US20190005785A1 - Security system, security method, and non-transitory computer readable medium - Google Patents
Security system, security method, and non-transitory computer readable medium Download PDFInfo
- Publication number
- US20190005785A1 US20190005785A1 US16/126,729 US201816126729A US2019005785A1 US 20190005785 A1 US20190005785 A1 US 20190005785A1 US 201816126729 A US201816126729 A US 201816126729A US 2019005785 A1 US2019005785 A1 US 2019005785A1
- Authority
- US
- United States
- Prior art keywords
- action
- store
- suspicious
- suspicious action
- person
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19602—Image analysis to detect motion of the intruder, e.g. by frame subtraction
- G08B13/19608—Tracking movement of a target, e.g. by detecting an object predefined as a target, using target direction and or velocity to predict its new position
-
- G06K9/00771—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
- G06T7/20—Analysis of motion
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/50—Context or environment of the image
- G06V20/52—Surveillance or monitoring of activities, e.g. for recognising suspicious objects
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19602—Image analysis to detect motion of the intruder, e.g. by frame subtraction
- G08B13/19613—Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19639—Details of the system layout
- G08B13/19645—Multiple cameras, each having view on one of a plurality of scenes, e.g. multiple cameras for multi-room surveillance or for tracking an object by view hand-over
-
- G06K9/00355—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/20—Movements or behaviour, e.g. gesture recognition
- G06V40/28—Recognition of hand or arm movements, e.g. recognition of deaf sign language
Definitions
- the present invention relates to a security system, a security method, and a non-transitory computer readable medium storing a security program and, particularly, to a security system, a security method, and a non-transitory computer readable medium storing a security program using person images.
- Damage caused by shoplifting by customers, misappropriation by part-time employees and the like are a continuous and growing concern for stores.
- a store staff or a store manager keeps an eye on these customers and part-time employees, or records images monitored by a general 2D camera and visually checks them afterwards.
- Patent Literatures 1 to 5 Since it is inefficient to visually check for the occurrence of misconduct, the systems disclosed in Patent Literatures 1 to 5 as related art, for example, are under development.
- Patent Literature 1 when the number of times a store staff's face swings is a specified value of more and the cancelled amount of money in a cash register is a reference value or more, it is detected that a suspicious conduct (suspicious action) has occurred.
- the technique of the related art performs detection based on a swing of a face or the like, it fails to detect a suspicious action of a shop staff and the like in some cases. For example, although a suspicious action is often carried out by a hand, the technique of the related art cannot detect the behavior on the basis of a hand action.
- the technique disclosed in the related art has a problem that it is difficult to accurately detect a suspicious action of a store staff, a customer and the like.
- an exemplary object of the present invention is to provide a security system, a security method, and a non-transitory computer readable medium storing a security program capable of accurately detecting a suspicious action.
- a security system includes an image information acquisition unit that acquires input image information on an image taken of a person in a store, a tracking unit that tracks an action of a hand of the person based on the input image information, and a suspicious action detection unit that detects a suspicious action of the person based on the tracked action of the hand.
- a security method includes acquiring input image information on an image taken of a person in a store, tracking an action of a hand of the person based on the input image information, and detecting a suspicious action of the person based on the tracked action of the hand.
- a non-transitory computer readable medium storing a security program causes a computer to perform a security process including acquiring input image information on an image taken of a person in a store, tracking an action of a hand of the person based on the input image information, and detecting a suspicious action of the person based on the tracked action of the hand.
- a security system a security method, and a non-transitory computer readable medium storing a security program capable of accurately detecting a suspicious action.
- FIG. 1 is a block diagram showing main elements of a security system according to an exemplary embodiment.
- FIG. 2 is a block diagram showing the configuration of a security system according to a first exemplary embodiment
- FIG. 3A is a diagram showing a configuration example of a 3D camera according to the first exemplary embodiment
- FIG. 3B is a diagram showing a configuration example of a 3D camera according to the first exemplary embodiment
- FIG. 4 is a block diagram showing a configuration of a distance image analysis unit according to the first exemplary embodiment
- FIG. 5 is a flowchart showing the operation of the security system according to the first exemplary embodiment
- FIG. 6 is a flowchart showing the operation of a distance image analysis process according to the first exemplary embodiment
- FIG. 7 is a flowchart showing the operation of an alert information generation process according to the first exemplary embodiment
- FIG. 8 is an explanatory diagram illustrating the operation of the alert information generation process according to the first exemplary embodiment
- FIG. 9 is a block diagram showing the configuration of a security system according o a second exemplary embodiment.
- FIG. 10 is a block diagram showing a configuration of a distance image analysis unit according to the second exemplary embodiment.
- FIG. 1 shows main elements of a security system according to an exemplary embodiment.
- a security system 10 includes an image information acquisition unit 11 , a tracking unit 12 , and a suspicious action detection unit 13 .
- the image information acquisition unit 11 acquires input image information, which is an image taken of a person in a store.
- the tracking unit 12 tracks a hand action of a person based on the acquired input image information.
- the suspicious action detection unit 13 detects a suspicious action of a person based on the tracked hand action.
- a hand action of a person in a store is tracked, and a suspicious action is detected based on the tracking result. For example, by tracking a hand action of a customer or a store staff in front of a product shelf in a store, it is possible to accurately detect a suspicious action that can lead to shoplifting or misappropriation.
- FIG. 2 is a block diagram showing the configuration of a security system according to this exemplary embodiment.
- This security system is a system that detects a suspicious action of a customer or a store staff in a store or the like and outputs (displays) an alert (alarm) and the like. Note that customer includes all persons who come to (enter) a store, and the store staff includes all persons who work in a store.
- a security system 1 includes a security device 100 , a 3D camera 210 , a facial recognition camera 220 , an in-store camera 230 , and an alert device 240 .
- the security device 100 or the alert device 240 may be placed outside the store.
- the respective components of the security system 1 are separate devices, the respective components may be one or any number of devices.
- the 3D (three-dimensional) camera 210 is an imaging device (distance image sensor) that takes an image of and measures a target and generates a distance image (distance image information).
- the distance image (range image) contains image information which is an image of a target taken and distance. information which is a distance to a target measured.
- the 3D camera 210 is Microsoft Kinect (registered trademark) or a stereo camera.
- the 3D camera 210 takes an image of a customer or a store staff at a specified position in a store in this exemplary embodiment.
- the 3D camera 210 takes an image of a product shelf (product display shelf) 300 on which a product 301 is placed (displayed), and particularly takes an image of a customer 400 who is about to touch the product 301 in front of the product shelf 300 .
- the 3D camera 210 takes an image of a product placement area of the product shelf 300 and an area where a customer picks up/looks at a product in front of the product shelf 300 , which is a presentation area where a product is presented to a customer in the product shelf 300 .
- the 3D camera 210 is placed at a position where images of the product shelf 300 and the customer 400 in front of (in the vicinity of) the product shelf 300 can be taken, which is, for example, above (the ceiling etc.) or in front of (a wall etc.) of the product shelf 300 , or in the product shelf 300 .
- the 3D camera 210 takes an image of a checkout stand 310 where a cash register 311 is placed, and particularly takes an image of a store staff 410 who is standing in front of the checkout stand 310 and about to sell the product 301 to the customer 400 or the store staff 410 who is about to touch money 302 .
- the 3D camera 210 is placed at a position where images of the checkout stand 310 and the store staff 410 in front of (in the vicinity of) the checkout stand 310 can be taken, which is, for example, above (the ceiling etc.) or in front of (a wall etc.) of the checkout stand 310 , or on the checkout stand 310 (cash register 311 ).
- the 3D camera 210 is used as a device that takes images of the product shelf 300 and the checkout stand 310 , it is not limited to the 3D camera but may be a general camera. (2D camera) that outputs only images taken. In this case, tracking is performed using the image information only.
- Each of the facial recognition camera 220 and the in-store camera 230 is an imaging device (2D camera) that takes and generates an image of a target.
- the facial recognition camera 220 is placed at the entrance of a store or the like, takes an image of a face of a customer who comes to the store and generates a facial image to recognize the customer's face.
- the in-store camera 230 is placed at a plurality of positions in a store, takes an image of each section in the store and generates an in-store image to detect the congestion of customers in the store.
- each of the facial recognition camera 220 and the in-store camera 230 may be a 3D camera. By using a 3D camera, it is possible to accurately recognize the customer's face or the congestion in a store.
- the alert device 240 is a device that notifies (outputs) alert information to a surveillant such as a store manager, a business manager or a security guard and performs recording.
- the way to transmit (output) alert information to a surveillant is not limited, and it may be a display of letters and images on a display device, audio output through a speaker or the like.
- the alert device 240 is placed at a position where a surveillant can view (hear) the alert information.
- the alert device 240 may be an employee terminal in a shelf, a cash register, a guard's room or a store, or it may be a surveillance device connected to the outside of a store via a network.
- the alert device 240 is a computer including a display device and a storage device, such as a personal computer or a server computer.
- the security device 100 includes a distance image analysis unit 110 , a person recognition unit 120 , an in-store situation analysis unit 130 , an alert information generation unit 140 , a suspicious action information DB (database) 150 , a 3D video information recording unit 160 , and a suspicious person information DB 170 .
- a distance image analysis unit 110 the security device 100 includes a distance image analysis unit 110 , a person recognition unit 120 , an in-store situation analysis unit 130 , an alert information generation unit 140 , a suspicious action information DB (database) 150 , a 3D video information recording unit 160 , and a suspicious person information DB 170 .
- Each element in the security device 100 may be formed by hardware or software or both of them, and may be formed by one hardware or software or a plurality of hardware or software.
- the product information DB 150 and the customer information DB 160 may be storage devices connected to an external network (cloud).
- Each function (each processing) of the security device 100 may be implemented by a computer including CPU, memory and the like.
- a security program for performing a security method (security process) according to the exemplary embodiments may be stored in a storage device, and each function may be implemented by executing the security program stored in the storage device on the CPU.
- the non-transitory computer readable medium includes any type of tangible storage medium.
- Examples of the non-transitory computer readable medium include magnetic storage media (such as floppy disks, magnetic tapes, hard disk drives, etc.), optical magnetic storage media (e.g. magneto-optical disks), CD-ROM (Read Only Memory), CD-R , CD-R/W, and semiconductor memories (such as mask ROM, PROM (Programmable ROM), EPROM (Erasable PROM), flash ROM, RAM (Random Access Memory), etc.).
- the program may be provided to a computer using any type of transitory computer readable medium. Examples of the transitory computer readable medium include electric signals, optical signals, and electromagnetic waves.
- the transitory computer readable medium can provide the program to a computer via a wired communication line such as an electric wire or optical fiber or a wireless communication line.
- the distance image analysis unit 110 acquires a distance image generated by the 3D camera 210 , tracks a detection target based on the acquired distance image, and recognizes its action.
- the distance image analysis unit 110 mainly tracks and recognizes a hand action of a customer or a store staff.
- the distance image analysis unit 110 refers to the suspicious action information DB 150 to recognize a suspicious action of a customer or a store staff contained in the distance image. Further, the distance image analysis unit 110 performs detection necessary for recognition of a suspicious action, determination of a suspicion level and the like.
- the distance image analysis unit 110 detects a time period during which a suspicious action is carried out, the quantity of target products, the amount of money, the scale of a target act (the size of damage etc.) and the like as well. Further, the distance image analysis unit 110 records the distance image acquired from the 3D camera 210 as a 3D video in the 3D video information recording unit 160 .
- the person recognition unit 120 acquires a facial image of a customer generated by the facial recognition camera 220 and recognizes a person contained in the acquired facial image.
- the person recognition unit 120 refers to the suspicious person information DB 170 and makes comparison of it with the facial image, and thereby determines whether the customer is a suspicious person or not.
- the in-store situation analysis unit 130 acquires an in-store image generated by the in-store camera 230 , analyzes the number of customers in the store based on the acquired in-store image and detects the congestion in the store.
- the alert information generation unit 140 generates alert information to he transmitted to a surveillant based on detection results of the distance image analysis unit 110 , the person recognition unit 120 and the in-store situation analysis unit 130 , and outputs the generated alert information to the alert device 240 .
- the alert information generation unit 140 generates and outputs the alert information based on the hand action of a customer or a store staff detected by the distance image analysis unit 110 , the alert information based on the suspicious person recognized by the person recognition unit 120 , and the alert information based on the congestion in the store analyzed by the in-store situation analysis unit 130 . Further, the alert information generation unit 140 may record the generated alert information in a 3D video of the 3D video information recording unit 160 .
- the suspicious action information DB 150 stores suspicious action patterns (suspicious action pattern information) for detecting a suspicious action of a customer or a store staff.
- a suspicious action is an action (preliminary act) that raises suspicion of misconduct by a person such as a customer or a store staff.
- the suspicious action information DB 150 stores a product fraudulent acquisition pattern 151 , a product fraudulent change pattern 152 , a money fraudulent acquisition pattern 153 and the like, for example, as the suspicious action patterns.
- the product fraudulent acquisition pattern 151 is pattern information about actions of fraudulently acquiring a product, which include, for example, an action of a customer that puts a product in an improper place other than a shopping basket or cart.
- the product fraudulent change pattern 152 is pattern information about actions of fraudulently changing a product, which include, for example, an action of a customer that breaks or damages a product.
- the money fraudulent acquisition pattern 153 is pattern information about actions of fraudulently acquiring money, which include, for example, an action of a store staff that puts money from a cash register in an improper place such as a pocket of the store staff.
- the suspicious person information DB 170 stores suspicious person identification information for detecting that a customer who comes to a store is a suspicious person.
- the suspicious person includes a person with a previous record, a habitual offender and a person on a blacklist, and the suspicious person identification information contains the name, gender, age, facial image information (image) and the like.
- the suspicious person information DB 170 acquires and stores suspicious person information such as persons with previous records from a cloud (cloud network) 250 or the like, and further stores suspicious person information such as habitual offenders (persons on the blacklist) based on the history in the store.
- FIG. 4 shows the configuration of the distance image analysis unit 110 in the security device 100 .
- the distance image analysis unit 110 includes a distance image acquisition unit 111 , a region detection unit 112 , a hand tracking unit 113 , and a hand action recognition unit 114 .
- the elements for recognizing a person's hand action are mainly described below, a person's face, line of sight, product, money and the like can be detected by elements similar to those for recognizing a person's hand action.
- the distance image acquisition unit ill acquires a distance image containing a customer or a store staff which is taken and generated by the 3D camera 210 .
- the region detection unit 112 detects a region of each part of a customer or a store staff contained in the distance image acquired by the distance image acquisition unit 111 .
- the hand tracking unit 113 tracks the action of a hand of a customer or a store staff detected by the region detection unit 112 .
- the hand action recognition unit 114 recognizes a suspicious action of the customer or the store staff based on the hand action tracked by the hand tracking unit 113 . For example, based on the suspicious action information DB 150 , the hand action recognition unit 114 determines whether the suspicious action corresponds to a product fraudulent acquisition pattern such as putting a product in a pocket, a product fraudulent change pattern such as breaking a product, or a money fraudulent acquisition pattern such as putting money in a pocket of clothes.
- a security method (security process) that is performed in the security system (security device) according to this exemplary embodiment is described hereinafter with reference to FIG. 5 .
- a customer enters a store and comes close to a shelf in the store (S 101 ). Then, the facial recognition camera 220 in the store generates a facial image of the customer, and the security device 100 checks the facial image against suspicious person information such as a list of persons with previous records/on the blacklist (S 102 ). Specifically, the person recognition unit 120 of the security device 100 compares the facial image taken by the facial recognition camera 220 with facial image information of suspicious persons (a list of persons with previous records/on the blacklist) stored in the suspicious person information DB 170 and searches for a person regarding which the facial image and facial image information match and thereby determines whether the customer is a suspicious person or not.
- suspicious person information such as a list of persons with previous records/on the blacklist
- the customer performs a suspicious action such as putting a product in a place other than a shopping basket or cart (S 103 ).
- the 3D camera 210 in the vicinity of the shelf takes an image of the customer's hand
- the security device 100 recognizes the action of the customer's hand by using the distance image of the 3D camera 210 (S 104 ).
- the distance image analysis unit 110 in the security device 100 tracks the distance image of an image of the customer's hand, and recognizes that the customer has picked up the product and put it in an improper place.
- the security device 100 determines that a suspicious action has taken place based on the customer's hand action recognized in S 104 , and displays and records an alert on the alert device 240 such as a store staff terminal or a security guard terminal (S 105 ).
- the alert information generation unit 140 of the security device 100 generates and outputs alert information indicating a determination that a suspicious action has taken place. Further, the alert information generation unit 140 generates and outputs alert information based on the suspicious person recognized in S 102 .
- the security device 100 recognizes the action of the store staff's hand by using the distance image of the 3D camera 210 (S 104 ), and displays and records an alert on the alert device 240 (S 105 ).
- FIG. 6 shows the details of a recognition processing (tracking processing) performed by the distance image analysis unit 110 in S 104 of FIG. 5 .
- the processing shown in FIG. 6 is one example, and the action of a hand may be recognized by another image analysis processing, and a person's face or line of sight, a product, money and the like may be detected in the same way.
- the distance image acquisition unit 111 first acquires a distance image containing a customer or a store staff from the 3D camera 210 (S 201 ).
- the region detection unit 112 detects a person who is a customer or a store staff contained in the distance image acquired in S 201 (S 202 ) and further detects each region of the person (S 203 ).
- the region detection unit 112 detects a person (customer or store staff) based on the image and the distance contained in the distance image by using a discrimination circuit such as SVM (Support Vector Machine), and estimates the joint of the detected person and thereby detects the bone structure of the person.
- the region detection unit 112 detects the region of each part such as the person's hand based on the detected bone structure.
- the hand tracking unit 113 tracks the hand action of the customer or the store staff detected in S 203 (S 204 ).
- the hand tracking unit 113 tracks the bone structure of the customer's hand and its vicinity and detects the action of the fingers or palm of the hand based on the image and the distance contained in the distance image.
- the hand action recognition unit 114 extracts the feature of the action of the hand based on the action of the hand tracked in S 204 (S 205 ), and recognizes a suspicious action of the customer or the store staff based on the extracted feature (S 206 ).
- the hand action recognition unit 114 extracts the direction, angle, and change in movement of the fingers or the palm (wrist) as a feature amount.
- the hand action recognition unit 114 detects that the customer is holding the product from the angle of the fingers, and when the customer moves the fingers off the product with the hand being close to a pocket of clothes, it detects that the customer puts the product in the pocket of the clothes. Then, the hand action recognition unit 114 compares the detected action pattern with the product fraudulent acquisition pattern 151 , the product fraudulent change pattern 152 and the money fraudulent acquisition pattern 153 , and when the detected pattern matches any of those, it determines that it is a suspicious action. Further, the features of images of the product fraudulent acquisition pattern 151 , the product fraudulent change pattern 152 and the money fraudulent acquisition pattern 153 may be learned in advance, and the state of the hand may be identified by comparing a detected feature amount with the learned feature amount.
- FIG. 7 shows the details of an alert output processing performed in S 104 and S 105 of FIG. 5 .
- the distance image analysis unit 110 determines whether a customer or a store staff performs a suspicious action (S 301 ). For example, the distance image analysis unit 110 determines an action of a customer that puts a product in a place other than a shopping basket or cart, such as a pocket or a bag in hand, or an action that breaks a product, damages the product, adds a foreign body, or fraudulently changes the placement. Further, the distance image analysis unit 110 determines an action of a store staff that embezzles the sales, appropriates a product (puts money in a pocket etc), or gives a product to a customer as a conspirator without receiving a full price.
- the distance image analysis unit 110 determines, as a suspicious action, an action such as frequently looking around, tampering or illicitly manipulating a pachinko machine, attaching a skimming device to an ATM (Automated Teller Machine), illicitly manipulating a cash register or an electronic money device, or paying public money or issuing a ticket without through a regular process.
- an action such as frequently looking around, tampering or illicitly manipulating a pachinko machine, attaching a skimming device to an ATM (Automated Teller Machine), illicitly manipulating a cash register or an electronic money device, or paying public money or issuing a ticket without through a regular process.
- ATM Automatic Teller Machine
- the alert information generation unit 140 acquires suspicious person information (S 302 ) and acquires the congestion in a store (S 303 ).
- the alert information generation unit 140 acquires the suspicious person information indicating whether the customer is a suspicious person or not from the person recognition unit 120 so as to provide the alert information on the basis of a person recognition result by the facial image of the facial recognition camera 220 .
- the alert information generation unit 140 acquires the congestion in the store from the in-store situation analysis unit 130 so as to provide the alert information on the basis of a congestion analysis result by the in-store image of the in-store camera 230 . Note that, before recognizing a customer, before analyzing the congestion, and when each information is not necessary, the acquisition of the suspicious person information and the acquisition of the congestion may be omitted.
- the alert information generation unit 140 determines a suspicion level of the detected suspicious action of a customer or a store staff (S 304 ). For example, the suspicion level is assigned to each suspicious action pattern in the suspicious action information DB 150 , and the suspicion level is determined by referring to the suspicious action information DB 150 .
- FIG. 8 shows examples of the suspicion level of a suspicious action.
- a level is set among the suspicion levels 1 to 5 . As the suspicion level is higher, it is more likely to be misconduct, for example.
- a customer's action corresponds to the product fraudulent acquisition pattern “put a product in an improper place”
- it is set to the suspicion level 3 by referring to the suspicious action information DB 150 .
- the suspicion level is adjusted in consideration of other parameters.
- thresholds are set for the action time, the quantity of products, and the price of a product.
- the suspicion level is set higher in accordance with the amount exceeding the thresholds.
- the time is longer, when the quantity of products is smaller, or when the price of a product is lower than such threshold, the suspicion level is set lower in accordance with the amount falling below the thresholds.
- a customer's action corresponds to the product fraudulent change pattern “damage a product”, “open a product box”, or “deform a product box”, it is set to the suspicion level 3 by referring to the suspicious action information DB 150 . Then, the suspicion level is adjusted in consideration of other parameters.
- thresholds are set for the scale (rate) of the damage, the action time, the quantity of products, and the price of a product.
- the suspicion level is set higher in accordance with the amount exceeding the thresholds.
- the suspicion level is set lower in accordance with the amount falling below the thresholds.
- a store staff's action corresponds to the money fraudulent acquisition pattern “move money to an improper place”, it is set to the suspicion level 3 by referring to the suspicious action information DB 150 . Then, the suspicion level is adjusted in consideration of other parameters.
- thresholds are set for the action time and the amount of money.
- the suspicion level is set higher in accordance with the amount exceeding the thresholds.
- the suspicion level is set lower in accordance with the amount falling below the thresholds.
- the suspicion level is set higher.
- the suspicion level may be set higher for an action of a customer or a store staff that looks around.
- the suspicion level is determined based on the presence or absence of a suspicious person or the state in a store after a suspicious action is detected in this example, it may be determined before a suspicious action is detected. For example, when a customer is a suspicious action, when the state in a store is congested/sparsely populated, or when a customer has an open-top bag, alert information (warning information) may be output even when a suspicious action is not yet detected. Further, in such a case, the thresholds for detection of a suspicious action (such as the time to detect a suspicious action) may be lowered to make a suspicious action easy to be detected.
- the alert information generation unit 140 outputs alert information based on a determination result (S 305 ).
- the alert information generation unit 140 outputs the detected suspicious action and the determined suspicion level to the alert device 240 .
- the output of the alert information may be controlled based on the suspicion level.
- the suspicion level is lower than a specified level, an alert is not necessary and the alert information needs not to be output to the alert device 240 . Further, in this case, the alert information may be only recorded in the alert device 240 without being displayed thereon.
- the suspicious actions and the suspicion levels may be recorded in 3D video information.
- recording the suspicion levels it is possible to extract and check only a part with a high suspicion level and thus efficiently check the 3D video.
- the hand motion of a customer or a store staff is observed by the 3D camera placed at the potion from which a product shelf and a client (shopper) in front of the shelf can view to recognize a suspicious action of the customer or the store staff.
- alert information is notified to an employee terminal in a shelf, a cash register, a guard's room or a store, and action is recorded,
- a second exemplary embodiment is described hereinafter with reference to the drawings.
- This exemplary embodiment is an example that, as a complement to the suspicious action recognition in the first exemplary embodiment, detects a suspicious action by detecting a deviant action from normal action information patterns.
- the present invention is not limited to the example of the first exemplary embodiment, and a suspicious action may be determined by detecting a deviation from a store staff's normal action such as work at a cash register, rather than detecting an action of a store staff that embezzles the sales, appropriates a product (puts money in a pocket etc.) or gives a product to a customer as a conspirator without receiving a full price and the like.
- FIG. 9 shows a configuration of a security system according to this exemplary embodiment.
- the security device 100 further includes a normal action information DB 180 in addition to the elements of the first exemplary-embodiment shown in FIG. 2 .
- the normal action information DB 180 stores normal action patterns (normal action pattern information) indicating normal actions of a customer and a store staff.
- the normal action information DB 180 stores a product normal acquisition pattern 181 , a product normal change pattern 182 , a money normal acquisition pattern 183 and the like, for example, as the normal action patterns.
- the product normal acquisition pattern 181 is pattern information about actions of normally acquiring a product, which includes an action of a customer that puts a product in a shopping basket or cart, for example.
- the product normal change pattern 182 is pattern information about actions of normally altering a product, which includes an action of a store staff that changes the display of a product, for example.
- the money normal acquisition pattern 183 is pattern information about actions of normally acquiring money, which includes an action of a store staff that performs normal cash register work and an action of a store staff that gives money from a cash register to a customer, for example.
- FIG. 10 shows the configuration of the distance image analysis unit 110 in the security device 100 according to this exemplary embodiment. As shown in FIG. 10 , a deviant action detection unit 115 is further included in addition to the elements of the first exemplary embodiment shown in FIG. 4 .
- the deviant action detection unit 115 detects whether an action of a customer or a store staff is deviated from a normal action (suspicious action) or not based on the the hand action tracked by the hand tracking unit 113 .
- the deviant action detection unit 115 refers to the normal action information DB 180 and compares the detected action of a customer or a store staff with the product normal acquisition pattern 181 , the product normal change pattern 182 and the money normal acquisition pattern 183 , and when the action of a customer or a store staff does not match any of them, determines that it is a suspicious action.
- a suspicion level may be set in accordance with the degree of deviation from normal action patterns (the degree of mismatch).
- a suspicious action may be determined in consideration of both of a detection result by the hand action recognition unit 114 using the suspicious action patterns and a detection result by the deviant action detection unit 115 using the normal action patterns. For example, an action may be determined as a suspicious action when any one of the hand action recognition unit 114 and the deviant action detection unit 115 determines that it is suspicious, or an action may be determined as a suspicious action when both of the hand action recognition unit 114 and the deviant action detection unit 115 determine that it is suspicious.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Alarm Systems (AREA)
- Burglar Alarm Systems (AREA)
- Image Analysis (AREA)
- Image Processing (AREA)
Abstract
A security system (10) includes an image information acquisition unit (11) that acquires input image information on an image taken of a person in a store, a tracking unit (12) that tracks an action of a hand of the person based on the input image information, and a suspicious action detection unit (13) that detects a suspicious action of the person based on the tracked action of the hand. A security system, a security method, and a security program capable of accurately detecting a suspicious action are thereby provided.
Description
- The present invention relates to a security system, a security method, and a non-transitory computer readable medium storing a security program and, particularly, to a security system, a security method, and a non-transitory computer readable medium storing a security program using person images.
- Damage caused by shoplifting by customers, misappropriation by part-time employees and the like are a continuous and growing concern for stores. In order to prevent such misconduct, a store staff or a store manager keeps an eye on these customers and part-time employees, or records images monitored by a general 2D camera and visually checks them afterwards.
- Since it is inefficient to visually check for the occurrence of misconduct, the systems disclosed in
Patent Literatures 1 to 5 as related art, for example, are under development. - PTL1: Japanese Unexamined Patent Publication No. 2011-065328
- PTL2: Japanese Unexamined Patent Publication No. 2010-094332
- PTL3: Japanese Unexamined Patent Publication No. 2009-048430
- PTL4: Japanese Unexamined Patent Publication No. 2009-009231
- PTL5: Japanese Unexamined Patent Publication No. 2008-257487
- For example, according to the techniques disclosed in related art like
Patent Literature 1, when the number of times a store staff's face swings is a specified value of more and the cancelled amount of money in a cash register is a reference value or more, it is detected that a suspicious conduct (suspicious action) has occurred. - However, because the technique of the related art performs detection based on a swing of a face or the like, it fails to detect a suspicious action of a shop staff and the like in some cases. For example, although a suspicious action is often carried out by a hand, the technique of the related art cannot detect the behavior on the basis of a hand action.
- Thus, the technique disclosed in the related art has a problem that it is difficult to accurately detect a suspicious action of a store staff, a customer and the like.
- In light of the above, an exemplary object of the present invention is to provide a security system, a security method, and a non-transitory computer readable medium storing a security program capable of accurately detecting a suspicious action.
- A security system according to an exemplary aspect of the present invention includes an image information acquisition unit that acquires input image information on an image taken of a person in a store, a tracking unit that tracks an action of a hand of the person based on the input image information, and a suspicious action detection unit that detects a suspicious action of the person based on the tracked action of the hand.
- A security method according to an exemplary aspect of the present invention includes acquiring input image information on an image taken of a person in a store, tracking an action of a hand of the person based on the input image information, and detecting a suspicious action of the person based on the tracked action of the hand.
- A non-transitory computer readable medium storing a security program according to an exemplary aspect of the present invention causes a computer to perform a security process including acquiring input image information on an image taken of a person in a store, tracking an action of a hand of the person based on the input image information, and detecting a suspicious action of the person based on the tracked action of the hand.
- According to the exemplary aspects of the present invention, it is possible to provide a security system, a security method, and a non-transitory computer readable medium storing a security program capable of accurately detecting a suspicious action.
-
FIG. 1 is a block diagram showing main elements of a security system according to an exemplary embodiment. -
FIG. 2 is a block diagram showing the configuration of a security system according to a first exemplary embodiment; -
FIG. 3A is a diagram showing a configuration example of a 3D camera according to the first exemplary embodiment; -
FIG. 3B is a diagram showing a configuration example of a 3D camera according to the first exemplary embodiment; -
FIG. 4 is a block diagram showing a configuration of a distance image analysis unit according to the first exemplary embodiment; -
FIG. 5 is a flowchart showing the operation of the security system according to the first exemplary embodiment; -
FIG. 6 is a flowchart showing the operation of a distance image analysis process according to the first exemplary embodiment; -
FIG. 7 is a flowchart showing the operation of an alert information generation process according to the first exemplary embodiment; -
FIG. 8 is an explanatory diagram illustrating the operation of the alert information generation process according to the first exemplary embodiment; -
FIG. 9 is a block diagram showing the configuration of a security system according o a second exemplary embodiment; and -
FIG. 10 is a block diagram showing a configuration of a distance image analysis unit according to the second exemplary embodiment. - Prior to describing exemplary embodiments, the overview of the characteristics of the exemplary embodiments is described hereinbelow.
FIG. 1 shows main elements of a security system according to an exemplary embodiment. - As shown in
FIG. 1 , asecurity system 10 according to this exemplary embodiment includes an imageinformation acquisition unit 11, atracking unit 12, and a suspiciousaction detection unit 13. The imageinformation acquisition unit 11 acquires input image information, which is an image taken of a person in a store. Thetracking unit 12 tracks a hand action of a person based on the acquired input image information. The suspiciousaction detection unit 13 detects a suspicious action of a person based on the tracked hand action. - As described above, in the exemplary embodiment, a hand action of a person in a store is tracked, and a suspicious action is detected based on the tracking result. For example, by tracking a hand action of a customer or a store staff in front of a product shelf in a store, it is possible to accurately detect a suspicious action that can lead to shoplifting or misappropriation.
- A first exemplary embodiment is described hereinafter with reference to the drawings.
FIG. 2 is a block diagram showing the configuration of a security system according to this exemplary embodiment. This security system is a system that detects a suspicious action of a customer or a store staff in a store or the like and outputs (displays) an alert (alarm) and the like. Note that customer includes all persons who come to (enter) a store, and the store staff includes all persons who work in a store. - As shown in
FIG. 2 , asecurity system 1 according to this exemplary embodiment includes asecurity device 100, a3D camera 210, afacial recognition camera 220, an in-store camera 230, and analert device 240. For example, while the respective components of thesecurity system 1 are placed in the same store, thesecurity device 100 or thealert device 240 may be placed outside the store. Although it is assumed in the following description that the respective components of thesecurity system 1 are separate devices, the respective components may be one or any number of devices. - The 3D (three-dimensional)
camera 210 is an imaging device (distance image sensor) that takes an image of and measures a target and generates a distance image (distance image information). The distance image (range image) contains image information which is an image of a target taken and distance. information which is a distance to a target measured. For example, the3D camera 210 is Microsoft Kinect (registered trademark) or a stereo camera. By using the 3D camera, it is possible to recognize (track) a target (a customer's action or the like) including the distance information, and it is thus possible to perform highly accurate recognition. - As shown in
FIGS. 3A and 3B , in order to detect a suspicious action by a hand of a customer or a store staff, the3D camera 210 takes an image of a customer or a store staff at a specified position in a store in this exemplary embodiment. In the example ofFIG. 3A , the3D camera 210 takes an image of a product shelf (product display shelf) 300 on which aproduct 301 is placed (displayed), and particularly takes an image of acustomer 400 who is about to touch theproduct 301 in front of theproduct shelf 300. The3D camera 210 takes an image of a product placement area of theproduct shelf 300 and an area where a customer picks up/looks at a product in front of theproduct shelf 300, which is a presentation area where a product is presented to a customer in theproduct shelf 300. The3D camera 210 is placed at a position where images of theproduct shelf 300 and thecustomer 400 in front of (in the vicinity of) theproduct shelf 300 can be taken, which is, for example, above (the ceiling etc.) or in front of (a wall etc.) of theproduct shelf 300, or in theproduct shelf 300. - In the example of
FIG. 3B , the3D camera 210 takes an image of acheckout stand 310 where acash register 311 is placed, and particularly takes an image of astore staff 410 who is standing in front of thecheckout stand 310 and about to sell theproduct 301 to thecustomer 400 or thestore staff 410 who is about to touchmoney 302. The3D camera 210 is placed at a position where images of thecheckout stand 310 and thestore staff 410 in front of (in the vicinity of) the checkout stand 310 can be taken, which is, for example, above (the ceiling etc.) or in front of (a wall etc.) of thecheckout stand 310, or on the checkout stand 310 (cash register 311). - Note that, although an example in which the
3D camera 210 is used as a device that takes images of theproduct shelf 300 and thecheckout stand 310 is described below, it is not limited to the 3D camera but may be a general camera. (2D camera) that outputs only images taken. In this case, tracking is performed using the image information only. - Each of the
facial recognition camera 220 and the in-store camera 230 is an imaging device (2D camera) that takes and generates an image of a target. Thefacial recognition camera 220 is placed at the entrance of a store or the like, takes an image of a face of a customer who comes to the store and generates a facial image to recognize the customer's face. The in-store camera 230 is placed at a plurality of positions in a store, takes an image of each section in the store and generates an in-store image to detect the congestion of customers in the store. Note that each of thefacial recognition camera 220 and the in-store camera 230 may be a 3D camera. By using a 3D camera, it is possible to accurately recognize the customer's face or the congestion in a store. - The
alert device 240 is a device that notifies (outputs) alert information to a surveillant such as a store manager, a business manager or a security guard and performs recording. The way to transmit (output) alert information to a surveillant is not limited, and it may be a display of letters and images on a display device, audio output through a speaker or the like. Thealert device 240 is placed at a position where a surveillant can view (hear) the alert information. Thealert device 240 may be an employee terminal in a shelf, a cash register, a guard's room or a store, or it may be a surveillance device connected to the outside of a store via a network. For example, thealert device 240 is a computer including a display device and a storage device, such as a personal computer or a server computer. - As shown in
FIG. 2 , thesecurity device 100 includes a distanceimage analysis unit 110, aperson recognition unit 120, an in-storesituation analysis unit 130, an alertinformation generation unit 140, a suspicious action information DB (database) 150, a 3D videoinformation recording unit 160, and a suspiciousperson information DB 170. Note that, although those blocks are described as the functions of thesecurity device 100 in this example, another configuration may be used as long as the operation according to this exemplary embodiment, which is described later, can be achieved. - Each element in the
security device 100 may be formed by hardware or software or both of them, and may be formed by one hardware or software or a plurality of hardware or software. For example, theproduct information DB 150 and thecustomer information DB 160 may be storage devices connected to an external network (cloud). Each function (each processing) of thesecurity device 100 may be implemented by a computer including CPU, memory and the like. For example, a security program for performing a security method (security process) according to the exemplary embodiments may be stored in a storage device, and each function may be implemented by executing the security program stored in the storage device on the CPU. - This security program can be stored and provided to the computer using any type of non-transitory computer readable medium. The non-transitory computer readable medium includes any type of tangible storage medium. Examples of the non-transitory computer readable medium include magnetic storage media (such as floppy disks, magnetic tapes, hard disk drives, etc.), optical magnetic storage media (e.g. magneto-optical disks), CD-ROM (Read Only Memory), CD-R , CD-R/W, and semiconductor memories (such as mask ROM, PROM (Programmable ROM), EPROM (Erasable PROM), flash ROM, RAM (Random Access Memory), etc.). The program may be provided to a computer using any type of transitory computer readable medium. Examples of the transitory computer readable medium include electric signals, optical signals, and electromagnetic waves. The transitory computer readable medium can provide the program to a computer via a wired communication line such as an electric wire or optical fiber or a wireless communication line.
- The distance
image analysis unit 110 acquires a distance image generated by the3D camera 210, tracks a detection target based on the acquired distance image, and recognizes its action. In this exemplary embodiment, the distanceimage analysis unit 110 mainly tracks and recognizes a hand action of a customer or a store staff. The distanceimage analysis unit 110 refers to the suspiciousaction information DB 150 to recognize a suspicious action of a customer or a store staff contained in the distance image. Further, the distanceimage analysis unit 110 performs detection necessary for recognition of a suspicious action, determination of a suspicion level and the like. For example, the distanceimage analysis unit 110 detects a time period during which a suspicious action is carried out, the quantity of target products, the amount of money, the scale of a target act (the size of damage etc.) and the like as well. Further, the distanceimage analysis unit 110 records the distance image acquired from the3D camera 210 as a 3D video in the 3D videoinformation recording unit 160. - The
person recognition unit 120 acquires a facial image of a customer generated by thefacial recognition camera 220 and recognizes a person contained in the acquired facial image. Theperson recognition unit 120 refers to the suspiciousperson information DB 170 and makes comparison of it with the facial image, and thereby determines whether the customer is a suspicious person or not. The in-storesituation analysis unit 130 acquires an in-store image generated by the in-store camera 230, analyzes the number of customers in the store based on the acquired in-store image and detects the congestion in the store. - The alert
information generation unit 140 generates alert information to he transmitted to a surveillant based on detection results of the distanceimage analysis unit 110, theperson recognition unit 120 and the in-storesituation analysis unit 130, and outputs the generated alert information to thealert device 240. The alertinformation generation unit 140 generates and outputs the alert information based on the hand action of a customer or a store staff detected by the distanceimage analysis unit 110, the alert information based on the suspicious person recognized by theperson recognition unit 120, and the alert information based on the congestion in the store analyzed by the in-storesituation analysis unit 130. Further, the alertinformation generation unit 140 may record the generated alert information in a 3D video of the 3D videoinformation recording unit 160. - The suspicious
action information DB 150 stores suspicious action patterns (suspicious action pattern information) for detecting a suspicious action of a customer or a store staff. Note that a suspicious action is an action (preliminary act) that raises suspicion of misconduct by a person such as a customer or a store staff. The suspiciousaction information DB 150 stores a productfraudulent acquisition pattern 151, a productfraudulent change pattern 152, a moneyfraudulent acquisition pattern 153 and the like, for example, as the suspicious action patterns. - The product
fraudulent acquisition pattern 151 is pattern information about actions of fraudulently acquiring a product, which include, for example, an action of a customer that puts a product in an improper place other than a shopping basket or cart. The productfraudulent change pattern 152 is pattern information about actions of fraudulently changing a product, which include, for example, an action of a customer that breaks or damages a product. The moneyfraudulent acquisition pattern 153 is pattern information about actions of fraudulently acquiring money, which include, for example, an action of a store staff that puts money from a cash register in an improper place such as a pocket of the store staff. - The suspicious
person information DB 170 stores suspicious person identification information for detecting that a customer who comes to a store is a suspicious person. The suspicious person includes a person with a previous record, a habitual offender and a person on a blacklist, and the suspicious person identification information contains the name, gender, age, facial image information (image) and the like. For example, the suspiciousperson information DB 170 acquires and stores suspicious person information such as persons with previous records from a cloud (cloud network) 250 or the like, and further stores suspicious person information such as habitual offenders (persons on the blacklist) based on the history in the store. -
FIG. 4 shows the configuration of the distanceimage analysis unit 110 in thesecurity device 100. As shown inFIG. 4 , the distanceimage analysis unit 110 includes a distanceimage acquisition unit 111, aregion detection unit 112, ahand tracking unit 113, and a handaction recognition unit 114. Although the elements for recognizing a person's hand action are mainly described below, a person's face, line of sight, product, money and the like can be detected by elements similar to those for recognizing a person's hand action. - The distance image acquisition unit ill acquires a distance image containing a customer or a store staff which is taken and generated by the
3D camera 210. Theregion detection unit 112 detects a region of each part of a customer or a store staff contained in the distance image acquired by the distanceimage acquisition unit 111. - The
hand tracking unit 113 tracks the action of a hand of a customer or a store staff detected by theregion detection unit 112. The handaction recognition unit 114 recognizes a suspicious action of the customer or the store staff based on the hand action tracked by thehand tracking unit 113. For example, based on the suspiciousaction information DB 150, the handaction recognition unit 114 determines whether the suspicious action corresponds to a product fraudulent acquisition pattern such as putting a product in a pocket, a product fraudulent change pattern such as breaking a product, or a money fraudulent acquisition pattern such as putting money in a pocket of clothes. - A security method (security process) that is performed in the security system (security device) according to this exemplary embodiment is described hereinafter with reference to
FIG. 5 . - As shown in
FIG. 5 , a customer enters a store and comes close to a shelf in the store (S101). Then, thefacial recognition camera 220 in the store generates a facial image of the customer, and thesecurity device 100 checks the facial image against suspicious person information such as a list of persons with previous records/on the blacklist (S102). Specifically, theperson recognition unit 120 of thesecurity device 100 compares the facial image taken by thefacial recognition camera 220 with facial image information of suspicious persons (a list of persons with previous records/on the blacklist) stored in the suspiciousperson information DB 170 and searches for a person regarding which the facial image and facial image information match and thereby determines whether the customer is a suspicious person or not. - After that, the customer performs a suspicious action such as putting a product in a place other than a shopping basket or cart (S103). Then, the
3D camera 210 in the vicinity of the shelf takes an image of the customer's hand, and thesecurity device 100 recognizes the action of the customer's hand by using the distance image of the 3D camera 210 (S104). Specifically, the distanceimage analysis unit 110 in thesecurity device 100 tracks the distance image of an image of the customer's hand, and recognizes that the customer has picked up the product and put it in an improper place. - Then, the
security device 100 determines that a suspicious action has taken place based on the customer's hand action recognized in S104, and displays and records an alert on thealert device 240 such as a store staff terminal or a security guard terminal (S105). Specifically, the alertinformation generation unit 140 of thesecurity device 100 generates and outputs alert information indicating a determination that a suspicious action has taken place. Further, the alertinformation generation unit 140 generates and outputs alert information based on the suspicious person recognized in S102. - Further, besides a customer, a store staff comes close to a checkout stand (S106) and performs a suspicious action such as putting money in a place other than a cash register (S107). Then, in the same manner as in the case of the customer's action, the
security device 100 recognizes the action of the store staff's hand by using the distance image of the 3D camera 210 (S104), and displays and records an alert on the alert device 240 (S105). -
FIG. 6 shows the details of a recognition processing (tracking processing) performed by the distanceimage analysis unit 110 in S104 ofFIG. 5 . Note that, the processing shown inFIG. 6 is one example, and the action of a hand may be recognized by another image analysis processing, and a person's face or line of sight, a product, money and the like may be detected in the same way. - As shown in
FIG. 6 , the distanceimage acquisition unit 111 first acquires a distance image containing a customer or a store staff from the 3D camera 210 (S201). Next, theregion detection unit 112 detects a person who is a customer or a store staff contained in the distance image acquired in S201 (S202) and further detects each region of the person (S203). For example, theregion detection unit 112 detects a person (customer or store staff) based on the image and the distance contained in the distance image by using a discrimination circuit such as SVM (Support Vector Machine), and estimates the joint of the detected person and thereby detects the bone structure of the person. Theregion detection unit 112 detects the region of each part such as the person's hand based on the detected bone structure. - Then, the
hand tracking unit 113 tracks the hand action of the customer or the store staff detected in S203 (S204). Thehand tracking unit 113 tracks the bone structure of the customer's hand and its vicinity and detects the action of the fingers or palm of the hand based on the image and the distance contained in the distance image. - After that, the hand
action recognition unit 114 extracts the feature of the action of the hand based on the action of the hand tracked in S204 (S205), and recognizes a suspicious action of the customer or the store staff based on the extracted feature (S206). The handaction recognition unit 114 extracts the direction, angle, and change in movement of the fingers or the palm (wrist) as a feature amount. - For example, the hand
action recognition unit 114 detects that the customer is holding the product from the angle of the fingers, and when the customer moves the fingers off the product with the hand being close to a pocket of clothes, it detects that the customer puts the product in the pocket of the clothes. Then, the handaction recognition unit 114 compares the detected action pattern with the productfraudulent acquisition pattern 151, the productfraudulent change pattern 152 and the moneyfraudulent acquisition pattern 153, and when the detected pattern matches any of those, it determines that it is a suspicious action. Further, the features of images of the productfraudulent acquisition pattern 151, the productfraudulent change pattern 152 and the moneyfraudulent acquisition pattern 153 may be learned in advance, and the state of the hand may be identified by comparing a detected feature amount with the learned feature amount. -
FIG. 7 shows the details of an alert output processing performed in S104 and S105 ofFIG. 5 . - As shown in
FIG. 7 , the distanceimage analysis unit 110 determines whether a customer or a store staff performs a suspicious action (S301). For example, the distanceimage analysis unit 110 determines an action of a customer that puts a product in a place other than a shopping basket or cart, such as a pocket or a bag in hand, or an action that breaks a product, damages the product, adds a foreign body, or fraudulently changes the placement. Further, the distanceimage analysis unit 110 determines an action of a store staff that embezzles the sales, appropriates a product (puts money in a pocket etc), or gives a product to a customer as a conspirator without receiving a full price. Besides, the distanceimage analysis unit 110 determines, as a suspicious action, an action such as frequently looking around, tampering or illicitly manipulating a pachinko machine, attaching a skimming device to an ATM (Automated Teller Machine), illicitly manipulating a cash register or an electronic money device, or paying public money or issuing a ticket without through a regular process. When a customer or a store staff performs the corresponding action, the following process is performed to output alert information in accordance with that action. - Specifically, the alert
information generation unit 140 acquires suspicious person information (S302) and acquires the congestion in a store (S303). The alertinformation generation unit 140 acquires the suspicious person information indicating whether the customer is a suspicious person or not from theperson recognition unit 120 so as to provide the alert information on the basis of a person recognition result by the facial image of thefacial recognition camera 220. Further, the alertinformation generation unit 140 acquires the congestion in the store from the in-storesituation analysis unit 130 so as to provide the alert information on the basis of a congestion analysis result by the in-store image of the in-store camera 230. Note that, before recognizing a customer, before analyzing the congestion, and when each information is not necessary, the acquisition of the suspicious person information and the acquisition of the congestion may be omitted. - Then, the alert
information generation unit 140 determines a suspicion level of the detected suspicious action of a customer or a store staff (S304). For example, the suspicion level is assigned to each suspicious action pattern in the suspiciousaction information DB 150, and the suspicion level is determined by referring to the suspiciousaction information DB 150. -
FIG. 8 shows examples of the suspicion level of a suspicious action. For example, as shown inFIG. 8 , a level is set among thesuspicion levels 1 to 5. As the suspicion level is higher, it is more likely to be misconduct, for example. - As one example, when a customer's action corresponds to the product fraudulent acquisition pattern “put a product in an improper place”, it is set to the
suspicion level 3 by referring to the suspiciousaction information DB 150. Then, the suspicion level is adjusted in consideration of other parameters. - For example, when the time period of the suspicious action is short, when the quantity of products is large, or when the product is expensive, it is likely to be shoplifting. Thus, thresholds are set for the action time, the quantity of products, and the price of a product. When the time is shorter, when the quantity of products is larger, or when the price of a product is higher than such threshold, the suspicion level is set higher in accordance with the amount exceeding the thresholds. On the other hand, when the time is longer, when the quantity of products is smaller, or when the price of a product is lower than such threshold, the suspicion level is set lower in accordance with the amount falling below the thresholds.
- Likewise, when a customer's action corresponds to the product fraudulent change pattern “damage a product”, “open a product box”, or “deform a product box”, it is set to the
suspicion level 3 by referring to the suspiciousaction information DB 150. Then, the suspicion level is adjusted in consideration of other parameters. - For example, when the damage is large or when the product box is deformed, when the time period of the suspicious action is short, when the quantity of products is large, or when the product is expensive, it is likely to be malicious. Thus, thresholds are set for the scale (rate) of the damage, the action time, the quantity of products, and the price of a product. When the damage is larger, when the time is shorter, when the quantity of products is larger, or when the price of a product is higher than such threshold, the suspicion level is set higher in accordance with the amount exceeding the thresholds. On the other hand, when the damage is smaller, when the time is longer, when the quantity of products is smaller, or when the price of a product is lower than such threshold, the suspicion level is set lower in accordance with the amount falling below the thresholds.
- Likewise, when a store staff's action corresponds to the money fraudulent acquisition pattern “move money to an improper place”, it is set to the
suspicion level 3 by referring to the suspiciousaction information DB 150. Then, the suspicion level is adjusted in consideration of other parameters. - For example, when the time period of the suspicious action is short, or when the amount of money is large, it is likely to be misappropriation. Thus, thresholds are set for the action time and the amount of money. When the time is shorter or when the amount of money is larger than such threshold, the suspicion level is set higher in accordance with the amount exceeding the thresholds. On the other hand, when the time is longer or when the amount of money is smaller than such threshold, the suspicion level is set lower in accordance with the amount falling below the thresholds.
- Further, when the customer is a suspicious person or when the situation in the store is congested/sparsely populated, the possibility of a suspicious action increases, and the suspicion level is set higher. In addition, the suspicion level may be set higher for an action of a customer or a store staff that looks around.
- Note that, although the suspicion level is determined based on the presence or absence of a suspicious person or the state in a store after a suspicious action is detected in this example, it may be determined before a suspicious action is detected. For example, when a customer is a suspicious action, when the state in a store is congested/sparsely populated, or when a customer has an open-top bag, alert information (warning information) may be output even when a suspicious action is not yet detected. Further, in such a case, the thresholds for detection of a suspicious action (such as the time to detect a suspicious action) may be lowered to make a suspicious action easy to be detected.
- After that, the alert
information generation unit 140 outputs alert information based on a determination result (S305). The alertinformation generation unit 140 outputs the detected suspicious action and the determined suspicion level to thealert device 240. For example, the output of the alert information may be controlled based on the suspicion level. When the suspicion level is lower than a specified level, an alert is not necessary and the alert information needs not to be output to thealert device 240. Further, in this case, the alert information may be only recorded in thealert device 240 without being displayed thereon. - Further, the suspicious actions and the suspicion levels may be recorded in 3D video information. By recording the suspicion levels, it is possible to extract and check only a part with a high suspicion level and thus efficiently check the 3D video.
- As described above, in this exemplary embodiment, the hand motion of a customer or a store staff is observed by the 3D camera placed at the potion from which a product shelf and a client (shopper) in front of the shelf can view to recognize a suspicious action of the customer or the store staff. When a suspicious action is recognized, alert information (alarm) is notified to an employee terminal in a shelf, a cash register, a guard's room or a store, and action is recorded,
- Because it is thereby possible to precisely grasp the hand motion by the 3D camera and thereby grasp the action such as fraudulently acquiring a product, fraudulently changing a product or fraudulently acquiring money, it is possible to accurately detect a suspicious action and output alert information in accordance with the suspicious action. It is thereby possible to automate the surveillance of a suspicious action/misconduct and efficiently enhance the security, thereby improving the profit ratio.
- A second exemplary embodiment is described hereinafter with reference to the drawings. This exemplary embodiment is an example that, as a complement to the suspicious action recognition in the first exemplary embodiment, detects a suspicious action by detecting a deviant action from normal action information patterns. Specifically, the present invention is not limited to the example of the first exemplary embodiment, and a suspicious action may be determined by detecting a deviation from a store staff's normal action such as work at a cash register, rather than detecting an action of a store staff that embezzles the sales, appropriates a product (puts money in a pocket etc.) or gives a product to a customer as a conspirator without receiving a full price and the like.
-
FIG. 9 shows a configuration of a security system according to this exemplary embodiment. As shown inFIG. 9 , in this exemplary embodiment, thesecurity device 100 further includes a normalaction information DB 180 in addition to the elements of the first exemplary-embodiment shown inFIG. 2 . - The normal
action information DB 180 stores normal action patterns (normal action pattern information) indicating normal actions of a customer and a store staff. The normalaction information DB 180 stores a productnormal acquisition pattern 181, a productnormal change pattern 182, a moneynormal acquisition pattern 183 and the like, for example, as the normal action patterns. - The product
normal acquisition pattern 181 is pattern information about actions of normally acquiring a product, which includes an action of a customer that puts a product in a shopping basket or cart, for example. The productnormal change pattern 182 is pattern information about actions of normally altering a product, which includes an action of a store staff that changes the display of a product, for example. The moneynormal acquisition pattern 183 is pattern information about actions of normally acquiring money, which includes an action of a store staff that performs normal cash register work and an action of a store staff that gives money from a cash register to a customer, for example. -
FIG. 10 shows the configuration of the distanceimage analysis unit 110 in thesecurity device 100 according to this exemplary embodiment. As shown inFIG. 10 , a deviantaction detection unit 115 is further included in addition to the elements of the first exemplary embodiment shown inFIG. 4 . - The deviant
action detection unit 115 detects whether an action of a customer or a store staff is deviated from a normal action (suspicious action) or not based on the the hand action tracked by thehand tracking unit 113. The deviantaction detection unit 115 refers to the normalaction information DB 180 and compares the detected action of a customer or a store staff with the productnormal acquisition pattern 181, the productnormal change pattern 182 and the moneynormal acquisition pattern 183, and when the action of a customer or a store staff does not match any of them, determines that it is a suspicious action. For example, a suspicion level may be set in accordance with the degree of deviation from normal action patterns (the degree of mismatch). - Further, a suspicious action may be determined in consideration of both of a detection result by the hand
action recognition unit 114 using the suspicious action patterns and a detection result by the deviantaction detection unit 115 using the normal action patterns. For example, an action may be determined as a suspicious action when any one of the handaction recognition unit 114 and the deviantaction detection unit 115 determines that it is suspicious, or an action may be determined as a suspicious action when both of the handaction recognition unit 114 and the deviantaction detection unit 115 determine that it is suspicious. - As described above, by detecting a suspicious action based on whether an action of a customer or a store staff is deviated from the normal action patterns, not limited to detecting a suspicious action using the suspicious action patterns in the first exemplary embodiment, it is possible to detect a suspicious action more accurately.
- It should be noted that the present invention is not limited to the above-described exemplary embodiment and may be varied in many ways within the scope of the present invention.
- While the invention has been particularly shown and described with reference to exemplary embodiments thereof, the invention is not limited to these embodiments. It will be understood by those of ordinary skill in the art that various changes in form and details may be made therein without departing from the spirit and scope of the present invention as defined by the claims.
- This application is based upon and claims the benefit of priority from Japanese patent application No. 2013-185130, filed on Sep. 6, 2013, the disclosure of which is incorporated herein in its entirety by reference.
-
- 1, 10 SECURITY SYSTEM
- 11 IMAGE INFORMATION ACQUISITION UNIT
- 12 TRACKING UNIT
- 13 SUSPICIOUS ACTION DETECTION UNIT
- 100 SECURITY DEVICE
- 110 DISTANCE IMAGE ANALYSIS UNIT
- 111 DISTANCE IMAGE ACQUISITION UNIT
- 112 REGION DETECTION UNIT
- 113 HAND TRACKING UNIT
- 114 HAND ACTION RECOGNITION UNIT
- 115 DEVIANT ACTION DETECTION UNIT
- 120 PERSON RECOGNITION UNIT
- 130 IN-STORE SITUATION ANALYSIS UNIT
- 140 ALERT INFORMATION GENERATION UNIT
- 150 SUSPICIOUS ACTION INFORMATION DB
- 151 PRODUCT FRAUDULENT ACQUISITION PATTERN
- 152 PRODUCT FRAUDULENT CHANGE PATTERN
- 153 MONEY FRAUDULENT ACQUISITION PATTERN
- 160 VIDEO INFORMATION RECORDING UNIT
- 170 SUSPICIOUS PERSON DB
- 180 NORMAL ACTION INFORMATION DB
- 181 PRODUCT NORMAL ACQUISITION PATTERN
- 182 PRODUCT NORMAL CHANGE PATTERN
- 183 MONEY NORMAL ACQUISITION PATTERN
- 210 3D CAMERA
- 220 FACIAL RECOGNITION CAMERA
- 230 IN-STORE CAMERA
- 240 ALERT DEVICE
- 300 PRODUCT SHELF
- 301 PRODUCT
- 302 MONEY
- 310 CHECKOUT STAND
- 311 CASH REGISTER
- 400 CUSTOMER
- 410 STORE STAFF
Claims (10)
1-15. (canceled)
16. A security system, comprising:
a memory storing instructions; and
one or more processors coupled to the memory, wherein the one or more processors are configured to execute the instructions to:
acquire input image information on an image taken of a person in a store;
track an action of a hand of the person based on the input image information;
detect a suspicious action based on the tracked action of the hand, the suspicious action corresponding to any of suspicious action patterns stored in a suspicious action information database;
set a suspicion level of the person to a first level based on a detected suspicious action;
acquire an in-store image;
detect the situation in the store based on the in-store image;
determine, based on the detection result of the situation in the store, whether or not the situation in the store corresponds to at least one of being congested and sparsely populated;
set the suspicion level to a second level higher than the first level when the situation in the store corresponds to at least one of being congested and sparsely populated; and
output alert information based on the suspicion level.
17. The security system according to claim 16 , wherein
the suspicion level is determined in accordance with a length of an action time of the suspicious action.
18. The security system according to claim 16 , wherein the one or more processors are further configured to execute the instructions to:
record the suspicious action; and
output the recorded suspicious action.
19. A security method comprising:
acquiring input image information on an image taken of a person in a store;
track an action of a hand of the person based on the input image information;
detecting a suspicious action based on the tracked action of the hand, the suspicious action corresponding to any of suspicious action patterns stored in a suspicious action information database;
setting a suspicion level of the person to a first level based on a detected suspicious action;
acquiring an in-store image;
detecting the situation in the store based on the in-store image;
determining, based on the detection result of the situation in the store, whether or not the situation in the store corresponds to at least one of being congested and sparsely populated;
setting the suspicion level to a second level higher than the first level when the situation in the store corresponds to at least one of being congested and sparsely populated; and
outputting alert information based on the suspicion level.
20. The security method according to claim 19 , wherein
the suspicion level is determined in accordance with a length of an action time of the suspicious action.
21. The security method according to claim 19 , further comprising:
recording the suspicious action; and
outputting the recorded suspicious action.
22. A non-transitory computer readable medium storing a security program causing a computer to perform a security process comprising:
acquiring input image information on an image taken of a person in a store;
track an action of a hand of the person based on the input image information;
detecting a suspicious action based on the tracked action of the hand, the suspicious action corresponding to any of suspicious action patterns stored in a suspicious action information database;
setting a suspicion level of the person to a first level based on a detected suspicious action;
acquiring an in-store image;
detecting the situation in the store based on the in-store image;
determining, based on the detection result of the situation in the store, whether or not the situation in the store corresponds to at least one of being congested and sparsely populated;
setting the suspicion level to a second level higher than the first level when the situation in the store corresponds to at least one of being congested and sparsely populated; and
outputting alert information based on the suspicion level.
23. The non-transitory computer readable medium according to claim 22 , wherein
the suspicion level is determined in accordance with a length of an action time of the suspicious action.
24. The non-transitory computer readable medium according to claim 22 , the security process further comprising:
recording the suspicious action; and
outputting the recorded suspicious action.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/126,729 US20190005785A1 (en) | 2013-09-06 | 2018-09-10 | Security system, security method, and non-transitory computer readable medium |
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2013185130 | 2013-09-06 | ||
JP2013-185130 | 2013-09-06 | ||
PCT/JP2014/004583 WO2015033576A1 (en) | 2013-09-06 | 2014-09-05 | Security system, security method, and non-temporary computer-readable medium |
US201614916702A | 2016-03-04 | 2016-03-04 | |
US16/126,729 US20190005785A1 (en) | 2013-09-06 | 2018-09-10 | Security system, security method, and non-transitory computer readable medium |
Related Parent Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2014/004583 Continuation WO2015033576A1 (en) | 2013-09-06 | 2014-09-05 | Security system, security method, and non-temporary computer-readable medium |
US14/916,702 Continuation US20160210829A1 (en) | 2013-09-06 | 2014-09-05 | Security system, security method, and non-transitory computer readable medium |
Publications (1)
Publication Number | Publication Date |
---|---|
US20190005785A1 true US20190005785A1 (en) | 2019-01-03 |
Family
ID=52628072
Family Applications (7)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/916,702 Abandoned US20160210829A1 (en) | 2013-09-06 | 2014-09-05 | Security system, security method, and non-transitory computer readable medium |
US16/126,818 Active US11354991B2 (en) | 2013-09-06 | 2018-09-10 | Security system, security method, and non-transitory computer readable medium |
US16/126,729 Abandoned US20190005785A1 (en) | 2013-09-06 | 2018-09-10 | Security system, security method, and non-transitory computer readable medium |
US16/126,777 Active US10573141B2 (en) | 2013-09-06 | 2018-09-10 | Security system, security method, and non-transitory computer readable medium |
US17/743,647 Active US11688256B2 (en) | 2013-09-06 | 2022-05-13 | Security system, security method, and non-transitory computer readable medium |
US18/197,397 Active US12039844B2 (en) | 2013-09-06 | 2023-05-15 | Security system, security method, and non-transitory computer readable medium |
US18/675,341 Pending US20240321071A1 (en) | 2013-09-06 | 2024-05-28 | Security system, security method, and non-transitory computer readable medium |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/916,702 Abandoned US20160210829A1 (en) | 2013-09-06 | 2014-09-05 | Security system, security method, and non-transitory computer readable medium |
US16/126,818 Active US11354991B2 (en) | 2013-09-06 | 2018-09-10 | Security system, security method, and non-transitory computer readable medium |
Family Applications After (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/126,777 Active US10573141B2 (en) | 2013-09-06 | 2018-09-10 | Security system, security method, and non-transitory computer readable medium |
US17/743,647 Active US11688256B2 (en) | 2013-09-06 | 2022-05-13 | Security system, security method, and non-transitory computer readable medium |
US18/197,397 Active US12039844B2 (en) | 2013-09-06 | 2023-05-15 | Security system, security method, and non-transitory computer readable medium |
US18/675,341 Pending US20240321071A1 (en) | 2013-09-06 | 2024-05-28 | Security system, security method, and non-transitory computer readable medium |
Country Status (4)
Country | Link |
---|---|
US (7) | US20160210829A1 (en) |
JP (1) | JP6249021B2 (en) |
CN (2) | CN105518755A (en) |
WO (1) | WO2015033576A1 (en) |
Families Citing this family (53)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014031751A2 (en) | 2012-08-21 | 2014-02-27 | Nexen Group, Inc. | Strain wave gear system |
US9542626B2 (en) * | 2013-09-06 | 2017-01-10 | Toyota Jidosha Kabushiki Kaisha | Augmenting layer-based object detection with deep convolutional neural networks |
CN105518755A (en) * | 2013-09-06 | 2016-04-20 | 日本电气株式会社 | Security system, security method, and non-temporary computer-readable medium |
US20150206188A1 (en) * | 2014-01-17 | 2015-07-23 | Panasonic Intellectual Property Corporation Of America | Item presentation method, and information display method |
WO2015173869A1 (en) * | 2014-05-12 | 2015-11-19 | 富士通株式会社 | Product-information output method, product-information output program, and control device |
WO2016117600A1 (en) * | 2015-01-22 | 2016-07-28 | 日本電気株式会社 | Product shelf allocation management device and product shelf allocation management method |
JP6563234B2 (en) * | 2015-03-31 | 2019-08-21 | 綜合警備保障株式会社 | Security system and security method |
JP6558178B2 (en) * | 2015-09-24 | 2019-08-14 | 日本電気株式会社 | Nuisance agent estimation system, control method and control program for nuisance agent estimation system |
JP2017097599A (en) * | 2015-11-24 | 2017-06-01 | 宮田 清蔵 | Method and device for determining exceptional behavior customer |
US10360572B2 (en) * | 2016-03-07 | 2019-07-23 | Ricoh Company, Ltd. | Image processing system, method and computer program product for evaluating level of interest based on direction of human action |
JP6662141B2 (en) * | 2016-03-25 | 2020-03-11 | 富士ゼロックス株式会社 | Information processing device and program |
JP6440327B2 (en) * | 2016-07-25 | 2018-12-19 | ユニボット株式会社 | Crime prevention system, crime prevention method, and robot |
JP7057959B2 (en) * | 2016-08-09 | 2022-04-21 | 住友ゴム工業株式会社 | Motion analysis device |
EP3291191B1 (en) * | 2016-08-29 | 2019-10-09 | Panasonic Intellectual Property Management Co., Ltd. | Suspicious person report system and suspicious person report method |
GB2557920B (en) * | 2016-12-16 | 2020-03-04 | Canon Kk | Learning analytics |
SG10201610686SA (en) * | 2016-12-20 | 2018-07-30 | Mastercard International Inc | Systems and methods for processing a payment transaction authorization request |
JP6981463B2 (en) * | 2017-03-06 | 2021-12-15 | 日本電気株式会社 | Product monitoring device, product monitoring system, output destination device, product monitoring method, display method and program |
JP6402219B1 (en) * | 2017-04-19 | 2018-10-10 | ユニティガードシステム株式会社 | Crime prevention system, crime prevention method, and robot |
WO2018204837A1 (en) * | 2017-05-05 | 2018-11-08 | Walmart Apollo, Llc | System and method for automatically restocking items on shelves using a conveyor system |
CN107886667A (en) * | 2017-10-11 | 2018-04-06 | 深圳云天励飞技术有限公司 | Alarm method and device |
JP2019133437A (en) * | 2018-01-31 | 2019-08-08 | キヤノン株式会社 | Information processing device, system, information processing device control method, and program |
RU2679218C1 (en) * | 2018-02-06 | 2019-02-06 | Акционерное общество Научно-производственный центр "Электронные вычислительно-информационные системы" (АО НПЦ "ЭЛВИС") | System and method for people movement control |
JP7327458B2 (en) | 2018-03-09 | 2023-08-16 | 日本電気株式会社 | Self-checkout system, purchased product management method, and purchased product management program |
JP6992874B2 (en) * | 2018-03-09 | 2022-01-13 | 日本電気株式会社 | Self-registration system, purchased product management method and purchased product management program |
JP7134708B2 (en) * | 2018-05-23 | 2022-09-12 | 株式会社日立製作所 | Monitoring device, monitoring system and monitoring method |
CN108805495A (en) * | 2018-05-31 | 2018-11-13 | 京东方科技集团股份有限公司 | Article storage management method and system and computer-readable medium |
CN108921098B (en) * | 2018-07-03 | 2020-08-18 | 百度在线网络技术(北京)有限公司 | Human motion analysis method, device, equipment and storage medium |
US11521460B2 (en) | 2018-07-25 | 2022-12-06 | Konami Gaming, Inc. | Casino management system with a patron facial recognition system and methods of operating same |
AU2019208182B2 (en) | 2018-07-25 | 2021-04-08 | Konami Gaming, Inc. | Casino management system with a patron facial recognition system and methods of operating same |
CN109271847B (en) * | 2018-08-01 | 2023-04-07 | 创新先进技术有限公司 | Abnormity detection method, device and equipment in unmanned settlement scene |
CN109308780A (en) * | 2018-10-19 | 2019-02-05 | 杭州虹晟信息科技有限公司 | Smart home security monitoring system based on Internet of Things |
JP7161920B2 (en) * | 2018-11-09 | 2022-10-27 | セコム株式会社 | store equipment |
JP7138547B2 (en) * | 2018-11-09 | 2022-09-16 | セコム株式会社 | store equipment |
JP6534499B1 (en) * | 2019-03-20 | 2019-06-26 | アースアイズ株式会社 | MONITORING DEVICE, MONITORING SYSTEM, AND MONITORING METHOD |
JP6562437B1 (en) * | 2019-04-26 | 2019-08-21 | アースアイズ株式会社 | Monitoring device and monitoring method |
JP7337354B2 (en) * | 2019-05-08 | 2023-09-04 | 株式会社オレンジテクラボ | Information processing device and information processing program |
JP7408300B2 (en) * | 2019-06-04 | 2024-01-05 | 東芝テック株式会社 | Store management device, electronic receipt system and control program |
WO2021033597A1 (en) * | 2019-08-20 | 2021-02-25 | コニカミノルタ株式会社 | Image processing system, image processing program, and image processing method |
JP2021081804A (en) * | 2019-11-14 | 2021-05-27 | 株式会社リコー | State recognition device, state recognition method, and state recognition program |
EP3839855B1 (en) * | 2019-12-17 | 2024-04-03 | Diebold Nixdorf Systems GmbH | Self-service registration terminal and method |
JP2020074567A (en) * | 2020-01-15 | 2020-05-14 | 日本電気株式会社 | Image processing system, image processing method, and program |
JP6854959B1 (en) * | 2020-10-30 | 2021-04-07 | 株式会社Vaak | Behavior estimation device, behavior estimation method, program and behavior estimation system |
JP7514770B2 (en) * | 2021-01-14 | 2024-07-11 | 東芝テック株式会社 | FRAUDULENT ACTIVITY RECOGNITION DEVICE, ITS CONTROL PROGRAM, AND FRAUDULENT ACTIVITY RECOGNITION METHOD |
JP7054075B2 (en) * | 2021-01-26 | 2022-04-13 | 日本電気株式会社 | Information processing system, information processing method, and program |
JP7491472B2 (en) | 2021-06-29 | 2024-05-28 | 日本電信電話株式会社 | Abnormality determination device, abnormality determination method, and abnormality determination program |
JP7318753B2 (en) * | 2021-06-30 | 2023-08-01 | 富士通株式会社 | Information processing program, information processing method, and information processing apparatus |
JP7318679B2 (en) * | 2021-07-30 | 2023-08-01 | 富士通株式会社 | Information processing program, information processing method, and information processing apparatus |
JP7318680B2 (en) * | 2021-07-30 | 2023-08-01 | 富士通株式会社 | Information processing program, information processing method, and information processing apparatus |
EP4386661A4 (en) * | 2021-08-12 | 2024-10-09 | Sony Semiconductor Solutions Corp | Behavior analysis device, behavior analysis method, behavior analysis program, imaging device and behavior analysis system |
WO2023152825A1 (en) * | 2022-02-09 | 2023-08-17 | 日本電気株式会社 | Movement evaluation system, movement evaluation method, and non-transitory computer-readable medium |
JP7085257B1 (en) | 2022-03-17 | 2022-06-16 | 株式会社Iso | Video analysis service provision system, video analysis service provision program, and video analysis service provision method |
CN114708696B (en) * | 2022-04-02 | 2023-06-16 | 河南大学 | Elevator car theft behavior monitoring method and system based on upper limb micro-motion recognition |
JP2024089579A (en) * | 2022-12-21 | 2024-07-03 | 富士通株式会社 | Alert output program, alert output method, and information processing device |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050108063A1 (en) * | 2003-11-05 | 2005-05-19 | Madill Robert P.Jr. | Systems and methods for assessing the potential for fraud in business transactions |
US7036094B1 (en) * | 1998-08-10 | 2006-04-25 | Cybernet Systems Corporation | Behavior recognition system |
US20060243798A1 (en) * | 2004-06-21 | 2006-11-02 | Malay Kundu | Method and apparatus for detecting suspicious activity using video analysis |
US20070182818A1 (en) * | 2005-09-02 | 2007-08-09 | Buehler Christopher J | Object tracking and alerts |
US20080018738A1 (en) * | 2005-05-31 | 2008-01-24 | Objectvideo, Inc. | Video analytics for retail business process monitoring |
US20130277423A1 (en) * | 2011-03-07 | 2013-10-24 | Fujitsu Frontech Limited | Item payment check apparatus |
US20140347479A1 (en) * | 2011-11-13 | 2014-11-27 | Dor Givon | Methods, Systems, Apparatuses, Circuits and Associated Computer Executable Code for Video Based Subject Characterization, Categorization, Identification, Tracking, Monitoring and/or Presence Response |
US20150146921A1 (en) * | 2012-01-17 | 2015-05-28 | Sony Corporation | Information processing apparatus, information processing method, and program |
US20160328604A1 (en) * | 2014-01-07 | 2016-11-10 | Arb Labs Inc. | Systems and methods of monitoring activities at a gaming venue |
US9589433B1 (en) * | 2013-07-31 | 2017-03-07 | Jeff Thramann | Self-checkout anti-theft device |
Family Cites Families (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS61260391A (en) | 1985-05-14 | 1986-11-18 | 三菱電機株式会社 | Monitor/controller |
JPS62115388A (en) * | 1985-11-14 | 1987-05-27 | Matsushita Electric Works Ltd | Distance measuring type abnormality supervisory sensor |
US6421462B1 (en) * | 1998-02-06 | 2002-07-16 | Compaq Computer Corporation | Technique for differencing an image |
WO2002087636A1 (en) | 2001-03-12 | 2002-11-07 | Sub-Q, Inc. | Methods for sterilizing cross-linked gelatin compositions |
US7200266B2 (en) * | 2002-08-27 | 2007-04-03 | Princeton University | Method and apparatus for automated video activity analysis |
EP1872307A4 (en) * | 2005-03-29 | 2012-10-03 | Stoplift Inc | Method and apparatus for detecting suspicious activity using video analysis |
JP2008257487A (en) * | 2007-04-05 | 2008-10-23 | Multi Solution:Kk | Face-authentication-based shoplifting detection system |
US7844105B2 (en) * | 2007-04-23 | 2010-11-30 | Mitsubishi Electric Research Laboratories, Inc. | Method and system for determining objects poses from range images |
JP2009009231A (en) | 2007-06-26 | 2009-01-15 | Toshiba Corp | Security management system and security management method |
JP4972491B2 (en) | 2007-08-20 | 2012-07-11 | 株式会社構造計画研究所 | Customer movement judgment system |
US20090055205A1 (en) * | 2007-08-23 | 2009-02-26 | Igt | Multimedia player tracking infrastructure |
US8472715B2 (en) * | 2007-10-26 | 2013-06-25 | Panasonic Corporation | Situation determining apparatus, situation determining method, situation determining program, abnormality determining apparatus, abnormality determining method, abnormality determining program, and congestion estimating apparatus |
JP2010094332A (en) | 2008-10-17 | 2010-04-30 | Okamura Corp | Merchandise display apparatus |
CN101794481A (en) * | 2009-02-04 | 2010-08-04 | 深圳市先进智能技术研究所 | ATM (Automatic teller machine) self-service bank monitoring system and method |
JP5143780B2 (en) * | 2009-03-31 | 2013-02-13 | 綜合警備保障株式会社 | Monitoring device and monitoring method |
US20110063108A1 (en) * | 2009-09-16 | 2011-03-17 | Seiko Epson Corporation | Store Surveillance System, Alarm Device, Control Method for a Store Surveillance System, and a Program |
JP5540622B2 (en) | 2009-09-16 | 2014-07-02 | セイコーエプソン株式会社 | Receipt printer, receipt printer control method and program |
JP2011108769A (en) | 2009-11-16 | 2011-06-02 | Yokogawa Electric Corp | Semiconductor device |
JP2011108169A (en) * | 2009-11-20 | 2011-06-02 | Ishida Co Ltd | Store management system |
JP5580683B2 (en) * | 2010-07-29 | 2014-08-27 | セコム株式会社 | Reporting device |
US9740937B2 (en) * | 2012-01-17 | 2017-08-22 | Avigilon Fortress Corporation | System and method for monitoring a retail environment using video content analysis with depth sensing |
CN102881100B (en) * | 2012-08-24 | 2017-07-07 | 济南纳维信息技术有限公司 | Entity StoreFront anti-thefting monitoring method based on video analysis |
US9165190B2 (en) * | 2012-09-12 | 2015-10-20 | Avigilon Fortress Corporation | 3D human pose and shape modeling |
CN202995945U (en) * | 2012-12-08 | 2013-06-12 | 南通纺织职业技术学院 | An intelligent anti-theft system |
US9443148B2 (en) * | 2013-03-15 | 2016-09-13 | International Business Machines Corporation | Visual monitoring of queues using auxiliary devices |
CN105518755A (en) * | 2013-09-06 | 2016-04-20 | 日本电气株式会社 | Security system, security method, and non-temporary computer-readable medium |
-
2014
- 2014-09-05 CN CN201480048366.4A patent/CN105518755A/en active Pending
- 2014-09-05 JP JP2015535321A patent/JP6249021B2/en active Active
- 2014-09-05 US US14/916,702 patent/US20160210829A1/en not_active Abandoned
- 2014-09-05 CN CN202010433744.8A patent/CN111723668A/en active Pending
- 2014-09-05 WO PCT/JP2014/004583 patent/WO2015033576A1/en active Application Filing
-
2018
- 2018-09-10 US US16/126,818 patent/US11354991B2/en active Active
- 2018-09-10 US US16/126,729 patent/US20190005785A1/en not_active Abandoned
- 2018-09-10 US US16/126,777 patent/US10573141B2/en active Active
-
2022
- 2022-05-13 US US17/743,647 patent/US11688256B2/en active Active
-
2023
- 2023-05-15 US US18/197,397 patent/US12039844B2/en active Active
-
2024
- 2024-05-28 US US18/675,341 patent/US20240321071A1/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7036094B1 (en) * | 1998-08-10 | 2006-04-25 | Cybernet Systems Corporation | Behavior recognition system |
US20050108063A1 (en) * | 2003-11-05 | 2005-05-19 | Madill Robert P.Jr. | Systems and methods for assessing the potential for fraud in business transactions |
US20060243798A1 (en) * | 2004-06-21 | 2006-11-02 | Malay Kundu | Method and apparatus for detecting suspicious activity using video analysis |
US20080018738A1 (en) * | 2005-05-31 | 2008-01-24 | Objectvideo, Inc. | Video analytics for retail business process monitoring |
US20070182818A1 (en) * | 2005-09-02 | 2007-08-09 | Buehler Christopher J | Object tracking and alerts |
US20130277423A1 (en) * | 2011-03-07 | 2013-10-24 | Fujitsu Frontech Limited | Item payment check apparatus |
US20140347479A1 (en) * | 2011-11-13 | 2014-11-27 | Dor Givon | Methods, Systems, Apparatuses, Circuits and Associated Computer Executable Code for Video Based Subject Characterization, Categorization, Identification, Tracking, Monitoring and/or Presence Response |
US20150146921A1 (en) * | 2012-01-17 | 2015-05-28 | Sony Corporation | Information processing apparatus, information processing method, and program |
US9589433B1 (en) * | 2013-07-31 | 2017-03-07 | Jeff Thramann | Self-checkout anti-theft device |
US20160328604A1 (en) * | 2014-01-07 | 2016-11-10 | Arb Labs Inc. | Systems and methods of monitoring activities at a gaming venue |
Also Published As
Publication number | Publication date |
---|---|
US20190005787A1 (en) | 2019-01-03 |
JP6249021B2 (en) | 2017-12-20 |
CN105518755A (en) | 2016-04-20 |
US20160210829A1 (en) | 2016-07-21 |
WO2015033576A1 (en) | 2015-03-12 |
JPWO2015033576A1 (en) | 2017-03-02 |
US11688256B2 (en) | 2023-06-27 |
US10573141B2 (en) | 2020-02-25 |
US20220270455A1 (en) | 2022-08-25 |
US20190005786A1 (en) | 2019-01-03 |
CN111723668A (en) | 2020-09-29 |
US20230282084A1 (en) | 2023-09-07 |
US12039844B2 (en) | 2024-07-16 |
US20240321071A1 (en) | 2024-09-26 |
US11354991B2 (en) | 2022-06-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12039844B2 (en) | Security system, security method, and non-transitory computer readable medium | |
US12056932B2 (en) | Multifactor checkout application | |
US10817710B2 (en) | Predictive theft notification | |
US10242267B2 (en) | Systems and methods for false alarm reduction during event detection | |
US20170068945A1 (en) | Pos terminal apparatus, pos system, commodity recognition method, and non-transitory computer readable medium storing program | |
WO2015033577A1 (en) | Customer behavior analysis system, customer behavior analysis method, non-temporary computer-readable medium, and shelf system | |
JP5673888B1 (en) | Information notification program and information processing apparatus | |
US20230136054A1 (en) | Information processing method, information processing device, and recording medium | |
Sujith | Crime detection and avoidance in ATM: a new framework | |
US20230368625A1 (en) | Self-checkout verification systems and methods | |
WO2019077559A1 (en) | System for tracking products and users in a store | |
TWI671701B (en) | System and method for detecting trading behavior | |
US20220067345A1 (en) | Method and system for identifying, tracking, and collecting data on a person of interest | |
JP2023031766A (en) | Self-service checkout machine monitoring system and self-service checkout machine monitoring method | |
JP7010030B2 (en) | In-store monitoring equipment, in-store monitoring methods, and in-store monitoring programs | |
US12039843B2 (en) | Card skimming detection | |
JP2024008708A (en) | Determination program, determination method, and determination device | |
WO2023026277A1 (en) | Context-based moniitoring of hand actions |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |