CN115394025A - Monitoring method, monitoring device, electronic equipment and storage medium - Google Patents
Monitoring method, monitoring device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN115394025A CN115394025A CN202110552232.8A CN202110552232A CN115394025A CN 115394025 A CN115394025 A CN 115394025A CN 202110552232 A CN202110552232 A CN 202110552232A CN 115394025 A CN115394025 A CN 115394025A
- Authority
- CN
- China
- Prior art keywords
- personnel
- target area
- information
- person
- identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 64
- 238000000034 method Methods 0.000 title claims abstract description 52
- 238000012806 monitoring device Methods 0.000 title claims abstract description 10
- 238000004458 analytical method Methods 0.000 claims abstract description 52
- 230000006399 behavior Effects 0.000 claims description 58
- 230000003287 optical effect Effects 0.000 claims description 21
- 238000004590 computer program Methods 0.000 claims description 10
- 238000010191 image analysis Methods 0.000 claims description 5
- 238000001514 detection method Methods 0.000 description 8
- 238000003384 imaging method Methods 0.000 description 7
- 239000013307 optical fiber Substances 0.000 description 7
- 238000012545 processing Methods 0.000 description 7
- 238000004364 calculation method Methods 0.000 description 6
- 238000004891 communication Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 5
- 238000012790 confirmation Methods 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 238000012300 Sequence Analysis Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000000007 visual effect Effects 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 230000001427 coherent effect Effects 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000009545 invasion Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000010223 real-time analysis Methods 0.000 description 1
- 238000012216 screening Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012731 temporal analysis Methods 0.000 description 1
- 238000000700 time series analysis Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19602—Image analysis to detect motion of the intruder, e.g. by frame subtraction
- G08B13/19613—Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
Abstract
The invention provides a monitoring method, a monitoring device, electronic equipment and a storage medium, wherein the monitoring method comprises the following steps: acquiring personnel position information under the condition that personnel exist in a target area determined based on information collected by a sensing device; acquiring image information of the target area based on the personnel position information; obtaining the personnel identity of the target area and a personnel behavior track analysis result based on the image information; and executing security protection operation based on the personnel identity and the personnel behavior track analysis result. The monitoring method provided by the invention can realize monitoring and tracking of personnel, obtain the behavior track and save the computing resources.
Description
Technical Field
The present invention relates to the field of monitoring technologies, and in particular, to a monitoring method and apparatus, an electronic device, and a storage medium.
Background
With the rapid development of image processing technology, automated monitoring has been gradually applied to monitoring systems in various important security places. Because video data analysis needs to consume huge computing resources, the problem of real-time processing of mass data is faced by automatic monitoring. How to carry out efficient automatic monitoring and ensure the security of important areas becomes an industrial hotspot.
At present, two automatic security monitoring methods for important areas are mainly used, one completes the intrusion identification of abnormal personnel based on sensor and image identification, and the other completes the intrusion judgment by analyzing the monitoring picture in real time and carrying out target detection and picture change condition analysis.
In the existing scheme, the automatic security monitoring method completes security guarantee for monitoring scenes of building invasion and predetermined areas, but cannot effectively guarantee indoor important security areas such as server rooms, data centers and the like. An automatic monitoring scheme based on a sensor and image recognition cannot effectively capture the implementation accurate position of personnel, track the personnel and analyze the behavior track of the personnel. In an automatic monitoring scheme based on real-time analysis, deployment of cameras at various indoor positions is required, and a large number of cameras consume a large amount of computing resources for real-time target detection, video analysis and other analysis work.
In summary, the method for automatically monitoring the indoor important safety area is still not fully researched, a mature algorithm and a general framework are not available, monitoring and tracking of personnel cannot be performed, a behavior track is obtained, and a large amount of computing resources are consumed.
Disclosure of Invention
The invention provides a monitoring method, a monitoring device, electronic equipment and a storage medium, which are used for solving the defects that monitoring and tracking cannot be carried out on personnel and a large amount of computing resources are consumed in the prior art, realizing monitoring and tracking on the personnel to obtain a behavior track and saving the computing resources.
In a first aspect, the present invention provides a monitoring method, including:
acquiring personnel position information under the condition that personnel exist in a target area determined based on information collected by a sensing device;
acquiring image information of the target area based on the personnel position information;
obtaining the personnel identity of the target area and a personnel behavior track analysis result based on the image information;
and executing security protection operation based on the personnel identity and the personnel behavior track analysis result.
In one embodiment, the obtaining of the person position information in the case that it is determined that the person is in the target area based on the information collected by the sensing device includes:
acquiring an optical signal of the target area based on the sensing device;
and acquiring the personnel position information under the condition that the personnel is in the target area based on the optical signal.
In one embodiment, the obtaining the person position information in the case that it is determined that the person is in the target area based on the optical signal includes:
determining a Rayleigh scattering offset value corresponding to the light pressure of the target area based on the optical signal;
and acquiring the personnel position information under the condition that the personnel in the target area is determined based on the Rayleigh scattering offset value.
In one embodiment, the acquiring the image information of the target area based on the person position information includes:
controlling the camera device with the shooting area covering the position of the personnel to work based on the personnel position information;
and acquiring the image information of the target area based on the camera device.
In one embodiment, the executing security operation based on the personnel identity and the personnel behavior trajectory analysis result includes:
when the personnel identity is a target non-safety personnel, alarming is carried out based on the personnel identity and the personnel behavior track analysis result;
and under the condition that the personnel identity is the target safety personnel, storing the personnel behavior track analysis result.
In one embodiment, the obtaining of the person identity of the target area and the result of analyzing the person behavior trajectory based on the image information includes:
under the condition that the person exists in the target area is determined based on the image information, obtaining human body characteristic information and person position information based on the image information;
obtaining the personnel identity based on the human body characteristic information;
and obtaining the personnel behavior track analysis result based on the personnel position information.
In one embodiment, the obtaining the person identity based on the human body feature information includes:
and inquiring a target identity information base based on the human body characteristic information, and determining that the personnel identity is the target safety personnel or the target non-safety personnel.
In a second aspect, the present invention provides a monitoring device comprising:
the personnel position acquisition module is used for acquiring personnel position information under the condition that the personnel is in the target area determined based on the information acquired by the sensing device;
the image acquisition module is used for acquiring the image information of the target area based on the personnel position information;
the image analysis module is used for obtaining the personnel identity of the target area and a personnel behavior track analysis result based on the image information;
and the security execution module is used for executing security operation based on the personnel identity and the personnel behavior track analysis result.
In a third aspect, the present invention further provides an electronic device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor executes the computer program to implement the steps of the monitoring method according to any one of the above aspects.
In a fourth aspect, the present invention also provides a non-transitory computer-readable storage medium, on which a computer program is stored, wherein the computer program, when executed by a processor, implements the steps of the monitoring method according to any one of the above.
The monitoring method, the monitoring device, the electronic equipment and the storage medium provided by the invention can determine whether personnel exist in the target area through the sensing device, acquire the image information in the target area and identify the image information if personnel exist in the target area, perform security operation by combining the analysis result of the personnel behavior track after the personnel identity is determined, avoid taking a real-time video image monitoring measure for the target area, determine the personnel identity and the personnel behavior track by adopting an image identification method after the personnel exist in the sensing device, reduce the processing quantity of images and save the calculation resources in the target detection and image processing processes.
And moreover, based on the image information including the personnel, personnel behavior track analysis is carried out, the personnel position acquired by the sensing device is combined, the personnel is tracked, security and protection operation is carried out by combining the personnel identity, the behavior of the personnel can be predicted by means of behavior track analysis, an alarm is given in advance, and property safety can be effectively guaranteed.
In addition, when monitoring a specific area, the imaging device can adjust the working state according to the position of the person determined by the sensing device, and after the position of the person is determined, the imaging device adjusts the imaging angle to perform shooting without staring at a certain angle in real time. In the traditional real-time monitoring mode, the camera angle of the camera device is generally fixed and is used for continuously acquiring real-time images under a specific visual angle, so that the area monitored by a single camera device is relatively small, and a plurality of camera devices are needed for acquiring video images in a specific space area.
Drawings
In order to more clearly illustrate the technical solutions of the present invention or the prior art, the drawings needed for the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
FIG. 1 is a schematic flow diagram of a monitoring method provided by the present invention;
FIG. 2 is a schematic flow chart illustrating the process of verifying the identity of a person in the monitoring method provided by the present invention;
FIG. 3 is a schematic flow chart illustrating security measures implemented in the monitoring method provided by the present invention;
FIG. 4 is a schematic diagram of the optical fiber layout of the OFDR optical fiber sensor provided by the present invention;
FIG. 5 is a monitoring flow chart of the OFDR optical line sensor provided by the present invention;
FIG. 6 is a functional block diagram of a monitoring device provided by the present invention;
fig. 7 is a schematic structural diagram of an electronic device provided by the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is obvious that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The monitoring method, apparatus, electronic device and storage medium of the present invention are described below with reference to fig. 1 to 7.
The invention provides a monitoring method, as shown in fig. 1, the monitoring method comprises:
and 110, acquiring personnel position information under the condition that personnel exist in the target area based on the information collected by the sensing device.
It is understood that the sensing device can be a photoelectric sensing device, and can also be an infrared sensing device, and whether people exist in the target area can be determined through photoelectric signals of the photoelectric sensing device and infrared information of the infrared sensing device.
In the case of a person being determined in the target area, position information of the person can also be determined by the sensor device.
It should be noted that, the person determined by the sensing device may be a suspected person, and in the case that the exact person cannot be determined by the sensing device, the person may be further determined by image recognition to avoid misjudgment.
And step 120, acquiring image information of the target area based on the personnel position information.
After the position information of the personnel is determined, the image information of the target area is acquired, so that the situation that the image information is acquired in real time unintentionally can be avoided, the image processing workload can be increased when the image is processed subsequently, and the image computing resource is wasted.
And step 130, obtaining the personnel identity of the target area and a personnel behavior track analysis result based on the image information.
It should be noted that the personnel identity here may be security personnel, such as internal employees of a company, or non-security personnel, such as strangers.
And 140, executing security operation based on the personnel identity and the personnel behavior track analysis result.
It can be understood that different security operations can be executed according to different personnel identities, and security monitoring is realized. The result of analyzing the behavior trajectory of the person may be a result of performing predictive analysis on future behavior of the person based on historical position data of the person.
The monitoring method provided by the invention can determine whether a person exists in the target area through the sensing device, if the person exists in the target area, the image information in the target area is obtained, the image information is identified, after the identity of the person is determined, the security operation is executed by combining the analysis result of the behavior track of the person, the measure of real-time video image monitoring on the target area is avoided, after the person exists in the sensing device, the identity of the person and the behavior track of the person are determined by adopting an image identification method instead of monitoring and analyzing the image in real time on the area needing to be monitored, the processing quantity of the image is reduced, and the calculation resources in the target detection and image processing processes are saved.
And moreover, based on the image information including the personnel, personnel behavior track analysis is carried out, the personnel position acquired by the sensing device is combined, the personnel is tracked, security and protection operation is carried out by combining the personnel identity, the behavior of the personnel can be predicted by means of behavior track analysis, an alarm is given in advance, and property safety can be effectively guaranteed.
In addition, when monitoring a specific area, the imaging device can adjust the working state according to the position of the person determined by the sensing device, and after the position of the person is determined, the imaging device adjusts the imaging angle to perform shooting without staring at a certain angle in real time. In the traditional real-time monitoring mode, the camera angle of the camera device is generally fixed and is used for continuously acquiring real-time images under a specific visual angle, so that the area monitored by a single camera device is relatively small, and a plurality of camera devices are needed for acquiring video images in a specific space area.
It should be noted that the monitoring method provided by the invention can be preferentially applied to indoor scenes, the indoor scenes can be server rooms or data center rooms, the monitoring method provided by the invention is used for monitoring the indoor scenes, and when foreign strangers invade the indoor environment, corresponding security measures can be executed, for example, the monitoring method can remind a homeowner that foreign strangers invade the indoor environment through alarming, so that safety guarantee is provided for the homeowner, and property loss is reduced.
In some embodiments, in the case where it is determined that there is a person in the target area based on the information collected by the sensing device, acquiring the person position information includes:
based on the sensing device, optical signals of the target area are collected.
In the case where it is determined that there is a person in the target area based on the optical signal, person position information is acquired.
In some embodiments, in the case where it is determined that there is a person in the target area based on the optical signal, acquiring the person position information includes:
determining a Rayleigh scattering offset value corresponding to the light pressure of the target area based on the optical signal;
and acquiring the personnel position information under the condition that the personnel in the target area is determined based on the Rayleigh scattering offset value.
In the above embodiment, the sensing device may be an OFDR (i.e., optical frequency domain reflectometer) optical fiber sensor, and the OFDR optical fiber sensor calculates the pressure applied to the light (i.e., the light pressure) by using a coherent light detection means, and when the pressure exceeds a target threshold, determines that a person is at the current position, and sends the position information of the person to the image recognition module.
It can be understood that if the rayleigh scattering offset value of the optical signal is smaller than the target offset threshold value, it is determined that the target area is normal, and no person is present, and the process is ended. And if the optical signal deviation is larger than the target deviation threshold value, judging that the personnel exist in the target area.
And recording the target area of the personnel, extracting the area distribution information of the camera device, and screening the camera devices which accord with the positions.
The method comprises the steps of obtaining position information of suspected persons and identification information of a camera device corresponding to the position information, and obtaining images shot by the camera device corresponding to the identification information for identification.
It should be noted that, in step 110, it is determined that there is a person in the target area based on the information collected by the sensing device, where the person includes a suspected person, and therefore, in some embodiments, when it is determined that there is a person in the target area based on the rayleigh scattering offset value, the position information of the person is obtained again, and whether there is a person can be accurately determined through the rayleigh scattering offset value, so as to improve the accuracy of the final monitoring result.
And if the personnel in the target area are detected through the Rayleigh scattering deviation value, intercepting the personnel image of the target area, and if the personnel in the target area are not detected, ending the flow.
It can be understood that the image recognition module receives the person position information sent by the sensing device, invokes the camera device containing the person position, performs person detection on the target area covered by the person position, and intercepts the person image of the target area if the person is detected.
In some embodiments, obtaining image information of the target area based on the person position information comprises:
controlling the camera device with the shooting area covering the personnel position to work based on the personnel position information;
based on the imaging device, image information of the target area is acquired.
In some embodiments, based on the personnel identity and the personnel behavior trajectory analysis result, performing security operations, including:
under the condition that the personnel identity is the target non-safety personnel, alarming is carried out based on the personnel identity and the analysis result of the personnel behavior track;
and under the condition that the personnel identity is the target safety personnel, storing the analysis result of the personnel behavior track.
In some embodiments, obtaining the person identity of the target area and the result of the person behavior trajectory analysis based on the image information includes:
under the condition that the person exists in the target area determined based on the image information, obtaining human body feature information and person position information based on the image information;
obtaining personnel identity based on the human body characteristic information;
and obtaining a personnel behavior track analysis result based on the personnel position information.
It should be noted that the personnel behavior trajectory analysis result is obtained based on the personnel position information, and may be obtained by performing time series analysis on the personnel position information based on the personnel position information.
For example, the personnel position information and the unique identifier can be bound and stored in a temporary database, then the human characteristic information of the target time period is read from the temporary database, and then the read human characteristic information is subjected to time sequence analysis to obtain a personnel behavior track analysis result.
In some embodiments, obtaining the person identity based on the human characteristic information comprises:
and inquiring a target identity information base based on the human body characteristic information, and determining the identity of the personnel as target safety personnel or target non-safety personnel.
In the above embodiment, the image recognition module performs human body feature analysis on the captured image information including the person, and extracts human body feature information from the image information, where the human body feature information includes face feature information and body type feature information. For example, the human body feature information is extracted by integrating the wearing and body type of the human body in the image.
And sending the human body characteristic information and the personnel position information to an identity recognition module.
The identity recognition module performs face detection on an image shot by a specific camera device, namely, the face detection is performed based on human body characteristic information corresponding to the image.
And if the face is detected, extracting the face information of the identity information base, comparing the detected face with the face of the information base, and determining the identity of the person.
It can be understood that, here, the human characteristic information, the detected human face, and the information base human face are input into the human face verification module to perform human face verification, so as to determine the identity of the person.
The face verification module performs 1. And if the detected face is matched with the face in the identity information base, identifying the person as a safety person. Otherwise, the person is identified as an unknown person (i.e., a non-security person).
If the human face is not detected, establishing temporary identity information based on the human body feature information, storing the corresponding human body feature information as the temporary identity information and the unique identifier into a temporary identity information base, and finishing the current process.
In the subsequent process, if the detected personnel are safety personnel, the temporary identity information of the temporary identity information base can be inquired according to the human body characteristic information transmitted by the identity recognition module.
And performing time sequence analysis on all the extracted personnel position information with consistent human body characteristic information, and drawing personnel behavior tracks.
And storing the personnel behavior track condition of the security personnel into a behavior track library, and outputting and early warning the human identity information (such as human face information and cut human body pictures) of unknown personnel and the personnel behavior track condition.
In some embodiments, the monitoring method may be implemented by referring to fig. 2 and 3, acquiring position information of a person by using a sensing device, performing image recognition, determining whether the person has detected the face after the person has been recognized, checking information of the person after the person has detected the face, and taking different measures for security personnel and non-security personnel after analyzing behavior tracks of the person.
The sensing device in this embodiment may be an OFDR optical fiber sensor, the light laying of the OFDR optical fiber sensor is shown in fig. 4, and the real-time monitoring flowchart of the OFDR optical fiber sensor is shown in fig. 5.
The present invention further provides a monitoring device, which is described below, and the monitoring device described below and the monitoring method described above may be referred to correspondingly.
As shown in fig. 6, the monitoring apparatus 600 includes: the system comprises a personnel position acquisition module 610, an image acquisition module 620, an image analysis module 630 and a security execution module 640.
The person position obtaining module 610 is configured to obtain person position information when it is determined that a person is present in the target area based on the information collected by the sensing device.
The image obtaining module 620 is configured to obtain image information of the target area based on the person position information;
the image analysis module 630 is configured to obtain the personnel identity of the target area and a personnel behavior trajectory analysis result based on the image information.
The security execution module 640 is configured to execute security operation based on the personnel identity and the personnel behavior trajectory analysis result.
In some embodiments, the person location acquisition module 610 includes: a signal acquisition unit and a position acquisition unit.
The signal acquisition unit is used for acquiring an optical signal of a target area based on the sensing device.
The position acquisition unit is used for acquiring the personnel position information under the condition that the personnel in the target area is determined based on the optical signal.
In some embodiments, the position acquisition unit includes: a Rayleigh scattering calculation unit and a position calculation unit.
And the Rayleigh scattering calculation unit is used for determining a Rayleigh scattering offset value corresponding to the light pressure of the target area based on the optical signal.
The position calculation unit is used for acquiring the personnel position information under the condition that the personnel in the target area is determined based on the Rayleigh scattering deviation value.
In some embodiments, the image acquisition module 620 comprises: an image pickup control unit and an image acquisition unit.
The camera shooting control unit is used for controlling the camera shooting device with the shooting area covering the position of the person to work based on the person position information.
The image acquisition unit is used for acquiring image information of the target area based on the camera device.
In some embodiments, the security enforcement module 640 includes: a first execution unit and a second execution unit.
The first execution unit is used for giving an alarm based on the personnel identity and the analysis result of the personnel behavior track under the condition that the personnel identity is the target non-safety personnel.
And the second execution unit is used for storing the analysis result of the personnel behavior track under the condition that the personnel identity is the target safety personnel.
In some embodiments, the image analysis module 630 includes: the system comprises a personnel information acquisition unit, an identity confirmation unit and a track analysis unit.
The personnel information acquisition unit is used for obtaining the human body characteristic information and the personnel position information based on the image information under the condition that the personnel exist in the target area determined based on the image information.
The identity confirmation unit is used for obtaining the identity of the person based on the human body characteristic information.
The trajectory analysis unit is used for obtaining a personnel behavior trajectory analysis result based on the personnel position information.
In some embodiments, the identity confirmation unit is further configured to query the target identity information base based on the human body characteristic information, and determine that the identity of the person is the target security person or the target non-security person.
Fig. 7 illustrates a physical structure diagram of an electronic device, and as shown in fig. 7, the electronic device may include: a processor (processor) 710, a communication Interface (Communications Interface) 720, a memory (memory) 730, and a communication bus 740, wherein the processor 710, the communication Interface 720, and the memory 730 communicate with each other via the communication bus 740. Processor 710 may call logic instructions in memory 730 to perform a monitoring method comprising:
and 140, executing security operation based on the personnel identity and the personnel behavior track analysis result.
In addition, the logic instructions in the memory 730 can be implemented in the form of software functional units and stored in a computer readable storage medium when the logic instructions are sold or used as independent products. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In another aspect, the present invention also provides a computer program product comprising a computer program stored on a non-transitory computer-readable storage medium, the computer program comprising program instructions which, when executed by a computer, enable the computer to perform the monitoring method provided by the above methods, the method comprising:
and 140, executing security operation based on the personnel identity and the personnel behavior track analysis result.
In yet another aspect, the present invention also provides a non-transitory computer-readable storage medium having stored thereon a computer program, which when executed by a processor is implemented to perform the monitoring method provided above, the method comprising:
and 140, executing security operation based on the personnel identity and the personnel behavior track analysis result.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one position, or may be distributed on multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment may be implemented by software plus a necessary general hardware platform, and may also be implemented by hardware. Based on the understanding, the above technical solutions substantially or otherwise contributing to the prior art may be embodied in the form of a software product, which may be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the various embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.
Claims (10)
1. A method of monitoring, comprising:
acquiring personnel position information under the condition that personnel exist in a target area determined based on information collected by a sensing device;
acquiring image information of the target area based on the personnel position information;
obtaining the personnel identity of the target area and a personnel behavior track analysis result based on the image information;
and executing security protection operation based on the personnel identity and the personnel behavior track analysis result.
2. The monitoring method according to claim 1, wherein the acquiring of the person position information in the case that it is determined that there is a person in the target area based on the information collected by the sensing device comprises:
acquiring an optical signal of the target area based on the sensing device;
and acquiring the personnel position information under the condition that the personnel in the target area is determined based on the optical signal.
3. The monitoring method according to claim 2, wherein the acquiring the person position information in the case where it is determined that the person is present in the target area based on the optical signal includes:
determining a Rayleigh scattering offset value corresponding to the light pressure of the target area based on the optical signal;
and acquiring the personnel position information under the condition that the personnel in the target area is determined based on the Rayleigh scattering offset value.
4. The monitoring method according to claim 1, wherein the acquiring image information of the target area based on the person position information includes:
controlling the camera device of which the shooting area covers the position of the personnel to work based on the personnel position information;
and acquiring the image information of the target area based on the camera device.
5. The monitoring method according to claim 1, wherein the performing security operation based on the personnel identity and the personnel behavior trajectory analysis result comprises:
when the personnel identity is a target non-safety personnel, alarming is carried out based on the personnel identity and the personnel behavior track analysis result;
and under the condition that the personnel identity is a target safety personnel, storing the analysis result of the personnel behavior track.
6. The monitoring method according to any one of claims 1 to 5, wherein the obtaining of the person identity of the target area and the analysis result of the person behavior trajectory based on the image information comprises:
under the condition that the person exists in the target area determined based on the image information, obtaining human body feature information and person position information based on the image information;
obtaining the personnel identity based on the human body characteristic information;
and obtaining the personnel behavior track analysis result based on the personnel position information.
7. The monitoring method according to claim 6, wherein the obtaining the person identity based on the human body feature information comprises:
and inquiring a target identity information base based on the human body characteristic information, and determining that the personnel identity is the target safety personnel or the target non-safety personnel.
8. A monitoring device, comprising:
the personnel position acquisition module is used for acquiring personnel position information under the condition that the personnel is in the target area determined based on the information acquired by the sensing device;
the image acquisition module is used for acquiring the image information of the target area based on the personnel position information;
the image analysis module is used for obtaining the personnel identity of the target area and a personnel behavior track analysis result based on the image information;
and the security execution module is used for executing security operation based on the personnel identity and the personnel behavior track analysis result.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the monitoring method according to any of claims 1 to 7 are implemented when the processor executes the program.
10. A non-transitory computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the monitoring method according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110552232.8A CN115394025A (en) | 2021-05-20 | 2021-05-20 | Monitoring method, monitoring device, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110552232.8A CN115394025A (en) | 2021-05-20 | 2021-05-20 | Monitoring method, monitoring device, electronic equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115394025A true CN115394025A (en) | 2022-11-25 |
Family
ID=84114144
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110552232.8A Pending CN115394025A (en) | 2021-05-20 | 2021-05-20 | Monitoring method, monitoring device, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115394025A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117611106A (en) * | 2024-01-17 | 2024-02-27 | 深圳湾科技发展有限公司 | Smart park safe operation and maintenance method, system, equipment and medium |
CN117611106B (en) * | 2024-01-17 | 2024-04-26 | 深圳湾科技发展有限公司 | Smart park safe operation and maintenance method, system, equipment and medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102008039130A1 (en) * | 2008-08-21 | 2010-02-25 | Billy Hou | Automatic tracing and identification system for movable object e.g. human, in building, has safety monitoring sensor connected with safety monitoring system such that tracing camera receives desired data when sensor is operated |
WO2016202027A1 (en) * | 2015-06-18 | 2016-12-22 | 中兴通讯股份有限公司 | Object movement trajectory recognition method and system |
CN109511090A (en) * | 2018-10-17 | 2019-03-22 | 陆浩洁 | A kind of interactive mode tracing and positioning anticipation system |
CN110276261A (en) * | 2019-05-23 | 2019-09-24 | 平安科技(深圳)有限公司 | Personnel automatically track monitoring method, device, computer equipment and storage medium |
WO2020114102A1 (en) * | 2018-12-06 | 2020-06-11 | 深圳光启超材料技术有限公司 | Video tracking method and system, and storage medium |
CN112052803A (en) * | 2020-09-10 | 2020-12-08 | 四川创客知佳科技有限公司 | Wisdom garden control protection system |
-
2021
- 2021-05-20 CN CN202110552232.8A patent/CN115394025A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102008039130A1 (en) * | 2008-08-21 | 2010-02-25 | Billy Hou | Automatic tracing and identification system for movable object e.g. human, in building, has safety monitoring sensor connected with safety monitoring system such that tracing camera receives desired data when sensor is operated |
WO2016202027A1 (en) * | 2015-06-18 | 2016-12-22 | 中兴通讯股份有限公司 | Object movement trajectory recognition method and system |
CN109511090A (en) * | 2018-10-17 | 2019-03-22 | 陆浩洁 | A kind of interactive mode tracing and positioning anticipation system |
WO2020114102A1 (en) * | 2018-12-06 | 2020-06-11 | 深圳光启超材料技术有限公司 | Video tracking method and system, and storage medium |
CN110276261A (en) * | 2019-05-23 | 2019-09-24 | 平安科技(深圳)有限公司 | Personnel automatically track monitoring method, device, computer equipment and storage medium |
CN112052803A (en) * | 2020-09-10 | 2020-12-08 | 四川创客知佳科技有限公司 | Wisdom garden control protection system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117611106A (en) * | 2024-01-17 | 2024-02-27 | 深圳湾科技发展有限公司 | Smart park safe operation and maintenance method, system, equipment and medium |
CN117611106B (en) * | 2024-01-17 | 2024-04-26 | 深圳湾科技发展有限公司 | Smart park safe operation and maintenance method, system, equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103726879B (en) | Utilize camera automatic capturing mine ore deposit to shake and cave in and the method for record warning in time | |
CN108319926A (en) | A kind of the safety cap wearing detecting system and detection method of building-site | |
CN112785798B (en) | Behavior analysis method for constructors of power substation engineering construction project | |
KR102195706B1 (en) | Method and Apparatus for Detecting Intruder | |
CN110516522B (en) | Inspection method and system | |
CN111860152A (en) | Method, system, equipment and computer equipment for detecting personnel state | |
CN113076859A (en) | Safety monitoring method and system for face recognition, electronic equipment and storage medium | |
CN113034826A (en) | Video-based abnormal event warning method and system, equipment and storage medium thereof | |
CN110867046A (en) | Intelligent car washer video monitoring and early warning system based on cloud computing | |
KR20150031985A (en) | System for tracking dangerous situation in cooperation with mobile device and method thereof | |
CN113887445A (en) | Method and system for identifying standing and loitering behaviors in video | |
CN113012374A (en) | Intelligent park security system and control method thereof | |
CN113095132A (en) | Neural network-based gas field target detection and behavior identification method, system, terminal and storage medium | |
CN112595730A (en) | Cable breakage identification method and device and computer equipment | |
CN112381435A (en) | Gridding directional pushing management method for dynamic risk in hydropower station operation process | |
CN112800975A (en) | Behavior identification method in security check channel based on image processing | |
CN109800656B (en) | Positioning method and related product | |
KR102142315B1 (en) | ATM security system based on image analyses and the method thereof | |
US20130322690A1 (en) | Situation recognition apparatus and method using object energy information | |
KR20190072323A (en) | Image Monitoring System and Method for Monitoring Image | |
CN115394025A (en) | Monitoring method, monitoring device, electronic equipment and storage medium | |
CN115880631A (en) | Power distribution station fault identification system, method and medium | |
CN116246416A (en) | Intelligent analysis early warning platform and method for security protection | |
CN116824471A (en) | Intelligent derrick area operation monitoring method and system | |
CN111461655A (en) | Personnel management system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |