CN112699270A - Monitoring security data transmission and storage method and system based on cloud computing, electronic equipment and computer storage medium - Google Patents

Monitoring security data transmission and storage method and system based on cloud computing, electronic equipment and computer storage medium Download PDF

Info

Publication number
CN112699270A
CN112699270A CN202011634999.7A CN202011634999A CN112699270A CN 112699270 A CN112699270 A CN 112699270A CN 202011634999 A CN202011634999 A CN 202011634999A CN 112699270 A CN112699270 A CN 112699270A
Authority
CN
China
Prior art keywords
video
monitoring
image
security
monitoring video
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202011634999.7A
Other languages
Chinese (zh)
Inventor
招明香
蒋安国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202011634999.7A priority Critical patent/CN112699270A/en
Publication of CN112699270A publication Critical patent/CN112699270A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/70Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F16/71Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/70Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F16/73Querying
    • G06F16/735Filtering based on additional data, e.g. user or group profiles
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/70Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F16/78Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/783Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
    • G06F16/7847Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content using low-level visual features of the video content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/40Extraction of image or video features
    • G06V10/44Local feature extraction by analysis of parts of the pattern, e.g. by detecting edges, contours, loops, corners, strokes or intersections; Connectivity analysis, e.g. of connected components
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/40Scenes; Scene-specific elements in video content
    • G06V20/46Extracting features or characteristics from the video content, e.g. video fingerprints, representative shots or key frames
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/40Scenes; Scene-specific elements in video content
    • G06V20/48Matching video sequences

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Library & Information Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Evolutionary Computation (AREA)
  • Evolutionary Biology (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Software Systems (AREA)
  • Artificial Intelligence (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computational Linguistics (AREA)
  • Closed-Circuit Television Systems (AREA)

Abstract

The invention discloses a monitoring security data transmission and storage method, a system, electronic equipment and a computer storage medium based on cloud computing, which are characterized in that a monitoring video is divided into monitoring video segments, images corresponding to video frames of the monitoring video segments are obtained, completely same video images in the monitoring video segments are processed and screened, simultaneously, mismatching areas of the video images reserved in the monitoring video segments and the video images reserved in other monitoring video segments are obtained through comparison, the similarity of the video images reserved in the monitoring video segments and the video images reserved in other monitoring video segments is calculated, the overall homogeneity of the monitoring video segments after comparison with other monitoring video segments is comprehensively analyzed, meanwhile, the comparison is carried out with a preset overall homogeneity threshold value, and the monitoring video segments after filtration in security monitoring data are counted, and storing is carried out, so that a large amount of storage space is saved, and the actual application requirements of users are met.

Description

Monitoring security data transmission and storage method and system based on cloud computing, electronic equipment and computer storage medium
Technical Field
The invention relates to the technical field of data transmission and storage, in particular to a monitoring security data transmission and storage method and system based on cloud computing, electronic equipment and a computer storage medium.
Background
Along with the rapid development of the internet of things technology, the intelligent security monitoring is widely applied to various industries, and the security monitoring terminal interacts with the cloud server to intelligently transmit and store security monitoring data, so that the convenience of the security monitoring data can be effectively improved.
However, the existing security monitoring data transmission and storage methods generally have some defects, most of the existing security monitoring data transmission and storage methods adopt manual management and storage, that is, a large amount of security monitoring videos are stored according to shooting time rules manually, so that the methods are simple and convenient, but a large amount of manpower, material resources and economic cost are wasted, and meanwhile, the existing security monitoring data transmission and storage methods cannot filter and delete videos with large homogeneity, so that a large amount of storage space is occupied, the use effect of watching the monitoring videos by users is influenced, the convenience of the security monitoring data is reduced, the actual application requirements of the users cannot be met, and in order to solve the problems, the monitoring security data transmission and storage methods, systems, electronic equipment and computer storage media based on cloud computing are designed.
Disclosure of Invention
The invention aims to provide a monitoring security data transmission and storage method, a system, electronic equipment and a computer storage medium based on cloud computing, wherein the monitoring video in the security monitoring data is divided into monitoring video segments, images corresponding to video frames of the monitoring video segments are obtained, the obtained video images of the monitoring video segments are processed, completely identical video images in the monitoring video segments are screened and deleted, simultaneously, the unmatched areas of the video images reserved in the monitoring video segments and the video images reserved in other monitoring video segments are obtained through comparison, the similarity of the video images reserved in the monitoring video segments and the video images reserved in other monitoring video segments is calculated, the overall similarity of the video images reserved in the monitoring video segments and the video images reserved in other monitoring video segments is comprehensively analyzed, meanwhile, the monitoring video segments are compared with a preset overall homogeneity threshold value, the filtered monitoring video segments in the security monitoring data are counted and stored, and the problems in the background technology are solved.
The purpose of the invention can be realized by the following technical scheme:
in a first aspect, the invention provides a monitoring security data transmission and storage method based on cloud computing, which comprises the following steps:
s1, dividing the monitoring video in the security monitoring data into monitoring video segments, and acquiring images corresponding to video frames of the monitoring video segments;
s2, processing the obtained video images of the monitoring video segments, and screening and deleting the completely same video images in the monitoring video segments;
s3, simultaneously comparing and obtaining the unmatched area of each video image reserved in each monitoring video segment and each video image reserved in other monitoring video segments;
s4, calculating the similarity of each video image reserved in each monitoring video segment after being compared with each video image reserved in other monitoring video segments, and comprehensively analyzing the overall similarity of each monitoring video segment after being compared with other monitoring video segments;
s5, comparing the collected data with a preset overall homogeneity threshold, counting each monitoring video segment filtered in the security monitoring data, and storing the monitoring video segments;
the monitoring security data transmission and storage method based on the cloud computing uses a monitoring security data transmission and storage system based on the cloud computing, and comprises a video dividing module, an image acquisition module, an image processing module, an image comparison module, a similarity analysis module, an analysis server and a storage database;
the analysis server is respectively connected with the image processing module, the image comparison module, the similarity analysis module and the storage database, the image acquisition module is respectively connected with the video division module and the image processing module, and the similarity analysis module is respectively connected with the image comparison module and the storage database;
the video dividing module is used for dividing monitoring videos in the security monitoring data, dividing the monitoring videos into a plurality of monitoring video segments with equal time length according to the time sequence of the monitoring videos, numbering the monitoring video segments according to the time sequence, wherein the numbers of the monitoring video segments are 1,2, 1, i, n, and sending the numbers of the monitoring video segments in the security monitoring data to the image acquisition module;
the image acquisition module is used for receiving the serial numbers of all monitoring video segments in the security monitoring data sent by the video dividing module, acquiring all video frames of all monitoring video segments in the security monitoring data, identifying images corresponding to all video frames of all monitoring video segments in the security monitoring data, counting all video images of all monitoring video segments in the security monitoring data, and forming all video image sets P of all monitoring video segments in the security monitoring dataiA(pia1,pia2,...,piaj,...,piam),piamSending the j-th video image which is represented as the ith monitoring video segment in the security monitoring data to an image processing module;
the image processing module is used for receiving each video image set of each monitoring video segment in the security monitoring data sent by the image obtaining module, performing normalization processing and enhancement processing on each video image of each monitoring video segment in the received security monitoring data, obtaining each video enhancement image of each monitoring video segment in the security monitoring data, and sending each video enhancement image of each monitoring video segment in the security monitoring data to the analysis server;
the analysis server is used for receiving each video enhanced image of each monitoring video segment in the security monitoring data sent by the image processing module, comparing each video enhanced image of each monitoring video segment in the received security monitoring data with each other video enhanced image of the monitoring video segment, if a certain video enhanced image of a certain monitoring video segment in the security monitoring data is completely matched with a certain other video enhanced image of the monitoring video segment, and the two video enhanced images of the monitored video segment which are compared are completely the same, keeping one completely same video enhanced image, and counting each monitoring video segment in the security monitoring dataEach video enhanced image reserved in the frequency band forms each video enhanced image set P 'reserved in each monitoring video band in the security monitoring data'iA(p′ia1,p′ia2,...,p′iaf,...,p′iak),k≤m,p′iafThe method comprises the steps of representing the f video enhanced image reserved in the ith monitoring video segment in security monitoring data, and sending each video enhanced image set reserved in each monitoring video segment in the security monitoring data to an image comparison module;
the image comparison module is used for receiving each video enhancement image set reserved in each monitoring video segment in the security monitoring data sent by the analysis server, comparing each video enhancement image reserved in each monitoring video segment in the received security monitoring data with each video enhancement image reserved in other monitoring video segments, extracting the unmatched area of each video enhancement image reserved in each monitoring video segment in the security monitoring data after being compared with each video enhancement image reserved in other monitoring video segments by adopting an edge contour extraction algorithm, counting the unmatched area S of each video enhancement image reserved in each monitoring video segment in the security monitoring data after being compared with each video enhancement image reserved in other monitoring video segments, and forming the unmatched area set S of each video enhancement image reserved in each monitoring segment in the security monitoring data after being compared with each video enhancement image reserved in other monitoring segments.inPx(sinpx 1,sinpx 2,...,sinpx f,...,sinpx k),k≤m,sinpx fThe area is represented as the mismatching area after the comparison between the f-th video enhanced image reserved in the ith monitoring video segment in the security monitoring data and the x-th video enhanced image reserved in the other nth monitoring video segment, wherein x is 1,2A module;
the similarity analysis module is used for receiving a mismatching area set obtained after comparing each video enhancement image reserved in each monitoring video segment in the security monitoring data sent by the image comparison module with each video enhancement image reserved in other monitoring video segments, extracting the standard total area of the normalized images stored in the storage database, calculating the similarity of each video enhancement image reserved in each monitoring video segment in the security monitoring data with each video enhancement image reserved in other monitoring video segments after comparison, and calculating the similarity of each video enhancement image reserved in each monitoring video segment in the security monitoring data after being compared with each video enhancement image reserved in other monitoring video segments, and forming a similarity set of each video enhancement image reserved in each monitoring video segment in the security monitoring data after being compared with each video enhancement image reserved in other monitoring video segments.
Figure BDA0002876032320000051
Figure BDA0002876032320000052
Representing the similarity of the f-th video enhanced image reserved in the ith monitoring video segment in the security monitoring data after being compared with the x-th video enhanced image reserved in the other nth monitoring video segment, and sending the similarity set of each video enhanced image reserved in each monitoring video segment in the security monitoring data after being compared with each video enhanced image reserved in each other monitoring video segment to an analysis server;
the analysis server is used for receiving a similarity set obtained by comparing each video enhancement image reserved in each monitoring video segment in the security monitoring data sent by the similarity analysis module with each video enhancement image reserved in each other monitoring video segment, calculating the overall similarity after each monitoring video segment in the security monitoring data is compared with each other monitoring video segment, counting the overall similarity after each monitoring video segment in the security monitoring data is compared with each other monitoring video segment, comparing the overall similarity after each monitoring video segment in the security monitoring data is compared with each other monitoring video segment with a preset overall similarity threshold, and if the overall similarity after a certain monitoring video segment in the security monitoring data is compared with a certain other monitoring video segment is larger than or equal to the preset overall similarity threshold, indicating that the monitoring video segment in the security monitoring data is identical with the other monitoring video segment, filtering one of the monitoring video segments, counting the filtered monitoring video segments in the security monitoring data, and sending the filtered monitoring video segments in the security monitoring data to a storage database;
the storage database is used for receiving and storing each monitoring video segment after filtering in the monitoring prevention data sent by the analysis server, and simultaneously storing the standard total area s of the image after normalization processingSign board
In a possible design of the first aspect, the normalization processing is configured to change each video image of each monitoring video segment in the security monitoring data into an image with a consistent size and without a declination; the enhancement processing is used for enhancing the high-frequency components of the video images of the monitoring video segments after the processing.
In one possible design of the first aspect, the edge contour extraction algorithm includes the following steps:
h1, preprocessing the compared image, and performing smooth filtering processing by adopting a small two-dimensional Gaussian template to remove image noise;
h2, simultaneously carrying out edge detection processing on the smoothed image to obtain a primary edge response image;
h3, performing refinement processing on the edge response image by adopting a non-maximum suppression method to obtain a single-pixel edge image;
h4, simultaneously, carrying out binarization processing based on a hysteresis threshold on the one-way pixel edge image to obtain a continuous edge contour image, and extracting the unmatched area of the edge contour image through a recursive tracking algorithm.
In a possible design of the first aspect, each video enhanced image retained in each monitoring video segment in the security monitoring data is compared with each video enhanced image retained in each other monitoring video segmentThe subsequent similarity calculation formula is
Figure BDA0002876032320000061
Figure BDA0002876032320000062
The similarity is expressed after the f-th video enhanced image reserved in the ith monitoring video segment in the security monitoring data is compared with the x-th video enhanced image reserved in the other nth monitoring video segment, wherein x is 1,2inpx fExpressed as the mismatching area s after the comparison between the f-th video enhanced image reserved in the ith monitoring video segment in the security monitoring data and the x-th video enhanced image reserved in the other nth monitoring video segmentSign boardExpressed as the standard total area of the normalized image.
In a possible design of the first aspect, the calculation formula of the total homogeneity of each monitoring video segment in the security monitoring data after being compared with other monitoring video segments is
Figure BDA0002876032320000063
Figure BDA0002876032320000064
Expressed as the overall homogeneity degree of the ith monitoring video segment in the security monitoring data after being compared with other nth monitoring video segments,
Figure BDA0002876032320000071
the similarity of the f-th video enhanced image reserved in the ith monitoring video segment in the security monitoring data and the x-th video enhanced image reserved in the other nth monitoring video segment is expressed, wherein x is 1, 2.
In a second aspect, the present invention also provides an electronic device comprising: the system comprises a processor, a memory and a network interface, wherein the memory and the network interface are connected with the processor; the network interface is connected with a nonvolatile memory in the server; the processor retrieves the computer program from the non-volatile memory through the network interface when running, and runs the computer program through the memory to execute the method of the present invention.
In a third aspect, the present invention further provides a readable storage medium applied to a computer, where a computer program is burned in the readable storage medium, and when the computer program runs in a memory of a server, the method of the present invention is implemented.
Has the advantages that:
(1) the invention provides a monitoring security data transmission and storage method based on cloud computing, a system, electronic equipment and a computer storage medium, by dividing the monitoring video in the security monitoring data into monitoring video segments, obtaining the image corresponding to each video frame of each monitoring video segment, processing the obtained video images of the monitoring video segments, screening and deleting the completely same video images in the monitoring video segments, therefore, a large amount of storage space is saved, the convenience of security monitoring data is improved, meanwhile, the mismatch area of each video image reserved in each monitoring video segment after being compared with each video image reserved in other monitoring video segments is obtained through comparison, the similarity of each video image reserved in each monitoring video segment after being compared with each video image reserved in other monitoring video segments is calculated, and reliable reference data are provided for analyzing the overall similarity of each monitoring video segment after being compared with other monitoring video segments in the later period.
(2) According to the invention, the overall homogeneity degree of each monitoring video segment after being compared with other monitoring video segments is comprehensively analyzed and compared with the preset overall homogeneity degree threshold value, and each monitoring video segment after being filtered in the security monitoring data is counted and stored at the same time, so that a large amount of manpower, material resources and economic cost are saved, the storage space of the security monitoring data is reasonably utilized, the problem of influencing the use effect of watching the monitoring video by a user is avoided, and the actual application requirements of the user are met.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flow chart of the method steps of the present invention;
fig. 2 is a schematic view of a module connection structure according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, a first aspect of the present invention provides a monitoring security data transmission and storage method based on cloud computing, including the following steps:
s1, dividing the monitoring video in the security monitoring data into monitoring video segments, and acquiring images corresponding to video frames of the monitoring video segments;
s2, processing the obtained video images of the monitoring video segments, and screening and deleting the completely same video images in the monitoring video segments;
s3, simultaneously comparing and obtaining the unmatched area of each video image reserved in each monitoring video segment and each video image reserved in other monitoring video segments;
s4, calculating the similarity of each video image reserved in each monitoring video segment after being compared with each video image reserved in other monitoring video segments, and comprehensively analyzing the overall similarity of each monitoring video segment after being compared with other monitoring video segments;
s5, comparing the collected data with a preset overall homogeneity threshold, counting each monitoring video segment filtered in the security monitoring data, and storing the monitoring video segments;
the monitoring security data transmission and storage method based on the cloud computing uses a monitoring security data transmission and storage system based on the cloud computing, and comprises a video dividing module, an image acquisition module, an image processing module, an image comparison module, a similarity analysis module, an analysis server and a storage database.
The analysis server is respectively connected with the image processing module, the image comparison module, the similarity analysis module and the storage database, the image acquisition module is respectively connected with the video division module and the image processing module, and the similarity analysis module is respectively connected with the image comparison module and the storage database.
The video dividing module is used for dividing monitoring videos in the security monitoring data, dividing the monitoring videos into a plurality of monitoring video segments with equal time length according to the time sequence of the monitoring videos, numbering the monitoring video segments according to the time sequence, wherein the numbers of the monitoring video segments are respectively 1,2, 1, i, n, and sending the numbers of the monitoring video segments in the security monitoring data to the image acquisition module.
The image acquisition module is used for receiving the serial numbers of all monitoring video segments in the security monitoring data sent by the video dividing module, acquiring all video frames of all monitoring video segments in the security monitoring data, identifying images corresponding to all video frames of all monitoring video segments in the security monitoring data, counting all video images of all monitoring video segments in the security monitoring data, and forming all video image sets P of all monitoring video segments in the security monitoring dataiA(pia1,pia2,...,piaj,...,piam),piamAnd sending the j-th video image expressed as the ith monitoring video segment in the security monitoring data to the image processing module.
The image processing module is used for receiving each video image set of each monitoring video segment in the security monitoring data sent by the image obtaining module, performing normalization processing and enhancement processing on each video image of each monitoring video segment in the received security monitoring data, obtaining each video enhancement image of each monitoring video segment in the security monitoring data, and sending each video enhancement image of each monitoring video segment in the security monitoring data to the analysis server;
the normalization processing is used for changing all video images of all monitoring video segments in the security monitoring data into images which are consistent in size and have no deflection angle; the enhancement processing is used for enhancing the high-frequency components of the video images of the monitoring video segments after the processing.
The analysis server is used for receiving each video enhanced image of each monitoring video segment in the security monitoring data sent by the image processing module, comparing each video enhanced image of each monitoring video segment in the received security monitoring data with each other video enhanced image of the monitoring video segment, if a certain video enhanced image of a certain monitoring video segment in the security monitoring data is completely matched with a certain other video enhanced image of the monitoring video segment, indicating that the two video enhanced images of the monitoring video segment which are compared are completely the same, keeping one completely same video enhanced image, therefore, a large amount of storage space is saved, the convenience of security monitoring data is improved, the video enhancement images reserved in the monitoring video segments in the security monitoring data are counted, and the video enhancement image sets P' reserved in the monitoring video segments in the security monitoring data are formed.iA(p′ia1,p′ia2,...,p′iaf,...,p′iak),k≤m,p′iafAnd the f video enhanced image which is reserved in the ith monitoring video segment in the security monitoring data is represented, and each video enhanced image set reserved in each monitoring video segment in the security monitoring data is sent to the image comparison module.
The image comparison module is used for receiving each video enhancement image set reserved in each monitoring video segment in the security monitoring data sent by the analysis server, comparing each video enhancement image reserved in each monitoring video segment in the received security monitoring data with each video enhancement image reserved in other monitoring video segments, and adopting an edge wheelThe contour extraction algorithm extracts the mismatch area of each video enhancement image reserved in each monitoring video segment in the security monitoring data after being compared with each video enhancement image reserved in each other monitoring video segment, the mismatch area of each video enhancement image reserved in each monitoring video segment in the security monitoring data after being compared with each video enhancement image reserved in each other monitoring video segment is counted, and a mismatch area set S of each video enhancement image reserved in each monitoring video segment in the security monitoring data after being compared with each video enhancement image reserved in each other monitoring video segment in the security monitoring data after being compared is formedinPx(sinpx 1,sinpx 2,...,sinpx f,...,sinpx k),k≤m,sinpx fThe method comprises the steps that the mismatching area of an f-th video enhanced image reserved in an ith monitoring video segment in security monitoring data after being compared with an x-th video enhanced image reserved in other nth monitoring video segments is represented, wherein x is 1,2,.
The edge contour extraction algorithm comprises the following steps:
h1, preprocessing the compared image, and performing smooth filtering processing by adopting a small two-dimensional Gaussian template to remove image noise;
h2, simultaneously carrying out edge detection processing on the smoothed image to obtain a primary edge response image;
h3, performing refinement processing on the edge response image by adopting a non-maximum suppression method to obtain a single-pixel edge image;
h4, simultaneously, carrying out binarization processing based on a hysteresis threshold on the one-way pixel edge image to obtain a continuous edge contour image, and extracting the unmatched area of the edge contour image through a recursive tracking algorithm.
The similarity analysis module is used for receiving security monitoring data sent by the image contrast moduleThe unmatched area set after the contrast of each video enhancement image reserved in each monitoring video segment and each video enhancement image reserved in other monitoring video segments is extracted, the standard total area of the normalized images stored in the storage database is extracted, and the similarity of each video enhancement image reserved in each monitoring video segment in the security monitoring data and each video enhancement image reserved in other monitoring video segments after the contrast is calculated
Figure BDA0002876032320000121
Figure BDA0002876032320000122
The similarity is expressed after the f-th video enhanced image reserved in the ith monitoring video segment in the security monitoring data is compared with the x-th video enhanced image reserved in the other nth monitoring video segment, wherein x is 1,2inpx fExpressed as the mismatching area s after the comparison between the f-th video enhanced image reserved in the ith monitoring video segment in the security monitoring data and the x-th video enhanced image reserved in the other nth monitoring video segmentSign boardExpressing the standard total area of the images after normalization processing, and counting the similarity of each video enhanced image reserved in each monitoring video segment in the security monitoring data after being compared with each video enhanced image reserved in other monitoring video segments to form a similarity set after each video enhanced image reserved in each monitoring video segment in the security monitoring data is compared with each video enhanced image reserved in other monitoring video segments
Figure BDA0002876032320000123
Figure BDA0002876032320000124
Representing the similarity of the f video enhanced image reserved in the ith monitoring video segment in the security monitoring data after being compared with the x video enhanced image reserved in the other nth monitoring video segment, and providing reliability for analyzing the overall similarity of each monitoring video segment after being compared with each other monitoring video segment in the later periodAnd sending the similarity set obtained by comparing each video enhanced image reserved in each monitoring video segment in the security monitoring data with each video enhanced image reserved in other monitoring video segments to an analysis server.
The analysis server is used for receiving a similarity set obtained by comparing each video enhancement image reserved in each monitoring video segment in the security monitoring data sent by the similarity analysis module with each video enhancement image reserved in each other monitoring video segment, and calculating the overall similarity of each monitoring video segment in the security monitoring data after being compared with each other monitoring video segment
Figure BDA0002876032320000125
Figure BDA0002876032320000126
Expressed as the overall homogeneity degree of the ith monitoring video segment in the security monitoring data after being compared with other nth monitoring video segments,
Figure BDA0002876032320000127
representing the similarity after comparing the f-th video enhanced image reserved in the ith monitoring video segment in the security monitoring data with the x-th video enhanced image reserved in the other nth monitoring video segment, wherein x is 1,2,. If the monitoring video segment in the security monitoring data is identical to the other monitoring video segments, filtering one of the monitoring video segments, and counting the filtered monitors in the security monitoring dataAnd the control video frequency segments send each monitoring video frequency segment after filtering in the security monitoring data to the storage database.
The storage database is used for receiving and storing each monitoring video segment after filtering in the monitoring-preventing data sent by the analysis server, so that a large amount of manpower, material resources and economic cost are saved, the storage space of the security monitoring data is reasonably used, the problem that the use effect of watching the monitoring video by a user is influenced is avoided, the actual application requirement of the user is met, and the standard total area s of the image after normalization processing is storedSign board
In a second aspect, the present invention also provides an electronic device comprising: the system comprises a processor, a memory and a network interface, wherein the memory and the network interface are connected with the processor; the network interface is connected with a nonvolatile memory in the server; the processor retrieves the computer program from the non-volatile memory through the network interface when running, and runs the computer program through the memory to execute the method of the present invention.
In a third aspect, the present invention further provides a readable storage medium applied to a computer, where a computer program is burned in the readable storage medium, and when the computer program runs in a memory of a server, the method of the present invention is implemented.
The foregoing is merely exemplary and illustrative of the principles of the present invention and various modifications, additions and substitutions of the specific embodiments described herein may be made by those skilled in the art without departing from the principles of the present invention or exceeding the scope of the claims set forth herein.

Claims (7)

1. Monitoring security data transmission and storage method based on cloud computing is characterized in that: the method comprises the following steps:
s1, dividing the monitoring video in the security monitoring data into monitoring video segments, and acquiring images corresponding to video frames of the monitoring video segments;
s2, processing the obtained video images of the monitoring video segments, and screening and deleting the completely same video images in the monitoring video segments;
s3, simultaneously comparing and obtaining the unmatched area of each video image reserved in each monitoring video segment and each video image reserved in other monitoring video segments;
s4, calculating the similarity of each video image reserved in each monitoring video segment after being compared with each video image reserved in other monitoring video segments, and comprehensively analyzing the overall similarity of each monitoring video segment after being compared with other monitoring video segments;
s5, comparing the collected data with a preset overall homogeneity threshold, counting each monitoring video segment filtered in the security monitoring data, and storing the monitoring video segments;
the monitoring security data transmission and storage method based on the cloud computing uses a monitoring security data transmission and storage system based on the cloud computing, and comprises a video dividing module, an image acquisition module, an image processing module, an image comparison module, a similarity analysis module, an analysis server and a storage database;
the analysis server is respectively connected with the image processing module, the image comparison module, the similarity analysis module and the storage database, the image acquisition module is respectively connected with the video division module and the image processing module, and the similarity analysis module is respectively connected with the image comparison module and the storage database;
the video dividing module is used for dividing monitoring videos in the security monitoring data, dividing the monitoring videos into a plurality of monitoring video segments with equal time length according to the time sequence of the monitoring videos, numbering the monitoring video segments according to the time sequence, wherein the numbers of the monitoring video segments are 1,2, 1, i, n, and sending the numbers of the monitoring video segments in the security monitoring data to the image acquisition module;
the image acquisition module is used for receiving the serial numbers of all monitoring video segments in the security monitoring data sent by the video dividing module, acquiring all video frames of all monitoring video segments in the security monitoring data, identifying images corresponding to all video frames of all monitoring video segments in the security monitoring data, and counting all video images of all monitoring video segments in the security monitoring dataForming each video image set P of each monitoring video segment in the security monitoring dataiA(pia1,pia2,...,piaj,...,piam),piamSending the j-th video image which is represented as the ith monitoring video segment in the security monitoring data to an image processing module;
the image processing module is used for receiving each video image set of each monitoring video segment in the security monitoring data sent by the image obtaining module, performing normalization processing and enhancement processing on each video image of each monitoring video segment in the received security monitoring data, obtaining each video enhancement image of each monitoring video segment in the security monitoring data, and sending each video enhancement image of each monitoring video segment in the security monitoring data to the analysis server;
the analysis server is used for receiving each video enhanced image of each monitoring video segment in the security monitoring data sent by the image processing module, comparing each video enhanced image of each monitoring video segment in the received security monitoring data with each other video enhanced image of the monitoring video segment, if a certain video enhanced image of a certain monitoring video segment in the security monitoring data is completely matched with a certain other video enhanced image of the monitoring video segment, and the two video enhanced images of the monitored video segment which are compared are completely the same, keeping one completely same video enhanced image, counting each video enhanced image reserved in each monitoring video segment in the security monitoring data, and forming each video enhanced image set P reserved in each monitoring video segment in the security monitoring datai′A(p′ia1,p′ia2,...,p′iaf,...,p′iak),k≤m,p′iafThe method comprises the steps of representing the f video enhanced image reserved in the ith monitoring video segment in security monitoring data, and sending each video enhanced image set reserved in each monitoring video segment in the security monitoring data to an image comparison module;
the image comparison module is used for receiving the security sent by the analysis serverThe method comprises the steps of preventing each video enhancement image set reserved in each monitoring video segment in monitoring data, comparing each video enhancement image reserved in each monitoring video segment in received security monitoring data with each video enhancement image reserved in other monitoring video segments, extracting the unmatched area of each video enhancement image reserved in each monitoring video segment in the security monitoring data after being compared with each video enhancement image reserved in other monitoring video segments by adopting an edge contour extraction algorithm, counting the unmatched area of each video enhancement image reserved in each monitoring video segment in the security monitoring data after being compared with each video enhancement image reserved in other monitoring video segments, and forming the unmatched area set S of each video enhancement image reserved in each monitoring video segment in the security monitoring data after being compared with each video enhancement image reserved in other monitoring video segments.inPx(sinpx 1,sinpx 2,...,sinpx f,...,sinpx k),k≤m,sinpx fThe method comprises the steps that the mismatching area of an f-th video enhanced image reserved in an ith monitoring video segment in security monitoring data after being compared with an x-th video enhanced image reserved in other nth monitoring video segments is represented, wherein x is 1,2,.
The similarity analysis module is used for receiving a mismatching area set obtained after comparing each video enhancement image reserved in each monitoring video segment in the security monitoring data sent by the image comparison module with each video enhancement image reserved in other monitoring video segments, extracting the standard total area of the images stored in the storage database after normalization processing, calculating the similarity of each video enhancement image reserved in each monitoring video segment in the security monitoring data and each video enhancement image reserved in other monitoring video segments after comparison, and counting each video enhancement image reserved in each monitoring video segment in the security monitoring data and each video enhancement image reserved in other monitoring video segmentsThe similarity of each video enhancement image reserved in each monitoring video segment after being compared forms a similarity set of each video enhancement image reserved in each monitoring video segment in the security monitoring data after being compared with each video enhancement image reserved in each other monitoring video segment
Figure FDA0002876032310000031
Figure FDA0002876032310000032
Representing the similarity of the f-th video enhanced image reserved in the ith monitoring video segment in the security monitoring data after being compared with the x-th video enhanced image reserved in the other nth monitoring video segment, and sending the similarity set of each video enhanced image reserved in each monitoring video segment in the security monitoring data after being compared with each video enhanced image reserved in each other monitoring video segment to an analysis server;
the analysis server is used for receiving a similarity set obtained by comparing each video enhancement image reserved in each monitoring video segment in the security monitoring data sent by the similarity analysis module with each video enhancement image reserved in each other monitoring video segment, calculating the overall similarity after each monitoring video segment in the security monitoring data is compared with each other monitoring video segment, counting the overall similarity after each monitoring video segment in the security monitoring data is compared with each other monitoring video segment, comparing the overall similarity after each monitoring video segment in the security monitoring data is compared with each other monitoring video segment with a preset overall similarity threshold, and if the overall similarity after a certain monitoring video segment in the security monitoring data is compared with a certain other monitoring video segment is larger than or equal to the preset overall similarity threshold, indicating that the monitoring video segment in the security monitoring data is identical with the other monitoring video segment, filtering one of the monitoring video segments, counting the filtered monitoring video segments in the security monitoring data, and sending the filtered monitoring video segments in the security monitoring data to a storage database;
the storage database is used for receiving the monitoring prevention number sent by the analysis serverFiltering each monitoring video segment according to the data, storing the monitoring video segments, and storing the standard total area s of the images after normalization processingSign board
2. The monitoring security data transmission and storage method based on the cloud computing is characterized in that: the normalization processing is used for changing all video images of all monitoring video segments in the security monitoring data into images which are consistent in size and have no deflection angle; the enhancement processing is used for enhancing the high-frequency components of the video images of the monitoring video segments after the processing.
3. The monitoring security data transmission and storage method based on the cloud computing is characterized in that: the edge contour extraction algorithm comprises the following steps:
h1, preprocessing the compared image, and performing smooth filtering processing by adopting a small two-dimensional Gaussian template to remove image noise;
h2, simultaneously carrying out edge detection processing on the smoothed image to obtain a primary edge response image;
h3, performing refinement processing on the edge response image by adopting a non-maximum suppression method to obtain a single-pixel edge image;
h4, simultaneously, carrying out binarization processing based on a hysteresis threshold on the one-way pixel edge image to obtain a continuous edge contour image, and extracting the unmatched area of the edge contour image through a recursive tracking algorithm.
4. The monitoring security data transmission and storage method based on the cloud computing is characterized in that: the similarity calculation formula after comparing each video enhancement image reserved in each monitoring video segment in the security monitoring data with each video enhancement image reserved in other monitoring video segments is
Figure FDA0002876032310000051
Figure FDA0002876032310000052
The similarity is expressed after the f-th video enhanced image reserved in the ith monitoring video segment in the security monitoring data is compared with the x-th video enhanced image reserved in the other nth monitoring video segment, wherein x is 1,2inpx fExpressed as the mismatching area s after the comparison between the f-th video enhanced image reserved in the ith monitoring video segment in the security monitoring data and the x-th video enhanced image reserved in the other nth monitoring video segmentSign boardExpressed as the standard total area of the normalized image.
5. The monitoring security data transmission and storage method based on the cloud computing is characterized in that: the total homogeneity calculation formula after comparing each monitoring video segment in the security monitoring data with each other monitoring video segment is
Figure FDA0002876032310000053
Figure FDA0002876032310000054
Expressed as the overall homogeneity degree of the ith monitoring video segment in the security monitoring data after being compared with other nth monitoring video segments,
Figure FDA0002876032310000055
the similarity of the f-th video enhanced image reserved in the ith monitoring video segment in the security monitoring data and the x-th video enhanced image reserved in the other nth monitoring video segment is expressed, wherein x is 1, 2.
6. An electronic device, characterized in that: the method comprises the following steps: the system comprises a processor, a memory and a network interface, wherein the memory and the network interface are connected with the processor; the network interface is connected with a nonvolatile memory in the server; the processor, when running, retrieves a computer program from the non-volatile memory via the network interface and runs the computer program via the memory to perform the method of any of claims 1-5.
7. A readable storage medium applied to a computer, characterized in that: the readable storage medium is burned with a computer program that, when run in the memory of the server, implements the method of any of the above claims 1-5.
CN202011634999.7A 2020-12-31 2020-12-31 Monitoring security data transmission and storage method and system based on cloud computing, electronic equipment and computer storage medium Withdrawn CN112699270A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011634999.7A CN112699270A (en) 2020-12-31 2020-12-31 Monitoring security data transmission and storage method and system based on cloud computing, electronic equipment and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011634999.7A CN112699270A (en) 2020-12-31 2020-12-31 Monitoring security data transmission and storage method and system based on cloud computing, electronic equipment and computer storage medium

Publications (1)

Publication Number Publication Date
CN112699270A true CN112699270A (en) 2021-04-23

Family

ID=75513764

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011634999.7A Withdrawn CN112699270A (en) 2020-12-31 2020-12-31 Monitoring security data transmission and storage method and system based on cloud computing, electronic equipment and computer storage medium

Country Status (1)

Country Link
CN (1) CN112699270A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113507611A (en) * 2021-09-09 2021-10-15 深圳思谋信息科技有限公司 Image storage method and device, computer equipment and storage medium
CN115861905A (en) * 2023-03-01 2023-03-28 青岛警友大象科技有限公司 Hotel management system based on Internet of things

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113507611A (en) * 2021-09-09 2021-10-15 深圳思谋信息科技有限公司 Image storage method and device, computer equipment and storage medium
CN115861905A (en) * 2023-03-01 2023-03-28 青岛警友大象科技有限公司 Hotel management system based on Internet of things

Similar Documents

Publication Publication Date Title
Asghar et al. Copy-move and splicing image forgery detection and localization techniques: a review
WO2017000716A2 (en) Image management method and device, and terminal device
CN108228696B (en) Face image retrieval method and system, shooting device and computer storage medium
US8842889B1 (en) System and method for automatic face recognition
CN109255752B (en) Image self-adaptive compression method, device, terminal and storage medium
CN112699270A (en) Monitoring security data transmission and storage method and system based on cloud computing, electronic equipment and computer storage medium
CN115661669B (en) Method and system for monitoring illegal farmland occupancy based on video monitoring
CN114169381A (en) Image annotation method and device, terminal equipment and storage medium
WO2023082453A1 (en) Image processing method and device
CN110378328B (en) certificate image processing method and device
CN111783743A (en) Image clustering method and device
Zhao et al. Automatic blur region segmentation approach using image matting
Tripathy Detection of cotton leaf disease using image processing techniques
CN110895811B (en) Image tampering detection method and device
CN113158773B (en) Training method and training device for living body detection model
CN113688839B (en) Video processing method and device, electronic equipment and computer readable storage medium
Chen et al. A novel infrared image enhancement based on correlation measurement of visible image for urban traffic surveillance systems
Grazzini et al. Entropy estimation and multiscale processing in meteorological satellite images
CN115670397B (en) PPG artifact identification method and device, storage medium and electronic equipment
CN115719428A (en) Face image clustering method, device, equipment and medium based on classification model
CN111797922B (en) Text image classification method and device
CN114863364A (en) Security detection method and system based on intelligent video monitoring
CN112085683B (en) Depth map credibility detection method in saliency detection
CN116561372B (en) Personnel gear gathering method and device based on multiple algorithm engines and readable storage medium
Azarianpour et al. A generalized ghost detection and segmentation method for double-joint photographic experts group compression

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20210423

WW01 Invention patent application withdrawn after publication