CN109508769B - Target object monitoring method and device, computer equipment and storage medium - Google Patents

Target object monitoring method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN109508769B
CN109508769B CN201811389604.4A CN201811389604A CN109508769B CN 109508769 B CN109508769 B CN 109508769B CN 201811389604 A CN201811389604 A CN 201811389604A CN 109508769 B CN109508769 B CN 109508769B
Authority
CN
China
Prior art keywords
target object
image
host
target
electronic tag
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811389604.4A
Other languages
Chinese (zh)
Other versions
CN109508769A (en
Inventor
郑木勇
周子维
钱建文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Vanvov Information Technology Co ltd
Original Assignee
Guangzhou Vanvov Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Vanvov Information Technology Co ltd filed Critical Guangzhou Vanvov Information Technology Co ltd
Priority to CN201811389604.4A priority Critical patent/CN109508769B/en
Publication of CN109508769A publication Critical patent/CN109508769A/en
Application granted granted Critical
Publication of CN109508769B publication Critical patent/CN109508769B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions

Landscapes

  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Alarm Systems (AREA)
  • Image Analysis (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application relates to a target object monitoring method, a target object monitoring device, computer equipment and a storage medium. The method comprises the following steps: sending a search object list, wherein the search object list is used for indicating a host to acquire an image of an object carrying an electronic tag when the electronic tag in the search object list is searched; receiving an image of a target object sent by the host; and monitoring the target object according to the image of the target object. By adopting the method, the detection of the object or the person can be realized by acquiring the image of the target object, so that the tracking pertinence and timeliness for the target object are stronger, the acquired information of the object or the person to be tracked is more visual and comprehensive, the retrieval rate and the retrieval speed of the target object are greatly improved, and the life and property safety of people is greatly ensured.

Description

Target object monitoring method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of internet technologies, and in particular, to a target object monitoring method, apparatus, computer device, and storage medium.
Background
With the development and progress of society, articles used by people are more and more abundant. The electric vehicle is used as a common vehicle to walk into the daily life of people due to the convenient use characteristic. The rate of possession of electric vehicles has also increased year by year, and loss and theft thereof are also sometimes occurring. In life, not only goods are easy to lose, but also the loss rate of the solitary old people and children is increased year by year.
At present, in order to retrieve lost articles or people, police officers mainly rely on-site inspection and multi-party visiting to collect information of the lost articles or people, so that the lost articles or people are tracked. However, the conventional tracking method for objects and people has a low recovery rate.
Disclosure of Invention
In view of the above, it is necessary to provide a target object monitoring method, apparatus, computer device and storage medium capable of improving the recovery rate.
In a first aspect, an embodiment of the present application provides a target object monitoring method, where the method includes:
sending a search object list, wherein the search object list is used for indicating a host to acquire an image of an object carrying an electronic tag when the electronic tag in the search object list is searched;
Receiving an image of a target object sent by the host;
and monitoring the target object according to the image of the target object.
In one embodiment, the monitoring the target object according to the image of the target object includes:
acquiring a face image of the target object;
determining a target image matched with the face image in the images of the target object by adopting a 1-to-N face searching method;
monitoring the target object according to the image information of the target image; the image information comprises an identification of a target host, a position of the target image and a time of the target image.
In one embodiment, the method further comprises:
and playing the target image and marking the target face in the target image.
In one embodiment, the receiving the image of the target object sent by the host includes:
sending a calling instruction to the host, wherein the calling instruction comprises the identification of the electronic tag corresponding to the target object and/or the target time;
and receiving the image of the target object of the host based on the calling instruction.
In a second aspect, an embodiment of the present application provides a method for monitoring a target object, where the method includes:
receiving a search object list;
when the electronic tag in the search object list is detected, acquiring an image of an object carrying the electronic tag;
and sending the image of the target object to a server so that the server monitors the target object according to the image of the target object.
In one embodiment, the sending the image of the target object to the server includes:
receiving a calling instruction sent by a server, wherein the calling instruction comprises an identification of an electronic tag corresponding to the target object and target time;
and sending the image of the target object based on the calling instruction to the server.
In a third aspect, an embodiment of the present application provides a target object monitoring apparatus, where the apparatus includes: the device comprises a first sending module, a first receiving module and a first processing module;
the first sending module is used for sending a search object list, and the search object list is used for indicating a host to acquire an image of an object carrying an electronic tag when the electronic tag in the search object list is searched;
The first receiving module is used for receiving the image of the target object sent by the host;
the first processing module is used for monitoring the target object according to the image of the target object.
In a fourth aspect, an embodiment of the present application provides a target object monitoring apparatus, where the apparatus includes: the device comprises a second receiving module, an obtaining module and a second processing module;
the second receiving module is used for receiving a search object list;
the acquisition module is used for acquiring an image of an object carrying the electronic tag when the electronic tag in the search object list is detected;
the second processing module is used for sending the image of the target object to the server so that the server monitors the target object according to the image of the target object.
In a fifth aspect, an embodiment of the present application provides a computer device, including a memory and a processor, where the memory stores a computer program, and the processor implements the following steps when executing the computer program:
sending a search object list, wherein the search object list is used for indicating a host to acquire an image of an object carrying an electronic tag when the electronic tag in the search object list is searched;
Receiving an image of a target object sent by the host;
and monitoring the target object according to the image of the target object.
In a sixth aspect, an embodiment of the present application provides a computer device, including a memory and a processor, where the memory stores a computer program, and the processor implements the following steps when executing the computer program:
receiving a search object list;
when the electronic tag in the search object list is detected, acquiring an image of an object carrying the electronic tag;
and sending the image of the target object to a server so that the server monitors the target object according to the image of the target object.
In a seventh aspect, an embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the following steps:
sending a search object list, wherein the search object list is used for indicating a host to acquire an image of an object carrying an electronic tag when the electronic tag in the search object list is searched;
receiving an image of a target object sent by the host;
and monitoring the target object according to the image of the target object.
In an eighth aspect, an embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the following steps:
receiving a search object list;
when the electronic tag in the search object list is detected, acquiring an image of an object carrying the electronic tag;
and sending the image of the target object to a server so that the server monitors the target object according to the image of the target object.
According to the target object monitoring method, the target object monitoring device, the computer equipment and the storage medium, the search object list is sent and used for indicating the host to acquire the image of the object carrying the electronic tag when the electronic tag in the search object list is searched; receiving an image of a target object sent by the host; and monitoring the target object according to the image of the target object. The method adopted by the embodiment of the application can realize the detection of the object or the person by acquiring the image of the target object, so that the target object tracking pertinence and timeliness are stronger, the acquired information of the object or the person to be tracked is more intuitive and comprehensive, the target object recovery rate and the recovery speed are greatly improved, and the life and property safety of people is greatly ensured.
Drawings
FIG. 1a is an architecture diagram of a target object monitoring system in one embodiment;
FIG. 1b is a diagram of the internal structure of a server in one embodiment;
fig. 2 is a schematic flowchart of a target object monitoring method according to an embodiment;
fig. 3 is a schematic flowchart of a target object monitoring method according to another embodiment;
fig. 4 is a schematic flowchart of a target object monitoring method according to another embodiment;
fig. 5 is a schematic flowchart of a target object monitoring method according to another embodiment;
fig. 6 is a schematic flowchart of a target object monitoring method according to another embodiment;
fig. 7 is a schematic structural diagram of a target object monitoring apparatus according to an embodiment;
fig. 8 is a schematic structural diagram of a target object monitoring apparatus according to another embodiment;
fig. 9 is a schematic structural diagram of a target object monitoring apparatus according to yet another embodiment;
fig. 10 is a schematic structural diagram of a target object monitoring apparatus according to yet another embodiment;
fig. 11 is a schematic structural diagram of a target object monitoring apparatus according to yet another embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The method provided by the application can be applied to the target object monitoring system shown in fig. 1a, and the system comprises a host 100, a server 200 and an electronic tag 300. The server 200 may be a computer device, and its internal structure diagram may be shown in fig. 1 b. And may specifically include a processor, memory, network interface, display screen, and input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used to store the search object list referred to in the following embodiments, and the description of the search object list may refer to the contents of the following method embodiments. The network interface of the computer device may be used to communicate with other devices outside over a network connection. Optionally, the computer device may be a server, may be a PC, may be a personal digital assistant, may also be other terminal devices, such as a PAD, a mobile phone, and the like, and may also be a cloud or a remote server, and a specific form of the computer device is not limited in the embodiment of the present application. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like. Of course, the input device and the display screen may not belong to a part of the computer device, and may be external devices of the computer device.
Those skilled in the art will appreciate that the architecture shown in FIG. 1b is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as a particular computing device may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
The following describes the technical solutions of the present application and how to solve the above technical problems with specific examples. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
It should be noted that the execution subject of the method embodiments described below may be an object monitoring apparatus, which may be implemented by software, hardware, or a combination of software and hardware as part or all of the computer device described above. The following method embodiments are described by taking the execution subject as the computer device as an example.
Fig. 2 is a schematic flowchart of a target monitoring method according to an embodiment. The embodiment relates to a specific process of monitoring a target object by a server according to an image sent by a host. As shown in fig. 2, the method includes:
S101, sending a search object list, wherein the search object list is used for indicating a host to acquire an image of an object carrying an electronic tag when the electronic tag in the search object list is searched.
Specifically, the server may send a search object list to the host through the wireless communication module, where the search object list may include an identifier of an electronic tag carried by an object to be monitored, and may also include a correspondence between the object to be monitored and the identifier of the electronic tag carried by the object to be monitored. The host may store the search object list in the memory of the host after receiving the search object list. When the host detects that the electronic tag in the searched object list is in the searching range near the host through the short-distance communication module in the host, the host can turn on the camera to start shooting so as to shoot the image of the object corresponding to the electronic tag in the searching range of the host. Optionally, the host may save the image while shooting, and may upload the image to the server. Optionally, when the electronic tag in the search object list leaves the search range near the host, the host may turn off the camera to stop shooting, so as to save resource consumption. Optionally, the communication between the short-range communication module and the electronic tag uses an over-the-air protocol that may be a custom communication format, for example, sub-1G wireless communication technology.
It should be noted that, the server sends the search object list to the host, where the search object list may be sent to one host, or sent to multiple hosts step by step in a time-division manner, which is not limited in this embodiment. Optionally, the server may send the search object list to the host at preset time intervals, or may send the updated search object list to the host when the search object list is updated, for example, when a police newly adds or deletes an identifier of an electronic tag corresponding to an article or a person to be searched.
Optionally, the wireless communication module may be a module that performs data transmission by using a public communication network, for example, a 3G communication module, a 4G communication module, or a 5G communication module, which is not limited in this embodiment as long as data communication can be achieved.
And S102, receiving the image of the target object sent by the host.
Specifically, the host may send the image of the target object captured by the host to the server through the wireless communication module, so that the server receives the image of the target object sent by the host. Alternatively, it may be that the host sends all the images including the influence of the target object to the server, so that the server can receive the images of the target object; the host may also find out an image corresponding to the electronic tag carried by the target object from the local images stored in the host according to the identifier of the electronic tag carried by the target object, which is detected by the host as needed, and send the image corresponding to the target object to the server.
Alternatively, the target object may be a person, such as an elderly person or a child who needs to be prevented from being lost, or an article, such as a bicycle, an electric vehicle, a safe, or the like, as long as the object needs to be monitored and can carry the electronic tag.
S103, monitoring the target object according to the image of the target object.
Specifically, the server may monitor the target object according to the image of the target object. Optionally, the server may find the image corresponding to the electronic tag corresponding to the target object from the images of all the objects sent by the host by obtaining the identifier of the electronic tag corresponding to the target object, so as to monitor the target object according to the image of the target object and according to the information in the image of the target object. Optionally, the server may further determine, according to the identifier of the host that captures the image of the target object, the position where the target object appears in combination with the installation position of each host that is recorded in advance, and further determine the motion trajectory of the target object, thereby implementing monitoring of the target object.
In this embodiment, the server can send the search object list to the host, when the host searches the electronic tag in the search object list, the host determines that the object carrying the electronic tag is within the shooting range, so as to turn on the camera to shoot the image of the object, and send the image of the object to the server, and the server monitors the target object according to the received image of the target object, thereby avoiding the problems of low recovery rate and slow recovery speed caused by monitoring the object or person in a field visit manner in the conventional technology, and can realize the detection of the object or person by obtaining the image of the target object, so that the pertinence and timeliness of the tracking of the target object are stronger, the obtained information of the object or person to be tracked is more intuitive and comprehensive, and the recovery rate and the recovery speed of the target object are greatly improved, the life and property safety of people is greatly guaranteed.
Fig. 3 is a schematic flowchart of a target monitoring method according to another embodiment. The embodiment relates to a specific process of receiving the image of the target object sent by the host by the server. Optionally, on the basis of the embodiment shown in fig. 2, the step S102 of "receiving the image of the target object sent by the host" may specifically include:
s201, sending a calling instruction to the host, wherein the calling instruction comprises the identification of the electronic tag corresponding to the target object and/or the target time.
Specifically, the server may send a call instruction to the host through the wireless communication module, where the call instruction may include an identifier of an electronic tag carried by a target object to be monitored, and optionally, the call instruction may further include target time to be monitored. Optionally, the identifier of the electronic tag may be an ID of the electronic tag, a name of the electronic tag, or a serial number of the electronic tag, as long as the identifier can represent which object the electronic tag is carried by, and this embodiment is not limited thereto.
For example, the server may send a call to the host, where the call includes an identification of the tag whose ID number is 598412357 and a target time corresponding to nine to ten in 29 am of 10 and 29 months of 2018.
S202, receiving the image of the target object of the host based on the calling instruction.
Specifically, after the server sends the call instruction to the host, because the call instruction includes the identifier of the electronic tag corresponding to the target object and/or the target time, in response to the call instruction, the host searches in the captured image, determines the image of the target object matching the call instruction, and sends the image of the target object to the server through the wireless communication module, so that the server receives the image of the target object based on the call instruction.
For example, the server sends the host computer a call instruction including the ID of the electronic tag with the ID number of 598412357 and the target time of nine to ten am in 29 am in 10 month in 2018, so that the host computer finds, among the stored images, the image that was taken when the electronic tag with the ID number of 598412357 was detected and the image of the target object that was taken in the target time of nine to ten am in 29 month in 10 month in 2018, and sends the image of the target object to the server.
In this embodiment, the server can send a call instruction to the host and receive an image of a target object based on the call instruction from the host, where the call instruction includes an identifier of an electronic tag corresponding to the target object and/or a target time, and therefore the server can acquire the image of the target object according to the target object to be monitored and the target time to be monitored, which avoids transmission of a large amount of invalid image data, further saves system resources, and further improves retrieval efficiency of the target object.
Fig. 4 is a schematic flowchart of a target monitoring method according to another embodiment. The embodiment relates to a specific process of monitoring a target object by a server according to an image of the target object when the target object is a person. Optionally, on the basis of the embodiment shown in fig. 2 or 3, S103 may specifically include:
s301, acquiring a face image of the target object.
Specifically, when the target object is a person, the server acquires a face image of the target object to be monitored, for example, the face image of the target object may be acquired through a photo of a person to be tracked provided by the police.
S302, determining a target image matched with the face image in the images of the target object by adopting a 1-to-N face searching method.
Specifically, the server searches for a video matching the face image from the video of the target object by using the input face image of the target object as a search target and using a 1: N face search method in the face recognition technology for the video of the target object. Optionally, the image of the target object may be a picture of the target object captured by the host, or may also be a video of the target object captured by the host, so that a 1: N face search method is adopted, which may be a search from the picture of the target object, or a search from a frame image in the video of the target object, which is not limited in this embodiment.
S303, monitoring the target object according to the image information of the target image; the image information comprises an identification of a target host, a position of the target image and a time of the target image.
The image information may include an identifier of a host that captures the target image and a location where the target image is captured, and the location of the target image may be an installation location of the corresponding host, and may further include a time when the target image is captured. Specifically, the server may determine, according to the determined image information of the target image, a location where the target image occurs and a shooting time of the target image, and further determine a movement track of a person to be tracked and a time when the person is located at the image occurrence location, so as to track the movement track of the monitored target object.
In this embodiment, because it can use a 1: N face search method according to the face image of the target object, a target image matched with the face image of the target object is determined in the images of the target object, and the target object is monitored according to the image information of the target image. The image information can comprise an identification of a target host, a position of a target image and time of the target image, so that the server can determine the position of the target image and shooting time of the target image according to the determined image information of the target image, the movement track of a person to be tracked and the time of the person to be tracked in the image position are automatically determined, tracking of the movement track of the monitored target object is achieved, the question and answer questions which are low in searching efficiency and searching accuracy and caused by the fact that related target images are searched one by one in the image by means of manpower are greatly saved, searching efficiency of the target image is greatly improved, and searching efficiency of the target object is improved.
Optionally, on the basis of the foregoing embodiments, the method may further include: and playing the target image, and marking the target face in the target image.
Specifically, the server may play the determined target image through the display device thereof, and display the target image to the policeman or the loser handling the case, so as to assist the policeman in handling the case and assist the loser in retrieving lost articles or people. Optionally, when the target object is a person, the server may further determine, by using a 1: N face search method, the target image matched with the face image for the target image, and mark the target image, so that a case officer or an owner can more quickly find an object concerned by the case officer or the owner, thereby facilitating searching and further improving the efficiency of retrieving the target object.
In the method embodiments of fig. 2 to fig. 4, the execution subject is described as a server, and in the method embodiments of fig. 5 and fig. 6, the execution subject is described in detail as a host.
Fig. 5 is a schematic flowchart of a target monitoring method according to an embodiment. The embodiment relates to a specific process for monitoring a target object by acquiring an image of the target object by a host. As shown in fig. 5, the method includes:
S401, receiving a search object list.
Specifically, the server may send a search object list to the host through the wireless communication module, where the search object list may include an identifier of an electronic tag carried by an object to be monitored, and may further include a correspondence between the object to be monitored and the identifier of the electronic tag carried by the object to be monitored. After the host receives the list of search objects, it may store it in its memory.
Optionally, the wireless communication module may be a module that performs data transmission by using a public communication network, for example, a 3G communication module, a 4G communication module, or a 5G communication module, which is not limited in this embodiment as long as data communication can be achieved.
It should be noted that, the server sends the search object list to the host, where the search object list may be sent to one host, or sent to multiple hosts together, or sent to multiple hosts step by step in batches, which is not limited in this embodiment. Alternatively, the server may send the search object list to the host at time intervals, or when the search object list is updated, for example, when the police newly adds or deletes the identifier of the electronic tag corresponding to the item or person to be searched in the search object list, the server sends the latest search object list to the host, and the host can obtain the updated search object list.
S402, when the electronic tag in the search object list is detected, acquiring an image of the object carrying the electronic tag.
When the host computer detects that the electronic tags in the searched object list appear in the search range nearby the host computer through the short-distance communication module in the host computer, the camera can be opened to start shooting so as to acquire images of objects corresponding to the electronic tags in the search range. Alternatively, the host may save the image while shooting. Optionally, when the electronic tag in the search object list leaves the search range near the host, the host may turn off the camera, so as to save resource consumption.
And S403, sending the image of the target object to a server so that the server monitors the target object according to the image of the target object.
Specifically, the host may send the image of the target object captured by the host to the server through the wireless communication module. Optionally, the host may send the image of the target object to the server in communication with all images of other objects, or the host may detect the identifier of the electronic tag carried by the target object as needed, find out the image corresponding to the electronic tag carried by the target object from the local images stored in the host, and send the image corresponding to the target object to the server. Then, the server can monitor the target object according to the image of the target object. Optionally, the server may search the image corresponding to the electronic tag corresponding to the target object from the image of the object sent by the host by acquiring the identifier of the electronic tag corresponding to the target object, so as to detect the target object according to the image of the target object and according to information in the picture in the image of the target object. Optionally, the server may further determine, according to the identifier of the host that captures the image of the target object, the position where the target object appears in combination with the installation position of each host recorded in advance, and further determine the motion trajectory of the target object, thereby implementing monitoring of the target object.
Alternatively, the target object may be a person, such as an elderly person, a child or a pet, who needs to be prevented from being lost, or an article, such as a bicycle, an electric vehicle, a safe, or the like, as long as the target object needs to be monitored and can carry the electronic tag.
Optionally, a possible implementation manner of S403 may also refer to the following embodiment shown in fig. 6, which is not described herein again.
In this embodiment, the host computer receives the search object list sent by the server, and when the electronic tag in the search object list is detected, acquires the image of the object carrying the electronic tag, thereby sending the image of the target object to the server, so that the server monitors the target object according to the image of the target object, which avoids the problems of low recovery rate and low recovery speed caused by monitoring the object or person in a field visit manner in the prior art, and can realize the detection of the object or person by acquiring the image of the target object, so that the tracking pertinence and timeliness for the target object are higher, the acquired information of the object or person to be tracked is more intuitive and comprehensive, the recovery rate and the recovery speed of the target object are greatly improved, and the life and property safety of people are greatly ensured.
Fig. 6 is a schematic flowchart of a target monitoring method according to another embodiment. The embodiment relates to a specific process of sending the image of the target object to the server by the host. Optionally, on the basis of the embodiment shown in fig. 5, the step S403 of "sending the image of the target object to the server" may specifically include:
s501, receiving a calling instruction sent by a server, wherein the calling instruction comprises an identification of an electronic tag corresponding to the target object and target time.
Specifically, the server may send a call instruction to the host through the wireless communication module, where the call instruction may include an identifier of an electronic tag carried by a target object to be monitored, and optionally, the call instruction may further include target time to be monitored. Optionally, the identifier of the electronic tag may be an ID of the electronic tag, a name of the electronic tag, or a serial number of the electronic tag, as long as the identifier can represent which object the electronic tag is carried by, and this embodiment is not limited thereto.
For example, the server may send a call to the host, where the call includes an identification of the tag whose ID number is 598412357 and a target time corresponding to nine to ten in 29 am of 10 and 29 months of 2018.
S502, sending the image of the target object based on the calling instruction to the server.
Specifically, after the host receives a call instruction sent by the server, because the call instruction includes an identifier of an electronic tag corresponding to a target object and/or a target time, in response to the call instruction, the host searches in the image taken by the host, determines an image of the target object matching the call instruction, and sends the image of the target object to the server through the wireless communication module, so that the server receives the image of the target object based on the call instruction, and monitoring of the target object is achieved.
For example, the server sends the host computer a call instruction including the ID of the electronic tag with the ID number of 598412357 and the target time of nine to ten am in 29 am in 10 month in 2018, so that the host computer finds, among the stored images, the image that was taken when the electronic tag with the ID number of 598412357 was detected and the image of the target object that was taken in the target time of nine to ten am in 29 month in 10 month in 2018, and sends the image of the target object to the server.
In this embodiment, the host may receive a call instruction sent by the server, and send an image of the target object based on the call instruction to the server, where the call instruction includes an identifier of an electronic tag corresponding to the target object and/or a target time, and therefore the server may obtain the image of the target object according to the target object to be monitored and the target time to be monitored, which avoids transmission of a large amount of invalid image data, further saves system resources, and further improves retrieval efficiency of the target object.
It should be understood that although the various steps in the flow diagrams of fig. 2-6 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not limited to being performed in the exact order illustrated and, unless explicitly stated herein, may be performed in other orders. Moreover, at least some of the steps in fig. 2-6 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternating with other steps or at least some of the sub-steps or stages of other steps.
Fig. 7 is a schematic structural diagram of a target object monitoring apparatus according to an embodiment. As shown in fig. 7, the apparatus includes: a first sending module 11, a first receiving module 12 and a first processing module 13.
Specifically, the first sending module 11 is configured to send a search object list, where the search object list is used to instruct a host to obtain an image of an object carrying an electronic tag when the electronic tag in the search object list is searched.
The first receiving module 12 is configured to receive an image of the target object sent by the host.
The first processing module 13 is configured to monitor the target object according to the image of the target object.
Fig. 8 is a schematic structural diagram of a target object monitoring apparatus according to another embodiment. Alternatively, when the target object is a person, based on the embodiment shown in fig. 7, as shown in fig. 8, the first processing module 13: an acquisition unit 131, a first processing unit 132 and a second processing module 133.
Specifically, the acquiring unit 131 is configured to acquire a face image of the target object.
A first processing unit 132, configured to determine, in the image of the target object, a target image that matches the face image by using a 1-to-N face search method.
The second processing module 133 is configured to monitor the target object according to the image information of the target image; the image information comprises an identification of a target host, a position of the target image and a time of the target image.
In an embodiment, the first processing module 13 may be further configured to play the target image and mark a target face in the target image.
Fig. 9 is a schematic structural diagram of a target object monitoring apparatus according to yet another embodiment. Alternatively, on the basis of the embodiments shown in fig. 7 or fig. 8, as shown in fig. 9, fig. 9 is an example on the basis of the embodiment shown in fig. 8, and the first receiving module 12 may include: a first transmitting unit 121 and a first receiving unit 122.
Specifically, the first sending unit 121 is configured to send a call instruction to the host, where the call instruction includes an identifier of an electronic tag corresponding to the target object and/or a target time.
A first receiving unit 122, configured to receive an image of the target object based on the call instruction from the host.
Fig. 10 is a schematic structural diagram of a target object monitoring apparatus according to yet another embodiment. As shown in fig. 10, the apparatus includes: a second receiving module 21, an obtaining module 22 and a second processing module 23;
Specifically, the second receiving module 21 is configured to receive a search object list.
An obtaining module 22, configured to obtain an image of an object carrying an electronic tag when the electronic tag in the search object list is detected.
The second processing module 23 is configured to send the image of the target object to a server, so that the server monitors the target object according to the image of the target object.
Fig. 11 is a schematic structural diagram of a target object monitoring apparatus according to yet another embodiment. Optionally, on the basis of the embodiment shown in fig. 10, as shown in fig. 11, the second processing module 23 may specifically include: a second receiving unit 231 and a second transmitting unit 232.
The second receiving unit 231 is configured to receive a call instruction sent by the server, where the call instruction includes an identifier of an electronic tag corresponding to the target object and a target time.
A second sending unit 232, configured to send the image of the target object based on the call instruction to the server.
The implementation principle and technical effect of the target object monitoring device provided by the above embodiment are similar to those of the above method embodiment, and are not described herein again.
For specific limitations of the target object monitoring device, reference may be made to the above limitations of the target object monitoring method, which are not described herein again. The modules in the target object monitoring device can be wholly or partially realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, comprising a memory and a processor, the memory having a computer program stored therein, the processor implementing the following steps when executing the computer program:
sending a search object list, wherein the search object list is used for indicating a host to acquire an image of an object carrying an electronic tag when the electronic tag in the search object list is searched;
receiving an image of a target object sent by the host;
and monitoring the target object according to the image of the target object.
In one embodiment, the target object is a person, and the processor executes the computer program to further perform the following steps:
acquiring a face image of the target object;
determining a target image matched with the face image in the images of the target object by adopting a 1-to-N face searching method;
monitoring the target object according to the image information of the target image; the image information comprises an identification of a target host, a position of the target image and a time of the target image.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
And playing the target image, and marking the target face in the target image.
In one embodiment, the processor when executing the computer program further performs the steps of:
sending a calling instruction to the host, wherein the calling instruction comprises the identification of the electronic tag corresponding to the target object and/or target time;
and receiving the image of the target object of the host based on the calling instruction.
In one embodiment, a computer device is provided, comprising a memory and a processor, the memory having a computer program stored therein, the processor implementing the following steps when executing the computer program:
receiving a search object list;
when the electronic tag in the search object list is detected, acquiring an image of an object carrying the electronic tag;
and sending the image of the target object to a server so that the server monitors the target object according to the image of the target object.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
receiving a calling instruction sent by a server, wherein the calling instruction comprises an identification of an electronic tag corresponding to the target object and target time;
and sending the image of the target object based on the calling instruction to the server.
The implementation principle and technical effect of the computer device provided by the above embodiment are similar to those of the above method embodiment, and are not described herein again.
In one embodiment, there is also provided a computer readable storage medium having stored thereon computer instructions which, when executed by the processor, perform the steps of:
sending a search object list, wherein the search object list is used for indicating a host to acquire an image of an object carrying an electronic tag when the electronic tag in the search object list is searched;
receiving an image of a target object sent by the host;
and monitoring the target object according to the image of the target object.
In one embodiment, the target object is a person, and the computer program when executed by the processor further performs the steps of:
acquiring a face image of the target object;
determining a target image matched with the face image in the images of the target object by adopting a 1-to-N face searching method;
monitoring the target object according to the image information of the target image; the image information comprises an identification of a target host, a position of the target image and a time of the target image.
In one embodiment, the computer program when executed by the processor further performs the steps of:
and playing the target image, and marking the target face in the target image.
In one embodiment, the computer program when executed by the processor further performs the steps of:
sending a calling instruction to the host, wherein the calling instruction comprises the identification of the electronic tag corresponding to the target object and/or target time;
and receiving the image of the target object of the host based on the calling instruction.
In one embodiment, there is also provided a computer readable storage medium having stored thereon computer instructions which, when executed by the processor, perform the steps of:
receiving a search object list;
when the electronic tag in the search object list is detected, acquiring an image of an object carrying the electronic tag;
and sending the image of the target object to a server so that the server monitors the target object according to the image of the target object.
In one embodiment, the computer program when executed by the processor further performs the steps of:
receiving a calling instruction sent by a server, wherein the calling instruction comprises an identification of an electronic tag corresponding to the target object and target time;
And sending the image of the target object based on the calling instruction to the server.
The implementation principle and technical effect of the computer-readable storage medium provided by the above embodiments are similar to those of the above method embodiments, and are not described herein again.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above may be implemented by hardware instructions of a computer program, which may be stored in a non-volatile computer-readable storage medium, and when executed, may include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include non-volatile and/or volatile memory. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), synchronous Link (Synchlink) DRAM (SLDRAM), Rambus (Rambus) direct RAM (RDRAM), direct bused dynamic RAM (DRDRAM), and bused dynamic RAM (RDRAM).
All possible combinations of the technical features in the above embodiments may not be described for the sake of brevity, but should be considered as being within the scope of the present disclosure as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is specific and detailed, but not to be understood as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, and these are all within the scope of protection of the present application. Therefore, the protection scope of the present patent application shall be subject to the appended claims.

Claims (10)

1. A target object monitoring method, the method comprising:
sending a continuously updated search object list, wherein the search object list is used for indicating a host to start shooting by opening a camera when detecting that an electronic tag in the search object list is present in a search range near the host through a short-distance communication module in the host, so as to shoot an image of an object corresponding to the electronic tag in the search range of the host and obtain a plurality of images corresponding to the search object list; when detecting that the electronic tag in the search object list leaves a search range near the host, the host closes the camera to stop shooting;
Receiving an image of a target object sent by the host; the target object image is searched in the plurality of images according to the electronic tag of the target object, and one or more target object images corresponding to the electronic tag are obtained; or the image of the target object is an image corresponding to an electronic tag carried by the target object, which is obtained by searching in the local image stored by the host;
and monitoring the target object according to the image of the target object.
2. The method of claim 1, wherein the target object is a human figure, and the monitoring the target object according to the image of the target object comprises:
acquiring a face image of the target object;
determining a target image matched with the face image in the images of the target object by adopting a 1-to-N face searching method;
monitoring the target object according to the image information of the target image; the image information comprises an identification of a target host, a position of the target image and a time of the target image.
3. The method of claim 2, further comprising:
And playing the target image and marking the target face in the target image.
4. The method according to any one of claims 1-3, wherein the receiving the image of the target object sent by the host comprises:
sending a calling instruction to the host, wherein the calling instruction comprises the identification of the electronic tag corresponding to the target object and/or the target time;
and receiving the image of the target object of the host based on the calling instruction.
5. A target object monitoring method, the method comprising:
receiving a continuously updated search object list;
when detecting that the electronic tags in the searched object list appear in a searching range near the host through a short-distance communication module in the host, the host opens a camera to start shooting so as to shoot images of objects corresponding to the electronic tags in the searching range of the host, and a plurality of images corresponding to the searched object list are obtained; when detecting that the electronic tag in the search object list leaves a search range near the host, the host closes the camera to stop shooting;
sending the image of the target object to a server so that the server monitors the target object according to the image of the target object; the target object image is searched in the plurality of images according to the electronic tag of the target object, and one or more target object images corresponding to the electronic tag are obtained; or the image of the target object is an image corresponding to the electronic tag carried by the target object, which is found from the local images stored by the host.
6. The method of claim 5, wherein sending the image of the target object to a server comprises:
receiving a calling instruction sent by a server, wherein the calling instruction comprises an identification of an electronic tag corresponding to the target object and target time;
and sending the image of the target object based on the calling instruction to the server.
7. A target object monitoring apparatus, the apparatus comprising: the device comprises a first sending module, a first receiving module and a first processing module;
the first sending module is used for sending a continuously updated search object list, wherein the search object list is used for indicating a host to start shooting by opening a camera through a short-distance communication module in the host when detecting that an electronic tag in the search object list is present in a search range near the host, so as to shoot an image of an object corresponding to the electronic tag in the search range of the host and obtain a plurality of images corresponding to the search object list; when detecting that the electronic tag in the search object list leaves a search range near the host, the host closes the camera to stop shooting;
The first receiving module is used for receiving the image of the target object sent by the host; the target object image is searched in the plurality of images according to the electronic tag of the target object, and one or more target object images corresponding to the electronic tag are obtained; or the image of the target object is an image corresponding to the electronic tag carried by the target object, which is obtained by searching the local image stored in the host computer;
the first processing module is used for monitoring the target object according to the image of the target object.
8. A target object monitoring apparatus, the apparatus comprising: the device comprises a second receiving module, an obtaining module and a second processing module;
the second receiving module is used for receiving the continuously updated search object list;
the acquisition module is used for turning on a camera by the host to start shooting when detecting that the electronic tags in the searched object list appear in a searching range near the host through a short-distance communication module in the host, so as to shoot the images of the objects corresponding to the electronic tags in the searching range of the host and obtain a plurality of images corresponding to the searched object list; when detecting that the electronic tag in the search object list leaves a search range near the host, the host closes the camera to stop shooting;
The second processing module is used for sending the image of the target object to a server so that the server monitors the target object according to the image of the target object; the target object image is searched in the plurality of images according to the electronic tag of the target object, and one or more target object images corresponding to the electronic tag are obtained; or the image of the target object is an image corresponding to the electronic tag carried by the target object, which is obtained by searching the local image stored in the host.
9. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor when executing the computer program performs the steps of the method according to any of claims 1 to 6.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 6.
CN201811389604.4A 2018-11-21 2018-11-21 Target object monitoring method and device, computer equipment and storage medium Active CN109508769B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811389604.4A CN109508769B (en) 2018-11-21 2018-11-21 Target object monitoring method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811389604.4A CN109508769B (en) 2018-11-21 2018-11-21 Target object monitoring method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109508769A CN109508769A (en) 2019-03-22
CN109508769B true CN109508769B (en) 2022-06-28

Family

ID=65749279

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811389604.4A Active CN109508769B (en) 2018-11-21 2018-11-21 Target object monitoring method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109508769B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2733629A1 (en) * 2012-11-20 2014-05-21 Samsung Electronics Co., Ltd System for associating tag information with images supporting image feature search
CN108829764A (en) * 2018-05-28 2018-11-16 腾讯科技(深圳)有限公司 Recommendation information acquisition methods, device, system, server and storage medium

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006101028A (en) * 2004-09-28 2006-04-13 Hitachi Kokusai Electric Inc Supervisory system
US7765231B2 (en) * 2005-04-08 2010-07-27 Rathus Spencer A System and method for accessing electronic data via an image search engine
CN105488111A (en) * 2015-11-20 2016-04-13 小米科技有限责任公司 Image search method and device
CA2942396A1 (en) * 2015-11-24 2017-05-24 Via Capitale Image-based search engine
CN105913037A (en) * 2016-04-26 2016-08-31 广东技术师范学院 Face identification and radio frequency identification based monitoring and tracking system
CN107527075B (en) * 2016-06-20 2020-09-04 杭州海康威视数字技术股份有限公司 Method and device for establishing corresponding relation between RFID (radio frequency identification) tag and personnel and tracking track
CN106231265A (en) * 2016-08-15 2016-12-14 深圳市校联宝科技有限公司 A kind of image-pickup method and image capturing system
CN209002011U (en) * 2018-11-21 2019-06-18 广州万物信息科技股份有限公司 Monitoring system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2733629A1 (en) * 2012-11-20 2014-05-21 Samsung Electronics Co., Ltd System for associating tag information with images supporting image feature search
CN103838810A (en) * 2012-11-20 2014-06-04 三星电子株式会社 System for associating tag information with images supporting image feature search
CN108829764A (en) * 2018-05-28 2018-11-16 腾讯科技(深圳)有限公司 Recommendation information acquisition methods, device, system, server and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
个性化搜索中的用户特征模型研究;袁柳等;《计算机工程与应用》;20110521(第15期);23-28 *

Also Published As

Publication number Publication date
CN109508769A (en) 2019-03-22

Similar Documents

Publication Publication Date Title
US20210191979A1 (en) Distributed video storage and search with edge computing
WO2016015437A1 (en) Method, apparatus and device for generating picture search library and searching for picture
CN113034550B (en) Cross-mirror pedestrian trajectory tracking method, system, electronic device and storage medium
WO2016199662A1 (en) Image information processing system
US10848717B2 (en) Systems and methods for generating an audit trail for auditable devices
CN111354024B (en) Behavior prediction method of key target, AI server and storage medium
US11636562B2 (en) Systems and methods for processing recorded data for storage using computer-aided dispatch information
CN103824064A (en) Huge-amount human face discovering and recognizing method
CN111047622B (en) Method and device for matching objects in video, storage medium and electronic device
CN111160307A (en) Face recognition method and face recognition card punching system
CN112419120A (en) Group aggregation event early warning method, device and system and electronic equipment
CN111065044B (en) Big data based data association analysis method and device and computer storage medium
CN109508769B (en) Target object monitoring method and device, computer equipment and storage medium
CN111582024B (en) Video stream processing method, device, computer equipment and storage medium
CN111049838B (en) Black product equipment identification method and device, server and storage medium
CN105474233A (en) Method and platform for sending message to communication device associated with moving object
US11034020B2 (en) Systems and methods for enhanced review of automated robotic systems
CN110659376A (en) Picture searching method and device, computer equipment and storage medium
CN102496010A (en) Method for recognizing business cards by combining preview images and photographed images
JP7300958B2 (en) IMAGING DEVICE, CONTROL METHOD, AND COMPUTER PROGRAM
Pattem et al. Intelligent animal tracking system using internet of things and machine learning scheme
CN114266916A (en) Safety helmet wearing safety monitoring method and device, computer equipment and storage medium
US20180082126A1 (en) Systems and methods of providing content differentiation between thumbnails
CN114372843A (en) Riding station positioning method and device, mobile equipment and storage medium
CN115038145A (en) Information processing method, information processing device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant