CN115802090A - Video occlusion method, system, computer device and storage medium - Google Patents

Video occlusion method, system, computer device and storage medium Download PDF

Info

Publication number
CN115802090A
CN115802090A CN202211249722.1A CN202211249722A CN115802090A CN 115802090 A CN115802090 A CN 115802090A CN 202211249722 A CN202211249722 A CN 202211249722A CN 115802090 A CN115802090 A CN 115802090A
Authority
CN
China
Prior art keywords
video
ipc
preset
equipment
ipc equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211249722.1A
Other languages
Chinese (zh)
Inventor
张晓慧
张祖海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Dahua Technology Co Ltd
Original Assignee
Zhejiang Dahua Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Dahua Technology Co Ltd filed Critical Zhejiang Dahua Technology Co Ltd
Priority to CN202211249722.1A priority Critical patent/CN115802090A/en
Publication of CN115802090A publication Critical patent/CN115802090A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Closed-Circuit Television Systems (AREA)

Abstract

The application relates to a video occlusion method, a system, a computer device and a storage medium, wherein the method is suitable for a video occlusion system; the video occlusion system comprises: the system comprises a server and a plurality of IPC devices accessed to the server; the method comprises the following steps: acquiring a first configuration obtained by associating IPC equipment related to first IPC equipment to be detected based on a first preset event; detecting whether a first preset event occurs in the first IPC equipment or not based on a first preset time period; if the first IPC equipment is detected to have the first preset event, the first IPC equipment and at least one associated IPC equipment are triggered according to the first configuration, and the corresponding preset area of the video is shielded. Through the method and the device, when the preset event is detected, all the related monitoring equipment can be automatically linked to shield the related content, and the problem that the video channel of the related monitoring equipment cannot be linked to shield is solved.

Description

Video occlusion method, system, computer device and storage medium
Technical Field
The present application relates to the field of monitoring device technologies, and in particular, to a video occlusion method, a system, a computer device, and a storage medium.
Background
With the development of computer and software technologies, in the video monitoring technology widely applied at present, the protection of privacy information has become a hot topic of society, and the protection of personal or organization privacy gradually becomes an urgent need.
The video privacy protection method is used for shielding a content area related to privacy when the content related to the privacy appears in a video picture so as to meet the requirement of privacy protection. At present, most of the monitoring devices are manually set by a user to be shielded and started or automatically start shielding at a specified time, but for monitoring devices with similar positions in the same area, the content related to privacy in the monitored video picture is usually related, if the content related to privacy appears, each related monitoring device needs to be set in sequence, and much inconvenience exists in practical application.
Aiming at the problem that the linkage of video channels of related monitoring equipment cannot be shielded in the related technology, no effective solution is provided at present.
Disclosure of Invention
The embodiment provides a video blocking method, a video blocking system, computer equipment and a storage medium, so as to solve the problem that the video channel linkage of related monitoring equipment cannot be blocked in the related technology.
In a first aspect, the present embodiment provides a video occlusion method, which is applied to a video occlusion system; the video occlusion system comprises: the system comprises a server and a plurality of IPC devices accessed to the server; the video occlusion method comprises the following steps:
acquiring a first configuration obtained by associating IPC equipment related to first IPC equipment to be detected based on a first preset event;
detecting whether the first preset event occurs in the first IPC equipment or not based on a first preset time period;
if the first preset event is detected to occur in the first IPC equipment, triggering the first IPC equipment and at least one associated IPC equipment according to the first configuration, and shielding a corresponding preset area of a video
In some of these embodiments, the method further comprises:
and when the shielding duration reaches the preset duration, correspondingly closing the shielding of the preset area in at least one shielded IPC equipment video.
In some of these embodiments, the method further comprises:
acquiring a second configuration obtained by associating the IPC equipment related to a second IPC equipment to be detected based on a second preset event;
detecting whether the second preset event occurs in the second IPC equipment or not based on a second preset time period;
if the second preset event is detected to occur in the second IPC equipment, triggering at least one blocked IPC equipment according to the second configuration, and closing the blocking of the preset area in the corresponding video.
In some of these embodiments, the method further comprises:
detecting whether the first preset event in the first IPC equipment disappears or not based on the first preset time period;
if the first preset event is detected to disappear, triggering at least one shielded IPC device according to the first configuration, and closing the shielding of the preset area in the corresponding video.
In some embodiments, the obtaining a first configuration obtained by associating the IPC device related to the first IPC device to be detected based on the first preset event includes:
associating the IPC equipment related to the first IPC equipment position and/or monitoring content based on the first preset event;
and determining the preset area of each video channel according to the monitoring content in the first IPC equipment and the related IPC equipment, and setting a corresponding shielding block to obtain the first configuration.
In some embodiments, the triggering the first IPC device and the at least one associated IPC device according to the first configuration to block a corresponding preset area of a video includes:
and acquiring the triggered video stream transmitted by the IPC equipment, and shielding the preset area in the corresponding video by a superposition shielding block.
In a second aspect, there is provided in this embodiment a video occlusion system, comprising: the system comprises a user terminal, a server and a plurality of IPC (Internet protocol Camera) devices accessed to the server;
the user terminal is configured to configure an occlusion triggering rule and an occlusion closing rule and execute a video occlusion method of the first configuration obtained in the first aspect; configuring a preset event, a preset time period, associated IPC equipment and a preset area;
the server is configured to execute the video occlusion method according to the first aspect;
the IPC equipment is used for acquiring image information of a corresponding area, generating the video stream and transmitting the video stream to the server.
In some embodiments, the server comprises:
the intelligent analysis module is used for starting a corresponding algorithm library to analyze whether the preset event occurs in the video stream of the IPC equipment to be detected based on the preset event;
and the event management module is used for correspondingly triggering the IPC equipment to be detected and at least one associated IPC equipment in a linkage manner when the preset event occurs, and shielding or closing shielding of the corresponding preset area of the video.
In a third aspect, there is provided a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the video occlusion method of the first aspect when executing the computer program.
In a fourth aspect, in the present embodiment, there is provided a storage medium having stored thereon a computer program which, when executed by a processor, implements the video occlusion method of the first aspect.
Compared with the related art, the video occlusion method, the system, the computer device and the storage medium provided in the embodiment are suitable for a video occlusion system; the video occlusion system comprises: the IPC system comprises a server and a plurality of IPC devices accessed to the server; the video shielding method comprises the steps of obtaining a first configuration obtained by associating IPC equipment related to first IPC equipment to be detected based on a first preset event; detecting whether the first preset event occurs in the first IPC equipment or not based on a first preset time period; if the first IPC equipment is detected to have the first preset event, the first IPC equipment and at least one associated IPC equipment are triggered according to the first configuration to shield a corresponding preset area of a video, all associated monitoring equipment can be automatically subjected to linkage shielding of related contents when the preset event is detected, and the problem that video channels of the related monitoring equipment cannot be shielded in linkage is solved.
The details of one or more embodiments of the application are set forth in the accompanying drawings and the description below to provide a more thorough understanding of the application.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
FIG. 1 is a block diagram showing a hardware configuration of a terminal of a video occlusion method in one embodiment;
FIG. 2 is a block diagram of a video occlusion system, in one embodiment;
FIG. 3 is a diagram of a management interface for accessing an IPC device in one embodiment;
FIG. 4 is a flow diagram of a video occlusion method in one embodiment;
FIG. 5 is a schematic diagram of a video intelligent occlusion rule configuration interface in one embodiment;
FIG. 6 is a diagram of a close occlusion rule configuration interface in one embodiment;
FIG. 7 is a flow chart of a video occlusion method in a preferred embodiment.
In the figure: 102. a processor; 104. a memory; 106. a transmission device; 108. an input-output device; 10. a user terminal; 20. a server side; 21. an intelligent analysis module; 22. an event management module; 30. an IPC device.
Detailed Description
For a clearer understanding of the objects, aspects and advantages of the present application, reference is made to the following description and accompanying drawings.
Unless defined otherwise, technical or scientific terms used herein shall have the same general meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The use of the terms "a" and "an" and "the" and similar referents in the context of this application do not denote a limitation of quantity, either in the singular or the plural. The terms "comprises," "comprising," "has," "having," and any variations thereof, as referred to in this application, are intended to cover non-exclusive inclusions; for example, a process, method, and system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to the listed steps or modules, but may include other steps or modules (elements) not listed or inherent to such process, method, article, or apparatus. Reference throughout this application to "connected," "coupled," and the like is not limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. Reference to "a plurality" in this application means two or more. "and/or" describes an association relationship of associated objects, meaning that three relationships may exist, for example, "A and/or B" may mean: a exists alone, A and B exist simultaneously, and B exists alone. In general, the character "/" indicates a relationship in which the objects associated before and after are an "or". The terms "first," "second," "third," and the like in this application are used for distinguishing between similar items and not necessarily for describing a particular sequential or chronological order.
The method embodiments provided in the present embodiment may be executed in a terminal, a computer, or a similar computing device. For example, the method is executed on a terminal, and fig. 1 is a block diagram of a hardware structure of the terminal of the video occlusion method of this embodiment. As shown in fig. 1, the terminal may include one or more processors 102 (only one shown in fig. 1) and a memory 104 for storing data, wherein the processor 102 may include, but is not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA. The terminal may also include a transmission device 106 for communication functions and an input-output device 108. It will be understood by those of ordinary skill in the art that the structure shown in fig. 1 is merely an illustration and is not intended to limit the structure of the terminal described above. For example, the terminal may also include more or fewer components than shown in FIG. 1, or have a different configuration than shown in FIG. 1.
The memory 104 may be used to store a computer program, for example, a software program and a module of an application software, such as a computer program corresponding to the video occlusion method in the present embodiment, and the processor 102 executes the computer program stored in the memory 104 to execute various functional applications and data processing, i.e., to implement the above-mentioned method. The memory 104 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory located remotely from the processor 102, which may be connected to the terminal over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device 106 is used to receive or transmit data via a network. The network described above includes a wireless network provided by a communication provider of the terminal. In one example, the transmission device 106 includes a Network adapter (NIC) that can be connected to other Network devices through a base station to communicate with the internet. In one example, the transmission device 106 may be a Radio Frequency (RF) module, which is used to communicate with the internet in a wireless manner.
With the development of computer and software technologies, in the video monitoring technology widely applied at present, the protection of privacy information has become a hot topic of society, and the protection of personal or organization privacy gradually becomes an urgent need. For example, in some institutions with strong security, the entry and exit of people not only require security to the outside, but also require security to the people who view the monitoring system such as security in the organization in some special cases.
The video privacy protection method is used for shielding a content area related to privacy when the content related to the privacy appears in a video picture so as to meet the requirement of privacy protection. At present, most of the video monitoring devices are manually set by a user to be shielded and started or are set to automatically start shielding at a specified time, but the video content is random, if the video shielding at the specified time is specified, the monitoring safety during the video shielding period cannot be guaranteed, and for the monitoring devices with similar positions in the same area, the content related to privacy in the monitored video picture is usually related, if the content related to privacy appears, each related monitoring device is required to be set in sequence, and much inconvenience exists in practical application.
In order to solve the above problems, the following embodiments provide a video blocking method and system, which can automatically block related contents for all related monitoring devices when a preset event is detected, and solve the problem that video channels of related monitoring devices cannot be blocked in a linkage manner.
In this embodiment, a video occlusion system is provided, and fig. 2 is a block diagram of a structure of the system of this embodiment, as shown in fig. 2, the video occlusion system includes: a user terminal 10, a server 20, and several IPC devices 30 (IP cameras) accessing the server 20.
The user accesses the server 20 according to the security level of the user by logging in the corresponding terminal software in the user terminal 10, wherein the connection and disconnection of the IPC device 30 can also be managed through the user terminal 10.
Fig. 3 is a schematic diagram of a management interface of the IPC device in this embodiment, which includes some common configurations such as channel numbers, IP addresses, TCP ports, and accounts. And the user enters an access management interface of the terminal software, and clicks the add device button to click the connection button after inputting correct information on the popped access interface. If the connection is successful, the IPC equipment 30 is successfully accessed to the server 20; if the information of exceeding the access path number, exceeding the access bandwidth, being unable to connect and the like is prompted, the access is failed. According to the reason for prompting the access failure, system configuration adjustment or network state check can be carried out until the IPC equipment 30 is successfully accessed. If the IPC device 30 cannot access the server 20, the IPC device 30 cannot be started to realize the intelligent event detection or video blocking function.
The user terminal 10 configures the blocking trigger rule and the blocking closing rule, which include configuring a preset event, a preset time period, associating the IPC device 30 and a preset area, and further configures the blocking duration according to actual requirements.
Specifically, the occlusion triggering rule includes a preset event, a preset time period, the associated IPC device 30, and a preset area, and the occlusion closing rule may include a plurality of different configuration policies according to the user configuration, including a duration preset by the user, the preset event for occlusion closing, the preset time period, and the associated IPC device 30. The preset time and the preset time period for the blocking trigger may be the same as or completely different from the preset time and the preset time period for the blocking closing, that is, for one IPC device, two configurations for triggering the IPC device to block and close the blocking may be completely different.
Further, the user terminal 10 may also be configured to view audio and video data and intelligent detection result display in the server 20.
The server 20 is used for managing the accessed IPC device 30, and performing intelligent analysis and analysis result display on the video stream sent by the IPC device 30.
Specifically, the Server 20 may be, but not limited to, an IVSS (intelligent Video Surveillance Server), and the number of IPC devices 30 in the access Server 20 is determined according to the requirements of the user and the hardware configuration of the Server 20, and in general, a general IVSS may access 128 channels. An IPC device corresponds to a video channel in the server 20.
The server 20 includes an intelligent analysis module 21 and an event management module 22.
The intelligent analysis module 21 is configured to start a corresponding algorithm library to analyze whether a preset event occurs in the video stream of the IPC device to be detected based on the preset event. If yes, the event reporting function is triggered to report the event to the event management module 22. The preset event is any event that the server 20 algorithm library can support detection, including but not limited to face detection, human body detection, general behavior analysis (trip line intrusion, area intrusion, article leaving, fast movement, people gathering, article moving, etc.), and motor vehicle (non-motor vehicle) detection.
And the event management module 22 is used for correspondingly linkage triggering the IPC equipment to be detected and at least one associated IPC equipment when a preset event occurs, and shielding or closing the shielding of a corresponding preset area of the video.
The configured blocking triggering rule and the blocking closing rule are obtained from the user terminal 10, so that when a preset event occurs, whether the preset event is bound with the linkage function or not is detected, and if the preset event is bound with the linkage function, the associated IPC equipment is triggered to block or close the blocking according to the configured rule.
And the IPC equipment 30 is used for acquiring the image information of the corresponding area, generating a video stream and transmitting the video stream to the server 20.
Further, in some embodiments, the IPC device 30 has an intelligent analysis module, through which the IPC device 30 can detect whether a preset event occurs, so as to reduce the delay of sending the video stream to the server 20 for analysis.
In the video shielding system provided in this embodiment, by obtaining the shielding trigger rule configured by the user terminal, when the server detects that the preset event occurs in the IPC device to be detected, the IPC device to be detected and the associated IPC device are correspondingly triggered to shield the preset area in the video, or according to the shielding closing rule configured by the user terminal, the server correspondingly executes shielding closing in the IPC device video, so that all associated monitoring devices can be automatically linked to shield related contents when the preset event is detected, and the problem that video channels of the related monitoring devices cannot be linked to shield is solved.
In this embodiment, a video occlusion method is provided, which is suitable for the video occlusion system in the foregoing embodiment, and fig. 4 is a flowchart of the method in this embodiment, as shown in fig. 4, the method includes the following steps:
step S410, a first configuration obtained by associating the IPC device related to the first IPC device to be detected based on the first preset event is obtained.
Specifically, in the server of the video occlusion system, a first configuration configured by a user at a user terminal is obtained.
In practical application, the contents related to privacy in the monitored video pictures of the monitoring devices with similar positions in the same area are usually related, for example, when a first preset event is target face detection, and when a first IPC device to be detected detects a target face, other IPC devices with similar positions may detect different angles of the target face or other contents related to the target face and related to privacy, so that a first configuration can be obtained by associating the IPC devices related to the first IPC device to be detected.
Step S420, based on the first preset time period, detects whether the first preset event occurs in the first IPC device.
Specifically, a corresponding algorithm library is started to analyze whether a first preset event occurs in the first IPC device or not based on a first preset time period set by a user through an intelligent analysis module in the server. The preset event is any event that the server-side algorithm library can support detection, and includes but is not limited to face detection, human body detection, general behavior analysis (tripwire intrusion, regional intrusion, article leaving, rapid movement, personnel gathering, article moving and the like), motor vehicle (non-motor vehicle) detection and the like.
The preset time periods are 24 hours as a cycle and comprise one or more time periods set by a user. Preferably, in the 24-hour period, a minimum of 0 time period may be set, and a maximum of 7 time periods may be set.
Step S430, if the first IPC device is detected to have the first preset event, the first IPC device and at least one associated IPC device are triggered according to the first configuration, and the corresponding preset area of the video is shielded.
Specifically, if the intelligent analysis module detects that a first preset event occurs in the first IPC device, the intelligent analysis module triggers an event reporting function to report the event to the event management module in the server. The event management module detects whether a first preset event is bound with a linkage function, and if the first preset event is bound with the linkage function, the first IPC equipment and at least one associated IPC equipment are triggered to shield a preset area in the video according to a configured rule.
The preset area in the first IPC device is usually the corresponding position of the first preset event in the video, and the preset area in the associated IPC device may be the position of the first preset event in the video, or the position where other privacy content related to the first preset event appears, that is, it is described that the content blocked in the associated IPC device does not need to be consistent with the content blocked in the first IPC device. In addition, due to the fact that the positions and angles of different IPC devices are different, the preset areas in the video channels of the first IPC device and the associated IPC devices need to be configured respectively.
By obtaining the shielding triggering rules (including the first configuration, the first preset time period, the preset area and other configurations) configured by the user in the steps, when the server detects that the preset event occurs in the IPC equipment to be detected, the IPC to be detected and the associated IPC equipment are correspondingly triggered to shield the preset area in the video, all associated monitoring equipment can be automatically subjected to linkage shielding of relevant contents when the preset event is detected, and the problem that the video channel of the relevant monitoring equipment cannot be shielded in linkage is solved.
In some embodiments, the obtaining of the first configuration obtained by associating the IPC device associated with the first IPC device to be detected based on the first preset event includes the following steps:
associating the IPC equipment related to the position and/or the monitoring content of the first IPC equipment based on the first preset event; and determining the preset area of each video channel according to the monitoring content in the first IPC equipment and the related IPC equipment, and setting a corresponding shielding block to obtain a first configuration.
Specifically, because the monitored contents related to privacy in the video pictures of the monitoring devices with similar positions in the same area are usually associated, based on a first preset event, the IPC devices related to the first IPC device in position and/or monitoring contents are associated, and the preset area and the occlusion block in each video channel of the first IPC device and the associated IPC device are configured respectively.
Fig. 5 is a schematic diagram of a configuration interface of the video intelligent occlusion rule in this embodiment, where the occlusion rule includes configurations such as the first IPC device (the preset time channel in fig. 5), the first preset event (the preset event in fig. 5), the associated IPC device (the associated channel in fig. 5), the first preset time period (the detection time in fig. 5), and the occlusion block. The user can drag a mouse to draw a polygon on the image of the video channel corresponding to the first IPC device and the associated IPC device in the configuration interface to form a blocking block, and further, the color and the transparency of the blocking block can be selected according to requirements.
In practical application, different first preset events of the first IPC equipment can trigger the same associated IPC equipment to shield; the occlusion of an associated IPC device may also be triggered by different first predetermined events of different first IPC devices.
In the embodiment, the IPC devices related to the first IPC device are associated based on the first preset event, and the corresponding preset areas are set for the video channels corresponding to the IPC devices, so that when the first preset event is detected, the associated IPC devices can be automatically triggered to shield the video channels in the preset areas.
In some embodiments, the triggering of the first IPC device and the at least one associated IPC device according to the first configuration to block the corresponding preset area of the video includes the following steps:
and acquiring the triggered video stream transmitted by the IPC equipment, and shielding the preset area in the corresponding video by the superposition shielding block.
Specifically, the video streams transmitted by the first triggered IPC device and the related IPC devices are obtained in the server, and blocking blocks are superposed on the content displayed by the video streams according to the corresponding preset areas and the blocking blocks configured for the video channels to achieve blocking.
Further, the above-mentioned blocking function can also be implemented in an IPC device, comprising the steps of:
in the triggered IPC equipment, coding a preset area in the acquired video stream according to a first configuration so as to erase the video content in the preset area for shielding.
And after the triggered IPC equipment receives the linkage shielding event issued by the server, coding the corresponding preset area into the attribute of the shielding block so as to erase the video content of the preset area and transmit the coded video stream to the server.
In the embodiment, after linkage shielding is triggered, the preset region can be shielded in the triggered IPC equipment through the coding shielding block, and the preset region can also be shielded in the server through the superposition shielding block.
For the IPC device that has been blocked, different strategies for closing the blocking are correspondingly adopted according to the user configuration, which specifically refers to the following embodiments.
In some embodiments, when the blocking duration reaches the preset duration, blocking of the corresponding preset area in the at least one blocked IPC device video is correspondingly closed.
Specifically, according to the duration preset by the user, when the duration of the blocked IPC equipment reaches the preset duration, the blocking of the preset area of the IPC equipment video is automatically closed.
Fig. 6 is a schematic diagram of a configuration interface for closing an occlusion rule in this embodiment, as shown in fig. 6, a user may configure a duration (duration in fig. 6) in the configuration interface, preferably default to 5 minutes, if the duration set by the user is 0, it indicates that the occlusion duration is unlimited, and after the system triggers occlusion, an occlusion block exists until the user manually closes the occlusion.
In some embodiments, a second configuration obtained by associating the IPC device associated with a second IPC device to be detected based on a second preset event is obtained; detecting whether a second preset event occurs in the second IPC equipment or not based on a second preset time period; if a second preset event occurs in the second IPC equipment, triggering at least one blocked IPC equipment according to the second configuration, and closing the blocking of the preset area in the corresponding video.
Specifically, a corresponding algorithm library is started to analyze whether a second preset event occurs in the second IPC device or not based on a second preset time period set by the user through an intelligent analysis module in the server. The preset event is any event that the server-side algorithm library can support detection, and includes but is not limited to face detection, human body detection, general behavior analysis (tripwire intrusion, regional intrusion, article leaving, rapid movement, personnel gathering, article moving and the like), motor vehicle (non-motor vehicle) detection and the like.
If the intelligent analysis module detects that a second preset event occurs in the second IPC equipment, an event reporting function is triggered, and the event is reported to an event management module in the server. The event management module detects whether a second preset event is bound with a linkage function, and if the second preset event is bound with the linkage function, the second IPC equipment and at least one associated IPC equipment are triggered according to the configured rule, and the shielding of a preset area in the video is closed. As shown in fig. 6, the user may select an event in the configuration interface to trigger the occlusion closing, and similar to the configuration of the occlusion rule, the configuration of the occlusion closing is performed by configuring the second IPC device (the preset event channel in fig. 6), the second preset event (the preset event in fig. 6), and the second preset time period (the detection time in fig. 6).
It should be noted that, in this embodiment, different configurations may be performed between the second preset event and the first preset event, between the second IPC device and the first IPC device, and between the second preset time period and the first preset time period. For example, when an event of people gathering is detected in the video channel 1, the content of a preset area in the video channel 3 is blocked by corresponding linkage, but when an event that a face appears is detected in the video channel 2, the video channel 3 and the video channel 2 are associated, and the blocking in the video channel 3 is correspondingly closed.
In some embodiments, based on a first preset time period, detecting whether a first preset event disappears in the first IPC device; and if the first preset event is detected to disappear, triggering at least one shielded IPC device according to the first configuration, and closing the shielding of the preset area in the corresponding video.
Specifically, when the first preset event detected in the first IPC device disappears, for example, a person entering the monitoring range of the first IPC device walks out of the monitoring range, the corresponding first preset event detected by the face of the person disappears, and if the first preset event detected in the first IPC device disappears within the first preset time period, at least one blocked IPC device is triggered, so that the blocking of the preset area in the video channel is closed.
By configuring different corresponding shielding closing strategies according to the user in the three embodiments, different shielding closing strategies can be adopted according to actual requirements, for example, the shielding is set to be automatically closed after a preset shielding duration is reached, or the shielding is set to be automatically closed when a preset event is triggered.
The present embodiment is described and illustrated below by means of preferred embodiments.
FIG. 7 is a flow chart of the video occlusion method of the preferred embodiment, as shown in FIG. 7, the method includes the following steps:
step S710, based on the first preset event, associating the IPC equipment related to the first IPC equipment position and/or the monitoring content.
Step S720, determining the preset area of each video channel according to the monitoring content in the first IPC device and the related IPC device, and setting the corresponding shielding block to obtain the first configuration.
Step S730, detecting whether a first preset event occurs in the first IPC device based on the first preset time period.
Step S740, if it is detected that the first predetermined event occurs in the first IPC device, triggering the first IPC device and at least one associated IPC device according to the first configuration.
And step S750, acquiring the triggered video stream transmitted by the IPC equipment, and shielding a preset area in the corresponding video by the superposition shielding block.
Step S760, according to the user configuration, when the shielding time reaches the preset shielding duration or the second preset event is detected to occur, the shielding in the video channel of the IPC device which is shielded is closed.
It should be noted that the steps illustrated in the above-described flow diagrams or in the flow diagrams of the figures may be performed in a computer system, such as a set of computer-executable instructions, and that, although a logical order is illustrated in the flow diagrams, in some cases, the steps illustrated or described may be performed in an order different than here.
There is also provided in this embodiment a computer device comprising a memory having a computer program stored therein and a processor arranged to run the computer program to perform the steps of any of the method embodiments described above.
Optionally, the computer device may further include a transmission device and an input/output device, wherein the transmission device is connected to the processor, and the input/output device is connected to the processor.
It should be noted that, for specific examples in this embodiment, reference may be made to the examples described in the foregoing embodiments and optional implementations, and details are not described again in this embodiment.
In addition, in combination with the video occlusion method provided in the foregoing embodiment, a storage medium may also be provided in this embodiment. The storage medium having stored thereon a computer program; the computer program, when executed by a processor, implements any of the video occlusion methods of the above embodiments.
It should be noted that, the user information (including but not limited to user device information, user personal information, etc.) and data (including but not limited to data for analysis, stored data, presented data, etc.) referred to in the present application are information and data authorized by the user or sufficiently authorized by each party.
It should be understood that the specific embodiments described herein are merely illustrative of this application and are not intended to be limiting. All other embodiments, which can be derived by a person skilled in the art from the examples provided herein without any inventive step, shall fall within the scope of protection of the present application.
It is obvious that the drawings are only examples or embodiments of the present application, and it is obvious to those skilled in the art that the present application can be applied to other similar cases according to the drawings without creative efforts. Moreover, it should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which may vary from one implementation to another.
The term "embodiment" is used herein to mean that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the present application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is to be expressly or implicitly understood by one of ordinary skill in the art that the embodiments described in this application may be combined with other embodiments without conflict.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the patent protection. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present application shall be subject to the appended claims.

Claims (10)

1. A video occlusion method is characterized by being suitable for a video occlusion system; the video occlusion system comprises: the system comprises a server and a plurality of IPC devices accessed to the server; the video occlusion method comprises the following steps:
acquiring a first configuration obtained by associating IPC equipment related to first IPC equipment to be detected based on a first preset event;
detecting whether the first preset event occurs in the first IPC equipment or not based on a first preset time period;
and if the first preset event is detected to occur in the first IPC equipment, triggering the first IPC equipment and at least one associated IPC equipment according to the first configuration, and shading a corresponding preset area of a video.
2. The video occlusion method of claim 1, further comprising:
and when the shielding duration reaches the preset duration, correspondingly closing the shielding of the preset area in at least one shielded IPC equipment video.
3. The video occlusion method of claim 1, further comprising:
acquiring a second configuration obtained by associating the IPC equipment related to a second IPC equipment to be detected based on a second preset event;
detecting whether the second preset event occurs in the second IPC equipment or not based on a second preset time period;
if the second preset event is detected to occur in the second IPC equipment, triggering at least one blocked IPC equipment according to the second configuration, and closing the blocking of the preset area in the corresponding video.
4. The video occlusion method of claim 1, further comprising:
detecting whether the first preset event in the first IPC equipment disappears or not based on the first preset time period;
and if the first preset event is detected to disappear, triggering at least one shielded IPC device according to the first configuration, and closing the shielding of the preset area in the corresponding video.
5. The video occlusion method of any of claims 1-4, wherein the obtaining a first configuration obtained by associating an IPC device associated with a first IPC device to be detected based on a first preset event comprises:
associating the IPC equipment related to the first IPC equipment position and/or monitoring content based on the first preset event;
and determining the preset area of each video channel according to the monitoring content in the first IPC equipment and the related IPC equipment, and setting a corresponding shielding block to obtain the first configuration.
6. The video occlusion method of claim 1, wherein the triggering the first IPC device and the at least one associated IPC device according to the first configuration to occlude a corresponding preset area of a video comprises:
and acquiring the triggered video stream transmitted by the IPC equipment, and shielding the preset area in the corresponding video by a superposition shielding block.
7. A video occlusion system, comprising: the system comprises a user terminal, a server and a plurality of IPC (Internet protocol Camera) devices accessed to the server;
the user terminal is used for configuring an occlusion triggering rule and an occlusion closing rule and executing the video occlusion method of claim 5; configuring a preset event, a preset time period, associated IPC equipment and a preset area;
the server side is used for executing the video occlusion method of any one of claims 1-4 and 6;
the IPC equipment is used for acquiring image information of the corresponding area, generating a video stream and transmitting the video stream to the server.
8. The video occlusion system of claim 7, wherein the server comprises:
the intelligent analysis module is used for starting a corresponding algorithm library to analyze whether the preset event occurs in the video stream of the IPC equipment to be detected based on the preset event;
and the event management module is used for correspondingly triggering the IPC equipment to be detected and at least one associated IPC equipment in a linkage manner when the preset event occurs, and shielding or closing shielding of the corresponding preset area of the video.
9. A computer device comprising a memory and a processor, wherein the memory has stored therein a computer program, and wherein the processor is arranged to run the computer program to perform the video occlusion method of any of claims 1 to 6.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the video occlusion method of any of claims 1 to 6.
CN202211249722.1A 2022-10-12 2022-10-12 Video occlusion method, system, computer device and storage medium Pending CN115802090A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211249722.1A CN115802090A (en) 2022-10-12 2022-10-12 Video occlusion method, system, computer device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211249722.1A CN115802090A (en) 2022-10-12 2022-10-12 Video occlusion method, system, computer device and storage medium

Publications (1)

Publication Number Publication Date
CN115802090A true CN115802090A (en) 2023-03-14

Family

ID=85432896

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211249722.1A Pending CN115802090A (en) 2022-10-12 2022-10-12 Video occlusion method, system, computer device and storage medium

Country Status (1)

Country Link
CN (1) CN115802090A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116634100A (en) * 2023-05-25 2023-08-22 广东申立信息工程股份有限公司 Information interaction method and system based on IPC

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116634100A (en) * 2023-05-25 2023-08-22 广东申立信息工程股份有限公司 Information interaction method and system based on IPC
CN116634100B (en) * 2023-05-25 2023-11-14 广东申立信息工程股份有限公司 Information interaction method and system based on IPC

Similar Documents

Publication Publication Date Title
CN111132120B (en) Method, system and equipment for identifying camera device in room local area network
CN103391216B (en) A kind of illegal external connection is reported to the police and blocking-up method
CN106953975B (en) Intelligent terminal operation management method and device and intelligent terminal
CN109145560B (en) Method and device for accessing monitoring equipment
CN108933888B (en) Camera control method and device and computer storage medium
CN107071584A (en) Live even wheat method and device
CN201369791Y (en) Security monitoring system of mobile multi-media
CN105160742A (en) Method and system for carrying out judgment, alarming and information shielding on forced unlocking
US10750076B2 (en) Network device, image processing method, and computer readable medium
CN100362805C (en) Multifunctional management system for detecting erotic images and unhealthy information in network
CN109462599A (en) A kind of honey jar management system
CN106412491A (en) Video monitoring method, apparatus and system
CN101741898A (en) Monitoring method in video-type safety-protection system
CN108846925A (en) Face recognition door control system
CN115802090A (en) Video occlusion method, system, computer device and storage medium
CN109766725A (en) A kind of data processing method, equipment, intelligent terminal and computer-readable medium
CN105913513A (en) Control method and system for door lock system
CN106791627A (en) Network Video Surveillance and security alarm integrated system and its secure access method for authenticating
CN101600097B (en) Method and system for security protection monitoring for mobile multimedia
CN110519556A (en) A kind of method that electricity encloses base station Yu video detection target association
CN105959643A (en) Monitoring method, device and system
CN108629876A (en) Alarm method, equipment and the computer readable storage medium of lockset
CN107483514A (en) Attack monitoring device and smart machine
CN105989265A (en) Early warning method and device and terminal equipment
CN109889539A (en) A kind of intelligent terminal browsing information filtering method based on WIFI

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination