CN113111823A - Abnormal behavior detection method and related device for building construction site - Google Patents

Abnormal behavior detection method and related device for building construction site Download PDF

Info

Publication number
CN113111823A
CN113111823A CN202110435672.5A CN202110435672A CN113111823A CN 113111823 A CN113111823 A CN 113111823A CN 202110435672 A CN202110435672 A CN 202110435672A CN 113111823 A CN113111823 A CN 113111823A
Authority
CN
China
Prior art keywords
key frame
frame
key
frames
abnormal behavior
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110435672.5A
Other languages
Chinese (zh)
Inventor
吴晓鸰
曹智雄
凌捷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University of Technology
Original Assignee
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Technology filed Critical Guangdong University of Technology
Priority to CN202110435672.5A priority Critical patent/CN113111823A/en
Publication of CN113111823A publication Critical patent/CN113111823A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/40Scenes; Scene-specific elements in video content
    • G06V20/46Extracting features or characteristics from the video content, e.g. video fingerprints, representative shots or key frames
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • G06F18/241Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
    • G06F18/2413Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on distances to training or reference patterns
    • G06F18/24133Distances to prototypes
    • G06F18/24137Distances to cluster centroïds
    • G06F18/2414Smoothing the distance, e.g. radial basis function networks [RBFN]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • G06F9/5072Grid computing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/08Learning methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/40Scenes; Scene-specific elements in video content
    • G06V20/41Higher-level, semantic clustering, classification or understanding of video scenes, e.g. detection, labelling or Markovian modelling of sport events or news items
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The application discloses an abnormal behavior detection method and a related device for a building construction site, wherein the method comprises the following steps: acquiring a monitoring video of a building construction site; extracting a plurality of first key frames of the monitoring video through an interframe difference algorithm; extracting a fingerprint character string of each first key frame based on a perceptual hash algorithm, and screening the first key frames based on the fingerprint character string to obtain second key frames; and sending the second key frame to the edge server, so that the edge server detects the abnormal behavior of the second key frame through a preset discrimination model to obtain a detection result. The application solves the technical problems that in videos obtained by a sensor in the prior art, repeated construction pictures are more, and data redundancy is caused by long-time transmission of the same videos or images, so that the energy consumption is higher, and the service life of monitoring equipment is shorter.

Description

Abnormal behavior detection method and related device for building construction site
Technical Field
The present application relates to the field of image processing technologies, and in particular, to a method and a related apparatus for detecting abnormal behaviors in a building construction site.
Background
The construction industry develops rapidly, and the quantity of construction projects increases day by day. The method is not matched with the rapid development of the construction industry, the situation that the informatization degree and the datamation degree are not high generally exists in the construction engineering, the intellectualization still stays at the theoretical level, the construction accident happens sometimes, and the development of the safety management level of the construction engineering is hindered. The engineering construction industry has long-term problems of extensive industry development mode, low skill quality of construction workers, imperfect supervision system, laggard technical equipment and the like, and has negative influence on construction efficiency and management flow.
The current common measures are to improve the production and management processes by utilizing a new generation of information technology, such as a Building Information Model (BIM), mobile communication, intellectualization, the Internet of things and the like, so as to ensure the life and property safety of building employees, reduce the production cost and improve the profit margin of enterprises. In the existing building construction safety monitoring scheme, a video sensor module is arranged on a construction site through wiring, a site video or picture is collected, and image characteristics are extracted; the video sensor module compresses the collected video and image data, reduces the data amount of transmission, and sends the data to a terminal system through a line. And an operator beside the terminal system judges whether the construction site has a safety problem or not by analyzing the received video data and provides a warning. According to the scheme, in videos obtained by the sensor, repeated construction pictures are more, data redundancy is easily caused by long-time transmission of the same videos or images, energy consumption is higher, and the service life of monitoring equipment is shortened.
Disclosure of Invention
The application provides an abnormal behavior detection method and a related device for a building construction site, which are used for solving the technical problems that in videos obtained by a sensor in the prior art, repeated construction pictures are more, and data redundancy is caused by long-time transmission of the same videos or images, so that the energy consumption is higher, and the service life of monitoring equipment is shorter.
In view of the above, a first aspect of the present application provides a method for detecting abnormal behavior at a construction site, including:
acquiring a monitoring video of a building construction site;
extracting a plurality of first key frames of the monitoring video through an interframe difference algorithm;
extracting a fingerprint character string of each first key frame based on a perceptual hash algorithm, and screening the first key frames based on the fingerprint character string to obtain second key frames;
and sending the second key frame to an edge server, so that the edge server detects the abnormal behavior of the second key frame through a preset discrimination model to obtain a detection result.
Optionally, the extracting, by using an inter-frame difference algorithm, a plurality of first key frames of the surveillance video includes:
carrying out difference operation on two or three continuous frames of video images in the monitoring video to obtain gray difference;
and judging whether the absolute value of the gray difference is larger than a first threshold value, if so, taking the continuous two-frame or three-frame video image corresponding to the gray difference as a first key frame, and if not, taking only the first frame video image in the continuous two-frame or three-frame video image corresponding to the gray difference as the first key frame.
Optionally, the extracting the fingerprint character string of each first key frame based on the perceptual hash algorithm includes:
reducing the size of each first key frame;
graying each first key frame after being reduced to obtain a gray key frame;
and comparing the pixel values of the adjacent pixels in each gray key frame line by line, recording as 1 if the pixel value of the previous pixel is smaller than that of the next pixel, and recording as 0 if the pixel value of the previous pixel is larger than or equal to that of the next pixel, so as to generate the fingerprint character string of each first key frame.
Optionally, the screening the first keyframe based on the fingerprint character string to obtain a second keyframe includes:
calculating the Hamming distance between the fingerprint character strings of the first key frame of two continuous frames;
and judging whether the Hamming distance is larger than a second threshold value, if so, taking the first key frame of two continuous frames corresponding to the Hamming distance as a second key frame, and if not, taking only the previous frame of the first key frame of the two continuous frames corresponding to the Hamming distance as the second key frame.
Optionally, the edge server performs abnormal behavior detection on the second key frame through a preset discrimination model to obtain a detection result, and the method further includes:
the edge server reconstructs the second key frame through a preset countermeasure generation network model to obtain a reconstructed image, wherein the reconstructed image comprises reconstructed non-shielding constructors;
correspondingly, the edge server performs abnormal behavior detection on the second key frame through a preset discrimination model to obtain a detection result, including:
and the edge server detects abnormal behaviors of the non-shielding constructors in the reconstructed image through a preset discrimination model to obtain a detection result.
The present application provides in a second aspect an abnormal behavior detection apparatus at a construction site, comprising:
the system comprises an acquisition unit, a monitoring unit and a monitoring unit, wherein the acquisition unit is used for acquiring a monitoring video of a building construction site;
the extraction unit is used for extracting a plurality of first key frames of the monitoring video through an interframe difference algorithm;
the screening unit is used for extracting the fingerprint character string of each first key frame based on a perceptual hash algorithm and screening the first key frames based on the fingerprint character string to obtain second key frames;
and the sending unit is used for sending the second key frame to an edge server, so that the edge server detects the abnormal behavior of the second key frame through a preset discrimination model to obtain a detection result.
Optionally, the extracting unit is specifically configured to:
carrying out difference operation on two or three continuous frames of video images in the monitoring video to obtain gray difference;
and judging whether the absolute value of the gray difference is larger than a first threshold value, if so, taking the continuous two-frame or three-frame video image corresponding to the gray difference as a first key frame, and if not, taking only the first frame video image in the continuous two-frame or three-frame video image corresponding to the gray difference as the first key frame.
Optionally, the screening unit is specifically configured to:
reducing the size of each first key frame;
graying each first key frame after being reduced to obtain a gray key frame;
comparing the pixel values of adjacent pixels in each gray key frame line by line, recording as 1 if the pixel value of the previous pixel is smaller than that of the next pixel, and recording as 0 if the pixel value of the previous pixel is greater than or equal to that of the next pixel, so as to generate a fingerprint character string of each first key frame;
calculating the Hamming distance between the fingerprint character strings of the first key frame of two continuous frames;
and judging whether the Hamming distance is larger than a second threshold value, if so, taking the first key frame of two continuous frames corresponding to the Hamming distance as a second key frame, and if not, taking only the previous frame of the first key frame of the two continuous frames corresponding to the Hamming distance as the second key frame.
A third aspect of the present application provides an abnormal behaviour detection apparatus at a construction site, the apparatus comprising a processor and a memory;
the memory is used for storing program codes and transmitting the program codes to the processor;
the processor is configured to execute the method for detecting abnormal behavior at a construction site according to any one of the first aspect according to instructions in the program code.
A fourth aspect of the present application provides a computer-readable storage medium for storing program code for executing the method for detecting abnormal behavior at a construction site according to any one of the first aspect.
According to the technical scheme, the method has the following advantages:
the application provides an abnormal behavior detection method for a building construction site, which comprises the following steps: acquiring a monitoring video of a building construction site; extracting a plurality of first key frames of the monitoring video through an interframe difference algorithm; extracting a fingerprint character string of each first key frame based on a perceptual hash algorithm, and screening the first key frames based on the fingerprint character string to obtain second key frames; and sending the second key frame to the edge server, so that the edge server detects the abnormal behavior of the second key frame through a preset discrimination model to obtain a detection result.
According to the method and the device, after the monitoring video is obtained, repeated video frames in the monitoring video are screened through an interframe difference algorithm and a perceptual hash algorithm, the key frames are extracted, the key frames are sent to an edge server to be detected for abnormal behaviors, the redundancy of transmitted data is reduced, the energy consumption is reduced, the technical problems that in the video obtained by a sensor in the prior art, repeated construction pictures are more, the data redundancy is caused by the fact that the same video or image is transmitted for a long time, the energy consumption is higher, and the service life of monitoring equipment is shorter are solved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
Fig. 1 is a schematic flow chart of an abnormal behavior detection method for a construction site according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of an abnormal behavior detection apparatus of a building construction site according to an embodiment of the present application.
Detailed Description
The application provides an abnormal behavior detection method and a related device for a building construction site, which are used for solving the technical problems that in videos obtained by a sensor in the prior art, repeated construction pictures are more, and data redundancy is caused by long-time transmission of the same videos or images, so that the energy consumption is higher, and the service life of monitoring equipment is shorter.
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In the monitoring video of the construction site, the building safety video monitoring return flow is large, and most monitoring pictures have low value, so that the significance of returning all monitoring data in real time is not great. Although the existing data compression technology can compress video or image data, the compression rate is not high, and the video data acquisition and the data compression are parallel, so that the performance of a video sensor is preempted.
In order to reduce data transmission of a construction site video monitoring network, reduce transmission cost and prolong the service life of the monitoring network, the embodiment of the application uses 5G combined with mobile edge computing on the premise of not changing original video or image information, utilizes an edge computing platform to analyze and process video data, filters low-value or non-value data, and transmits high-value data back to a cloud center for storage and utilization, thereby better ensuring the safety and privacy of information. The embedded intelligent processing equipment connected with the video sensor is used as an edge server; the edge server stores the video or the image, tests the video/image by using the trained network model, and automatically transmits the detected abnormal condition back to the cloud center server through the 5G network.
For ease of understanding, referring to fig. 1, the present application provides an embodiment of a method for detecting abnormal behavior at a construction site, including:
step 101, acquiring a monitoring video of a building construction site.
The embodiment of the application acquires the monitoring video of the construction site through the video sensor arranged on the construction site.
Step 102, extracting a plurality of first key frames of the monitoring video through an interframe difference algorithm.
The embodiment of the application considers that the video frames in the monitoring video have time redundancy, adjacent frames can contain the same information, whether the frames are key frames or not can be classified according to the maximum irrelevant principle, and meanwhile, the variety of the video frames is guaranteed. When the video frame is analyzed, the similarity of the previous frame and the next frame can be analyzed through image feature extraction and comparison so as to judge whether the information structure of the video frame is changed or not, if the information structure of the video frame is not changed, the frame is discarded, otherwise, the frame is retained.
Specifically, performing difference operation on two or three continuous frames of video images in the monitoring video to obtain gray difference; and judging whether the absolute value of the gray difference is larger than a first threshold value, if so, taking the continuous two-frame or three-frame video image corresponding to the gray difference as a first key frame, and if not, taking only the first frame video image in the continuous two-frame or three-frame video image corresponding to the gray difference as the first key frame. The absolute value of the gray difference of two or three continuous frames of video images in the monitoring video is larger than a first threshold value, which indicates that the frames of video images are obviously changed, and the frames of video images are kept if the monitoring picture has obvious motion, otherwise, indicates that the frames of video images are not obviously changed, only the first frame of the frames of video images is kept, and other frames of video images are redundant.
103, extracting the fingerprint character string of each first key frame based on a perceptual hash algorithm, and screening the first key frames based on the fingerprint character string to obtain second key frames.
In order to further determine whether redundant video frames exist in the retained first key frames, in the embodiment of the present application, a fingerprint character string of each first key frame is extracted based on a perceptual hash algorithm, so as to perform similarity determination. Specifically, the size of each first key frame is reduced, and the resolution of the first key frame is reduced; graying each first key frame after being reduced to obtain a gray key frame; and comparing the pixel values of adjacent pixel points in each gray key frame line by line, recording as 1 if the pixel value of the previous pixel point is smaller than that of the next pixel point, and recording as 0 if the pixel value of the previous pixel point is greater than or equal to that of the next pixel point, so as to generate a fingerprint character string of each first key frame, wherein the fingerprint character string consists of 0 and 1.
Calculating the Hamming distance between the fingerprint character strings of the first key frames of two continuous frames; and judging whether the Hamming distance is greater than a second threshold value, if so, indicating that the similarity of the first key frames of the two continuous frames is not high, taking the first key frames of the two continuous frames corresponding to the Hamming distance as second key frames, and if not, indicating that the similarity of the first key frames of the two continuous frames is high, and taking only the previous frame of the first key frames of the two continuous frames corresponding to the Hamming distance as the second key frame.
And step 104, sending the second key frame to the edge server, so that the edge server detects the abnormal behavior of the second key frame through a preset discrimination model to obtain a detection result.
After the second key frame is detected through the two modes, the video sensor sends the second key frame to the edge server through the 5G base station of the construction site, so that the edge server detects abnormal behaviors of the second key frame through a preset discrimination model to obtain a detection result.
Further, in the embodiment of the application, the situation that a lot of shelters exist in the construction environment is considered, and the detection effect is influenced by directly inputting the second key frame into the network for abnormal behavior detection. Therefore, the method and the device have the advantages that the countermeasure generation network is trained, so that the generator in the countermeasure generation network can reconstruct an image without shielding according to the input second key frame, abnormal behavior detection is carried out on the reconstructed image through the preset discrimination model, and the detection precision is improved by improving the quality of the input image of the preset discrimination model. Specifically, the edge server reconstructs the second key frame through a preset countermeasure generation network model to obtain a reconstructed image, wherein the reconstructed image comprises reconstructed non-shielding construction personnel; and the edge server detects abnormal behaviors of the non-shielding constructors in the reconstructed image through a preset discrimination model to obtain a detection result.
A preset confrontation generation network model and a preset discrimination model are arranged in the edge server, and the preset confrontation generation network model is a trained confrontation generation network model and is used for reconstructing an image; the preset discrimination model is a trained discrimination network, and the discrimination network preferably adopts GANOMlay for abnormal behavior detection.
Further, the configuration process of the preset countermeasure generation network model comprises the following steps: and acquiring an original training image, screening out part of non-shielded training images, adding random shielding, combining the images into a shielded and non-shielded image pair, and sending the images into a countermeasure generation network together for training.
The countermeasure generation network comprises a generator G and a discriminator D, wherein the generator G comprises 4 convolutional layers, 3 residual blocks and 3 deconvolution layers, each convolutional layer and deconvolution layer is followed by an example normalization layer and an activation layer, and the activation functions adopt Leaky ReLU functions. The structure of the discriminator D is 4 convolution layers, each convolution layer is followed by a batch normalization layer and an activation layer, the first three activation layers use ReLU functions, and the last activation layer uses Tanh functions.
The loss function of generator G is:
Lp=||X-E(Z)||1
wherein X is an unobstructed training image, Z is an obstructed training image, E (-) is a reconstruction mapping variation function, | | | | | sweet wind1Is the norm of L1.
The penalty function for discriminator D is:
Lw=Ex~p[D(X)]-Ez~p[G(Z)];
in the formula, Ex to p [ D (X)) ] are data distributions of the non-occlusion training image X, and Ex to p [ G (Z)) ] are data distributions of the occlusion training image Z.
The overall loss function against the generative network can be expressed as:
L=λLp+Lw
in the formula, λ is a weighting parameter, preferably 10.
Through alternate training of the generator G and the discriminator D, the finally trained generator G can reconstruct the non-shielding and non-shielding constructor.
And (3) inputting the reconstructed image into the GANOMlay to obtain an abnormal score, and comparing the set threshold phi with the abnormal score to judge whether abnormal behaviors occur or not, wherein the abnormal behaviors can comprise that a constructor does not wear a safety helmet, does not wear a safety belt and the like. And if the abnormal behavior occurs, sending the second key frame corresponding to the reconstructed image to the cloud center and marking a warning to improve the safety factor of the construction site and ensure the safety of constructors.
In the embodiment of the application, after the monitoring video is obtained, repeated video frames in the monitoring video are screened through an interframe difference algorithm and a perceptual hash algorithm, key frames are extracted, the key frames are sent to an edge server for abnormal behavior detection, the redundancy of transmitted data is reduced, the energy consumption is reduced, and the technical problems that in videos obtained by a sensor in the prior art, repeated construction pictures are more, data redundancy is caused by long-time transmission of the same video or image, the energy consumption is higher, and the service life of monitoring equipment is shorter are solved.
The above is an embodiment of the method for detecting abnormal behavior at a construction site provided by the present application, and the following is an embodiment of the apparatus for detecting abnormal behavior at a construction site provided by the present application.
Referring to fig. 2, an abnormal behavior detection apparatus for a building construction site according to an embodiment of the present application includes:
the system comprises an acquisition unit, a monitoring unit and a monitoring unit, wherein the acquisition unit is used for acquiring a monitoring video of a building construction site;
the extraction unit is used for extracting a plurality of first key frames of the monitoring video through an interframe difference algorithm;
the screening unit is used for extracting the fingerprint character string of each first key frame based on a perceptual hash algorithm and screening the first key frames based on the fingerprint character string to obtain second key frames;
and the sending unit is used for sending the second key frame to the edge server, so that the edge server detects the abnormal behavior of the second key frame through a preset discrimination model to obtain a detection result.
As a further refinement, the extraction unit is specifically configured to:
carrying out differential operation on two or three continuous frames of video images in the monitoring video to obtain gray difference;
and judging whether the absolute value of the gray difference is larger than a first threshold value, if so, taking the continuous two-frame or three-frame video image corresponding to the gray difference as a first key frame, and if not, taking only the first frame video image in the continuous two-frame or three-frame video image corresponding to the gray difference as the first key frame.
As a further improvement, the screening unit is specifically configured to:
reducing the size of each first key frame;
graying each first key frame after being reduced to obtain a gray key frame;
comparing the pixel values of adjacent pixels in each gray key frame line by line, if the pixel value of the previous pixel is smaller than that of the next pixel, marking as 1, if the pixel value of the previous pixel is larger than or equal to that of the next pixel, marking as 0, and generating a fingerprint character string of each first key frame;
calculating the Hamming distance between the fingerprint character strings of the first key frames of two continuous frames;
and judging whether the Hamming distance is larger than a second threshold value, if so, taking the two continuous first key frames corresponding to the Hamming distance as second key frames, and if not, taking only the previous frame of the two continuous first key frames corresponding to the Hamming distance as the second key frame.
As a further improvement, the sending unit is specifically configured to:
and sending the second key frame to an edge server, so that the edge server generates a network model through preset confrontation to reconstruct the second key frame to obtain a reconstructed image, wherein the reconstructed image comprises reconstructed non-shielding construction personnel, and abnormal behavior detection is carried out on the non-shielding construction personnel in the reconstructed image through a preset discrimination model to obtain a detection result.
In the embodiment of the application, after the monitoring video is obtained, repeated video frames in the monitoring video are screened through an interframe difference algorithm and a perceptual hash algorithm, key frames are extracted, the key frames are sent to an edge server for abnormal behavior detection, the redundancy of transmitted data is reduced, the energy consumption is reduced, and the technical problems that in videos obtained by a sensor in the prior art, repeated construction pictures are more, data redundancy is caused by long-time transmission of the same video or image, the energy consumption is higher, and the service life of monitoring equipment is shorter are solved.
The embodiment of the application also provides abnormal behavior detection equipment for the building construction site, which comprises a processor and a memory;
the memory is used for storing the program codes and transmitting the program codes to the processor;
the processor is configured to execute the abnormal behavior detection method of the construction site in the foregoing method embodiment according to instructions in the program code.
The embodiment of the application also provides a computer readable storage medium, which is used for storing program codes, and the program codes are used for executing the abnormal behavior detection method of the building construction site in the method embodiment.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for executing all or part of the steps of the method described in the embodiments of the present application through a computer device (which may be a personal computer, a server, or a network device). And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (10)

1. A method of detecting abnormal behavior at a construction site, comprising:
acquiring a monitoring video of a building construction site;
extracting a plurality of first key frames of the monitoring video through an interframe difference algorithm;
extracting a fingerprint character string of each first key frame based on a perceptual hash algorithm, and screening the first key frames based on the fingerprint character string to obtain second key frames;
and sending the second key frame to an edge server, so that the edge server detects the abnormal behavior of the second key frame through a preset discrimination model to obtain a detection result.
2. The method according to claim 1, wherein the extracting a plurality of first key frames of the surveillance video by an inter-frame difference algorithm comprises:
carrying out difference operation on two or three continuous frames of video images in the monitoring video to obtain gray difference;
and judging whether the absolute value of the gray difference is larger than a first threshold value, if so, taking the continuous two-frame or three-frame video image corresponding to the gray difference as a first key frame, and if not, taking only the first frame video image in the continuous two-frame or three-frame video image corresponding to the gray difference as the first key frame.
3. The method according to claim 1, wherein the extracting fingerprint character strings of the first key frames based on perceptual hashing algorithm comprises:
reducing the size of each first key frame;
graying each first key frame after being reduced to obtain a gray key frame;
and comparing the pixel values of the adjacent pixels in each gray key frame line by line, recording as 1 if the pixel value of the previous pixel is smaller than that of the next pixel, and recording as 0 if the pixel value of the previous pixel is larger than or equal to that of the next pixel, so as to generate the fingerprint character string of each first key frame.
4. The method according to claim 1, wherein the screening the first keyframe based on the fingerprint string to obtain a second keyframe comprises:
calculating the Hamming distance between the fingerprint character strings of the first key frame of two continuous frames;
and judging whether the Hamming distance is larger than a second threshold value, if so, taking the first key frame of two continuous frames corresponding to the Hamming distance as a second key frame, and if not, taking only the previous frame of the first key frame of the two continuous frames corresponding to the Hamming distance as the second key frame.
5. The method according to claim 1, wherein the edge server performs abnormal behavior detection on the second key frame through a preset discriminant model to obtain a detection result, and the method further comprises:
the edge server reconstructs the second key frame through a preset countermeasure generation network model to obtain a reconstructed image, wherein the reconstructed image comprises reconstructed non-shielding constructors;
correspondingly, the edge server performs abnormal behavior detection on the second key frame through a preset discrimination model to obtain a detection result, including:
and the edge server detects abnormal behaviors of the non-shielding constructors in the reconstructed image through a preset discrimination model to obtain a detection result.
6. An abnormal behavior detection apparatus at a construction site, comprising:
the system comprises an acquisition unit, a monitoring unit and a monitoring unit, wherein the acquisition unit is used for acquiring a monitoring video of a building construction site;
the extraction unit is used for extracting a plurality of first key frames of the monitoring video through an interframe difference algorithm;
the screening unit is used for extracting the fingerprint character string of each first key frame based on a perceptual hash algorithm and screening the first key frames based on the fingerprint character string to obtain second key frames;
and the sending unit is used for sending the second key frame to an edge server, so that the edge server detects the abnormal behavior of the second key frame through a preset discrimination model to obtain a detection result.
7. The abnormal behavior detection apparatus of a construction site according to claim 6, wherein the extraction unit is specifically configured to:
carrying out difference operation on two or three continuous frames of video images in the monitoring video to obtain gray difference;
and judging whether the absolute value of the gray difference is larger than a first threshold value, if so, taking the continuous two-frame or three-frame video image corresponding to the gray difference as a first key frame, and if not, taking only the first frame video image in the continuous two-frame or three-frame video image corresponding to the gray difference as the first key frame.
8. The abnormal behavior detection apparatus of a construction site according to claim 6, wherein the screening unit is specifically configured to:
reducing the size of each first key frame;
graying each first key frame after being reduced to obtain a gray key frame;
comparing the pixel values of adjacent pixels in each gray key frame line by line, recording as 1 if the pixel value of the previous pixel is smaller than that of the next pixel, and recording as 0 if the pixel value of the previous pixel is greater than or equal to that of the next pixel, so as to generate a fingerprint character string of each first key frame;
calculating the Hamming distance between the fingerprint character strings of the first key frame of two continuous frames;
and judging whether the Hamming distance is larger than a second threshold value, if so, taking the first key frame of two continuous frames corresponding to the Hamming distance as a second key frame, and if not, taking only the previous frame of the first key frame of the two continuous frames corresponding to the Hamming distance as the second key frame.
9. An abnormal behavior detection apparatus at a construction site, characterized in that the apparatus comprises a processor and a memory;
the memory is used for storing program codes and transmitting the program codes to the processor;
the processor is configured to execute the method of abnormal behavior detection at a construction site according to any one of claims 1-5 according to instructions in the program code.
10. A computer-readable storage medium for storing program code for performing the method for detecting abnormal behavior at a construction site according to any one of claims 1 to 5.
CN202110435672.5A 2021-04-22 2021-04-22 Abnormal behavior detection method and related device for building construction site Pending CN113111823A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110435672.5A CN113111823A (en) 2021-04-22 2021-04-22 Abnormal behavior detection method and related device for building construction site

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110435672.5A CN113111823A (en) 2021-04-22 2021-04-22 Abnormal behavior detection method and related device for building construction site

Publications (1)

Publication Number Publication Date
CN113111823A true CN113111823A (en) 2021-07-13

Family

ID=76719392

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110435672.5A Pending CN113111823A (en) 2021-04-22 2021-04-22 Abnormal behavior detection method and related device for building construction site

Country Status (1)

Country Link
CN (1) CN113111823A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113743224A (en) * 2021-08-04 2021-12-03 国网福建省电力有限公司信息通信分公司 Ascending operator safety belt wearing monitoring method and system based on edge calculation
CN113965728A (en) * 2021-10-20 2022-01-21 深圳龙岗智能视听研究院 Double-stream video privacy protection method

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108573222A (en) * 2018-03-28 2018-09-25 中山大学 The pedestrian image occlusion detection method for generating network is fought based on cycle
CN109905675A (en) * 2019-03-13 2019-06-18 武汉大学 A kind of mine personnel monitoring system based on computer vision and method
CN110599486A (en) * 2019-09-20 2019-12-20 福州大学 Method and system for detecting video plagiarism
CN110659566A (en) * 2019-08-15 2020-01-07 重庆特斯联智慧科技股份有限公司 Target tracking method and system in shielding state
CN111369561A (en) * 2020-05-26 2020-07-03 北京小米移动软件有限公司 Image processing method and device, electronic device and storage medium
CN112183417A (en) * 2020-09-30 2021-01-05 重庆天智慧启科技有限公司 Business consultant service capability evaluation system and method
CN112333467A (en) * 2020-11-27 2021-02-05 中国船舶工业系统工程研究院 Method, system, and medium for detecting keyframes of a video
CN112507842A (en) * 2020-12-01 2021-03-16 宁波多牛大数据网络技术有限公司 Video character recognition method and device based on key frame extraction

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108573222A (en) * 2018-03-28 2018-09-25 中山大学 The pedestrian image occlusion detection method for generating network is fought based on cycle
CN109905675A (en) * 2019-03-13 2019-06-18 武汉大学 A kind of mine personnel monitoring system based on computer vision and method
CN110659566A (en) * 2019-08-15 2020-01-07 重庆特斯联智慧科技股份有限公司 Target tracking method and system in shielding state
CN110599486A (en) * 2019-09-20 2019-12-20 福州大学 Method and system for detecting video plagiarism
CN111369561A (en) * 2020-05-26 2020-07-03 北京小米移动软件有限公司 Image processing method and device, electronic device and storage medium
CN112183417A (en) * 2020-09-30 2021-01-05 重庆天智慧启科技有限公司 Business consultant service capability evaluation system and method
CN112333467A (en) * 2020-11-27 2021-02-05 中国船舶工业系统工程研究院 Method, system, and medium for detecting keyframes of a video
CN112507842A (en) * 2020-12-01 2021-03-16 宁波多牛大数据网络技术有限公司 Video character recognition method and device based on key frame extraction

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113743224A (en) * 2021-08-04 2021-12-03 国网福建省电力有限公司信息通信分公司 Ascending operator safety belt wearing monitoring method and system based on edge calculation
CN113743224B (en) * 2021-08-04 2023-05-23 国网福建省电力有限公司信息通信分公司 Method and system for monitoring wearing of safety belt of ascending operator based on edge calculation
CN113965728A (en) * 2021-10-20 2022-01-21 深圳龙岗智能视听研究院 Double-stream video privacy protection method

Similar Documents

Publication Publication Date Title
CN109118470B (en) Image quality evaluation method and device, terminal and server
Korshunov et al. Video quality for face detection, recognition, and tracking
CN111898416A (en) Video stream processing method and device, computer equipment and storage medium
CN105844238A (en) Method and system for discriminating videos
CN113111823A (en) Abnormal behavior detection method and related device for building construction site
CN112580523A (en) Behavior recognition method, behavior recognition device, behavior recognition equipment and storage medium
CN110766056A (en) Abnormal image detection method integrating image generation and multi-label classification
CN112422909B (en) Video behavior analysis management system based on artificial intelligence
CN114842424B (en) Intelligent security image identification method and device based on motion compensation
CN110096945B (en) Indoor monitoring video key frame real-time extraction method based on machine learning
CN108174198B (en) Video image quality diagnosis analysis detection device and application system
CN112883929A (en) Online video abnormal behavior detection model training and abnormal detection method and system
Ren et al. Towards efficient video detection object super-resolution with deep fusion network for public safety
CN112465798A (en) Anomaly detection method based on generation countermeasure network and memory module
CN107371026B (en) video data multiple compression and reconstruction method
Bora et al. Human suspicious activity detection system using CNN model for video surveillance
Hu et al. UAV image high fidelity compression algorithm based on generative adversarial networks under complex disaster conditions
CN114445663A (en) Method, apparatus and computer program product for detecting challenge samples
CN113591681A (en) Face detection and protection method and device, electronic equipment and storage medium
CN111565303B (en) Video monitoring method, system and readable storage medium based on fog calculation and deep learning
CN111582031B (en) Multi-model collaborative violence detection method and system based on neural network
Liu et al. Visual privacy-preserving level evaluation for multilayer compressed sensing model using contrast and salient structural features
CN113012033A (en) Method, device and system for image display processing
CN112532999A (en) Digital video frame deletion tampering detection method based on deep neural network
CN111476117A (en) Safety helmet wearing detection method and device and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination