitoring area by acquisition Track behavioral data;Event trace behavioral data and the characteristic in abnormal behavior library are compared, to judge to live Whether dynamic rail mark behavioral data includes abnormal behaviour data;If event trace behavioral data includes abnormal behaviour data, it is determined that The affiliated personnel of the event trace behavioral data are a suspect.Due to according to event trace behavioral data to the personnel whether be A suspect judges, is no longer dependent on personnel at risk's face database, can effectively be identified according to behavioural characteristic suspicious Personnel improve the accuracy of identification, and can be identified before criminal offence occurs, and can break laws and commit crime Preceding prevention in advance.
Fig. 2 is the flow chart of the recognition methods embodiment two of a suspect of the present invention, as shown in Fig. 2, the present embodiment provides A suspect recognition methods, be on the basis of the recognition methods embodiment one of a suspect of the present invention, to step 101, The further refinement of step 103, and the step of further comprising structure abnormal behaviour database, then it is provided in this embodiment suspicious The recognition methods of personnel includes the following steps.
Step 201, the video data of a variety of densely populated public places is acquired.
Wherein, densely populated public place includes at least:Railway station, airport, subway station, square, supermarket, market, may be used also To include other densely populated public places, this is not limited in the present embodiment.
Wherein, include the behavioral data of a large amount of personnel in the video data of acquisition.
Step 202, feature extraction is carried out to video data and classified, to obtain abnormal behavior data.
Specifically, in the present embodiment, feature extraction is carried out to video data using feature extraction algorithm, and use engineering It practises algorithm to classify, obtains the characteristic for abnormal class in class categories, the characteristic of the abnormal class is abnormal Behavioural characteristic data.
Wherein, in the present embodiment, the classification of the algorithm of feature extraction is not limited, to the classification of machine learning bob It does not limit.
Step 203, abnormal behaviour database is built according to abnormal behavior data.
Abnormal behavior data are stored and build abnormal behaviour database into database.Wherein, type of database It does not limit, such as can be MySQL database, oracle database etc..
It is understood that if abnormal behaviour database has built completion, subsequently when the identification of progress a suspect not Step 201- steps 203 are executed again.
Step 204, the event trace behavioral data into each personnel of monitoring area is obtained.
Further, the event trace behavioral data obtained into each personnel of monitoring area specifically includes:
First, acquisition enters the behavioral data of each personnel of monitoring area.
Specifically, it due to being provided with multiple monitoring devices in densely populated public place, is corresponded to from multiple monitoring devices Storage region acquisition enter monitoring area each personnel behavioral data.
Then, the behavioral data of same personnel is spliced sequentially in time based on face recognition technology, is formed every The event trace behavioral data of a personnel.
Specifically, all behavioral datas that face recognition technology obtains same personnel are first passed through, and according in behavioral data Temporal information, behavioral data is spliced sequentially in time, forms the event trace behavioral data of the personnel.
Wherein, face recognition technology can be any one in existing face recognition technology.
Step 205, event trace behavioral data and the characteristic in abnormal behavior library are compared, judges to live Whether dynamic rail mark behavioral data includes abnormal behaviour data, if so, 206 are thened follow the steps, it is no to then follow the steps 204.
Step 206, judge in event trace behavioral data whether is the abnormal behaviour data corresponding abnormal behaviour duration More than or equal to preset time threshold, if so, 207 are thened follow the steps, it is no to then follow the steps 204.
Step 207, judge that event trace behavioral data includes whether the number of abnormal behaviour data is greater than or equal in advance If number threshold value, if so, 208 are thened follow the steps, it is no to then follow the steps 204.
Step 208, determine that the affiliated personnel of the event trace behavioral data are a suspect.
It is illustrated in conjunction with step 205- steps 208.Further, in this embodiment by event trace behavioral data with Characteristic in abnormal behavior library is compared, and judges whether event trace behavioral data includes abnormal behaviour data, If event trace behavioral data includes abnormal behaviour data, illustrates that the personnel have motivation to carry out criminal offence, then sentence Whether the abnormal behaviour data corresponding abnormal behaviour duration is greater than or equal to preset time in disconnected event trace behavioral data It is delinquent to illustrate that the personnel will carry out if the abnormal behaviour duration is greater than or equal to preset time threshold for threshold value Suspicion improves, and then judges that event trace behavioral data includes whether the number of abnormal behaviour data is greater than or equal to default Number threshold value illustrates that the personnel will carry out illegal criminal if the number of abnormal behaviour data is greater than or equal to predetermined number threshold value The suspicion of crime further increases, and the abnormal behaviour duration is greater than or equal to preset time threshold and abnormal behaviour data The affiliated personnel that number is greater than or equal to the event trace behavioral data of predetermined number threshold value are determined as a suspect.If abnormal row The number for being less than preset time threshold or abnormal behaviour data for the duration is less than predetermined number threshold value, then continues to obtain the people The event trace behavioral data of member, further to be judged.
Wherein, preset time threshold and predetermined number threshold value are preset.As preset time threshold can be 2 minutes, or Other suitable times, predetermined number threshold value can be 2 times, 3 times or other suitable for number.
The recognition methods of a suspect provided in this embodiment, by the video counts for acquiring a variety of densely populated public places According to video data feature extraction and classify, to obtain abnormal behavior data, according to abnormal behavior data structure Abnormal behaviour database is built, the event trace behavioral data into each personnel of monitoring area is obtained, by event trace behavior Data are compared with the characteristic in abnormal behavior library, judge whether event trace behavioral data includes abnormal behaviour Data, if so, judging whether the abnormal behaviour data corresponding abnormal behaviour duration is more than in event trace behavioral data Or be equal to preset time threshold, if so, judge event trace behavioral data include abnormal behaviour data number it is whether big In or be equal to predetermined number threshold value, if so, determine the event trace behavioral data affiliated personnel be a suspect, otherwise, Continue to obtain the event trace behavioral data into the personnel of monitoring area, subsequently to be judged.It can not only occur It is identified before criminal offence, the prevention in advance before breaking laws and commit crime can be carried out, and further improve the standard of identification Exactness reduces the generation of incident.
One of ordinary skill in the art will appreciate that:Realize that all or part of step of above-mentioned each method embodiment can lead to The relevant hardware of program instruction is crossed to complete.Program above-mentioned can be stored in a read/write memory medium.The program is being held When row, execution includes the steps that above-mentioned each method embodiment;And storage medium above-mentioned includes:ROM, RAM, magnetic disc or CD Etc. the various media that can store program code.
Fig. 3 is the structural schematic diagram of the identification device embodiment one of a suspect of the present invention, as shown in figure 3, the present embodiment The identification device of a suspect of offer includes:Acquisition module 31, judgment module 32, determining module 33.
Wherein, acquisition module 31, for obtaining the event trace behavioral data into each personnel of monitoring area.Judge Module 32 is connect with acquisition module 31.For by the characteristic in event trace behavioral data and abnormal behavior library into Row comparison, to judge whether event trace behavioral data includes abnormal behaviour data.Determining module 33 connects with judgment module 32 It connects.If including abnormal behaviour data for event trace behavioral data, it is determined that the affiliated personnel of the event trace behavioral data For a suspect.
The identification device of a suspect provided in this embodiment can execute the technical solution of embodiment of the method shown in Fig. 1, Its implementing principle and technical effect is similar, and details are not described herein again.
Fig. 4 is the structural schematic diagram of the identification device embodiment two of a suspect of the present invention, as shown in figure 4, the present embodiment The identification device of a suspect of offer is on the basis of the identification device embodiment one of a suspect of the present invention, further, Further include:Acquisition module 41, characteristic extracting module 42 and structure module 43.
Further, it is determined that module 33, is specifically used for:
If event trace behavioral data includes abnormal behaviour data, abnormal behaviour number in event trace behavioral data is judged Whether it is greater than or equal to preset time threshold according to the corresponding abnormal behaviour duration;If the abnormal behaviour duration is more than or waits In preset time threshold, then judge that event trace behavioral data includes whether the number of abnormal behaviour data is greater than or equal in advance If number threshold value;If the number of abnormal behaviour data is greater than or equal to predetermined number threshold value, it is determined that the event trace behavior number According to affiliated personnel be a suspect.
Further, acquisition module 31 are specifically used for:
Acquisition enters the behavioral data of each personnel of monitoring area;Based on face recognition technology by the row of same personnel Spliced sequentially in time for data, forms the event trace behavioral data of each personnel.
Further, acquisition module 41 acquire the video data of a variety of densely populated public places.Characteristic extracting module 42, it is connect with acquisition module 41.For carrying out feature extraction to video data and classifying, to obtain abnormal behavior data. Module 43 is built, is connect with characteristic extracting module 42.For building abnormal behaviour database according to abnormal behavior data.
The identification device of a suspect provided in this embodiment can execute the technical solution of embodiment of the method shown in Fig. 2, Its implementing principle and technical effect is similar, and details are not described herein again.
The embodiment of the present invention also provides a kind of identification device of a suspect, including:Memory, processor and computer Program.
Wherein, computer program stores in memory, and is configured as being executed by processor to realize that the present invention is suspicious Method in the recognition methods embodiment one of personnel or the recognition methods embodiment two of a suspect of the present invention.
The embodiment of the present invention also provides a kind of computer readable storage medium, is stored thereon with computer program, computer Program is executed by processor with the identification of the recognition methods embodiment one or a suspect of the present invention of realizing a suspect of the present invention Method in embodiment of the method two.
Finally it should be noted that:The above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Present invention has been described in detail with reference to the aforementioned embodiments for pipe, it will be understood by those of ordinary skill in the art that:Its according to So can with technical scheme described in the above embodiments is modified, either to which part or all technical features into Row equivalent replacement;And these modifications or replacements, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme.

Claims (10)

1. a kind of recognition methods of a suspect, which is characterized in that including:
Obtain the event trace behavioral data into each personnel of monitoring area;
The event trace behavioral data is compared with the characteristic in abnormal behavior library, to judge the activity Whether track behavioral data includes abnormal behaviour data;
If the event trace behavioral data includes abnormal behaviour data, it is determined that the affiliated personnel of the event trace behavioral data For a suspect.
2. if according to the method described in claim 1, it is characterized in that, the event trace behavioral data includes abnormal row For data, it is determined that the affiliated personnel of the event trace behavioral data are a suspect, are specifically included:
If the event trace behavioral data includes abnormal behaviour data, abnormal row in the event trace behavioral data is judged Whether it is greater than or equal to preset time threshold for the data corresponding abnormal behaviour duration;
If the abnormal behaviour duration is greater than or equal to preset time threshold, judge in the event trace behavioral data Whether the number including abnormal behaviour data is greater than or equal to predetermined number threshold value;
If the number of the abnormal behaviour data is greater than or equal to predetermined number threshold value, it is determined that the event trace behavioral data Affiliated personnel are a suspect.
3. method according to claim 1 or 2, which is characterized in that described to obtain into each personnel's of monitoring area Event trace behavioral data, specifically includes:
Acquisition enters the behavioral data of each personnel of monitoring area;
The behavioral data of same personnel is spliced sequentially in time based on face recognition technology, forms the work of each personnel Dynamic rail mark behavioral data.
4. according to the method described in claim 3, it is characterized in that, described obtain the activity into each personnel of monitoring area Before the behavioral data of track, further include:
Acquire the video data of a variety of densely populated public places;
Feature extraction is carried out to the video data and is classified, to obtain abnormal behavior data;
Abnormal behaviour database is built according to the abnormal behavior data.
5. a kind of identification device of a suspect, which is characterized in that including:
Acquisition module, for obtaining the event trace behavioral data into each personnel of monitoring area;
Judgment module, for the event trace behavioral data to be compared with the characteristic in abnormal behavior library, To judge whether the event trace behavioral data includes abnormal behaviour data;
Determining module, if including abnormal behaviour data for the event trace behavioral data, it is determined that the event trace behavior The affiliated personnel of data are a suspect.
6. device according to claim 5, which is characterized in that the determining module is specifically used for:
If the event trace behavioral data includes abnormal behaviour data, abnormal row in the event trace behavioral data is judged Whether it is greater than or equal to preset time threshold for the data corresponding abnormal behaviour duration;If the abnormal behaviour duration More than or equal to preset time threshold, then judge the event trace behavioral data include abnormal behaviour data number whether More than or equal to predetermined number threshold value;If the number of the abnormal behaviour data is greater than or equal to predetermined number threshold value, it is determined that The affiliated personnel of the event trace behavioral data are a suspect.
7. device according to claim 5 or 6, which is characterized in that the acquisition module is specifically used for:
Acquisition enters the behavioral data of each personnel of monitoring area;Based on face recognition technology by the behavior number of same personnel According to being spliced sequentially in time, the event trace behavioral data of each personnel is formed.
8. device according to claim 7, which is characterized in that further include:
Acquisition module acquires the video data of a variety of densely populated public places;
Characteristic extracting module, for carrying out feature extraction to the video data and classifying, to obtain abnormal behavior data;
Module is built, for building abnormal behaviour database according to the abnormal behavior data.
9. a kind of identification device of a suspect, which is characterized in that including:
Memory, processor and computer program;
Wherein, the computer program is stored in the memory, and is configured as being executed to realize such as by the processor Method described in any one of claim 1-4.
10. a kind of computer readable storage medium, which is characterized in that be stored thereon with computer program, the computer program It is executed by processor to realize the method as described in any one of claim 1-4.
CN201810448414.9A 2018-05-11 2018-05-11 Recognition methods, device and the computer readable storage medium of a suspect Pending CN108664608A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810448414.9A CN108664608A (en) 2018-05-11 2018-05-11 Recognition methods, device and the computer readable storage medium of a suspect

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810448414.9A CN108664608A (en) 2018-05-11 2018-05-11 Recognition methods, device and the computer readable storage medium of a suspect

Publications (1)

Publication Number Publication Date
CN108664608A true CN108664608A (en) 2018-10-16

Family

ID=63778481

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810448414.9A Pending CN108664608A (en) 2018-05-11 2018-05-11 Recognition methods, device and the computer readable storage medium of a suspect

Country Status (1)

Country Link
CN (1) CN108664608A (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109784175A (en) * 2018-12-14 2019-05-21 深圳壹账通智能科技有限公司 Abnormal behaviour people recognition methods, equipment and storage medium based on micro- Expression Recognition
CN109815820A (en) * 2018-12-26 2019-05-28 深圳市天彦通信股份有限公司 Object localization method and relevant apparatus
CN110298254A (en) * 2019-05-30 2019-10-01 罗普特科技集团股份有限公司 A kind of analysis method and system for personnel's abnormal behaviour
CN110321582A (en) * 2019-03-22 2019-10-11 贵阳博烁科技有限公司 A kind of pyramid schemes analysis method and device
CN111309954A (en) * 2020-02-24 2020-06-19 浙江力石科技股份有限公司 Scenic spot shopping guide behavior recognition system
CN111353426A (en) * 2020-02-28 2020-06-30 山东浪潮通软信息科技有限公司 Abnormal behavior detection method and device
CN111353414A (en) * 2020-02-25 2020-06-30 重庆中科云从科技有限公司 Identity recognition method, system, machine readable medium and equipment
CN111552007A (en) * 2020-05-26 2020-08-18 上海量卿科技有限公司 Inspection system and method
CN111553192A (en) * 2020-03-30 2020-08-18 深圳壹账通智能科技有限公司 Hierarchical authority unlocking method and device and storage medium
CN111694854A (en) * 2020-06-05 2020-09-22 北京百度网讯科技有限公司 Method and device for monitoring entrance and exit of area, electronic equipment and storage medium
CN112016363A (en) * 2019-05-30 2020-12-01 富泰华工业(深圳)有限公司 Personnel monitoring method and device, computer device and readable storage medium
CN112507772A (en) * 2020-09-03 2021-03-16 广州市标准化研究院 Face recognition security system and suspicious person detection and early warning method
CN113343743A (en) * 2020-03-03 2021-09-03 杭州海康威视系统技术有限公司 Target person identification method and device, electronic equipment and storage medium
WO2022165685A1 (en) * 2021-02-03 2022-08-11 京东方科技集团股份有限公司 Method for determining dangerousness of person, apparatus, system and storage medium
CN114898516A (en) * 2022-04-13 2022-08-12 深圳市鸿普森科技股份有限公司 Operation and maintenance monitoring service management system based on Internet of things
CN115225298A (en) * 2021-04-17 2022-10-21 华为技术有限公司 Prompting method, related device and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105404895A (en) * 2015-11-03 2016-03-16 中国联合网络通信集团有限公司 Abnormal state identification method and identification system
CN106033530A (en) * 2015-03-11 2016-10-19 中兴通讯股份有限公司 Identification method and apparatus for suspected person
CN107958382A (en) * 2017-12-06 2018-04-24 北京小度信息科技有限公司 Abnormal behaviour recognition methods, device, electronic equipment and storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106033530A (en) * 2015-03-11 2016-10-19 中兴通讯股份有限公司 Identification method and apparatus for suspected person
CN105404895A (en) * 2015-11-03 2016-03-16 中国联合网络通信集团有限公司 Abnormal state identification method and identification system
CN107958382A (en) * 2017-12-06 2018-04-24 北京小度信息科技有限公司 Abnormal behaviour recognition methods, device, electronic equipment and storage medium

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109784175A (en) * 2018-12-14 2019-05-21 深圳壹账通智能科技有限公司 Abnormal behaviour people recognition methods, equipment and storage medium based on micro- Expression Recognition
CN109815820A (en) * 2018-12-26 2019-05-28 深圳市天彦通信股份有限公司 Object localization method and relevant apparatus
CN110321582A (en) * 2019-03-22 2019-10-11 贵阳博烁科技有限公司 A kind of pyramid schemes analysis method and device
CN110321582B (en) * 2019-03-22 2023-05-26 贵阳博烁科技有限公司 Method and device for analyzing marketing activity
CN112016363A (en) * 2019-05-30 2020-12-01 富泰华工业(深圳)有限公司 Personnel monitoring method and device, computer device and readable storage medium
CN110298254A (en) * 2019-05-30 2019-10-01 罗普特科技集团股份有限公司 A kind of analysis method and system for personnel's abnormal behaviour
CN111309954A (en) * 2020-02-24 2020-06-19 浙江力石科技股份有限公司 Scenic spot shopping guide behavior recognition system
CN111309954B (en) * 2020-02-24 2023-10-17 浙江力石科技股份有限公司 Scenic spot shopping guide behavior identification system
CN111353414A (en) * 2020-02-25 2020-06-30 重庆中科云从科技有限公司 Identity recognition method, system, machine readable medium and equipment
CN111353426A (en) * 2020-02-28 2020-06-30 山东浪潮通软信息科技有限公司 Abnormal behavior detection method and device
CN113343743A (en) * 2020-03-03 2021-09-03 杭州海康威视系统技术有限公司 Target person identification method and device, electronic equipment and storage medium
CN113343743B (en) * 2020-03-03 2024-02-13 杭州海康威视系统技术有限公司 Target person identification method, device, electronic equipment and storage medium
CN111553192A (en) * 2020-03-30 2020-08-18 深圳壹账通智能科技有限公司 Hierarchical authority unlocking method and device and storage medium
CN111552007A (en) * 2020-05-26 2020-08-18 上海量卿科技有限公司 Inspection system and method
CN111694854A (en) * 2020-06-05 2020-09-22 北京百度网讯科技有限公司 Method and device for monitoring entrance and exit of area, electronic equipment and storage medium
CN111694854B (en) * 2020-06-05 2023-07-21 北京百度网讯科技有限公司 Regional access monitoring method and device, electronic equipment and storage medium
CN112507772A (en) * 2020-09-03 2021-03-16 广州市标准化研究院 Face recognition security system and suspicious person detection and early warning method
WO2022165685A1 (en) * 2021-02-03 2022-08-11 京东方科技集团股份有限公司 Method for determining dangerousness of person, apparatus, system and storage medium
CN115225298A (en) * 2021-04-17 2022-10-21 华为技术有限公司 Prompting method, related device and system
CN115225298B (en) * 2021-04-17 2024-05-10 华为技术有限公司 Prompting method, related device and system
CN114898516A (en) * 2022-04-13 2022-08-12 深圳市鸿普森科技股份有限公司 Operation and maintenance monitoring service management system based on Internet of things

Similar Documents

Publication Publication Date Title
CN108664608A (en) Recognition methods, device and the computer readable storage medium of a suspect
CN108629322A (en) Monitoring method, device and the computer readable storage medium of a suspect
US10271017B2 (en) System and method for generating an activity summary of a person
WO2019153193A1 (en) Taxi operation monitoring method, device, storage medium, and system
CN111008568B (en) Ticket escape detection method and related device thereof
CN106022296B (en) A kind of fake-licensed car detection method of the probability polymerization based on vehicle hot spot region
CN106780250B (en) Intelligent community security event processing method and system based on Internet of things technology
CN103578018A (en) Method, device and system for detecting lost sales due to an out-of-shelf condition
CN109961587A (en) A kind of monitoring system of self-service bank
CN108171340A (en) For carrying out mirror method for distinguishing, equipment and storage medium to bicycle repairing information
US8200595B1 (en) Determing a disposition of sensor-based events using decision trees with splits performed on decision keys
CN111476177A (en) Method and device for detecting suspect
CN101692281A (en) Safety monitoring method, safety monitoring device and automatic teller machine (ATM) system
CN110321582B (en) Method and device for analyzing marketing activity
CN107920224A (en) A kind of abnormality alarming method, equipment and video monitoring system
CN108171187A (en) A kind of abnormal behaviour automatic identifying method and device based on the extraction of bone point
CN116778657A (en) Method and system for intelligently identifying intrusion behavior
CN111126167A (en) Method and system for quickly identifying series activities of multiple specific persons
CN113408445A (en) Method, device, equipment and storage medium for analyzing violation behaviors of locomotive crew members
CN111144180B (en) Risk detection method and system for monitoring video
CN117690189B (en) Charging station dangerous behavior identification method and monitoring system based on artificial intelligence
KR102644230B1 (en) Mysterious symptom detection system using AI variable threshold
KR102659067B1 (en) Door access management system applying deep learning
CN117354469B (en) District monitoring video target tracking method and system based on security precaution
CN116757336B (en) Track traffic risk prediction method and system based on data driving

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181016

RJ01 Rejection of invention patent application after publication