CN113450522A - Video cable mixing intrusion detection method, electronic device and storage medium - Google Patents

Video cable mixing intrusion detection method, electronic device and storage medium Download PDF

Info

Publication number
CN113450522A
CN113450522A CN202110590119.9A CN202110590119A CN113450522A CN 113450522 A CN113450522 A CN 113450522A CN 202110590119 A CN202110590119 A CN 202110590119A CN 113450522 A CN113450522 A CN 113450522A
Authority
CN
China
Prior art keywords
detection result
mixing
line
touch
wire
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110590119.9A
Other languages
Chinese (zh)
Other versions
CN113450522B (en
Inventor
魏紫薇
徐狄权
刘溯
蒲涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Dahua Technology Co Ltd
Original Assignee
Zhejiang Dahua Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Dahua Technology Co Ltd filed Critical Zhejiang Dahua Technology Co Ltd
Priority to CN202110590119.9A priority Critical patent/CN113450522B/en
Publication of CN113450522A publication Critical patent/CN113450522A/en
Application granted granted Critical
Publication of CN113450522B publication Critical patent/CN113450522B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19606Discriminating between target movement or movement in an area of interest and other non-signicative movements, e.g. target movements induced by camera shake or movements of pets, falling leaves, rotating fan
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

The application relates to a video cable mixing intrusion detection method, an electronic device and a storage medium, wherein the video cable mixing intrusion detection method comprises the following steps: acquiring a first detection result aiming at a first wire mixing and a second detection result aiming at a second wire mixing, wherein the first wire mixing and the second wire mixing are arranged at the security and protection perimeter in the monitoring video at intervals; according to the method and the device, whether the video accompanying line invasion action occurs or not is judged according to whether the first detection result, the second detection result and the relation between the first detection result and the second detection result meet corresponding preset conditions or not, and if yes, decision making and alarming are carried out.

Description

Video cable mixing intrusion detection method, electronic device and storage medium
Technical Field
The present application relates to the field of cable mixing detection, and in particular, to a method and an apparatus for detecting intrusion of a video cable mixing, an electronic apparatus, and a storage medium.
Background
With the increasing amount of monitoring data, monitoring personnel need to spend a lot of time to manually filter the data and select useful video information from the data, and the tedious and repeated work often makes the monitoring personnel unconscious. There is a pressing need for a product that is easier to work with and easier to operate and manage by monitoring personnel to replace the existing systems. Therefore, the intelligent video technology is produced at the same time and enters the life of people. Intelligent video introduces computer vision methods into intelligent monitoring. This technology includes the automatic detection of moving or still objects, object classification and behavioral understanding from a sequence of video images in order to create a mapping between the images and the image descriptions, thereby enabling a computer to analyze and understand the content in the video frames. The mixed line target detection technology is an important technology in intelligent video analysis, and has wide application prospects in the applications of intrusion detection, people flow statistics and the like.
The existing line-mixing detection method mainly comprises the steps of marking a line-mixing line in a video, and determining whether a target crosses a set warning line by judging whether a target detection frame in the video touches the line-mixing line, but grass, leaves and the like can touch the line-mixing line when wind blows in the environment in the scenes of grasslands, leaves and the like, and under the conditions, the traditional line-mixing detection method is easy to cause false alarm.
At present, an effective solution is not provided aiming at the problem of easily causing false alarm in the related technology.
Disclosure of Invention
The embodiment of the application provides a video cable mixing intrusion detection method, an electronic device and a storage medium, so as to at least solve the problem of easily causing false alarm in the related technology.
In a first aspect, an embodiment of the present application provides a video cable mixing intrusion detection method, including:
acquiring a first detection result aiming at a first wire mixing and a second detection result aiming at a second wire mixing, wherein the first wire mixing and the second wire mixing are arranged at a security and protection perimeter in a monitoring video at intervals;
and judging whether a video wire mixing invasion action occurs according to whether the first detection result, the second detection result and the relation between the first detection result and the second detection result meet corresponding preset conditions, and if so, performing decision-making alarm.
In some embodiments, the first detection result and/or the second detection result comprises at least one of: whether touch occurs, the characteristics of the touch target, the touch time and the touch direction.
In some embodiments, the determining whether the video cable-scrambling intrusion behavior occurs according to whether the first detection result, the second detection result, and the relationship between the first detection result and the second detection result satisfy the corresponding preset conditions includes:
judging whether the first detection result and the second detection result meet a first preset condition or not; and if so, judging whether the video cable mixing invasion action occurs according to whether the relation between the first detection result and the second detection result meets a second preset condition.
In some of these embodiments, the first preset condition includes: the first detection result comprises that the first wire mixing is touched, and the second detection result comprises that the second wire mixing is touched.
In some of these embodiments, the second preset condition includes at least one of:
the characteristics of the touch target in the first detection result are consistent with those of the touch target in the second detection result;
the time interval between the touch time in the first detection result and the touch time in the second detection result is less than or equal to a time threshold;
the touch direction in the first detection result is consistent with the touch direction in the second detection result, wherein the touch direction comprises a first touch direction and a second touch direction, the first touch direction is a direction in which the first wire mixing direction is towards the second wire mixing direction, and the second touch direction is a direction in which the second wire mixing direction is towards the first wire mixing direction.
In some of these embodiments, the time threshold is equal to or less than 30 seconds.
In some embodiments, before the obtaining the first detection result for the first wire mixing and the second detection result for the second wire mixing, the method further comprises:
a first stirring line and a second stirring line are arranged at a security and protection perimeter in a monitoring video, and the first stirring line and the second stirring line are associated.
In some embodiments, the setting of the first mixing line and the second mixing line in the monitoring video specifically includes:
and setting the first mixing line and the second mixing line according to the size proportional relation between the monitoring video and the actual scene, so that the distance between the first mixing line and the second mixing line meets the condition that the distance between the position corresponding to the first mixing line and the position corresponding to the second mixing line in the actual scene is more than 0 meter and less than 4 meters.
In some embodiments, the first mixing line and the second mixing line are arranged in parallel.
In a second aspect, an embodiment of the present application provides an electronic device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor executes the computer program to implement the method for detecting intrusion of a video cable according to the first aspect.
In a third aspect, an embodiment of the present application provides a storage medium, on which a computer program is stored, and when the program is executed by a processor, the method for detecting a video cable intrusion according to the first aspect is implemented.
Compared with the related art, the video cable mixing intrusion detection method, the electronic device and the storage medium provided by the embodiment of the application have the advantages that a first detection result for a first cable mixing and a second detection result for a second cable mixing are obtained, wherein the first cable mixing and the second cable mixing are arranged at intervals at a security and protection perimeter in a monitoring video; whether the first detection result, the second detection result and the relation between the first detection result and the second detection result meet corresponding preset conditions or not is judged, decision-making alarm is carried out according to the judgment result, the problem that false alarm is easily caused during wire mixing intrusion detection is solved, and intrusion target detection is realized and corresponding alarm is triggered according to the detection result.
The details of one or more embodiments of the application are set forth in the accompanying drawings and the description below to provide a more thorough understanding of the application.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a block diagram of a hardware structure of an application terminal of a video cable mixing intrusion detection method according to an embodiment of the present application;
FIG. 2 is a flow chart of a method for detecting a garbled video intrusion according to an embodiment of the present application;
FIG. 3 is a flow chart of yet another method for video cable-around intrusion detection according to an embodiment of the present application;
FIG. 4 is a flow chart of yet another method for detecting a garbled video intrusion according to an embodiment of the present application;
fig. 5 is a flow chart of another method for detecting a whistling intrusion of a video cable according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be described and illustrated below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments provided in the present application without any inventive step are within the scope of protection of the present application. Moreover, it should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which may vary from one implementation to another.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the specification. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of ordinary skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments without conflict.
Unless defined otherwise, technical or scientific terms referred to herein shall have the ordinary meaning as understood by those of ordinary skill in the art to which this application belongs. Reference to "a," "an," "the," and similar words throughout this application are not to be construed as limiting in number, and may refer to the singular or the plural. The present application is directed to the use of the terms "including," "comprising," "having," and any variations thereof, which are intended to cover non-exclusive inclusions; for example, a process, method, system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to the listed steps or elements, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. Reference to "connected," "coupled," and the like in this application is not intended to be limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. Reference herein to "a plurality" means greater than or equal to two. "and/or" describes an association relationship of associated objects, meaning that three relationships may exist, for example, "A and/or B" may mean: a exists alone, A and B exist simultaneously, and B exists alone. Reference herein to the terms "first," "second," "third," and the like, are merely to distinguish similar objects and do not denote a particular ordering for the objects.
The method provided by the embodiment can be executed in a terminal, a computer or a similar operation device. Taking the example of the application running on a terminal, fig. 1 is a block diagram of a hardware structure of an application terminal of the video cable mixing intrusion detection method according to the embodiment of the present application. As shown in fig. 1, the terminal may include one or more (only one shown in fig. 1) processors 102 (the processor 102 may include, but is not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA) and a memory 104 for storing data, and optionally, a transmission device 106 for communication functions and an input-output device 108. It will be understood by those skilled in the art that the structure shown in fig. 1 is only an illustration and is not intended to limit the structure of the terminal. For example, the terminal may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1.
The memory 104 may be used to store a computer program, for example, a software program and a module of an application software, such as a computer program corresponding to the video cable intrusion detection method in the embodiment of the present invention, and the processor 102 executes various functional applications and data processing by running the computer program stored in the memory 104, so as to implement the method described above. The memory 104 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory located remotely from the processor 102, which may be connected to the terminal over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device 106 is used to receive or transmit data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of the terminal. In one example, the transmission device 106 includes a Network adapter (NIC) that can be connected to other Network devices through a base station to communicate with the internet. In one example, the transmission device 106 may be a Radio Frequency (RF) module, which is used to communicate with the internet in a wireless manner.
Fig. 2 is a flowchart of a method for detecting mixed video cable intrusion according to an embodiment of the present application, and as shown in fig. 2, the flowchart includes the following steps:
step S201, a first detection result for a first wire mixing and a second detection result for a second wire mixing are obtained, where the first wire mixing and the second wire mixing are arranged at intervals at a security perimeter in a monitored video.
In a cell monitoring scene, in order to ensure the safety of residents in a cell, a mixing line is arranged at a cell fence in a monitoring video to detect people invading the cell, and in order to avoid the influence of branches, leaves and grass at the cell fence on detection, a first mixing line and a second mixing line are arranged at intervals at the cell fence in the monitoring video.
Step S202, judging whether the video trace invasion action occurs according to whether the first detection result, the second detection result and the relation between the first detection result and the second detection result meet corresponding preset conditions, and if so, performing decision-making alarm.
If the first mixing line and the second mixing line are arranged at the fence of the community in the monitoring video at intervals, and a person is found to touch the first mixing line and the second mixing line, the person sequentially passes through the first mixing line and the second mixing line from one side of the first mixing line, and the time interval of the person passing through the two mixing lines is smaller than the set time interval, the person is judged to invade the community, and an alarm is triggered to inform residents and police in the community.
Through the steps S201 to S202, a first detection result for a first cable mixing and a second detection result for a second cable mixing are obtained, wherein the first cable mixing and the second cable mixing are arranged at intervals at a security and protection perimeter in a monitoring video; whether the first detection result, the second detection result and the relation between the first detection result and the second detection result meet corresponding preset conditions or not is judged, decision-making alarm is carried out according to the judgment result, the problem that false alarm is easily caused during wire mixing intrusion detection is solved, and intrusion target detection is realized and corresponding alarm is triggered according to the detection result.
In some embodiments, the first detection result and/or the second detection result comprises at least one of: whether touch occurs, the characteristics of the touch target, the touch time and the touch direction.
In some embodiments, the step S202 of determining whether the video cable intrusion behavior occurs according to whether the first detection result, the second detection result, and the relationship between the first detection result and the second detection result satisfy the corresponding preset conditions includes the following steps:
step S2020, determining whether the first detection result and the second detection result satisfy a first preset condition;
step S2021, if yes, determining whether a video cable-mixing intrusion behavior occurs according to whether a relationship between the first detection result and the second detection result satisfies a second preset condition.
Through the steps, under the condition that the first detection result and the second detection result meet the first preset condition, whether the relation between the first detection result and the second detection result meets the second preset condition or not is judged, if the relation between the first detection result and the second detection result meets the second preset condition, the video wire mixing invasion behavior is shown, the invasion target is detected through the association of two wire mixing, the influence of branches, leaves and grass of wire mixing accessories on the detection result is avoided, and the false alarm when the target is detected through one wire mixing is reduced.
In some of these embodiments, the first preset condition includes: the first detection result comprises that the first wire mixing is touched, and the second detection result comprises that the second wire mixing is touched.
In this embodiment, if one of the first wire mixing line and the second wire mixing line is not touched, it is not determined whether the first detection result and the second detection result satisfy the second preset condition, and further the alarm is not triggered.
In some of these embodiments, the second preset condition includes at least one of:
the characteristics of the touch target in the first detection result are consistent with those of the touch target in the second detection result;
the time interval between the touch time in the first detection result and the touch time in the second detection result is less than or equal to a time threshold;
the touch direction in the first detection result is consistent with the touch direction in the second detection result, wherein the touch direction includes a first touch direction and a second touch direction, the first touch direction is a direction in which the first wire mixing faces the second wire mixing, and the second touch direction is a direction in which the second wire mixing faces the first wire mixing.
In this embodiment, if the characteristics of the touch target in the first detection result are the same as the characteristics of the touch target in the second detection result, it indicates that the same intrusion target triggers the first wire mixing and the second wire mixing.
In some embodiments, whether the relationship between the first detection result and the second detection result satisfies the second predetermined condition includes the following steps:
in step S210, it is determined whether the characteristics of the touch target in the first detection result are consistent with the characteristics of the touch target in the second detection result, if yes, the process proceeds to step S211.
In step S211, it is determined that the time interval between the touch time in the first detection result and the touch time in the second detection result is less than or equal to the time threshold, if yes, the process proceeds to step S212.
Step S212, alarm is triggered.
Through the steps, the alarm is triggered under the condition that the relation between the first detection result and the second detection result is judged to meet the second preset condition, and the generation of false alarm is reduced.
Alternatively, whether the relationship between the first detection result and the second detection result satisfies the second predetermined condition includes the following steps:
in step S220, it is determined whether the characteristics of the touch target in the first detection result are consistent with the characteristics of the touch target in the second detection result, if yes, the process proceeds to step S221.
Step S221, determining that the touch direction in the first detection result is consistent with the touch direction in the second detection result, if yes, entering step S222.
Step S222, triggering an alarm.
Through the steps, the alarm is triggered under the condition that the relation between the first detection result and the second detection result is judged to meet the second preset condition, and the generation of false alarm is reduced.
In some embodiments, whether the relationship between the first detection result and the second detection result satisfies the second predetermined condition includes the following steps:
in step S230, it is determined whether the characteristics of the touch target in the first detection result are consistent with the characteristics of the touch target in the second detection result, if yes, the process proceeds to step S231.
In step S231, it is determined that the time interval between the touch time in the first detection result and the touch time in the second detection result is less than or equal to the time threshold, and if yes, the process proceeds to step S232.
In step S232, it is determined that the touch direction in the first detection result is the same as the touch direction in the second detection result, and if yes, the process proceeds to step S233.
And step S233, triggering an alarm.
Through the steps, the alarm is triggered under the condition that the relation between the first detection result and the second detection result is judged to meet the second preset condition, and the generation of false alarm is reduced.
It should be noted that, in the above embodiments, the order of the steps is listed for illustration only, and this should not be construed as a limitation to the technical solution of the present application. In practical applications, the steps of determining may be performed in any order, that is, the order of performing steps S230 to S232 is not limited, for example, step S232 may be performed before step S231; similarly, the execution sequence between step S210 and step S211 and the execution sequence between step S220 and step S221 are not limited.
In some of these embodiments, the time threshold is equal to or less than 30 seconds.
In some embodiments, before obtaining the first detection result for the first swizzle line and the second detection result for the second swizzle line, the method further comprises: a first mixing line and a second mixing line are arranged at the security and protection perimeter in the monitoring video, and the first mixing line and the second mixing line are associated.
Through the mode, the two mixing lines are arranged in the monitoring video and are associated, and preparation is made for intrusion target detection according to the two mixing lines subsequently.
In some embodiments, the setting of the first mixing line and the second mixing line in the monitoring video specifically includes:
according to the size proportional relation between the monitoring video and the actual scene, a first mixing line and a second mixing line are arranged, so that the distance between the first mixing line and the second mixing line meets the condition that the distance between the position corresponding to the first mixing line and the position corresponding to the second mixing line in the actual scene is larger than 0 meter and smaller than 4 meters.
In a cell monitoring scene, in order to ensure the safety of residents in a cell, a wire mixing is arranged at a cell fence in a monitoring video to detect people invading the cell, in order to avoid the influence of branches, leaves and grass at the cell fence on detection, the influence range of the branches, leaves and grass is 2 meters, a person A is in the monitoring video, the height of the person A in the monitoring video is H, the height of the person A in the actual scene is H, the size proportional relation between the monitoring video and the actual scene is calculated according to the H and the H, and the distance between a first wire mixing and a second wire mixing in the monitoring video is obtained by multiplying the size proportional relation between the corresponding monitoring video and the actual scene by 2 meters.
Through the mode, the distance between the first mixing line and the second mixing line in the monitoring video can be set according to the actual monitoring scene.
In some embodiments, the first mixing line and the second mixing line are arranged in parallel.
Fig. 3 is a flowchart of another video cable mixing intrusion detection method according to an embodiment of the present application, and as shown in fig. 3, the flowchart includes the following steps:
step S301, a first mixing line and a second mixing line are arranged at the security and protection perimeter in the monitoring video, and the first mixing line and the second mixing line are related.
According to the size proportion relation of the monitoring video and the actual scene, a first mixing line and a second mixing line are arranged, so that the distance between the first mixing line and the second mixing line meets the condition that the distance between the position corresponding to the first mixing line and the position corresponding to the second mixing line in the actual scene is larger than 0 meter and smaller than 4 meters, and the enabling of the first mixing line and the enabling of the second mixing line are related, wherein the arrangement directions of the first mixing line and the second mixing line are parallel.
In step S302, a first detection result for the first wire mixing and a second detection result for the second wire mixing are obtained.
The first detection result and/or the second detection result comprises at least one of the following: whether touch occurs, the characteristics of the touch target, the touch time and the touch direction.
Step S303, determining whether the first detection result and the second detection result satisfy a first predetermined condition.
The first preset condition includes: the first detection result comprises that the first wire mixing is touched, and the second detection result comprises that the second wire mixing is touched.
If the first detection result and the second detection result satisfy the first predetermined condition, the method proceeds to step S304, and if not, the method proceeds to step S306.
In step S304, it is determined whether the relationship between the first detection result and the second detection result satisfies a second predetermined condition.
The second preset condition includes at least one of:
(1) the characteristics of the touch target in the first detection result are consistent with the characteristics of the touch target in the second detection result.
(2) The time interval between the touch moment in the first detection result and the touch moment in the second detection result is less than or equal to a time threshold, wherein the time threshold is less than or equal to 30 seconds.
(3) The touch direction in the first detection result is consistent with the touch direction in the second detection result, wherein the touch direction includes a first touch direction and a second touch direction, the first touch direction is a direction in which the first wire mixing faces the second wire mixing, and the second touch direction is a direction in which the second wire mixing faces the first wire mixing.
If the relationship between the first detection result and the second detection result satisfies the second predetermined condition, the process proceeds to step S305, and if not, the process proceeds to step S306.
Step S305, an alarm is generated.
And step S306, ending the video cable mixing detection process.
Through the steps, a first detection result aiming at the first wire mixing and a second detection result aiming at the second wire mixing are obtained, whether the first detection result, the second detection result and the relation between the first detection result and the second detection result meet corresponding preset conditions or not is judged, decision alarm is carried out according to the judgment result, the problem of false alarm easily caused during wire mixing intrusion detection is solved, and the detection of an intrusion target and the triggering of corresponding alarm according to the detection result are realized.
Fig. 4 is a flowchart of another video cable mixing intrusion detection method according to an embodiment of the present application, and as shown in fig. 4, the flowchart includes the following steps:
step S401, setting intrusion rules of two mixing lines.
The method comprises the steps of obtaining a monitoring video through a camera, drawing two stirring lines in the monitoring video according to the perimeter position of security protection, wherein the two stirring lines are a first stirring line and a second stirring line respectively, and the size range of an invasion target is set.
In step S402, it is determined whether the enable associated with the two scramble lines is on, and if so, the process proceeds to step S403, and if not, the process proceeds to step S408.
The two mixing lines are associated through one enable, so that the detection result of the first mixing line and the detection result of the second mixing line can be obtained, and preparation is made for judging whether to alarm or not according to the detection results of the two mixing lines and the combination relation between the two mixing lines.
And step S403, setting a combination rule between the two mixing lines.
The combination rule between the two mixed lines comprises a time interval between the target crossing the first mixed line and the second mixed line and a direction relation between the target crossing the two mixed lines, the direction relation between the target crossing the two mixed lines comprises that the direction of the target crossing the first mixed line is consistent with the direction of the target crossing the second mixed line and the direction of the target crossing the first mixed line is inconsistent with the direction of the target crossing the second mixed line, and the directions of the two mixed lines comprise the left side of the mixed line and the right side of the mixed line.
Step S404, judging whether the target passes through the first wire mixing according to the intrusion rule, if so, entering step S405, and if not, entering step S408.
Detecting a target in a surveillance video based on a deep learning algorithm, identifying a target detection frame in the surveillance video, judging whether the target detection frame is in a set size range or not when the target detection frame is found to be in touch with a set first blending line, if so, entering step S405, and if not, entering step S408.
Step S405, judging whether the target passes through the second wire mixing according to the intrusion rule, if so, entering step S406, and if not, entering step S408.
Detecting a target in the surveillance video based on a deep learning algorithm, identifying a target detection frame in the surveillance video, judging whether the target detection frame is in a set size range or not when the target detection frame is found to be in touch with a set second blending line, if so, entering step S406, and if not, entering step S408.
Step S406, determining whether the relationship between the first wire-mixing detection result and the second wire-mixing detection result satisfies a combination rule between the two, if yes, going to step S407, otherwise, going to step S408.
And if the target passes through the first mixed line and the second mixed line, judging whether the direction of the target passing through the first mixed line is consistent with the direction of the target passing through the second mixed line, if so, judging whether the time interval of the target passing through the two mixed lines is smaller than a set threshold value S, determining the threshold value S according to the distance between the two mixed lines in the actual monitoring picture and the advancing speed of the target, if so, entering a step S407, and if not, entering a step S408.
Step S407, an alarm is generated.
Step S408, the video cable mixing detection process is ended.
And (5) indicating that the target does not meet the alarm condition, and ending the video wire mixing detection process.
Assuming that people A and B appear in a camera picture, setting in advance that an alarm is generated when A crosses the left side of a first mixed line, A crosses the left side of a second mixed line and the time interval between the A crossing the first mixed line and the second mixed line is less than 8 seconds, setting that an alarm is generated when B crosses the right side of the first mixed line, B crosses the right side of the second mixed line and the time interval between the B crossing the first mixed line and the second mixed line is less than 8 seconds, and avoiding the alarm when a person crosses the two mixed lines and meets the following conditions:
(1) a passes through the left side of the first mixing line, and A does not pass through the second mixing line, so that no alarm is generated.
(2) A passes through the left side of the first mixing line, then A passes through the left side of the second mixing line, the interval time is more than 8 seconds, and no alarm is generated.
(3) A passes through the right of the first mixing line, and then A passes through the right of the second mixing line, no alarm is generated no matter how many intervals are.
(4) B passes through the left side of the first mixing line, and then B passes through the left side of the second mixing line, and no alarm is generated no matter how long the interval time is.
(5) B passes through the right side of the first mixing line, then B passes through the right side of the second mixing line, the interval time is more than 8 seconds, and no alarm is generated.
(6) B passes through the right side of the first mixing line, B does not pass through the second mixing line, and no alarm is generated.
Through the steps, two stirring lines are arranged according to the actual security and protection perimeter, and under the condition that the target simultaneously passes through the first stirring line and the second stirring line, if the direction of the target passing through the two stirring lines is consistent and the time interval between the target passing through the first stirring line and the second stirring line in sequence meets the preset threshold value S, an alarm is sent out, so that the linkage alarm between the two stirring lines is realized, and the false alarm is reduced.
Fig. 5 is a flowchart of another video cable mixing intrusion detection method according to an embodiment of the present application, and as shown in fig. 5, the flowchart includes the following steps:
step 501, setting an intrusion rule of three mixing lines.
The method comprises the steps of obtaining a monitoring video through a camera, drawing three mixing lines in the monitoring video according to the perimeter position of security protection, respectively setting a first mixing line, a second mixing line and a third mixing line according to the sequence that a target passes through the mixing lines, and setting intrusion rules of the first mixing line, the second mixing line and the third mixing line, wherein the intrusion rules include that the size range of an intruded target is set to be P.
Step S502 determines whether the enable associated with the three wire mixes is on, if so, the process proceeds to step S503, and if not, the process proceeds to step S509.
The three wire mixing lines are associated through one enable, so that the detection result of the first wire mixing line, the detection result of the second wire mixing line and the detection result of the third wire mixing line can be obtained, and preparation is made for judging whether to alarm or not according to the detection results of the three wire mixing lines and the combination relation among the three wire mixing lines.
Step S503, a combination rule among the three mixing lines is set.
The combination rule among the three mixed lines comprises a time interval when the target passes through the first mixed line and the second mixed line, a time interval when the target passes through the second mixed line and the third mixed line and a direction relation when the target passes through the three mixed lines, wherein the direction relation when the target passes through the three mixed lines comprises that the direction of the target passing through the three mixed lines is consistent and the direction of the target passing through the three mixed lines is inconsistent, and the directions of the three mixed lines comprise the left side of the mixed lines and the right side of the mixed lines.
Step S504 is to determine whether the target crosses the first wire mixing according to the intrusion rule, if yes, step S505 is performed, and if no, step S509 is performed.
Detecting a target in a surveillance video based on a deep learning algorithm, identifying a target detection frame in the surveillance video, setting the size range of the invaded target to be P, judging whether the size of the invaded target is in the range P or not when the target detection frame is found to be touched with a set first mixed line, if so, entering step S505, and if not, entering step S509.
Step S505, according to the intrusion rule, determines whether the target crosses the second wire mixing, if yes, the process goes to step S506, and if no, the process goes to step S509.
When the target detection frame is touched with the set second wire, whether the size of the invaded target is within the range P is judged, if yes, the step S506 is executed, and if not, the step S509 is executed.
Step S506, determining whether the target crosses the third wire mixing according to the intrusion rule, if yes, going to step S507, and if no, going to step S509.
When the target detection frame is touched with the set third wire, whether the size of the invaded target is within the range P is judged, if yes, the step S507 is executed, and if not, the step S509 is executed.
In step S507, it is determined whether the relationship between the first wire mixing detection result and the second wire mixing detection result satisfies a combination rule between the two, if yes, the process proceeds to step S508, and if no, the process proceeds to step S509.
Under the condition that the target passes through the first mixed line, the second mixed line and the third mixed line, judging whether the direction of the target passing through the first mixed line is consistent with the direction of the target passing through the second mixed line and whether the direction of the target passing through the second mixed line is consistent with the direction of the target passing through the third mixed line, if the direction of the target passing through the first mixed line is consistent with the direction of the target passing through the second mixed line and the direction of the target passing through the second mixed line is consistent with the direction of the target passing through the third mixed line, judging whether the time interval of the target passing through the first mixed line and the second mixed line is smaller than a set first threshold value and whether the time interval of the target passing through the second mixed line and the third mixed line is smaller than a set second threshold value, wherein the first threshold value is determined according to the distance between the first mixed line and the second mixed line in the actual monitoring picture and the traveling speed of the target, and the second threshold value is determined according to the distance between the second mixed line and the third mixed line in the actual monitoring picture and the traveling speed of the target, if the time interval that the target passes through the first wire mixing and the second wire mixing is smaller than the set first threshold value and the time interval that the target passes through the second wire mixing and the third wire mixing is smaller than the set second threshold value, the step S508 is entered, and if not, the step S509 is entered.
Step S508, an alarm is generated.
In step S509, the video-blending detection process is ended.
And (5) indicating that the target does not meet the alarm condition, and ending the video wire mixing detection process.
Through the steps, three stirring lines are arranged according to the actual security perimeter, and under the condition that the judgment target simultaneously passes through the first stirring line, the second stirring line and the third stirring line, if the judgment target passes through the three stirring lines in the same direction, the time interval between the first stirring line and the second stirring line which are sequentially passed through by the judgment target meets the preset first threshold value, and the time interval between the second stirring line and the third stirring line which are sequentially passed through by the judgment target meets the preset second threshold value, an alarm is given, the linkage alarm among the three stirring lines is realized, and the false alarm is reduced.
The present embodiment also provides an electronic device comprising a memory having a computer program stored therein and a processor configured to execute the computer program to perform the steps of any of the above method embodiments.
Optionally, the electronic apparatus may further include a transmission device and an input/output device, wherein the transmission device is connected to the processor, and the input/output device is connected to the processor.
Optionally, in this embodiment, the processor may be configured to execute the following steps by a computer program:
and acquiring a first detection result aiming at the first wire mixing and a second detection result aiming at the second wire mixing, wherein the first wire mixing and the second wire mixing are arranged at the security and protection perimeter in the monitoring video at intervals.
And judging whether the first detection result, the second detection result and the relation between the first detection result and the second detection result meet corresponding preset conditions or not, and performing decision-making alarm according to the judgment result.
It should be noted that, for specific examples in this embodiment, reference may be made to examples described in the foregoing embodiments and optional implementations, and details of this embodiment are not described herein again.
In addition, in combination with the video cable mixing intrusion detection method in the foregoing embodiment, the embodiment of the present application may provide a storage medium to implement. The storage medium having stored thereon a computer program; the computer program, when executed by a processor, implements any of the above-described embodiments of a method for video cable intrusion detection.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
It should be understood by those skilled in the art that various features of the above embodiments can be combined arbitrarily, and for the sake of brevity, all possible combinations of the features in the above embodiments are not described, but should be considered as within the scope of the present disclosure as long as there is no contradiction between the combinations of the features.
The above examples only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (11)

1. A video cable mixing intrusion detection method is characterized by comprising the following steps:
acquiring a first detection result aiming at a first wire mixing and a second detection result aiming at a second wire mixing, wherein the first wire mixing and the second wire mixing are arranged at a security and protection perimeter in a monitoring video at intervals;
and judging whether the video accompanying line invasion behavior occurs or not according to whether the first detection result, the second detection result and the relation between the first detection result and the second detection result meet corresponding preset conditions or not, and if so, performing decision-making alarm.
2. The method of claim 1, wherein the first detection result and/or the second detection result comprises at least one of: whether touch occurs, the characteristics of the touch target, the touch time and the touch direction.
3. The method of claim 1, wherein determining whether a video satellite line intrusion behavior occurs according to whether the first detection result, the second detection result, and a relationship between the first detection result and the second detection result satisfy corresponding preset conditions comprises:
judging whether the first detection result and the second detection result meet a first preset condition or not; and if so, judging whether the video cable mixing invasion action occurs according to whether the relation between the first detection result and the second detection result meets a second preset condition.
4. The video cable mixing intrusion detection method according to claim 3, wherein the first preset condition includes: the first detection result comprises that the first wire mixing is touched, and the second detection result comprises that the second wire mixing is touched.
5. The video cable intrusion detection method of claim 3, wherein the second predetermined condition comprises at least one of:
the characteristics of the touch target in the first detection result are consistent with those of the touch target in the second detection result;
the time interval between the touch time in the first detection result and the touch time in the second detection result is less than or equal to a time threshold;
the touch direction in the first detection result is consistent with the touch direction in the second detection result, wherein the touch direction comprises a first touch direction and a second touch direction, the first touch direction is a direction in which the first wire mixing direction is towards the second wire mixing direction, and the second touch direction is a direction in which the second wire mixing direction is towards the first wire mixing direction.
6. The video cable intrusion detection method of claim 5, wherein the time threshold is less than or equal to 30 seconds.
7. The method of claim 1, wherein prior to the obtaining the first detection result for the first wire scramble and the second detection result for the second wire scramble, the method further comprises:
a first stirring line and a second stirring line are arranged at a security and protection perimeter in a monitoring video, and the first stirring line and the second stirring line are associated.
8. The method for detecting the intrusion of the video cable mixer according to claim 7, wherein the step of setting a first cable mixer and a second cable mixer in the monitoring video specifically comprises the steps of:
and setting the first mixing line and the second mixing line according to the size proportional relation between the monitoring video and the actual scene, so that the distance between the first mixing line and the second mixing line meets the condition that the distance between the position corresponding to the first mixing line and the position corresponding to the second mixing line in the actual scene is more than 0 meter and less than 4 meters.
9. The method of claim 1, wherein the first cable blend is disposed in a direction parallel to a direction of the second cable blend.
10. An electronic device comprising a memory and a processor, wherein the memory stores a computer program, and the processor is configured to execute the computer program to perform the video cable intrusion detection method of any one of claims 1 to 8.
11. A storage medium having a computer program stored thereon, wherein the computer program is configured to perform the method of video cable intrusion detection according to any one of claims 1 to 8 when the computer program is run.
CN202110590119.9A 2021-05-28 2021-05-28 Video cable mixing intrusion detection method, electronic device and storage medium Active CN113450522B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110590119.9A CN113450522B (en) 2021-05-28 2021-05-28 Video cable mixing intrusion detection method, electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110590119.9A CN113450522B (en) 2021-05-28 2021-05-28 Video cable mixing intrusion detection method, electronic device and storage medium

Publications (2)

Publication Number Publication Date
CN113450522A true CN113450522A (en) 2021-09-28
CN113450522B CN113450522B (en) 2022-10-04

Family

ID=77810391

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110590119.9A Active CN113450522B (en) 2021-05-28 2021-05-28 Video cable mixing intrusion detection method, electronic device and storage medium

Country Status (1)

Country Link
CN (1) CN113450522B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1444008A (en) * 2002-03-13 2003-09-24 欧姆龙株式会社 Three-dimensional monitor device
US20080036597A1 (en) * 2003-08-01 2008-02-14 Senstar-Stellar Corporation Cable Guided Intrusion Detection Sensor, System and Method
CN103152554A (en) * 2013-03-08 2013-06-12 浙江宇视科技有限公司 Intelligent moving target tracking device
CN104902246A (en) * 2015-06-17 2015-09-09 浙江大华技术股份有限公司 Video monitoring method and device
CN104992149A (en) * 2015-06-24 2015-10-21 福建星网锐捷安防科技有限公司 Mixing line detection method, mixing line detection system, network video camera and monitoring system
CN105389920A (en) * 2015-11-30 2016-03-09 北京正安维视科技股份有限公司 Perimeter alarm method based on two-dimensional laser radar and video analysis
US20170263090A1 (en) * 2016-03-11 2017-09-14 EMC IP Holding Company LLC Method and apparatus for video surveillance
US20190304275A1 (en) * 2018-03-29 2019-10-03 Kyocera Document Solutions Inc. Control device and monitoring system
US20190310592A1 (en) * 2018-04-09 2019-10-10 Diveplane Corporation Computer based reasoning and artificial intelligence systems

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1444008A (en) * 2002-03-13 2003-09-24 欧姆龙株式会社 Three-dimensional monitor device
US20080036597A1 (en) * 2003-08-01 2008-02-14 Senstar-Stellar Corporation Cable Guided Intrusion Detection Sensor, System and Method
CN103152554A (en) * 2013-03-08 2013-06-12 浙江宇视科技有限公司 Intelligent moving target tracking device
CN104902246A (en) * 2015-06-17 2015-09-09 浙江大华技术股份有限公司 Video monitoring method and device
CN104992149A (en) * 2015-06-24 2015-10-21 福建星网锐捷安防科技有限公司 Mixing line detection method, mixing line detection system, network video camera and monitoring system
CN105389920A (en) * 2015-11-30 2016-03-09 北京正安维视科技股份有限公司 Perimeter alarm method based on two-dimensional laser radar and video analysis
US20170263090A1 (en) * 2016-03-11 2017-09-14 EMC IP Holding Company LLC Method and apparatus for video surveillance
US20190304275A1 (en) * 2018-03-29 2019-10-03 Kyocera Document Solutions Inc. Control device and monitoring system
US20190310592A1 (en) * 2018-04-09 2019-10-10 Diveplane Corporation Computer based reasoning and artificial intelligence systems

Also Published As

Publication number Publication date
CN113450522B (en) 2022-10-04

Similar Documents

Publication Publication Date Title
KR101825045B1 (en) Alarm method and device
CN103270536B (en) Stopped object detection
CN112733690B (en) High-altitude parabolic detection method and device and electronic equipment
CN111083435A (en) Security monitoring method and device and computer readable storage medium
CN111339997B (en) Fire point area determination method and device, storage medium and electronic device
CN109377694B (en) Monitoring method and system for community vehicles
CN111160175A (en) Intelligent pedestrian violation behavior management method and related product
CN110659391A (en) Video detection method and device
CN113420748A (en) Method and device for detecting illegal driving of vehicle, electronic equipment and storage medium
CN112017323A (en) Patrol alarm method and device, readable storage medium and terminal equipment
CN113628404A (en) Method and device for reducing invalid alarm
CN112802302A (en) Electronic fence method and system based on multi-source algorithm
CN111414828A (en) Abnormal aggregation identification method and device
CN111191507A (en) Safety early warning analysis method and system for smart community
CN112052878A (en) Radar shielding identification method and device and storage medium
CN115620208A (en) Power grid safety early warning method and device, computer equipment and storage medium
CN113450522B (en) Video cable mixing intrusion detection method, electronic device and storage medium
CN111401239A (en) Video analysis method, device, system, equipment and storage medium
CN113673399A (en) Method and device for monitoring area, electronic equipment and readable storage medium
CN110634120B (en) Vehicle damage judgment method and device
CN116797993A (en) Monitoring method, system, medium and equipment based on intelligent community scene
CN111985304A (en) Patrol alarm method, system, terminal equipment and storage medium
CN111104549A (en) Method and equipment for retrieving video
CN113837138B (en) Dressing monitoring method, dressing monitoring system, dressing monitoring medium and electronic terminal
CN114387544A (en) High-altitude parabolic detection method and system, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant