CN115761564A - Follower list processing method, abnormal travel event detection method and system - Google Patents

Follower list processing method, abnormal travel event detection method and system Download PDF

Info

Publication number
CN115761564A
CN115761564A CN202211205739.7A CN202211205739A CN115761564A CN 115761564 A CN115761564 A CN 115761564A CN 202211205739 A CN202211205739 A CN 202211205739A CN 115761564 A CN115761564 A CN 115761564A
Authority
CN
China
Prior art keywords
target object
identity information
follower
list
travel event
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211205739.7A
Other languages
Chinese (zh)
Inventor
赵安宁
沈剑
黄雪微
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Dahua Technology Co Ltd
Original Assignee
Zhejiang Dahua Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Dahua Technology Co Ltd filed Critical Zhejiang Dahua Technology Co Ltd
Priority to CN202211205739.7A priority Critical patent/CN115761564A/en
Publication of CN115761564A publication Critical patent/CN115761564A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Alarm Systems (AREA)

Abstract

The application relates to a follower list processing method, an abnormal travel event detection system, an electronic device and a storage medium, wherein a first target object and a second target object following the first target object are determined in a video image by acquiring the video image, and personnel characteristics of the first target object and the second target object are extracted; acquiring personnel file data, comparing personnel characteristics of a first target object and a second target object with the personnel characteristics in the personnel file data respectively, and determining identity information of the first target object and the second target object respectively according to comparison results; according to the identity information of the first target object, a follower list corresponding to the first target object is obtained, and the follower list is updated according to the identity information of the second target object, wherein the follower list comprises the identity information of at least one follower, so that the real-time maintenance of the guardian information is improved, and the manual maintenance cost is reduced.

Description

Follower list processing method, abnormal travel event detection method and system
Technical Field
The present application relates to the field of security technologies, and in particular, to a follower list processing method, an abnormal travel event detection system, an electronic device, and a storage medium.
Background
The related technology provides a transfer child behavior early warning system, and the face characteristics of a child and the face characteristics of a related guardian are input to serve as a judgment basis for judging whether the child is in a dangerous scene; monitoring the activity places of the children by adopting a camera, and collecting all human face characteristics contacted with the children; and analyzing the monitoring video and judging whether the child is in a safe state. However, the scheme needs to actively input the facial features of the children and the guardians for deployment and control, and the real-time performance of the guardians in information maintenance is low.
Aiming at the problem of low real-time performance of guardian information maintenance in the related technology, no effective solution is provided at present.
Disclosure of Invention
In the present embodiment, a method for processing a follower list, a method for detecting an abnormal travel event, a system for detecting an abnormal travel event, an electronic device and a storage medium are provided to solve the problem of low real-time performance of guardian information maintenance in the related art.
In a first aspect, a method for processing a follower list is provided in this embodiment, and includes:
acquiring a video image, determining a first target object and a second target object following the first target object in the video image, and extracting personnel characteristics of the first target object and the second target object;
acquiring personnel archive data, comparing personnel characteristics of the first target object and the second target object with personnel characteristics in the personnel archive data respectively, and determining identity information of the first target object and the second target object according to comparison results respectively;
and acquiring a follower list corresponding to the first target object according to the identity information of the first target object, and updating the follower list according to the identity information of the second target object, wherein the follower list comprises the identity information of at least one follower.
In some of these embodiments, updating the list of followers based on the identity information of the second target object includes:
judging whether the identity information of the second target object exists in the follower list or not;
and accumulating the intimacy degree corresponding to the second target object by one counting unit under the condition that the identity information of the second target object is judged to exist in the follower list, and sequencing the followers in the follower list according to the intimacy degree.
In some of these embodiments, the method further comprises:
and adding the identity information of the second target object to the follower list under the condition that the identity information of the second target object is judged not to exist in the follower list.
In some of these embodiments, determining a second target object in the video image that follows the first target object comprises:
determining at least one candidate person whose distance to the first target object is within a preset range in the video image;
determining at least one second target object among the at least one candidate person that is closest to the first target object based on the distance of each candidate person from the first target object.
In a second aspect, in this embodiment, a method for detecting an abnormal travel event is provided, including:
when a second target object carries a first target object and passes through a security inspection channel, acquiring identity information of the second target object and acquiring a follower list corresponding to the first target object, wherein the follower list comprises the follower list obtained in the first aspect;
and comparing the identity information of the second target object with the identity information of the follower in the follower list, and determining whether an abnormal travel event exists according to a comparison result.
In some embodiments, the comparing the identity information of the second target object with the identity information of the follower in the follower list, and determining whether an abnormal travel event exists according to a comparison result includes:
judging whether the sequence of the identity information of the second target object in the follower list is in the top N bits or not;
determining that no abnormal travel event exists under the condition that the sequence of the identity information of the second target object in the follower list is in the top N bits;
and determining that an abnormal travel event exists under the condition that the sequence of the identity information of the second target object in the follower list is not in the top N bits.
In some embodiments, after determining that an abnormal travel event exists, if it is determined that the second target object has an order of the identity information in the follower list that is not top N bits, the method further includes:
and triggering early warning information, wherein the early warning information is used for indicating that an abnormal travel event exists.
In some of these embodiments, obtaining a list of followers corresponding to the first target object includes:
acquiring a video image, and extracting personnel characteristics of the first target object according to the video image;
acquiring personnel file data, comparing the first target object with personnel characteristics in the personnel file data, and determining identity information of the first target object according to a comparison result;
and acquiring a follower list corresponding to the first target object according to the identity information of the first target object.
In a third aspect, in this embodiment, there is provided an abnormal travel event detection system, including: the device comprises a first processing unit and a second processing unit, wherein the first processing unit is connected with the second processing unit; wherein the first processing unit is configured to execute the method for processing a list of followers according to the first aspect; the second processing unit is configured to execute the abnormal travel event detection method according to the second aspect.
In some of these embodiments, further comprising: the first image acquisition unit is connected to the first processing unit and used for acquiring video images and sending the acquired video images to the first processing unit.
In some of these embodiments, further comprising: the second processing unit is respectively connected with the second image acquisition unit and the identity authentication unit; the second image acquisition unit is used for acquiring a video image and sending the video image to the second processing unit; the identity authentication unit is used for authenticating personnel identity information and sending the personnel identity information to the second processing unit.
In a fourth aspect, in the present embodiment, there is provided an electronic apparatus, comprising a memory and a processor, the memory having a computer program stored therein; the processor is configured to run the computer program to perform the method for processing a list of followers described in the first aspect, or the processor is configured to run the computer program to perform the method for detecting an abnormal travel event described in the second aspect.
In a fifth aspect, in the present embodiment, there is provided a computer-readable storage medium, on which a computer program is stored, the computer program, when being executed by a processor, implementing the steps of the method for processing a list of followers according to the first aspect, or the computer program, when being executed by a processor, implementing the steps of the method for detecting an abnormal travel event according to the second aspect.
Compared with the related art, the follower list processing method, the abnormal travel event detecting system, the electronic device, and the storage medium provided in the present embodiment determine, by acquiring a video image, a first target object and a second target object following the first target object in the video image, and extract the person characteristics of the first target object and the second target object; acquiring personnel file data, comparing personnel characteristics of a first target object and a second target object with the personnel characteristics in the personnel file data respectively, and determining identity information of the first target object and the second target object respectively according to comparison results; the method comprises the steps of obtaining a follower list corresponding to a first target object according to identity information of the first target object, and updating the follower list according to identity information of a second target object, wherein the follower list comprises identity information of at least one follower, so that the problem of low real-time maintenance of the guardian information is solved, the real-time maintenance of the guardian information is improved, and meanwhile, the manual maintenance cost is reduced.
The details of one or more embodiments of the application are set forth in the accompanying drawings and the description below to provide a more thorough understanding of the application.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a block diagram of a hardware structure of a terminal according to a method in an embodiment of the present application;
FIG. 2 is a flow chart of a method for processing a follower list in an embodiment of the present application;
FIG. 3 is a schematic diagram illustrating a terminal recognizing a target object according to an embodiment of the present application;
fig. 4 is a flowchart of an abnormal travel event detection method according to an embodiment of the present application;
fig. 5 is a block diagram of a first structure of an abnormal travel event detection system according to an embodiment of the present application;
fig. 6 is a block diagram of a structure of an abnormal travel event detection system in an embodiment of the present application;
fig. 7 is a topology structure diagram of an abnormal travel event detection system in an embodiment of the present application;
fig. 8 is a flowchart illustrating an operation of the abnormal travel event detection system according to an embodiment of the present application.
Detailed Description
For a clearer understanding of the objects, aspects and advantages of the present application, reference is made to the following description and accompanying drawings.
Unless defined otherwise, technical or scientific terms referred to herein shall have the same general meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The use of the terms "a" and "an" and "the" and similar referents in the context of describing the invention (including a reference to the context of the specification and claims) are to be construed to cover both the singular and the plural, as well as the singular and plural. The terms "comprises," "comprising," "has," "having," and any variations thereof, as referred to in this application, are intended to cover non-exclusive inclusions; for example, a process, method, and system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to the listed steps or modules, but may include other steps or modules (elements) not listed or inherent to such process, method, article, or apparatus. Reference in this application to "connected," "coupled," and the like is not intended to be limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. Reference to "a plurality" in this application means two or more. "and/or" describes the association relationship of the associated object, indicating that there may be three relationships, for example, "a and/or B" may indicate: a exists alone, A and B exist simultaneously, and B exists alone. In general, the character "/" indicates a relationship in which the objects associated before and after are an "or". Reference in the present application to the terms "first," "second," "third," etc., merely distinguish between similar objects and do not denote a particular order or importance to the objects.
The method embodiments provided in the present embodiment may be executed in a terminal, a computer, or a similar computing device. For example, the method is executed on a terminal, and fig. 1 is a block diagram of a hardware structure of the terminal according to the method of the embodiment of the present application. As shown in fig. 1, the terminal may include one or more processors (only one shown in fig. 1) and a memory for storing data, wherein the processors may include, but are not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA. The terminal may further include a transmission device for a communication function and an input-output device. It will be understood by those of ordinary skill in the art that the structure shown in fig. 1 is merely an illustration and is not intended to limit the structure of the terminal described above. For example, the terminal may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1.
The memory can be used for storing computer programs, for example, software programs and modules of application software, such as computer programs corresponding to the method in the embodiment, and the processor executes various functional applications and data processing by running the computer programs stored in the memory, so as to implement the method. The memory may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory may further include memory remotely located from the processor, which may be connected to the terminal over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device is used to receive or transmit data via a network. The network described above includes a wireless network provided by a communication provider of the terminal. In one example, the transmission device includes a Network adapter (NIC) that can be connected to other Network devices through a base station so as to communicate with the internet. In one example, the transmission device may be a Radio Frequency (RF) module, which is used for communicating with the internet in a wireless manner.
It should be noted that the user information (including but not limited to user device information, user personal information, etc.) and data (including but not limited to data for analysis, stored data, displayed data, etc.) referred to in the present application are information and data authorized by the user or sufficiently authorized by each party. The embodiment of the application relates to the acquisition, storage, use, processing and the like of data, which conform to relevant regulations of national laws and regulations.
The following embodiments are not only applicable to child guardian information maintenance, but also applicable to other subject guardian information maintenance, such as the elderly, patients, and other persons without complete civil activity capability or lacking self-care capability, who need to be active under the guardian's care. Unless otherwise stated, the following embodiments are described by taking the child guardian information maintenance as an example.
In one embodiment, as shown in fig. 2, a method for processing a follower list is provided, which is described by taking the method as an example applied to the terminal in fig. 1, and includes the following steps:
step S201, acquiring a video image, determining a first target object and a second target object following the first target object in the video image, and extracting the person features of the first target object and the second target object.
The video images comprise images shot by the networked cameras, the networked cameras are distributed in public places to capture pedestrian images, and the networked cameras are authorized by the related service systems and can be accessed into the related service systems to store and process the captured video images. The terminal can obtain the video image by directly accessing the camera or accessing the related service system.
The first target object refers to a person without complete civil performance or lacking self-care ability, such as children, the elderly, and sick patients, who usually need to be under the care of a guardian. The second target object, which refers to a person suspected to be a guardian of the first target object, such as an adult, is usually fully democratic.
The person features refer to one or more of human face features, human body features and head and shoulder features. The age of the target object may be determined based on the person characteristics to determine whether it is a first target object, a second target object, or otherwise. Illustratively, the first target object may be a child and the second target object may be an adult. Optionally, if the face image in the video image is clearer, the age of the target object can be accurately identified based on the face features preferentially; based on human body characteristics, the age of a target object can be preliminarily identified under the condition that a clear face does not appear in an acquired video image; in the case of dense flow of people, the complete human body characteristics cannot be acquired, and at this time, the age of the target object can be identified based on the head and shoulder characteristics. Furthermore, the gender, the clothing, the backpack, the hat and other related attributes of the target object can be identified by means of the personnel characteristics.
Step S202, acquiring personnel archive data, comparing personnel characteristics of the first target object and the second target object with the personnel characteristics in the personnel archive data respectively, and determining identity information of the first target object and the second target object according to comparison results respectively.
The personnel file data refers to data provided by a related service system, and at least comprises personnel characteristics and personnel identity information, wherein the personnel characteristics and the identity information are stored in a correlation mode. The terminal can extract personnel features based on the video images, compare the personnel features with personnel features in the personnel document data, and respectively determine identity information of the first target object and the second target object according to comparison results. Illustratively, the terminal compares the facial features extracted from the video image with the facial features in the personnel profile data, and respectively determines the identity information of the first target object and the second target object according to the comparison result.
Step S203, obtaining a follower list corresponding to the first target object according to the identity information of the first target object, and updating the follower list according to the identity information of the second target object, where the follower list includes identity information of at least one follower.
The follower list is stored in association with the identity information of the first target object, and the follower list can be stored in the relevant service system or in the terminal, wherein the storage and processing of the follower list by the terminal are authorized by the relevant service system. Illustratively, the first target object is a child, and the follower included in the list of followers may be an orthodox and/or a paralog of the child, such as a parent, grandparent, sibling. If the guardian is added to the child, the information of the new guardian needs to be additionally recorded. In this case, the present embodiment can compare the identity information of the second target object with the identity information already existing in the follower list, so as to update the follower list in real time.
Through the steps S201 to S203, under the condition that the guardian is changed, the personnel characteristics of the child and the guardian do not need to be actively input for deployment and control, the problem that the real-time performance of the guardian information maintenance is low is solved, the real-time performance of the guardian information maintenance is improved, and meanwhile, the manual maintenance cost is reduced.
In one embodiment, the list of followers may be updated by: judging whether the identity information of the second target object exists in the follower list or not; and accumulating the intimacy degree corresponding to the second target object by one counting unit under the condition that the identity information of the second target object is judged to exist in the follower list, and sequencing the followers in the follower list according to the intimacy degree. And adding the identity information of the second target object to the follower list under the condition that the identity information of the second target object is judged not to exist in the follower list.
For example, if the terminal recognizes that the identity information of the follower of the child is not in the follower list, the person information of the follower is added to the follower list to update the follower list, such as adding the identity information and name. Optionally, an initial value of intimacy degree may be set for the follower. And if the terminal identifies that the identity information of the follower of the child is stored in the follower list, adding 1 to the intimacy of the follower, and sequencing the follower information recorded in the follower list in a reverse order according to the intimacy so as to update the follower list.
The initial establishment of the follower list can be generated by manually and actively inputting the monitored person and the actual guardian, for example, the identity information of the child and the identity information of the parent of the child are input, and an initial value of the intimacy degree is set for each guardian, wherein the intimacy degree is used for representing the probability that the follower in the follower list is the actual guardian of the child. The terminal updates the follower list in real time based on the captured video image, the more the number of times of following certain personnel in the video image is, the higher the intimacy setting of the personnel is, and therefore, the probability that the personnel belong to an actual guardian is higher; the follower with the last degree of intimacy may be originally listed as an actual guardian but cannot perform the monitoring task for some reasons, or may be a temporarily appearing non-actual guardian. So set up, can implement and track the frequency that the follower appears at children's side, the validity of guardian is qualitative comparatively accurately.
In one embodiment, the terminal determines a second target object that follows the first target object in the video image by: determining at least one candidate person in the video image, wherein the distance between the candidate person and the first target object is within a preset range; at least one second target object which is closest to the first target object is determined among the at least one candidate person on the basis of the distance of the respective candidate person from the first target object.
Illustratively, as shown in fig. 3, the terminal extracts body type features from a video image, preliminarily identifies a child and an adult based on the body type features, takes the child as a first target object, finds one or more adults within a range of 2 meters with the child as a center, and frames 3 adults closest to the child among the adults as a second target object. Further, the terminal extracts the facial features of the children and the 3 adults to be compared with the personnel profile data. By the arrangement, automatic tracking of the first target object and the second target object is realized.
As known, population transfer is mainly checked by manually analyzing the track of people in the monitoring video, the checking difficulty is high, the efficiency is low, and in the checking process, the transferred population probably leaves the region where the transferred population probably leaves. The related technology provides a missing child searching system, which uploads a reference picture and related identity information of a child judged to be in a missing state to a remote management center, a mobile client is used for displaying the reference picture of the current missing child in real time to a user, the user can shoot a clue picture of the suspected missing child through the mobile client, the clue picture is uploaded to the remote management center and matched with the reference picture of the missing child stored in the remote management center, and when the matching is successful, a matching result is uploaded to a related service system. However, the scheme is poor in timeliness, and when the child is confirmed to be in a missing state, the child is likely to exceed the monitoring range of the current area; according to the scheme, other users need to actively upload suspected missing child information, the searching system is relatively passive in operation, and when the uploaded suspected missing child information is confirmed to be correct, a certain time is needed for rescuing the child, and personnel can be transferred again.
In view of the above problem and the method for processing a list of followers in combination with the above embodiment, in an embodiment, as shown in fig. 4, there is provided a method for detecting an abnormal travel event, which is described by taking an example where the method is applied to a terminal in fig. 1, and includes the following steps:
step S401, when the second target object carries the first target object and passes through the security inspection channel, acquiring identity information of the second target object, and acquiring a follower list corresponding to the first target object, where the follower list includes the follower list obtained by any of the above embodiments.
The security inspection passageway refers to a passageway which is set up to ensure the safety of public places and is used for inspecting whether dangerous goods are carried in pedestrians and luggage goods thereof, such as security inspection passageways of automobiles, subways, motor cars, airports and the like.
The abnormal travel event refers to the fact that the monitored person goes out with an illegal guardian, such as population transit. Taking the detection of a child transfer event as an example, a child is used as a first target object, an adult is used as a second target object, and when the adult carries the child in and out of the security inspection channel, the staff requires to acquire adult identity information and a child image. Specifically, the identity authentication system performs identity authentication on an adult on site, and the terminal acquires identity information of the adult based on the identity authentication system; the networked cameras are controlled in public places to capture images of pedestrians, and the terminals can access the networked cameras to acquire facial images of children and identify identity information of the children, so that follower lists corresponding to the children are acquired, which are introduced in the above embodiments and are not described herein again.
Step S402, comparing the identity information of the second target object with the identity information of the follower in the follower list, and determining whether an abnormal travel event exists according to the comparison result.
If the follower of the child is 3 adults, comparing the identity information of the 3 adults with the identity information in the follower list, and determining whether the 3 adults are the actual guardians of the child according to the comparison result, thereby judging whether a child transfer event exists.
Through the steps S401 to S402, on one hand, considering that the person under guardianship is transferred to a different place, public transportation modes such as long-distance bus, train or airplane need to be taken, if the person under guardianship is intercepted in time at the key bayonets, the safety of children is greatly improved, and the occurrence of transfer events of the children is reduced; on the other hand, the guardian can be automatically tracked by utilizing the real-time updated follower list, so that the wrong judgment caused by replacement of the guardian is avoided, and the accuracy of event detection is improved.
It should be noted that, although the foregoing embodiment only exemplifies the scheme of detecting the child transfer event, this does not limit that the method provided by the present application may also be applied to detect other abnormal travel events, for example, abnormal travel events of people without complete civil behavior ability or people without self-care ability, such as the elderly, patients, and the like, who generally need to move under the care of a guardian. Unless otherwise stated, the following examples are presented by taking the detection of a child transit event as an example.
In one embodiment, the comparing the identity information of the second target object with the identity information of the follower in the follower list, and determining whether an abnormal travel event exists according to the comparison result includes: judging whether the sequence of the identity information of the second target object in the follower list is in the first N bits or not; determining that no abnormal travel event exists under the condition that the sequence of the identity information of the second target object in the follower list is in the top N bits; and under the condition that the sequence of the identity information of the second target object in the follower list is not in the top N bits, determining that an abnormal travel event exists.
Wherein N is a positive integer. The second target objects may be one or more second target objects, and when there are a plurality of second target objects, the ordering of the identity information of the second target object in the follower list is in the top N bits, which may mean that the ordering of the identity information of at least one second target object in the follower list is in the top N bits, or that the ordering of the identity information of all second target objects in the follower list is in the top N bits. Illustratively, the terminal compares the identity information of 3 adults with the list of the followers, and finds that at least one of the 3 adults has a top 3-degree affinity ranking, which indicates that it is possible that an actual guardian (relatives) and a non-guardian (friends of relatives) carry children to go out, and belongs to a safe situation, i.e. there is no abnormal trip event. If none of the 3 adults has an intimacy ranking in the top 3, it is indicated that all of the 3 adults are non-guardians who carry children to go out, and the conditions are unsafe, namely, abnormal going events exist. In order to improve the safety, the severity of the judgment condition can be further improved, namely, only when the intimacy ranking of 3 adults is judged to be in the first 3 positions, the abnormal trip event is judged not to exist, and otherwise, the abnormal trip event is judged to exist.
Further, after determining that an abnormal travel event exists in the case that it is determined that the identity information of the second target object is not sorted in the top N bits in the follower list, the method further includes: and triggering an early warning message, wherein the early warning message is used for indicating that an abnormal trip event exists.
In one embodiment, the terminal obtains the list of followers corresponding to the first target object by: acquiring a video image, and extracting personnel characteristics of a first target object according to the video image; acquiring personnel archive data, comparing the first target object with personnel characteristics in the personnel archive data, and determining the identity information of the first target object according to a comparison result; and acquiring a follower list corresponding to the first target object according to the identity information of the first target object.
In this embodiment, the terminal acquires a video image of a child through the networked camera, extracts a face feature, acquires the person profile data, compares the face feature of the child with the face feature in the person profile data to determine the identity information of the child, and acquires a follower list corresponding to the child based on the identity information of the child. The personal profile data has been described in the above embodiments, and will not be described herein.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, database, or other medium used in the embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high-density embedded nonvolatile Memory, resistive Random Access Memory (ReRAM), magnetic Random Access Memory (MRAM), ferroelectric Random Access Memory (FRAM), phase Change Memory (PCM), graphene Memory, and the like. Volatile Memory can include Random Access Memory (RAM), external cache Memory, and the like. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others. The databases referred to in various embodiments provided herein may include at least one of relational and non-relational databases. The non-relational database may include, but is not limited to, a block chain based distributed database, and the like. The processors referred to in the various embodiments provided herein may be, without limitation, general purpose processors, central processing units, graphics processors, digital signal processors, programmable logic devices, quantum computing-based data processing logic devices, or the like.
In an embodiment, an abnormal travel event detection system is further provided, which is used to implement the foregoing embodiment and the preferred embodiments, and the description already made is omitted for brevity. The terms "module," "unit," "sub-unit," and the like as used below may implement a combination of software and/or hardware of predetermined functions. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware or a combination of software and hardware is also possible and contemplated. As shown in fig. 5, the abnormal travel event detection system includes: the system comprises a first processing unit and a second processing unit, wherein the first processing unit is connected with the second processing unit; the first processing unit is used for executing the follower list processing method of any one of the embodiments; the second processing unit is configured to execute the abnormal travel event detection method according to any of the embodiments.
In one embodiment, referring to fig. 6, the abnormal travel event detecting system further includes: the first image acquisition unit is connected to the first processing unit and used for acquiring video images and sending the acquired video images to the first processing unit.
In one embodiment, with continued reference to fig. 6, the abnormal travel event detection system further includes: the second processing unit is respectively connected with the second image acquisition unit and the identity authentication unit; the second image acquisition unit is used for acquiring a video image and sending the video image to the second processing unit; the identity authentication unit is used for authenticating the identity information of the personnel and sending the identity information of the personnel to the second processing unit.
The above modules may be functional modules or program modules, and may be implemented by software or hardware. For a module implemented by hardware, the above modules may be located in the same processor; or the modules can be respectively positioned in different processors in any combination.
It should be noted that the abnormal travel event detection system provided by the present application may detect not only a child transfer event, but also other abnormal travel events, for example, abnormal travel events of people without complete civil performance or people without self-care ability, such as the elderly and patients, who need to move under the care of a guardian. Unless otherwise stated, the following examples are presented with the detection of a child transit event as an example.
In an embodiment, fig. 7 provides a topological structure diagram of an abnormal travel event detecting system, please refer to fig. 7, the topological structure includes: the system comprises a plurality of front-end cameras, a cloud platform, a security check camera and an identity authentication system, wherein the cloud platform is in communication connection with the plurality of front-end cameras, the security check camera and the identity authentication system respectively; the system comprises a plurality of front-end cameras, a plurality of image acquisition units and a plurality of image processing units, wherein the front-end cameras are used as first image acquisition units and are used for acquiring information of children and accompanying people; the safety inspection camera is used as a second image acquisition unit and is used for acquiring child information; the identity authentication system is provided with an identity authentication unit for authenticating the identity of the follower of the child; the cloud platform is provided with a first processing unit and a second processing unit, and the first processing unit and the second processing unit are used for carrying out cluster analysis on children and followers, creating or updating a follower list of each child, analyzing child information and follower identity authentication returned by the security inspection channel, and triggering early warning if the followers are judged not to be in the front N of the follower list.
Further, referring to fig. 8, an operation flowchart of the abnormal travel event detection system is shown, where the process includes the following steps:
step S801, a plurality of front-end cameras collect first video images and upload the first video images to a cloud platform;
step S802, the cloud platform extracts personnel characteristics in the first video image and judges whether the first video image is a child or not; if yes, go to step S803; if not, ending the flow;
step S803, the cloud platform judges whether a follower exists in the first video image; if yes, go to step S804; if not, ending the flow;
step S804, the cloud platform judges whether the identity information of the follower exists in a follower list or not; if yes, go to step S805; if not, go to step S806;
step S807, a camera at a security check position collects a second video image and uploads the second video image to a cloud platform;
step S808, the identity authentication system performs identity authentication on the accompanying adults and uploads identity authentication information to the cloud platform;
step S809, the cloud platform acquires a follower list corresponding to the child, and compares the identity information of the adult with the identity information in the follower list;
step S810, judging whether the identity information of the adult is in the first N positions by the cloud platform; if yes, ending the process; if not, executing step S811;
step S811, the cloud platform triggers early warning.
The abnormal trip event detection system in the embodiment of the application has the following advantages:
(1) The method has the advantages of convenience, generation of information of the children and the followers of the children, no need of user input, and automatic analysis and generation through the clustering platform.
(2) The system has high real-time performance, and can automatically judge whether a child transfer event exists or not when people carrying children go through security check, and field workers can intervene and process immediately if the event occurs.
(3) Possess the automatic maintenance function of information, according to the monitoring information of every day social meeting, personnel's data can in time be updated, and a children support many followers, avoid changing the wrong report that leads to because of the guardian.
(4) The coverage area is wide, and key precaution is not influenced by single camera irradiation field of vision, as long as the target object appears under arbitrary one networking camera, children's information all can be recorded, and the security installations carries out incident early warning and judges, need not additionally increase human input.
In one embodiment, there is also provided an electronic device comprising a memory and a processor, the memory having stored therein a computer program; the processor is arranged to run the computer program to perform the method for processing a list of followers of any of the embodiments described above, or the processor is arranged to run the computer program to perform the method for detecting an abnormal travel event of any of the embodiments described above. It should be noted that, for specific examples in this embodiment, reference may be made to the examples described in the foregoing embodiments and optional implementations, and details are not described again in this embodiment.
In one embodiment, a computer readable storage medium is further provided, on which a computer program is stored, which when executed by a processor implements the steps of the method for processing a list of followers of any of the above embodiments, or which when executed by a processor implements the steps of the method for detecting an abnormal travel event of any of the above embodiments. It should be noted that, for specific examples in this embodiment, reference may be made to the examples described in the foregoing embodiment and optional implementation manners, and details are not described in this embodiment again.
It should be understood that the specific embodiments described herein are merely illustrative of this application and are not intended to be limiting. All other embodiments, which can be derived by a person skilled in the art from the examples provided herein without any inventive step, shall fall within the scope of protection of the present application.
It is obvious that the drawings are only examples or embodiments of the present application, and it is obvious to those skilled in the art that the present application can be applied to other similar cases according to the drawings without creative efforts. Moreover, it should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which may vary from one implementation to another.
Reference throughout this application to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the present application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is to be expressly and implicitly understood by one of ordinary skill in the art that the embodiments described in this application may be combined with other embodiments without conflict.
The above-mentioned embodiments only express several implementation modes of the present application, and the description thereof is specific and detailed, but not construed as limiting the scope of the patent protection. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present application shall be subject to the appended claims.

Claims (13)

1. A method for processing a list of followers, comprising:
acquiring a video image, determining a first target object and a second target object following the first target object in the video image, and extracting personnel characteristics of the first target object and the second target object;
acquiring personnel archive data, comparing personnel characteristics of the first target object and the second target object with personnel characteristics in the personnel archive data respectively, and determining identity information of the first target object and the second target object according to comparison results respectively;
and acquiring a follower list corresponding to the first target object according to the identity information of the first target object, and updating the follower list according to the identity information of the second target object, wherein the follower list comprises the identity information of at least one follower.
2. The method according to claim 1, wherein updating the list of followers according to the identity information of the second target object comprises:
judging whether the identity information of the second target object exists in the follower list or not;
and accumulating the intimacy degree corresponding to the second target object by one counting unit under the condition that the identity information of the second target object is judged to exist in the follower list, and sequencing the followers in the follower list according to the intimacy degree.
3. The method of processing a list of followers as claimed in claim 2, characterized in that said method further comprises:
and adding the identity information of the second target object to the follower list under the condition that the identity information of the second target object is judged not to exist in the follower list.
4. The method according to claim 1, wherein determining a second target object following the first target object in the video image comprises:
determining at least one candidate person whose distance to the first target object is within a preset range in the video image;
determining at least one second target object among the at least one candidate person that is closest to the first target object based on the distance of each candidate person from the first target object.
5. An abnormal travel event detection method is characterized by comprising the following steps:
under the condition that a second target object carries a first target object to pass through a security inspection channel, acquiring identity information of the second target object and acquiring a follower list corresponding to the first target object, wherein the follower list comprises the follower list obtained by the method of any one of claims 1 to 4;
and comparing the identity information of the second target object with the identity information of the follower in the follower list, and determining whether an abnormal travel event exists according to a comparison result.
6. The abnormal travel event detection method of claim 5, wherein comparing the identity information of the second target object with the identity information of the follower in the follower list, and determining whether an abnormal travel event exists according to the comparison result comprises:
judging whether the sequence of the identity information of the second target object in the follower list is in the top N bits or not;
determining that no abnormal travel event exists under the condition that the sequence of the identity information of the second target object in the follower list is in the top N bits;
and determining that an abnormal travel event exists under the condition that the sequence of the identity information of the second target object in the follower list is not in the top N bits.
7. The abnormal travel event detection method according to claim 6, wherein after determining that an abnormal travel event exists when it is determined that the second target object has an identity information not sorted in the top N bits in the list of followers, the method further comprises:
and triggering early warning information, wherein the early warning information is used for indicating that an abnormal travel event exists.
8. The abnormal travel event detection method of claim 5, wherein obtaining a list of followers corresponding to said first target object comprises:
acquiring a video image, and extracting the personnel characteristics of the first target object according to the video image;
acquiring personnel archive data, comparing the first target object with personnel characteristics in the personnel archive data, and determining the identity information of the first target object according to a comparison result;
and acquiring a follower list corresponding to the first target object according to the identity information of the first target object.
9. An abnormal travel event detection system, comprising: the device comprises a first processing unit and a second processing unit, wherein the first processing unit is connected with the second processing unit; wherein the first processing unit is configured to perform the method of processing a list of followers of any of claims 1 to 4; the second processing unit is configured to execute the abnormal travel event detection method according to any one of claims 5 to 8.
10. The abnormal travel event detection system of claim 9, further comprising: the first image acquisition unit is connected to the first processing unit and used for acquiring video images and sending the acquired video images to the first processing unit.
11. The abnormal travel event detection system according to claim 9, further comprising: the second processing unit is respectively connected with the second image acquisition unit and the identity authentication unit; the second image acquisition unit is used for acquiring a video image and sending the video image to the second processing unit; the identity authentication unit is used for authenticating personnel identity information and sending the personnel identity information to the second processing unit.
12. An electronic device comprising a memory and a processor, wherein the memory has stored therein a computer program; the processor is arranged to run the computer program to perform the method of list of followers processing according to any of claims 1 to 4 or the processor is arranged to run the computer program to perform the method of abnormal travel event detection according to any of claims 5 to 8.
13. A computer readable storage medium, having stored thereon a computer program, characterized in that the computer program, when being executed by a processor, realizes the steps of the method for processing a list of followers according to any one of claims 1 to 4, or, when being executed by a processor, realizes the steps of the method for detecting an abnormal travel event according to any one of claims 5 to 8.
CN202211205739.7A 2022-09-30 2022-09-30 Follower list processing method, abnormal travel event detection method and system Pending CN115761564A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211205739.7A CN115761564A (en) 2022-09-30 2022-09-30 Follower list processing method, abnormal travel event detection method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211205739.7A CN115761564A (en) 2022-09-30 2022-09-30 Follower list processing method, abnormal travel event detection method and system

Publications (1)

Publication Number Publication Date
CN115761564A true CN115761564A (en) 2023-03-07

Family

ID=85350693

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211205739.7A Pending CN115761564A (en) 2022-09-30 2022-09-30 Follower list processing method, abnormal travel event detection method and system

Country Status (1)

Country Link
CN (1) CN115761564A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117058518A (en) * 2023-08-03 2023-11-14 南方电网数字电网研究院有限公司 Deep learning target detection method and device based on YOLO improvement and computer equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117058518A (en) * 2023-08-03 2023-11-14 南方电网数字电网研究院有限公司 Deep learning target detection method and device based on YOLO improvement and computer equipment
CN117058518B (en) * 2023-08-03 2024-05-03 南方电网数字电网研究院有限公司 Deep learning target detection method and device based on YOLO improvement and computer equipment

Similar Documents

Publication Publication Date Title
WO2019153193A1 (en) Taxi operation monitoring method, device, storage medium, and system
US20220092881A1 (en) Method and apparatus for behavior analysis, electronic apparatus, storage medium, and computer program
CN110209835B (en) Anomaly detection method and device, computer storage medium and electronic equipment
CN109583278B (en) Face recognition alarm method, device and system and computer equipment
JP2018173914A (en) Image processing system, imaging apparatus, learning model creation method, and information processing device
WO2019024414A1 (en) Method to prevent getting lost and terminal device
CN112132045A (en) Community personnel abnormal behavior monitoring scheme based on computer vision
CN111918039A (en) Artificial intelligence high risk operation management and control system based on 5G network
CN110910606B (en) Target tracking-based child anti-lost method and system
KR20160074208A (en) System and method for providing safety service using beacon signals
CN113343913A (en) Target determination method, target determination device, storage medium and computer equipment
CN113378616A (en) Video analysis method, video analysis management method and related equipment
CN115761564A (en) Follower list processing method, abnormal travel event detection method and system
CN110781735A (en) Alarm method and system for identifying on-duty state of personnel
CN111325954A (en) Personnel loss early warning method, device, system and server
CN108537920B (en) Visitor monitoring method and system based on face recognition
CN115171260A (en) Intelligent access control system based on face recognition
CN115880631A (en) Power distribution station fault identification system, method and medium
CN112017401A (en) Alarm system for monitoring the safety of persons, corresponding method and storage medium
CN114519879A (en) Human body data archiving method, device, equipment and storage medium
CN113645439B (en) Event detection method and system, storage medium and electronic device
CN113743248A (en) Identity information extraction method, device, electronic device and storage medium
Rashid et al. Unravel: An anomalistic crowd investigation framework using social airborne sensing
Giuliano et al. Integration of video and radio technologies for social distancing
Gheorghiu et al. Computer vision application to determine crowdedness in public transport stations

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination