US20190005785A1 - Security system, security method, and non-transitory computer readable medium - Google Patents

Security system, security method, and non-transitory computer readable medium Download PDF

Info

Publication number
US20190005785A1
US20190005785A1 US16/126,729 US201816126729A US2019005785A1 US 20190005785 A1 US20190005785 A1 US 20190005785A1 US 201816126729 A US201816126729 A US 201816126729A US 2019005785 A1 US2019005785 A1 US 2019005785A1
Authority
US
United States
Prior art keywords
action
store
suspicious
suspicious action
person
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US16/126,729
Inventor
Kaoru Uchida
Nobuyuki Yamashita
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEC Corp
Original Assignee
NEC Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NEC Corp filed Critical NEC Corp
Priority to US16/126,729 priority Critical patent/US20190005785A1/en
Publication of US20190005785A1 publication Critical patent/US20190005785A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19608Tracking movement of a target, e.g. by detecting an object predefined as a target, using target direction and or velocity to predict its new position
    • G06K9/00771
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/20Analysis of motion
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/50Context or environment of the image
    • G06V20/52Surveillance or monitoring of activities, e.g. for recognising suspicious objects
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19613Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19639Details of the system layout
    • G08B13/19645Multiple cameras, each having view on one of a plurality of scenes, e.g. multiple cameras for multi-room surveillance or for tracking an object by view hand-over
    • G06K9/00355
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/20Movements or behaviour, e.g. gesture recognition
    • G06V40/28Recognition of hand or arm movements, e.g. recognition of deaf sign language

Definitions

  • the present invention relates to a security system, a security method, and a non-transitory computer readable medium storing a security program and, particularly, to a security system, a security method, and a non-transitory computer readable medium storing a security program using person images.
  • Damage caused by shoplifting by customers, misappropriation by part-time employees and the like are a continuous and growing concern for stores.
  • a store staff or a store manager keeps an eye on these customers and part-time employees, or records images monitored by a general 2D camera and visually checks them afterwards.
  • Patent Literatures 1 to 5 Since it is inefficient to visually check for the occurrence of misconduct, the systems disclosed in Patent Literatures 1 to 5 as related art, for example, are under development.
  • Patent Literature 1 when the number of times a store staff's face swings is a specified value of more and the cancelled amount of money in a cash register is a reference value or more, it is detected that a suspicious conduct (suspicious action) has occurred.
  • the technique of the related art performs detection based on a swing of a face or the like, it fails to detect a suspicious action of a shop staff and the like in some cases. For example, although a suspicious action is often carried out by a hand, the technique of the related art cannot detect the behavior on the basis of a hand action.
  • the technique disclosed in the related art has a problem that it is difficult to accurately detect a suspicious action of a store staff, a customer and the like.
  • an exemplary object of the present invention is to provide a security system, a security method, and a non-transitory computer readable medium storing a security program capable of accurately detecting a suspicious action.
  • a security system includes an image information acquisition unit that acquires input image information on an image taken of a person in a store, a tracking unit that tracks an action of a hand of the person based on the input image information, and a suspicious action detection unit that detects a suspicious action of the person based on the tracked action of the hand.
  • a security method includes acquiring input image information on an image taken of a person in a store, tracking an action of a hand of the person based on the input image information, and detecting a suspicious action of the person based on the tracked action of the hand.
  • a non-transitory computer readable medium storing a security program causes a computer to perform a security process including acquiring input image information on an image taken of a person in a store, tracking an action of a hand of the person based on the input image information, and detecting a suspicious action of the person based on the tracked action of the hand.
  • a security system a security method, and a non-transitory computer readable medium storing a security program capable of accurately detecting a suspicious action.
  • FIG. 1 is a block diagram showing main elements of a security system according to an exemplary embodiment.
  • FIG. 2 is a block diagram showing the configuration of a security system according to a first exemplary embodiment
  • FIG. 3A is a diagram showing a configuration example of a 3D camera according to the first exemplary embodiment
  • FIG. 3B is a diagram showing a configuration example of a 3D camera according to the first exemplary embodiment
  • FIG. 4 is a block diagram showing a configuration of a distance image analysis unit according to the first exemplary embodiment
  • FIG. 5 is a flowchart showing the operation of the security system according to the first exemplary embodiment
  • FIG. 6 is a flowchart showing the operation of a distance image analysis process according to the first exemplary embodiment
  • FIG. 7 is a flowchart showing the operation of an alert information generation process according to the first exemplary embodiment
  • FIG. 8 is an explanatory diagram illustrating the operation of the alert information generation process according to the first exemplary embodiment
  • FIG. 9 is a block diagram showing the configuration of a security system according o a second exemplary embodiment.
  • FIG. 10 is a block diagram showing a configuration of a distance image analysis unit according to the second exemplary embodiment.
  • FIG. 1 shows main elements of a security system according to an exemplary embodiment.
  • a security system 10 includes an image information acquisition unit 11 , a tracking unit 12 , and a suspicious action detection unit 13 .
  • the image information acquisition unit 11 acquires input image information, which is an image taken of a person in a store.
  • the tracking unit 12 tracks a hand action of a person based on the acquired input image information.
  • the suspicious action detection unit 13 detects a suspicious action of a person based on the tracked hand action.
  • a hand action of a person in a store is tracked, and a suspicious action is detected based on the tracking result. For example, by tracking a hand action of a customer or a store staff in front of a product shelf in a store, it is possible to accurately detect a suspicious action that can lead to shoplifting or misappropriation.
  • FIG. 2 is a block diagram showing the configuration of a security system according to this exemplary embodiment.
  • This security system is a system that detects a suspicious action of a customer or a store staff in a store or the like and outputs (displays) an alert (alarm) and the like. Note that customer includes all persons who come to (enter) a store, and the store staff includes all persons who work in a store.
  • a security system 1 includes a security device 100 , a 3D camera 210 , a facial recognition camera 220 , an in-store camera 230 , and an alert device 240 .
  • the security device 100 or the alert device 240 may be placed outside the store.
  • the respective components of the security system 1 are separate devices, the respective components may be one or any number of devices.
  • the 3D (three-dimensional) camera 210 is an imaging device (distance image sensor) that takes an image of and measures a target and generates a distance image (distance image information).
  • the distance image (range image) contains image information which is an image of a target taken and distance. information which is a distance to a target measured.
  • the 3D camera 210 is Microsoft Kinect (registered trademark) or a stereo camera.
  • the 3D camera 210 takes an image of a customer or a store staff at a specified position in a store in this exemplary embodiment.
  • the 3D camera 210 takes an image of a product shelf (product display shelf) 300 on which a product 301 is placed (displayed), and particularly takes an image of a customer 400 who is about to touch the product 301 in front of the product shelf 300 .
  • the 3D camera 210 takes an image of a product placement area of the product shelf 300 and an area where a customer picks up/looks at a product in front of the product shelf 300 , which is a presentation area where a product is presented to a customer in the product shelf 300 .
  • the 3D camera 210 is placed at a position where images of the product shelf 300 and the customer 400 in front of (in the vicinity of) the product shelf 300 can be taken, which is, for example, above (the ceiling etc.) or in front of (a wall etc.) of the product shelf 300 , or in the product shelf 300 .
  • the 3D camera 210 takes an image of a checkout stand 310 where a cash register 311 is placed, and particularly takes an image of a store staff 410 who is standing in front of the checkout stand 310 and about to sell the product 301 to the customer 400 or the store staff 410 who is about to touch money 302 .
  • the 3D camera 210 is placed at a position where images of the checkout stand 310 and the store staff 410 in front of (in the vicinity of) the checkout stand 310 can be taken, which is, for example, above (the ceiling etc.) or in front of (a wall etc.) of the checkout stand 310 , or on the checkout stand 310 (cash register 311 ).
  • the 3D camera 210 is used as a device that takes images of the product shelf 300 and the checkout stand 310 , it is not limited to the 3D camera but may be a general camera. (2D camera) that outputs only images taken. In this case, tracking is performed using the image information only.
  • Each of the facial recognition camera 220 and the in-store camera 230 is an imaging device (2D camera) that takes and generates an image of a target.
  • the facial recognition camera 220 is placed at the entrance of a store or the like, takes an image of a face of a customer who comes to the store and generates a facial image to recognize the customer's face.
  • the in-store camera 230 is placed at a plurality of positions in a store, takes an image of each section in the store and generates an in-store image to detect the congestion of customers in the store.
  • each of the facial recognition camera 220 and the in-store camera 230 may be a 3D camera. By using a 3D camera, it is possible to accurately recognize the customer's face or the congestion in a store.
  • the alert device 240 is a device that notifies (outputs) alert information to a surveillant such as a store manager, a business manager or a security guard and performs recording.
  • the way to transmit (output) alert information to a surveillant is not limited, and it may be a display of letters and images on a display device, audio output through a speaker or the like.
  • the alert device 240 is placed at a position where a surveillant can view (hear) the alert information.
  • the alert device 240 may be an employee terminal in a shelf, a cash register, a guard's room or a store, or it may be a surveillance device connected to the outside of a store via a network.
  • the alert device 240 is a computer including a display device and a storage device, such as a personal computer or a server computer.
  • the security device 100 includes a distance image analysis unit 110 , a person recognition unit 120 , an in-store situation analysis unit 130 , an alert information generation unit 140 , a suspicious action information DB (database) 150 , a 3D video information recording unit 160 , and a suspicious person information DB 170 .
  • a distance image analysis unit 110 the security device 100 includes a distance image analysis unit 110 , a person recognition unit 120 , an in-store situation analysis unit 130 , an alert information generation unit 140 , a suspicious action information DB (database) 150 , a 3D video information recording unit 160 , and a suspicious person information DB 170 .
  • Each element in the security device 100 may be formed by hardware or software or both of them, and may be formed by one hardware or software or a plurality of hardware or software.
  • the product information DB 150 and the customer information DB 160 may be storage devices connected to an external network (cloud).
  • Each function (each processing) of the security device 100 may be implemented by a computer including CPU, memory and the like.
  • a security program for performing a security method (security process) according to the exemplary embodiments may be stored in a storage device, and each function may be implemented by executing the security program stored in the storage device on the CPU.
  • the non-transitory computer readable medium includes any type of tangible storage medium.
  • Examples of the non-transitory computer readable medium include magnetic storage media (such as floppy disks, magnetic tapes, hard disk drives, etc.), optical magnetic storage media (e.g. magneto-optical disks), CD-ROM (Read Only Memory), CD-R , CD-R/W, and semiconductor memories (such as mask ROM, PROM (Programmable ROM), EPROM (Erasable PROM), flash ROM, RAM (Random Access Memory), etc.).
  • the program may be provided to a computer using any type of transitory computer readable medium. Examples of the transitory computer readable medium include electric signals, optical signals, and electromagnetic waves.
  • the transitory computer readable medium can provide the program to a computer via a wired communication line such as an electric wire or optical fiber or a wireless communication line.
  • the distance image analysis unit 110 acquires a distance image generated by the 3D camera 210 , tracks a detection target based on the acquired distance image, and recognizes its action.
  • the distance image analysis unit 110 mainly tracks and recognizes a hand action of a customer or a store staff.
  • the distance image analysis unit 110 refers to the suspicious action information DB 150 to recognize a suspicious action of a customer or a store staff contained in the distance image. Further, the distance image analysis unit 110 performs detection necessary for recognition of a suspicious action, determination of a suspicion level and the like.
  • the distance image analysis unit 110 detects a time period during which a suspicious action is carried out, the quantity of target products, the amount of money, the scale of a target act (the size of damage etc.) and the like as well. Further, the distance image analysis unit 110 records the distance image acquired from the 3D camera 210 as a 3D video in the 3D video information recording unit 160 .
  • the person recognition unit 120 acquires a facial image of a customer generated by the facial recognition camera 220 and recognizes a person contained in the acquired facial image.
  • the person recognition unit 120 refers to the suspicious person information DB 170 and makes comparison of it with the facial image, and thereby determines whether the customer is a suspicious person or not.
  • the in-store situation analysis unit 130 acquires an in-store image generated by the in-store camera 230 , analyzes the number of customers in the store based on the acquired in-store image and detects the congestion in the store.
  • the alert information generation unit 140 generates alert information to he transmitted to a surveillant based on detection results of the distance image analysis unit 110 , the person recognition unit 120 and the in-store situation analysis unit 130 , and outputs the generated alert information to the alert device 240 .
  • the alert information generation unit 140 generates and outputs the alert information based on the hand action of a customer or a store staff detected by the distance image analysis unit 110 , the alert information based on the suspicious person recognized by the person recognition unit 120 , and the alert information based on the congestion in the store analyzed by the in-store situation analysis unit 130 . Further, the alert information generation unit 140 may record the generated alert information in a 3D video of the 3D video information recording unit 160 .
  • the suspicious action information DB 150 stores suspicious action patterns (suspicious action pattern information) for detecting a suspicious action of a customer or a store staff.
  • a suspicious action is an action (preliminary act) that raises suspicion of misconduct by a person such as a customer or a store staff.
  • the suspicious action information DB 150 stores a product fraudulent acquisition pattern 151 , a product fraudulent change pattern 152 , a money fraudulent acquisition pattern 153 and the like, for example, as the suspicious action patterns.
  • the product fraudulent acquisition pattern 151 is pattern information about actions of fraudulently acquiring a product, which include, for example, an action of a customer that puts a product in an improper place other than a shopping basket or cart.
  • the product fraudulent change pattern 152 is pattern information about actions of fraudulently changing a product, which include, for example, an action of a customer that breaks or damages a product.
  • the money fraudulent acquisition pattern 153 is pattern information about actions of fraudulently acquiring money, which include, for example, an action of a store staff that puts money from a cash register in an improper place such as a pocket of the store staff.
  • the suspicious person information DB 170 stores suspicious person identification information for detecting that a customer who comes to a store is a suspicious person.
  • the suspicious person includes a person with a previous record, a habitual offender and a person on a blacklist, and the suspicious person identification information contains the name, gender, age, facial image information (image) and the like.
  • the suspicious person information DB 170 acquires and stores suspicious person information such as persons with previous records from a cloud (cloud network) 250 or the like, and further stores suspicious person information such as habitual offenders (persons on the blacklist) based on the history in the store.
  • FIG. 4 shows the configuration of the distance image analysis unit 110 in the security device 100 .
  • the distance image analysis unit 110 includes a distance image acquisition unit 111 , a region detection unit 112 , a hand tracking unit 113 , and a hand action recognition unit 114 .
  • the elements for recognizing a person's hand action are mainly described below, a person's face, line of sight, product, money and the like can be detected by elements similar to those for recognizing a person's hand action.
  • the distance image acquisition unit ill acquires a distance image containing a customer or a store staff which is taken and generated by the 3D camera 210 .
  • the region detection unit 112 detects a region of each part of a customer or a store staff contained in the distance image acquired by the distance image acquisition unit 111 .
  • the hand tracking unit 113 tracks the action of a hand of a customer or a store staff detected by the region detection unit 112 .
  • the hand action recognition unit 114 recognizes a suspicious action of the customer or the store staff based on the hand action tracked by the hand tracking unit 113 . For example, based on the suspicious action information DB 150 , the hand action recognition unit 114 determines whether the suspicious action corresponds to a product fraudulent acquisition pattern such as putting a product in a pocket, a product fraudulent change pattern such as breaking a product, or a money fraudulent acquisition pattern such as putting money in a pocket of clothes.
  • a security method (security process) that is performed in the security system (security device) according to this exemplary embodiment is described hereinafter with reference to FIG. 5 .
  • a customer enters a store and comes close to a shelf in the store (S 101 ). Then, the facial recognition camera 220 in the store generates a facial image of the customer, and the security device 100 checks the facial image against suspicious person information such as a list of persons with previous records/on the blacklist (S 102 ). Specifically, the person recognition unit 120 of the security device 100 compares the facial image taken by the facial recognition camera 220 with facial image information of suspicious persons (a list of persons with previous records/on the blacklist) stored in the suspicious person information DB 170 and searches for a person regarding which the facial image and facial image information match and thereby determines whether the customer is a suspicious person or not.
  • suspicious person information such as a list of persons with previous records/on the blacklist
  • the customer performs a suspicious action such as putting a product in a place other than a shopping basket or cart (S 103 ).
  • the 3D camera 210 in the vicinity of the shelf takes an image of the customer's hand
  • the security device 100 recognizes the action of the customer's hand by using the distance image of the 3D camera 210 (S 104 ).
  • the distance image analysis unit 110 in the security device 100 tracks the distance image of an image of the customer's hand, and recognizes that the customer has picked up the product and put it in an improper place.
  • the security device 100 determines that a suspicious action has taken place based on the customer's hand action recognized in S 104 , and displays and records an alert on the alert device 240 such as a store staff terminal or a security guard terminal (S 105 ).
  • the alert information generation unit 140 of the security device 100 generates and outputs alert information indicating a determination that a suspicious action has taken place. Further, the alert information generation unit 140 generates and outputs alert information based on the suspicious person recognized in S 102 .
  • the security device 100 recognizes the action of the store staff's hand by using the distance image of the 3D camera 210 (S 104 ), and displays and records an alert on the alert device 240 (S 105 ).
  • FIG. 6 shows the details of a recognition processing (tracking processing) performed by the distance image analysis unit 110 in S 104 of FIG. 5 .
  • the processing shown in FIG. 6 is one example, and the action of a hand may be recognized by another image analysis processing, and a person's face or line of sight, a product, money and the like may be detected in the same way.
  • the distance image acquisition unit 111 first acquires a distance image containing a customer or a store staff from the 3D camera 210 (S 201 ).
  • the region detection unit 112 detects a person who is a customer or a store staff contained in the distance image acquired in S 201 (S 202 ) and further detects each region of the person (S 203 ).
  • the region detection unit 112 detects a person (customer or store staff) based on the image and the distance contained in the distance image by using a discrimination circuit such as SVM (Support Vector Machine), and estimates the joint of the detected person and thereby detects the bone structure of the person.
  • the region detection unit 112 detects the region of each part such as the person's hand based on the detected bone structure.
  • the hand tracking unit 113 tracks the hand action of the customer or the store staff detected in S 203 (S 204 ).
  • the hand tracking unit 113 tracks the bone structure of the customer's hand and its vicinity and detects the action of the fingers or palm of the hand based on the image and the distance contained in the distance image.
  • the hand action recognition unit 114 extracts the feature of the action of the hand based on the action of the hand tracked in S 204 (S 205 ), and recognizes a suspicious action of the customer or the store staff based on the extracted feature (S 206 ).
  • the hand action recognition unit 114 extracts the direction, angle, and change in movement of the fingers or the palm (wrist) as a feature amount.
  • the hand action recognition unit 114 detects that the customer is holding the product from the angle of the fingers, and when the customer moves the fingers off the product with the hand being close to a pocket of clothes, it detects that the customer puts the product in the pocket of the clothes. Then, the hand action recognition unit 114 compares the detected action pattern with the product fraudulent acquisition pattern 151 , the product fraudulent change pattern 152 and the money fraudulent acquisition pattern 153 , and when the detected pattern matches any of those, it determines that it is a suspicious action. Further, the features of images of the product fraudulent acquisition pattern 151 , the product fraudulent change pattern 152 and the money fraudulent acquisition pattern 153 may be learned in advance, and the state of the hand may be identified by comparing a detected feature amount with the learned feature amount.
  • FIG. 7 shows the details of an alert output processing performed in S 104 and S 105 of FIG. 5 .
  • the distance image analysis unit 110 determines whether a customer or a store staff performs a suspicious action (S 301 ). For example, the distance image analysis unit 110 determines an action of a customer that puts a product in a place other than a shopping basket or cart, such as a pocket or a bag in hand, or an action that breaks a product, damages the product, adds a foreign body, or fraudulently changes the placement. Further, the distance image analysis unit 110 determines an action of a store staff that embezzles the sales, appropriates a product (puts money in a pocket etc), or gives a product to a customer as a conspirator without receiving a full price.
  • the distance image analysis unit 110 determines, as a suspicious action, an action such as frequently looking around, tampering or illicitly manipulating a pachinko machine, attaching a skimming device to an ATM (Automated Teller Machine), illicitly manipulating a cash register or an electronic money device, or paying public money or issuing a ticket without through a regular process.
  • an action such as frequently looking around, tampering or illicitly manipulating a pachinko machine, attaching a skimming device to an ATM (Automated Teller Machine), illicitly manipulating a cash register or an electronic money device, or paying public money or issuing a ticket without through a regular process.
  • ATM Automatic Teller Machine
  • the alert information generation unit 140 acquires suspicious person information (S 302 ) and acquires the congestion in a store (S 303 ).
  • the alert information generation unit 140 acquires the suspicious person information indicating whether the customer is a suspicious person or not from the person recognition unit 120 so as to provide the alert information on the basis of a person recognition result by the facial image of the facial recognition camera 220 .
  • the alert information generation unit 140 acquires the congestion in the store from the in-store situation analysis unit 130 so as to provide the alert information on the basis of a congestion analysis result by the in-store image of the in-store camera 230 . Note that, before recognizing a customer, before analyzing the congestion, and when each information is not necessary, the acquisition of the suspicious person information and the acquisition of the congestion may be omitted.
  • the alert information generation unit 140 determines a suspicion level of the detected suspicious action of a customer or a store staff (S 304 ). For example, the suspicion level is assigned to each suspicious action pattern in the suspicious action information DB 150 , and the suspicion level is determined by referring to the suspicious action information DB 150 .
  • FIG. 8 shows examples of the suspicion level of a suspicious action.
  • a level is set among the suspicion levels 1 to 5 . As the suspicion level is higher, it is more likely to be misconduct, for example.
  • a customer's action corresponds to the product fraudulent acquisition pattern “put a product in an improper place”
  • it is set to the suspicion level 3 by referring to the suspicious action information DB 150 .
  • the suspicion level is adjusted in consideration of other parameters.
  • thresholds are set for the action time, the quantity of products, and the price of a product.
  • the suspicion level is set higher in accordance with the amount exceeding the thresholds.
  • the time is longer, when the quantity of products is smaller, or when the price of a product is lower than such threshold, the suspicion level is set lower in accordance with the amount falling below the thresholds.
  • a customer's action corresponds to the product fraudulent change pattern “damage a product”, “open a product box”, or “deform a product box”, it is set to the suspicion level 3 by referring to the suspicious action information DB 150 . Then, the suspicion level is adjusted in consideration of other parameters.
  • thresholds are set for the scale (rate) of the damage, the action time, the quantity of products, and the price of a product.
  • the suspicion level is set higher in accordance with the amount exceeding the thresholds.
  • the suspicion level is set lower in accordance with the amount falling below the thresholds.
  • a store staff's action corresponds to the money fraudulent acquisition pattern “move money to an improper place”, it is set to the suspicion level 3 by referring to the suspicious action information DB 150 . Then, the suspicion level is adjusted in consideration of other parameters.
  • thresholds are set for the action time and the amount of money.
  • the suspicion level is set higher in accordance with the amount exceeding the thresholds.
  • the suspicion level is set lower in accordance with the amount falling below the thresholds.
  • the suspicion level is set higher.
  • the suspicion level may be set higher for an action of a customer or a store staff that looks around.
  • the suspicion level is determined based on the presence or absence of a suspicious person or the state in a store after a suspicious action is detected in this example, it may be determined before a suspicious action is detected. For example, when a customer is a suspicious action, when the state in a store is congested/sparsely populated, or when a customer has an open-top bag, alert information (warning information) may be output even when a suspicious action is not yet detected. Further, in such a case, the thresholds for detection of a suspicious action (such as the time to detect a suspicious action) may be lowered to make a suspicious action easy to be detected.
  • the alert information generation unit 140 outputs alert information based on a determination result (S 305 ).
  • the alert information generation unit 140 outputs the detected suspicious action and the determined suspicion level to the alert device 240 .
  • the output of the alert information may be controlled based on the suspicion level.
  • the suspicion level is lower than a specified level, an alert is not necessary and the alert information needs not to be output to the alert device 240 . Further, in this case, the alert information may be only recorded in the alert device 240 without being displayed thereon.
  • the suspicious actions and the suspicion levels may be recorded in 3D video information.
  • recording the suspicion levels it is possible to extract and check only a part with a high suspicion level and thus efficiently check the 3D video.
  • the hand motion of a customer or a store staff is observed by the 3D camera placed at the potion from which a product shelf and a client (shopper) in front of the shelf can view to recognize a suspicious action of the customer or the store staff.
  • alert information is notified to an employee terminal in a shelf, a cash register, a guard's room or a store, and action is recorded,
  • a second exemplary embodiment is described hereinafter with reference to the drawings.
  • This exemplary embodiment is an example that, as a complement to the suspicious action recognition in the first exemplary embodiment, detects a suspicious action by detecting a deviant action from normal action information patterns.
  • the present invention is not limited to the example of the first exemplary embodiment, and a suspicious action may be determined by detecting a deviation from a store staff's normal action such as work at a cash register, rather than detecting an action of a store staff that embezzles the sales, appropriates a product (puts money in a pocket etc.) or gives a product to a customer as a conspirator without receiving a full price and the like.
  • FIG. 9 shows a configuration of a security system according to this exemplary embodiment.
  • the security device 100 further includes a normal action information DB 180 in addition to the elements of the first exemplary-embodiment shown in FIG. 2 .
  • the normal action information DB 180 stores normal action patterns (normal action pattern information) indicating normal actions of a customer and a store staff.
  • the normal action information DB 180 stores a product normal acquisition pattern 181 , a product normal change pattern 182 , a money normal acquisition pattern 183 and the like, for example, as the normal action patterns.
  • the product normal acquisition pattern 181 is pattern information about actions of normally acquiring a product, which includes an action of a customer that puts a product in a shopping basket or cart, for example.
  • the product normal change pattern 182 is pattern information about actions of normally altering a product, which includes an action of a store staff that changes the display of a product, for example.
  • the money normal acquisition pattern 183 is pattern information about actions of normally acquiring money, which includes an action of a store staff that performs normal cash register work and an action of a store staff that gives money from a cash register to a customer, for example.
  • FIG. 10 shows the configuration of the distance image analysis unit 110 in the security device 100 according to this exemplary embodiment. As shown in FIG. 10 , a deviant action detection unit 115 is further included in addition to the elements of the first exemplary embodiment shown in FIG. 4 .
  • the deviant action detection unit 115 detects whether an action of a customer or a store staff is deviated from a normal action (suspicious action) or not based on the the hand action tracked by the hand tracking unit 113 .
  • the deviant action detection unit 115 refers to the normal action information DB 180 and compares the detected action of a customer or a store staff with the product normal acquisition pattern 181 , the product normal change pattern 182 and the money normal acquisition pattern 183 , and when the action of a customer or a store staff does not match any of them, determines that it is a suspicious action.
  • a suspicion level may be set in accordance with the degree of deviation from normal action patterns (the degree of mismatch).
  • a suspicious action may be determined in consideration of both of a detection result by the hand action recognition unit 114 using the suspicious action patterns and a detection result by the deviant action detection unit 115 using the normal action patterns. For example, an action may be determined as a suspicious action when any one of the hand action recognition unit 114 and the deviant action detection unit 115 determines that it is suspicious, or an action may be determined as a suspicious action when both of the hand action recognition unit 114 and the deviant action detection unit 115 determine that it is suspicious.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Alarm Systems (AREA)
  • Burglar Alarm Systems (AREA)
  • Image Analysis (AREA)
  • Image Processing (AREA)

Abstract

A security system (10) includes an image information acquisition unit (11) that acquires input image information on an image taken of a person in a store, a tracking unit (12) that tracks an action of a hand of the person based on the input image information, and a suspicious action detection unit (13) that detects a suspicious action of the person based on the tracked action of the hand. A security system, a security method, and a security program capable of accurately detecting a suspicious action are thereby provided.

Description

    TECHNICAL FIELD
  • The present invention relates to a security system, a security method, and a non-transitory computer readable medium storing a security program and, particularly, to a security system, a security method, and a non-transitory computer readable medium storing a security program using person images.
  • BACKGROUND ART
  • Damage caused by shoplifting by customers, misappropriation by part-time employees and the like are a continuous and growing concern for stores. In order to prevent such misconduct, a store staff or a store manager keeps an eye on these customers and part-time employees, or records images monitored by a general 2D camera and visually checks them afterwards.
  • Since it is inefficient to visually check for the occurrence of misconduct, the systems disclosed in Patent Literatures 1 to 5 as related art, for example, are under development.
  • CITATION LIST Patent Literature
  • PTL1: Japanese Unexamined Patent Publication No. 2011-065328
  • PTL2: Japanese Unexamined Patent Publication No. 2010-094332
  • PTL3: Japanese Unexamined Patent Publication No. 2009-048430
  • PTL4: Japanese Unexamined Patent Publication No. 2009-009231
  • PTL5: Japanese Unexamined Patent Publication No. 2008-257487
  • SUMMARY OF INVENTION Technical Problem
  • For example, according to the techniques disclosed in related art like Patent Literature 1, when the number of times a store staff's face swings is a specified value of more and the cancelled amount of money in a cash register is a reference value or more, it is detected that a suspicious conduct (suspicious action) has occurred.
  • However, because the technique of the related art performs detection based on a swing of a face or the like, it fails to detect a suspicious action of a shop staff and the like in some cases. For example, although a suspicious action is often carried out by a hand, the technique of the related art cannot detect the behavior on the basis of a hand action.
  • Thus, the technique disclosed in the related art has a problem that it is difficult to accurately detect a suspicious action of a store staff, a customer and the like.
  • In light of the above, an exemplary object of the present invention is to provide a security system, a security method, and a non-transitory computer readable medium storing a security program capable of accurately detecting a suspicious action.
  • Solution to Problem
  • A security system according to an exemplary aspect of the present invention includes an image information acquisition unit that acquires input image information on an image taken of a person in a store, a tracking unit that tracks an action of a hand of the person based on the input image information, and a suspicious action detection unit that detects a suspicious action of the person based on the tracked action of the hand.
  • A security method according to an exemplary aspect of the present invention includes acquiring input image information on an image taken of a person in a store, tracking an action of a hand of the person based on the input image information, and detecting a suspicious action of the person based on the tracked action of the hand.
  • A non-transitory computer readable medium storing a security program according to an exemplary aspect of the present invention causes a computer to perform a security process including acquiring input image information on an image taken of a person in a store, tracking an action of a hand of the person based on the input image information, and detecting a suspicious action of the person based on the tracked action of the hand.
  • Advantageous Effects of Invention
  • According to the exemplary aspects of the present invention, it is possible to provide a security system, a security method, and a non-transitory computer readable medium storing a security program capable of accurately detecting a suspicious action.
  • BRIEF DESCRIPTION OF DRAWINGS
  • FIG. 1 is a block diagram showing main elements of a security system according to an exemplary embodiment.
  • FIG. 2 is a block diagram showing the configuration of a security system according to a first exemplary embodiment;
  • FIG. 3A is a diagram showing a configuration example of a 3D camera according to the first exemplary embodiment;
  • FIG. 3B is a diagram showing a configuration example of a 3D camera according to the first exemplary embodiment;
  • FIG. 4 is a block diagram showing a configuration of a distance image analysis unit according to the first exemplary embodiment;
  • FIG. 5 is a flowchart showing the operation of the security system according to the first exemplary embodiment;
  • FIG. 6 is a flowchart showing the operation of a distance image analysis process according to the first exemplary embodiment;
  • FIG. 7 is a flowchart showing the operation of an alert information generation process according to the first exemplary embodiment;
  • FIG. 8 is an explanatory diagram illustrating the operation of the alert information generation process according to the first exemplary embodiment;
  • FIG. 9 is a block diagram showing the configuration of a security system according o a second exemplary embodiment; and
  • FIG. 10 is a block diagram showing a configuration of a distance image analysis unit according to the second exemplary embodiment.
  • DESCRIPTION OF EMBODIMENTS Overview of Exemplary Embodiment
  • Prior to describing exemplary embodiments, the overview of the characteristics of the exemplary embodiments is described hereinbelow. FIG. 1 shows main elements of a security system according to an exemplary embodiment.
  • As shown in FIG. 1, a security system 10 according to this exemplary embodiment includes an image information acquisition unit 11, a tracking unit 12, and a suspicious action detection unit 13. The image information acquisition unit 11 acquires input image information, which is an image taken of a person in a store. The tracking unit 12 tracks a hand action of a person based on the acquired input image information. The suspicious action detection unit 13 detects a suspicious action of a person based on the tracked hand action.
  • As described above, in the exemplary embodiment, a hand action of a person in a store is tracked, and a suspicious action is detected based on the tracking result. For example, by tracking a hand action of a customer or a store staff in front of a product shelf in a store, it is possible to accurately detect a suspicious action that can lead to shoplifting or misappropriation.
  • First Exemplary Embodiment
  • A first exemplary embodiment is described hereinafter with reference to the drawings. FIG. 2 is a block diagram showing the configuration of a security system according to this exemplary embodiment. This security system is a system that detects a suspicious action of a customer or a store staff in a store or the like and outputs (displays) an alert (alarm) and the like. Note that customer includes all persons who come to (enter) a store, and the store staff includes all persons who work in a store.
  • As shown in FIG. 2, a security system 1 according to this exemplary embodiment includes a security device 100, a 3D camera 210, a facial recognition camera 220, an in-store camera 230, and an alert device 240. For example, while the respective components of the security system 1 are placed in the same store, the security device 100 or the alert device 240 may be placed outside the store. Although it is assumed in the following description that the respective components of the security system 1 are separate devices, the respective components may be one or any number of devices.
  • The 3D (three-dimensional) camera 210 is an imaging device (distance image sensor) that takes an image of and measures a target and generates a distance image (distance image information). The distance image (range image) contains image information which is an image of a target taken and distance. information which is a distance to a target measured. For example, the 3D camera 210 is Microsoft Kinect (registered trademark) or a stereo camera. By using the 3D camera, it is possible to recognize (track) a target (a customer's action or the like) including the distance information, and it is thus possible to perform highly accurate recognition.
  • As shown in FIGS. 3A and 3B, in order to detect a suspicious action by a hand of a customer or a store staff, the 3D camera 210 takes an image of a customer or a store staff at a specified position in a store in this exemplary embodiment. In the example of FIG. 3A, the 3D camera 210 takes an image of a product shelf (product display shelf) 300 on which a product 301 is placed (displayed), and particularly takes an image of a customer 400 who is about to touch the product 301 in front of the product shelf 300. The 3D camera 210 takes an image of a product placement area of the product shelf 300 and an area where a customer picks up/looks at a product in front of the product shelf 300, which is a presentation area where a product is presented to a customer in the product shelf 300. The 3D camera 210 is placed at a position where images of the product shelf 300 and the customer 400 in front of (in the vicinity of) the product shelf 300 can be taken, which is, for example, above (the ceiling etc.) or in front of (a wall etc.) of the product shelf 300, or in the product shelf 300.
  • In the example of FIG. 3B, the 3D camera 210 takes an image of a checkout stand 310 where a cash register 311 is placed, and particularly takes an image of a store staff 410 who is standing in front of the checkout stand 310 and about to sell the product 301 to the customer 400 or the store staff 410 who is about to touch money 302. The 3D camera 210 is placed at a position where images of the checkout stand 310 and the store staff 410 in front of (in the vicinity of) the checkout stand 310 can be taken, which is, for example, above (the ceiling etc.) or in front of (a wall etc.) of the checkout stand 310, or on the checkout stand 310 (cash register 311).
  • Note that, although an example in which the 3D camera 210 is used as a device that takes images of the product shelf 300 and the checkout stand 310 is described below, it is not limited to the 3D camera but may be a general camera. (2D camera) that outputs only images taken. In this case, tracking is performed using the image information only.
  • Each of the facial recognition camera 220 and the in-store camera 230 is an imaging device (2D camera) that takes and generates an image of a target. The facial recognition camera 220 is placed at the entrance of a store or the like, takes an image of a face of a customer who comes to the store and generates a facial image to recognize the customer's face. The in-store camera 230 is placed at a plurality of positions in a store, takes an image of each section in the store and generates an in-store image to detect the congestion of customers in the store. Note that each of the facial recognition camera 220 and the in-store camera 230 may be a 3D camera. By using a 3D camera, it is possible to accurately recognize the customer's face or the congestion in a store.
  • The alert device 240 is a device that notifies (outputs) alert information to a surveillant such as a store manager, a business manager or a security guard and performs recording. The way to transmit (output) alert information to a surveillant is not limited, and it may be a display of letters and images on a display device, audio output through a speaker or the like. The alert device 240 is placed at a position where a surveillant can view (hear) the alert information. The alert device 240 may be an employee terminal in a shelf, a cash register, a guard's room or a store, or it may be a surveillance device connected to the outside of a store via a network. For example, the alert device 240 is a computer including a display device and a storage device, such as a personal computer or a server computer.
  • As shown in FIG. 2, the security device 100 includes a distance image analysis unit 110, a person recognition unit 120, an in-store situation analysis unit 130, an alert information generation unit 140, a suspicious action information DB (database) 150, a 3D video information recording unit 160, and a suspicious person information DB 170. Note that, although those blocks are described as the functions of the security device 100 in this example, another configuration may be used as long as the operation according to this exemplary embodiment, which is described later, can be achieved.
  • Each element in the security device 100 may be formed by hardware or software or both of them, and may be formed by one hardware or software or a plurality of hardware or software. For example, the product information DB 150 and the customer information DB 160 may be storage devices connected to an external network (cloud). Each function (each processing) of the security device 100 may be implemented by a computer including CPU, memory and the like. For example, a security program for performing a security method (security process) according to the exemplary embodiments may be stored in a storage device, and each function may be implemented by executing the security program stored in the storage device on the CPU.
  • This security program can be stored and provided to the computer using any type of non-transitory computer readable medium. The non-transitory computer readable medium includes any type of tangible storage medium. Examples of the non-transitory computer readable medium include magnetic storage media (such as floppy disks, magnetic tapes, hard disk drives, etc.), optical magnetic storage media (e.g. magneto-optical disks), CD-ROM (Read Only Memory), CD-R , CD-R/W, and semiconductor memories (such as mask ROM, PROM (Programmable ROM), EPROM (Erasable PROM), flash ROM, RAM (Random Access Memory), etc.). The program may be provided to a computer using any type of transitory computer readable medium. Examples of the transitory computer readable medium include electric signals, optical signals, and electromagnetic waves. The transitory computer readable medium can provide the program to a computer via a wired communication line such as an electric wire or optical fiber or a wireless communication line.
  • The distance image analysis unit 110 acquires a distance image generated by the 3D camera 210, tracks a detection target based on the acquired distance image, and recognizes its action. In this exemplary embodiment, the distance image analysis unit 110 mainly tracks and recognizes a hand action of a customer or a store staff. The distance image analysis unit 110 refers to the suspicious action information DB 150 to recognize a suspicious action of a customer or a store staff contained in the distance image. Further, the distance image analysis unit 110 performs detection necessary for recognition of a suspicious action, determination of a suspicion level and the like. For example, the distance image analysis unit 110 detects a time period during which a suspicious action is carried out, the quantity of target products, the amount of money, the scale of a target act (the size of damage etc.) and the like as well. Further, the distance image analysis unit 110 records the distance image acquired from the 3D camera 210 as a 3D video in the 3D video information recording unit 160.
  • The person recognition unit 120 acquires a facial image of a customer generated by the facial recognition camera 220 and recognizes a person contained in the acquired facial image. The person recognition unit 120 refers to the suspicious person information DB 170 and makes comparison of it with the facial image, and thereby determines whether the customer is a suspicious person or not. The in-store situation analysis unit 130 acquires an in-store image generated by the in-store camera 230, analyzes the number of customers in the store based on the acquired in-store image and detects the congestion in the store.
  • The alert information generation unit 140 generates alert information to he transmitted to a surveillant based on detection results of the distance image analysis unit 110, the person recognition unit 120 and the in-store situation analysis unit 130, and outputs the generated alert information to the alert device 240. The alert information generation unit 140 generates and outputs the alert information based on the hand action of a customer or a store staff detected by the distance image analysis unit 110, the alert information based on the suspicious person recognized by the person recognition unit 120, and the alert information based on the congestion in the store analyzed by the in-store situation analysis unit 130. Further, the alert information generation unit 140 may record the generated alert information in a 3D video of the 3D video information recording unit 160.
  • The suspicious action information DB 150 stores suspicious action patterns (suspicious action pattern information) for detecting a suspicious action of a customer or a store staff. Note that a suspicious action is an action (preliminary act) that raises suspicion of misconduct by a person such as a customer or a store staff. The suspicious action information DB 150 stores a product fraudulent acquisition pattern 151, a product fraudulent change pattern 152, a money fraudulent acquisition pattern 153 and the like, for example, as the suspicious action patterns.
  • The product fraudulent acquisition pattern 151 is pattern information about actions of fraudulently acquiring a product, which include, for example, an action of a customer that puts a product in an improper place other than a shopping basket or cart. The product fraudulent change pattern 152 is pattern information about actions of fraudulently changing a product, which include, for example, an action of a customer that breaks or damages a product. The money fraudulent acquisition pattern 153 is pattern information about actions of fraudulently acquiring money, which include, for example, an action of a store staff that puts money from a cash register in an improper place such as a pocket of the store staff.
  • The suspicious person information DB 170 stores suspicious person identification information for detecting that a customer who comes to a store is a suspicious person. The suspicious person includes a person with a previous record, a habitual offender and a person on a blacklist, and the suspicious person identification information contains the name, gender, age, facial image information (image) and the like. For example, the suspicious person information DB 170 acquires and stores suspicious person information such as persons with previous records from a cloud (cloud network) 250 or the like, and further stores suspicious person information such as habitual offenders (persons on the blacklist) based on the history in the store.
  • FIG. 4 shows the configuration of the distance image analysis unit 110 in the security device 100. As shown in FIG. 4, the distance image analysis unit 110 includes a distance image acquisition unit 111, a region detection unit 112, a hand tracking unit 113, and a hand action recognition unit 114. Although the elements for recognizing a person's hand action are mainly described below, a person's face, line of sight, product, money and the like can be detected by elements similar to those for recognizing a person's hand action.
  • The distance image acquisition unit ill acquires a distance image containing a customer or a store staff which is taken and generated by the 3D camera 210. The region detection unit 112 detects a region of each part of a customer or a store staff contained in the distance image acquired by the distance image acquisition unit 111.
  • The hand tracking unit 113 tracks the action of a hand of a customer or a store staff detected by the region detection unit 112. The hand action recognition unit 114 recognizes a suspicious action of the customer or the store staff based on the hand action tracked by the hand tracking unit 113. For example, based on the suspicious action information DB 150, the hand action recognition unit 114 determines whether the suspicious action corresponds to a product fraudulent acquisition pattern such as putting a product in a pocket, a product fraudulent change pattern such as breaking a product, or a money fraudulent acquisition pattern such as putting money in a pocket of clothes.
  • A security method (security process) that is performed in the security system (security device) according to this exemplary embodiment is described hereinafter with reference to FIG. 5.
  • As shown in FIG. 5, a customer enters a store and comes close to a shelf in the store (S101). Then, the facial recognition camera 220 in the store generates a facial image of the customer, and the security device 100 checks the facial image against suspicious person information such as a list of persons with previous records/on the blacklist (S102). Specifically, the person recognition unit 120 of the security device 100 compares the facial image taken by the facial recognition camera 220 with facial image information of suspicious persons (a list of persons with previous records/on the blacklist) stored in the suspicious person information DB 170 and searches for a person regarding which the facial image and facial image information match and thereby determines whether the customer is a suspicious person or not.
  • After that, the customer performs a suspicious action such as putting a product in a place other than a shopping basket or cart (S103). Then, the 3D camera 210 in the vicinity of the shelf takes an image of the customer's hand, and the security device 100 recognizes the action of the customer's hand by using the distance image of the 3D camera 210 (S104). Specifically, the distance image analysis unit 110 in the security device 100 tracks the distance image of an image of the customer's hand, and recognizes that the customer has picked up the product and put it in an improper place.
  • Then, the security device 100 determines that a suspicious action has taken place based on the customer's hand action recognized in S104, and displays and records an alert on the alert device 240 such as a store staff terminal or a security guard terminal (S105). Specifically, the alert information generation unit 140 of the security device 100 generates and outputs alert information indicating a determination that a suspicious action has taken place. Further, the alert information generation unit 140 generates and outputs alert information based on the suspicious person recognized in S102.
  • Further, besides a customer, a store staff comes close to a checkout stand (S106) and performs a suspicious action such as putting money in a place other than a cash register (S107). Then, in the same manner as in the case of the customer's action, the security device 100 recognizes the action of the store staff's hand by using the distance image of the 3D camera 210 (S104), and displays and records an alert on the alert device 240 (S105).
  • FIG. 6 shows the details of a recognition processing (tracking processing) performed by the distance image analysis unit 110 in S104 of FIG. 5. Note that, the processing shown in FIG. 6 is one example, and the action of a hand may be recognized by another image analysis processing, and a person's face or line of sight, a product, money and the like may be detected in the same way.
  • As shown in FIG. 6, the distance image acquisition unit 111 first acquires a distance image containing a customer or a store staff from the 3D camera 210 (S201). Next, the region detection unit 112 detects a person who is a customer or a store staff contained in the distance image acquired in S201 (S202) and further detects each region of the person (S203). For example, the region detection unit 112 detects a person (customer or store staff) based on the image and the distance contained in the distance image by using a discrimination circuit such as SVM (Support Vector Machine), and estimates the joint of the detected person and thereby detects the bone structure of the person. The region detection unit 112 detects the region of each part such as the person's hand based on the detected bone structure.
  • Then, the hand tracking unit 113 tracks the hand action of the customer or the store staff detected in S203 (S204). The hand tracking unit 113 tracks the bone structure of the customer's hand and its vicinity and detects the action of the fingers or palm of the hand based on the image and the distance contained in the distance image.
  • After that, the hand action recognition unit 114 extracts the feature of the action of the hand based on the action of the hand tracked in S204 (S205), and recognizes a suspicious action of the customer or the store staff based on the extracted feature (S206). The hand action recognition unit 114 extracts the direction, angle, and change in movement of the fingers or the palm (wrist) as a feature amount.
  • For example, the hand action recognition unit 114 detects that the customer is holding the product from the angle of the fingers, and when the customer moves the fingers off the product with the hand being close to a pocket of clothes, it detects that the customer puts the product in the pocket of the clothes. Then, the hand action recognition unit 114 compares the detected action pattern with the product fraudulent acquisition pattern 151, the product fraudulent change pattern 152 and the money fraudulent acquisition pattern 153, and when the detected pattern matches any of those, it determines that it is a suspicious action. Further, the features of images of the product fraudulent acquisition pattern 151, the product fraudulent change pattern 152 and the money fraudulent acquisition pattern 153 may be learned in advance, and the state of the hand may be identified by comparing a detected feature amount with the learned feature amount.
  • FIG. 7 shows the details of an alert output processing performed in S104 and S105 of FIG. 5.
  • As shown in FIG. 7, the distance image analysis unit 110 determines whether a customer or a store staff performs a suspicious action (S301). For example, the distance image analysis unit 110 determines an action of a customer that puts a product in a place other than a shopping basket or cart, such as a pocket or a bag in hand, or an action that breaks a product, damages the product, adds a foreign body, or fraudulently changes the placement. Further, the distance image analysis unit 110 determines an action of a store staff that embezzles the sales, appropriates a product (puts money in a pocket etc), or gives a product to a customer as a conspirator without receiving a full price. Besides, the distance image analysis unit 110 determines, as a suspicious action, an action such as frequently looking around, tampering or illicitly manipulating a pachinko machine, attaching a skimming device to an ATM (Automated Teller Machine), illicitly manipulating a cash register or an electronic money device, or paying public money or issuing a ticket without through a regular process. When a customer or a store staff performs the corresponding action, the following process is performed to output alert information in accordance with that action.
  • Specifically, the alert information generation unit 140 acquires suspicious person information (S302) and acquires the congestion in a store (S303). The alert information generation unit 140 acquires the suspicious person information indicating whether the customer is a suspicious person or not from the person recognition unit 120 so as to provide the alert information on the basis of a person recognition result by the facial image of the facial recognition camera 220. Further, the alert information generation unit 140 acquires the congestion in the store from the in-store situation analysis unit 130 so as to provide the alert information on the basis of a congestion analysis result by the in-store image of the in-store camera 230. Note that, before recognizing a customer, before analyzing the congestion, and when each information is not necessary, the acquisition of the suspicious person information and the acquisition of the congestion may be omitted.
  • Then, the alert information generation unit 140 determines a suspicion level of the detected suspicious action of a customer or a store staff (S304). For example, the suspicion level is assigned to each suspicious action pattern in the suspicious action information DB 150, and the suspicion level is determined by referring to the suspicious action information DB 150.
  • FIG. 8 shows examples of the suspicion level of a suspicious action. For example, as shown in FIG. 8, a level is set among the suspicion levels 1 to 5. As the suspicion level is higher, it is more likely to be misconduct, for example.
  • As one example, when a customer's action corresponds to the product fraudulent acquisition pattern “put a product in an improper place”, it is set to the suspicion level 3 by referring to the suspicious action information DB 150. Then, the suspicion level is adjusted in consideration of other parameters.
  • For example, when the time period of the suspicious action is short, when the quantity of products is large, or when the product is expensive, it is likely to be shoplifting. Thus, thresholds are set for the action time, the quantity of products, and the price of a product. When the time is shorter, when the quantity of products is larger, or when the price of a product is higher than such threshold, the suspicion level is set higher in accordance with the amount exceeding the thresholds. On the other hand, when the time is longer, when the quantity of products is smaller, or when the price of a product is lower than such threshold, the suspicion level is set lower in accordance with the amount falling below the thresholds.
  • Likewise, when a customer's action corresponds to the product fraudulent change pattern “damage a product”, “open a product box”, or “deform a product box”, it is set to the suspicion level 3 by referring to the suspicious action information DB 150. Then, the suspicion level is adjusted in consideration of other parameters.
  • For example, when the damage is large or when the product box is deformed, when the time period of the suspicious action is short, when the quantity of products is large, or when the product is expensive, it is likely to be malicious. Thus, thresholds are set for the scale (rate) of the damage, the action time, the quantity of products, and the price of a product. When the damage is larger, when the time is shorter, when the quantity of products is larger, or when the price of a product is higher than such threshold, the suspicion level is set higher in accordance with the amount exceeding the thresholds. On the other hand, when the damage is smaller, when the time is longer, when the quantity of products is smaller, or when the price of a product is lower than such threshold, the suspicion level is set lower in accordance with the amount falling below the thresholds.
  • Likewise, when a store staff's action corresponds to the money fraudulent acquisition pattern “move money to an improper place”, it is set to the suspicion level 3 by referring to the suspicious action information DB 150. Then, the suspicion level is adjusted in consideration of other parameters.
  • For example, when the time period of the suspicious action is short, or when the amount of money is large, it is likely to be misappropriation. Thus, thresholds are set for the action time and the amount of money. When the time is shorter or when the amount of money is larger than such threshold, the suspicion level is set higher in accordance with the amount exceeding the thresholds. On the other hand, when the time is longer or when the amount of money is smaller than such threshold, the suspicion level is set lower in accordance with the amount falling below the thresholds.
  • Further, when the customer is a suspicious person or when the situation in the store is congested/sparsely populated, the possibility of a suspicious action increases, and the suspicion level is set higher. In addition, the suspicion level may be set higher for an action of a customer or a store staff that looks around.
  • Note that, although the suspicion level is determined based on the presence or absence of a suspicious person or the state in a store after a suspicious action is detected in this example, it may be determined before a suspicious action is detected. For example, when a customer is a suspicious action, when the state in a store is congested/sparsely populated, or when a customer has an open-top bag, alert information (warning information) may be output even when a suspicious action is not yet detected. Further, in such a case, the thresholds for detection of a suspicious action (such as the time to detect a suspicious action) may be lowered to make a suspicious action easy to be detected.
  • After that, the alert information generation unit 140 outputs alert information based on a determination result (S305). The alert information generation unit 140 outputs the detected suspicious action and the determined suspicion level to the alert device 240. For example, the output of the alert information may be controlled based on the suspicion level. When the suspicion level is lower than a specified level, an alert is not necessary and the alert information needs not to be output to the alert device 240. Further, in this case, the alert information may be only recorded in the alert device 240 without being displayed thereon.
  • Further, the suspicious actions and the suspicion levels may be recorded in 3D video information. By recording the suspicion levels, it is possible to extract and check only a part with a high suspicion level and thus efficiently check the 3D video.
  • As described above, in this exemplary embodiment, the hand motion of a customer or a store staff is observed by the 3D camera placed at the potion from which a product shelf and a client (shopper) in front of the shelf can view to recognize a suspicious action of the customer or the store staff. When a suspicious action is recognized, alert information (alarm) is notified to an employee terminal in a shelf, a cash register, a guard's room or a store, and action is recorded,
  • Because it is thereby possible to precisely grasp the hand motion by the 3D camera and thereby grasp the action such as fraudulently acquiring a product, fraudulently changing a product or fraudulently acquiring money, it is possible to accurately detect a suspicious action and output alert information in accordance with the suspicious action. It is thereby possible to automate the surveillance of a suspicious action/misconduct and efficiently enhance the security, thereby improving the profit ratio.
  • Second Exemplary Embodiment
  • A second exemplary embodiment is described hereinafter with reference to the drawings. This exemplary embodiment is an example that, as a complement to the suspicious action recognition in the first exemplary embodiment, detects a suspicious action by detecting a deviant action from normal action information patterns. Specifically, the present invention is not limited to the example of the first exemplary embodiment, and a suspicious action may be determined by detecting a deviation from a store staff's normal action such as work at a cash register, rather than detecting an action of a store staff that embezzles the sales, appropriates a product (puts money in a pocket etc.) or gives a product to a customer as a conspirator without receiving a full price and the like.
  • FIG. 9 shows a configuration of a security system according to this exemplary embodiment. As shown in FIG. 9, in this exemplary embodiment, the security device 100 further includes a normal action information DB 180 in addition to the elements of the first exemplary-embodiment shown in FIG. 2.
  • The normal action information DB 180 stores normal action patterns (normal action pattern information) indicating normal actions of a customer and a store staff. The normal action information DB 180 stores a product normal acquisition pattern 181, a product normal change pattern 182, a money normal acquisition pattern 183 and the like, for example, as the normal action patterns.
  • The product normal acquisition pattern 181 is pattern information about actions of normally acquiring a product, which includes an action of a customer that puts a product in a shopping basket or cart, for example. The product normal change pattern 182 is pattern information about actions of normally altering a product, which includes an action of a store staff that changes the display of a product, for example. The money normal acquisition pattern 183 is pattern information about actions of normally acquiring money, which includes an action of a store staff that performs normal cash register work and an action of a store staff that gives money from a cash register to a customer, for example.
  • FIG. 10 shows the configuration of the distance image analysis unit 110 in the security device 100 according to this exemplary embodiment. As shown in FIG. 10, a deviant action detection unit 115 is further included in addition to the elements of the first exemplary embodiment shown in FIG. 4.
  • The deviant action detection unit 115 detects whether an action of a customer or a store staff is deviated from a normal action (suspicious action) or not based on the the hand action tracked by the hand tracking unit 113. The deviant action detection unit 115 refers to the normal action information DB 180 and compares the detected action of a customer or a store staff with the product normal acquisition pattern 181, the product normal change pattern 182 and the money normal acquisition pattern 183, and when the action of a customer or a store staff does not match any of them, determines that it is a suspicious action. For example, a suspicion level may be set in accordance with the degree of deviation from normal action patterns (the degree of mismatch).
  • Further, a suspicious action may be determined in consideration of both of a detection result by the hand action recognition unit 114 using the suspicious action patterns and a detection result by the deviant action detection unit 115 using the normal action patterns. For example, an action may be determined as a suspicious action when any one of the hand action recognition unit 114 and the deviant action detection unit 115 determines that it is suspicious, or an action may be determined as a suspicious action when both of the hand action recognition unit 114 and the deviant action detection unit 115 determine that it is suspicious.
  • As described above, by detecting a suspicious action based on whether an action of a customer or a store staff is deviated from the normal action patterns, not limited to detecting a suspicious action using the suspicious action patterns in the first exemplary embodiment, it is possible to detect a suspicious action more accurately.
  • It should be noted that the present invention is not limited to the above-described exemplary embodiment and may be varied in many ways within the scope of the present invention.
  • While the invention has been particularly shown and described with reference to exemplary embodiments thereof, the invention is not limited to these embodiments. It will be understood by those of ordinary skill in the art that various changes in form and details may be made therein without departing from the spirit and scope of the present invention as defined by the claims.
  • This application is based upon and claims the benefit of priority from Japanese patent application No. 2013-185130, filed on Sep. 6, 2013, the disclosure of which is incorporated herein in its entirety by reference.
  • REFERENCE SIGNS LIST
    • 1, 10 SECURITY SYSTEM
    • 11 IMAGE INFORMATION ACQUISITION UNIT
    • 12 TRACKING UNIT
    • 13 SUSPICIOUS ACTION DETECTION UNIT
    • 100 SECURITY DEVICE
    • 110 DISTANCE IMAGE ANALYSIS UNIT
    • 111 DISTANCE IMAGE ACQUISITION UNIT
    • 112 REGION DETECTION UNIT
    • 113 HAND TRACKING UNIT
    • 114 HAND ACTION RECOGNITION UNIT
    • 115 DEVIANT ACTION DETECTION UNIT
    • 120 PERSON RECOGNITION UNIT
    • 130 IN-STORE SITUATION ANALYSIS UNIT
    • 140 ALERT INFORMATION GENERATION UNIT
    • 150 SUSPICIOUS ACTION INFORMATION DB
    • 151 PRODUCT FRAUDULENT ACQUISITION PATTERN
    • 152 PRODUCT FRAUDULENT CHANGE PATTERN
    • 153 MONEY FRAUDULENT ACQUISITION PATTERN
    • 160 VIDEO INFORMATION RECORDING UNIT
    • 170 SUSPICIOUS PERSON DB
    • 180 NORMAL ACTION INFORMATION DB
    • 181 PRODUCT NORMAL ACQUISITION PATTERN
    • 182 PRODUCT NORMAL CHANGE PATTERN
    • 183 MONEY NORMAL ACQUISITION PATTERN
    • 210 3D CAMERA
    • 220 FACIAL RECOGNITION CAMERA
    • 230 IN-STORE CAMERA
    • 240 ALERT DEVICE
    • 300 PRODUCT SHELF
    • 301 PRODUCT
    • 302 MONEY
    • 310 CHECKOUT STAND
    • 311 CASH REGISTER
    • 400 CUSTOMER
    • 410 STORE STAFF

Claims (10)

1-15. (canceled)
16. A security system, comprising:
a memory storing instructions; and
one or more processors coupled to the memory, wherein the one or more processors are configured to execute the instructions to:
acquire input image information on an image taken of a person in a store;
track an action of a hand of the person based on the input image information;
detect a suspicious action based on the tracked action of the hand, the suspicious action corresponding to any of suspicious action patterns stored in a suspicious action information database;
set a suspicion level of the person to a first level based on a detected suspicious action;
acquire an in-store image;
detect the situation in the store based on the in-store image;
determine, based on the detection result of the situation in the store, whether or not the situation in the store corresponds to at least one of being congested and sparsely populated;
set the suspicion level to a second level higher than the first level when the situation in the store corresponds to at least one of being congested and sparsely populated; and
output alert information based on the suspicion level.
17. The security system according to claim 16, wherein
the suspicion level is determined in accordance with a length of an action time of the suspicious action.
18. The security system according to claim 16, wherein the one or more processors are further configured to execute the instructions to:
record the suspicious action; and
output the recorded suspicious action.
19. A security method comprising:
acquiring input image information on an image taken of a person in a store;
track an action of a hand of the person based on the input image information;
detecting a suspicious action based on the tracked action of the hand, the suspicious action corresponding to any of suspicious action patterns stored in a suspicious action information database;
setting a suspicion level of the person to a first level based on a detected suspicious action;
acquiring an in-store image;
detecting the situation in the store based on the in-store image;
determining, based on the detection result of the situation in the store, whether or not the situation in the store corresponds to at least one of being congested and sparsely populated;
setting the suspicion level to a second level higher than the first level when the situation in the store corresponds to at least one of being congested and sparsely populated; and
outputting alert information based on the suspicion level.
20. The security method according to claim 19, wherein
the suspicion level is determined in accordance with a length of an action time of the suspicious action.
21. The security method according to claim 19, further comprising:
recording the suspicious action; and
outputting the recorded suspicious action.
22. A non-transitory computer readable medium storing a security program causing a computer to perform a security process comprising:
acquiring input image information on an image taken of a person in a store;
track an action of a hand of the person based on the input image information;
detecting a suspicious action based on the tracked action of the hand, the suspicious action corresponding to any of suspicious action patterns stored in a suspicious action information database;
setting a suspicion level of the person to a first level based on a detected suspicious action;
acquiring an in-store image;
detecting the situation in the store based on the in-store image;
determining, based on the detection result of the situation in the store, whether or not the situation in the store corresponds to at least one of being congested and sparsely populated;
setting the suspicion level to a second level higher than the first level when the situation in the store corresponds to at least one of being congested and sparsely populated; and
outputting alert information based on the suspicion level.
23. The non-transitory computer readable medium according to claim 22, wherein
the suspicion level is determined in accordance with a length of an action time of the suspicious action.
24. The non-transitory computer readable medium according to claim 22, the security process further comprising:
recording the suspicious action; and
outputting the recorded suspicious action.
US16/126,729 2013-09-06 2018-09-10 Security system, security method, and non-transitory computer readable medium Abandoned US20190005785A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/126,729 US20190005785A1 (en) 2013-09-06 2018-09-10 Security system, security method, and non-transitory computer readable medium

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
JP2013185130 2013-09-06
JP2013-185130 2013-09-06
PCT/JP2014/004583 WO2015033576A1 (en) 2013-09-06 2014-09-05 Security system, security method, and non-temporary computer-readable medium
US201614916702A 2016-03-04 2016-03-04
US16/126,729 US20190005785A1 (en) 2013-09-06 2018-09-10 Security system, security method, and non-transitory computer readable medium

Related Parent Applications (2)

Application Number Title Priority Date Filing Date
PCT/JP2014/004583 Continuation WO2015033576A1 (en) 2013-09-06 2014-09-05 Security system, security method, and non-temporary computer-readable medium
US14/916,702 Continuation US20160210829A1 (en) 2013-09-06 2014-09-05 Security system, security method, and non-transitory computer readable medium

Publications (1)

Publication Number Publication Date
US20190005785A1 true US20190005785A1 (en) 2019-01-03

Family

ID=52628072

Family Applications (7)

Application Number Title Priority Date Filing Date
US14/916,702 Abandoned US20160210829A1 (en) 2013-09-06 2014-09-05 Security system, security method, and non-transitory computer readable medium
US16/126,818 Active US11354991B2 (en) 2013-09-06 2018-09-10 Security system, security method, and non-transitory computer readable medium
US16/126,729 Abandoned US20190005785A1 (en) 2013-09-06 2018-09-10 Security system, security method, and non-transitory computer readable medium
US16/126,777 Active US10573141B2 (en) 2013-09-06 2018-09-10 Security system, security method, and non-transitory computer readable medium
US17/743,647 Active US11688256B2 (en) 2013-09-06 2022-05-13 Security system, security method, and non-transitory computer readable medium
US18/197,397 Active US12039844B2 (en) 2013-09-06 2023-05-15 Security system, security method, and non-transitory computer readable medium
US18/675,341 Pending US20240321071A1 (en) 2013-09-06 2024-05-28 Security system, security method, and non-transitory computer readable medium

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US14/916,702 Abandoned US20160210829A1 (en) 2013-09-06 2014-09-05 Security system, security method, and non-transitory computer readable medium
US16/126,818 Active US11354991B2 (en) 2013-09-06 2018-09-10 Security system, security method, and non-transitory computer readable medium

Family Applications After (4)

Application Number Title Priority Date Filing Date
US16/126,777 Active US10573141B2 (en) 2013-09-06 2018-09-10 Security system, security method, and non-transitory computer readable medium
US17/743,647 Active US11688256B2 (en) 2013-09-06 2022-05-13 Security system, security method, and non-transitory computer readable medium
US18/197,397 Active US12039844B2 (en) 2013-09-06 2023-05-15 Security system, security method, and non-transitory computer readable medium
US18/675,341 Pending US20240321071A1 (en) 2013-09-06 2024-05-28 Security system, security method, and non-transitory computer readable medium

Country Status (4)

Country Link
US (7) US20160210829A1 (en)
JP (1) JP6249021B2 (en)
CN (2) CN105518755A (en)
WO (1) WO2015033576A1 (en)

Families Citing this family (53)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014031751A2 (en) 2012-08-21 2014-02-27 Nexen Group, Inc. Strain wave gear system
US9542626B2 (en) * 2013-09-06 2017-01-10 Toyota Jidosha Kabushiki Kaisha Augmenting layer-based object detection with deep convolutional neural networks
CN105518755A (en) * 2013-09-06 2016-04-20 日本电气株式会社 Security system, security method, and non-temporary computer-readable medium
US20150206188A1 (en) * 2014-01-17 2015-07-23 Panasonic Intellectual Property Corporation Of America Item presentation method, and information display method
WO2015173869A1 (en) * 2014-05-12 2015-11-19 富士通株式会社 Product-information output method, product-information output program, and control device
WO2016117600A1 (en) * 2015-01-22 2016-07-28 日本電気株式会社 Product shelf allocation management device and product shelf allocation management method
JP6563234B2 (en) * 2015-03-31 2019-08-21 綜合警備保障株式会社 Security system and security method
JP6558178B2 (en) * 2015-09-24 2019-08-14 日本電気株式会社 Nuisance agent estimation system, control method and control program for nuisance agent estimation system
JP2017097599A (en) * 2015-11-24 2017-06-01 宮田 清蔵 Method and device for determining exceptional behavior customer
US10360572B2 (en) * 2016-03-07 2019-07-23 Ricoh Company, Ltd. Image processing system, method and computer program product for evaluating level of interest based on direction of human action
JP6662141B2 (en) * 2016-03-25 2020-03-11 富士ゼロックス株式会社 Information processing device and program
JP6440327B2 (en) * 2016-07-25 2018-12-19 ユニボット株式会社 Crime prevention system, crime prevention method, and robot
JP7057959B2 (en) * 2016-08-09 2022-04-21 住友ゴム工業株式会社 Motion analysis device
EP3291191B1 (en) * 2016-08-29 2019-10-09 Panasonic Intellectual Property Management Co., Ltd. Suspicious person report system and suspicious person report method
GB2557920B (en) * 2016-12-16 2020-03-04 Canon Kk Learning analytics
SG10201610686SA (en) * 2016-12-20 2018-07-30 Mastercard International Inc Systems and methods for processing a payment transaction authorization request
JP6981463B2 (en) * 2017-03-06 2021-12-15 日本電気株式会社 Product monitoring device, product monitoring system, output destination device, product monitoring method, display method and program
JP6402219B1 (en) * 2017-04-19 2018-10-10 ユニティガードシステム株式会社 Crime prevention system, crime prevention method, and robot
WO2018204837A1 (en) * 2017-05-05 2018-11-08 Walmart Apollo, Llc System and method for automatically restocking items on shelves using a conveyor system
CN107886667A (en) * 2017-10-11 2018-04-06 深圳云天励飞技术有限公司 Alarm method and device
JP2019133437A (en) * 2018-01-31 2019-08-08 キヤノン株式会社 Information processing device, system, information processing device control method, and program
RU2679218C1 (en) * 2018-02-06 2019-02-06 Акционерное общество Научно-производственный центр "Электронные вычислительно-информационные системы" (АО НПЦ "ЭЛВИС") System and method for people movement control
JP7327458B2 (en) 2018-03-09 2023-08-16 日本電気株式会社 Self-checkout system, purchased product management method, and purchased product management program
JP6992874B2 (en) * 2018-03-09 2022-01-13 日本電気株式会社 Self-registration system, purchased product management method and purchased product management program
JP7134708B2 (en) * 2018-05-23 2022-09-12 株式会社日立製作所 Monitoring device, monitoring system and monitoring method
CN108805495A (en) * 2018-05-31 2018-11-13 京东方科技集团股份有限公司 Article storage management method and system and computer-readable medium
CN108921098B (en) * 2018-07-03 2020-08-18 百度在线网络技术(北京)有限公司 Human motion analysis method, device, equipment and storage medium
US11521460B2 (en) 2018-07-25 2022-12-06 Konami Gaming, Inc. Casino management system with a patron facial recognition system and methods of operating same
AU2019208182B2 (en) 2018-07-25 2021-04-08 Konami Gaming, Inc. Casino management system with a patron facial recognition system and methods of operating same
CN109271847B (en) * 2018-08-01 2023-04-07 创新先进技术有限公司 Abnormity detection method, device and equipment in unmanned settlement scene
CN109308780A (en) * 2018-10-19 2019-02-05 杭州虹晟信息科技有限公司 Smart home security monitoring system based on Internet of Things
JP7161920B2 (en) * 2018-11-09 2022-10-27 セコム株式会社 store equipment
JP7138547B2 (en) * 2018-11-09 2022-09-16 セコム株式会社 store equipment
JP6534499B1 (en) * 2019-03-20 2019-06-26 アースアイズ株式会社 MONITORING DEVICE, MONITORING SYSTEM, AND MONITORING METHOD
JP6562437B1 (en) * 2019-04-26 2019-08-21 アースアイズ株式会社 Monitoring device and monitoring method
JP7337354B2 (en) * 2019-05-08 2023-09-04 株式会社オレンジテクラボ Information processing device and information processing program
JP7408300B2 (en) * 2019-06-04 2024-01-05 東芝テック株式会社 Store management device, electronic receipt system and control program
WO2021033597A1 (en) * 2019-08-20 2021-02-25 コニカミノルタ株式会社 Image processing system, image processing program, and image processing method
JP2021081804A (en) * 2019-11-14 2021-05-27 株式会社リコー State recognition device, state recognition method, and state recognition program
EP3839855B1 (en) * 2019-12-17 2024-04-03 Diebold Nixdorf Systems GmbH Self-service registration terminal and method
JP2020074567A (en) * 2020-01-15 2020-05-14 日本電気株式会社 Image processing system, image processing method, and program
JP6854959B1 (en) * 2020-10-30 2021-04-07 株式会社Vaak Behavior estimation device, behavior estimation method, program and behavior estimation system
JP7514770B2 (en) * 2021-01-14 2024-07-11 東芝テック株式会社 FRAUDULENT ACTIVITY RECOGNITION DEVICE, ITS CONTROL PROGRAM, AND FRAUDULENT ACTIVITY RECOGNITION METHOD
JP7054075B2 (en) * 2021-01-26 2022-04-13 日本電気株式会社 Information processing system, information processing method, and program
JP7491472B2 (en) 2021-06-29 2024-05-28 日本電信電話株式会社 Abnormality determination device, abnormality determination method, and abnormality determination program
JP7318753B2 (en) * 2021-06-30 2023-08-01 富士通株式会社 Information processing program, information processing method, and information processing apparatus
JP7318679B2 (en) * 2021-07-30 2023-08-01 富士通株式会社 Information processing program, information processing method, and information processing apparatus
JP7318680B2 (en) * 2021-07-30 2023-08-01 富士通株式会社 Information processing program, information processing method, and information processing apparatus
EP4386661A4 (en) * 2021-08-12 2024-10-09 Sony Semiconductor Solutions Corp Behavior analysis device, behavior analysis method, behavior analysis program, imaging device and behavior analysis system
WO2023152825A1 (en) * 2022-02-09 2023-08-17 日本電気株式会社 Movement evaluation system, movement evaluation method, and non-transitory computer-readable medium
JP7085257B1 (en) 2022-03-17 2022-06-16 株式会社Iso Video analysis service provision system, video analysis service provision program, and video analysis service provision method
CN114708696B (en) * 2022-04-02 2023-06-16 河南大学 Elevator car theft behavior monitoring method and system based on upper limb micro-motion recognition
JP2024089579A (en) * 2022-12-21 2024-07-03 富士通株式会社 Alert output program, alert output method, and information processing device

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050108063A1 (en) * 2003-11-05 2005-05-19 Madill Robert P.Jr. Systems and methods for assessing the potential for fraud in business transactions
US7036094B1 (en) * 1998-08-10 2006-04-25 Cybernet Systems Corporation Behavior recognition system
US20060243798A1 (en) * 2004-06-21 2006-11-02 Malay Kundu Method and apparatus for detecting suspicious activity using video analysis
US20070182818A1 (en) * 2005-09-02 2007-08-09 Buehler Christopher J Object tracking and alerts
US20080018738A1 (en) * 2005-05-31 2008-01-24 Objectvideo, Inc. Video analytics for retail business process monitoring
US20130277423A1 (en) * 2011-03-07 2013-10-24 Fujitsu Frontech Limited Item payment check apparatus
US20140347479A1 (en) * 2011-11-13 2014-11-27 Dor Givon Methods, Systems, Apparatuses, Circuits and Associated Computer Executable Code for Video Based Subject Characterization, Categorization, Identification, Tracking, Monitoring and/or Presence Response
US20150146921A1 (en) * 2012-01-17 2015-05-28 Sony Corporation Information processing apparatus, information processing method, and program
US20160328604A1 (en) * 2014-01-07 2016-11-10 Arb Labs Inc. Systems and methods of monitoring activities at a gaming venue
US9589433B1 (en) * 2013-07-31 2017-03-07 Jeff Thramann Self-checkout anti-theft device

Family Cites Families (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS61260391A (en) 1985-05-14 1986-11-18 三菱電機株式会社 Monitor/controller
JPS62115388A (en) * 1985-11-14 1987-05-27 Matsushita Electric Works Ltd Distance measuring type abnormality supervisory sensor
US6421462B1 (en) * 1998-02-06 2002-07-16 Compaq Computer Corporation Technique for differencing an image
WO2002087636A1 (en) 2001-03-12 2002-11-07 Sub-Q, Inc. Methods for sterilizing cross-linked gelatin compositions
US7200266B2 (en) * 2002-08-27 2007-04-03 Princeton University Method and apparatus for automated video activity analysis
EP1872307A4 (en) * 2005-03-29 2012-10-03 Stoplift Inc Method and apparatus for detecting suspicious activity using video analysis
JP2008257487A (en) * 2007-04-05 2008-10-23 Multi Solution:Kk Face-authentication-based shoplifting detection system
US7844105B2 (en) * 2007-04-23 2010-11-30 Mitsubishi Electric Research Laboratories, Inc. Method and system for determining objects poses from range images
JP2009009231A (en) 2007-06-26 2009-01-15 Toshiba Corp Security management system and security management method
JP4972491B2 (en) 2007-08-20 2012-07-11 株式会社構造計画研究所 Customer movement judgment system
US20090055205A1 (en) * 2007-08-23 2009-02-26 Igt Multimedia player tracking infrastructure
US8472715B2 (en) * 2007-10-26 2013-06-25 Panasonic Corporation Situation determining apparatus, situation determining method, situation determining program, abnormality determining apparatus, abnormality determining method, abnormality determining program, and congestion estimating apparatus
JP2010094332A (en) 2008-10-17 2010-04-30 Okamura Corp Merchandise display apparatus
CN101794481A (en) * 2009-02-04 2010-08-04 深圳市先进智能技术研究所 ATM (Automatic teller machine) self-service bank monitoring system and method
JP5143780B2 (en) * 2009-03-31 2013-02-13 綜合警備保障株式会社 Monitoring device and monitoring method
US20110063108A1 (en) * 2009-09-16 2011-03-17 Seiko Epson Corporation Store Surveillance System, Alarm Device, Control Method for a Store Surveillance System, and a Program
JP5540622B2 (en) 2009-09-16 2014-07-02 セイコーエプソン株式会社 Receipt printer, receipt printer control method and program
JP2011108769A (en) 2009-11-16 2011-06-02 Yokogawa Electric Corp Semiconductor device
JP2011108169A (en) * 2009-11-20 2011-06-02 Ishida Co Ltd Store management system
JP5580683B2 (en) * 2010-07-29 2014-08-27 セコム株式会社 Reporting device
US9740937B2 (en) * 2012-01-17 2017-08-22 Avigilon Fortress Corporation System and method for monitoring a retail environment using video content analysis with depth sensing
CN102881100B (en) * 2012-08-24 2017-07-07 济南纳维信息技术有限公司 Entity StoreFront anti-thefting monitoring method based on video analysis
US9165190B2 (en) * 2012-09-12 2015-10-20 Avigilon Fortress Corporation 3D human pose and shape modeling
CN202995945U (en) * 2012-12-08 2013-06-12 南通纺织职业技术学院 An intelligent anti-theft system
US9443148B2 (en) * 2013-03-15 2016-09-13 International Business Machines Corporation Visual monitoring of queues using auxiliary devices
CN105518755A (en) * 2013-09-06 2016-04-20 日本电气株式会社 Security system, security method, and non-temporary computer-readable medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7036094B1 (en) * 1998-08-10 2006-04-25 Cybernet Systems Corporation Behavior recognition system
US20050108063A1 (en) * 2003-11-05 2005-05-19 Madill Robert P.Jr. Systems and methods for assessing the potential for fraud in business transactions
US20060243798A1 (en) * 2004-06-21 2006-11-02 Malay Kundu Method and apparatus for detecting suspicious activity using video analysis
US20080018738A1 (en) * 2005-05-31 2008-01-24 Objectvideo, Inc. Video analytics for retail business process monitoring
US20070182818A1 (en) * 2005-09-02 2007-08-09 Buehler Christopher J Object tracking and alerts
US20130277423A1 (en) * 2011-03-07 2013-10-24 Fujitsu Frontech Limited Item payment check apparatus
US20140347479A1 (en) * 2011-11-13 2014-11-27 Dor Givon Methods, Systems, Apparatuses, Circuits and Associated Computer Executable Code for Video Based Subject Characterization, Categorization, Identification, Tracking, Monitoring and/or Presence Response
US20150146921A1 (en) * 2012-01-17 2015-05-28 Sony Corporation Information processing apparatus, information processing method, and program
US9589433B1 (en) * 2013-07-31 2017-03-07 Jeff Thramann Self-checkout anti-theft device
US20160328604A1 (en) * 2014-01-07 2016-11-10 Arb Labs Inc. Systems and methods of monitoring activities at a gaming venue

Also Published As

Publication number Publication date
US20190005787A1 (en) 2019-01-03
JP6249021B2 (en) 2017-12-20
CN105518755A (en) 2016-04-20
US20160210829A1 (en) 2016-07-21
WO2015033576A1 (en) 2015-03-12
JPWO2015033576A1 (en) 2017-03-02
US11688256B2 (en) 2023-06-27
US10573141B2 (en) 2020-02-25
US20220270455A1 (en) 2022-08-25
US20190005786A1 (en) 2019-01-03
CN111723668A (en) 2020-09-29
US20230282084A1 (en) 2023-09-07
US12039844B2 (en) 2024-07-16
US20240321071A1 (en) 2024-09-26
US11354991B2 (en) 2022-06-07

Similar Documents

Publication Publication Date Title
US12039844B2 (en) Security system, security method, and non-transitory computer readable medium
US12056932B2 (en) Multifactor checkout application
US10817710B2 (en) Predictive theft notification
US10242267B2 (en) Systems and methods for false alarm reduction during event detection
US20170068945A1 (en) Pos terminal apparatus, pos system, commodity recognition method, and non-transitory computer readable medium storing program
WO2015033577A1 (en) Customer behavior analysis system, customer behavior analysis method, non-temporary computer-readable medium, and shelf system
JP5673888B1 (en) Information notification program and information processing apparatus
US20230136054A1 (en) Information processing method, information processing device, and recording medium
Sujith Crime detection and avoidance in ATM: a new framework
US20230368625A1 (en) Self-checkout verification systems and methods
WO2019077559A1 (en) System for tracking products and users in a store
TWI671701B (en) System and method for detecting trading behavior
US20220067345A1 (en) Method and system for identifying, tracking, and collecting data on a person of interest
JP2023031766A (en) Self-service checkout machine monitoring system and self-service checkout machine monitoring method
JP7010030B2 (en) In-store monitoring equipment, in-store monitoring methods, and in-store monitoring programs
US12039843B2 (en) Card skimming detection
JP2024008708A (en) Determination program, determination method, and determination device
WO2023026277A1 (en) Context-based moniitoring of hand actions

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION