CN113518202A - Security monitoring method and device, electronic equipment and storage medium - Google Patents

Security monitoring method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN113518202A
CN113518202A CN202110371154.1A CN202110371154A CN113518202A CN 113518202 A CN113518202 A CN 113518202A CN 202110371154 A CN202110371154 A CN 202110371154A CN 113518202 A CN113518202 A CN 113518202A
Authority
CN
China
Prior art keywords
audio data
abnormal
audio
microphone
features
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110371154.1A
Other languages
Chinese (zh)
Inventor
姜文轩
刘鹏
高强
李志超
连家玮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changchun University of Science and Technology
Original Assignee
Yangzhong Intelligent Electrical Institute North China Electric Power University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yangzhong Intelligent Electrical Institute North China Electric Power University filed Critical Yangzhong Intelligent Electrical Institute North China Electric Power University
Priority to CN202110371154.1A priority Critical patent/CN113518202A/en
Publication of CN113518202A publication Critical patent/CN113518202A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/30Semantic analysis
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L25/00Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00
    • G10L25/03Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 characterised by the type of extracted parameters
    • G10L25/18Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 characterised by the type of extracted parameters the extracted parameters being spectral information of each sub-band
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L25/00Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00
    • G10L25/48Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 specially adapted for particular use
    • G10L25/51Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 specially adapted for particular use for comparison or discrimination

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Computational Linguistics (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Acoustics & Sound (AREA)
  • Human Computer Interaction (AREA)
  • Theoretical Computer Science (AREA)
  • Spectroscopy & Molecular Physics (AREA)
  • Artificial Intelligence (AREA)
  • General Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Alarm Systems (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

The application discloses a security monitoring method, a security monitoring device, electronic equipment and a storage medium, which belong to the technical field of security, and the method comprises the following steps: the method comprises the steps of acquiring audio data collected by a microphone, carrying out audio analysis on the audio data to obtain audio features of the audio data, comparing the audio features of the audio data with the stored audio features when abnormal behaviors occur to determine whether abnormal behaviors matched with the audio data exist or not, and determining whether the periphery of the microphone is abnormal or not according to whether the abnormal behaviors matched with the audio data exist or not. Therefore, the scheme for carrying out security monitoring by using the audio data is provided, and the audio data is less influenced by the building structure and the layout of objects, so that the problem of monitoring dead angles existing in video monitoring can be better solved, and the monitoring safety can be ensured.

Description

Security monitoring method and device, electronic equipment and storage medium
Technical Field
The application relates to the technical field of security, in particular to a security monitoring method and device, electronic equipment and a storage medium.
Background
With the rapid development of social economy, the number of buildings is greatly increased. In order to facilitate building management and ensure building safety, it is necessary to monitor the building security.
In the related technology, when a building is monitored in a security protection mode, video data inside and outside the building are collected through a camera, and potential safety hazards of the building are discovered through analyzing the video data. However, building structures and article layouts inside and outside a building are generally complex, a camera is difficult to avoid monitoring dead angles, video data of the monitoring dead angles cannot be acquired, the building cannot be monitored comprehensively, and monitoring safety is difficult to guarantee.
Disclosure of Invention
The embodiment of the application provides a security monitoring method and device, electronic equipment and a storage medium, and aims to solve the problem that monitoring safety is difficult to guarantee due to monitoring dead angles when security monitoring is performed by using video data in the related art.
In a first aspect, an embodiment of the present application provides a security monitoring method, including:
acquiring audio data collected by a microphone;
carrying out audio analysis on the audio data to obtain audio characteristics of the audio data;
comparing the audio features of the audio data with the stored audio features when the abnormal behaviors occur so as to determine whether the abnormal behaviors matched with the audio data exist or not;
and determining whether the microphone is abnormal or not according to whether the abnormal behavior matched with the audio data exists or not.
In some possible embodiments, performing audio analysis on the audio data to obtain an audio feature of the audio data includes:
carrying out spectrum analysis on the audio data to obtain the spectrum characteristics of the audio data; and/or
And carrying out semantic analysis on the audio data to obtain semantic features of the audio data.
In some possible embodiments, comparing the audio features of the audio data with the stored audio features when the abnormal behavior occurs to determine whether the abnormal behavior matching the audio data exists includes:
comparing the frequency spectrum characteristics of the audio data with the stored frequency spectrum characteristics when each abnormal behavior occurs;
and if the similarity between the frequency spectrum characteristics of the audio data and the frequency spectrum characteristics when the abnormal behaviors occur is higher than a first preset value, determining that the abnormal behaviors are matched with the audio data.
In some possible embodiments, if the semantic features of the audio data are also obtained, the method further includes:
after the similarity between the frequency spectrum characteristic of the audio data and the frequency spectrum characteristic when the abnormal behavior occurs is determined to be higher than a first preset value, comparing the semantic characteristic of the audio data with the stored semantic characteristic when the abnormal behavior occurs;
and if the similarity between the semantic features of the audio data and the semantic features when the abnormal behaviors occur is higher than a second preset value, determining that the abnormal behaviors are matched with the audio data.
In some possible embodiments, the method further comprises:
and if the situation that the periphery of the microphone is abnormal is determined, sending the installation position information of the microphone and the behavior description information corresponding to the abnormal behavior to a server so as to trigger the server to alarm.
In some possible embodiments, the method further comprises:
and if the condition that the periphery of the microphone is abnormal is determined, sending alarm information, wherein the alarm information comprises the installation position information of the microphone and behavior description information corresponding to abnormal behaviors.
In a second aspect, an embodiment of the present application provides a security monitoring device, including:
the acquisition module is used for acquiring audio data acquired by the microphone;
the analysis module is used for carrying out audio analysis on the audio data to obtain audio characteristics of the audio data;
the comparison module is used for comparing the audio features of the audio data with the stored audio features when the abnormal behaviors occur so as to determine whether the abnormal behaviors matched with the audio data exist or not;
and the determining module is used for determining whether the abnormality exists around the microphone according to whether the abnormal behavior matched with the audio data exists.
In some possible embodiments, the analysis module is specifically configured to:
carrying out spectrum analysis on the audio data to obtain the spectrum characteristics of the audio data; and/or
And carrying out semantic analysis on the audio data to obtain semantic features of the audio data.
In some possible embodiments, the alignment module is specifically configured to:
comparing the frequency spectrum characteristics of the audio data with the stored frequency spectrum characteristics when each abnormal behavior occurs;
and if the similarity between the frequency spectrum characteristics of the audio data and the frequency spectrum characteristics when the abnormal behaviors occur is higher than a first preset value, determining that the abnormal behaviors are matched with the audio data.
In some possible embodiments, if the semantic features of the audio data are obtained, the comparing module is further configured to:
after the similarity between the frequency spectrum characteristic of the audio data and the frequency spectrum characteristic when the abnormal behavior occurs is determined to be higher than a first preset value, comparing the semantic characteristic of the audio data with the stored semantic characteristic when the abnormal behavior occurs;
and if the similarity between the semantic features of the audio data and the semantic features when the abnormal behaviors occur is higher than a second preset value, determining that the abnormal behaviors are matched with the audio data.
In some possible embodiments, the method further comprises:
and the sending module is used for sending the installation position information of the microphone and the behavior description information corresponding to the abnormal behavior to a server to trigger the server to alarm if the condition that the periphery of the microphone is abnormal is determined.
In some possible embodiments, the method further comprises:
and the sending module is used for sending alarm information if the condition that the periphery of the microphone is abnormal is determined, wherein the alarm information comprises the installation position information of the microphone and the behavior description information corresponding to the abnormal behavior.
In a third aspect, an embodiment of the present application provides a raspberry pie, including any one of the apparatuses described above.
In a fourth aspect, an embodiment of the present application provides an electronic device, including: at least one processor, and a memory communicatively coupled to the at least one processor, wherein:
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the security monitoring method described above.
In a fifth aspect, an embodiment of the present application provides a storage medium, where when instructions in the storage medium are executed by a processor of an electronic device, the electronic device is capable of executing the security monitoring method.
In the embodiment of the application, audio data collected by a microphone are obtained, audio analysis is performed on the audio data to obtain audio features of the audio data, the audio features of the audio data are compared with the stored audio features when abnormal behaviors occur, whether abnormal behaviors matched with the audio data exist or not is determined, and whether abnormal behaviors exist around the microphone or not is determined according to whether abnormal behaviors matched with the audio data exist or not. Therefore, the scheme for carrying out security monitoring by using the audio data is provided, and the audio data is less influenced by the building structure and the layout of objects, so that the problem of monitoring dead angles existing in video monitoring can be better solved, and the monitoring safety can be ensured.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a scene schematic diagram of security monitoring provided in an embodiment of the present application;
fig. 2 is a schematic view of another security monitoring scenario provided in an embodiment of the present application;
fig. 3 is a flowchart of a security monitoring method provided in an embodiment of the present application;
fig. 4 is a schematic process diagram of a security monitoring method according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a security monitoring device provided in an embodiment of the present application;
fig. 6 is a schematic diagram of a hardware structure of an electronic device for implementing a security monitoring method according to an embodiment of the present application.
Detailed Description
In order to solve the problem that monitoring safety is difficult to guarantee due to the existence of monitoring dead angles when security monitoring is performed by using video data in the related art, embodiments of the present application provide a security monitoring method and apparatus, an electronic device, and a storage medium.
The preferred embodiments of the present application will be described below with reference to the accompanying drawings of the specification, it should be understood that the preferred embodiments described herein are merely for illustrating and explaining the present application, and are not intended to limit the present application, and that the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
Fig. 1 is a scene schematic diagram of security monitoring provided in an embodiment of the present application, including a microphone and an electronic device, where:
the microphone is used for collecting audio data;
the electronic equipment is used for acquiring audio data acquired by the microphone, carrying out audio analysis on the audio data to obtain audio features of the audio data, then comparing the audio features of the audio data with the stored audio features when abnormal behaviors occur to determine whether the abnormal behaviors matched with the audio data exist or not, and further determining whether the abnormality exists around the microphone according to whether the abnormal behaviors matched with the audio data exist or not.
The abnormal behaviors such as window breaking behavior, door breaking behavior, and call for help behavior are usually accompanied by sounds when the abnormal behaviors occur.
In particular, the electronic device may be a server or a raspberry pi. And, when the electronic device is a server, the server may be connected to a plurality of microphones; when the electronic device is a raspberry, one raspberry may be connected to one, two, three or more microphones, and one raspberry may be connected to several microphones as determined by a technician based on the processing power of the audio data of the raspberry and the speed at which the audio data is obtained by the raspberry.
In this case, the electronic device (i.e., the server or the raspberry pi) is further configured to send alarm information after determining that an abnormality exists around the microphone, so that security personnel can process the abnormal behavior in time, where the alarm information may include pre-stored installation position information of the microphone and behavior description information of the abnormal behavior.
Therefore, the scheme for carrying out security monitoring by using the audio data is provided, and the audio data is less influenced by the building structure and the layout of objects, so that the problem of monitoring dead angles existing in video monitoring can be better solved, and the monitoring safety can be ensured. And when the condition that the surrounding of the microphone is abnormal is determined, the alarm information carrying the installation position information of the microphone and the behavior description information of the abnormal behavior is sent, so that related personnel can know the abnormal condition timely and comprehensively, and the related personnel can timely and accurately handle the abnormal condition.
In some possible embodiments, when the electronic device is a raspberry pi, the security monitoring system may further include a server connected to the raspberry pi, and the raspberry pi may communicate with the server through a User Datagram Protocol (UDP) via a network port.
Fig. 2 is a schematic view of another security monitoring scenario provided in an embodiment of the present application, where the scenario includes n microphones, n raspberry pies, and a server, where one microphone is connected to one raspberry pie (actually, one microphone may also be connected to more than one raspberry pies), each raspberry pie is connected to the server, and n is an integer, where:
each microphone is used for collecting audio data;
each raspberry pi is used for acquiring audio data acquired by a microphone connected with the raspberry pi, performing audio analysis on the audio data to obtain audio features of the audio data, then comparing the audio features of the audio data with the stored audio features when abnormal behaviors occur to determine whether abnormal behaviors matched with the audio data exist or not, and determining whether the abnormality exists around the microphone or not according to whether the abnormal behaviors matched with the audio data exist or not.
Each raspberry pi can also be used for sending the installation position information of the microphone and the behavior description information of the corresponding abnormal behavior to the server after determining that the abnormality occurs around the microphone connected with the raspberry pi.
And the server is used for giving an alarm after receiving the installation position information of the microphone and the behavior description information of the abnormal behavior sent by any raspberry group, so that security personnel can process the abnormal behavior in time.
Therefore, the audio data collected by the microphones connected with the raspberry pies are analyzed and processed in real time by the raspberry pies respectively to determine whether the peripheries of the microphones are abnormal or not, all the audio data do not need to be processed by the server, the data processing pressure of the server can be relieved, and the real-time performance is good because all the audio data are processed by different raspberry pies in a scattered manner. Different raspberry groups are independent, when the number of the microphones needs to be expanded, only the corresponding raspberry groups need to be added, and the expansibility is good. When any raspberry pie determines that the periphery of the microphone is abnormal, the installation position information of the microphone and the behavior description information of the abnormal behavior are sent to the server to trigger the server to give an alarm, so that related personnel can know the abnormal situation timely and comprehensively, the related personnel can handle the abnormality timely and correctly, and the user experience is good. In addition, the raspberry pie has small integral volume, is easy to be embedded into various buildings, is convenient to use,
it should be noted that, in fig. 1 and 2, the installation position of the microphone may be predetermined by a technician according to the building structure and layout of the building to be monitored, and generally, the microphone may cover the building to be monitored.
Fig. 3 is a flowchart of a security monitoring method according to an embodiment of the present application, where the method is applied to the electronic device in fig. 1 or the raspberry pi in fig. 2, and the method includes the following steps.
In step S301, audio data collected by a microphone is acquired.
In specific implementation, the audio data collected by the microphone may be obtained periodically or may be obtained irregularly, which is determined by a technician according to actual conditions, and this is not limited by the examples of the present application.
In step S302, audio analysis is performed on the audio data to obtain audio features of the audio data.
Taking the window breaking action as an example, when the window breaking action occurs in the building, a specific sound such as "pop! Crash! And analyzing the spectral characteristics of the sounds to obtain the spectral characteristics when the window breaking behavior occurs. The door-breaking behavior is similar to that described above and will not be described in detail herein.
Taking the call for help as an example, when the call for help occurs in a building, a specific sound "such as rescue! Lifesaving! The frequency spectrum analysis of the sounds can obtain the frequency spectrum characteristics when the distress behavior occurs. Moreover, the sounds may also contain some semantic information, so that semantic analysis can be performed on the sounds to obtain semantic features when the distress behavior occurs. That is, the sound accompanying the occurrence of distress behavior may have spectral and/or semantic features.
Based on the above analysis, the audio analysis of the audio data to obtain the audio features of the audio data may be: and carrying out spectrum analysis on the audio data to obtain the spectrum characteristics of the audio data, and/or carrying out semantic analysis on the audio data to obtain the semantic characteristics of the audio data.
In step S303, the audio features of the audio data are compared with the stored audio features when the abnormal behavior occurs, so as to determine whether there is an abnormal behavior matching with the audio data.
Generally, the sound accompanied by each preset behavior has a certain spectral feature, so the spectral feature of the audio data can be compared with the stored spectral feature when each abnormal behavior occurs, and if the similarity between the spectral feature of the audio data and the spectral feature when the abnormal behavior occurs is higher than the first preset value, the abnormal behavior is determined to be matched with the audio data.
For example, for any one of a door-breaking behavior, a window-breaking behavior and a distress behavior, the frequency spectrum characteristics of the acquired audio data may be compared with the stored frequency spectrum characteristics when the abnormal behavior occurs, and after the frequency spectrum similarity between the two is determined to be higher than a first preset value, it may be determined that the abnormal behavior is matched with the acquired audio data.
When the semantic features of the audio data are obtained, after the similarity between the obtained spectral features of the audio data and the spectral features when any abnormal behavior occurs is determined to be higher than a first preset value, the obtained semantic features of the audio data can be compared with the stored semantic features when the abnormal behavior occurs, and after the semantic similarity between the obtained spectral features and the stored semantic features when the abnormal behavior occurs is determined to be higher than a second preset value, the abnormal behavior is judged to be matched with the audio data.
For example, for an abnormal behavior, which is a distress behavior and is usually accompanied by a certain semantic meaning, the obtained spectral feature of the audio data may be compared with the stored spectral feature when the abnormal behavior occurs, after the spectral similarity between the two is determined to be higher than a first preset value, the obtained semantic feature of the audio data is compared with the stored semantic feature when the abnormal behavior occurs, and after the semantic similarity between the two is determined to be also higher than a second preset value, the abnormal behavior is determined to be matched with the audio data.
Therefore, when the similarity between the acquired frequency spectrum characteristic of the audio data and the frequency spectrum characteristic when any abnormal behavior occurs is higher than the first preset value and the similarity between the acquired semantic characteristic of the audio data and the semantic characteristic when the abnormal behavior occurs is higher than the second preset value, the abnormal behavior is judged to be matched with the acquired audio data, and the accuracy of judging the abnormal behavior can be improved.
In step S304, it is determined whether there is an abnormality around the microphone according to whether there is an abnormal behavior matching the audio data.
In specific implementation, if the abnormal behavior matched with the audio data is determined to exist, the abnormality around the microphone can be judged; if it is determined that there is no abnormal behavior matching the audio data, it may be determined that there is no abnormality around the microphone.
When the method is applied to the electronic device of fig. 1, step S305 may be further included.
In step S305, if it is determined that there is an abnormality around the microphone, warning information including installation location information of the microphone and behavior description information corresponding to the abnormal behavior is transmitted.
When the method is applied to the raspberry pie of fig. 2, step S306 may be further included.
In step S306, if it is determined that there is an abnormality around the microphone, the installation location information of the microphone and the behavior description information corresponding to the abnormal behavior are sent to the server, so as to trigger the server to alarm.
The following describes a monitoring method provided in the embodiment of the present application by taking the application scenario of fig. 2 as an example.
Fig. 4 is a schematic process diagram of a security monitoring method provided in an embodiment of the present application, where:
the microphone is used for acquiring audio data and sending the acquired audio data to the raspberry pie connected with the microphone;
the raspberry pi is used for judging whether the audio data collected by the microphone contains sound when abnormal behaviors occur, and if not, discarding the audio data; and if so, sending the installation position information of the microphone and the behavior description information of the abnormal row to a server.
And the server is used for sending alarm information after receiving the installation position information of the microphone and the behavior description information of the abnormal row.
When the method provided in the embodiments of the present application is implemented in software or hardware or a combination of software and hardware, a plurality of functional modules may be included in the electronic device, and each functional module may include software, hardware or a combination of software and hardware.
Fig. 5 is a schematic structural diagram of a security monitoring device provided in an embodiment of the present application, and includes an obtaining module 501, an analyzing module 502, a comparing module 503, and a determining module 504.
An obtaining module 501, configured to obtain audio data collected by a microphone;
an analysis module 502, configured to perform audio analysis on the audio data to obtain audio features of the audio data;
a comparison module 503, configured to compare the audio features of the audio data with the stored audio features when the abnormal behavior occurs, so as to determine whether an abnormal behavior matching the audio data exists;
a determining module 504, configured to determine whether there is an abnormality around the microphone according to whether there is an abnormal behavior matching the audio data.
In some possible embodiments, the analysis module 502 is specifically configured to:
carrying out spectrum analysis on the audio data to obtain the spectrum characteristics of the audio data; and/or
And carrying out semantic analysis on the audio data to obtain semantic features of the audio data.
In some possible embodiments, the alignment module 503 is specifically configured to:
comparing the frequency spectrum characteristics of the audio data with the stored frequency spectrum characteristics when each abnormal behavior occurs;
and if the similarity between the frequency spectrum characteristics of the audio data and the frequency spectrum characteristics when the abnormal behaviors occur is higher than a first preset value, determining that the abnormal behaviors are matched with the audio data.
In some possible embodiments, if the semantic features of the audio data are also obtained, the comparing module 503 is further configured to:
after the similarity between the frequency spectrum characteristic of the audio data and the frequency spectrum characteristic when the abnormal behavior occurs is determined to be higher than a first preset value, comparing the semantic characteristic of the audio data with the stored semantic characteristic when the abnormal behavior occurs;
and if the similarity between the semantic features of the audio data and the semantic features when the abnormal behaviors occur is higher than a second preset value, determining that the abnormal behaviors are matched with the audio data.
In some possible embodiments, the method further comprises:
a sending module 505, configured to send, to a server, installation location information of the microphone and behavior description information corresponding to an abnormal behavior if it is determined that there is an abnormality around the microphone, so as to trigger the server to alarm.
In some possible embodiments, the method further comprises:
a sending module 505, configured to send alarm information if it is determined that there is an abnormality around the microphone, where the alarm information includes installation location information of the microphone and behavior description information corresponding to an abnormal behavior.
The division of the modules in the embodiments of the present application is schematic, and only one logic function division is provided, and in actual implementation, there may be another division manner, and in addition, each function module in each embodiment of the present application may be integrated in one processor, may also exist alone physically, or may also be integrated in one module by two or more modules. The coupling of the various modules to each other may be through interfaces that are typically electrical communication interfaces, but mechanical or other forms of interfaces are not excluded. Thus, modules described as separate components may or may not be physically separate, may be located in one place, or may be distributed in different locations on the same or different devices. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
Fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure, where the electronic device includes a transceiver 601 and a processor 602, and the processor 602 may be a Central Processing Unit (CPU), a microprocessor, an application specific integrated circuit, a programmable logic circuit, a large scale integrated circuit, or a digital Processing Unit. The transceiver 601 is used for data transmission and reception between the electronic device and other devices.
The electronic device may further comprise a memory 603 for storing software instructions executed by the processor 602, but may also store some other data required by the electronic device, such as identification information of the electronic device, encryption information of the electronic device, user data, etc. The Memory 603 may be a Volatile Memory (Volatile Memory), such as a Random-Access Memory (RAM); the Memory 603 may also be a Non-Volatile Memory (Non-Volatile Memory) such as a Read-Only Memory (ROM), a Flash Memory (Flash Memory), a Hard Disk (Hard Disk Drive, HDD) or a Solid-State Drive (SSD), or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited thereto. The memory 603 may be a combination of the above memories.
The specific connection medium between the processor 602, the memory 603 and the transceiver 601 is not limited in the embodiment of the present application. In fig. 6, the embodiment of the present application is described by taking only the case where the memory 603, the processor 602, and the transceiver 601 are connected by the bus 604 as an example, the bus is shown by a thick line in fig. 6, and the connection manner between other components is merely illustrative and not limited. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 6, but this is not intended to represent only one bus or type of bus.
The processor 602 may be a dedicated hardware or a processor running software, and when the processor 602 may run software, the processor 602 reads software instructions stored in the memory 603 and executes the security monitoring method in the foregoing embodiment under the driving of the software instructions.
The embodiment of the application also provides a raspberry pie, which comprises the security monitoring device in the embodiment.
The embodiment of the present application further provides a storage medium, and when instructions in the storage medium are executed by a processor of an electronic device, the electronic device can execute the security monitoring method in the foregoing embodiment.
In some possible embodiments, various aspects of the security monitoring method provided in this application may also be implemented in the form of a program product, where the program product includes program code, and when the program product runs on an electronic device, the program code is configured to enable the electronic device to execute the security monitoring method in the foregoing embodiments.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable Disk, a hard Disk, a RAM, a ROM, an Erasable Programmable Read-Only Memory (EPROM), a flash Memory, an optical fiber, a Compact Disk Read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The program product for security monitoring in the embodiment of the application can adopt a CD-ROM and comprises program codes, and can be run on a computing device. However, the program product of the present application is not limited thereto, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A readable signal medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, Radio Frequency (RF), etc., or any suitable combination of the foregoing.
Program code for carrying out operations of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In situations involving remote computing devices, the remote computing devices may be connected to the user computing device over any kind of Network, such as a Local Area Network (LAN) or Wide Area Network (WAN), or may be connected to external computing devices (e.g., over the internet using an internet service provider).
It should be noted that although several units or sub-units of the apparatus are mentioned in the above detailed description, such division is merely exemplary and not mandatory. Indeed, the features and functions of two or more units described above may be embodied in one unit, according to embodiments of the application. Conversely, the features and functions of one unit described above may be further divided into embodiments by a plurality of units.
Further, while the operations of the methods of the present application are depicted in the drawings in a particular order, this does not require or imply that these operations must be performed in this particular order, or that all of the illustrated operations must be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (15)

1. A security monitoring method is characterized by comprising the following steps:
acquiring audio data collected by a microphone;
carrying out audio analysis on the audio data to obtain audio characteristics of the audio data;
comparing the audio features of the audio data with the stored audio features when the abnormal behaviors occur so as to determine whether the abnormal behaviors matched with the audio data exist or not;
and determining whether the microphone is abnormal or not according to whether the abnormal behavior matched with the audio data exists or not.
2. The method of claim 1, wherein performing audio analysis on the audio data to obtain audio features of the audio data comprises:
carrying out spectrum analysis on the audio data to obtain the spectrum characteristics of the audio data; and/or
And carrying out semantic analysis on the audio data to obtain semantic features of the audio data.
3. The method of claim 2, wherein comparing the audio features of the audio data to stored audio features at the time of the abnormal behavior to determine whether there is an abnormal behavior matching the audio data comprises:
comparing the frequency spectrum characteristics of the audio data with the stored frequency spectrum characteristics when each abnormal behavior occurs;
and if the similarity between the frequency spectrum characteristics of the audio data and the frequency spectrum characteristics when the abnormal behaviors occur is higher than a first preset value, determining that the abnormal behaviors are matched with the audio data.
4. The method of claim 3, wherein if semantic features of the audio data are also obtained, further comprising:
after the similarity between the frequency spectrum characteristic of the audio data and the frequency spectrum characteristic when the abnormal behavior occurs is determined to be higher than a first preset value, comparing the semantic characteristic of the audio data with the stored semantic characteristic when the abnormal behavior occurs;
and if the similarity between the semantic features of the audio data and the semantic features when the abnormal behaviors occur is higher than a second preset value, determining that the abnormal behaviors are matched with the audio data.
5. The method of any of claims 1-4, further comprising:
and if the situation that the periphery of the microphone is abnormal is determined, sending the installation position information of the microphone and the behavior description information corresponding to the abnormal behavior to a server so as to trigger the server to alarm.
6. The method of any of claims 1-4, further comprising:
and if the condition that the periphery of the microphone is abnormal is determined, sending alarm information, wherein the alarm information comprises the installation position information of the microphone and behavior description information corresponding to abnormal behaviors.
7. A security monitoring device, comprising:
the acquisition module is used for acquiring audio data acquired by the microphone;
the analysis module is used for carrying out audio analysis on the audio data to obtain audio characteristics of the audio data;
the comparison module is used for comparing the audio features of the audio data with the stored audio features when the abnormal behaviors occur so as to determine whether the abnormal behaviors matched with the audio data exist or not;
and the determining module is used for determining whether the abnormality exists around the microphone according to whether the abnormal behavior matched with the audio data exists.
8. The apparatus of claim 7, wherein the analysis module is specifically configured to:
carrying out spectrum analysis on the audio data to obtain the spectrum characteristics of the audio data; and/or
And carrying out semantic analysis on the audio data to obtain semantic features of the audio data.
9. The apparatus of claim 8, wherein the alignment module is specifically configured to:
comparing the frequency spectrum characteristics of the audio data with the stored frequency spectrum characteristics when each abnormal behavior occurs;
and if the similarity between the frequency spectrum characteristics of the audio data and the frequency spectrum characteristics when the abnormal behaviors occur is higher than a first preset value, determining that the abnormal behaviors are matched with the audio data.
10. The apparatus of claim 9, wherein if semantic features of the audio data are also obtained, the comparison module is further configured to:
after the similarity between the frequency spectrum characteristic of the audio data and the frequency spectrum characteristic when the abnormal behavior occurs is determined to be higher than a first preset value, comparing the semantic characteristic of the audio data with the stored semantic characteristic when the abnormal behavior occurs;
and if the similarity between the semantic features of the audio data and the semantic features when the abnormal behaviors occur is higher than a second preset value, determining that the abnormal behaviors are matched with the audio data.
11. The apparatus of any of claims 7-10, further comprising:
and the sending module is used for sending the installation position information of the microphone and the behavior description information corresponding to the abnormal behavior to a server to trigger the server to alarm if the condition that the periphery of the microphone is abnormal is determined.
12. The apparatus of any of claims 7-10, further comprising:
and the sending module is used for sending alarm information if the condition that the periphery of the microphone is abnormal is determined, wherein the alarm information comprises the installation position information of the microphone and the behavior description information corresponding to the abnormal behavior.
13. A raspberry pie, comprising a device according to any of claims 7-12.
14. An electronic device, comprising: at least one processor, and a memory communicatively coupled to the at least one processor, wherein:
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-6.
15. A storage medium, wherein instructions in the storage medium, when executed by a processor of an electronic device, enable the electronic device to perform the method of any of claims 1-6.
CN202110371154.1A 2021-04-07 2021-04-07 Security monitoring method and device, electronic equipment and storage medium Pending CN113518202A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110371154.1A CN113518202A (en) 2021-04-07 2021-04-07 Security monitoring method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110371154.1A CN113518202A (en) 2021-04-07 2021-04-07 Security monitoring method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113518202A true CN113518202A (en) 2021-10-19

Family

ID=78062237

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110371154.1A Pending CN113518202A (en) 2021-04-07 2021-04-07 Security monitoring method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113518202A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102148032A (en) * 2010-12-03 2011-08-10 北京声迅电子有限公司 Abnormal sound detection method and system for ATM (Automatic Teller Machine)
CN107086036A (en) * 2017-04-19 2017-08-22 杭州派尼澳电子科技有限公司 A kind of freeway tunnel method for safety monitoring
CN108922522A (en) * 2018-07-20 2018-11-30 珠海格力电器股份有限公司 Control method, device, storage medium and the electronic device of equipment
CN109785859A (en) * 2019-01-31 2019-05-21 平安科技(深圳)有限公司 The method, apparatus and computer equipment of management music based on speech analysis
CN111601074A (en) * 2020-04-24 2020-08-28 平安科技(深圳)有限公司 Security monitoring method and device, robot and storage medium
CN111770427A (en) * 2020-06-24 2020-10-13 杭州海康威视数字技术股份有限公司 Microphone array detection method, device, equipment and storage medium
CN212061387U (en) * 2020-01-17 2020-12-01 北京家人智能科技有限公司 Abnormal event detection equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102148032A (en) * 2010-12-03 2011-08-10 北京声迅电子有限公司 Abnormal sound detection method and system for ATM (Automatic Teller Machine)
CN107086036A (en) * 2017-04-19 2017-08-22 杭州派尼澳电子科技有限公司 A kind of freeway tunnel method for safety monitoring
CN108922522A (en) * 2018-07-20 2018-11-30 珠海格力电器股份有限公司 Control method, device, storage medium and the electronic device of equipment
CN109785859A (en) * 2019-01-31 2019-05-21 平安科技(深圳)有限公司 The method, apparatus and computer equipment of management music based on speech analysis
CN212061387U (en) * 2020-01-17 2020-12-01 北京家人智能科技有限公司 Abnormal event detection equipment
CN111601074A (en) * 2020-04-24 2020-08-28 平安科技(深圳)有限公司 Security monitoring method and device, robot and storage medium
CN111770427A (en) * 2020-06-24 2020-10-13 杭州海康威视数字技术股份有限公司 Microphone array detection method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
US11838314B2 (en) Electronic control device, fraud detection server, in-vehicle network system, in-vehicle network monitoring system, and in-vehicle network monitoring method
US20190260778A1 (en) Unsupervised spoofing detection from traffic data in mobile networks
CN112468488B (en) Industrial anomaly monitoring method, industrial anomaly monitoring device, computer equipment and readable storage medium
CN108429651B (en) Flow data detection method and device, electronic equipment and computer readable medium
US11481495B2 (en) Anomalous behavior detection in processor based systems
US8850582B2 (en) Security monitoring system and security monitoring method
CN106462702B (en) Method and system for acquiring and analyzing electronic forensic data in a distributed computer infrastructure
CN111115400B (en) System and method for detecting elevator maintenance behavior in an elevator hoistway
CN112953971B (en) Network security flow intrusion detection method and system
CN114374565A (en) Intrusion detection method and device for vehicle CAN network, electronic equipment and medium
CN112615858B (en) Internet of things equipment monitoring method, device and system
CN114662618B (en) Failure diagnosis method and device based on federal learning and related equipment
CN116112271B (en) Session data processing method, electronic equipment and storage medium
TWI553502B (en) Protection method and computer system thereof for firewall apparatus disposed to application layer
CN113282920B (en) Log abnormality detection method, device, computer equipment and storage medium
CN111400114A (en) Deep recursion network-based big data computer system fault detection method and system
WO2022213297A1 (en) Security protection monitoring method and apparatus, electronic device, and storage medium
CN113518202A (en) Security monitoring method and device, electronic equipment and storage medium
CN116032602A (en) Method, device, equipment and storage medium for automatically identifying threat data
CN114884748A (en) Network attack monitoring method and device, electronic equipment and storage medium
CN103618689A (en) Method, device and system for network intrusion detection
CN112333045A (en) Intelligent flow baseline learning method, equipment and computer readable storage medium
CN116915506B (en) Abnormal flow detection method and device, electronic equipment and storage medium
CN115022082B (en) Network security detection method, network security detection system, terminal and medium
CN116781389B (en) Determination method of abnormal data list, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20231012

Address after: No.7089 Weixing Road, Changchun City, Jilin Province 130000

Applicant after: CHANGCHUN University OF SCIENCE AND TECHNOLOGY

Address before: 212200 Daquan Road, Xinba Town, Yangzhong City, Zhenjiang City, Jiangsu Province

Applicant before: YANGZHONG INTELLIGENT ELECTRICAL INSTITUTE, NORTH CHINA ELECTRIC POWER University