CN109068099A - Virtual electronic fence monitoring method and system based on video monitoring - Google Patents

Virtual electronic fence monitoring method and system based on video monitoring Download PDF

Info

Publication number
CN109068099A
CN109068099A CN201811033412.XA CN201811033412A CN109068099A CN 109068099 A CN109068099 A CN 109068099A CN 201811033412 A CN201811033412 A CN 201811033412A CN 109068099 A CN109068099 A CN 109068099A
Authority
CN
China
Prior art keywords
image
monitoring
electronic fence
virtual electronic
area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811033412.XA
Other languages
Chinese (zh)
Other versions
CN109068099B (en
Inventor
赵钦君
徐元
程金
申涛
张勇
董楠
刘敬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Jinan
Original Assignee
University of Jinan
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Jinan filed Critical University of Jinan
Priority to CN201811033412.XA priority Critical patent/CN109068099B/en
Publication of CN109068099A publication Critical patent/CN109068099A/en
Application granted granted Critical
Publication of CN109068099B publication Critical patent/CN109068099B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/183Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19604Image analysis to detect motion of the intruder, e.g. by frame subtraction involving reference image or background adaptation with time to compensate for changing conditions, e.g. reference image update on detection of light level change

Abstract

The invention discloses a kind of virtual electronic fence monitoring method and system based on video monitoring, the image data that monitoring method includes the following steps: step 1, acquires monitoring area;Whether step 2, the image for judging acquisition are first frame images, if so, drawing polygon in the first frame image of acquisition as the key area to be monitored, are performed the next step;Otherwise it directly performs the next step;Step 3 judges whether the key area has target invasion by shadow Detection algorithm, if there is target is invaded, exports warning message, and execute step 1, otherwise, directly executes step 1.The present invention draws arbitrary polygon as key monitoring region by mouse, target is judged whether there is by shadow Detection algorithm to enter, eliminate the shade in image, it avoids generating false alarm because key monitoring region has shade entrance, the accuracy for improving monitoring realizes the key monitoring of key area.

Description

Virtual electronic fence monitoring method and system based on video monitoring
Technical field
The present invention relates to monitoring technology fields, in particular to a kind of virtual electronic fence based on video monitoring Monitoring method and system.
Background technique
Fence is currently used anti-theft alarm system, and system is mainly by electronic fence host, front end accessory, rear end Control system three parts composition.The common fence of tradition generally constitutes infrared light curtain by photoelectric sensor, passes through Infrared light blocks reflection to have detected whether that object invades fence, to trigger alarm or take pictures.But it is this traditional Fence needs to provide power supply at the scene and is laid with electron boundary, and the expenditure of financial resources, material resources and manpower is larger.Fence There are shortcomings for system, such as installation is troublesome, electronic equipment is easy to damage, maintenance cost is high.
Safety defense monitoring system based on video can real-time, vivid, really reflect the case where monitoring area, improved tool Alarm signal can be provided in real time when there is target invasion by having the video security monitoring system of warning function.But current video prison Controlling real-time alarm system is performed intrusion detection to the whole region of video monitoring, can not realize the emphasis prison of key area Control, data processing amount is big, low efficiency.
Therefore, how to design a kind of virtual electronic fence system based on video monitoring, meet to some importance region into Row monitoring alarm, and the problem of accuracy rate with higher is those skilled in the art's urgent need to resolve.
Summary of the invention
The present invention to solve the above-mentioned problems, propose a kind of virtual electronic fence monitoring method based on video monitoring and System draws arbitrary polygon as key monitoring region by mouse, by shadow Detection algorithm judge whether there is target into Enter, eliminate the shade in image, avoids generating false alarm because key monitoring region has shade entrance, improve the standard of monitoring True property, realizes the key monitoring of key area.
To achieve the goals above, the present invention adopts the following technical scheme:
A kind of virtual electronic fence monitoring method based on video monitoring, includes the following steps:
Step 1, the image data for acquiring monitoring area;
Whether step 2, the image for judging acquisition are first frame images, if so, drawing in the first frame image of acquisition Polygon is performed the next step as the key area to be monitored;Otherwise it directly performs the next step;
Step 3 judges whether the key area has target invasion by shadow Detection algorithm, if there is target is invaded, Warning message is exported, otherwise, executes the first step.
Further, the method for judging whether the key area has target to invade by shadow Detection algorithm is specific Are as follows:
Step 31 pre-processes present frame source images: the non-key area in shielding present frame source images, and uses Median filter process;
Step 32: pretreated present image is converted to grayscale image;
Step 33, the grayscale image that present frame pretreatment image is converted and the grayscale image phase after previous frame image preprocessing Subtract, obtain the difference of the pixel value of each pixel, the pixel using difference greater than threshold value is as doubtful foreground point, if there is doubtful Foreground point performs the next step;Otherwise, next frame image is set as present image and executes step 31;
Step 34 converts the pretreated current frame image of step 31 to HSV image, and converts with previous frame source images HSV image subtraction, the pixel of threshold value that the difference of H, S are less than setting is judged as shade, the difference of H, S are greater than setting Threshold value point as foreground point, then extract all foreground point regions profile obtain foreground point region, when foreground point region Area be greater than setting foreground point region area threshold when, then judge that current frame image has target invasion;Otherwise without target Invasion.
Further, the method for the non-key area in the shielding present frame source images are as follows: by the institute of non-key area There is pixel value to be set as 0.
Further, the step 2 draws arbitrary polygon as emphasis to be monitored in the first frame image of acquisition The method in region specifically:
Step 21, acquisition mouse action action signal, judge whether to click left button, if so, performing the next step;Otherwise, Execute step 23;
Step 22 judges whether it is to click left button for the first time, if so, label is in the picture, and is recorded as polygon Initial vertex;Otherwise, label in the picture, is recorded as the vertex of polygon, and current vertex is connect with a upper vertex, and holds Row step 21;
Step 23 judges whether right-click, if so, executing step 25;Otherwise, it performs the next step;
Step 24 judges whether mouse moves, if so, otherwise the coordinate value of display mouse on the image executes step 21;
End vertex in the picture, and is separately connected Shang Yiding by step 25, the end vertex for being recorded as polygon, label Point and initial vertex terminate;
Further, the step 3 further include: in the case where not alarming when setting monitoring area illuminance abrupt variation, judgement When continuous multiple frames image has target invasion, warning message is just exported.
Further, the mode of the output warning message includes local alarm, SMS alarm, wechat push alarm.
A kind of virtual electronic fence system based on video monitoring, comprising: camera, ups power, memory, acousto-optic report Alert device, monitor terminal, the monitor terminal use a kind of above-mentioned virtual electronic fence monitoring method based on video monitoring, institute It states camera and monitoring area is set for acquiring the image data of monitoring area, and the data of acquisition are transferred to and are monitored eventually End, the monitor terminal respectively with camera, ups power, memory, combined aural and visual alarm connection.
Further, a kind of virtual electronic fence system based on video monitoring, further includes wireless communication module, the nothing Line communication module is connect with monitor terminal.
Further, the wireless communication module includes SIM card and wireless network card, and the SIM card and wireless network card are distinguished It is connect with monitor terminal.
Further, a kind of virtual electronic fence system based on video monitoring, further includes remote terminal, and the monitoring is eventually Module and remote terminal wirelessly communicate by wireless communication at end, and the remote terminal includes remote computer or/and mobile phone terminal.
Compared with prior art, the invention has the benefit that
(1) present invention judges whether there is target by shadow Detection algorithm and enters key area, eliminates the yin in image Shadow avoids generating false alarm because key monitoring region has shade entrance, improves the accuracy of monitoring, realize key area Key monitoring.
(2) The present invention gives the specific method for delimiting key monitoring region by mouse, what can be monitored as needed is set Multiple key areas are drawn in standby or region in same monitoring image, are monitored to key area, and the treating capacity of data is big It is big to reduce, improve the working efficiency of monitoring system.
(3) monitoring system of the invention increases illuminance abrupt variation false alarm prevention setting function, by lamping on and off caused light May be configured as whether alarming according to mutation, user as needed can be with self-setting.
(4) present invention constructs the monitoring that virtual fence carries out key area, overcomes the laying of conditional electronic fence Electron boundary causes defect at high cost, and the boundary of key area is drawn out on the image of acquisition, realizes the weight of key area Point monitoring.
Detailed description of the invention
The accompanying drawings constituting a part of this application is used to provide further understanding of the present application, and the application's shows Meaning property embodiment and its explanation do not constitute the restriction to the application for explaining the application.
Fig. 1 is the virtual electronic fence system structure chart of the invention based on video monitoring;
Fig. 2 is the virtual electronic fence monitoring method flow chart of the invention based on video monitoring;
Fig. 3 is the method flow diagram that the present invention judges target invasion;
Fig. 4 is that the present invention draws polygon key monitoring region method flow chart;
Fig. 5 is alarm flow figure of the present invention.
Specific embodiment:
The invention will be further described with embodiment with reference to the accompanying drawing.
It is noted that described further below be all exemplary, it is intended to provide further instruction to the application.Unless another It indicates, all technical and scientific terms used herein has usual with the application person of an ordinary skill in the technical field The identical meanings of understanding.
It should be noted that term used herein above is merely to describe specific embodiment, and be not intended to restricted root According to the illustrative embodiments of the application.As used herein, unless the context clearly indicates otherwise, otherwise singular Also it is intended to include plural form, additionally, it should be understood that, when in the present specification using term "comprising" and/or " packet Include " when, indicate existing characteristics, step, operation, device, component and/or their combination.
Following embodiments are a kind of typical embodiment of the application, as shown in Figure 1, a kind of void based on video monitoring Quasi- electronic enclosure system, comprising: camera, ups power, combined aural and visual alarm, monitor terminal, the camera are arranged in monitored space Domain is used to acquire the image data of monitoring area, and the data of acquisition are transferred to monitor terminal, and the monitor terminal includes place Manage device, memory, display and keyboard and mouse, the processor of the monitor terminal respectively with camera, ups power, sound Light crossing-signal connection, the processor are connect with memory, display, keyboard and mouse respectively.
Preferably, monitor terminal can be embedded system.Embedded system is application-centered, is with computer technology Basis, software and hardware can be cut, and adapt to application system to the dedicated meter of the strict demands such as function, reliability, cost, volume, power consumption Calculation machine system.What embedded system usually executed is the task predetermined with particular requirement.Only due to embedded system For a special task, designer can optimize it, reduce size reduction cost.System has key monitoring Region automatically saves and load function, when being re-powered after power-off, system self-starting, and the automatic key monitoring region and corresponding of loading Parameter setting.
When the monitoring system installation of the present embodiment, camera is fixed on to the optimum bit that can take key monitoring region It sets, and is connect with monitoring system, the camera collects monitoring area image, and acquired image is transferred to monitoring eventually End, monitor terminal judge acquire image in key area whether have target intrusion, if so, then by alarm signal export into Row alarm, otherwise, continues with the next frame image of acquisition.It is used to power to whole system by ups power, system is furnished with UPS uninterruption power source, system has power failure indicator light in the event of a loss of power, and sends current failure alarm to finger Fixed cell-phone number and WeChat ID.
Preferably, a kind of virtual electronic fence system based on video monitoring, further includes wireless communication module, described wireless Communication module is connect with monitor terminal.Preferably, the wireless communication module includes SIM card and wireless network card, the SIM card and Wireless network card is connect with monitor terminal respectively.
Preferably, a kind of virtual electronic fence system based on video monitoring, further includes remote terminal, the monitor terminal Module and remote terminal wirelessly communicate by wireless communication, and the remote terminal includes remote computer or/and mobile phone terminal.
As shown in Fig. 2, a kind of virtual electronic fence system based on video monitoring of the present embodiment is using a kind of following base In the virtual electronic fence monitoring method of video monitoring, include the following steps:
Step 1, the image data for acquiring monitoring area;
Whether step 2, the image for judging acquisition are first frame images, if so, passing through in the first frame image of acquisition Mouse draws polygon as the key area to be monitored, and performs the next step;Otherwise, it directly performs the next step;
Step 3 judges whether the key area has target invasion by shadow Detection algorithm, if there is target is invaded, Warning message is exported, and executes step 1, otherwise, directly executes step 1.
When system is installed, camera is fixed on to the optimum position that can take key monitoring region, and and monitor terminal Connection, camera collects monitoring area image, acquired image is transferred to monitor terminal, if it is the first frame of monitoring Image, monitor terminal issue the information that key area delimited in prompt, are drawn in the first frame image of acquisition by mouse polygon For shape as the key area to be monitored, whether monitor terminal judges the key area in the image of acquisition by shadow Detection algorithm There is target intrusion, if so, then alarm signal output is alarmed, otherwise, continues with the next frame image of acquisition.
After system is installed, need to draw arbitrary polygon as the weight to be monitored by mouse in first frame image Point region.When first time clicking left mouse button, indicates the starting point of polygon, then successively click left mouse button, as more The vertex of side shape;Right mouse button is clicked each time, and representing a polygon rendering terminates, and it is polygon that mouse draws key monitoring region Shape program flow diagram is as shown in Figure 4.Multiple arbitrary polygons can be drawn in the same image, in key monitoring image Multiple key areas, and the area polygonal vertex of key monitoring is saved in the memory of monitor terminal.
Preferably, the step 2 draws arbitrary polygon as emphasis area to be monitored in the first frame image of acquisition The method in domain is drawn by operation mouse, method specifically:
Step 21, acquisition mouse action action signal, judge whether to click left button, if so, performing the next step;Otherwise, Execute step 23;
Step 22 judges whether it is to click left button for the first time, if so, label is in the picture, and is recorded as polygon Initial vertex;Otherwise, label in the picture, is recorded as the vertex of polygon, and current vertex is connect with a upper vertex, and holds Row step 21;
Step 23 judges whether right-click, if so, executing step 25;Otherwise, it performs the next step;
Step 24 judges whether mouse moves, if so, otherwise the coordinate value of display mouse on the image executes step 21;
End vertex in the picture, and is separately connected Shang Yiding by step 25, the end vertex for being recorded as polygon, label Point and initial vertex terminate;
The mouse action action signal includes clicking left button, right-click, mobile mouse.
As shown in figure 3, described judge that the method whether key area has target to invade has by shadow Detection algorithm Body are as follows:
Step 31 pre-processes present frame source images: the non-key area in shielding present frame source images, and uses Median filter process;
Step 32: pretreated present image is converted to grayscale image;
Step 33, the grayscale image that present frame pretreatment image is converted and the grayscale image phase after previous frame image preprocessing Subtract, obtain the difference of the pixel value of each pixel, the pixel using difference greater than threshold value is as doubtful foreground point, if there is doubtful Foreground point performs the next step;Otherwise, next frame image is set as present image and executes step 31;
Step 34 converts the pretreated current frame image of step 31 to HSV image, and converts with previous frame source images HSV image subtraction, the pixel of threshold value that the difference of H, S are less than setting is judged as shade, the difference of H, S are greater than setting Threshold value point as foreground point, then extract all foreground point regions profile obtain foreground point region, when foreground point region Area be greater than setting foreground point region area threshold when, then judge that current frame image has target invasion;Otherwise without target Invasion.
The method for whether having target to invade in detection image is to compare the previous frame image picture of present image and present image Element value realizes only monitoring key area by the non-key area in shielding present frame source images.Preferably, shielding is current The method of non-key area in frame source images is that all pixels value of key area non-in image is set as 0.Pass through ash first The comparison of the pixel value of degree figure primarily determines whether there is target invasion, then further determined that target intrusion by HSV image, really Set the goal intrusion accuracy improve, by shadow Detection algorithm, eliminate the shade in image, avoid because of key monitoring region There is shade to enter and generate false alarm.Whether the key area in the detection image of the present embodiment has target intrusion, to image The non-key area in present frame source images is shielded when pretreatment first, noise jamming is then overcome using median filter process, The pretreated image only includes the image of key area.
It is settable to work as continuous multiple frames image to avoid the false alarm due to caused by illuminance abrupt variation (as interior turns on light, turns off the light) It just alarms when having target invasion, in the case where not alarming when setting monitoring area illuminance abrupt variation, judges that continuous multiple frames image has When target is invaded, warning message is just exported.
Preferably, the mode of the output warning message includes local alarm or/and SMS alarm or/and wechat push report The modes such as alert.As shown in figure 5, can will be reported by wireless network card when monitor terminal monitors that there is target invasion in key area Alert information or/and monitoring image or/and monitor video are sent to remote terminal, and the remote terminal is mobile phone or remote computation Machine, so that related personnel receives monitoring information at the first time.When the wireless communication failure established by wireless network card, This system is also provided with SIM card, passes through network interface card under normal operation and carries out remote transmission to image and video data, works as network interface card When obstructed, SIM card is automatically switched to, carries out remote data transmission, and the obstructed alarm signal of simultaneous transmission network interface card using flow.
The warning message includes device name, device location, the information such as time of target intrusion.Preferably, local report Alert is that monitor terminal directly alarms alarm signal local combined aural and visual alarm.SMS alarm is to send to cell-phone number comprising report The short message of alert information, wechat push alarm by target enter the photo at key monitoring region moment or video be sent to it is specified micro- On signal, or send warning message.Positioning device can also be set on the camera of key area, and the warning message is also Map is shown including alarm region position.
The foregoing is merely preferred embodiment of the present application, are not intended to limit this application, for the skill of this field For art personnel, various changes and changes are possible in this application.Within the spirit and principles of this application, made any to repair Change, equivalent replacement, improvement etc., should be included within the scope of protection of this application.
Above-mentioned, although the foregoing specific embodiments of the present invention is described with reference to the accompanying drawings, not protects model to the present invention The limitation enclosed, those skilled in the art should understand that, based on the technical solutions of the present invention, those skilled in the art are not Need to make the creative labor the various modifications or changes that can be made still within protection scope of the present invention.

Claims (10)

1. a kind of virtual electronic fence monitoring method based on video monitoring, which comprises the steps of:
Step 1, the image data for acquiring monitoring area;
Whether step 2, the image for judging acquisition are first frame images, if so, drawing in the first frame image of acquisition polygon Shape is performed the next step as the key area to be monitored;Otherwise it directly performs the next step;
Step 3 judges whether the key area has target invasion by shadow Detection algorithm, if there is target is invaded, output Warning message, and step 1 is executed, otherwise, directly execute step 1.
2. a kind of virtual electronic fence monitoring method based on video monitoring as described in claim 1, it is characterised in that: described The method whether key area has target to invade is judged by shadow Detection algorithm specifically:
Step 31 pre-processes present frame source images: the non-key area in shielding present frame source images, and uses intermediate value Filtering processing;
Step 32: pretreated present image is converted to grayscale image;
Step 33 subtracts each other grayscale image and the grayscale image after previous frame image preprocessing that present frame pretreatment image converts, obtains The difference for obtaining the pixel value of each pixel, the pixel using difference greater than threshold value is as doubtful foreground point, if there is doubtful prospect Point, performs the next step;Otherwise, next frame image is set as present image and executes step 31;
Step 34 converts the pretreated current frame image of step 31 to HSV image, and converted with previous frame source images HSV image subtraction, is judged as shade for the pixel that the difference of H, S are less than the threshold value of setting, and the difference of H, S are greater than setting The point of threshold value is as foreground point, and the profile for then extracting all foreground point regions obtains foreground point region, when foreground point region When area is greater than the area threshold in the foreground point region of setting, then judge that current frame image has target invasion;Otherwise enter without target It invades.
3. a kind of virtual electronic fence monitoring method based on video monitoring as claimed in claim 2, it is characterised in that: described The method for shielding the non-key area in present frame source images are as follows: all pixels value of non-key area is set as 0.
4. a kind of virtual electronic fence monitoring method based on video monitoring as described in claim 1, it is characterised in that: described Step 2 draws method of the arbitrary polygon as key area to be monitored in the first frame image of acquisition specifically:
Step 21, acquisition mouse action action signal, judge whether to click left button, if so, performing the next step;Otherwise, it executes Step 23;
Step 22 judges whether it is to click left button for the first time, if so, label is in the picture, and is recorded as the starting of polygon Vertex;Otherwise, label in the picture, is recorded as the vertex of polygon, and current vertex is connect with a upper vertex, and execute step Rapid 21;
Step 23 judges whether right-click, if so, executing step 25;Otherwise, it performs the next step;
Step 24 judges whether mouse moves, if so, otherwise the coordinate value of display mouse on the image executes step 21;
Step 25, the end vertex for being recorded as polygon, label in the picture, and by end vertex be separately connected a upper vertex with Initial vertex terminates.
5. a kind of virtual electronic fence monitoring method based on video monitoring as described in claim 1, it is characterised in that: when setting Determine in the case where not alarming when monitoring area illuminance abrupt variation, when judging that continuous multiple frames image has target invasion, just exports alarm signal Breath.
6. a kind of virtual electronic fence monitoring method based on video monitoring as claimed in claim 1 or 5, it is characterised in that: The mode for exporting warning message includes local alarm, SMS alarm, wechat push alarm.
7. a kind of virtual electronic fence system based on video monitoring characterized by comprising camera, ups power, storage Device, combined aural and visual alarm, monitor terminal, the monitor terminal is using described in any one of claims 1-6 a kind of based on video prison The image data that monitoring area is used to acquire monitoring area is arranged in the virtual electronic fence monitoring method of control, the camera, And the data of acquisition are transferred to monitor terminal, the monitor terminal respectively with camera, ups power, memory, sound-light alarm Device connection.
8. such as a kind of virtual electronic fence system based on video monitoring of claim 7, it is characterised in that: further include wireless communication Module, the wireless communication module are connect with monitor terminal.
9. such as a kind of virtual electronic fence system based on video monitoring of claim 8, it is characterised in that: the radio communication mold Block includes SIM card and wireless network card, and the SIM card and wireless network card are connect with monitor terminal respectively.
10. such as a kind of virtual electronic fence system based on video monitoring of claim 8, it is characterised in that: further include long-range end End, module and remote terminal wirelessly communicate the monitor terminal by wireless communication, and the remote terminal includes remote computer Or/and mobile phone terminal.
CN201811033412.XA 2018-09-05 2018-09-05 Virtual electronic fence monitoring method and system based on video monitoring Active CN109068099B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811033412.XA CN109068099B (en) 2018-09-05 2018-09-05 Virtual electronic fence monitoring method and system based on video monitoring

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811033412.XA CN109068099B (en) 2018-09-05 2018-09-05 Virtual electronic fence monitoring method and system based on video monitoring

Publications (2)

Publication Number Publication Date
CN109068099A true CN109068099A (en) 2018-12-21
CN109068099B CN109068099B (en) 2020-12-01

Family

ID=64759640

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811033412.XA Active CN109068099B (en) 2018-09-05 2018-09-05 Virtual electronic fence monitoring method and system based on video monitoring

Country Status (1)

Country Link
CN (1) CN109068099B (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110276577A (en) * 2019-06-06 2019-09-24 深圳前海微众银行股份有限公司 A kind of management method and device of virtual warehouse
CN110446166A (en) * 2019-08-12 2019-11-12 广州小鹏汽车科技有限公司 The monitoring method and device of a kind of positioning device close to geography fence
CN110766899A (en) * 2019-11-11 2020-02-07 四川航天神坤科技有限公司 Method and system for enhancing electronic fence monitoring early warning in virtual environment
CN111310556A (en) * 2019-12-20 2020-06-19 山东汇佳软件科技股份有限公司 Drowning prevention safety supervision system based on primary and middle school student area and monitoring method thereof
CN111369797A (en) * 2018-12-25 2020-07-03 航天信息股份有限公司 Vehicle monitoring method, electronic fence construction method, electronic fence and device
CN111832357A (en) * 2019-04-19 2020-10-27 苏州涟漪信息科技有限公司 Mobile event detection method and device
CN112261366A (en) * 2020-10-20 2021-01-22 贵州电网有限责任公司 Operation monitoring device
CN112417946A (en) * 2020-09-17 2021-02-26 国网天津静海供电有限公司 Boundary crossing detection method and system for designated area of power construction site
CN112802302A (en) * 2020-12-31 2021-05-14 国网浙江省电力有限公司双创中心 Electronic fence method and system based on multi-source algorithm
CN112800947A (en) * 2021-01-27 2021-05-14 上海电气集团股份有限公司 Video monitoring method, system, electronic equipment and storage medium
CN112837471A (en) * 2019-11-22 2021-05-25 上海弘视通信技术有限公司 Security monitoring method and device for internet contract room
CN112883866A (en) * 2021-02-08 2021-06-01 上海新纪元机器人有限公司 Method, system and storage medium for detecting regional invasion in real time
CN112948627A (en) * 2019-12-11 2021-06-11 杭州海康威视数字技术股份有限公司 Alarm video generation method, display method and device
CN113269940A (en) * 2021-03-17 2021-08-17 瑞驰博方(北京)科技有限公司 Electronic fence alarm method and device, computer equipment and storage medium
CN113379985A (en) * 2020-02-25 2021-09-10 北京君正集成电路股份有限公司 Nursing electronic fence alarm device
CN113379987A (en) * 2020-02-25 2021-09-10 北京君正集成电路股份有限公司 Design method of nursing electronic fence module
CN113379984A (en) * 2020-02-25 2021-09-10 北京君正集成电路股份有限公司 Electronic nursing fence system
CN114663841A (en) * 2022-05-23 2022-06-24 安徽送变电工程有限公司 Moving target identification method and system based on deep learning

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101017573A (en) * 2007-02-09 2007-08-15 南京大学 Method for detecting and identifying moving target based on video monitoring
CN102024146A (en) * 2010-12-08 2011-04-20 江苏大学 Method for extracting foreground in piggery monitoring video
US9196150B2 (en) * 2013-03-15 2015-11-24 Honeywell International Inc. System and method for video monitoring of restricted areas below bucket trucks, lineworkers on power distribution poles or other elevated loads
CN105225515A (en) * 2015-10-26 2016-01-06 深圳市麦谷科技有限公司 A kind of method for supervising based on fence and system
CN107154133A (en) * 2017-06-22 2017-09-12 南京邮电大学 A kind of regional early warning method based on defined position
CN107230188A (en) * 2017-04-19 2017-10-03 湖北工业大学 A kind of method of video motion shadow removing
CN107507383A (en) * 2017-09-13 2017-12-22 江苏跃鑫科技有限公司 A kind of intrusion detection monitoring method
CN107767390A (en) * 2017-10-20 2018-03-06 苏州科达科技股份有限公司 The shadow detection method and its system of monitor video image, shadow removal method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101017573A (en) * 2007-02-09 2007-08-15 南京大学 Method for detecting and identifying moving target based on video monitoring
CN102024146A (en) * 2010-12-08 2011-04-20 江苏大学 Method for extracting foreground in piggery monitoring video
US9196150B2 (en) * 2013-03-15 2015-11-24 Honeywell International Inc. System and method for video monitoring of restricted areas below bucket trucks, lineworkers on power distribution poles or other elevated loads
CN105225515A (en) * 2015-10-26 2016-01-06 深圳市麦谷科技有限公司 A kind of method for supervising based on fence and system
CN107230188A (en) * 2017-04-19 2017-10-03 湖北工业大学 A kind of method of video motion shadow removing
CN107154133A (en) * 2017-06-22 2017-09-12 南京邮电大学 A kind of regional early warning method based on defined position
CN107507383A (en) * 2017-09-13 2017-12-22 江苏跃鑫科技有限公司 A kind of intrusion detection monitoring method
CN107767390A (en) * 2017-10-20 2018-03-06 苏州科达科技股份有限公司 The shadow detection method and its system of monitor video image, shadow removal method

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111369797A (en) * 2018-12-25 2020-07-03 航天信息股份有限公司 Vehicle monitoring method, electronic fence construction method, electronic fence and device
CN111832357A (en) * 2019-04-19 2020-10-27 苏州涟漪信息科技有限公司 Mobile event detection method and device
CN110276577A (en) * 2019-06-06 2019-09-24 深圳前海微众银行股份有限公司 A kind of management method and device of virtual warehouse
CN110446166A (en) * 2019-08-12 2019-11-12 广州小鹏汽车科技有限公司 The monitoring method and device of a kind of positioning device close to geography fence
CN110766899A (en) * 2019-11-11 2020-02-07 四川航天神坤科技有限公司 Method and system for enhancing electronic fence monitoring early warning in virtual environment
CN112837471A (en) * 2019-11-22 2021-05-25 上海弘视通信技术有限公司 Security monitoring method and device for internet contract room
CN112948627B (en) * 2019-12-11 2023-02-03 杭州海康威视数字技术股份有限公司 Alarm video generation method, display method and device
CN112948627A (en) * 2019-12-11 2021-06-11 杭州海康威视数字技术股份有限公司 Alarm video generation method, display method and device
CN111310556A (en) * 2019-12-20 2020-06-19 山东汇佳软件科技股份有限公司 Drowning prevention safety supervision system based on primary and middle school student area and monitoring method thereof
CN113379985A (en) * 2020-02-25 2021-09-10 北京君正集成电路股份有限公司 Nursing electronic fence alarm device
CN113379985B (en) * 2020-02-25 2022-09-27 北京君正集成电路股份有限公司 Nursing electronic fence alarm device
CN113379987B (en) * 2020-02-25 2022-10-21 北京君正集成电路股份有限公司 Design method of nursing electronic fence module
CN113379984B (en) * 2020-02-25 2022-09-23 北京君正集成电路股份有限公司 Electronic nursing fence system
CN113379984A (en) * 2020-02-25 2021-09-10 北京君正集成电路股份有限公司 Electronic nursing fence system
CN113379987A (en) * 2020-02-25 2021-09-10 北京君正集成电路股份有限公司 Design method of nursing electronic fence module
CN112417946A (en) * 2020-09-17 2021-02-26 国网天津静海供电有限公司 Boundary crossing detection method and system for designated area of power construction site
CN112261366A (en) * 2020-10-20 2021-01-22 贵州电网有限责任公司 Operation monitoring device
CN112802302A (en) * 2020-12-31 2021-05-14 国网浙江省电力有限公司双创中心 Electronic fence method and system based on multi-source algorithm
CN112802302B (en) * 2020-12-31 2022-11-18 国网浙江省电力有限公司双创中心 Electronic fence method and system based on multi-source algorithm
CN112800947A (en) * 2021-01-27 2021-05-14 上海电气集团股份有限公司 Video monitoring method, system, electronic equipment and storage medium
CN112883866A (en) * 2021-02-08 2021-06-01 上海新纪元机器人有限公司 Method, system and storage medium for detecting regional invasion in real time
CN113269940A (en) * 2021-03-17 2021-08-17 瑞驰博方(北京)科技有限公司 Electronic fence alarm method and device, computer equipment and storage medium
CN114663841A (en) * 2022-05-23 2022-06-24 安徽送变电工程有限公司 Moving target identification method and system based on deep learning

Also Published As

Publication number Publication date
CN109068099B (en) 2020-12-01

Similar Documents

Publication Publication Date Title
CN109068099A (en) Virtual electronic fence monitoring method and system based on video monitoring
CN107948465B (en) A kind of method and apparatus that detection camera is disturbed
US9965835B2 (en) Defogging images and video
EP2357615B1 (en) Video processing
CA3104723C (en) Object detection
CN104333714A (en) Signal switching method and signal switching system of spliced wall
CN211509189U (en) Electric power operation field supervision equipment and system
CN104533526B (en) Coal-face coal and gas prominent alarm method based on image
KR101454644B1 (en) Loitering Detection Using a Pedestrian Tracker
CN110379106A (en) A kind of toy intrusion detecting prior-warning device and method
CN106650594A (en) Video fire detection method, device and system
CN204759452U (en) Traffic conflagration detecting system based on many characteristics of video smog fuse
CN105450992A (en) Smart home monitoring method and system based on motion detection
CN206620225U (en) Haze penetrates camera circuit and system
CN103454228B (en) Adopt the flue gas blackness supervisory system of motion detecting technology
CN102801964A (en) Intelligent home monitoring method based on motion detection and system thereof
CN108925019A (en) outdoor lighting intelligent control method and system
CN210222962U (en) Intelligent electronic fence system
CN101461239A (en) Video verification system and method for central station alarm monitoring
CN116246402A (en) Monitoring method and device
CN113078729B (en) Operation detection method and device applied to transformer substation, electronic equipment and medium
Li et al. Application of foreground detection technology in intelligent video monitoring system of substation
CN202773005U (en) Intelligent home monitoring system
CN111882454A (en) Nuclear power station weight monitoring system and method
CN207097145U (en) ATM in bank intelligent monitoring device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant