CN111783594A - Alarm method and device and electronic equipment - Google Patents

Alarm method and device and electronic equipment Download PDF

Info

Publication number
CN111783594A
CN111783594A CN202010585095.3A CN202010585095A CN111783594A CN 111783594 A CN111783594 A CN 111783594A CN 202010585095 A CN202010585095 A CN 202010585095A CN 111783594 A CN111783594 A CN 111783594A
Authority
CN
China
Prior art keywords
image
face
information base
blacklist information
blacklist
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010585095.3A
Other languages
Chinese (zh)
Inventor
刘斌
姚靖威
梁莹莹
张晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Hikvision Digital Technology Co Ltd
Original Assignee
Hangzhou Hikvision Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Hikvision Digital Technology Co Ltd filed Critical Hangzhou Hikvision Digital Technology Co Ltd
Priority to CN202010585095.3A priority Critical patent/CN111783594A/en
Publication of CN111783594A publication Critical patent/CN111783594A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • G06V40/166Detection; Localisation; Normalisation using acquisition arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Image Analysis (AREA)
  • Alarm Systems (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The application provides an alarm method, an alarm device and electronic equipment, wherein the alarm method comprises the following steps: for each acquisition channel, when an image snapshot triggering event corresponding to the acquisition channel is detected, capturing an image; the captured image comprises a human face; matching the snapshot image with a face image in a locally stored blacklist information base, and checking whether the face image matched with the snapshot image exists in the blacklist information base or not; and if so, triggering alarm processing, wherein the alarm processing at least comprises sending the snapshot image and/or blacklist information related to the face image in the blacklist information base. By using the alarm method provided by the application, the efficiency of detecting the blacklist personnel can be improved.

Description

Alarm method and device and electronic equipment
Technical Field
The present application relates to the field of video monitoring, and in particular, to an alarm method, an alarm device, and an electronic device.
Background
The existing video monitoring technology generally comprises: the system comprises a front-end image acquisition device and a back-end device. The front-end image acquisition equipment sends the acquired face image to the back-end equipment, and the back-end equipment detects whether the face image hits the blacklist library or not, so that the monitoring of blacklist personnel is realized.
However, in practical applications, after the image acquisition device acquires the face image of the person in the current field of view, the face image needs to be sent to the back-end device, and the back-end device makes a decision on whether the person hits the blacklist library, so that the decision time is long, the decision efficiency is low, the person in the current field of view leaves, but the back-end device does not return a decision result, and the blacklist person passes the pass.
Disclosure of Invention
In view of this, the present application provides an alarm method, an alarm device, and an electronic device, so as to implement efficient detection of blacklist people and monitoring alarm.
Specifically, the method is realized through the following technical scheme:
according to a first aspect of the present application, there is provided an alarm method, which is applied to an image capture device, and includes:
for each acquisition channel, when an image snapshot triggering event corresponding to the acquisition channel is detected, capturing an image; the captured image comprises a human face;
matching the snapshot image with a face image in a locally stored blacklist information base, and checking whether the face image matched with the snapshot image exists in the blacklist information base or not;
and if so, triggering alarm processing, wherein the alarm processing at least comprises sending the snapshot image and/or blacklist information related to the face image in the blacklist information base.
Optionally, before matching the snapshot image with a face image in a locally stored blacklist information base, the method further includes:
acquiring the blacklist information base and encrypting the blacklist information base;
storing the encrypted blacklist information base to a specified storage medium of the image acquisition equipment;
when the image acquisition equipment is started, the encrypted face images in the blacklist information base are read from the specified storage medium, the read face images are decrypted by adopting a decryption key bound with the equipment, face modeling is carried out on the decrypted face images, and identity information is extracted.
Optionally, the checking whether the face image matched with the snapshot image exists in the blacklist information base includes:
carrying out face modeling on the snapshot image, and extracting target identity information;
calculating the similarity between the identity information and the target identity information aiming at the identity information corresponding to each face image in the blacklist information base, and if the similarity is greater than or equal to a set threshold value, determining that the blacklist information matched with the face exists in the stored blacklist information base;
and when the similarity between the identity information corresponding to each face image in the blacklist information base and the target identity information is smaller than a set threshold, determining that the stored blacklist information base does not have the blacklist information matched with the face.
Optionally, the triggering an alarm includes:
sending alarm information to a specified client; the alarm information includes at least one of: the snapshot image, the face image intercepted from the snapshot image and the blacklist information matched with the face in the blacklist information base.
Optionally, the matching the snapshot image with the face image in the locally stored blacklist information base includes:
splicing the captured images captured by the acquisition channel and other adjacent acquisition channels at the same time;
and matching the spliced snapshot image with a face image in a locally stored blacklist information base.
According to a second aspect of the present application, there is provided an alarm device, which is applied to an image capturing apparatus, including:
the snapshot unit is used for snapshotting an image when detecting an image snapshot triggering event corresponding to each acquisition channel; the captured image comprises a human face;
the checking unit is used for matching the snapshot image with a face image in a locally stored blacklist information base and checking whether the face image matched with the snapshot image exists in the blacklist information base or not;
and the triggering unit is used for triggering alarm processing if the face image exists, wherein the alarm processing at least comprises sending the snapshot image and/or blacklist information related to the face image in the blacklist information base.
Optionally, the apparatus further comprises:
the modeling unit is used for acquiring the blacklist information base and encrypting the blacklist information base; storing the encrypted blacklist information base to a specified storage medium of the image acquisition equipment; when the image acquisition equipment is started, the encrypted face images in the blacklist information base are read from the specified storage medium, the read face images are decrypted by adopting a decryption key bound with the equipment, face modeling is carried out on the decrypted face images, and identity information is extracted.
Optionally, the checking unit is configured to perform face modeling on the snapshot image and extract target identity information when checking whether the face image matched with the snapshot image exists in the blacklist information base; calculating the similarity between the identity information and the target identity information aiming at the identity information corresponding to each face image in the blacklist information base, and if the similarity is greater than or equal to a set threshold value, determining that the blacklist information matched with the face exists in the stored blacklist information base; and when the similarity between the identity information corresponding to each face image in the blacklist information base and the target identity information is smaller than a set threshold, determining that the stored blacklist information base does not have the blacklist information matched with the face.
Optionally, the checking unit is configured to splice captured images captured by the acquisition channel and other adjacent acquisition channels at the same time when the captured image is matched with a face image in a locally stored blacklist information base; and matching the spliced snapshot image with a face image in a locally stored blacklist information base.
According to a third aspect of the present application, there is provided an image acquisition apparatus, the apparatus comprising a readable storage medium and a processor;
wherein the readable storage medium is configured to store machine executable instructions;
the processor is used for reading the machine executable instructions on the readable storage medium and executing the instructions to realize the alarm method.
According to the above description, the blacklist information base is stored on the image acquisition equipment, the image acquisition equipment locally detects whether the person appearing in the monitoring area is the blacklist person, and the face image of the person in the monitoring area does not need to be sent to the background equipment for blacklist detection, so that the detection efficiency is greatly improved, the detection result can be timely given, and timely discovery and timely management of the blacklist person are realized.
Drawings
FIG. 1 is an architectural diagram illustrating one type of alarm networking according to an exemplary embodiment of the present application;
FIG. 2 is a schematic diagram of a multi-view camera in accordance with an exemplary embodiment of the present application;
FIG. 3 is a flow chart illustrating a method of alerting in accordance with an exemplary embodiment of the present application;
FIG. 4 is a block diagram of hardware of an image capture device according to an exemplary embodiment of the present application;
fig. 5 is a block diagram of an alarm device according to an exemplary embodiment of the present application.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present application. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
The application aims to provide an alarm method. In the application, the image acquisition equipment acquires a blacklist information base and stores the blacklist information base in a specified storage medium of the equipment; for each acquisition channel, when an image snapshot triggering event corresponding to the acquisition channel is detected, the image acquisition equipment shoots an image and checks whether blacklist information matched with the face in the snapshot image exists in a stored blacklist information base or not; if yes, triggering alarm processing.
According to the above description, on one hand, the blacklist information base is stored on the image acquisition equipment, the image acquisition equipment locally detects whether the person appearing in the monitoring area is the blacklist person, and the face image of the person in the monitoring area does not need to be sent to the background equipment for blacklist detection, so that the detection efficiency is greatly improved, the detection result can be timely given, and timely discovery and timely management of the blacklist person are realized.
On the other hand, before the blacklist information base is stored in the specified storage medium of the device, the image acquisition device encrypts the blacklist information in the blacklist information base. Even if the specified storage medium of the image acquisition equipment is lost, the blacklist personnel picture cannot be read out because other equipment cannot acquire the decryption key, so that the safety of personnel information is ensured.
Referring to FIG. 1, FIG. 1 is an architectural diagram illustrating an alarm networking according to an exemplary embodiment of the present application.
The alarm networking may include: the system comprises an image acquisition device and a specified client.
1) Image acquisition device
The image acquisition equipment is used for capturing images and detecting blacklist personnel locally.
The image acquisition device may be a monocular camera that may monitor a monitored area.
Of course, the image capturing device may also be a multi-view camera with multiple capturing channels that can monitor multiple monitored areas.
For example, as shown in fig. 2, the image capturing device may be a multi-view camera which is installed by 6-way image sensors at an interval of 60 degrees in pairs, has 6-way capturing channels, and can implement 360-degree panoramic monitoring. The multi-view camera is adopted for monitoring, so that monitoring of monitoring areas in multiple directions can be realized without replacing and erecting scenes.
Each path of acquisition channel of the multi-view camera is independent, the multi-view camera can open one acquisition channel to monitor the monitoring area corresponding to the acquisition channel, and can also open a plurality of acquisition channels to monitor the respective monitoring area through the plurality of acquisition channels. The multi-view camera is only exemplified here, and is not particularly limited.
Of course, in practical applications, the image capturing device may also be a binocular camera, a trinocular camera, etc., and the image capturing device is only exemplarily illustrated here and is not particularly limited.
2) Specifying a client
The designated client is a device for receiving the alarm information sent by the image acquisition device.
The specified client may include: computers, laptops, cell phones, tablets, etc., are merely illustrative of specific clients and are not specifically limited thereto.
In the implementation of the application, when the image acquisition equipment captures the image containing the face, whether the locally stored blacklist information base has the blacklist information matched with the face or not can be detected, and when the face is determined to be matched with the blacklist information, the alarm information is sent to the specified client side, so that the specified client side prompts a user to monitor the area for blacklist personnel, and the user can control the blacklist personnel in time.
The designated client corresponds to the alert scenario. For example, the alarm scenario is used to detect whether a blacklist person enters the cell, and the designated client is a client of a gatekeeper of the cell. For another example, the alarm scenario is to detect whether a criminal comes in or goes out of a defense area, and the specified client is a client of a police party, and the like. Here, the specific client is merely exemplified and not particularly limited. In addition, the present application is only an exemplary description of a scenario to which the present alarm method is applied, and the application scenario is not specifically limited.
Referring to fig. 3, fig. 3 is a flowchart illustrating an alarm method according to an exemplary embodiment of the present application, which may be applied to an image capturing apparatus and may include the following steps.
Step 301: for each acquisition channel, when an image snapshot triggering event corresponding to the acquisition channel is detected, capturing an image; the captured image includes a human face.
When the method is implemented, aiming at each acquisition channel, the image acquisition equipment can monitor the regional image of the monitoring region corresponding to the acquisition channel, and when the regional image has the face and the number of the pixels of the face is greater than the number of the preset pixels, the image acquisition equipment can determine to detect the image snapshot triggering event corresponding to the acquisition channel and snapshot the image. The captured image includes a human face.
The advantages of such a snapshot are: the image acquisition equipment is monitoring the image that contains the people's face to carry out the snapshot when the pixel quantity of people's face is greater than predetermined pixel quantity in the image, make the people's face enough big in the image of snapshot, enough clear, and then make the detection result that the blacklist personnel that go on based on the people's face in this image detect more accurate.
Step 302: and the image acquisition equipment matches the snapshot image with a face image in a locally stored blacklist information base, and checks whether the face image matched with the snapshot image exists in the blacklist information base or not.
Step 302 is described in detail below through step 3021 to step 3022.
Step 3021: and the image acquisition equipment matches the captured image with a face image in a locally stored blacklist information base.
In an alternative implementation manner, in the case that the image acquisition device is a monocular camera, the image acquisition device may directly match the captured image with a face image in a locally stored blacklist information base.
In an optional implementation manner, when the image acquisition device is a multi-view camera, if the sum of the visual field ranges of the acquisition channels of the image acquisition device is greater than 360 degrees, in other words, the visual field ranges of the acquisition channels can cover all directions, the faces in the images acquired by the acquisition channels are all complete faces, and the images captured by each acquisition channel can be directly matched with the face images in the locally stored blacklist information base.
In another alternative implementation manner, in the case that the image capturing device is a multi-view camera, if the sum of the visual field ranges of the capturing channels of the image capturing device is less than or equal to 360 degrees. In this case, it may occur that the face is not complete in the image acquired by one acquisition channel. Therefore, in order to ensure that the complete face is matched with the face image in the blacklist information base, the image acquisition equipment can splice the captured images of the acquisition channel and other acquisition channels adjacent to the acquisition channel at the same moment to obtain the complete face, and match the spliced captured images with the face image in the locally stored blacklist information base.
Specifically, for an image captured by each acquisition channel at a certain time, if other acquisition channels adjacent to the acquisition channel capture the image at the certain time, the image captured by the acquisition channel and the image captured by the other adjacent acquisition channels at the certain time are spliced.
For example, assume that the image acquisition device includes 3 acquisition channels, each acquisition channel corresponding to a field of view of 120 degrees. Assume that acquisition channel 2 acquires image 2 at time 1, acquisition channel 1 acquires image 1 at time 1, and acquisition channel 3 does not acquire an image at time 1. The image acquisition equipment can splice the image 2 and the image 1 acquired by the acquisition channel 1 adjacent to the acquisition channel 2, and match the spliced image with the face image in the blacklist information base.
Step 3022: and the image acquisition equipment checks whether the face image matched with the snapshot image exists in the blacklist information base or not.
Before describing step 3022, the obtaining of the blacklist information base is described.
When the blacklist information base is obtained, the user can import the blacklist information base into the image acquisition equipment. The blacklist information base stores blacklist information. The image acquisition equipment can receive the blacklist information base imported by the user so as to acquire the blacklist information base.
Of course, the user may also import the blacklist information base to other devices. When the image acquisition device acquires the blacklist information base, the image acquisition device can receive the blacklist information base sent by other devices. Or, the image acquisition device may send an acquisition request of the blacklist information base to other devices, and after receiving the acquisition request, the other devices may return the blacklist information base to the image acquisition device. The implementation of "acquiring the blacklist information base" is not specifically limited herein.
After the blacklist information base is obtained, the image acquisition device can store the blacklist information base in a specified medium of the device.
Optionally, in order to ensure the security of the blacklist information base, the image acquisition device may generate a pair of an encryption key and a decryption key bound to the image acquisition device, and then the image acquisition device may encrypt all the blacklist information in the blacklist information base by using the encryption key bound to the image acquisition device. After encryption, the blacklist image library is stored in a specified storage medium of the device.
It should be noted that: according to the method and the device, the image acquisition equipment encrypts the blacklist information by using the encryption key bound with the image acquisition equipment, and then stores the blacklist information base in the specified storage medium. Even if the designated storage medium is lost, other devices cannot acquire the decryption key bound with the device, so that the images in the blacklist image library cannot be read, and the safety of personnel information is guaranteed.
It should be further noted that the specified storage medium may be a TF (Trans-flash card) card of the image capturing device, or may be a solid-state storage medium (such as a solid-state hard disk) on the image capturing device. The specific storage medium is not specifically limited herein.
However, in practical applications, the cost of the solid-state storage medium is higher than that of the TF card, and may cause resource waste, and the TF card may have a capacity selected according to needs and may be replaced conveniently after being damaged, so the TF card is mostly used in practical applications.
After describing the obtaining of the blacklist information base, step 3022 is described below.
In an optional implementation manner of step 3022, the image capturing device may first model the face images in the blacklist information bases to extract identity information, and then match the identity information extracted from the snap image with the identity information corresponding to the face images in each blacklist information base.
Specifically, under the condition that the blacklist information base is not encrypted, the image acquisition device can model each face image in the blacklist information base when the image acquisition device is started, and extract the identity information of each face image.
Certainly, under the condition that the blacklist information base is encrypted, when the device is started, the image acquisition device can read the encrypted face images in the blacklist information base from the specified storage medium, decrypt the read face images by adopting the decryption key bound with the device, perform face modeling on the decrypted face images, and extract the identity information.
The identity information may be face feature information or other information indicating the identity of the user, and here, the identity information is only exemplarily described and is not specifically limited.
It should be noted that the decrypted face image can be stored in the memory, and the memory of the computer has good security, so that the security of the decrypted face image can be effectively ensured. Here, the storage location of the decrypted face image is merely exemplarily described, and is not particularly limited.
When checking whether the face image matched with the snapshot image exists in the blacklist information base, the image acquisition device may calculate the similarity between the identity information and the target identity information for the identity information corresponding to each face image in the blacklist information base, and if the similarity is greater than or equal to a set threshold, it is determined that the blacklist information matched with the face exists in the stored blacklist information base.
And if the similarity between the identity information corresponding to each face image in the blacklist information base and the target identity information is smaller than a set threshold, the image acquisition equipment determines that the blacklist information matched with the face does not exist in the stored blacklist information base.
For example, assume that the blacklist information base includes: an encrypted face image 1, an encrypted face image 2 and an encrypted face image 3. The face images 1 to 3 are encrypted by an encryption key bound to the image capturing device.
The image capturing apparatus can read the encrypted face image 1, the encrypted face image 2, and the encrypted face image 3 in the blacklist information base from a specified medium.
Then, the image acquisition device can use the decryption key bound with the device to respectively obtain the encrypted face image 1, the encrypted face image 2 and the encrypted face image 3 to obtain the face image 1, the face image 2 and the face image 3.
The image acquisition equipment can carry out face modeling on the face image 1 and extract the identity information 1. The image acquisition device can perform face modeling on the face image 2 and extract the identity information 2. The image acquisition device can perform face modeling on the face image 3 and extract the identity information 3.
When the image is captured, the image acquisition equipment can perform face modeling on the captured image and extract the target identity information. Then, the image acquisition device can calculate the similarity between the target identity information and the identity information 1, and if the calculated similarity is greater than a preset threshold value, the image acquisition device determines that blacklist information matched with the face in the snapshot image exists in a blacklist information base, and takes the face image 1 as the matched blacklist information.
Similarly, the image acquisition device may calculate the similarity between the target identity information and the identity information 2, and if the calculated similarity is greater than a preset threshold, it is determined that blacklist information matched with the face in the snapshot image exists in the blacklist information base, and the face image 2 is used as the matched blacklist information.
The image acquisition equipment can calculate the similarity between the target identity information and the identity information 3, and if the calculated similarity is greater than a preset threshold value, the image acquisition equipment determines that blacklist information matched with the face in the snapshot image exists in a blacklist information base, and takes the face image 3 as the matched blacklist information.
If the similarity between the identity information 1 and the target identity information is smaller than a preset threshold, the similarity between the identity information 2 and the target identity information is smaller than a preset threshold, and the similarity between the identity information 3 and the target identity information is smaller than a preset threshold, it is determined that the stored blacklist information base does not have the blacklist information matched with the human face.
The advantages of this detection method are: the image acquisition equipment extracts the identity information of each face image in the blacklist information base before the blacklist is detected, and can directly utilize the extracted identity information of each face image in the blacklist information base to detect when the blacklist is detected, and does not need to extract the face features of each face image in the blacklist information base to compare when the blacklist is detected every time, so that the efficiency of detecting the blacklist can be greatly improved.
Of course, in another alternative manner of implementing step 303, when checking whether the stored blacklist information base has the blacklist information matched with the face, the image acquisition device may perform face modeling on the captured image and extract the target identity information. Then, aiming at each face image in the blacklist information base, the image acquisition equipment can perform face modeling and identity information on the face image, and calculate the similarity between the extracted identity information and the target identity information. And if the calculated similarity is greater than or equal to a preset threshold value, determining that the stored blacklist information base has blacklist information matched with the face, and taking the face image as the blacklist information matched with the face in the snapshot image.
And if the similarity between the identity information corresponding to each face image in the blacklist information base and the target identity information is smaller than a preset threshold value, determining that the stored blacklist information base does not have the blacklist information matched with the face.
Step 303: if the face image exists, the image acquisition equipment triggers alarm processing, wherein the alarm processing at least comprises sending the snapshot image and/or blacklist information related to the face image in the blacklist information base.
When the method is implemented, the image acquisition equipment can send alarm information to a specified client. The alarm information may include: the face image is captured from the snapshot image.
Alternatively, the alarm information may include: the system comprises a snapshot image, a face image intercepted from the snapshot image and blacklist information matched with the face of the snapshot image in a blacklist information base.
Wherein the blacklist information includes: and the related information of the person corresponding to the matched face, such as the name, the gender, the age and the like of the person.
When sending the warning information, the image capturing apparatus may send the warning information in various ways. For example, the image capturing device may send the warning information to the specified client by means of a short message or an email, or, of course, the image capturing device may send the warning information to the specified client by means of a voice prompt. Here, the transmission of the warning information is merely an exemplary illustration, and is not particularly limited.
As can be seen from the above description, on one hand, the blacklist information base is stored in the image acquisition device, and the image acquisition device locally detects whether the person appearing in the monitoring area is the blacklist person, and does not need to send the face image of the person in the monitoring area to the background device for blacklist detection, so that the detection efficiency is greatly improved, the detection result can be timely given, and timely discovery and timely management of the blacklist person are realized.
On the other hand, before the blacklist information base is stored in the specified storage medium of the device, the image acquisition device encrypts the blacklist information in the blacklist information base. Even if the specified storage medium of the image acquisition equipment is lost, the blacklist personnel picture cannot be read out because other equipment cannot acquire the decryption key, so that the safety of personnel information is ensured.
In a third aspect, the image acquisition device in the present application may have a plurality of acquisition channels, and since each acquisition channel corresponds to one monitoring area, the total monitoring range of the image acquisition device in the present application is wider. In addition, the image acquisition equipment is adopted for monitoring, and monitoring of monitoring areas in multiple directions can be realized without replacing and erecting scenes.
Further, the present application provides an image acquisition device comprising a readable storage medium and a processor;
wherein the storage medium is readable for storing machine executable instructions;
and the processor is used for reading the machine executable instructions on the readable storage medium and executing the instructions to realize the step of alarming.
For example, referring to fig. 4, fig. 4 is a hardware structure diagram of an image capturing device according to an exemplary embodiment of the present application.
The image pickup apparatus includes: a communication interface 401, a processor 402, a machine-readable storage medium 403, and a bus 404; wherein the communication interface 401, the processor 402 and the machine-readable storage medium 403 communicate with each other via a bus 404. The processor 402 may perform the alarm method described above by reading and executing machine-executable instructions in the machine-readable storage medium 403 corresponding to the alarm control logic.
The machine-readable storage medium 403 referred to herein may be any electronic, magnetic, optical, or other physical storage device that can contain or store information such as executable instructions, data, and the like. For example, the machine-readable storage medium may be: volatile memory, non-volatile memory, or similar storage media. In particular, the machine-readable storage medium 403 may be a RAM (random Access Memory), a flash Memory, a storage drive (e.g., a hard disk drive), a solid state disk, any type of storage disk (e.g., a compact disk, a DVD, etc.), or similar storage medium, or a combination thereof.
In addition, the application provides an alarm device corresponding to the alarm method.
Referring to fig. 5, fig. 5 is a block diagram illustrating an alarm device according to an exemplary embodiment of the present application. The device is applied to image acquisition equipment, and comprises:
a capturing unit 501, configured to capture, for each acquisition channel, an image when an image capturing trigger event corresponding to the acquisition channel is detected; the captured image comprises a human face;
a checking unit 502, configured to match the snapshot image with a face image in a locally stored blacklist information base, and check whether a face image matched with the snapshot image exists in the blacklist information base;
a triggering unit 503, configured to trigger an alarm process if the face image exists, where the alarm process at least includes sending the snapshot image and/or blacklist information related to the face image in the blacklist information base.
Optionally, the apparatus further comprises:
a modeling unit 504, configured to obtain the blacklist information base and encrypt the blacklist information base; storing the encrypted blacklist information base to a specified storage medium of the image acquisition equipment; when the image acquisition equipment is started, the encrypted face images in the blacklist information base are read from the specified storage medium, the read face images are decrypted by adopting a decryption key bound with the equipment, face modeling is carried out on the decrypted face images, and identity information is extracted.
Optionally, the checking unit 502 is configured to perform face modeling on the snapshot image and extract target identity information when checking whether the face image matched with the snapshot image exists in the blacklist information base; calculating the similarity between the identity information and the target identity information aiming at the identity information corresponding to each face image in the blacklist information base, and if the similarity is greater than or equal to a set threshold value, determining that the blacklist information matched with the face exists in the stored blacklist information base; and when the similarity between the identity information corresponding to each face image in the blacklist information base and the target identity information is smaller than a set threshold, determining that the stored blacklist information base does not have the blacklist information matched with the face.
Optionally, the triggering unit 503 is configured to send alarm information to a specified client when triggering the alarm processing; the alarm information includes at least one of: the snapshot image, the face image intercepted from the snapshot image and the blacklist information matched with the face in the blacklist information base.
Optionally, the checking unit 502 is configured to splice captured images captured by the acquisition channel and other adjacent acquisition channels at the same time when the captured image is matched with a face image in a locally stored blacklist information base; and matching the spliced snapshot image with a face image in a locally stored blacklist information base.
The implementation process of the functions and actions of each unit in the above device is specifically described in the implementation process of the corresponding step in the above method, and is not described herein again.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the application. One of ordinary skill in the art can understand and implement it without inventive effort.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.

Claims (10)

1. An alarm method, which is applied to an image acquisition device, includes:
for each acquisition channel, when an image snapshot triggering event corresponding to the acquisition channel is detected, capturing an image; the captured image comprises a human face;
matching the snapshot image with a face image in a locally stored blacklist information base, and checking whether the face image matched with the snapshot image exists in the blacklist information base or not;
and if so, triggering alarm processing, wherein the alarm processing at least comprises sending the snapshot image and/or blacklist information related to the face image in the blacklist information base.
2. The method of claim 1, wherein prior to matching the snap-shot image with a face image in a locally stored blacklist information base, the method further comprises:
acquiring the blacklist information base and encrypting the blacklist information base;
storing the encrypted blacklist information base to a specified storage medium of the image acquisition equipment;
when the image acquisition equipment is started, the encrypted face images in the blacklist information base are read from the specified storage medium, the read face images are decrypted by adopting a decryption key bound with the equipment, face modeling is carried out on the decrypted face images, and identity information is extracted.
3. The method of claim 2, wherein the checking whether the face image matching the snapshot image exists in the blacklist information base comprises:
carrying out face modeling on the snapshot image, and extracting target identity information;
calculating the similarity between the identity information and the target identity information aiming at the identity information corresponding to each face image in the blacklist information base, and if the similarity is greater than or equal to a set threshold value, determining that the blacklist information matched with the face exists in the stored blacklist information base;
and when the similarity between the identity information corresponding to each face image in the blacklist information base and the target identity information is smaller than a set threshold, determining that the stored blacklist information base does not have the blacklist information matched with the face.
4. The method of claim 1, wherein triggering the alarm process comprises:
sending alarm information to a specified client; the alarm information includes at least one of: the snapshot image, the face image intercepted from the snapshot image and the blacklist information matched with the face in the blacklist information base.
5. The method of claim 1, wherein matching the snap-shot image with a face image in a locally stored blacklist information base comprises:
splicing the captured images captured by the acquisition channel and other adjacent acquisition channels at the same time;
and matching the spliced snapshot image with a face image in a locally stored blacklist information base.
6. An alarm device, wherein the device is applied to an image acquisition device, and comprises:
the snapshot unit is used for snapshotting an image when detecting an image snapshot triggering event corresponding to each acquisition channel; the captured image comprises a human face;
the checking unit is used for matching the snapshot image with a face image in a locally stored blacklist information base and checking whether the face image matched with the snapshot image exists in the blacklist information base or not;
and the triggering unit is used for triggering alarm processing if the face image exists, wherein the alarm processing at least comprises sending the snapshot image and/or blacklist information related to the face image in the blacklist information base.
7. The apparatus of claim 6, further comprising:
the modeling unit is used for acquiring the blacklist information base and encrypting the blacklist information base; storing the encrypted blacklist information base to a specified storage medium of the image acquisition equipment; when the image acquisition equipment is started, the encrypted face images in the blacklist information base are read from the specified storage medium, the read face images are decrypted by adopting a decryption key bound with the equipment, face modeling is carried out on the decrypted face images, and identity information is extracted.
8. The apparatus according to claim 7, wherein the checking unit, when checking whether the face image matching the snapshot image exists in the blacklist information base, is configured to perform face modeling on the snapshot image and extract target identity information; calculating the similarity between the identity information and the target identity information aiming at the identity information corresponding to each face image in the blacklist information base, and if the similarity is greater than or equal to a set threshold value, determining that the blacklist information matched with the face exists in the stored blacklist information base; and when the similarity between the identity information corresponding to each face image in the blacklist information base and the target identity information is smaller than a set threshold, determining that the stored blacklist information base does not have the blacklist information matched with the face.
9. The device according to claim 6, wherein the checking unit, when matching the snapshot image with the face image in the locally stored blacklist information base, is configured to splice the snapshot images captured by the acquisition channel and other adjacent acquisition channels at the same time; and matching the spliced snapshot image with a face image in a locally stored blacklist information base.
10. An image acquisition device, characterized in that the device comprises a readable storage medium and a processor;
wherein the readable storage medium is configured to store machine executable instructions;
the processor configured to read the machine executable instructions on the readable storage medium and execute the instructions to implement the steps of the method of any one of claims 1-5.
CN202010585095.3A 2020-06-23 2020-06-23 Alarm method and device and electronic equipment Pending CN111783594A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010585095.3A CN111783594A (en) 2020-06-23 2020-06-23 Alarm method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010585095.3A CN111783594A (en) 2020-06-23 2020-06-23 Alarm method and device and electronic equipment

Publications (1)

Publication Number Publication Date
CN111783594A true CN111783594A (en) 2020-10-16

Family

ID=72759690

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010585095.3A Pending CN111783594A (en) 2020-06-23 2020-06-23 Alarm method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN111783594A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117240998A (en) * 2023-11-15 2023-12-15 山东高速千方国际科技有限公司 Monitoring system and method for expressway

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005018178A (en) * 2003-06-24 2005-01-20 Hitachi Ltd Immigration inspection support system using face image
WO2010031213A1 (en) * 2008-09-16 2010-03-25 Chen Hong An intelligent personal authentication recognizing method and recognizing terminal thereof
US20150371420A1 (en) * 2014-06-19 2015-12-24 Samsung Electronics Co., Ltd. Systems and methods for extending a field of view of medical images
CN206164722U (en) * 2016-09-21 2017-05-10 深圳市泛海三江科技发展有限公司 Discuss super electronic monitoring system based on face identification
CN108399665A (en) * 2018-01-03 2018-08-14 平安科技(深圳)有限公司 Method for safety monitoring, device based on recognition of face and storage medium
CN109344588A (en) * 2018-09-03 2019-02-15 平安科技(深圳)有限公司 Safety certifying method and terminal device
CN109389793A (en) * 2018-10-16 2019-02-26 深圳众宝城贸易有限公司 A kind of super anti-theft monitoring system of quotient
CN110941991A (en) * 2019-10-28 2020-03-31 成都华迈通信技术有限公司 Multi-channel structured data acquisition system and data acquisition method
CN111147248A (en) * 2019-11-27 2020-05-12 北京旷视科技有限公司 Encrypted transmission method, device and system of face feature library and storage medium
CN111277575A (en) * 2020-01-14 2020-06-12 广州交通信息化建设投资营运有限公司 Driver identity recognition method and device, computer equipment and storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005018178A (en) * 2003-06-24 2005-01-20 Hitachi Ltd Immigration inspection support system using face image
WO2010031213A1 (en) * 2008-09-16 2010-03-25 Chen Hong An intelligent personal authentication recognizing method and recognizing terminal thereof
US20150371420A1 (en) * 2014-06-19 2015-12-24 Samsung Electronics Co., Ltd. Systems and methods for extending a field of view of medical images
CN206164722U (en) * 2016-09-21 2017-05-10 深圳市泛海三江科技发展有限公司 Discuss super electronic monitoring system based on face identification
CN108399665A (en) * 2018-01-03 2018-08-14 平安科技(深圳)有限公司 Method for safety monitoring, device based on recognition of face and storage medium
CN109344588A (en) * 2018-09-03 2019-02-15 平安科技(深圳)有限公司 Safety certifying method and terminal device
CN109389793A (en) * 2018-10-16 2019-02-26 深圳众宝城贸易有限公司 A kind of super anti-theft monitoring system of quotient
CN110941991A (en) * 2019-10-28 2020-03-31 成都华迈通信技术有限公司 Multi-channel structured data acquisition system and data acquisition method
CN111147248A (en) * 2019-11-27 2020-05-12 北京旷视科技有限公司 Encrypted transmission method, device and system of face feature library and storage medium
CN111277575A (en) * 2020-01-14 2020-06-12 广州交通信息化建设投资营运有限公司 Driver identity recognition method and device, computer equipment and storage medium

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
H. CHABANNE等: "A Verifiable System for Automated Face Identification", 《2016 INTERNATIONAL CONFERENCE OF THE BIOMETRICS SPECIAL INTEREST GROUP (BIOSIG)》, pages 1 - 5 *
张园等: "基于云平台的人脸识别技术现状及应用", 《云计算技术研究与应用》, no. 6, pages 62 - 64 *
石国兵: "《高校后勤管理信息化研究及实践》", 31 January 2018, 武汉大学出版社, pages: 88 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117240998A (en) * 2023-11-15 2023-12-15 山东高速千方国际科技有限公司 Monitoring system and method for expressway

Similar Documents

Publication Publication Date Title
US20170373859A1 (en) Cryptographic Signature System and Related Systems and Methods
KR101297295B1 (en) Security control system by face recognition
CN110516522B (en) Inspection method and system
US10204419B2 (en) Monitoring method and monitoring device
US10592727B2 (en) Apparatus for automated monitoring of facial images and a process therefor
CN104867217A (en) Community monitoring and management system
KR101058592B1 (en) System for auditing picture information abuse
KR102213839B1 (en) Method for preventing video falsification and apparatus therefor
KR102264275B1 (en) Violent behavior management system and method
CN107690051A (en) One kind alarm video recording method and device
CN115187439A (en) Comprehensive operation management method and system for intelligent park
Tiwari et al. Developing trends and challenges of digital forensics
CN112016526B (en) Behavior monitoring and analyzing system, method, device and equipment for site activity object
CN111783594A (en) Alarm method and device and electronic equipment
KR101897987B1 (en) Method, apparatus and system for managing electronic fingerprint of electronic file
KR101803963B1 (en) Image Recording Apparatus for Securing Admissibility of Evidence about Picked-up Image
US20160086480A1 (en) Crime evidence provider cum help seeker
CN110798656A (en) Method, device, medium and equipment for processing monitoring video file
KR102502105B1 (en) Method, Apparatus and System for Protecting Portrait Rights
KR101468407B1 (en) Digital forensic photographing device and digital forensic photographing system installed in car for preventing abuse of personal image information using the device
CN114338214A (en) Risk control method and system
CN210274298U (en) Robot body security system based on camera array image analysis
CN105959329B (en) High-definition video superposition processing system
KR102524271B1 (en) System and method for video integrity verification and original recovery based on Blockchain network
WO2020197431A1 (en) System for detecting, searching for, recognizing and recording a face

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination