CN112989993A - Recording method, recording system, and computer-readable storage medium - Google Patents

Recording method, recording system, and computer-readable storage medium Download PDF

Info

Publication number
CN112989993A
CN112989993A CN202110260758.9A CN202110260758A CN112989993A CN 112989993 A CN112989993 A CN 112989993A CN 202110260758 A CN202110260758 A CN 202110260758A CN 112989993 A CN112989993 A CN 112989993A
Authority
CN
China
Prior art keywords
image information
face image
information
server
face
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110260758.9A
Other languages
Chinese (zh)
Inventor
杨鸥
郑与天
曾祥才
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Xinghai IoT Technology Co Ltd
Original Assignee
Shenzhen Xinghai IoT Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Xinghai IoT Technology Co Ltd filed Critical Shenzhen Xinghai IoT Technology Co Ltd
Priority to CN202110260758.9A priority Critical patent/CN112989993A/en
Publication of CN112989993A publication Critical patent/CN112989993A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • G06V40/173Classification, e.g. identification face re-identification, e.g. recognising unknown faces across different face tracks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects

Abstract

The application discloses a recording method, a recording system and a computer readable storage medium, the recording method is applied to the recording system, the recording system comprises a server and a plurality of cameras connected with the server, the recording method comprises: acquiring face image information in monitoring areas of a plurality of cameras; matching the face image information with a face database of a server; if the matching of the face image information and the face database fails, marking the face image information as strangers, and storing the face image information in a grey list of the face database; and controlling a plurality of cameras to monitor strangers to obtain recorded information. Through the mode, strangers invading the monitoring area can be identified and behavior records can be carried out, and the safety of the recording system is improved.

Description

Recording method, recording system, and computer-readable storage medium
Technical Field
The present application relates to the field of face recognition technology, and in particular, to a recording method, a recording system, and a computer-readable storage medium based on face recognition.
Background
Following the development of science and technology, surveillance cameras are widely applied to places such as communities, families, companies and the like, and are mainly used for monitoring behaviors in specific areas so as to achieve the purpose of security protection.
However, a common camera or a monitoring system only records videos of a specific area which is shot and monitored, but cannot identify human faces, has no certain alertness to strangers, is insensitive to abnormal behaviors, cannot find abnormal behaviors at all without searching videos carefully, and is low in safety.
Disclosure of Invention
The technical problem mainly solved by the application is to provide a recording method, a recording system and a computer readable storage medium, which can identify human faces and record behavior information of strangers.
In order to solve the technical problem, the application adopts a technical scheme that: the recording method based on the face recognition is applied to a recording system, the recording system comprises a server and a plurality of cameras connected with the server, and the recording method comprises the following steps:
acquiring face image information in monitoring areas of a plurality of cameras;
matching the face image information with a face database of a server;
if the matching of the face image information and the face database fails, marking the face image information as strangers, and storing the face image information in a grey list of the face database;
and controlling a plurality of cameras to monitor strangers to obtain recorded information.
In order to solve the above technical problem, another technical solution adopted by the present application is: a recording system is provided, the recording system comprising a processor and a memory; the memory stores a computer program, and the processor is used for executing the computer program to realize the steps of the recording method provided by the application.
In order to solve the above technical problem, another technical solution adopted by the present application is: there is provided a computer-readable storage medium storing a computer program which, when executed, implements the steps of the recording method provided herein.
The beneficial effect of this application is: different from the situation of the prior art, the recording method based on face recognition is applied to a recording system, can acquire and recognize face image information of a monitored area, matches the face image information with a face database of a server, marks the face image information into strangers and stores the strangers in a grey list of the face database if matching fails, and finally controls a plurality of cameras to monitor the strangers to obtain recorded information, can recognize the strangers and record the behavior of the strangers, saves the time for a user to look up the strangers by watching a monitoring video, and is safe, reliable and convenient.
Drawings
FIG. 1 is a schematic diagram of a recording system structure of the recording method of the present application;
FIG. 2 is a schematic flow chart diagram of an embodiment of a recording method of the present application;
FIG. 3 is a flowchart illustrating an embodiment of step S12 in FIG. 2;
FIG. 4 is a schematic flow chart illustrating another embodiment of step S12 in FIG. 2;
FIG. 5 is a flowchart illustrating an embodiment of step S14 in FIG. 2;
FIG. 6 is a schematic structural diagram of an embodiment of the recording system of the present application;
FIG. 7 is a schematic structural diagram of an embodiment of a computer-readable storage medium of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The application provides a recording method based on face recognition, which can be applied to a recording system, the recording system can be applied to and is not limited to ordinary families, companies, garages or public places, and the public places can be communities, malls or office buildings.
The face recognition is a biological recognition technology for identifying the face feature information of a person, and a series of related technologies, which can be used for acquiring image information or video streams of the face by using a camera, automatically detecting and tracking the face in the image, and further identifying the face of the detected face, can also be called face recognition and portrait recognition in other documents.
As shown in fig. 1, the recording system 100 includes a server 110 and a plurality of cameras 120 connected to the server 110. The server 110 may be a cloud server or a local server, and the plurality of cameras 120 are connected to the server 110 to share data. A camera is a video input device, which can monitor and record a preset area in real time, and in other documents, the camera may also be called a camera or a monitoring camera.
As shown in fig. 2, the recording method of this application includes:
s11: and acquiring the face image information in the monitoring areas of the plurality of cameras.
The server 110 acquires the face image information located in the monitored areas of the plurality of cameras 120 to acquire all the face image information in the monitored areas through the plurality of cameras 120. Each camera is provided with a monitoring area, and each camera shoots in the corresponding monitoring area to acquire face image information. The server 110 acquires face image information from the plurality of cameras 120 to obtain face image information located in the monitored areas of the plurality of cameras 120.
For example, the monitoring area B1 corresponding to the camera a1, the monitoring area B2 corresponding to the camera a2, and the monitoring area B3 corresponding to the camera A3, the server 110 acquires all the face image information in the monitoring areas B1, B2, and B3 from the camera a1, the camera a2, and the camera A3.
In case the recording system 100 is applied to a cell, a plurality of cameras 120 may be respectively disposed at a doorway of the cell, an active area of the cell, a parking lot of the cell, a landing entrance of the cell, and a landing entrance of the cell.
The face image information is identity information representing the identity of a person by using the biological characteristics of the face of the person, and each person has unique face image information.
S12: and matching the face image information with a face database of the server.
The server 110 stores a face database in advance, and after the server 110 receives all face image information, the server 110 matches the face image information with the face database of the server 110, so as to match all face image information with the face database respectively.
The face database comprises a plurality of stored face image information, and the server 110 matches the face image information with the plurality of stored face image information; if the server 110 determines that the matching between the face image information and the plurality of stored face image information fails, that is, the matching between the face image information and the face database fails, the process proceeds to step S13.
Optionally, the face database may classify the stored face image information, and may specifically be classified into a white list, a black list, a gray list, a red list, or the like. In addition, the face database of the server 110 may further include information on names, ages, contact addresses, etc. of persons corresponding to the stored face image information.
The face database of the server 110 may be preset, and the user may add or delete the stored face image information in the face database through the server 110. For example, the user uploads a photograph, or a video recording, via the server 110 to add new facial image information to the facial database.
S13: and if the matching of the face image information and the face database fails, marking the face image information as a stranger, and storing the face image information in a grey list of the face database.
If the server 110 judges that the matching of the face image information and the face database fails, the face image information is not stored in the face database; the server 110 marks the face image information as a stranger, i.e., the server 110 detects a stranger, and the server 110 marks the face image information as a stranger.
After the server 110 marks the face image information as a stranger, the server 110 further stores the face image information in a gray list of a face database, i.e., the server 110 stores the face image information marked as a stranger in a gray list of the face database of the server 110.
S14: and controlling a plurality of cameras to monitor strangers to obtain recorded information.
After the server 110 marks the face image information as a stranger, the server 110 further controls a plurality of cameras 120 in the monitoring area to monitor the stranger, resulting in recorded information. Since the server 110 marks the face image information as a stranger, that is, tracking and monitoring the stranger are required, the server 110 controls the cameras to shoot the stranger within the monitoring range, so as to monitor the stranger and obtain the recorded information.
Since each of the plurality of cameras 120 is connected to the server 110, each camera can obtain the face image information of the stranger and the real-time location of the stranger from the face database of the server 110 to record the stranger to obtain the recorded information.
Alternatively, the recorded information may be the time when the stranger visits the monitoring area of each camera, the time when the stranger leaves the monitoring area of each camera, and the monitoring video when the stranger is located in the monitoring area of each camera.
Optionally, the recorded information may also include an action path of the stranger in the monitored area.
In some embodiments, the server 110 is set to a first state when the face image information of a stranger is not acquired. After acquiring the face image information of the stranger, the server 110 marks the face image information as the stranger, stores the face image information in the face database, and then enters a second state. The server 110 in the second state controls the plurality of cameras 120 to monitor strangers, and improves alertness to the strangers. Meanwhile, the plurality of cameras 120 continuously monitor strangers, and record face image information of the strangers in real time to obtain recorded information. Alternatively, the server 110 in the second state does not acquire the face image information of a stranger within a preset period of time, and then the server 110 switches to the first state.
The recording method provided by the embodiment is based on face recognition, can automatically recognize strangers and record behaviors of the strangers invading the monitoring area, and improves the alertness of the recording system 100 to the strangers. Meanwhile, the requirement that the user can know the record information of the strangers invading the monitoring area at the first time can be met, and the strangers do not need to be searched through the complicated process of searching the monitoring video.
As shown in fig. 3, in some embodiments, step S12 may include the following steps:
s21: and matching the face image information with the white list.
The server 110 obtains face image information located in the monitoring areas of the plurality of cameras 120, and matches the obtained face image information with face image information that is a white list in a plurality of stored face databases in the server 110.
The white list is a classification name for a plurality of stored facial image information, that is, a classification name for distinguishing other lists, and in this embodiment, the white list may be set as a type of facial image information for which no behavior record is performed.
The white list may be face image information preset by the user, and the user may add or delete stored white list face image information in the face database through the server 110. For example, the user may upload a picture or video recording through the server 110 to add a white list to the face database, or may log in the server 110 to delete the white list.
Optionally, when the white list is set as a face image information type for which no behavior record is performed, if the server 110 determines that the obtained face image information is successfully matched with the face image information of the white list in the face database stored in the server 110, that is, the face image information is stored in the white list of the face database, it is determined that the face image information is the white list, and the server 110 does not perform the behavior record on the face image information.
S22: and if the matching of the face image information and the white list fails, matching the face image information with the gray list.
The matching of the face image information and the white list fails, that is, the server 110 fails to successfully match the acquired face image information with the face image information of the white list in the face database stored in the server 110, and the face image information is not stored in the white list in the face database.
When the server 110 determines that the matching between the face image information and the white list of the face database fails, the server 110 matches the face image information with face image information that is in a gray list in a plurality of stored face databases in the server 110.
Optionally, the grey list is also a classification name of a plurality of stored facial image information, that is, a classification name for distinguishing other lists, and in this embodiment, the grey list is a classification name of stranger facial image information.
The grey list may be face image information preset by the user, and the user may add or delete stored white list face image information in the face database through the server 110. For example, the user may upload a picture or video recording through the server 110 to add a white list to the face database, or may log in the server 110 to delete the white list.
Further, in performing step S13, after the server 110 marks the face image information as a stranger, the server 110 may save the image information marked as a stranger in a gray list in the face database by itself.
S23: and if the matching of the face image information and the gray list fails, executing a step of marking the face image information as strangers.
The matching of the face image information with the gray list fails, and the server 110 fails to successfully match the acquired face image information with the face image information which is in the gray list in the face database stored in the server 110, and the face image information is not stored in the gray list in the face database.
After the matching of the face image information and the gray list fails, the server 110 marks the face image information as a stranger, and stores the face image information marked as the stranger into the gray list in the face database of the server 110.
S24: if the matching of the face image information and the gray list is successful, the step of controlling the plurality of cameras 120 to monitor strangers is executed.
The matching of the face image information and the gray list is successful, that is, the server 110 successfully matches the acquired face image information with the face image information which is in the gray list in the face database stored in the server 110, and the face image information is already stored in the gray list in the face database of the server 110.
After the face image information is successfully matched with the gray list, the server 110 controls the cameras 120 in the monitoring area to monitor the gray list face image information, and the cameras shoot the gray list face image information in the monitoring range to obtain the record information.
In this embodiment, the server 110 can identify and distinguish the face image information stored in the server 110 as a white list and a gray list, so as to ensure that the server 110 correctly identifies and records the behavior of a stranger when the stranger is not identified by mistake, thereby further enhancing the identification accuracy of the recording system 100 for the stranger.
As shown in fig. 4, in other embodiments, step S12 may include the following steps:
s31: and matching the face image information with the blacklist and the red list respectively.
The face image information is respectively matched with the blacklist and the red list, that is, the server 110 acquires the face image information located in the monitoring area of the plurality of cameras 120, and then respectively matches the acquired face image information with the face image information of the blacklist and the red list in a plurality of stored face databases in the server 110.
Optionally, the black list and the red list are classification names of a plurality of stored face image information, that is, classification names for distinguishing other lists, in this embodiment, the black list is set as face image information that needs to be pre-warned by the server 110, and the red list is set as face image information that needs to be paid attention to by the server 110.
The black list and the red list may be face image information preset by the user, and the user may add or delete stored black list or red list face image information in the face database through the server 110. For example, the user may add a blacklist or a red list to the face database by uploading a picture or a video recording, or may log in the server 110 to delete the blacklist or the red list.
Alternatively, the black list or the red list may be changed to another list, for example, the black list is changed to the red list, and the red list is changed to the gray list.
S32: and if the face image information is successfully matched with the blacklist, generating warning information and sending the warning information to a corresponding terminal so that a user of the terminal can monitor personnel of the face image information.
The matching of the face image information and the blacklist is successful, that is, the server 110 successfully matches the acquired face image information with the face image information of the blacklist in the face database stored in the server 110, where the face image information is already stored in the face database blacklist of the server 110.
After the facial image information is successfully matched with the blacklist, the server 110 generates warning information and sends the warning information to a corresponding terminal, so that a user of the terminal can monitor personnel of the facial image information.
The warning information is information for sending a warning to the terminal to warn the terminal user. Alternatively, the warning message may exist in the form of a short message, a telephone call, or a terminal application message.
After receiving the warning message, the user of the terminal may establish a connection with the server 110 through the terminal, view the face image information of the black list, and view the real-time monitoring of the plurality of cameras 120, to obtain the face image information record information of the black list.
Optionally, after the server 110 sends the terminal warning information, the server 110 controls the plurality of cameras 120 to monitor the blacklist face image information, and tracks and monitors the blacklist face image information to obtain the record information.
S33: and if the face image information is successfully matched with the red list, generating reminding information and sending the reminding information to the terminal.
The matching between the face image information and the red list is successful, that is, the server 110 successfully matches the acquired face image information with the face image information of the red list in the face database stored in the server 110, where the face image information is already stored in the red list in the face database of the server 110.
After the face image information is successfully matched with the red list, the server 110 generates reminding information and sends the reminding information to the terminal.
The reminding information refers to information which needs to be noticed by the terminal user, and optionally, the reminding information can exist in the form of short messages, telephones or terminal application messages.
In some embodiments, the recording system 100 provided by the present application is applied to a cell, and the blacklist face image information stored in the face database of the server 110 of the recording system 100 is the facial image information of a gold tenant, and the redlist face image information is the facial image information of a child in the cell. When the short tenant gold person enters the monitoring area, the server 110 obtains the face image information of the short tenant gold person, and the face image information of the short tenant gold person is matched with the black list and the red list respectively. The server 110 successfully matches the face image information of the underrenter with the blacklist, the server 110 generates warning information and sends the warning information to the user terminal to inform the terminal user that the underrenter enters the monitoring area, and the terminal user is reminded to check the record information of the underrenter. When the children in the community enter the monitoring area, the server 110 obtains the face image information of the children in the community, and matches the face image information with the face image information of the blacklist and the face image information of the red list respectively. The server 110 successfully matches the child face image information of the cell with the red list, and the server 110 generates reminding information to be sent to the user terminal to inform the terminal user that the child of the cell enters the monitoring area. Optionally, the server 110 may also be configured to record behaviors of the red-listed cell children, and obtain record information to ensure the safety of the cell children.
Optionally, if the blacklist or red list face image information leaves the monitoring area of the plurality of cameras, the server 110 generates the information again and sends the information to the user terminal.
In this embodiment, the types of face image information of the face database are increased, the face database is provided with a black list and a red list, and different processing is performed according to different lists, so that the recording system 100 can be applied to monitoring strangers and can also be used for searching preset face image information in a monitoring area of a plurality of cameras.
As shown in fig. 5, step S14 may further include the steps of:
s41: and acquiring the recorded information of the strangers entering the monitoring areas of the plurality of cameras.
The server 110 acquires record information of entry of a stranger into the monitoring areas of the plurality of cameras 120, and the record information may include the number of times, the period of time, and location information of entry of the stranger into the monitoring areas.
Wherein, the number of times that a stranger enters the monitoring area of a plurality of cameras corresponds with the time quantum, for example: the time period for a stranger to enter the monitoring area for the first time is 2019, 1, 5 and 13: 50-14: 01, the time period for the stranger to enter the monitoring area for the second time is 1 month and 8 days in 2019, 08: 20-08: 40.
when a stranger enters the monitoring area of the plurality of cameras, the server 110 starts to record the recorded information until the stranger leaves the monitoring area.
The location information of the stranger in the monitored area corresponds to the time period of the stranger in the monitored area, and the server 110 may update the location information of the stranger in the time period of the monitored area according to a preset time interval in the time period, for example: if the position information is updated once within 5s, after a stranger enters the monitoring area, the server 110 records the position information of the stranger once every 5s, and meanwhile, the server 110 generates a time period of the stranger in the monitoring area, and the position information corresponds to the time within the time period one by one.
Alternatively, the server 110 may calculate an action path of a stranger in the monitoring areas of the plurality of cameras based on a time sequence of a time period in which the stranger is located in the monitoring areas of the plurality of cameras and location information corresponding to the time period.
The server 110 compares the calculated action path of the stranger with a preset path range, if the action path of the stranger exceeds the preset path range, namely the action path of the stranger does not accord with the preset path, the server 110 generates report information and sends the report information to a corresponding terminal to remind a user of the terminal that the stranger enters a monitoring area and abnormal behaviors exist, so that the user of the terminal can check the behavior record of the stranger.
Alternatively, the report information may exist in the form of a short message, a telephone call, or a terminal application message.
Optionally, in some embodiments, the server 110 may also preset a visit time period of a stranger.
When the server 110 starts to record strangers and generate record information, the server 110 acquires the visit time period, compares the time period when the strangers in the record information are located in the monitoring area with the visit time period, and judges whether the time period for recording the information exceeds the visit time period.
Specifically, the server 110 determines whether the time period for recording information exceeds the visit time period, meaning that the server 110 determines whether the time period for recording information is a subset of the visit time period.
If the server 110 determines that the time period for recording the information exceeds the visiting time period, the server 110 obtains the last location information of the stranger in the monitoring area.
If the stranger does not leave the monitoring area, the last position information of the stranger in the monitoring area acquired by the server 110 is the current position information.
The server 110 generates search information after acquiring the last location information of the stranger in the monitoring area, sends the search information to the corresponding terminal, informs the terminal user that the stranger enters the monitoring area in a non-visiting time period, provides location information of the stranger, and reminds the terminal user to monitor the stranger in time.
Alternatively, the search information may exist in the form of a short message, a telephone call, or a terminal application message, and the search information may include the last location information of the stranger in the monitoring area acquired by the server 110.
S42: and storing the recorded information to a grey list.
The server 110 stores the stranger record information into a face database blacklist so that the user can inquire or clear stranger history information.
Alternatively, the log information may be preset with a valid period, and the history information exceeding the valid period will be cleared by the server 110.
The server 110 strictly monitors the time period and the action path when the stranger enters the monitoring area, and if the server 110 finds that the visiting time of the stranger exceeds the preset time or the action path of the stranger exceeds the preset path range, the server 110 sends information to the terminal. The embodiment can intelligently identify whether a stranger visits at a proper time or not and identify the abnormal action path of the stranger, and the safety of the monitoring system is improved.
As shown in fig. 6, the present application provides a recording system 200, which includes a memory 210 and a processor 220, wherein the memory 210 stores a computer program file capable of implementing all the methods described above, wherein the computer program file may be stored in the memory device in the form of a software product, and includes several instructions for causing the processor 220 to execute all or part of the steps of the methods described in the embodiments of the present application.
The present application further proposes a computer-readable storage medium, as shown in fig. 7, the computer-readable storage medium 70 of the present embodiment is used for storing the program instructions 710 of the above-mentioned embodiment, and the program instructions 710 can be executed to implement the method of the above-mentioned embodiment. The program instructions 710 have been described in detail in the above method embodiments, and are not described in detail here.
The computer readable storage medium 70 of the embodiment can be, but is not limited to, a usb disk, an SD card, a PD optical drive, a removable hard disk, a high-capacity floppy drive, a flash memory, a multimedia memory card, a server, etc.
In addition, if the above functions are implemented in the form of software functions and sold or used as a standalone product, the functions may be stored in a storage medium readable by a mobile terminal, that is, the present application also provides a storage device storing program data, which can be executed to implement the method of the above embodiments, the storage device may be, for example, a usb disk, an optical disk, a server, etc. That is, the present application may be embodied as a software product, which includes several instructions for causing an intelligent terminal to perform all or part of the steps of the methods described in the embodiments.
In the description of the present application, reference to the description of the terms "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, mechanism, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present application. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, mechanisms, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present application, "plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and the scope of the preferred embodiments of the present application includes other implementations in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
The logic and/or steps represented in the flowcharts or otherwise described herein, such as an ordered listing of executable instructions that can be viewed as implementing logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device (e.g., a personal computer, server, network device, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions). For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
The above description is only an embodiment of the present application, and not intended to limit the scope of the present application, and all equivalent mechanisms or equivalent processes performed by the present application and the contents of the appended drawings, or directly or indirectly applied to other related technical fields, are all included in the scope of the present application.

Claims (10)

1. A recording method based on face recognition is applied to a recording system, the recording system comprises a server and a plurality of cameras connected with the server, and the recording method comprises the following steps:
acquiring face image information in the monitoring areas of the plurality of cameras;
matching the face image information with a face database of the server;
if the matching of the face image information and the face database fails, marking the face image information as a stranger, and storing the face image information in a grey list of the face database;
and controlling the plurality of cameras to monitor the strangers to obtain recorded information.
2. The recording method according to claim 1, wherein the face database is provided with a white list, and the matching the face image information with the face database of the server comprises:
matching the face image information with the white list;
if the matching of the face image information and the white list fails, matching the face image information with the gray list;
and if the matching of the face image information and the grey list fails, executing the step of marking the face image information as strangers.
3. The recording method according to claim 2, wherein the matching the face image information with the gray list comprises:
and if the face image information is successfully matched with the grey list, executing a step of controlling a plurality of cameras to monitor the strangers.
4. The recording method according to claim 1, wherein the face database is provided with a black list and a red list, and the matching the face image information with the face database of the server comprises:
matching the face image information with the blacklist and the red list respectively;
and if the face image information is successfully matched with the blacklist, generating warning information, and sending the warning information to a corresponding terminal so that a user of the terminal can monitor personnel of the face image information.
And if the face image information is successfully matched with the red list, generating reminding information and sending the reminding information to the terminal.
5. The recording method according to claim 1, wherein the controlling the plurality of cameras to monitor the strangers for recorded information includes:
acquiring record information of the strangers entering the monitoring areas of the cameras, wherein the record information comprises the times, time periods and position information of the strangers in the monitoring areas;
and storing the recorded information to the grey list.
6. The recording method according to claim 5, wherein the recording method further comprises:
acquiring the visit time period of the stranger, and judging whether the time period of the recorded information exceeds the visit time period;
if so, acquiring the last position information of the stranger in the monitoring area;
and generating search information based on the last position information, and sending the search information to a corresponding terminal.
7. The recording method according to claim 5, wherein the recording method further comprises:
and obtaining the action path of the stranger based on the time sequence and the position information of the recorded information.
8. The recording method according to claim 7, wherein the recording method further comprises:
comparing the action path with a preset path range;
and if the action path exceeds the preset path range, generating report information and sending the report information to a corresponding terminal.
9. A recording system, comprising a processor and a memory; stored in the memory is a computer program for execution by the processor to carry out the steps of the recording method according to any one of claims 1 to 8.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed, implements the steps of the recording method according to any one of claims 1-8.
CN202110260758.9A 2021-03-10 2021-03-10 Recording method, recording system, and computer-readable storage medium Pending CN112989993A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110260758.9A CN112989993A (en) 2021-03-10 2021-03-10 Recording method, recording system, and computer-readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110260758.9A CN112989993A (en) 2021-03-10 2021-03-10 Recording method, recording system, and computer-readable storage medium

Publications (1)

Publication Number Publication Date
CN112989993A true CN112989993A (en) 2021-06-18

Family

ID=76334835

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110260758.9A Pending CN112989993A (en) 2021-03-10 2021-03-10 Recording method, recording system, and computer-readable storage medium

Country Status (1)

Country Link
CN (1) CN112989993A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116631108A (en) * 2023-05-18 2023-08-22 保利物业服务股份有限公司 Cell security method, device and equipment based on face recognition technology

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108399665A (en) * 2018-01-03 2018-08-14 平安科技(深圳)有限公司 Method for safety monitoring, device based on recognition of face and storage medium
WO2019062659A1 (en) * 2017-09-26 2019-04-04 云丁网络技术(北京)有限公司 Surveillance video recognition method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019062659A1 (en) * 2017-09-26 2019-04-04 云丁网络技术(北京)有限公司 Surveillance video recognition method and device
CN108399665A (en) * 2018-01-03 2018-08-14 平安科技(深圳)有限公司 Method for safety monitoring, device based on recognition of face and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116631108A (en) * 2023-05-18 2023-08-22 保利物业服务股份有限公司 Cell security method, device and equipment based on face recognition technology

Similar Documents

Publication Publication Date Title
JP6905850B2 (en) Image processing system, imaging device, learning model creation method, information processing device
US20220092881A1 (en) Method and apparatus for behavior analysis, electronic apparatus, storage medium, and computer program
WO2020073505A1 (en) Image processing method, apparatus and device based on image recognition, and storage medium
US6975346B2 (en) Method for suspect identification using scanning of surveillance media
CN108446669B (en) Motion recognition method, motion recognition device and storage medium
CN109635146B (en) Target query method and system based on image characteristics
US11625936B2 (en) High definition camera and image recognition system for criminal identification
TW202036472A (en) Method and device, electronic equipment for imaging processing and storage medium thereof
CN106780250B (en) Intelligent community security event processing method and system based on Internet of things technology
US20210382933A1 (en) Method and device for archive application, and storage medium
US20100318566A1 (en) Behavior history retrieval apparatus and behavior history retrieval method
US10419728B2 (en) Monitoring system having personal information protection function and method thereof
CN101976356A (en) Face identification method for surfing identification policy, and identification system thereof
CN111078922A (en) Information processing method and device and storage medium
CN105957172A (en) Photograph attendance application system of intelligent photograph electrical screen
CN112597858A (en) Monitoring method and device and readable storage medium
CN114495270A (en) Real-time monitoring and early warning method, device and system and storage medium
JP2023525548A (en) IDENTIFICATION METHOD, DEVICE, SECURITY SYSTEM AND STORAGE MEDIUM
CN110246292B (en) Household video monitoring method, device and storage medium
CN112989993A (en) Recording method, recording system, and computer-readable storage medium
TWI486910B (en) Parking lot management system combined with two-factor identification and method therefore
CN112418063A (en) Face recognition method and device, electronic equipment and storage medium
Sai et al. Low cost automated facial recognition system
CN112804492B (en) Communication prompting method and device for electronic peepholes
CN109284730B (en) Method and device applied to screening data and monitoring system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination