JP4120378B2 - Surveillance system and program - Google Patents

Surveillance system and program Download PDF

Info

Publication number
JP4120378B2
JP4120378B2 JP2002353264A JP2002353264A JP4120378B2 JP 4120378 B2 JP4120378 B2 JP 4120378B2 JP 2002353264 A JP2002353264 A JP 2002353264A JP 2002353264 A JP2002353264 A JP 2002353264A JP 4120378 B2 JP4120378 B2 JP 4120378B2
Authority
JP
Japan
Prior art keywords
monitoring
facility
image
person
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
JP2002353264A
Other languages
Japanese (ja)
Other versions
JP2004187115A (en
Inventor
修 大倉
Original Assignee
カシオ計算機株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by カシオ計算機株式会社 filed Critical カシオ計算機株式会社
Priority to JP2002353264A priority Critical patent/JP4120378B2/en
Publication of JP2004187115A publication Critical patent/JP2004187115A/en
Application granted granted Critical
Publication of JP4120378B2 publication Critical patent/JP4120378B2/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Description

[0001]
BACKGROUND OF THE INVENTION
The present invention relates to a monitoring system and a program for extracting and reproducing and outputting a monitoring target from a captured image obtained by shooting a moving body as a monitoring target.
[0002]
[Prior art]
2. Description of the Related Art Conventionally, as a monitoring device that monitors a person's behavior by analyzing a captured image obtained by photographing a person in a facility, for example, the following techniques are known. In other words, when the position of the suspicious person is pointed by a cursor operation on the display screen of the photographed image, a cursor area surrounding the suspicious person is displayed and the cursor area is also moved as the suspicious person moves. Is known (see Patent Document 1). Further, a technique is known in which a shape feature and a motion feature are specified from a person image in a photographed image, and compared with information on a suspicious person accumulated in advance, and a suspicious person is specified (see Patent Document 2). .
[0003]
[Patent Document 1]
JP 2001-111987
[Patent Document 2]
JP 11-339139 A
[0004]
[Problems to be solved by the invention]
However, in the technique of the above-mentioned patent document 1, since the cursor is operated on the display screen of the photographed image to designate the position of the suspicious person, a dedicated staff must be provided. Moreover, there is a risk that a suspicious person may be overlooked in human work. Further, even if the suspicious person can be found in the technique of the above-mentioned Patent Document 2, at the time of reproduction of the photographed image, a huge number of photographed images are reproduced from the beginning by human work, and the suspicious person from among them is reproduced A person must be found out, and it takes a lot of labor and time to confirm the person.
[0005]
An object of the present invention is to enable reproduction of only a portion in which a monitoring target is captured from among a large number of captured images when a captured image captured with a moving body as a monitoring target is reproduced and output.
[0006]
[Means for Solving the Problems]
The invention according to claim 1 is a monitoring system for extracting and reproducing and outputting a monitoring target from a captured image obtained by shooting a moving body as a monitoring target, Generated based on the images taken with the camera installed at the entrance of the facility Image storage means for storing image information for specifying a monitoring target; When there is a change in a captured image captured by a camera installed in the facility, Image information stored in the image storage means Photographed with a camera installed in the facility Compare with the shot image, By matching the image information stored in the image storage means with the captured image captured by the camera installed in the facility, A monitoring target has appeared thing Detect A mark is attached to a captured image taken by a camera installed in the facility, and the marked image is removed from the camera installed in the facility, thereby removing the mark from the facility. The target has left thing And detecting means for detecting the appearance of the monitoring target by this detecting means. ID information corresponding to the current time and the monitoring target; As monitoring start information Recording means And when the exit of the target is detected, ID information corresponding to the current time and the monitoring target; As monitoring end information The recording means Recording control means for recording on,
When a search condition specifying a time range is input, the recording control means Monitoring start information and monitoring end information recorded in the recording means Based on the entered search criteria time And reproduction control means for extracting and reproducing and outputting a photographed image within the range.
Furthermore, a program for causing a computer to function as the main means shown in the above-described invention according to claim 1 is provided (the invention according to claim 2).
[0013]
DETAILED DESCRIPTION OF THE INVENTION
Hereinafter, an embodiment of the present invention will be described with reference to FIGS.
FIG. 1 is a block diagram showing the overall configuration of the monitoring system in this embodiment.
This monitoring system is a local communication system (LAN system) built in a facility such as a company or factory, and monitors a person's behavior by analyzing a photographed image of a person (moving body) in the facility. When it is detected that a monitoring target (a cautionary person to be described later) appears in the captured image, the information at that time is recorded as monitoring start information, and when the exit of the target is detected, Is recorded as monitoring end information, and at the time of image reproduction, a captured image within the range indicated by the monitoring start information and monitoring end information is extracted and reproduced and output. The sub-system is an entrance / exit management system 1, an in-facility monitoring system 2, a search system 3, and a security system 4 connected via a local communication network 5. .
[0014]
The entrance / exit management system 1 is a management system centered on a data processing device that manages a person entering and exiting a facility by analyzing each captured image taken by the entrance / exit camera group 11, and a registration image described later. It has a file 12, a caution registered person ID memory 13, an entrance / exit management table 14, and an entrance image file 15.
The in-facility monitoring system 2 is a management system having a data processing apparatus that performs person monitoring by analyzing each captured image captured by a plurality of monitoring monitor cameras 21 as a monitor log database (DB) to be described later. ) 22 and an abstract image file 23. Here, each captured image captured by the monitoring monitor camera 21 is recorded and stored in the storage medium 6 for each corresponding camera. The storage medium 6 is a detachable storage medium such as a CD-ROM or DVD, and is provided corresponding to one monitor monitor camera 21.
[0015]
The search system 3 is centered on a data processing device that searches a desired image from a storage medium 6 corresponding to each camera, and reproduces and outputs the image. An image corresponding to an arbitrarily designated reproduction condition is stored in each storage medium 6. Search from within and play it back. In this case, an arbitrary person can be specified as a playback condition, or an arbitrary time zone can be specified as a playback condition. When a person is specified as a playback condition, it is specified from the storage medium 6 corresponding to each camera. An image related to the selected person is extracted and reproduced, and when a time zone is designated as a reproduction condition, an image photographed within the designated time zone is extracted from the storage medium 6 corresponding to each camera. Playback output.
[0016]
On the search system 3 side, a monitor display device is provided corresponding to each monitoring monitor camera 21, and a captured image taken by the monitoring monitor camera 21 is output to the corresponding monitor display device. Is done. Here, when a monitoring target (a person who needs attention) is simultaneously photographed by a plurality of monitoring monitor cameras 21, the action of the person can be simultaneously confirmed by a plurality of monitor displays. Yes. Further, the search system 3 can access the entrance / exit management table 14 on the entrance / exit management system 1 side, the entrance image file 15, and the monitor log database 22 on the facility monitoring system 2 side via the network.
The security system 4 is a management system built in the security room.
[0017]
FIG. 2 is a diagram conceptually showing an arrangement view of entrance / exit entrances of facilities and cameras installed in the facilities.
The entrance / exit camera group 11 photographs the entrance / exiters from the front / rear and left / right by four cameras installed at the entrance / exit of the facility. The shooting direction indicates that shooting is performed from the front, back, left, and right, and at the time of entering and leaving, four cameras are used to photograph the visitors and the exits.
The monitoring monitor cameras 21 are installed at various locations in the facility so that the entire facility can be photographed. In the figure, A, B, C, and D are monitoring monitor cameras 21 installed at various locations. The in-facility monitoring system 2 detects whether or not a monitoring target (a person who needs attention) appears or leaves in a captured image captured by any of the monitoring monitor cameras 21.
[0018]
FIG. 3A is a diagram for explaining the registered image file 12 and the caution registered person ID memory 13 provided on the entrance / exit management system 1 side.
The registered image file 12 stores a face image of a person registered in advance as a person requiring attention in the form of one person and one file. A person ID for identifying the person is added to the registered image file 12. Has been. Note that the person requiring attention includes, for example, a person who has made a fraud in the past or a person who has caused suspicious behavior, as well as an entry / exit trader. The face image of the person requiring attention is taken in advance by the entrance / exit camera group 11, and the person-of-care-registered person ID memory 13 is a memory for storing and managing person IDs for identifying persons requiring attention in a list format. .
[0019]
FIG. 3B is a diagram for explaining the entrance / exit management table 14 and the entrance image file 15 provided on the entrance / exit management system 1 side.
The entrance / exit management table 14 stores and manages information related to a person who needs to enter / exit within a predetermined period (for example, in units of days). For each person requiring attention, the “person ID”, “entrance time”, “ Each item of “exit time” is stored.
The “person ID” is obtained by analyzing the captured image taken by the entrance / exit camera group 11, and the “person ID” acquired from the registered image file 12 when the person heading to the facility corresponds to a person requiring attention. It is. The “entry time” indicates the entrance time when the person requiring attention enters from the entrance of the facility. At that time, the front, rear, left and right captured images taken by the entrance / exit camera group 11 are recorded as the entrance image file 15. Is done. “Exit time” indicates the exit time when exiting from the entrance of the facility.
The admission image file 15 is a file that stores the respective captured images of the front, rear, left and right in correspondence with the “person ID”.
[0020]
FIG. 4A is a diagram showing the contents of the monitor log database 22 provided on the facility monitoring system 2 side.
The monitor log database 22 is provided for each monitoring monitor camera 21, and the in-facility monitoring system 2 monitors a person requiring attention in the facility with a plurality of monitoring monitor cameras 21, and either Information when a monitoring target (a person who needs attention) appears in a captured image captured by the monitoring monitor camera 21 and information when the target leaves is recorded in the monitor log database 22 corresponding to the camera. ing. Each monitor record constituting the monitor log database 22 has items of “person ID”, “mark No.”, “start time”, and “end time”.
[0021]
The “person ID” is transmitted from the entrance / exit management system 1 side as information for identifying the person requiring attention when the entrance / exit management system 1 recognizes that the person requiring attention has entered. Therefore, when the in-facility monitoring system 2 detects the appearance of the person requiring attention in the captured image captured by any of the monitoring monitor cameras 21, it identifies it as a monitoring target, The “person ID” is used as information for identifying the target, and a monitoring record including the “person ID” is newly generated and additionally registered in the monitor log database 22.
[0022]
“Mark No” is a mark that is added to the target position in the captured image when it is detected that a monitoring target has appeared in the captured image captured by any of the monitoring monitor cameras 21. Information for identification. In this case, when the in-facility monitoring system 2 detects the appearance of the monitoring target, as shown in FIG. 5 (B-4), a mark is added to the position of the target in the captured image. The mark is caused to follow as the target moves. “Mark No” is information for identifying the marked target.
The “start time” is monitoring start information (appearance time) stored as information when the appearance of the monitoring target is detected, and the “end time” is stored as information when the exit of the target is detected. Monitoring end information (exit time).
[0023]
FIG. 4B is a diagram for explaining the abstract image file 23 provided on the facility monitoring system 2 side.
This abstracted image file 23 is an abstract representing the characteristics of a person requiring attention in order to recognize whether or not a monitoring target (person requiring attention) is included in the photographed image taken by the visual monitor camera 21. It is a converted image. In this case, when the entrance / exit management system 1 recognizes that a person of special interest has entered, the entrance / exit management system 1 has abstracted the characteristics of the person by analyzing each photographed image of the person of special interest taken from the left and right sides. When the left and right abstract images are generated and transmitted to the in-facility monitoring system 2 side, the in-facility monitoring system 2 adds the “person ID” for each person requiring attention and saves the left and right abstract images. Like to do.
[0024]
FIG. 6 is a block diagram showing the basic components of the data processing apparatus that forms the core of the entrance / exit management system 1.
In addition, since the data processing apparatus which comprises the in-facility monitoring system 2 and the data processing apparatus which comprises the search system 3 also have the structure which has the same component, hereafter, about the data processing apparatus by the entrance / exit management system 1 side The explanation will be omitted for the data processing devices on the facility monitoring system 2 side and the search system 3 side.
The CPU 101 is a central processing unit that controls the overall operation of the data processing device according to the operating system and various application software in the storage device 102. The storage device 102 has a program storage area and a data storage area. In the program storage area, various application programs are stored in addition to the operating system, and a magnetic, optical, semiconductor memory, and the like are driven. It is constituted by the system.
[0025]
The recording device 102 may be configured to be able to mount a removable storage medium such as a CD-ROM or DVD in addition to a fixed memory such as a hard disk. The programs and data in the storage device 102 are loaded into a RAM (for example, static RAM) 103 as needed, or the data in the RAM 103 is saved in the storage device 102. The RAM 103 has a program execution area and a work area. Further, the CPU 101 can directly access and use programs / data on the other electronic device side via the communication device 104, or can receive and download via the communication device 104. On the other hand, an input device 105 and a display device 106, which are input / output peripheral devices, are connected to the CPU 101 via bus lines, and the CPU 101 controls their operations in accordance with the input / output program.
[0026]
Next, the operation concept of the behavior monitoring system in this embodiment will be described with reference to the flowcharts shown in FIGS. Here, each function described in these flowcharts is stored in the form of a readable program code, and operations according to the program code are sequentially executed. It is also possible to sequentially execute operations according to the program code transmitted via the transmission medium. That is, in addition to the recording medium, an operation specific to this embodiment can be executed using a program / data supplied externally via a transmission medium.
[0027]
FIG. 7 is a flowchart showing the operation on the entrance / exit management system 1 side which is started to be executed when the power is turned on.
First, the entrance / exit management system 1 obtains each captured image from the entrance / exit camera group 11 that is constantly monitored, and analyzes whether each captured image has a person moving in the direction toward the facility. Is checked (step A1). That is, the entrance / exit management system 1 checks whether or not the image of the person facing the front gradually increases with respect to the camera oriented in the entrance direction (entrance direction). It is determined that there are visitors. Now, when a visitor is detected, a front camera is designated for this visitor, and a face image of the person is enlarged and photographed (step A2). The entrance / exit management system 1 compares the registered image file 12 corresponding to the “person ID” with the face image of the visitor while reading the “person ID” one by one from the caution registered person ID memory 13 ( In step A3), the visitor checks whether it corresponds to a registered person (person who needs attention) (step A4).
[0028]
If the visitor is a regular person such as an employee (NO in step A4), the process proceeds to step A9 without performing any special processing. Stores the captured image (step A5). That is, the “person ID” is acquired from the registered image file 12 corresponding to the person requiring attention, and the front, rear, left and right photographed images of the person of interest photographed by the entrance / exit camera group 11 are obtained. A “person ID” is added to the image and saved as an admission image file 15. Then, a management record including this “person ID” and “current time (entrance time)” is generated and additionally registered in the entrance / exit management table 14 (step A6), and the above-mentioned front, back, left and right captured images are included. The characteristics of the person are extracted from the left and right, left, right, and left abstract images are generated (step A7), and then each abstract image and the “person ID” are transmitted to the in-facility monitoring system 2, Notification of entry (step A8).
Thereafter, the process returns to the first step A1 to check the presence or absence of visitors. Hereinafter, the above-described operation is repeated every time the entry of a person requiring attention is detected (steps A1 to A8).
[0029]
On the other hand, the entrance / exit management system 1 performs basically the same processing as when entering the facility even when leaving the facility. In other words, the entrance / exit management system 1 analyzes each photographed image from the entrance / exit camera group 11 to check whether or not there is a person moving in the direction of leaving the facility (step A9). In this case, the entrance / exit management system 1 checks whether the image of the person facing the camera toward the exit direction (exit direction) gradually increases, and when the person becomes a predetermined size, It is determined that there is a person leaving. If an exit person is detected, a front camera is designated for the exit person, and a face image of the person is magnified (step A10).
[0030]
The entrance / exit management system 1 compares the registered image file 12 corresponding to the “person ID” with the face image of the exit person while reading the “person ID” one by one from the caution registered person ID memory 13 ( In step A11), if the exit person corresponds to a registered person (person who needs attention) (step A12), the "person ID" in the registered image file 12 is acquired (step A13), and the "person ID" is obtained. Based on this, the entrance / exit management table 14 is accessed, and the current time (exit time) is set in the corresponding management record (step A13). Hereinafter, the above-described operation is repeated every time the exit person is detected (steps A9 to A14).
[0031]
FIG. 8 is a flowchart showing the operation on the in-facility monitoring system 2 side that is started when the power is turned on. The same operation is performed for each monitoring monitor camera 21, but FIG. The operation of the platform is shown, and the operation on the facility monitoring system 2 side will be described below with reference to FIG. 5A-1 to 5A-3 show monitor screens in the monitoring monitor camera A, and FIGS. 5B-1 to 4B-4 show monitor screens in the monitoring monitor camera B. FIG.
The in-facility monitoring system 2 transmits / receives data to / from the entrance / exit management system 1 and when the entrance of the person requiring attention is detected on the entrance / exit management system 1 side, the “abstracted image” and “ When the “person ID” is transmitted from the entrance / exit management system 1, it is received and temporarily stored in the work area.
[0032]
First, the in-facility monitoring system 2 obtains a captured image from the monitoring camera 21 for monitoring that is constantly monitored, analyzes the monitor image to examine a change in the image (step B1), and detects an image change. In this case, it is checked whether the changing image is the image with the mark described above (step B2). Now, for example, as shown in FIG. 5A-1, when a marked image is detected on the monitor screen of the monitoring monitor camera A, the change position (change amount and change direction) of the image in the monitor screen. ) And the mark display position is moved in accordance with the change position, thereby causing the mark to follow the image movement as shown in FIG. 5A-2 (step B3).
[0033]
In this state, the mark position in the monitor screen is tracked and monitored, and it is checked whether or not it is off the monitor screen (step B4). If the mark is present in the monitor screen, the process returns to the first step B1 to follow the mark according to the image movement. However, as shown in FIG. 5A-3, when the mark is off the monitor screen. (Step B4), the monitor log database 22 is accessed based on the “mark No.”, “end time (current time)” is set in the corresponding monitor record, and “mark No” in the monitor record is set. After erasing (step B5), the process returns to the first step B1, and the above operation is repeated thereafter.
[0034]
If it is detected on the monitor screen of the monitor camera B for monitoring that the image is not a marked image (step B2), it may be a person image (new image) newly appearing in the monitor as the person moves. Is checked (step B6), and if it is not a new image, the process returns to the first step B1, but as shown in FIG. 5 (B-3), when a new image appears in the monitor as the person moves. Reads the above-mentioned "abstract image" received and acquired from the entrance / exit management system 1 and temporarily stores it, and compares the characteristics of the "abstract image" and the current "new image" (step B7). It is determined whether or not they are the same person (step B8).
[0035]
Here, if it is not the same person, the process returns to the first step B1, but if it is the same person, in other words, when a person requiring attention appears in the monitor screen, it is shown in FIG. 5 (B-4). In this way, a mark is added to the target image (personal image requiring attention) and a “mark No” is newly generated (step B9). Then, the above-described “person ID” temporarily stored corresponding to the “abstracted image” is read out, and this “person ID”, “mark No.”, “start time (current time when a person requiring attention appears) "Is generated and additionally registered in the monitor log database 22 (step B10).
[0036]
FIG. 9 is a flowchart showing the operation of the search system 3 that starts executing when the power is turned on.
First, the search system 3 displays a search menu screen as the power is turned on (step C1). This search menu screen has menu items of “1: time search” and “2: person search”. After any menu item is selected and specified by the operator, an arbitrary search condition (playback condition) is set. When entered (step C2), the selection menu is determined (step C3).
[0037]
Now, assume that the menu item “2: person search” is selected and specified, and an arbitrary person is input and specified as the search condition (steps C1 to C3). In this case, the search condition is input as follows, for example. That is, the search system 3 accesses the monitor log database 22 on the in-facility monitoring system 2 side to read each “person ID”, and then registers the registered image file on the entrance / exit management system 1 side based on each “person ID”. 12 is accessed, the corresponding person images are acquired and displayed in a list. When a desired person image is selected and designated from the list screen, a “person ID” corresponding to the designated image is acquired, and this “person ID” is determined as an input-designated search condition.
[0038]
When the search condition is input and designated in this way, each monitor log database 22 corresponding to the monitoring camera 21 is accessed based on the input “person ID”, and the monitor record corresponding to “person ID” is stored in the camera. Read every time (step C11). Then, after acquiring the “start time” and “end time” from the monitor record read for each monitoring monitor camera 21, an image within the range indicated by the “start time” and “end time” is reproduced. As described above, the data is extracted from the storage medium 6 corresponding to each camera and reproduced and output. At this time, the monitor display apparatus is synchronized with the recording time for each camera display device (step C10). In other words, the contents of the corresponding recording medium 6 are reproduced and displayed on a plurality of monitor display devices, but at this time, the range from the “start time” to the “end time” acquired from the monitor record corresponding to the camera. When the monitoring target is simultaneously captured by a plurality of monitoring monitor cameras 21 by reading out the captured images from the respective recording media 6 in accordance with the progress of time and simultaneously displaying them synchronously, the action of the person is displayed. It is possible to confirm simultaneously by displaying a plurality of monitors.
[0039]
On the other hand, if the menu item “1: time search” is selected and specified, and an arbitrary time is input and specified as the search condition (steps C1 to C3), the monitoring target that was in the facility at this specified time is selected. In order to search, the person who was in the facility within the designated time is specified by accessing the entrance / exit management table 14 on the entrance / exit management system 1 side and referring to the “entrance time” and “exit time”. The “person ID” is extracted (step C4). Then, the registered image file 12 is accessed based on the “person ID”, and the corresponding registered images are read out and displayed in a list (step C5). Whether or not a person specifying a desired person is selected from the list display of registered images is received (step C6), and it is determined whether or not a person is specified (step C7).
[0040]
Now, when an arbitrary person is selected from the list display of registered images and a person to be searched is specified (YES in step C7), all the monitors corresponding to the “person ID” corresponding within the designated time are displayed. A record is read (step C8). That is, the “person ID” of the specified person is acquired, and each monitor log database 22 corresponding to the monitoring monitor camera 21 is accessed based on this “person ID”, and the monitor record corresponding to “person ID” is stored in the camera. Read every time. Then, for each monitor display device corresponding to each camera, the recording time is synchronized to reproduce the monitor (step C10).
[0041]
If the person to be searched is not specified (NO in step C7), the “person ID” is acquired for each person in the facility at the specified time, and the monitoring monitor camera is based on the “person ID”. 21. Each monitor log database 22 corresponding to 21 is accessed and a monitor record corresponding to “person ID” is read for each camera (step C9), and then the recording time is synchronized for each monitor display device corresponding to each camera. Although the monitor is played back (step C10), the playback operation in this case is sequentially repeated for each person in the facility at the designated time.
[0042]
As described above, the monitoring system according to this embodiment includes the entrance / exit management system 1, the in-facility monitoring system 2, the search system 3, and the like, and the in-facility monitoring system 2 captures an image of a person requiring attention as a monitoring target. It is detected whether the monitoring target has appeared or exited in the image, and when the appearance of the monitoring target is detected, the "start time" is recorded as the monitoring start information at that time, and when the exit is detected Records the “end time” in the monitor log database 22 as the monitoring end information at that time, and the retrieval system 3 at the time of reproducing the photographed image reads the “start time” and “end time” in the monitor log database 22. Since the captured images within the range indicated by and are extracted and reproduced and output, the monitoring target is captured from a large number of captured images. Only portions have a can play, it is possible to perform reliably and quickly activity monitoring such as a suspicious person with the efficiency of the regeneration process.
[0043]
The entrance / exit management system 1 generates an abstract image based on a captured image obtained by capturing the target and generates an abstract image and transmits it to the in-facility monitoring system 2 when the monitoring target that is a person to be watched enters. The in-facility monitoring system 2 saves this as an abstract image file 23, and if a target having the characteristic information is included in the captured image captured after the entrance, the target is displayed. Since the detection is performed, the appearance of the target can be reliably detected by the feature comparison.
In this case, when the entrance / exit management system 1 generates the abstract image, the person is generated based on the captured images obtained by capturing the person from the left and right and left and right sides, so that the appearance of the target can be detected more reliably. be able to.
[0044]
In this case, when the facility monitoring system 2 detects the appearance of the monitoring target in the monitor screen, the facility monitoring system 2 adds a mark to the target position in the monitor screen and moves the mark following the movement of the target. Based on the position of the mark, it is detected whether the target has left the monitor screen. Therefore, the target can be tracked and monitored simply by tracking the mark, and can be easily monitored. Become.
[0045]
Further, the appearance and exit of the monitoring target are detected for each camera based on the respective captured images obtained by photographing the same target by a plurality of monitoring camera cameras 21, and “start time” is stored in the monitor log database 22 corresponding to the camera. And “end time” are recorded for each camera, and each captured image of the same target extracted for each camera based on the contents of the monitor log database 22 corresponding to the camera is reproduced and output. By monitoring the same target with these cameras, three-dimensional (three-dimensional) monitoring becomes possible, and the movement of the target can be grasped more reliably.
[0046]
Since the retrieval system 3 arbitrarily designates the retrieval condition of the photographed image, and extracts and reproduces the photographed image corresponding to the designated condition, among the photographed images in which a large number of targets are photographed. Thus, a desired target image can be arbitrarily reproduced and output. In this case, an arbitrary person can be used as a search condition, or an arbitrary time zone can be specified as a search condition. When a person is specified as a search condition, it is specified from the storage medium 6 corresponding to each camera. If the time zone is specified as a search condition, the image taken within the specified time zone is extracted from the storage medium 6 corresponding to each camera and played back. Can be output.
[0047]
In the above-described embodiment, “start time” and “end time” are recorded as information when the monitoring target appears and exits. However, the information is not limited to time information. Physical position information (address value) on the recording medium to be recorded may be recorded as monitoring start information and monitoring end information, and numerical values counted at a fixed timing within the shooting period from the start to the end of shooting. Information (counter value) may be recorded as monitoring start information and monitoring end information.
[0048]
In the embodiment described above, the person to be watched is a monitoring target. However, the monitoring target is not limited to a person. For example, a car in a facility may be used as a monitoring target, and it is monitored whether the car is parked in a regular parking space. May be. Further, the monitoring target is not limited to the facility, but may be a premise such as an amusement park, a zoo, a theme park, or the like.
[0049]
On the other hand, a recording medium (for example, a CD-ROM, a floppy disk, a RAM card, etc.) on which a program code for executing each of the above-described units is recorded may be provided to the computer.
That is, a computer-readable recording medium having a program code that detects whether a monitoring target has appeared in a captured image captured using a moving object as a monitoring target, and the target exits from the captured image. When the appearance of a monitoring target is detected, the information at that time is recorded as monitoring start information, and when the exit of the target is detected, the information at that time is recorded as monitoring end information And a computer-readable recording medium on which a program for realizing a function for extracting and reproducing and outputting a captured image within the range indicated by the monitoring start information and the monitoring end information is provided. It may be.
[0050]
【The invention's effect】
According to this invention (the invention according to claim 1), the image information for specifying the monitoring target is generated and stored based on the captured image captured by the entrance / exit camera installed at the entrance of the facility, and the stored image Compare the information with the captured image captured by the surveillance camera installed in the facility, detect the appearance of the surveillance target in the facility, record the monitoring start information, and record the captured image captured by the surveillance camera. The monitoring target in the facility is always monitored with the mark attached, and the monitoring end information can be recorded immediately by detecting that the monitoring target has left the facility by removing the marked image from the monitoring camera. It is possible to quickly detect the appearance and exit of the monitoring target in the camera, and to reproduce only the part where the monitoring target is shown in the huge number of captured images. As it is possible to perform reliably and quickly activity monitoring such as a suspicious person with the efficiency of the regeneration process.
[Brief description of the drawings]
FIG. 1 is a block diagram showing the overall configuration of a monitoring system.
FIG. 2 is a diagram conceptually showing an arrangement view of entrance / exit entrances of facilities and cameras installed in the facilities.
3A is a diagram for explaining a registered image file 12 and a caution registered person ID memory 13 provided on the entrance / exit management system 1 side, and FIG. 3B is an entrance / exit management system 1 side. The figure for demonstrating the entrance / exit management table 14 and the entrance image file 15 which are provided in FIG.
4A is a diagram showing the contents of a monitor log database 22 provided on the facility monitoring system 2 side, and FIG. 4B is an abstract image provided on the facility monitoring system 2 side. The figure for demonstrating the file 23. FIG.
FIGS. 5A to 5A are monitor screens for the monitor camera A, and FIGS. 5B to 4B are monitor screens for the monitor camera B. FIGS. Figure.
FIG. 6 is a block diagram showing basic components of a data processing apparatus that forms the core of the entrance / exit management system 1;
FIG. 7 is a flowchart showing an operation on the entrance / exit management system 1 side which is started to be executed when power is turned on.
FIG. 8 is a flowchart showing the operation of one monitor camera on the in-facility monitoring system 2 side that is started when the power is turned on.
FIG. 9 is a flowchart showing an operation of the search system 3 that is started to be executed when power is turned on.
[Explanation of symbols]
1 Entrance / exit management system
2 Facility monitoring system
3 Search system
4 Security system
5 Local communication network
6 Storage media for cameras
11 Entrance / exit cameras
12 Registered image file
13 Registered person ID memory requiring attention
14 Entrance / exit management table
15 Admission image file
21 Monitor camera for monitoring
22 Monitor log database
23 Abstract image file
101 CPU
102 storage device
104 Communication device
106 Display device

Claims (2)

  1. A monitoring system that extracts a monitoring target from a photographed image taken with a moving object as a monitoring target, and reproduces and outputs the monitoring target.
    Image storage means for storing image information for specifying a monitoring target generated based on a captured image captured by a camera installed at the entrance of the facility ;
    When there is a change in a captured image captured by a camera installed in the facility, the image information stored in the image storage means is compared with a captured image captured by a camera installed in the facility. and, by the images captured by a camera mounted to a stored image information in said facility matching the image storage means, it detects that the monitoring target has appeared in the facility, the facility grant mark image captured by the camera installed within, by the marked image is out of a camera installed in the facility, detecting means for detecting that the target from the facility has exited When,
    When the appearance of the monitoring target is detected by this detection means, the current time at that time and the ID information corresponding to the monitoring target are recorded in the recording means as monitoring start information, and when the exit of the target is detected, a recording control means for recording in the recording means and the ID information corresponding to the current time and the monitoring target at that time as the monitoring end information,
    When a search condition specifying a time range is input , shooting within the time range of the input search condition is performed based on the monitoring start information and the monitoring end information recorded in the recording unit by the recording control unit. Reproduction control means for extracting and reproducing and outputting images;
    A monitoring system comprising:
  2. Computer
    Image storage means for storing image information for specifying a monitoring target generated based on a captured image captured by a camera installed at the entrance of the facility ;
    When there is a change in a captured image captured by a camera installed in the facility, the image information stored in the image storage means is compared with a captured image captured by a camera installed in the facility. and, by the images captured by a camera mounted to a stored image information in said facility matching the image storage means, it detects that the monitoring target has appeared in the facility, the facility grant mark image captured by the camera installed within, by the marked image is out of a camera installed in the facility, detecting means for detecting that the target from the facility has exited ,
    When the appearance of the monitoring target is detected by this detection means, the current time at that time and the ID information corresponding to the monitoring target are recorded in the recording means as monitoring start information, and when the exit of the target is detected, recording control means for recording in the recording means and the ID information corresponding to the current time and the monitoring target at that time as the monitoring end information,
    When a search condition specifying a time range is input , shooting within the time range of the input search condition is performed based on the monitoring start information and the monitoring end information recorded in the recording unit by the recording control unit. Playback control means for extracting and playing back images;
    Program to function as.
JP2002353264A 2002-12-05 2002-12-05 Surveillance system and program Active JP4120378B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2002353264A JP4120378B2 (en) 2002-12-05 2002-12-05 Surveillance system and program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2002353264A JP4120378B2 (en) 2002-12-05 2002-12-05 Surveillance system and program

Publications (2)

Publication Number Publication Date
JP2004187115A JP2004187115A (en) 2004-07-02
JP4120378B2 true JP4120378B2 (en) 2008-07-16

Family

ID=32754590

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2002353264A Active JP4120378B2 (en) 2002-12-05 2002-12-05 Surveillance system and program

Country Status (1)

Country Link
JP (1) JP4120378B2 (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4873216B2 (en) * 2005-03-15 2012-02-08 オムロン株式会社 Surveillance system and method, unauthorized player recognition server and method, and program
JP4757546B2 (en) * 2005-06-22 2011-08-24 三菱電機株式会社 Monitoring and reporting system
JP2007013256A (en) * 2005-06-28 2007-01-18 Sony Corp Imaging apparatus, recorder and recording method, medium and program
JP4968444B2 (en) * 2006-10-06 2012-07-04 大日本印刷株式会社 Parking lot monitor system
JP5317798B2 (en) * 2009-03-05 2013-10-16 ヤフー株式会社 A portable information retrieval device that searches for objects from the real world
JP4588098B2 (en) * 2009-04-24 2010-11-24 善郎 水野 Image / sound monitoring system
JP2011229044A (en) * 2010-04-22 2011-11-10 Mitsubishi Electric Corp Image monitoring and recording device
GB2482127B (en) 2010-07-19 2015-01-14 Ipsotek Ltd Apparatus, system and method
JP5906806B2 (en) * 2012-02-28 2016-04-20 沖電気工業株式会社 Movie processing system and terminal device
JP5962916B2 (en) 2012-11-14 2016-08-03 パナソニックIpマネジメント株式会社 Video surveillance system

Also Published As

Publication number Publication date
JP2004187115A (en) 2004-07-02

Similar Documents

Publication Publication Date Title
US8174572B2 (en) Intelligent camera selection and object tracking
DE602005005583T2 (en) Video surveillance systems in general, and more particularly to an apparatus and method for automatically detecting real time abnormal motion in video streams
ES2611278T3 (en) System and procedure for creating an intelligent video sequence to improve research in video surveillance
CN103685914B (en) Image management apparatus and management method
DE602004005520T2 (en) Arrangement and method for image recognition
AU2007345938B2 (en) Method and system for video indexing and video synopsis
US9881215B2 (en) Apparatus and method for identifying a still image contained in moving image contents
KR100774078B1 (en) Image recording/reproducing apparatus in monitor system
US6424370B1 (en) Motion based event detection system and method
US8345118B2 (en) Image capturing apparatus, image capturing method, album creating apparatus, album creating method, album creating system and computer readable medium
JP2012244634A (en) Image clustering method
JP4760892B2 (en) Display control apparatus, display control method, and program
CN101425133B (en) Human image retrieval system
US8249397B2 (en) Playback of digital images
US7243101B2 (en) Program, image managing apparatus and image managing method
CN101918989B (en) Video surveillance system with object tracking and retrieval
US7683929B2 (en) System and method for video content analysis-based detection, surveillance and alarm management
TWI579838B (en) Automatic generation of compilation videos
CN101647265B (en) Automatic detection, removal, replacement and tagging of flash frames in a video
US20110032353A1 (en) Presenting video data
JP4230870B2 (en) Movie recording apparatus, movie recording method, and program
US8570376B1 (en) Method and system for efficient sampling of videos using spatiotemporal constraints for statistical behavior analysis
AU2019213309A1 (en) System and method for generating an activity summary of a person
US8295545B2 (en) System and method for model based people counting
US20080144893A1 (en) Apparatus and method for selecting key frames of clear faces through a sequence of images

Legal Events

Date Code Title Description
A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20050511

RD02 Notification of acceptance of power of attorney

Free format text: JAPANESE INTERMEDIATE CODE: A7422

Effective date: 20060208

RD04 Notification of resignation of power of attorney

Free format text: JAPANESE INTERMEDIATE CODE: A7424

Effective date: 20060406

A977 Report on retrieval

Free format text: JAPANESE INTERMEDIATE CODE: A971007

Effective date: 20070220

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20070522

A521 Written amendment

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20070613

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20070731

A521 Written amendment

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20070926

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20080401

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20080414

R150 Certificate of patent or registration of utility model

Free format text: JAPANESE INTERMEDIATE CODE: R150

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20110509

Year of fee payment: 3

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20110509

Year of fee payment: 3

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20120509

Year of fee payment: 4

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20120509

Year of fee payment: 4

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20130509

Year of fee payment: 5

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20130509

Year of fee payment: 5