CN109102612A - A kind of campus security management method and system - Google Patents

A kind of campus security management method and system Download PDF

Info

Publication number
CN109102612A
CN109102612A CN201811007793.4A CN201811007793A CN109102612A CN 109102612 A CN109102612 A CN 109102612A CN 201811007793 A CN201811007793 A CN 201811007793A CN 109102612 A CN109102612 A CN 109102612A
Authority
CN
China
Prior art keywords
image
face
security management
condition code
saturation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811007793.4A
Other languages
Chinese (zh)
Inventor
朱彬
高树超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhenjiang Game Intelligent Technology Co Ltd
Original Assignee
Zhenjiang Game Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhenjiang Game Intelligent Technology Co Ltd filed Critical Zhenjiang Game Intelligent Technology Co Ltd
Priority to CN201811007793.4A priority Critical patent/CN109102612A/en
Publication of CN109102612A publication Critical patent/CN109102612A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/40Analysis of texture
    • G06T7/41Analysis of texture based on statistical description of texture
    • G06T7/42Analysis of texture based on statistical description of texture using transform domain methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification

Abstract

The present invention provides a kind of campus security management method and system, wherein campus security management method includes the following steps: the facial image of S1, the facial image for adding suspect, school teachers and students into face recognition database;The facial image of S2, continuously collector extract the condition code of facial image;S3, the condition code of extraction is compared with the condition code of the facial image of suspect in face recognition database, when the two is inconsistent, executes step S4, otherwise alarm, and at sending out notice message to administrative staff;S4, the condition code of extraction is compared with the condition code of the facial image of teachers and students in school in face recognition database, when the two is inconsistent, is considered as stranger, otherwise send opening signal to access control system.The present invention can carry out recognition of face to the personnel for being prepared to enter into campus, and register when finding stranger, find to alarm when suspect, advantageously ensure that the safety management in campus.

Description

A kind of campus security management method and system
Technical field
The present invention relates to campus security management technical field more particularly to a kind of campus security management method and system.
Background technique
Currently, domestic campus administration, mainly manually manages, since teachers and students in school's personnel amount is more, inevitably occur Omission problem is arrived school once stranger even suspect enters, can be brought to the property of school and the person of teachers and students Certain threat.In addition, during campus administration, there is also admit one's mistake people the case where.Therefore, in view of the above-mentioned problems, it is necessary to It is proposed further solution.
Summary of the invention
It is existing in the prior art to overcome the purpose of the present invention is to provide a kind of campus security management method and system It is insufficient.
For achieving the above object, the present invention provides a kind of campus security management method comprising following steps:
S1, the facial image for adding suspect add the facial image of teachers and students in school into face recognition database Into face recognition database;
S2, identification monitoring area whether there is personnel, such as identify successfully, continuously the facial image of collector, extract The condition code of facial image;
S3, the condition code of the facial image of suspect in the condition code of extraction and face recognition database is compared It is right, when the two is inconsistent, step S4 is executed, is otherwise alarmed, and at sending out notice message to administrative staff;
S4, the condition code of the facial image of teachers and students in school in the condition code of extraction and face recognition database is compared It is right, when the two is inconsistent, it is considered as stranger, otherwise sends opening signal to access control system.
As the improvement of campus security management method of the invention, described document information is position corresponding with human face five-sense-organ Data and face mask data.
As the improvement of campus security management method of the invention, the campus security management method further includes to acquisition Face image data is filtered processing:
According to the face image data of acquisition, it is full to calculate local energy spectrum gradient, histogram of gradients extension and maximum chrominance With;
According to local energy spectrum gradient, histogram of gradients extension and the maximum chrominance saturation being calculated, whole picture is counted The ratio that pixel is obscured in image, effectively filters face image data.
As the improvement of campus security management method of the invention,
The local energy spectrum gradient calculates as follows:
The energy spectrum of NxN sized images is first calculated with discrete Fourier transform:
Then it converts to polar coordinates u=fcos θ, v=fsin θ, and calculates S (f, θ), obtain:
Wherein, A is the amplitude factor in an all directions, and α is energy spectrum slope.Largely studies have shown that scheming naturally α is about 2 as in, and fuzzy image has biggish α.Therefore the On Local Fuzzy degree of image can be described as part and global-alpha value Proportional difference
Wherein, αpIt is local α, αoIt is global-alpha;
The histogram of gradients extension calculates as follows:
The gradient of each pixel of image is first calculated, then with containing there are two the ladders of the gauss hybrid models of Gauss description part Degree distribution: π0G(x;μ0, σ0)+π1G(x;μ1, σ1), wherein σ10
According to gradient distribution, the specific formula for calculation of histogram of gradients extension is
Wherein, CpIt is topography's intensity value ranges, ε is the minimum number prevented except zero, and τ is a constant, takes 25;
The maximum chrominance saturation calculates as follows:
First calculate the saturation degree of each pixel:
Then compare local saturation maximum value and global saturation degree maximum value using following formula, it is full to obtain maximum chrominance With:
Wherein, max (sp) it is saturation degree maximum value in topography's block, max (so) it is that saturation degree is maximum in global image Value.
For achieving the above object, the present invention provides a kind of Campus security management system comprising: video camera, alarm Device, access controller, administrative staff's user terminal and host, the video camera, administrative staff's user terminal and the host data Transmission, the alarm, access controller and the host signal transmit;
The facial image of suspect and the people of teachers and students in school are stored in the face recognition database of the host Face image;The video camera identifies the personnel in its monitoring area, and the continuously facial image of collector, described The condition code of host extraction facial image;The host is by suspect in the condition code of extraction and face recognition database The condition code of facial image is compared, and when the two is consistent, alarms, and sending out notice message is used to the administrative staff Otherwise family end the condition code of extraction is compared with the condition code of the facial image of teachers and students in school in face recognition database, When the two is consistent, opening signal is sent to the access controller, is otherwise considered as stranger.
As the improvement of Campus security management system of the invention, described document information is position corresponding with human face five-sense-organ Data and face mask data.
As the improvement of Campus security management system of the invention, the Campus security management system is also used to acquisition Face image data is filtered processing:
According to the face image data of acquisition, it is full to calculate local energy spectrum gradient, histogram of gradients extension and maximum chrominance With;
According to local energy spectrum gradient, histogram of gradients extension and the maximum chrominance saturation being calculated, whole picture is counted The ratio that pixel is obscured in image, effectively filters face image data.
As the improvement of Campus security management system of the invention, the local energy spectrum gradient is counted as follows It calculates:
The energy spectrum of NxN sized images is first calculated with discrete Fourier transform:
Then it converts to polar coordinates u=fcos θ, v=fsin θ, and calculates S (f, θ), obtain:
Wherein, A is the amplitude factor in an all directions, and α is energy spectrum slope.Largely studies have shown that scheming naturally α is about 2 as in, and fuzzy image has biggish α.Therefore the On Local Fuzzy degree of image can be described as part and global-alpha value Proportional difference
Wherein, αpIt is local α, αoIt is global-alpha;
The histogram of gradients extension calculates as follows:
The gradient of each pixel of image is first calculated, then with containing there are two the ladders of the gauss hybrid models of Gauss description part Degree distribution: π0G(x;μ0, σ0)+π1G(x;μ1, σ1), wherein σ10
According to gradient distribution, the specific formula for calculation of histogram of gradients extension is
Wherein, CpIt is topography's intensity value ranges, ε is the minimum number prevented except zero, and τ is a constant, takes 25;
The maximum chrominance saturation calculates as follows:
First calculate the saturation degree of each pixel:
Then compare local saturation maximum value and global saturation degree maximum value using following formula, it is full to obtain maximum chrominance With:
Wherein, max (sp) it is saturation degree maximum value in topography's block, max (so) it is that saturation degree is maximum in global image Value.
Compared with prior art, the beneficial effects of the present invention are: the present invention can carry out the personnel for being prepared to enter into campus Recognition of face, and registered when finding stranger, it finds to alarm when suspect, advantageously ensures that campus Safety management, while having saved manpower, and the problem of avoid misidentification.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The some embodiments recorded in invention, for those of ordinary skill in the art, without creative efforts, It is also possible to obtain other drawings based on these drawings.
Fig. 1 is the method flow schematic diagram of a specific embodiment of campus security management method of the invention.
Specific embodiment
The present invention is described in detail for each embodiment shown in reference to the accompanying drawing, but it should be stated that, these Embodiment is not limitation of the present invention, those of ordinary skill in the art according to these embodiments made by function, method, Or equivalent transformation or substitution in structure, all belong to the scope of protection of the present invention within.
As shown in Figure 1, campus security management method of the invention includes the following steps:
S1, the facial image for adding suspect add the facial image of teachers and students in school into face recognition database Into face recognition database.
S2, identification monitoring area whether there is personnel, such as identify successfully, continuously the facial image of collector, extract The condition code of facial image.
Wherein, described document information is position data corresponding with human face five-sense-organ and face mask data, is so passed through The mode for extracting condition code, advantageously ensures that the accuracy of subsequent recognition of face.
S3, the condition code of the facial image of suspect in the condition code of extraction and face recognition database is compared It is right, when the two is inconsistent, step S4 is executed, is otherwise alarmed, and at sending out notice message to administrative staff.
S4, the condition code of the facial image of teachers and students in school in the condition code of extraction and face recognition database is compared It is right, when the two is inconsistent, it is considered as stranger, otherwise sends opening signal to access control system.
In addition, the campus security management method further includes being filtered processing to the face image data of acquisition:
According to the face image data of acquisition, it is full to calculate local energy spectrum gradient, histogram of gradients extension and maximum chrominance With;
According to local energy spectrum gradient, histogram of gradients extension and the maximum chrominance saturation being calculated, whole picture is counted The ratio that pixel is obscured in image, effectively filters face image data.
Wherein, the local energy spectrum gradient calculates as follows:
The energy spectrum of NxN sized images is first calculated with discrete Fourier transform:
Then it converts to polar coordinates u=fcos θ, v=fsin θ, and calculates S (f, θ), obtain:
Wherein, A is the amplitude factor in an all directions, and α is energy spectrum slope.Largely studies have shown that scheming naturally α is about 2 as in, and fuzzy image has biggish α.Therefore the On Local Fuzzy degree of image can be described as part and global-alpha value Proportional difference
Wherein, αpIt is local α, αoIt is global-alpha;
The histogram of gradients extension calculates as follows:
The gradient of each pixel of image is first calculated, then with containing there are two the ladders of the gauss hybrid models of Gauss description part Degree distribution: π0G(x;μ0, σ0)+π1G(x;μ1, σ1), wherein σ10
According to gradient distribution, the specific formula for calculation of histogram of gradients extension is
Wherein, CpIt is topography's intensity value ranges, ε is the minimum number prevented except zero, and τ is a constant, takes 25;
The maximum chrominance saturation calculates as follows:
First calculate the saturation degree of each pixel:
Then compare local saturation maximum value and global saturation degree maximum value using following formula, it is full to obtain maximum chrominance With:
Wherein, max (sp) it is saturation degree maximum value in topography's block, max (so) it is that saturation degree is maximum in global image Value.
Based on identical inventive concept, the present invention also provides a kind of Campus security management systems comprising: video camera, report Alert device, access controller, administrative staff's user terminal and host, the video camera, administrative staff's user terminal and the host number According to transmission, the alarm, access controller and the host signal are transmitted.
Specifically, the facial image of suspect is stored in the face recognition database of the host and in school teacher Raw facial image;The video camera identifies the personnel in its monitoring area, and the continuously face figure of collector Picture, the host extract the condition code of facial image;The host is by crime in the condition code of extraction and face recognition database The condition code of the facial image of suspect is compared, and when the two is consistent, alarms, and sending out notice message is to the pipe Human user end is managed, otherwise, by the condition code of the facial image of teachers and students in school in the condition code of extraction and face recognition database It is compared, when the two is consistent, sends opening signal to the access controller, be otherwise considered as stranger.Preferably, described Condition code is position data corresponding with human face five-sense-organ and face mask data.
In addition, the Campus security management system is also used to be filtered processing to the face image data of acquisition:
According to the face image data of acquisition, it is full to calculate local energy spectrum gradient, histogram of gradients extension and maximum chrominance With;
According to local energy spectrum gradient, histogram of gradients extension and the maximum chrominance saturation being calculated, whole picture is counted The ratio that pixel is obscured in image, effectively filters face image data.
Wherein, the local energy spectrum gradient calculates as follows:
The energy spectrum of NxN sized images is first calculated with discrete Fourier transform:
Then it converts to polar coordinates u=fcos θ, v=fsin θ, and calculates S (f, θ), obtain:
Wherein, A is the amplitude factor in an all directions, and α is energy spectrum slope.Largely studies have shown that scheming naturally α is about 2 as in, and fuzzy image has biggish α.Therefore the On Local Fuzzy degree of image can be described as part and global-alpha value Proportional difference
Wherein, αpIt is local α, αoIt is global-alpha;
The histogram of gradients extension calculates as follows:
The gradient of each pixel of image is first calculated, then with containing there are two the ladders of the gauss hybrid models of Gauss description part Degree distribution: π0G(x;μ0, σ0)+π1G(x;μ1, σ1), wherein σ10
According to gradient distribution, the specific formula for calculation of histogram of gradients extension is
Wherein, CpIt is topography's intensity value ranges, ε is the minimum number prevented except zero, and τ is a constant, takes 25;
The maximum chrominance saturation calculates as follows:
First calculate the saturation degree of each pixel:
Then compare local saturation maximum value and global saturation degree maximum value using following formula, it is full to obtain maximum chrominance With:
Wherein, max (sp) it is saturation degree maximum value in topography's block, max (so) it is that saturation degree is maximum in global image Value.
In conclusion the present invention can carry out recognition of face to the personnel for being prepared to enter into campus, and when finding stranger It is registered, finds to alarm when suspect, advantageously ensure that the safety management in campus, while having saved manpower, And the problem of avoiding misidentification.
It is obvious to a person skilled in the art that invention is not limited to the details of the above exemplary embodiments, Er Qie In the case where without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present invention is by appended power Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims Variation is included within the present invention.Any reference signs in the claims should not be construed as limiting the involved claims.
In addition, it should be understood that although this specification is described in terms of embodiments, but not each embodiment is only wrapped Containing an independent technical solution, this description of the specification is merely for the sake of clarity, and those skilled in the art should It considers the specification as a whole, the technical solutions in the various embodiments may also be suitably combined, forms those skilled in the art The other embodiments being understood that.

Claims (8)

1. a kind of campus security management method, which is characterized in that the campus security management method includes the following steps:
S1, the facial image for adding suspect add the facial image of teachers and students in school to people into face recognition database In face identification database;
S2, identification monitoring area whether there is personnel, such as identify successfully, continuously the facial image of collector, extract face The condition code of image;
S3, the condition code of extraction is compared with the condition code of the facial image of suspect in face recognition database, When the two is inconsistent, step S4 is executed, is otherwise alarmed, and at sending out notice message to administrative staff;
S4, the condition code of extraction is compared with the condition code of the facial image of teachers and students in school in face recognition database, when When the two is inconsistent, it is considered as stranger, otherwise sends opening signal to access control system.
2. campus security management method according to claim 1, which is characterized in that described document information be and human face five-sense-organ phase Corresponding position data and face mask data.
3. campus security management method according to claim 1, which is characterized in that the campus security management method is also wrapped It includes and processing is filtered to the face image data of acquisition:
According to the face image data of acquisition, local energy spectrum gradient, histogram of gradients extension and maximum chrominance saturation are calculated;
According to local energy spectrum gradient, histogram of gradients extension and the maximum chrominance saturation being calculated, entire image is counted In obscure pixel ratio, face image data is effectively filtered.
4. campus security management method according to claim 3, which is characterized in that
The local energy spectrum gradient calculates as follows:
The energy spectrum of NxN sized images is first calculated with discrete Fourier transform:
Then it converts to polar coordinates u=fcos θ, v=fsin θ, and calculates S (f, θ), obtain:
Wherein, A is the amplitude factor in an all directions, and α is energy spectrum slope;It is a large amount of studies have shown that α in natural image About 2, fuzzy image has biggish α.Therefore the On Local Fuzzy degree of image can be described as the ratio of part and global-alpha value Difference
Wherein, αpIt is local α, αoIt is global-alpha;
The histogram of gradients extension calculates as follows:
The gradient of each pixel of image is first calculated, then with containing there are two the gradients point of the gauss hybrid models of Gauss description part Cloth: π0G(x;μ0, σ0)+π1G(x;μ1, σ1), wherein σ10
According to gradient distribution, the specific formula for calculation of histogram of gradients extension is
Wherein, CpIt is topography's intensity value ranges, ε is the minimum number prevented except zero, and τ is a constant, takes 25;
The maximum chrominance saturation calculates as follows:
First calculate the saturation degree of each pixel:
Then compare local saturation maximum value and global saturation degree maximum value using following formula, obtain maximum chrominance saturation:
Wherein, max (sp) it is saturation degree maximum value in topography's block, max (so) it is saturation degree maximum value in global image.
5. a kind of Campus security management system, which is characterized in that the Campus security management system include: video camera, alarm, Access controller, administrative staff's user terminal and host, the video camera, administrative staff's user terminal and the host data pass Defeated, the alarm, access controller and the host signal transmit;
The facial image of suspect and the face figure of teachers and students in school are stored in the face recognition database of the host Picture;The video camera identifies the personnel in its monitoring area, and the continuously facial image of collector, the host Extract the condition code of facial image;The host is by the face of suspect in the condition code of extraction and face recognition database The condition code of image is compared, and when the two is consistent, alarms, and sending out notice message is to the administrative staff user End, otherwise, the condition code of extraction is compared with the condition code of the facial image of teachers and students in school in face recognition database, when When the two is consistent, opening signal is sent to the access controller, is otherwise considered as stranger.
6. Campus security management system according to claim 5, which is characterized in that described document information be and human face five-sense-organ phase Corresponding position data and face mask data.
7. Campus security management system according to claim 5, which is characterized in that the Campus security management system is also used In being filtered processing to the face image data of acquisition:
According to the face image data of acquisition, local energy spectrum gradient, histogram of gradients extension and maximum chrominance saturation are calculated;
According to local energy spectrum gradient, histogram of gradients extension and the maximum chrominance saturation being calculated, entire image is counted In obscure pixel ratio, face image data is effectively filtered.
8. Campus security management system according to claim 7, which is characterized in that the local energy spectrum gradient is according to such as Lower method calculates:
The energy spectrum of NxN sized images is first calculated with discrete Fourier transform:
Then it converts to polar coordinates u=fcos θ, v=fsin θ, and calculates S (f, θ), obtain:
Wherein, A is the amplitude factor in an all directions, and α is energy spectrum slope;It is a large amount of studies have shown that α in natural image About 2, fuzzy image has biggish α.Therefore the On Local Fuzzy degree of image can be described as the ratio of part and global-alpha value Difference
Wherein, αpIt is local α, αoIt is global-alpha;
The histogram of gradients extension calculates as follows:
The gradient of each pixel of image is first calculated, then with containing there are two the gradients point of the gauss hybrid models of Gauss description part Cloth: π0G(x;μ0, σ0)+π1G(x;μ1, σ1), wherein σ10
According to gradient distribution, the specific formula for calculation of histogram of gradients extension is
Wherein, CpIt is topography's intensity value ranges, ε is the minimum number prevented except zero, and τ is a constant, takes 25;
The maximum chrominance saturation calculates as follows:
First calculate the saturation degree of each pixel:
Then compare local saturation maximum value and global saturation degree maximum value using following formula, obtain maximum chrominance saturation:
Wherein, max (sp) it is saturation degree maximum value in topography's block, max (so) it is saturation degree maximum value in global image.
CN201811007793.4A 2018-08-31 2018-08-31 A kind of campus security management method and system Pending CN109102612A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811007793.4A CN109102612A (en) 2018-08-31 2018-08-31 A kind of campus security management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811007793.4A CN109102612A (en) 2018-08-31 2018-08-31 A kind of campus security management method and system

Publications (1)

Publication Number Publication Date
CN109102612A true CN109102612A (en) 2018-12-28

Family

ID=64864325

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811007793.4A Pending CN109102612A (en) 2018-08-31 2018-08-31 A kind of campus security management method and system

Country Status (1)

Country Link
CN (1) CN109102612A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109740555A (en) * 2019-01-10 2019-05-10 上海向素智能科技有限公司 A kind of stranger's recognition methods followed based on face quality and face
CN110111458A (en) * 2019-04-16 2019-08-09 深圳市多度科技有限公司 Realize method, system and door access machine that face is deployed to ensure effective monitoring and control of illegal activities
CN111145414A (en) * 2019-12-27 2020-05-12 广东德融汇科技有限公司 Campus safety management early warning method based on face recognition in K12 education stage
CN111462417A (en) * 2020-03-09 2020-07-28 南京华科和鼎信息科技有限公司 Multi-information verification system and multi-information verification method for unmanned bank

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103606216A (en) * 2013-12-11 2014-02-26 周卫荣 School entrance guard system
CN104599373A (en) * 2014-12-31 2015-05-06 天津瑞为拓新科技发展有限公司 Access control system for university apartment
CN105096420A (en) * 2015-07-31 2015-11-25 北京旷视科技有限公司 Access control system and data processing method for same
CN205507950U (en) * 2016-03-28 2016-08-24 阜阳师范学院 Thing networking lock
CN106023373A (en) * 2016-05-23 2016-10-12 三峡大学 Big data and human face identification based access control system for school dormitory
CN108052925A (en) * 2017-12-28 2018-05-18 江西高创保安服务技术有限公司 A kind of cell personnel archives intelligent management

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103606216A (en) * 2013-12-11 2014-02-26 周卫荣 School entrance guard system
CN104599373A (en) * 2014-12-31 2015-05-06 天津瑞为拓新科技发展有限公司 Access control system for university apartment
CN105096420A (en) * 2015-07-31 2015-11-25 北京旷视科技有限公司 Access control system and data processing method for same
CN205507950U (en) * 2016-03-28 2016-08-24 阜阳师范学院 Thing networking lock
CN106023373A (en) * 2016-05-23 2016-10-12 三峡大学 Big data and human face identification based access control system for school dormitory
CN108052925A (en) * 2017-12-28 2018-05-18 江西高创保安服务技术有限公司 A kind of cell personnel archives intelligent management

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
LIURT,LIZR,JIAJY: "Imagepartialblurdetectionandclassification", 《2008IEEECONFERENCEONCOMPUTERVISIONANDPATTERNRECOGNITION》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109740555A (en) * 2019-01-10 2019-05-10 上海向素智能科技有限公司 A kind of stranger's recognition methods followed based on face quality and face
CN110111458A (en) * 2019-04-16 2019-08-09 深圳市多度科技有限公司 Realize method, system and door access machine that face is deployed to ensure effective monitoring and control of illegal activities
CN111145414A (en) * 2019-12-27 2020-05-12 广东德融汇科技有限公司 Campus safety management early warning method based on face recognition in K12 education stage
CN111462417A (en) * 2020-03-09 2020-07-28 南京华科和鼎信息科技有限公司 Multi-information verification system and multi-information verification method for unmanned bank

Similar Documents

Publication Publication Date Title
CN109102612A (en) A kind of campus security management method and system
CN109214276A (en) A kind of system and method for the target person track following based on face recognition technology
CN108537304A (en) A kind of method and system that the testimony of a witness is veritified
CN107590212A (en) The Input System and method of a kind of face picture
CN108711208A (en) A kind of big data access control system and its management method
CN107609515B (en) Double-verification face comparison system and method based on Feiteng platform
CN105095831A (en) Face recognition method, device and system
CN101976356A (en) Face identification method for surfing identification policy, and identification system thereof
CN102930243A (en) Method and system for identifying facial information of special personnel
KR101092472B1 (en) Video indexing system using surveillance camera and the method thereof
CN116563797B (en) Monitoring management system for intelligent campus
CN109712284A (en) A kind of intelligent campus management system and its method
CN109101925A (en) Biopsy method
CN109147133A (en) A kind of dormitory method for managing security and system
CN206021287U (en) A kind of identification system
CN110246292A (en) Domestic video monitoring method, apparatus and storage medium
CN105938546A (en) Real living identity verification terminal equipment based on infrared technology
CN109167963A (en) A kind of monitoring method and system of public civilization
CN113628172A (en) Intelligent detection algorithm for personnel handheld weapons and smart city security system
CN103294981A (en) Intelligent face recognition system
CN109102611A (en) A kind of identity checking method and system
CN109745596B (en) Self-adaptive dripping speed adjusting platform
CN207965998U (en) A kind of campus security management entrance guard device
CN113111777A (en) Indoor personnel density detection system and detection method based on ARM platform
Hongxing et al. Facial area forecast and occluded face detection based on the YCbCr elliptical model

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181228

RJ01 Rejection of invention patent application after publication