WO2021186610A1 - Digital/autofile/security system, method, and program - Google Patents

Digital/autofile/security system, method, and program Download PDF

Info

Publication number
WO2021186610A1
WO2021186610A1 PCT/JP2020/011958 JP2020011958W WO2021186610A1 WO 2021186610 A1 WO2021186610 A1 WO 2021186610A1 JP 2020011958 W JP2020011958 W JP 2020011958W WO 2021186610 A1 WO2021186610 A1 WO 2021186610A1
Authority
WO
WIPO (PCT)
Prior art keywords
theft
weight
unit
hand motion
person
Prior art date
Application number
PCT/JP2020/011958
Other languages
French (fr)
Japanese (ja)
Inventor
和夫 三輪
Original Assignee
株式会社 テクノミライ
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 株式会社 テクノミライ filed Critical 株式会社 テクノミライ
Priority to PCT/JP2020/011958 priority Critical patent/WO2021186610A1/en
Priority to PCT/JP2020/018740 priority patent/WO2021186751A1/en
Priority to JP2020537786A priority patent/JP6773389B1/en
Publication of WO2021186610A1 publication Critical patent/WO2021186610A1/en

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems

Definitions

  • the present invention relates to a digital autofile security system, method and program for detecting theft by a person by photographing the inside of a security area with a surveillance camera for crime prevention or the like.
  • Patent Document 1 states that "determine whether or not theft has been performed based on image data” (claim 1), and "in the situation where it is determined that shoplifting has been performed, the product is placed in a bag or a pocket of clothes. It is described as “the act of putting in” (0021).
  • the technique of Patent Document 1 relates to a system for detecting the occurrence of shoplifting.
  • An object of the present invention is to provide a digital autofile security system, a method and a program capable of accurately determining a suspicious person from a captured image.
  • the digital auto file security system has a theft weight storage means for storing the theft weight, which is a parameter of the susceptibility of an article, in association with the article, and an image taken by a camera for capturing a security area.
  • a person extraction means for extracting a person candidate from, a hand movement detection means for detecting a hand movement in an image extracted by the person extraction means, a hand movement data detected by the hand movement detection means, and the theft. It is characterized by comprising a theft act determining means for determining that a theft act has been performed based on the theft weight of an article stored in the weight storage means.
  • the theft weight depends on the past performance, so that a large weight can be added to an article with many theft acts, and the accuracy of the determination of the theft act can be further improved. As a result, theft can be further suppressed.
  • the theft weight depends on the price of the article, a large weight can be added to an expensive article having a large loss when the theft is committed, and the accuracy of the determination of the theft can be further improved. Can be done. As a result, the loss due to theft can be further suppressed.
  • the theft weight is determined by the display shelf on which the goods are displayed, so that a large weight can be added to the product with many theft acts, and the accuracy of the determination of the theft act can be further improved. As a result, the occurrence of theft can be further suppressed.
  • a reporting means for reporting the determination result to a predetermined terminal in response to the determination that the theft act has been performed by the theft act determining means for example, a store-related person can promptly respond to a shoplifting candidate. Can be taken.
  • the digital auto file security method of the present invention was photographed by a theft weight storage step of storing the theft weight, which is a parameter of the susceptibility of an article, in association with the article, and a camera for photographing a security area.
  • a person extraction step for extracting a person candidate from an image a hand motion detection step for detecting a hand motion in an image extracted by the person extraction step, hand motion data detected by the hand motion detection step, and the above. It is characterized by including a theft act determination step for determining that a theft act has been performed based on the theft weight of an article stored in the theft weight storage step.
  • the present invention is a candidate for a person from a theft weight storage means for storing the theft weight, which is a parameter of the susceptibility to theft of an article, in association with the article, and an image taken by a camera for photographing a security area.
  • the hand motion detection means for detecting the hand motion in the image extracted by the person extraction means, the hand motion data detected by the hand motion detection means, and the theft weight storage means.
  • It is a program for functioning as a digital auto file security system, which is provided with a theft act determining means for determining that a theft act has been performed based on the theft weight of a stored article.
  • a suspicious person can be accurately determined from a photographed image by adding information about an article to be stolen.
  • FIG. 1 is a block diagram showing a configuration of a digital auto file security system according to an embodiment of the present invention.
  • This digital auto file security system provides advanced management of stores, commercial facilities, museums, exhibition halls, corporate offices, factories, laboratories, information processing rooms, ATMs, financial institutions, precious metal stores, money counting rooms, etc. It is suitable for business establishments that require
  • This embodiment is an example in which the digital auto file security system is applied to a store. In a store, the target goods are goods, and theft is shoplifting.
  • the digital auto file security system 1000 includes a plurality of surveillance cameras 11 installed in a security area, a human sensor 20, and Wi-Fi (Wireless Fidelity) installed in the security area.
  • a terminal hereinafter referred to as "Wi-Fi master unit" 30, a beacon master unit 40, a mobile terminal device 50 (ID (Identification) terminal) carried by a person concerned (salesperson), and a monitoring device that controls the entire system. It includes 100 and an AI (Artificial Intelligence) accelerator (Accelerator) 200.
  • the security area is a caution area (security target area), for example, a store sales floor.
  • the monitoring device 100 is installed in the security area, it may be installed outside via a network (not shown).
  • a network not shown.
  • the monitoring device 100 is installed on a server on the network, a plurality of security areas can be monitored.
  • the surveillance camera 11 captures an image in the security area.
  • a part or all of the surveillance camera 11 is a PTZ camera having a PTZ (pan / tilt / zoom) function, and is remotely controlled by the surveillance device 100.
  • Surveillance cameras 11 are installed in stores subject to security in buildings subject to security and in various locations in the relevant site area. The image taken by the surveillance camera 11 is output to the surveillance device 100 and recorded in the recording unit 160.
  • the motion sensor 20 is a thermo camera, an infrared camera, or the like, and detects the temperature of a sensing object in the security area to detect a suspicious person in the security area.
  • the Wi-Fi master unit 30 uses Wi-Fi to exchange information with the Wi-Fi slave unit 51 of the mobile terminal device 50. Further, the Wi-Fi master unit 30 can acquire position information by Wi-Fi positioning, that is, can acquire position information using a Wi-Fi access point and a predetermined position information service.
  • Beacon is a wireless technology that uses Bluetooth Low Energy.
  • the beacon is composed of a combination of a beacon master unit 40, which is a beacon device on the transmitting side, and an application of a mobile terminal device 50 (corresponding to the beacon slave unit 52 described later) that supports reception of radio waves from the beacon master unit 40.
  • the beacon transmits unique ID information necessary for identification, and reacts only to the application associated with the ID information of the mobile terminal device 50.
  • the application of the mobile terminal device 50 registers the same identifier as the beacon master unit 40.
  • the application (beacon slave unit 52) of the mobile terminal device 50 stands by in the background by executing an application equipped with a beacon function, and excites a predetermined action when approaching the beacon of the beacon master unit 40.
  • the mobile terminal device 50 is carried by a salesperson of a store or the like.
  • the mobile terminal device 50 is, for example, a smartphone 50a, a tablet 50b, a notebook computer 50c, or the like.
  • the mobile terminal device 50 is also a mobile phone, a PHS (Personal Handy-Phone System), a PDA (Personal Digital Assistants), a dedicated terminal, or the like.
  • the mobile terminal device 50 can be used by a store salesperson or the like in various places (that is, the current position), and is an image including an email or a moving image from the monitoring device 100 via a telephone line (not shown). Etc. can be received.
  • the mobile terminal device 50 assumes the use of a smartphone 50a (ID terminal), and each individual can use it in various places (that is, the current position).
  • One of the mobile terminal devices 50 is located at a security company (not shown).
  • the smartphone 50a has a digital auto file security application (hereinafter referred to as "security application”). If the security application is started by the background processing of each application, for example, it goes through the communication carrier network (mobile communication network), the web service cloud 300 (see Fig. 4 below), or the Internet 303 (see Fig. 4 below). Then, the cloud server 301 (see FIG. 4 below) on the web service cloud 300 can be connected, and the text about the suspicious person can be received from the cloud server 301. The smartphone 50a can notify the text on which the suspicious person is detected to the standby screen or the like.
  • security application a digital auto file security application
  • the smartphone 50a includes a Wi-Fi individual identification device (hereinafter referred to as "Wi-Fi slave unit") 51 and a GPS 53 that captures the positions of related parties.
  • the smartphone 50a may be provided with the beacon slave unit 52.
  • the smartphone 50a may include any one of the Wi-Fi slave unit 51, the beacon slave unit 52, and the GPS 53.
  • the Wi-Fi slave unit 51 receives and individually identifies the radio waves of the Wi-Fi master unit 30 installed in the business facility.
  • the monitoring device 100 stores the arrangement information of the Wi-Fi master unit 30 installed in the facility as safety-related information.
  • the Wi-Fi slave unit 51 approaches the Wi-Fi master unit 30, it is possible to determine the ID and position of the person who carries the mobile terminal device 50.
  • the beacon slave unit 52 is an application of the mobile terminal device 50 that supports reception of radio waves from the beacon master unit 40.
  • the beacon master unit 40 transmits a beacon (unique ID information necessary for identification), and the application (beacon slave unit 52) of the mobile terminal device 50 excites a predetermined action when approaching the beacon of the beacon master unit 40. do.
  • the GPS 53 receives radio waves of position information from GPS satellites and the like.
  • the GPS 53 acquires the position information by calculating the current position information as three parameters of latitude, longitude and altitude from the information received via the GPS antenna.
  • the acquired position information is timely transmitted to the monitoring device 100.
  • an example using GPS satellites is shown as a means for acquiring position information, but a method using a positional relationship with a base station other than GPS may also be used.
  • a method using a positional relationship with a base station other than GPS may also be used.
  • the mobile terminal device 50 which is a mobile terminal
  • a base station and a mobile phone communication network are used in place of or in combination with GPS53. It is also possible to send and receive information to and from the mobile phone company server via the mobile phone company and acquire the current location information of the own terminal from the proximity confirmation.
  • location information acquisition by Wi-Fi positioning that is, location information acquisition using a Wi-Fi access point and a predetermined location information service may be used.
  • the monitoring device 100 is installed in the security area and centrally manages the security area.
  • the monitoring device 100 may be a general server computer, a personal computer, or the like.
  • the monitoring device 100 includes a control unit 110, an input unit 120, a storage unit 130 (theft weight storage means), a display unit 140, an output unit 150, a recording unit 160, an image processing unit 170, and an interface (I). / F) A unit 180 and a communication unit 190 are provided, and each unit is connected by a bus 195.
  • control unit 110 shall read each program from the ROM as necessary, load it into the RAM, and execute each function (described later).
  • Each program may be stored in the storage unit 130 in advance, or may be incorporated into the monitoring device 100 when necessary via another storage medium or communication medium.
  • the control unit 110 is composed of a CPU (Central Processing Unit) and the like, controls the entire monitoring device 100, executes a control program, and functions as a digital auto file security system. The detailed configuration of the control unit 110 will be described later.
  • CPU Central Processing Unit
  • the input unit 120 has an operation panel 120a, and is an input device for the user of the monitoring device 100 to input instructions and the like, such as a keyboard, a mouse, and a touch panel or a microphone provided on the screen of the display unit 140.
  • the storage unit 130 is composed of a non-volatile memory such as a ROM (Read Only Memory), a RAM (Random Access Memory), or an EEPROM (Electrically Erasable Programmable Read-Only Memory), and stores various data and programs used by the control unit 110. ..
  • the storage unit 130 stores still images or moving images received from the surveillance camera 11, various data and programs used by the control unit 110, and the like.
  • the storage unit 130 stores the theft weight parameter 135, which is a parameter of the ease of stealing the article, in association with the article.
  • "goods” also includes cash.
  • FIG. 3 is a diagram illustrating the theft weight parameter 135.
  • the theft weight parameter 135 includes a theft performance weight 135a that depends on the past performance, a theft price weight 135b that depends on the price of the goods, and a display in which the goods are displayed for each product (article).
  • the theft performance weight 135a (theft performance weighting value “A”)
  • the theft price weight 135b (theft price weighting value “B”)
  • the theft position weight 135c (theft position weighting value “C”) are used.
  • the theft weight is set, for example, in the range of "1" to "10"("1" is the minimum and "10" is the maximum).
  • the display unit 140 displays the operating status of the monitoring device 100, the image received from the monitoring camera 11, the GUI (Graphical User Interface) for operating the monitoring device 100, and the like.
  • the output unit 150 is, for example, an audio interface, and outputs an audio signal from the monitoring device 100 to the sound system 158 in the security area.
  • an audio signal output from the monitoring device 100 to the acoustic system 158 for example, an audio signal input from an audio input device such as a microphone provided in the input unit 120, or music data stored in the storage unit 130 is controlled by the control unit. 110 may be the reproduced audio signal.
  • the sound system 158 includes an amplifier and a plurality of speakers arranged in the store, and emits a signal input from the monitoring device 100 into the store.
  • the voice uttered in the store when the theft is detected is music known to the store personnel to notify the visit of a suspicious person.
  • a voice (music) notifying the occurrence of the theft act is notified in the store, so that each employee of the store can be notified of the visit of a suspicious person. Coordination between employees will be possible, and it will be possible to respond more quickly.
  • the recording unit 160 is composed of an external storage device such as an HDD (Hard Disk Drive), and records an image in the security area taken by the surveillance camera 11.
  • the recording unit 160 records high-quality images for a predetermined short time after shooting, converts the image quality to low image quality after a predetermined short time has elapsed, records the images for a predetermined long time, and erases and controls the high-quality shot images.
  • the unit 110 detects a suspicious person, it saves a predetermined short-time high-quality photographed image up to that time.
  • the image processing unit 170 is composed of a DSP (Digital Signal Processor) or the like, and performs predetermined processing on the received image. Predetermined processing includes contour extraction, image resizing, resolution conversion processing, and the like.
  • DSP Digital Signal Processor
  • the image captured by the surveillance camera 11 in 1 second is, for example, a 5-frame image, the 1/5 second image, the 2/5 second image, the 3/5 second image, the 4/5 second image, and the 5/5 second image.
  • the image processing unit 170 processes the image data taken by the surveillance camera 11 and sends it to the control unit 110 in order to determine the presence or absence of a person from the image in the security area.
  • the I / F unit 180 connects each surveillance camera 11 arranged in the security area with the surveillance device 100. Further, the I / F unit 180 is connected to a headquarters, a head office, a security company, etc. (not shown) by a network or a dedicated line.
  • the communication unit 190 transmits / receives data to / from the mobile terminal device 50 via the base station.
  • the communication unit 190 has a wireless communication function, and is connected to a control board using, for example, USB (Universal Serial Bus).
  • FIG. 2 is a block diagram of the control unit 110 of the monitoring device 100 of the digital autofile security system according to the first embodiment of the present invention.
  • the control unit 110 is configured by a CPU (Central Processing Unit) or the like, controls the entire monitoring device 100, executes a control program, and functions as a digital auto file security system.
  • the control unit 110 includes a person extraction unit 111 (human extraction means), a hand motion detection unit 112 (hand motion detection means), a theft action determination unit 113 (theft action determination means), and a reporting unit 114 (reporting means). , Equipped with.
  • the person extraction unit 111 extracts a person candidate from the image taken by the camera that captures the security area.
  • the control unit 110 determines that a person exists after the person extraction unit 111 determines that the block of the candidate person (see the rectangle shown by the symbol a in the upper figure of FIG. 9) is human.
  • the hand motion detection unit 112 detects the hand motion in the image extracted by the human extraction unit 111.
  • the control unit 110 determines whether or not the theft act is performed by the theft act determination unit 113 based on the hand motion data detected by the hand motion detection unit 112 and the theft weight of the product stored in the storage unit 130. To judge. For example, if the sum of the weighted values of the theft record weight 135a, the theft price weight 135b, and the theft position weight 135c is smaller than the predetermined threshold D), it is determined that the product is not likely to be shoplifted.
  • Theft weight parameter value X ⁇ (A + B + C) ⁇ D
  • the control unit 110 reports the determination result to a predetermined terminal after the reporting unit 114 determines that the theft act has been performed by the theft act determination unit 113.
  • the reporting unit 114 reports, for example, the degree of suspicion of theft (80%, etc.). Upon receiving the report, store personnel carefully observe shoplifting candidates.
  • the control unit 110 records in the recording unit 160 with high image quality for a predetermined short time after shooting, converts the image quality to low image quality after the predetermined short time elapses, and records the captured image with high image quality for a predetermined long time.
  • the high-quality shot image for a predetermined short time up to that time is saved.
  • the control unit 110 analyzes the captured image using the AI accelerator 200 (described later) to detect a person in the security area.
  • the control unit 110 issues a person detection request to the AI accelerator 200, and the AI accelerator 200 executes an AI calculation other than the CPU and transmits the person detection result to the person extraction unit 111. Since high speed is required for human detection, the AI accelerator 200 is used for human detection.
  • control unit 110 uses the AI accelerator 200 to detect a person, but the thermo camera (or motion sensor 20) may detect the person. That is, the motion sensor 20 detects the temperature in the security area. Then, the control unit 110 detects the presence of a person (suspicious person candidate) by detecting the body temperature of the person by the motion sensor 20 and detecting the change in the captured image by the surveillance camera 11.
  • control unit 110 may combine human detection using the AI accelerator 200 and human detection using a thermo camera (or motion sensor).
  • the AI accelerator 200 is used for the store sales floor where high speed of person detection is required, and the thermo camera (or motion sensor) is used outside the store sales floor where high speed of human detection is not required. do.
  • the person extraction unit 111 uses the AI accelerator 200 to convert an image taken by a camera that photographs a security area into a monochrome binary image, and extracts a person candidate from the monochrome binary image.
  • the AI accelerator 200 is used for each process of detecting a person in the present embodiment, it may be performed by a CPU process (execution of a control program of the control unit 110).
  • the AI accelerator 200 is a dedicated processor that detects a person, and uses a computing resource other than the CPU.
  • the AI accelerator 200 is, for example, an accelerator for image processing by a processor enhanced with a GPU (Graphics Processing Unit) and signal processing using an FPGA (Field-Programmable Gate Array). Further, the AI accelerator 200 executes the calculation of AI (Artificial Intelligence) on a dedicated hardware (for example, GPU).
  • AI Artificial Intelligence
  • the AI accelerator 200 which is a human detection processor
  • the performance of the computer processing by the PC is about 10 times higher, and the intrusion detection is executed quickly.
  • the calculation of AI which has a high calculation load, is left to the AI accelerator 200, which is a dedicated hardware.
  • FIG. 4 is a configuration diagram showing a digital auto file security system using the mobile terminal device 50 according to the embodiment of the present invention.
  • the digital auto file security system 1000 is active on the web service cloud 300 in cooperation with the cloud server (commercial server) 301 and the cloud server 301 that provide the digital auto file security service. It has a Push notification server 302 that acquires information and notifies the user's smartphone 50a (portable terminal device; ID terminal).
  • the web service cloud 300 is connected to the Internet 303.
  • the cloud server 301 on the web service cloud 300 can transmit texts and images to the smartphone 50a via the Internet 303.
  • the smartphone 50a receives the push notification from the push notification server 302 via the Internet 303.
  • the cloud server 301 and the push notification server 302 are connected to the smartphone 50a equipped with the security application via a communication carrier network (mobile communication network) (not shown) such as an LTE / 3G network.
  • a communication carrier network mobile communication network
  • the digital auto file security system 1000 detects shoplifting (article theft) candidates and push-notifies the smartphone 50a owned by a store salesperson or the like.
  • shoplifting article theft
  • the security application is activated and the zoom screen of the suspicious person is displayed, and a telop saying "Shoplifting candidate has been detected” is played.
  • the content is read aloud.
  • the suspicious person is notified by the telop and voice on the screen of the smartphone 50a.
  • the related organizations (police / fire department) are notified.
  • the security company and the head office of the affiliated company are also automatically notified. Also, if there is no urgency or if you want to confirm, only the security company will be notified.
  • FIG. 5 is a diagram showing the operation of the security application of the smartphone 50a.
  • a telop that detects a suspicious person is notified on the standby screen or the like of the smartphone 50a.
  • the display of the smartphone 50a is switched to the security application operation display, the zoom screen of the suspicious person is displayed, and the position and situation of the suspicious person " ⁇ sales floor ⁇ block is suspicious person". Is displayed.
  • this telop is read aloud by automatic voice.
  • the display of the smartphone 50a is displayed on four time-series screens as shown on the right side of FIG.
  • FIG. 6 is a flowchart showing a process in which the control unit 110 of the monitoring device 100 of the digital auto file security system determines the theft act. This flow is executed by the control unit 110 (see FIG. 2) of the monitoring device 100.
  • the control unit 110 obtains an image from the digital camera (surveillance camera 11) that captures the security area, for example, every 0.2 seconds according to the processing power of the computer.
  • the person extraction unit 111 (see FIG. 2) of the control unit 110 extracts people with the AI accelerator 200.
  • the hand motion detection unit 112 (see FIG. 2) of the control unit 110 detects the hand motion in the image extracted by the human extraction unit 111 (see FIG. 9 below).
  • the theft action determination unit 113 (see FIG. 2) of the control unit 110 refers to the theft weight parameter 135 (see FIG. 3) stored in the storage unit 130, and the theft weight of the picked-up product.
  • the theft determination unit 113 has a theft record weight 135a (referred to as the theft record weight “A”) that depends on past performance and a theft price weight 135b (theft) that depends on the price of the product.
  • the price weight (referred to as "B”) and the theft position weight 135c (referred to as the theft position weight "C") of the display shelf on which the product is displayed are acquired.
  • step S5 the theft determination unit 113 performs the theft based on the image data (hand movement) detected by the hand motion detection unit 112 and the theft weight parameter 135 of the product stored in the storage unit 130. Determine if it is. For example, even if the movement of the hand is unnatural, the theft weight of the product is small (the sum of the weighted value A of the theft record weight 135a, the weighted value B of the theft price weight 135b, and the weighted value C of the theft position weight 135c). If the product is smaller than the predetermined threshold D), it is determined that the product is not easily shoplifted (see the following equation).
  • Theft weight parameter value X ⁇ (A + B + C) ⁇ D
  • the theft record weight 135a and the theft price weight 135b have the highest rank “10”, so even if the theft position weight 135c has the lowest rank “0”, the weight is given.
  • the weight of the theft record weight 135a of the product can be increased, and in this case, it is easy to determine that the product is shoplifting.
  • the product has a large theft weight (the sum of the weights of the theft record weight 135a, the theft price weight 135b, and the theft position weight 135c is larger than the predetermined threshold). For example, it is determined that the product is easily shoplifted.
  • the above is an example. For example, any one of the theft record weight "A”, the theft price weight "B”, and the theft position weight "C” is added to the product taken by the hand movement detected by the hand movement detection unit 112. If so, it may be determined that the theft has been committed.
  • step S5 When the theft is performed (step S5: Yes), the reporting unit 114 reports the determination result to a predetermined terminal in response to the determination by the theft determination unit 113 that the theft has been performed in step S6. Then, the processing of this flow is completed.
  • the reporting unit 114 reports, for example, the degree of suspicion of theft (80%, etc.). Upon receiving the report, store personnel carefully observe shoplifting candidates. Store officials can quickly determine that shoplifting candidates will put the product in their pockets or my bag, and that the product will not be settled at the cash register.
  • step S5 the temporarily saved image data of the suspicious person (video data such as a face image and behavior) is recorded in the recording unit 160 as evidence. If the theft is not performed (step S5: No), the process of this flow is terminated.
  • FIG. 7 is a diagram illustrating security during business hours in a store such as a supermarket of the monitoring device 100 of the digital auto file security system.
  • FIG. 8 is a flowchart showing the process. This flow is executed by the control unit 110 (see FIG. 2) of the monitoring device 100.
  • 3D cameras 12 such as a digital camera 11 (surveillance camera) and a depth camera are installed and arranged in the security area via a LAN (Local Area Network) 13. It is connected to the monitoring device 100.
  • the LAN 13 may be a wireless LAN.
  • the digital camera 11 and the 3D camera 12 photograph the display shelf (gondola) 15 and the showcase 16 (display shelf) of the store sales floor, and shoppers to acquire image data.
  • the products displayed on the display shelves 15 and the showcase 16 include the theft weight parameter 135 of the storage unit 130 shown in FIG. 3, the theft performance weight 135a depending on the past performance for each product code, and the product.
  • the theft price weight 135b which depends on the price of the goods, and the theft position weight 135c of the display shelf on which the goods are displayed are stored.
  • the product displayed on the display shelf 15a shown in FIG. 7 is a product having a large weighting of the theft record weight 135a
  • the product displayed in the showcase 16b is a product having a large weighting of the theft price weight 135b. be.
  • the shopper puts the product in the shopping cart 17 and moves, or holds the product in his hand and moves to the store sales floor, and pays at the cash register 18.
  • the monitoring device 100 is guarded by the security system at the opening time, for example, in the morning.
  • the control unit 110 obtains an image from the digital camera 11 and the 3D camera 12 installed in front of the display shelf 15 and the showcase 16.
  • the human body is detected.
  • the person is authenticated by face recognition or the like.
  • the hand of the relevant person is detected (see FIG. 9 below).
  • the object is detected.
  • step S106 the person concerned determines whether or not he / she has the shopping cart 17. When possessing the shopping cart 17, it is determined in step S107 that there is a shopping cart 17, and the process proceeds to step S109. If the shopping cart 17 is not possessed, it is determined in step S108 that there is no shopping cart 17, and the process proceeds to step S109.
  • step S109 it is determined whether the product is picked up or returned (see FIG. 9 below).
  • the product is returned to the display shelf 15 or the like, it is determined as “green” in step S110, and the process proceeds to step S123.
  • “green” and “orange” and “red”, which will be described later, are indexes indicating the degree of attention of shoplifting caution persons (shoplifting candidates). "Green” is (normal), “orange” is (caution), and “red” is (abnormal), and they are added to the judgment conditions of the shopper's behavior pattern.
  • step S109 if neither is the case (the product is not touched), the determination of "green” or the like is not performed, and the process proceeds to step S123 as it is.
  • step S111 it is determined in step S111 whether or not the product is put in the shopping cart 17 (see FIG. 10 below).
  • step S112 it is determined as "green” in step S112, and the process proceeds to step S123.
  • step S113 If the product is not in the shopping cart 17, it is determined in step S113 whether or not the product is in the pocket, bag, or the like. When the product is put in a pocket, bag, or the like, it is determined that there is a possibility of shoplifting, and it is determined as "orange” in step S114, and the process proceeds to step S115. When it is determined to be “orange”, the result of person authentication (particularly face authentication) in step S103 and the "orange” determination result are associated and stored in the storage unit 130 (see FIG. 1).
  • step S115 the control unit 110 determines whether or not the relevant person has been determined to be orange in the past based on the past "orange" determination result stored in the storage unit 130, and the relevant person has also been determined to be orange in the past. If the determination is orange, the corresponding person is determined to be “red” in step S116, and the process proceeds to step S123. If the orange determination has not been made in the past, the determination such as "orange” is not performed and the process proceeds to step S123 as it is.
  • a person who is determined to be “red” is recorded in the recording unit 160 as proof of image data (video data such as a face image and behavior) as a shoplifter (theft).
  • step S113 the control unit 110 obtains an image from the digital camera 11a installed in front of the cash register 18 (see FIG. 7) in step S117.
  • step S118 it is determined whether or not the shopper has settled at the cash register 18. When the payment is made at the cash register 18, it is determined as "green" in step S119, and the process proceeds to step S123.
  • step S120 If the payment has not been made at the cash register 18, it is determined as “orange” in step S120 and the process proceeds to step S121. If the orange determination has been made in the past, the determination is determined to be "red” in step S116, and the process proceeds to step S123. If the orange determination has not been made in the past, the "red" determination is not performed and the process proceeds to step S123.
  • step S123 the theft action determination unit 113 (see FIG. 2) of the control unit 110 refers to the theft weight parameter 135 (see FIG. 3) stored in the storage unit 130, and the theft weight of the picked-up product. To get.
  • step S124 the theft determination unit 113 performs the theft based on the image data (hand movement) detected by the hand motion detection unit 112 and the theft weight parameter 135 of the product stored in the storage unit 130. Determine if it is.
  • step S124 When the theft is performed (step S124: Yes), the reporting unit 114 reports the determination result to a predetermined terminal in response to the determination by the theft determination unit 113 that the theft has been performed in step S125. Then, the processing of this flow is completed.
  • the reporting unit 114 reports any of "green”, “orange”, and “red” based on the caution levels of “green”, “orange”, and “red”. Here, instead of “green”, “orange” and “red", the degree of suspicion of theft (80%, etc.) may be reported.
  • FIG. 9 is a diagram illustrating hand motion detection of the monitoring device 100 of the digital auto file security system.
  • the upper figure of FIG. 9 shows an image of a human being detected
  • the lower left figure of FIG. 9 shows the operation of a visitor picking up a product from E2
  • the lower right figure of FIG. 9 shows a visitor changing a product to E2.
  • the returned operation As shown in the upper figure of FIG. 9, the horizontal positions of the display shelves 15 are A, B, C, D, E, ..., And the vertical positions are 1, 2, 3, 4, ....
  • the visitor is image-recognized by the frame surrounded by the rectangle shown by the reference numeral a in the upper figure of FIG. It is assumed that the dominant hand of this visitor is the right hand, and the operation of picking up the product placed on E2 of the display shelf 15 with the right hand (see reference numeral b) is taken as an example.
  • the arrows in the lower left figure of FIG. 9 and the lower right figure of FIG. 9 indicate the movement of the hand over time.
  • the ratio of the intersection region of the rectangle surrounding E2 and the rectangle surrounding the right hand (see reference numeral b) to the entire E2 is calculated. As shown in the upper figure of FIG. 9, the evaluation value of the right hand was required to be "85".
  • the above-mentioned hand motion detection result is used in step S3 of FIG.
  • FIG. 10 is a diagram illustrating a shopping basket determination of a product of the monitoring device 100 of the digital auto file security system.
  • FIG. 11 is a flowchart showing the process. This flow is executed by the control unit 110 (see FIG. 2) of the monitoring device 100.
  • the upper figure of FIG. 10 shows an image of human detection
  • the lower left figure of FIG. 10 shows the operation of a visitor putting a product in a shopping cart
  • the lower right figure of FIG. 10 shows a visitor putting a product in a pocket or the like.
  • the horizontal positions of the display shelves 15 are A, B, C, D, E, ...
  • the vertical positions are 1, 2, 3, 4, ....
  • the visitor is image-recognized by the frame surrounded by the rectangle shown by the reference numeral a in the upper figure of FIG. It is assumed that the dominant hand of the visitor is the right hand, and the operation of putting the product placed on the display shelf 15 into a shopping cart or a pocket or the like is taken as an example. Learn the shapes of shopping carts 17 and carts in stores in advance.
  • step S201 the control unit 110 obtains an image from the digital camera 11 and the 3D camera 12 installed in front of the display shelf 15 and the showcase 16.
  • step S202 the posture of the human body is determined.
  • step S203 the hand of the relevant person is detected (see FIG. 9).
  • step S204 object detection is performed to detect the shopping cart 17 (see FIG. 10).
  • step S205 the person concerned determines whether or not he / she has the product in his / her hand (see FIG. 10). If the product is not in hand, the process proceeds to step S220. If the product is in hand, the right hand (dominant hand) position is determined in step 206.
  • step S207 it is determined whether or not the product is returned to the display shelf 15 or the case. If it is not returned to the display shelf 15 or the case, in step S208, the shelf allocation on which the product is placed, for example, the name of the product placed on 2E is specified (see FIG. 10). In step S209, the product name of the product is specified. By specifying the product name, from the theft weight parameter 135 (see Fig. 3), the theft performance weight 135a, which depends on the past performance, the theft price weight 135b, which depends on the price of the product, and the product can be obtained for each product code. The theft position weight 135c of the displayed display shelf can be obtained. In step S210, the picked product is registered, and information such as the date and time, the camera, the shelving allocation, the product name, the number of products, and the image is acquired.
  • step S207 the product name of the product is specified in step S211.
  • step S212 the returned product is registered, and in step S213, it is determined that the product has been returned to the display shelf 15 or the case, and the process proceeds to step S220.
  • step S214 it is determined in step S214 whether the product is to be stored in the shopping cart 17 (see FIG. 10).
  • step S215 the storage destination of the product in hand is specified.
  • step S216 the storage destination of the product is determined.
  • step S217 When the storage destination of the product is the shopping cart 17, it is determined in step S217 that the product has been placed in the shopping cart 17 (see the lower left figure of FIG. 10), and the process proceeds to step S220.
  • step S2108 When the storage destination of the product is a pocket, in step S218, it is determined that the product has been put in the pocket (see the lower right figure of FIG. 10), and the process proceeds to step S220. If the storage destination of the product is other, it is determined in step S219 that the product has been put in the bag or the like (see the lower right figure of FIG. 10), and the process proceeds to step S220.
  • step S220 the theft action determination unit 113 (see FIG. 2) of the control unit 110 refers to the theft weight parameter 135 (see FIG. 3) stored in the storage unit 130, and the theft weight of the picked-up product. To get.
  • step S221 the theft determination unit 113 performs the theft based on the image data (hand movement) detected by the hand motion detection unit 112 and the theft weight parameter 135 of the product stored in the storage unit 130. Determine if it is.
  • step S221 When the theft is performed (step S221: Yes), the reporting unit 114 reports the determination result to a predetermined terminal in response to the determination by the theft determination unit 113 that the theft has been performed in step S222. Then, the processing of this flow is completed.
  • the reporting unit 114 reports the degree of suspicion of theft (80%, etc.) along with the caution levels of "green”, “orange”, and “red” based on whether or not the product has been placed in the shopping cart 17. do.
  • the degree of suspicion of theft (attention of "green”, “orange” and “red”) is notified according to the product placed in the shopping cart 17, so store personnel can be a candidate for shoplifting. It is possible to take measures according to the degree of caution for sexual shoppers. For example, theft with "red” added can be dealt with more quickly, such as by having a shoplifter in charge.
  • the digital auto file security system 1000 stores the theft weight, which is a parameter of the ease of stealing an article, in association with the article.
  • the theft determination unit 113 that determines that the theft has been performed based on the hand motion data detected by the hand motion detection unit 112 and the theft weight of the article stored in the storage unit 130. Be prepared.
  • the theft action determination unit 113 determines whether or not the theft action has been performed based on the theft weight in addition to the image data, which means not only the movement of the hand but also the movement of the hand ( The purpose action of shoplifting) can be added, and the theft can be accurately determined.
  • the theft weight stored in the storage unit 130 depends on the past performance. As a result, a large weight can be added to a product with many shoplifting acts, and the accuracy of determining the theft act can be further improved. As a result, the occurrence of shoplifting can be further suppressed.
  • the theft weight stored in the storage unit 130 depends on the price of the article.
  • shoplifting when shoplifting is carried out, a large weight can be added to an expensive product having a large loss, and the accuracy of determining the theft can be further improved. As a result, the loss due to shoplifting can be further suppressed.
  • the theft weight stored in the storage unit 130 is determined by the display shelf on which the goods are displayed.
  • a large weight can be added to a product with many shoplifting acts, and the accuracy of determining the theft act can be further improved.
  • the occurrence of shoplifting can be further suppressed.
  • the digital auto file security system 1000 includes a reporting unit 114 that reports the determination result to a predetermined terminal in response to the determination that the theft act determination unit 113 has performed the theft act. ..
  • a reporting unit 114 that reports the determination result to a predetermined terminal in response to the determination that the theft act determination unit 113 has performed the theft act. ..
  • store personnel can promptly respond to shoplifting candidates.
  • shoplifters who may be candidates for shoplifting according to their degree of caution (such as having a person who handles shoplifting take charge). ) Can be taken.
  • the digital auto file security system 1000 includes an AI accelerator 200 which is a computing resource other than the CPU, and the person extraction unit 111 of the control unit 110 uses the AI accelerator 200 to use the AI accelerator 200 to provide a person in the security area. Is detected.
  • the AI accelerator 200 can detect a person existing in a wide security area in real time by executing a person detection process on a dedicated hardware separately from the CPU process. Moreover, even if a configuration using an inexpensive camera device is used, a person can be detected in real time. Further, since the AI accelerator 200 is used, it is possible to detect an intruder with extremely high accuracy as compared with the detection of a human body by a conventional surveillance camera.
  • FIG. 12 is a flowchart showing a process in which the control unit 110 of the monitoring device 100 in a coin laundry, an ATM, a financial institution, or the like of a digital auto file security system determines a theft act. This flow is executed by the control unit 110 (see FIG. 2) of the monitoring device 100.
  • the control unit 110 sets the vicinity of the settlement / exchange machine in a coin laundry or the like, for example, 2 to 3 m around the settlement / exchange machine as a yellow zone, and sets the inside of the yellow zone as a predetermined high theft weight.
  • step S302 the control unit 110 obtains, for example, an image of 1/10 second to 10/10 second from the digital camera (surveillance camera 11) installed in front of the payment / exchange machine according to the processing capacity of the computer. .. Then, using the obtained image, the entry of a visitor into the yellow zone is detected, and the staying time of the detected person is determined. If the staying time is longer than necessary, the possibility of theft is high.
  • step S303 the control unit 110 determines the number of persons who have been detected to enter the yellow zone. If two or more people are detected in the yellow zone near the checkout / exchange machine, the possibility of theft is high.
  • step S304 a digital camera (surveillance camera 11) is installed outside the entrance of the coin laundry or the like, and the control unit 110 monitors and determines whether there is a car, a motorcycle, or the like outside the building. If there is a car or motorcycle, the possibility of theft is high.
  • step S305 the control unit 110 determines whether the person in the yellow zone has a tool for prying open the checkout / exchange machine, such as a crowbar.
  • step S306 the hand movement detection unit 112 (see FIG. 2) of the control unit 110 detects the hand movement in the image extracted by the person extraction unit 111, and determines the hand movement to pry open the settlement / exchange machine. It is considered that there is a high possibility of theft if it is judged that the hand has opened the checkout / exchange machine, but as a result of the judgment error, the error alarm is not issued frequently.
  • Q [1: Two or more people in the yellow zone, 0: No one or no person in the yellow zone]
  • R [1: There is a car or motorcycle outside the building, 0: There are no cars or motorcycles outside the building]
  • S [1: A person has a tool, 0: The person does not have the tools]
  • T [1: Hand is prying open the checkout / exchange machine, 0: Hands have not opened the checkout / change machine]
  • the theft determination unit 113 determines the attention level X as a function of these variables P, Q, R, S, and T.
  • X f (P, Q, R, S, T
  • the above variable is a binary variable, but depending on the variable, it may be a multi-value variable or an analog variable.
  • the variable P may be the staying time itself, or the variable Q may be the number of people itself.
  • the settlement / exchange machine may be a settlement machine.
  • the reporting unit 114 In response to the determination of orange or red in step S307, the reporting unit 114 notifies the determination result to a predetermined terminal in step S308, and calls a suspicious person to end the processing of this flow. ..
  • the reporting unit 114 reports the degree of suspicion of theft (orange or red, or 80%, etc.). Upon receiving the report, the parties concerned can take prompt action.
  • the image data of the suspicious person (video data such as face image and behavior) temporarily saved is recorded in the recording unit 160 as evidence.
  • this digital auto file security system 1000 can be applied to the management of goods in showrooms of commercial facilities, shops in museums, goods in exhibition halls, and the like.
  • the theft weight which is a parameter of the ease of stealing the goods, is stored in the storage unit 130 (see FIG. 1) in association with the goods, as in the case of preventing shoplifting of goods in the store. ..
  • the theft act determination unit 113 determines that the theft act has been performed based on the motion data of the hand and the theft weight of the stored article.
  • an effective crime prevention system can be constructed for valuable (expensive) exhibits.
  • the weight of the theft price weight 135b of the theft weight parameter 135 shown in FIG. 3 is increased for the relevant exhibit (the highest rank is given to the valuable exhibit).
  • articles also include cash, and valuable exhibits can be treated in the same way as cash and given a theft weight.
  • the names of digital autofile security system and method are used, but this is for convenience of explanation, and includes a monitoring system, a security system, a search security method, and the like. May be good.
  • the digital autofile security system and method of the present invention are also realized by a program for making a computer function as the digital autofile security system or method of the present invention.
  • the program may be stored on a computer-readable recording medium.
  • the recording medium on which this program is recorded may be the ROM itself of the digital auto file security system, or a program reading device such as a CD-ROM drive is provided as an external storage device, and the recording medium is provided therein. It may be a CD-ROM or the like that can be read by inserting.
  • each of the above configurations, functions, processing units, processing means, etc. may be realized by hardware by designing a part or all of them by, for example, an integrated circuit. Further, each of the above configurations, functions, and the like may be realized by software for the processor to interpret and execute a program that realizes each function. Information such as programs, tables, and files that realize each function can be stored in memory, hard disks, recording devices such as SSDs (Solid State Drives), IC (Integrated Circuit) cards, SD (Secure Digital) cards, optical disks, etc. It can be held on a recording medium.
  • SSDs Solid State Drives
  • IC Integrated Circuit
  • SD Secure Digital
  • the digital auto file security system, method and program according to the present invention can be applied to business establishments requiring a high degree of management such as stores, coin laundry, factories, research institutes, information processing rooms, ATMs, financial institutions, and money collection rooms. Installation is expected.
  • commercial facilities, museums, exhibition halls, offices, hospitals, hotels, financial institutions, factories, laboratories, power plants, air terminals, meeting places, event halls, stadiums, precious metal stores, outside betting offices, race betting office tickets It also covers the inside and outside of buildings such as sales floors, the inside and outside of transportation trains, ferries, and airplanes.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Alarm Systems (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

Provided are a digital/autofile/security system, method, and program which can determine accurately a suspicious person from a captured image. The digital/autofile/security system (1000) is provided with: a storage unit (130) which stores a stealing weight, which is a parameter of the ease of stealing an article, in association with the article; a person extraction unit (111) which extracts a person candidate from an image captured by a camera that captures an image of a security area; a hand operation detection unit (112) which detects an operation of a hand in the image for which the extraction is performed by the person extraction unit (111); and a theft determination unit (113) which determines that theft has occurred on the basis of operation data of the hand, which is detected by the hand operation detection unit (112), and the stealing weight of the article, which is stored in the storage unit (130).

Description

デジタル・オートファイル・セキュリティシステム、方法及びプログラムDigital autofile security systems, methods and programs
 本発明は、防犯等のために監視カメラによりセキュリティ区域内を撮影して人による窃盗行為を検出するデジタル・オートファイル・セキュリティシステム、方法及びプログラムに関する。 The present invention relates to a digital autofile security system, method and program for detecting theft by a person by photographing the inside of a security area with a surveillance camera for crime prevention or the like.
 特許文献1には、「画像データに基づいて、窃盗行為が行われたか否かを判定する」(請求項1)、「万引き行為を行ったと判別される状況は、商品を鞄や衣服のポケットに入れる行為」(0021)と記載されている。特許文献1の技術は、万引き行為の発生を検出するシステムに関するものである。 Patent Document 1 states that "determine whether or not theft has been performed based on image data" (claim 1), and "in the situation where it is determined that shoplifting has been performed, the product is placed in a bag or a pocket of clothes. It is described as "the act of putting in" (0021). The technique of Patent Document 1 relates to a system for detecting the occurrence of shoplifting.
特許第6573185号公報Japanese Patent No. 6573185
 従来、窃盗行為を検出する場合は、特許文献1に記載されているように、画像データ中に撮像された人が窃盗行為を行ったか否かを示す情報を出力するように学習された学習済モデルを用いて、複数の撮像装置が取得した画像データに基づいて、窃盗行為が行われたか否かを判定していた。このために、精度の良い学習済モデルを用意しない場合には、不審者の判定に誤りが多く、実用的ではなかった。
 本発明の目的は、撮影画像から正確に不審者を判定することができるデジタル・オートファイル・セキュリティシステム、方法及びプログラムを提供することにある。
Conventionally, when detecting theft, as described in Patent Document 1, learned to output information indicating whether or not the person imaged in the image data has committed the theft. Using the model, it was determined whether or not the theft was committed based on the image data acquired by a plurality of imaging devices. For this reason, when a trained model with high accuracy is not prepared, there are many errors in the judgment of the suspicious person, which is not practical.
An object of the present invention is to provide a digital autofile security system, a method and a program capable of accurately determining a suspicious person from a captured image.
 本発明に係るデジタル・オートファイル・セキュリティシステムは、物品の盗まれやすさのパラメータである窃盗重みを物品と対応づけて記憶する窃盗重み記憶手段と、セキュリティ区域を撮影するカメラによって撮影された画像から人の候補を抽出する人抽出手段と、前記人抽出手段によって抽出された画像における手の動作を検出する手動作検出手段と、前記手動作検出手段によって検出された手の動作データ及び前記窃盗重み記憶手段に記憶されている物品の窃盗重みに基づいて、窃盗行為が行われたことを判定する窃盗行為判定手段とを備えることを特徴とする。 The digital auto file security system according to the present invention has a theft weight storage means for storing the theft weight, which is a parameter of the susceptibility of an article, in association with the article, and an image taken by a camera for capturing a security area. A person extraction means for extracting a person candidate from, a hand movement detection means for detecting a hand movement in an image extracted by the person extraction means, a hand movement data detected by the hand movement detection means, and the theft. It is characterized by comprising a theft act determining means for determining that a theft act has been performed based on the theft weight of an article stored in the weight storage means.
 この構成により、画像データに加えて、窃盗重みに基づいて窃盗行為が行われたか否かを判定しており、単なる手の動作だけではなく、手の動作に意味(物品を窃盗しようという目的動作)を付加することができ、正確に窃盗行為を判定することができる。 With this configuration, in addition to the image data, it is determined whether or not the theft has been performed based on the theft weight, and it means not only the movement of the hand but also the movement of the hand (the purpose of stealing the article). ) Can be added, and the theft can be accurately determined.
 前記窃盗重みは、過去の実績に依存することで、窃盗行為が多い物品について、大きい重み付けを付加することができ、窃盗行為の判定の精度をより高めることができる。その結果、窃盗行為をより抑制することができる。 The theft weight depends on the past performance, so that a large weight can be added to an article with many theft acts, and the accuracy of the determination of the theft act can be further improved. As a result, theft can be further suppressed.
 前記窃盗重みは、物品の価格に依存することで、窃盗行為が行われた場合に、損失が大きい高価な物品について、大きい重み付けを付加することができ、窃盗行為の判定の精度をより高めることができる。その結果、窃盗行為による損失をより抑制することができる。 Since the theft weight depends on the price of the article, a large weight can be added to an expensive article having a large loss when the theft is committed, and the accuracy of the determination of the theft can be further improved. Can be done. As a result, the loss due to theft can be further suppressed.
 前記窃盗重みは、物品が陳列されている陳列棚によって判断されることで、窃盗行為が多い商品について、大きい重み付けを付加することができ、窃盗行為の判定の精度をより高めることができる。その結果、窃盗行為の発生をより抑制することができる。 The theft weight is determined by the display shelf on which the goods are displayed, so that a large weight can be added to the product with many theft acts, and the accuracy of the determination of the theft act can be further improved. As a result, the occurrence of theft can be further suppressed.
 前記窃盗行為判定手段が、窃盗行為が行われたと判定したことを受けて、その判定結果を所定の端末に通報する通報手段を更に備えることで、例えば店舗関係者は、万引き候補に対し、迅速な対応をとることができる。 By further providing a reporting means for reporting the determination result to a predetermined terminal in response to the determination that the theft act has been performed by the theft act determining means, for example, a store-related person can promptly respond to a shoplifting candidate. Can be taken.
 また、本発明のデジタル・オートファイル・セキュリティ方法は、物品の盗まれやすさのパラメータである窃盗重みを物品と対応づけて記憶する窃盗重み記憶ステップと、セキュリティ区域を撮影するカメラによって撮影された画像から人の候補を抽出する人抽出ステップと、前記人抽出ステップによって抽出された画像における手の動作を検出する手動作検出ステップと、前記手動作検出ステップによって検出された手の動作データ及び前記窃盗重み記憶ステップで記憶されている物品の窃盗重みに基づいて、窃盗行為が行われたことを判定する窃盗行為判定ステップとを備えることを特徴とする。 Further, the digital auto file security method of the present invention was photographed by a theft weight storage step of storing the theft weight, which is a parameter of the susceptibility of an article, in association with the article, and a camera for photographing a security area. A person extraction step for extracting a person candidate from an image, a hand motion detection step for detecting a hand motion in an image extracted by the person extraction step, hand motion data detected by the hand motion detection step, and the above. It is characterized by including a theft act determination step for determining that a theft act has been performed based on the theft weight of an article stored in the theft weight storage step.
 また、本発明は、コンピュータを、物品の盗まれやすさのパラメータである窃盗重みを物品と対応づけて記憶する窃盗重み記憶手段と、セキュリティ区域を撮影するカメラによって撮影された画像から人の候補を抽出する人抽出手段と、前記人抽出手段によって抽出された画像における手の動作を検出する手動作検出手段と、前記手動作検出手段によって検出された手の動作データ及び前記窃盗重み記憶手段に記憶されている物品の窃盗重みに基づいて、窃盗行為が行われたことを判定する窃盗行為判定手段とを備えることを特徴とするデジタル・オートファイル・セキュリティシステムとして機能させるためのプログラムである。 Further, the present invention is a candidate for a person from a theft weight storage means for storing the theft weight, which is a parameter of the susceptibility to theft of an article, in association with the article, and an image taken by a camera for photographing a security area. To the human extraction means for extracting the image, the hand motion detection means for detecting the hand motion in the image extracted by the person extraction means, the hand motion data detected by the hand motion detection means, and the theft weight storage means. It is a program for functioning as a digital auto file security system, which is provided with a theft act determining means for determining that a theft act has been performed based on the theft weight of a stored article.
 本発明によれば、窃盗の対象となる物品に関する情報を加味することによって撮影画像から正確に不審者を判定することができる。 According to the present invention, a suspicious person can be accurately determined from a photographed image by adding information about an article to be stolen.
本発明の実施の形態に係るデジタル・オートファイル・セキュリティシステムの構成を示すブロック図である。It is a block diagram which shows the structure of the digital autofile security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタル・オートファイル・セキュリティシステムの監視装置の制御部のブロック図である。It is a block diagram of the control part of the monitoring device of the digital autofile security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタル・オートファイル・セキュリティシステムの監視装置の記憶部の窃盗重みパラメータを説明する図である。It is a figure explaining the theft weight parameter of the storage part of the monitoring device of the digital autofile security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタル・オートファイル・セキュリティシステムの携帯端末装置を利用したシステムを示す構成図である。It is a block diagram which shows the system using the mobile terminal apparatus of the digital autofile security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタル・オートファイル・セキュリティシステムのスマートフォンのセキュリティアプリ動作を示す図である。It is a figure which shows the security application operation of the smartphone of the digital autofile security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタル・オートファイル・セキュリティシステムの監視装置の制御部が窃盗行為を判定する処理を示すフローチャートである。It is a flowchart which shows the process which the control part of the monitoring device of the digital autofile security system which concerns on embodiment of this invention determines the theft act. 本発明の実施の形態に係るデジタル・オートファイル・セキュリティシステムのスーパーマーケット等の店舗内の営業時間中の警備を説明する図である。It is a figure explaining security during business hours in a store such as a supermarket of a digital autofile security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタル・オートファイル・セキュリティシステムの監視装置の制御部が窃盗行為を判定する処理を示すフローチャートである。It is a flowchart which shows the process which the control part of the monitoring device of the digital autofile security system which concerns on embodiment of this invention determines the theft act. 本発明の実施の形態に係るデジタル・オートファイル・セキュリティシステムの手の動作検出を説明する図である。It is a figure explaining the hand motion detection of the digital autofile security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタル・オートファイル・セキュリティシステムの監視装置の商品の買い物かご入れ判定を説明する図である。It is a figure explaining the shopping basket determination of the product of the monitoring device of the digital autofile security system which concerns on embodiment of this invention. 本発明の実施の形態に係るデジタル・オートファイル・セキュリティシステムの監視装置の制御部が窃盗行為を判定する処理を示すフローチャートである。It is a flowchart which shows the process which the control part of the monitoring device of the digital autofile security system which concerns on embodiment of this invention determines the theft act. 本発明の実施の形態に係るデジタル・オートファイル・セキュリティシステムのコインランドリー、ATM、金融機関等における監視装置の制御部が窃盗行為を判定する処理を示すフローチャートである。It is a flowchart which shows the process which the control part of the monitoring device in the coin laundry, ATM, the financial institution of the digital autofile security system which concerns on embodiment of this invention determines the theft act.
 以下、添付図面を参照しながら本発明を実施するための形態について詳細に説明する。
(実施の形態)
 図1は、本発明の実施の形態に係るデジタル・オートファイル・セキュリティシステムの構成を示すブロック図である。
 本デジタル・オートファイル・セキュリティシステムは、店舗、商業施設、美術館、展示場、企業の事務所、工場、研究所、情報処理室、ATM、金融機関、貴金属店及び金銭集計室等の高度の管理を要する事業所等に適用して好適である。
 本実施の形態は、本デジタル・オートファイル・セキュリティシステムを、店舗に適用した例である。店舗において、対象となる物品は、商品であり、窃盗行為は、万引きである。
Hereinafter, embodiments for carrying out the present invention will be described in detail with reference to the accompanying drawings.
(Embodiment)
FIG. 1 is a block diagram showing a configuration of a digital auto file security system according to an embodiment of the present invention.
This digital auto file security system provides advanced management of stores, commercial facilities, museums, exhibition halls, corporate offices, factories, laboratories, information processing rooms, ATMs, financial institutions, precious metal stores, money counting rooms, etc. It is suitable for business establishments that require
This embodiment is an example in which the digital auto file security system is applied to a store. In a store, the target goods are goods, and theft is shoplifting.
 図1に示すように、デジタル・オートファイル・セキュリティシステム1000は、セキュリティ区域に設置された複数の監視カメラ11と、人感センサ20と、セキュリティ区域内に設置されたWi-Fi(Wireless Fidelity)ターミナル(以下「Wi-Fi親機」という)30と、ビーコン親機40と、関係者(販売員)が携帯する携帯端末装置50(ID(Identification)端末)と、システム全体を制御する監視装置100と、AI(Artificial Intelligence:人工知能)アクセラレータ(Accelerator)200と、を備える。セキュリティ区域は、警戒エリア(警備対象エリア)であり、例えば、店舗売場である。 As shown in FIG. 1, the digital auto file security system 1000 includes a plurality of surveillance cameras 11 installed in a security area, a human sensor 20, and Wi-Fi (Wireless Fidelity) installed in the security area. A terminal (hereinafter referred to as "Wi-Fi master unit") 30, a beacon master unit 40, a mobile terminal device 50 (ID (Identification) terminal) carried by a person concerned (salesperson), and a monitoring device that controls the entire system. It includes 100 and an AI (Artificial Intelligence) accelerator (Accelerator) 200. The security area is a caution area (security target area), for example, a store sales floor.
 なお、監視装置100は、セキュリティ区域内に設置されているが、図示しないネットワークを介して外部に設置してもよい。監視装置100を、ネットワーク上のサーバに設置すると、複数のセキュリティ区域を監視対象とすることができる。 Although the monitoring device 100 is installed in the security area, it may be installed outside via a network (not shown). When the monitoring device 100 is installed on a server on the network, a plurality of security areas can be monitored.
<監視カメラ11>
 監視カメラ11は、セキュリティ区域内の画像を撮影する。
 監視カメラ11の一部又は全部は、PTZ(パン・チルト・ズーム)機能を有するPTZカメラであり、監視装置100により遠隔操作される。監視カメラ11は、セキュリティ該当建物の警備対象の店舗及び該当敷地エリアの各所に設置される。監視カメラ11が撮影した画像は、監視装置100に出力され、録画部160に記録される。
<Surveillance camera 11>
The surveillance camera 11 captures an image in the security area.
A part or all of the surveillance camera 11 is a PTZ camera having a PTZ (pan / tilt / zoom) function, and is remotely controlled by the surveillance device 100. Surveillance cameras 11 are installed in stores subject to security in buildings subject to security and in various locations in the relevant site area. The image taken by the surveillance camera 11 is output to the surveillance device 100 and recorded in the recording unit 160.
<人感センサ20>
 人感センサ20は、サーモカメラ又は赤外線カメラ等であり、セキュリティ区域内の感知対象物の温度を検出して、セキュリティ区域内の不審者を検出する。
<Human sensor 20>
The motion sensor 20 is a thermo camera, an infrared camera, or the like, and detects the temperature of a sensing object in the security area to detect a suspicious person in the security area.
<Wi-Fi親機30>
 Wi-Fi親機30は、Wi-Fiを用いて携帯端末装置50のWi-Fi子機51との間で情報をやり取りする。また、Wi-Fi親機30は、Wi-Fi測位による位置情報取得、すなわちWi-Fiアクセスポイントと所定の位置情報サービスを利用した位置情報を取得できる。
<Wi-Fi master unit 30>
The Wi-Fi master unit 30 uses Wi-Fi to exchange information with the Wi-Fi slave unit 51 of the mobile terminal device 50. Further, the Wi-Fi master unit 30 can acquire position information by Wi-Fi positioning, that is, can acquire position information using a Wi-Fi access point and a predetermined position information service.
<ビーコン親機40>
 ビーコンは、Bluetooth Low Energyを利用した無線技術である。ビーコンは、発信側のビーコン機器であるビーコン親機40と、ビーコン親機40からの電波受信に対応した携帯端末装置50のアプリ(後記ビーコン子機52に対応する)の組み合わせによって構成される。ビーコンは、識別に必要な固有のID情報を発信し、携帯端末装置50の当該ID情報に紐付けられたアプリにしか反応しない。携帯端末装置50のアプリは、ビーコン親機40と同じ識別子を登録しておく。携帯端末装置50のアプリ(ビーコン子機52)は、ビーコン機能を搭載したアプリケーション実行によりバックグラウンドで待機し、ビーコン親機40のビーコンに近接したときに所定アクションを励起する。
<Beacon master unit 40>
Beacon is a wireless technology that uses Bluetooth Low Energy. The beacon is composed of a combination of a beacon master unit 40, which is a beacon device on the transmitting side, and an application of a mobile terminal device 50 (corresponding to the beacon slave unit 52 described later) that supports reception of radio waves from the beacon master unit 40. The beacon transmits unique ID information necessary for identification, and reacts only to the application associated with the ID information of the mobile terminal device 50. The application of the mobile terminal device 50 registers the same identifier as the beacon master unit 40. The application (beacon slave unit 52) of the mobile terminal device 50 stands by in the background by executing an application equipped with a beacon function, and excites a predetermined action when approaching the beacon of the beacon master unit 40.
[携帯端末装置50]
 携帯端末装置50は、店舗の販売員などがそれぞれ携帯する。携帯端末装置50は、例えばスマートフォン50a、タブレット50b、又はノートパソコン50cなどである。携帯端末装置50は、このほか、携帯電話、PHS(Personal Handy-Phone System)、PDA(Personal Digital Assistants)、又は専用端末などである。本実施の形態では、携帯端末装置50は、店舗の販売員などが様々な場所(すなわち現在位置)で使用可能であり、図示しない電話回線を介して監視装置100からのメール又は動画を含む映像等を受信可能である。
[Mobile terminal device 50]
The mobile terminal device 50 is carried by a salesperson of a store or the like. The mobile terminal device 50 is, for example, a smartphone 50a, a tablet 50b, a notebook computer 50c, or the like. The mobile terminal device 50 is also a mobile phone, a PHS (Personal Handy-Phone System), a PDA (Personal Digital Assistants), a dedicated terminal, or the like. In the present embodiment, the mobile terminal device 50 can be used by a store salesperson or the like in various places (that is, the current position), and is an image including an email or a moving image from the monitoring device 100 via a telephone line (not shown). Etc. can be received.
 本実施の形態では、携帯端末装置50は、スマートフォン50a(ID端末)の利用を想定しており、各個人が様々な場所(すなわち現在位置)で使用可能である。携帯端末装置50のうちの一つは、図示しない警備会社に配置される。 In the present embodiment, the mobile terminal device 50 assumes the use of a smartphone 50a (ID terminal), and each individual can use it in various places (that is, the current position). One of the mobile terminal devices 50 is located at a security company (not shown).
 スマートフォン50aは、デジタル・オートファイル・セキュリティアプリ(以下、「セキュリティアプリ」という)を有する。セキュリティアプリを、例えば各アプリのバックグランド処理で起動させておくと、通信キャリア網(移動体通信網)、ウェブサービスクラウド300(後記図4参照)、又はインターネット303(後記図4参照)を経由して、ウェブサービスクラウド300上のクラウドサーバ301(後記図4参照)に接続でき、クラウドサーバ301から不審者に関するテキストを受け取ることができる。スマートフォン50aは、待受け画面等に不審者を検出したテキストを通知できる。 The smartphone 50a has a digital auto file security application (hereinafter referred to as "security application"). If the security application is started by the background processing of each application, for example, it goes through the communication carrier network (mobile communication network), the web service cloud 300 (see Fig. 4 below), or the Internet 303 (see Fig. 4 below). Then, the cloud server 301 (see FIG. 4 below) on the web service cloud 300 can be connected, and the text about the suspicious person can be received from the cloud server 301. The smartphone 50a can notify the text on which the suspicious person is detected to the standby screen or the like.
 スマートフォン50aは、Wi-Fi個別識別機(以下「Wi-Fi子機」という)51と、関係者の位置を捕捉するGPS53と、を備える。
 なお、スマートフォン50aは、ビーコン子機52を備えているものでもよい。又は、スマートフォン50aは、Wi-Fi子機51と、ビーコン子機52と、GPS53とのいずれか一つを備えるものでもよい。
The smartphone 50a includes a Wi-Fi individual identification device (hereinafter referred to as "Wi-Fi slave unit") 51 and a GPS 53 that captures the positions of related parties.
The smartphone 50a may be provided with the beacon slave unit 52. Alternatively, the smartphone 50a may include any one of the Wi-Fi slave unit 51, the beacon slave unit 52, and the GPS 53.
<Wi-Fi子機51>
 Wi-Fi子機51は、業務施設に設置されたWi-Fi親機30の電波を受信及び個別識別する。監視装置100は、施設内に設置されたWi-Fi親機30の配置情報をセフティ関連情報として記憶している。Wi-Fi子機51がWi-Fi親機30に近接すると、携帯端末装置50を携帯する関係者のIDと位置を判定することができる。
<Wi-Fi handset 51>
The Wi-Fi slave unit 51 receives and individually identifies the radio waves of the Wi-Fi master unit 30 installed in the business facility. The monitoring device 100 stores the arrangement information of the Wi-Fi master unit 30 installed in the facility as safety-related information. When the Wi-Fi slave unit 51 approaches the Wi-Fi master unit 30, it is possible to determine the ID and position of the person who carries the mobile terminal device 50.
<ビーコン子機52>
 ビーコン子機52は、ビーコン親機40からの電波受信に対応した携帯端末装置50のアプリである。ビーコン親機40は、ビーコン(識別に必要な固有のID情報)を発信し、携帯端末装置50のアプリ(ビーコン子機52)は、ビーコン親機40のビーコンに近接したときに所定アクションを励起する。
<Beacon handset 52>
The beacon slave unit 52 is an application of the mobile terminal device 50 that supports reception of radio waves from the beacon master unit 40. The beacon master unit 40 transmits a beacon (unique ID information necessary for identification), and the application (beacon slave unit 52) of the mobile terminal device 50 excites a predetermined action when approaching the beacon of the beacon master unit 40. do.
<GPS53>
 GPS53は、位置情報の電波をGPS衛星等から受信する。GPS53は、GPSアンテナを介して受信した情報より、現在位置情報を、緯度、経度及び高度の3つのパラメータとして算出して位置情報を取得する。取得した位置情報は、適時、監視装置100に送信される。
<GPS53>
The GPS 53 receives radio waves of position information from GPS satellites and the like. The GPS 53 acquires the position information by calculating the current position information as three parameters of latitude, longitude and altitude from the information received via the GPS antenna. The acquired position information is timely transmitted to the monitoring device 100.
 なお、本実施形態では、位置情報を取得する手段として、GPS衛星を利用した例を示したが、GPS以外の、基地局との位置関係を利用した方式でもよい。例えば、モバイル端末である携帯端末装置50として、Android(登録商標)スマートフォンやカメラ付き高機能携帯電話機を使用する場合、GPS53に代えて又は併用して、基地局及び携帯電話通信網(図示省略)を介して携帯電話会社サーバと情報の送受信を行い、接近確認から自端末の現在位置情報を取得することも可能である。 In the present embodiment, an example using GPS satellites is shown as a means for acquiring position information, but a method using a positional relationship with a base station other than GPS may also be used. For example, when an Android (registered trademark) smartphone or a high-performance mobile phone with a camera is used as the mobile terminal device 50, which is a mobile terminal, a base station and a mobile phone communication network (not shown) are used in place of or in combination with GPS53. It is also possible to send and receive information to and from the mobile phone company server via the mobile phone company and acquire the current location information of the own terminal from the proximity confirmation.
 また、Wi-Fi測位による位置情報取得、すなわちWi-Fiアクセスポイントと所定の位置情報サービスを利用した位置情報取得を用いてもよい。 Further, location information acquisition by Wi-Fi positioning, that is, location information acquisition using a Wi-Fi access point and a predetermined location information service may be used.
[監視装置100]
 監視装置100は、セキュリティ区域内に設置され、セキュリティ区域内を集中管理する。監視装置100は、一般的なサーバ計算機、又はパーソナルコンピュータ等であってよい。
[Monitoring device 100]
The monitoring device 100 is installed in the security area and centrally manages the security area. The monitoring device 100 may be a general server computer, a personal computer, or the like.
 監視装置100は、制御部110と、入力部120と、記憶部130(窃盗重み記憶手段)と、表示部140と、出力部150と、録画部160と、画像処理部170と、インタフェース(I/F)部180と、通信部190と、を備え、各部はバス195により接続される。 The monitoring device 100 includes a control unit 110, an input unit 120, a storage unit 130 (theft weight storage means), a display unit 140, an output unit 150, a recording unit 160, an image processing unit 170, and an interface (I). / F) A unit 180 and a communication unit 190 are provided, and each unit is connected by a bus 195.
 以降、「○○部は」と主体を記した場合は、制御部110が必要に応じROMから各プログラムを読み出した上でRAMにロードし、各機能(後記)を実行するものとする。各プログラムは、予め記憶部130に記憶されていてもよいし、他の記憶媒体又は通信媒体を介して、必要なときに監視装置100に取り込まれてもよい。 After that, when the subject is described as "○○ part is", the control unit 110 shall read each program from the ROM as necessary, load it into the RAM, and execute each function (described later). Each program may be stored in the storage unit 130 in advance, or may be incorporated into the monitoring device 100 when necessary via another storage medium or communication medium.
 制御部110は、CPU(Central Processing Unit)等により構成され、監視装置100全体を制御するとともに、制御プログラムを実行して、デジタル・オートファイル・セキュリティシステムとして機能させる。制御部110の詳細な構成については、後記する。 The control unit 110 is composed of a CPU (Central Processing Unit) and the like, controls the entire monitoring device 100, executes a control program, and functions as a digital auto file security system. The detailed configuration of the control unit 110 will be described later.
 入力部120は、操作盤120aを有し、キーボード、マウス、表示部140の画面上に設けられたタッチパネル又はマイクなど、監視装置100のユーザが指示などを入力するための入力機器である。 The input unit 120 has an operation panel 120a, and is an input device for the user of the monitoring device 100 to input instructions and the like, such as a keyboard, a mouse, and a touch panel or a microphone provided on the screen of the display unit 140.
 記憶部130は、ROM(Read Only Memory)、RAM(Random Access Memory)又はEEPROM(Electrically Erasable Programmable Read-Only Memory)などの不揮発性メモリからなり、制御部110が用いる各種データ及びプログラムなどを記憶する。記憶部130は、監視カメラ11から受信した静止画又は動画、制御部110が用いる各種データ及びプログラムなどを記憶する。 The storage unit 130 is composed of a non-volatile memory such as a ROM (Read Only Memory), a RAM (Random Access Memory), or an EEPROM (Electrically Erasable Programmable Read-Only Memory), and stores various data and programs used by the control unit 110. .. The storage unit 130 stores still images or moving images received from the surveillance camera 11, various data and programs used by the control unit 110, and the like.
 記憶部130は、物品の盗まれやすさのパラメータである窃盗重みパラメータ135を物品と対応づけて記憶する。
 本明細書において、「物品」には現金も含まれる。
The storage unit 130 stores the theft weight parameter 135, which is a parameter of the ease of stealing the article, in association with the article.
In the present specification, "goods" also includes cash.
 図3は、窃盗重みパラメータ135を説明する図である。
 図3に示すように、窃盗重みパラメータ135は、商品(物品)ごとに、過去の実績に依存する窃盗実績重み135a、商品の価格に依存する窃盗価格重み135b、及び商品が陳列されている陳列棚の窃盗位置重み135cからなる群より選択される少なくとも一つを用いる。本実施形態では、窃盗実績重み135a(窃盗実績重み付け値「A」)、窃盗価格重み135b(窃盗価格重み付け値「B」)、及び窃盗位置重み135c(窃盗位置重み付け値「C」)を用いる。
 窃盗重みは、例えば「1」~「10」(「1」が最小、「10」が最大)の範囲で設定される。
FIG. 3 is a diagram illustrating the theft weight parameter 135.
As shown in FIG. 3, the theft weight parameter 135 includes a theft performance weight 135a that depends on the past performance, a theft price weight 135b that depends on the price of the goods, and a display in which the goods are displayed for each product (article). Use at least one selected from the group consisting of shelf theft position weights 135c. In this embodiment, the theft performance weight 135a (theft performance weighting value “A”), the theft price weight 135b (theft price weighting value “B”), and the theft position weight 135c (theft position weighting value “C”) are used.
The theft weight is set, for example, in the range of "1" to "10"("1" is the minimum and "10" is the maximum).
 表示部140は、監視装置100の動作状況をはじめ、監視カメラ11から受信した画像、又は監視装置100を操作するためのGUI(Graphical User Interface)などを表示する。 The display unit 140 displays the operating status of the monitoring device 100, the image received from the monitoring camera 11, the GUI (Graphical User Interface) for operating the monitoring device 100, and the like.
 出力部150は、例えばオーディオインタフェースであり、セキュリティ区域内の音響システム158に対して監視装置100からの音声信号を出力する。監視装置100から音響システム158へ出力する音声信号としては、例えば、入力部120に設けられたマイクなどの音声入力装置から入力された音声信号、又は記憶部130に記憶された音楽データを制御部110が再生した音声信号であってよい。音響システム158は、アンプ及び店舗内に配置された複数のスピーカを備え、監視装置100から入力された信号を店舗内に発声する。 The output unit 150 is, for example, an audio interface, and outputs an audio signal from the monitoring device 100 to the sound system 158 in the security area. As the audio signal output from the monitoring device 100 to the acoustic system 158, for example, an audio signal input from an audio input device such as a microphone provided in the input unit 120, or music data stored in the storage unit 130 is controlled by the control unit. 110 may be the reproduced audio signal. The sound system 158 includes an amplifier and a plurality of speakers arranged in the store, and emits a signal input from the monitoring device 100 into the store.
 また、窃盗行為の検出時に店舗内に発声する音声は、店舗関係者が知っている、不審者の来訪を知らせる音楽などである。このように、窃盗行為の検出時に、窃盗行為の発生を知らせる音声(音楽)を店舗内に報知することで、店舗の各従業員に、不審者の来訪を知らせることができる。従業員間での連携が可能になり、より迅速に対応することができる。 In addition, the voice uttered in the store when the theft is detected is music known to the store personnel to notify the visit of a suspicious person. In this way, when a theft act is detected, a voice (music) notifying the occurrence of the theft act is notified in the store, so that each employee of the store can be notified of the visit of a suspicious person. Coordination between employees will be possible, and it will be possible to respond more quickly.
 録画部160は、HDD(Hard Disk Drive)などの外部記憶装置により構成され、監視カメラ11が撮影したセキュリティ区域内の画像を記録する。録画部160は、撮影後所定の短時間は高画質で録画し、その所定の短時間経過後は低画質に変換して所定の長時間まで録画すると共に高画質の撮影画像は消去し、制御部110が不審者を検出した時は、その時までの所定の短時間の高画質の撮影画像を保存する。 The recording unit 160 is composed of an external storage device such as an HDD (Hard Disk Drive), and records an image in the security area taken by the surveillance camera 11. The recording unit 160 records high-quality images for a predetermined short time after shooting, converts the image quality to low image quality after a predetermined short time has elapsed, records the images for a predetermined long time, and erases and controls the high-quality shot images. When the unit 110 detects a suspicious person, it saves a predetermined short-time high-quality photographed image up to that time.
 画像処理部170は、DSP(Digital Signal Processor)等により構成され、受信した画像に対して予め定められた処理を行う。予め定められた処理には、輪郭抽出、画像のリサイズ、又は解像度変換処理などがある。 The image processing unit 170 is composed of a DSP (Digital Signal Processor) or the like, and performs predetermined processing on the received image. Predetermined processing includes contour extraction, image resizing, resolution conversion processing, and the like.
 監視カメラ11で1秒間に撮影する画像が例えば5コマの画像である場合、1/5秒画像、2/5秒画像、3/5秒画像、4/5秒画像及び5/5秒画像の動きで、対象物の外形形状線を入力すれば、動く対象物の大きさが分かる。
 画像処理部170は、監視カメラ11で撮影された画像データを処理し、セキュリティ区域内の画像から人の存在の有無を判定するために制御部110に送る。
When the image captured by the surveillance camera 11 in 1 second is, for example, a 5-frame image, the 1/5 second image, the 2/5 second image, the 3/5 second image, the 4/5 second image, and the 5/5 second image. By inputting the outer shape line of the object in motion, the size of the moving object can be known.
The image processing unit 170 processes the image data taken by the surveillance camera 11 and sends it to the control unit 110 in order to determine the presence or absence of a person from the image in the security area.
 I/F部180は、セキュリティ区域内に配置された各監視カメラ11と監視装置100とを接続する。また、I/F部180は、図示しない本部、本社又は警備会社などにネットワーク又は専用回線により接続する。
 通信部190は、基地局を介して携帯端末装置50とデータを送受信する。通信部190は、無線通信機能を有し、例えばUSB(Universal Serial Bus)を用いて制御基板に接続される。
The I / F unit 180 connects each surveillance camera 11 arranged in the security area with the surveillance device 100. Further, the I / F unit 180 is connected to a headquarters, a head office, a security company, etc. (not shown) by a network or a dedicated line.
The communication unit 190 transmits / receives data to / from the mobile terminal device 50 via the base station. The communication unit 190 has a wireless communication function, and is connected to a control board using, for example, USB (Universal Serial Bus).
[制御部110]
 図2は、本発明の第1の実施の形態に係るデジタル・オートファイル・セキュリティシステムの監視装置100の制御部110のブロック図である。
 図2に示すように、制御部110は、CPU(Central Processing Unit)等により構成され、監視装置100全体を制御するとともに、制御プログラムを実行して、デジタル・オートファイル・セキュリティシステムとして機能させる。
 制御部110は、人抽出部111(人抽出手段)と、手動作検出部112(手動作検出手段)と、窃盗行為判定部113(窃盗行為判定手段)と、通報部114(通報手段)と、を備える。
[Control unit 110]
FIG. 2 is a block diagram of the control unit 110 of the monitoring device 100 of the digital autofile security system according to the first embodiment of the present invention.
As shown in FIG. 2, the control unit 110 is configured by a CPU (Central Processing Unit) or the like, controls the entire monitoring device 100, executes a control program, and functions as a digital auto file security system.
The control unit 110 includes a person extraction unit 111 (human extraction means), a hand motion detection unit 112 (hand motion detection means), a theft action determination unit 113 (theft action determination means), and a reporting unit 114 (reporting means). , Equipped with.
 制御部110は、人抽出部111が、セキュリティ区域を撮影するカメラによって撮影された画像から人の候補を抽出する。
 制御部110は、人抽出部111が、人の候補のブロック(図9上図の符号aに示す矩形参照)が人らしいと判定したことを受けて、人が存在すると判定する。
In the control unit 110, the person extraction unit 111 extracts a person candidate from the image taken by the camera that captures the security area.
The control unit 110 determines that a person exists after the person extraction unit 111 determines that the block of the candidate person (see the rectangle shown by the symbol a in the upper figure of FIG. 9) is human.
 制御部110は、手動作検出部112が、人抽出部111によって抽出された画像における手の動作を検出する。 In the control unit 110, the hand motion detection unit 112 detects the hand motion in the image extracted by the human extraction unit 111.
 制御部110は、窃盗行為判定部113が、手動作検出部112によって検出された手の動作データ及び記憶部130に記憶されている商品の窃盗重みに基づいて、窃盗行為が行われたか否かを判定する。例えば、窃盗実績重み135aと窃盗価格重み135bと窃盗位置重み135cの重み付け値の総和が、所定閾値Dより小さい)商品であれば、万引きされやすい商品でないと判定する。
 窃盗重みパラメータの値X=Σ(A+B+C)<D
In the control unit 110, whether or not the theft act is performed by the theft act determination unit 113 based on the hand motion data detected by the hand motion detection unit 112 and the theft weight of the product stored in the storage unit 130. To judge. For example, if the sum of the weighted values of the theft record weight 135a, the theft price weight 135b, and the theft position weight 135c is smaller than the predetermined threshold D), it is determined that the product is not likely to be shoplifted.
Theft weight parameter value X = Σ (A + B + C) <D
 制御部110は、通報部114が、窃盗行為判定部113によって窃盗行為が行われたと判定したことを受けて、その判定結果を所定の端末に通報する。通報部114は、例えば、窃盗の疑いの程度(80%など)を通報する。通報を受けて、店舗関係者は、万引き候補を注意して観察する。 The control unit 110 reports the determination result to a predetermined terminal after the reporting unit 114 determines that the theft act has been performed by the theft act determination unit 113. The reporting unit 114 reports, for example, the degree of suspicion of theft (80%, etc.). Upon receiving the report, store personnel carefully observe shoplifting candidates.
 制御部110は、撮影後所定の短時間は高画質で録画部160に録画し、その所定の短時間経過後は低画質に変換して所定の長時間まで録画すると共に高画質の撮影画像は消去し、撮影方向の変化を検出した時は、その時までの所定の短時間の高画質の撮影画像は保存する。 The control unit 110 records in the recording unit 160 with high image quality for a predetermined short time after shooting, converts the image quality to low image quality after the predetermined short time elapses, and records the captured image with high image quality for a predetermined long time. When the image is erased and a change in the shooting direction is detected, the high-quality shot image for a predetermined short time up to that time is saved.
 制御部110は、AIアクセラレータ200(後記)を用いて撮影画像を分析してセキュリティ区域内の人を検出する。制御部110は、AIアクセラレータ200に対して人検出要求を発行し、AIアクセラレータ200は、CPU以外でAIの計算を実行して、人検出結果を人抽出部111に送信する。人検出には高速性が求められるので、人検出にAIアクセラレータ200を用いている。 The control unit 110 analyzes the captured image using the AI accelerator 200 (described later) to detect a person in the security area. The control unit 110 issues a person detection request to the AI accelerator 200, and the AI accelerator 200 executes an AI calculation other than the CPU and transmits the person detection result to the person extraction unit 111. Since high speed is required for human detection, the AI accelerator 200 is used for human detection.
 本実施形態では、制御部110は、AIアクセラレータ200を用いて人を検出しているが、サーモカメラ(又は人感センサ20)で人を検出するようにしてもよい。すなわち、人感センサ20は、セキュリティ区域内の温度を検出する。そして、制御部110は、人感センサ20が人の体温を検出し、かつ、監視カメラ11がその撮影画像の変化を検出したことによって人(不審者候補)の存在を検出する。 In the present embodiment, the control unit 110 uses the AI accelerator 200 to detect a person, but the thermo camera (or motion sensor 20) may detect the person. That is, the motion sensor 20 detects the temperature in the security area. Then, the control unit 110 detects the presence of a person (suspicious person candidate) by detecting the body temperature of the person by the motion sensor 20 and detecting the change in the captured image by the surveillance camera 11.
 なお、制御部110は、AIアクセラレータ200を用いた人検出と、サーモカメラ(又は人感センサ)を用いた人検出とを組み合わせてもよい。例えば、セキュリティ区域内のうち、人検出の高速性が要求される、店舗売場についてはAIアクセラレータ200を用い、人検出の高速性が要求されない店舗売場外はサーモカメラ(又は人感センサ)を使用する。 Note that the control unit 110 may combine human detection using the AI accelerator 200 and human detection using a thermo camera (or motion sensor). For example, within the security area, the AI accelerator 200 is used for the store sales floor where high speed of person detection is required, and the thermo camera (or motion sensor) is used outside the store sales floor where high speed of human detection is not required. do.
 人抽出部111は、AIアクセラレータ200を用いて、セキュリティ区域を撮影するカメラによって撮影された画像をモノクロ2値画像に変換し、そのモノクロ2値画像から人の候補を抽出する。 The person extraction unit 111 uses the AI accelerator 200 to convert an image taken by a camera that photographs a security area into a monochrome binary image, and extracts a person candidate from the monochrome binary image.
 なお、本実施形態では、人検出の各処理にAIアクセラレータ200を使っているが、CPU処理(制御部110の制御プログラム実行)で行ってもよい。 Although the AI accelerator 200 is used for each process of detecting a person in the present embodiment, it may be performed by a CPU process (execution of a control program of the control unit 110).
[AIアクセラレータ200]
 AIアクセラレータ200は、人を検出する専用プロセッサであり、CPU以外の計算リソースを用いる。AIアクセラレータ200は、例えば、GPU(Graphics  Processing Unit)を強化したプロセッサよる画像処理、FPGA(Field-Programmable Gate Array)を用いた信号処理のアクセラレートである。また、AIアクセラレータ200は、専用ハード(例えば、GPU)上でAI(Artificial Intelligence:人工知能)の計算を実行する。
[AI Accelerator 200]
The AI accelerator 200 is a dedicated processor that detects a person, and uses a computing resource other than the CPU. The AI accelerator 200 is, for example, an accelerator for image processing by a processor enhanced with a GPU (Graphics Processing Unit) and signal processing using an FPGA (Field-Programmable Gate Array). Further, the AI accelerator 200 executes the calculation of AI (Artificial Intelligence) on a dedicated hardware (for example, GPU).
 通常のPCによるコンピュータの処理では、デジタル画像一枚あたり人(人体)の検出の処理を行うのに約1.5秒かかる。このため、本実施形態では、人の検出プロセッサであるAIアクセラレータ200を利用することで、PCによるコンピュータの処理の約10倍のパフォーマンスを得、侵入検出を迅速に実行する。また、本実施形態では、計算負荷が高いAIの計算を専用ハードであるAIアクセラレータ200に任せている。これにより、市販のカメラと安価な機器用いた構成であっても、リアルタイムにほとんど誤りなく人を検出可能であることが実証できた。 In computer processing by a normal PC, it takes about 1.5 seconds to detect a person (human body) per digital image. Therefore, in the present embodiment, by using the AI accelerator 200, which is a human detection processor, the performance of the computer processing by the PC is about 10 times higher, and the intrusion detection is executed quickly. Further, in the present embodiment, the calculation of AI, which has a high calculation load, is left to the AI accelerator 200, which is a dedicated hardware. As a result, it was demonstrated that a person can be detected in real time with almost no error even with a configuration using a commercially available camera and inexpensive equipment.
[デジタル・オートファイル・セキュリティシステム]
 図4は、本発明の実施形態に係る携帯端末装置50を利用したデジタル・オートファイル・セキュリティシステムを示す構成図である。
 図4に示すように、デジタル・オートファイル・セキュリティシステム1000は、ウェブサービスクラウド300上に、デジタル・オートファイル・セキュリティサービスを提供するクラウドサーバ(商用サーバ)301、クラウドサーバ301に連携して能動的に情報を取得してユーザのスマートフォン50a(携帯端末装置;ID端末)に通知するPush通知サーバ302を有する。ウェブサービスクラウド300は、インターネット303に接続される。ウェブサービスクラウド300上のクラウドサーバ301は、インターネット303を経由してスマートフォン50aにテキスト及び画像を送信することができる。また、スマートフォン50aは、インターネット303を経由してPush通知サーバ302からPush通知を受信する。さらに、クラウドサーバ301及びPush通知サーバ302は、LTE/3G網などの通信キャリア網(移動体通信網)(図示省略)を経由して、セキュリティアプリが搭載されたスマートフォン50aに接続する。
[Digital Auto File Security System]
FIG. 4 is a configuration diagram showing a digital auto file security system using the mobile terminal device 50 according to the embodiment of the present invention.
As shown in FIG. 4, the digital auto file security system 1000 is active on the web service cloud 300 in cooperation with the cloud server (commercial server) 301 and the cloud server 301 that provide the digital auto file security service. It has a Push notification server 302 that acquires information and notifies the user's smartphone 50a (portable terminal device; ID terminal). The web service cloud 300 is connected to the Internet 303. The cloud server 301 on the web service cloud 300 can transmit texts and images to the smartphone 50a via the Internet 303. Further, the smartphone 50a receives the push notification from the push notification server 302 via the Internet 303. Further, the cloud server 301 and the push notification server 302 are connected to the smartphone 50a equipped with the security application via a communication carrier network (mobile communication network) (not shown) such as an LTE / 3G network.
 図4に示すように、デジタル・オートファイル・セキュリティシステム1000は、万引き(物品窃盗)候補を検出し、店舗の販売員等が所持するスマートフォン50aにプッシュ通知する。
 スマートフォン50aに来た通知をユーザがタップすると、セキュリティアプリが起動して不審者のズーム画面を表示し、「万引き候補が検出されました」というテロップが流れる。同時にその内容が音声で読み上げられる。このように、スマートフォン50aの画面のテロップと音声とで不審者の通知が行われる。さらに、スマートフォン50aユーザの操作により、例えば緊急時には関係機関(警察・消防)に通知する。この場合、警備会社や関係企業本社にも自動的に通知される。また、緊急性がない場合や確認したい場合には、警備会社のみに通知する。
As shown in FIG. 4, the digital auto file security system 1000 detects shoplifting (article theft) candidates and push-notifies the smartphone 50a owned by a store salesperson or the like.
When the user taps the notification that comes to the smartphone 50a, the security application is activated and the zoom screen of the suspicious person is displayed, and a telop saying "Shoplifting candidate has been detected" is played. At the same time, the content is read aloud. In this way, the suspicious person is notified by the telop and voice on the screen of the smartphone 50a. Further, by operating the smartphone 50a user, for example, in an emergency, the related organizations (police / fire department) are notified. In this case, the security company and the head office of the affiliated company are also automatically notified. Also, if there is no urgency or if you want to confirm, only the security company will be notified.
[セキュリティアプリ動作]
 図5は、スマートフォン50aのセキュリティアプリ動作を示す図である。
 図5左に示すように、スマートフォン50aの待受け画面等に不審者を検出したテロップが通知される。ユーザのタップにより、図5中に示すように、スマートフォン50aの表示はセキュリティアプリ動作表示に切り替わり、不審者のズーム画面を表示し、不審者の位置と状況「○○売場△△ブロックに不審者」を表示する。また、このテロップを自動音声で読み上げる。さらに、ユーザのタップにより、図5右に示すように、スマートフォン50aの表示を時系列の4画面に表示する。
[Security application operation]
FIG. 5 is a diagram showing the operation of the security application of the smartphone 50a.
As shown on the left side of FIG. 5, a telop that detects a suspicious person is notified on the standby screen or the like of the smartphone 50a. By tapping the user, as shown in FIG. 5, the display of the smartphone 50a is switched to the security application operation display, the zoom screen of the suspicious person is displayed, and the position and situation of the suspicious person "○○ sales floor △△ block is suspicious person". Is displayed. In addition, this telop is read aloud by automatic voice. Further, by tapping the user, the display of the smartphone 50a is displayed on four time-series screens as shown on the right side of FIG.
 以下、上述のように構成されたデジタル・オートファイル・セキュリティシステムの動作について説明する。
[窃盗行為判定処理]
 図6は、デジタル・オートファイル・セキュリティシステムの監視装置100の制御部110が窃盗行為を判定する処理を示すフローチャートである。本フローは、監視装置100の制御部110(図2参照)により実行される。
 ステップS1で、制御部110は、セキュリティ区域を撮影するデジタルカメラ(監視カメラ11)からコンピュータの処理能力に合わせて、例えば0.2秒毎等に画像を得る。
 ステップS2で、制御部110の人抽出部111(図2参照)は、AIアクセラレータ200で人抽出を行い、
 ステップS3で、制御部110の手動作検出部112(図2参照)は、人抽出部111によって抽出された画像における手の動作を検出する(後記図9参照)。
Hereinafter, the operation of the digital auto file security system configured as described above will be described.
[Theft judgment processing]
FIG. 6 is a flowchart showing a process in which the control unit 110 of the monitoring device 100 of the digital auto file security system determines the theft act. This flow is executed by the control unit 110 (see FIG. 2) of the monitoring device 100.
In step S1, the control unit 110 obtains an image from the digital camera (surveillance camera 11) that captures the security area, for example, every 0.2 seconds according to the processing power of the computer.
In step S2, the person extraction unit 111 (see FIG. 2) of the control unit 110 extracts people with the AI accelerator 200.
In step S3, the hand motion detection unit 112 (see FIG. 2) of the control unit 110 detects the hand motion in the image extracted by the human extraction unit 111 (see FIG. 9 below).
 ステップS4で、制御部110の窃盗行為判定部113(図2参照)は、記憶部130に記憶している窃盗重みパラメータ135(図3参照)を参照して、手に取った商品の窃盗重みを取得する。例えば、窃盗行為判定部113は、手に取った商品に対して、過去の実績に依存する窃盗実績重み135a(窃盗実績重み「A」という)、商品の価格に依存する窃盗価格重み135b(窃盗価格重み「B」という)、商品が陳列されている陳列棚の窃盗位置重み135c(窃盗位置重み「C」という)を取得する。 In step S4, the theft action determination unit 113 (see FIG. 2) of the control unit 110 refers to the theft weight parameter 135 (see FIG. 3) stored in the storage unit 130, and the theft weight of the picked-up product. To get. For example, the theft determination unit 113 has a theft record weight 135a (referred to as the theft record weight “A”) that depends on past performance and a theft price weight 135b (theft) that depends on the price of the product. The price weight (referred to as "B") and the theft position weight 135c (referred to as the theft position weight "C") of the display shelf on which the product is displayed are acquired.
 ステップS5で、窃盗行為判定部113は、手動作検出部112によって検出された画像データ(手の動作)及び記憶部130に記憶されている商品の窃盗重みパラメータ135に基づいて窃盗行為が行われたか否かを判定する。例えば、手の動作が不自然であっても、商品の窃盗重みが小さい(窃盗実績重み135aの重み付け値Aと、窃盗価格重み135bの重み付け値Bと、窃盗位置重み135cの重み付け値Cの総和が所定閾値Dより小さい)商品であれば、万引きされやすい商品でないと判定する(次式参照)。
 窃盗重みパラメータの値X=Σ(A+B+C)<D
 例えば、図3の商品コード「1002」の商品では、窃盗実績重み135aと窃盗価格重み135bとが最高ランク「10」であるため、窃盗位置重み135cが最低ランク「0」であっても、重み付け値の総和が所定閾値D(=15)以上であり、万引きされやすい商品と判定する。
In step S5, the theft determination unit 113 performs the theft based on the image data (hand movement) detected by the hand motion detection unit 112 and the theft weight parameter 135 of the product stored in the storage unit 130. Determine if it is. For example, even if the movement of the hand is unnatural, the theft weight of the product is small (the sum of the weighted value A of the theft record weight 135a, the weighted value B of the theft price weight 135b, and the weighted value C of the theft position weight 135c). If the product is smaller than the predetermined threshold D), it is determined that the product is not easily shoplifted (see the following equation).
Theft weight parameter value X = Σ (A + B + C) <D
For example, in the product of the product code “1002” in FIG. 3, the theft record weight 135a and the theft price weight 135b have the highest rank “10”, so even if the theft position weight 135c has the lowest rank “0”, the weight is given. The total value is equal to or greater than the predetermined threshold D (= 15), and it is determined that the product is easily shoplifted.
 ただし、商品ロスが多発している商品では、その商品の窃盗実績重み135aの重み付けを大きくしておくことができ、この場合は、万引きであると判定されやすくなる。逆に、手の動作がそれほど不自然でなくても、商品の窃盗重みが大きい(窃盗実績重み135aと窃盗価格重み135bと窃盗位置重み135cの重み付け値の総和が所定閾値より大きい)商品であれば、万引きされやすい商品であると判定する。
 上記は一例である。例えば、手動作検出部112によって検出された手の動作で取られた商品に、窃盗実績重み「A」、窃盗価格重み「B」、窃盗位置重み「C」のいずれか1つでも付加されている場合には、窃盗行為が行われたと判定してもよい。
However, in the case of a product in which product loss occurs frequently, the weight of the theft record weight 135a of the product can be increased, and in this case, it is easy to determine that the product is shoplifting. On the contrary, even if the movement of the hand is not so unnatural, the product has a large theft weight (the sum of the weights of the theft record weight 135a, the theft price weight 135b, and the theft position weight 135c is larger than the predetermined threshold). For example, it is determined that the product is easily shoplifted.
The above is an example. For example, any one of the theft record weight "A", the theft price weight "B", and the theft position weight "C" is added to the product taken by the hand movement detected by the hand movement detection unit 112. If so, it may be determined that the theft has been committed.
 窃盗行為が行われた場合(ステップS5:Yes)、ステップS6で通報部114は、窃盗行為判定部113によって窃盗行為が行われたと判定したことを受けて、その判定結果を所定の端末に通報して本フローの処理を終了する。通報部114は、例えば、窃盗の疑いの程度(80%など)を通報する。通報を受けて、店舗関係者は、万引き候補を注意して観察する。店舗関係者は、万引き候補が該当商品をポケットやマイバックに入れること、該当商品をレジで精算しないことを迅速に判断することができる。 When the theft is performed (step S5: Yes), the reporting unit 114 reports the determination result to a predetermined terminal in response to the determination by the theft determination unit 113 that the theft has been performed in step S6. Then, the processing of this flow is completed. The reporting unit 114 reports, for example, the degree of suspicion of theft (80%, etc.). Upon receiving the report, store personnel carefully observe shoplifting candidates. Store officials can quickly determine that shoplifting candidates will put the product in their pockets or my bag, and that the product will not be settled at the cash register.
 なお、店舗関係者等に通報を行った場合、一時保存していた不審者の画像データ(顔画像や挙動などの動画データ)を証拠として録画部160に録画しておく。
 窃盗行為が行われなかった場合(ステップS5:No)、本フローの処理を終了する。
When a report is made to a store-related person or the like, the temporarily saved image data of the suspicious person (video data such as a face image and behavior) is recorded in the recording unit 160 as evidence.
If the theft is not performed (step S5: No), the process of this flow is terminated.
 これによって、撮影画像から正確に窃盗行為を判定することができる。すなわち、画像データに加えて、窃盗重みに基づいて窃盗行為が行われたか否かを判定することで、単なる手の動作だけではなく、手の動作に意味(万引きしようという目的動作)を付加することができ、正確に窃盗行為を判定することができる。 This makes it possible to accurately determine the theft from the captured image. That is, by determining whether or not the theft has been performed based on the theft weight in addition to the image data, not only the movement of the hand but also the movement of the hand (the purpose movement for shoplifting) is added. It is possible to accurately determine the theft.
[店舗での不審者自動登録]
 図7は、デジタル・オートファイル・セキュリティシステムの監視装置100のスーパーマーケット等の店舗内の営業時間中の警備を説明する図である。図8は、その処理を示すフローチャートである。本フローは、監視装置100の制御部110(図2参照)により実行される。
[Automatic registration of suspicious persons at stores]
FIG. 7 is a diagram illustrating security during business hours in a store such as a supermarket of the monitoring device 100 of the digital auto file security system. FIG. 8 is a flowchart showing the process. This flow is executed by the control unit 110 (see FIG. 2) of the monitoring device 100.
 図7に示す店舗(セキュリティ区域)には、デジタルカメラ11(監視カメラ)、デプスカメラ等の3Dカメラ12(監視カメラ)が設置され、LAN(Local Area Network)13を介してセキュリティ区域内に配置された監視装置100に接続される。なお、LAN13は、無線LANであってもよい。
 デジタルカメラ11及び3Dカメラ12は、店舗売場の陳列棚(ゴンドラ)15及びショーケース16(陳列棚)、買い物客を撮影して画像データを取得する。
In the store (security area) shown in FIG. 7, 3D cameras 12 (surveillance cameras) such as a digital camera 11 (surveillance camera) and a depth camera are installed and arranged in the security area via a LAN (Local Area Network) 13. It is connected to the monitoring device 100. The LAN 13 may be a wireless LAN.
The digital camera 11 and the 3D camera 12 photograph the display shelf (gondola) 15 and the showcase 16 (display shelf) of the store sales floor, and shoppers to acquire image data.
 陳列棚15及びショーケース16に陳列された商品(図示省略)には、図3に示す記憶部130の窃盗重みパラメータ135に、商品コードごとに、過去の実績に依存する窃盗実績重み135a、商品の価格に依存する窃盗価格重み135b、及び商品が陳列されている陳列棚の窃盗位置重み135cが保存されている。例えば、図7に示す陳列棚15aに陳列されている商品は、窃盗実績重み135aの重み付けが大きい商品であり、ショーケース16bに陳列されている商品は、窃盗価格重み135bの重み付けが大きい商品である。 The products displayed on the display shelves 15 and the showcase 16 (not shown) include the theft weight parameter 135 of the storage unit 130 shown in FIG. 3, the theft performance weight 135a depending on the past performance for each product code, and the product. The theft price weight 135b, which depends on the price of the goods, and the theft position weight 135c of the display shelf on which the goods are displayed are stored. For example, the product displayed on the display shelf 15a shown in FIG. 7 is a product having a large weighting of the theft record weight 135a, and the product displayed in the showcase 16b is a product having a large weighting of the theft price weight 135b. be.
 買い物客は、買い物かご17に商品を入れて移動するか、商品を手に持って店舗売場を移動し、レジ18で精算する。 The shopper puts the product in the shopping cart 17 and moves, or holds the product in his hand and moves to the store sales floor, and pays at the cash register 18.
 図8に示すように、監視装置100は、開店時間、例えば朝などに、本セキュリティシステムが警備を開始する。
 ステップS101で制御部110は、陳列棚15やショーケース16前に設置されたデジタルカメラ11、3Dカメラ12から画像を得る。
 ステップS102で、人体を検出する。
 ステップS103で、人物を顔認証などによって認証する。
 ステップS104で、該当者の手を検出する(後記図9参照)。
 ステップS105で、物体(買い物かご17)を検出する。
As shown in FIG. 8, the monitoring device 100 is guarded by the security system at the opening time, for example, in the morning.
In step S101, the control unit 110 obtains an image from the digital camera 11 and the 3D camera 12 installed in front of the display shelf 15 and the showcase 16.
In step S102, the human body is detected.
In step S103, the person is authenticated by face recognition or the like.
In step S104, the hand of the relevant person is detected (see FIG. 9 below).
In step S105, the object (shopping cart 17) is detected.
 ステップS106で、該当者は買い物かご17を所持するか否かを判定する。
 買い物かご17を所持する場合、ステップS107で買い物かご17有りと判定してステップS109に進む。
 買い物かご17を所持しない場合、ステップS108で買い物かご17無しと判定してステップS109に進む。
In step S106, the person concerned determines whether or not he / she has the shopping cart 17.
When possessing the shopping cart 17, it is determined in step S107 that there is a shopping cart 17, and the process proceeds to step S109.
If the shopping cart 17 is not possessed, it is determined in step S108 that there is no shopping cart 17, and the process proceeds to step S109.
 ステップS109で、商品を手に取ったか、戻したかを判定する(後記図9参照)。
 商品を陳列棚15等に戻した場合、ステップS110で「グリーン」と判定してステップS123に進む。
 ここで、「グリーン」と、後記する「オレンジ」及び「レッド」は、万引き要注意者(万引き候補)の注意度を示す指標である。「グリーン」は(正常)、「オレンジ」は(注意)、「レッド」は(異常)として、買い物客の行動パターンの判定条件に加える。
In step S109, it is determined whether the product is picked up or returned (see FIG. 9 below).
When the product is returned to the display shelf 15 or the like, it is determined as “green” in step S110, and the process proceeds to step S123.
Here, "green" and "orange" and "red", which will be described later, are indexes indicating the degree of attention of shoplifting caution persons (shoplifting candidates). "Green" is (normal), "orange" is (caution), and "red" is (abnormal), and they are added to the judgment conditions of the shopper's behavior pattern.
 上記ステップS109で、いずれでもない(商品に手を触れていない)場合、「グリーン」等の判定は行わずそのままステップS123に進む。
 上記ステップS109で、商品を手に取った場合、ステップS111で、商品を買い物かご17に入れたか否かを判定する(後記図10参照)。商品を買い物かご17に入れた場合、ステップS112で「グリーン」と判定してステップS123に進む。
In step S109 above, if neither is the case (the product is not touched), the determination of "green" or the like is not performed, and the process proceeds to step S123 as it is.
When the product is picked up in step S109, it is determined in step S111 whether or not the product is put in the shopping cart 17 (see FIG. 10 below). When the product is put in the shopping cart 17, it is determined as "green" in step S112, and the process proceeds to step S123.
 商品を買い物かご17に入れていない場合、ステップS113で、商品をポケットやカバン等に入れたか否かを判定する。商品をポケットやカバン等に入れた場合、万引きの可能性があると判断してステップS114で「オレンジ」と判定してステップS115に進む。「オレンジ」と判定した場合、上記ステップS103で人物認証(特に顔認証)した結果と「オレンジ」判定結果とを紐づけて記憶部130(図1参照)に記憶する。 If the product is not in the shopping cart 17, it is determined in step S113 whether or not the product is in the pocket, bag, or the like. When the product is put in a pocket, bag, or the like, it is determined that there is a possibility of shoplifting, and it is determined as "orange" in step S114, and the process proceeds to step S115. When it is determined to be "orange", the result of person authentication (particularly face authentication) in step S103 and the "orange" determination result are associated and stored in the storage unit 130 (see FIG. 1).
 ステップS115で、制御部110は、記憶部130に記憶された過去の「オレンジ」判定結果をもとに、該当人物が過去にもオレンジ判定されたか否かを判定し、該当人物が過去にもオレンジ判定されている場合、ステップS116で該当人物を「レッド」と判定してステップS123に進む。過去にオレンジ判定されていない場合、「オレンジ」等の判定は行わずそのままステップS123に進む。なお、「レッド」と判定した人物は、万引き(窃盗行為)者として、画像データ(顔画像や挙動などの動画データ)を証拠として録画部160に録画しておく。 In step S115, the control unit 110 determines whether or not the relevant person has been determined to be orange in the past based on the past "orange" determination result stored in the storage unit 130, and the relevant person has also been determined to be orange in the past. If the determination is orange, the corresponding person is determined to be "red" in step S116, and the process proceeds to step S123. If the orange determination has not been made in the past, the determination such as "orange" is not performed and the process proceeds to step S123 as it is. A person who is determined to be "red" is recorded in the recording unit 160 as proof of image data (video data such as a face image and behavior) as a shoplifter (theft).
 一方、上記ステップS113で商品をポケットやカバン等に入れていなければ、ステップS117で制御部110は、レジ18(図7参照)前に設置されたデジタルカメラ11aから画像を得る。
 ステップS118で、買い物客がレジ18で精算したか否かを判定する。
 レジ18で精算した場合、ステップS119で「グリーン」と判定してステップS123に進む。
On the other hand, if the product is not put in the pocket, bag, or the like in step S113, the control unit 110 obtains an image from the digital camera 11a installed in front of the cash register 18 (see FIG. 7) in step S117.
In step S118, it is determined whether or not the shopper has settled at the cash register 18.
When the payment is made at the cash register 18, it is determined as "green" in step S119, and the process proceeds to step S123.
 レジ18で精算していない場合、ステップS120で「オレンジ」と判定してステップS121に進む。過去にもオレンジ判定されている場合、ステップS116で「レッド」と判定と判定してステップS123に進む。過去にオレンジ判定されていない場合、「レッド」判定は行わずステップS123に進む。 If the payment has not been made at the cash register 18, it is determined as "orange" in step S120 and the process proceeds to step S121. If the orange determination has been made in the past, the determination is determined to be "red" in step S116, and the process proceeds to step S123. If the orange determination has not been made in the past, the "red" determination is not performed and the process proceeds to step S123.
 ステップS123で、制御部110の窃盗行為判定部113(図2参照)は、記憶部130に記憶している窃盗重みパラメータ135(図3参照)を参照して、手に取った商品の窃盗重みを取得する。 In step S123, the theft action determination unit 113 (see FIG. 2) of the control unit 110 refers to the theft weight parameter 135 (see FIG. 3) stored in the storage unit 130, and the theft weight of the picked-up product. To get.
 ステップS124で、窃盗行為判定部113は、手動作検出部112によって検出された画像データ(手の動作)及び記憶部130に記憶されている商品の窃盗重みパラメータ135に基づいて窃盗行為が行われたか否かを判定する。 In step S124, the theft determination unit 113 performs the theft based on the image data (hand movement) detected by the hand motion detection unit 112 and the theft weight parameter 135 of the product stored in the storage unit 130. Determine if it is.
 窃盗行為が行われた場合(ステップS124:Yes)、ステップS125で通報部114は、窃盗行為判定部113によって窃盗行為が行われたと判定したことを受けて、その判定結果を所定の端末に通報して本フローの処理を終了する。通報部114は、「グリーン」、「オレンジ」及び「レッド」の注意度をもとに、「グリーン」、「オレンジ」及び「レッド」のいずれかを通報する。ここで、「グリーン」、「オレンジ」及び「レッド」に代えて、窃盗の疑いの程度(80%など)を通報してもよい。 When the theft is performed (step S124: Yes), the reporting unit 114 reports the determination result to a predetermined terminal in response to the determination by the theft determination unit 113 that the theft has been performed in step S125. Then, the processing of this flow is completed. The reporting unit 114 reports any of "green", "orange", and "red" based on the caution levels of "green", "orange", and "red". Here, instead of "green", "orange" and "red", the degree of suspicion of theft (80%, etc.) may be reported.
 このように、窃盗の疑いの程度(「グリーン」、「オレンジ」及び「レッド」の注意度)を通知するので、店舗関係者は、万引き候補の可能性のある買い物客に対し、注意度に応じた対応をとることができる。例えば、「レッド」が付加された窃盗行為に対しては、万引き対応の人を担当させるなど、より迅速に対応することができる。 In this way, the degree of suspicion of theft (attention of "green", "orange" and "red") is notified, so the store officials pay attention to shoplifters who may be shoplifting candidates. You can take appropriate measures. For example, theft with "red" added can be dealt with more quickly, such as by having a shoplifter in charge.
[手の動作検出]
 図9は、デジタル・オートファイル・セキュリティシステムの監視装置100の手の動作検出を説明する図である。図9上図は、人間検出された画像を示す図、図9左下図は、来店者がE2から商品を手に取った動作を示す図、図9右下図は、来店者が商品をE2に戻した動作を示す図である。
 図9上図に示すように、陳列棚15の横方向の位置をA,B,C,D,E,…、縦方向の位置を1,2,3,4,…とする。来店者は、図9上図の符号aに示す矩形で囲んだ枠で画像認識される。この来店者の利き手は、右手であるとし、陳列棚15のE2に置かれた商品を、右手(符号b参照)で取る動作を例に採る。
[Hand motion detection]
FIG. 9 is a diagram illustrating hand motion detection of the monitoring device 100 of the digital auto file security system. The upper figure of FIG. 9 shows an image of a human being detected, the lower left figure of FIG. 9 shows the operation of a visitor picking up a product from E2, and the lower right figure of FIG. 9 shows a visitor changing a product to E2. It is a figure which shows the returned operation.
As shown in the upper figure of FIG. 9, the horizontal positions of the display shelves 15 are A, B, C, D, E, ..., And the vertical positions are 1, 2, 3, 4, .... The visitor is image-recognized by the frame surrounded by the rectangle shown by the reference numeral a in the upper figure of FIG. It is assumed that the dominant hand of this visitor is the right hand, and the operation of picking up the product placed on E2 of the display shelf 15 with the right hand (see reference numeral b) is taken as an example.
 商品の陳列ケースのフェース割りに応じて縦1から4、横A~Eの名称をつける。例えばE2に万引きが多発する商品が置かれていることが事前にわかっているとすると、人間の手がE2から商品を取ったり、逆にE2に戻したりする動作を検出する。
 図9左下図および図9右下図の矢印は、時間経過に伴う手の動きを示している。
Names 1 to 4 in the vertical direction and A to E in the horizontal direction according to the face division of the product display case. For example, if it is known in advance that a product with frequent shoplifting is placed in E2, the action of a human hand picking up the product from E2 and returning it to E2 is detected.
The arrows in the lower left figure of FIG. 9 and the lower right figure of FIG. 9 indicate the movement of the hand over time.
 E2を囲む矩形と右手を囲む矩形(符号b参照)との交差領域がE2全体に対して占める割合を求める。図9上図に示すように、右手の評価値は、「85」であることが求められた。
 上記、手の動作検出結果は、図6のステップS3で用いられる。
The ratio of the intersection region of the rectangle surrounding E2 and the rectangle surrounding the right hand (see reference numeral b) to the entire E2 is calculated. As shown in the upper figure of FIG. 9, the evaluation value of the right hand was required to be "85".
The above-mentioned hand motion detection result is used in step S3 of FIG.
[商品の買い物かご入れ判定]
 図10は、デジタル・オートファイル・セキュリティシステムの監視装置100の商品の買い物かご入れ判定を説明する図である。図11は、その処理を示すフローチャートである。本フローは、監視装置100の制御部110(図2参照)により実行される。
[Judgment of product shopping basket]
FIG. 10 is a diagram illustrating a shopping basket determination of a product of the monitoring device 100 of the digital auto file security system. FIG. 11 is a flowchart showing the process. This flow is executed by the control unit 110 (see FIG. 2) of the monitoring device 100.
 図10上図は、人間検出された画像を示す図、図10左下図は、来店者が買い物かごに商品を入れる動作を示す図、図10右下図は、来店者がポケット等に商品を入れる動作を示す図である。
 図10上図に示すように、陳列棚15の横方向の位置をA,B,C,D,E,…、縦方向の位置を1,2,3,4,…とする。来店者は、図10上図の符号aに示す矩形で囲んだ枠で画像認識される。この来店者の利き手は、右手であるとし、陳列棚15に置かれた商品を、買い物かごに入れる、又はポケット等に入れる動作を例に採る。
 店舗の買い物かご17やカートの形状を事前に学習させておく。
The upper figure of FIG. 10 shows an image of human detection, the lower left figure of FIG. 10 shows the operation of a visitor putting a product in a shopping cart, and the lower right figure of FIG. 10 shows a visitor putting a product in a pocket or the like. It is a figure which shows the operation.
As shown in the upper figure of FIG. 10, the horizontal positions of the display shelves 15 are A, B, C, D, E, ..., And the vertical positions are 1, 2, 3, 4, .... The visitor is image-recognized by the frame surrounded by the rectangle shown by the reference numeral a in the upper figure of FIG. It is assumed that the dominant hand of the visitor is the right hand, and the operation of putting the product placed on the display shelf 15 into a shopping cart or a pocket or the like is taken as an example.
Learn the shapes of shopping carts 17 and carts in stores in advance.
 図10左下図に示すように、買い物かご17を囲む枠(符号c参照)と手を囲む枠(符号b参照)との交差領域がある。この場合、商品を買い物かご17に入れるので、「グリーン」(正常)と判定される。 As shown in the lower left figure of FIG. 10, there is an intersection area between the frame surrounding the shopping cart 17 (see reference numeral c) and the frame surrounding the hand (see reference numeral b). In this case, since the product is placed in the shopping cart 17, it is determined to be "green" (normal).
 図10右下図に示すように、買い物かご17を囲む枠(符号c参照)と手を囲む枠(符号b参照)との交差領域がない。この場合、商品をポケットやカバン等に入れた場合、万引きの可能性がある「オレンジ」(注意)と判定される。
 また、来店者が陳列ケースより商品を手に取り、片方の手でスマホにスキャンする手の動きがある場合に「グリーン」(正常)と判定し、スキャンをする手の動きがない場合に万引きの可能性がある「オレンジ」(注意)と判定するようにしてもよい。
As shown in the lower right figure of FIG. 10, there is no intersection region between the frame surrounding the shopping cart 17 (see reference numeral c) and the frame surrounding the hand (see reference numeral b). In this case, if the product is put in a pocket, bag, etc., it is judged as "orange" (caution), which may cause shoplifting.
In addition, if a visitor picks up the product from the display case and there is a movement of the hand to scan the smartphone with one hand, it is judged as "green" (normal), and if there is no movement of the hand to scan, shoplifting is performed. It may be determined that there is a possibility of "orange" (caution).
 図11に示すように、ステップS201で制御部110は、陳列棚15やショーケース16前に設置されたデジタルカメラ11、3Dカメラ12から画像を得る。
 ステップS202で、人体の姿勢判断を行う。
 ステップS203で、該当者の手を検出する(図9参照)。
 ステップS204で、物体検出を行い買い物かご17を検出する(図10参照)。
As shown in FIG. 11, in step S201, the control unit 110 obtains an image from the digital camera 11 and the 3D camera 12 installed in front of the display shelf 15 and the showcase 16.
In step S202, the posture of the human body is determined.
In step S203, the hand of the relevant person is detected (see FIG. 9).
In step S204, object detection is performed to detect the shopping cart 17 (see FIG. 10).
 ステップS205で、該当者は商品を手に所持しているか否かを判定する(図10参照)。商品を手に所持していない場合、ステップS220に進む。
 商品を手に所持している場合、ステップ206で右手(利き手)位置を判定する。
In step S205, the person concerned determines whether or not he / she has the product in his / her hand (see FIG. 10). If the product is not in hand, the process proceeds to step S220.
If the product is in hand, the right hand (dominant hand) position is determined in step 206.
 右手位置が陳列棚15やショーケース16(以下、ケースという)の中の場合、ステップS207で、陳列棚15やケースへの返却か否かを判定する。
 陳列棚15やケースへの返却でない場合、ステップS208で、商品が置かれている棚割り、例えば2Eに置かれた商品名を特定する(図10参照)。
 ステップS209で、商品の品名を特定する。商品の品名を特定することで、窃盗重みパラメータ135(図3参照)から、商品コードごとの、過去の実績に依存する窃盗実績重み135a、商品の価格に依存する窃盗価格重み135b、及び商品が陳列されている陳列棚の窃盗位置重み135cを取得することができる。
 ステップS210で、取った商品を登録し、日時、カメラ、棚割り、商品の品名、個数、画像等の情報を取得する。
When the right-hand position is in the display shelf 15 or the showcase 16 (hereinafter referred to as a case), in step S207, it is determined whether or not the product is returned to the display shelf 15 or the case.
If it is not returned to the display shelf 15 or the case, in step S208, the shelf allocation on which the product is placed, for example, the name of the product placed on 2E is specified (see FIG. 10).
In step S209, the product name of the product is specified. By specifying the product name, from the theft weight parameter 135 (see Fig. 3), the theft performance weight 135a, which depends on the past performance, the theft price weight 135b, which depends on the price of the product, and the product can be obtained for each product code. The theft position weight 135c of the displayed display shelf can be obtained.
In step S210, the picked product is registered, and information such as the date and time, the camera, the shelving allocation, the product name, the number of products, and the image is acquired.
 また、上記ステップS207で陳列棚15やケースへの返却の場合、ステップS211で、商品の品名を特定する。
 ステップS212で、戻した商品を登録し、ステップS213で商品を陳列棚15やケースに戻したと判断してステップS220に進む。
Further, in the case of returning the product to the display shelf 15 or the case in step S207, the product name of the product is specified in step S211.
In step S212, the returned product is registered, and in step S213, it is determined that the product has been returned to the display shelf 15 or the case, and the process proceeds to step S220.
 一方、上記ステップS206で右手位置が陳列棚15やケースの外の場合、ステップS214で、商品を買い物かご17に格納しようとしているかを判定する(図10参照)。
 ステップS215で、手に所持する商品の格納先を特定する。
 ステップS216で、商品の格納先を判定する。
On the other hand, when the right-hand position is outside the display shelf 15 or the case in step S206, it is determined in step S214 whether the product is to be stored in the shopping cart 17 (see FIG. 10).
In step S215, the storage destination of the product in hand is specified.
In step S216, the storage destination of the product is determined.
 商品の格納先が買い物かご17の場合、ステップS217で、買い物かご17に商品を入れた(図10左下図参照)と判断してステップS220に進む。
 商品の格納先がポケットの場合、ステップS218で、ポケットに商品を入れた(図10右下図参照)と判断してステップS220に進む。
 商品の格納先がその他の場合、ステップS219で、カバン等に商品を入れた(図10右下図参照)と判断してステップS220に進む。
When the storage destination of the product is the shopping cart 17, it is determined in step S217 that the product has been placed in the shopping cart 17 (see the lower left figure of FIG. 10), and the process proceeds to step S220.
When the storage destination of the product is a pocket, in step S218, it is determined that the product has been put in the pocket (see the lower right figure of FIG. 10), and the process proceeds to step S220.
If the storage destination of the product is other, it is determined in step S219 that the product has been put in the bag or the like (see the lower right figure of FIG. 10), and the process proceeds to step S220.
 ステップS220で、制御部110の窃盗行為判定部113(図2参照)は、記憶部130に記憶している窃盗重みパラメータ135(図3参照)を参照して、手に取った商品の窃盗重みを取得する。 In step S220, the theft action determination unit 113 (see FIG. 2) of the control unit 110 refers to the theft weight parameter 135 (see FIG. 3) stored in the storage unit 130, and the theft weight of the picked-up product. To get.
 ステップS221で、窃盗行為判定部113は、手動作検出部112によって検出された画像データ(手の動作)及び記憶部130に記憶されている商品の窃盗重みパラメータ135に基づいて窃盗行為が行われたか否かを判定する。 In step S221, the theft determination unit 113 performs the theft based on the image data (hand movement) detected by the hand motion detection unit 112 and the theft weight parameter 135 of the product stored in the storage unit 130. Determine if it is.
 窃盗行為が行われた場合(ステップS221:Yes)、ステップS222で通報部114は、窃盗行為判定部113によって窃盗行為が行われたと判定したことを受けて、その判定結果を所定の端末に通報して本フローの処理を終了する。通報部114は、商品を買い物かご17に入れたか否かをもとに、「グリーン」、「オレンジ」及び「レッド」の注意度都と共に、窃盗の疑いの程度を(80%など)を通報する。 When the theft is performed (step S221: Yes), the reporting unit 114 reports the determination result to a predetermined terminal in response to the determination by the theft determination unit 113 that the theft has been performed in step S222. Then, the processing of this flow is completed. The reporting unit 114 reports the degree of suspicion of theft (80%, etc.) along with the caution levels of "green", "orange", and "red" based on whether or not the product has been placed in the shopping cart 17. do.
 このように、商品を買い物かご17に入れに応じて、窃盗の疑いの程度(「グリーン」、「オレンジ」及び「レッド」の注意度)を通知するので、店舗関係者は、万引き候補の可能性のある買い物客に対し、注意度に応じた対応をとることができる。例えば、「レッド」が付加された窃盗行為に対しては、万引き対応の人を担当させるなど、より迅速に対応することができる。 In this way, the degree of suspicion of theft (attention of "green", "orange" and "red") is notified according to the product placed in the shopping cart 17, so store personnel can be a candidate for shoplifting. It is possible to take measures according to the degree of caution for sexual shoppers. For example, theft with "red" added can be dealt with more quickly, such as by having a shoplifter in charge.
 以上詳細に説明したように、本実施の形態によれば、デジタル・オートファイル・セキュリティシステム1000(図1参照)は、物品の盗まれやすさのパラメータである窃盗重みを物品と対応づけて記憶する記憶部130と、セキュリティ区域を撮影するカメラによって撮影された画像から人の候補を抽出する人抽出部111と、人抽出部111によって抽出された画像における手の動作を検出する手動作検出部112と、手動作検出部112によって検出された手の動作データ及び記憶部130に記憶されている物品の窃盗重みに基づいて、窃盗行為が行われたことを判定する窃盗行為判定部113とを備える。 As described in detail above, according to the present embodiment, the digital auto file security system 1000 (see FIG. 1) stores the theft weight, which is a parameter of the ease of stealing an article, in association with the article. The storage unit 130, the person extraction unit 111 that extracts a person candidate from the image taken by the camera that captures the security area, and the hand movement detection unit that detects the movement of the hand in the image extracted by the person extraction unit 111. The theft determination unit 113 that determines that the theft has been performed based on the hand motion data detected by the hand motion detection unit 112 and the theft weight of the article stored in the storage unit 130. Be prepared.
 この構成により、窃盗行為判定部113が、画像データに加えて、窃盗重みに基づいて窃盗行為が行われたか否かを判定しており、単なる手の動作だけではなく、手の動作に意味(万引きしようという目的動作)を付加することができ、正確に窃盗行為を判定することができる。 With this configuration, the theft action determination unit 113 determines whether or not the theft action has been performed based on the theft weight in addition to the image data, which means not only the movement of the hand but also the movement of the hand ( The purpose action of shoplifting) can be added, and the theft can be accurately determined.
 本実施形態では、デジタル・オートファイル・セキュリティシステム1000は、記憶部130に記憶される窃盗重みが、過去の実績に依存する。これにより、万引き行為が多い商品について、大きい重み付けを付加することができ、窃盗行為の判定の精度をより高めることができる。その結果、万引きの発生をより抑制することができる。 In the present embodiment, in the digital auto file security system 1000, the theft weight stored in the storage unit 130 depends on the past performance. As a result, a large weight can be added to a product with many shoplifting acts, and the accuracy of determining the theft act can be further improved. As a result, the occurrence of shoplifting can be further suppressed.
 本実施形態では、デジタル・オートファイル・セキュリティシステム1000は、記憶部130に記憶される窃盗重みが、物品の価格に依存する。これにより、万引きされた場合に、損失が大きい高価な商品について、大きい重み付けを付加することができ、窃盗行為の判定の精度をより高めることができる。その結果、万引きによる損失をより抑制することができる。 In the present embodiment, in the digital auto file security system 1000, the theft weight stored in the storage unit 130 depends on the price of the article. As a result, when shoplifting is carried out, a large weight can be added to an expensive product having a large loss, and the accuracy of determining the theft can be further improved. As a result, the loss due to shoplifting can be further suppressed.
 本実施形態では、デジタル・オートファイル・セキュリティシステム1000は、記憶部130に記憶される窃盗重みが、物品が陳列されている陳列棚によって判断される。これにより、万引き行為が多い商品について、大きい重み付けを付加することができ、窃盗行為の判定の精度をより高めることができる。その結果、万引きの発生をより抑制することができる。 In the present embodiment, in the digital auto file security system 1000, the theft weight stored in the storage unit 130 is determined by the display shelf on which the goods are displayed. As a result, a large weight can be added to a product with many shoplifting acts, and the accuracy of determining the theft act can be further improved. As a result, the occurrence of shoplifting can be further suppressed.
 本実施形態では、デジタル・オートファイル・セキュリティシステム1000は、窃盗行為判定部113が、窃盗行為が行われたと判定したことを受けて、その判定結果を所定の端末に通報する通報部114を備える。これにより、店舗関係者は、万引き候補に対し、迅速な対応をとることができる。また、窃盗の疑いの程度(80%など)を通報することで、店舗関係者は、万引き候補の可能性のある買い物客に対し、注意度に応じた対応(万引き対応の人を担当させるなど)をとることができる。 In the present embodiment, the digital auto file security system 1000 includes a reporting unit 114 that reports the determination result to a predetermined terminal in response to the determination that the theft act determination unit 113 has performed the theft act. .. As a result, store personnel can promptly respond to shoplifting candidates. In addition, by reporting the degree of suspicion of theft (80%, etc.), store personnel respond to shoplifters who may be candidates for shoplifting according to their degree of caution (such as having a person who handles shoplifting take charge). ) Can be taken.
 本実施形態では、デジタル・オートファイル・セキュリティシステム1000は、CPU以外の計算リソースであるAIアクセラレータ200を備え、制御部110の人抽出部111は、AIアクセラレータ200を用いて、セキュリティ区域内の人を検出する。AIアクセラレータ200は、CPU処理とは別に人の検出処理を専用ハードで実行することで、広範なセキュリティ区域内に存在する人を実時間で検出することができる。また、安価なカメラ機器用いた構成であっても、リアルタイムで人を検出することができる。
 また、AIアクセラレータ200であることで、従来の監視カメラによる人体検出に比べて極めて高い精度での侵入者の検出を行うことができる。
In the present embodiment, the digital auto file security system 1000 includes an AI accelerator 200 which is a computing resource other than the CPU, and the person extraction unit 111 of the control unit 110 uses the AI accelerator 200 to use the AI accelerator 200 to provide a person in the security area. Is detected. The AI accelerator 200 can detect a person existing in a wide security area in real time by executing a person detection process on a dedicated hardware separately from the CPU process. Moreover, even if a configuration using an inexpensive camera device is used, a person can be detected in real time.
Further, since the AI accelerator 200 is used, it is possible to detect an intruder with extremely high accuracy as compared with the detection of a human body by a conventional surveillance camera.
 つぎに、上述のように構成されたデジタル・オートファイル・セキュリティシステムをコインランドリーに適用した場合における動作について説明する。
[窃盗行為判定処理]
 図12は、デジタル・オートファイル・セキュリティシステムのコインランドリー、ATM、金融機関等における監視装置100の制御部110が窃盗行為を判定する処理を示すフローチャートである。本フローは、監視装置100の制御部110(図2参照)により実行される。
 ステップS301で、制御部110は、コインランドリー等における精算・両替機の近傍、例えば精算・両替機からの周囲2~3mをイエローゾーンに設定し、そのイエローゾーン内を所定の高い窃盗重みとする。
 ステップS302で、制御部110は、精算・両替機の前に設置されているデジタルカメラ(監視カメラ11)からコンピュータの処理能力に合わせて、例えば1/10秒~10/10秒の画像を得る。そして、その得られた画像を使用して、イエローゾーン内への来店者の立ち入りを検知し、検知された人物の滞在時間を判定する。滞在時間が必要以上に長いと窃盗の可能性が高いと考えられる。
Next, the operation when the digital auto file security system configured as described above is applied to the coin laundry will be described.
[Theft judgment processing]
FIG. 12 is a flowchart showing a process in which the control unit 110 of the monitoring device 100 in a coin laundry, an ATM, a financial institution, or the like of a digital auto file security system determines a theft act. This flow is executed by the control unit 110 (see FIG. 2) of the monitoring device 100.
In step S301, the control unit 110 sets the vicinity of the settlement / exchange machine in a coin laundry or the like, for example, 2 to 3 m around the settlement / exchange machine as a yellow zone, and sets the inside of the yellow zone as a predetermined high theft weight.
In step S302, the control unit 110 obtains, for example, an image of 1/10 second to 10/10 second from the digital camera (surveillance camera 11) installed in front of the payment / exchange machine according to the processing capacity of the computer. .. Then, using the obtained image, the entry of a visitor into the yellow zone is detected, and the staying time of the detected person is determined. If the staying time is longer than necessary, the possibility of theft is high.
 ステップS303で、制御部110は、イエローゾーン内への立ち入りが検知された人物の人数を判定する。精算・両替機の近傍であるイエローゾーン内に2人以上の人物が検知されると窃盗の可能性が高いと考えられる。
 ステップS304で、コインランドリー等の入口の外にもデジタルカメラ(監視カメラ11)を設置して、制御部110は、建物外に車又はオートバイ等があるかを監視し、判定する。車又はオートバイ等があると窃盗の可能性が高いと考えられる。
 ステップS305で、制御部110は、イエローゾーン内の人物が精算・両替機をこじ開ける道具、例えばバール等を持っているかを判定する。精算・両替機をこじ開ける道具を持っていると窃盗の可能性が高いと考えられる。
 ステップS306で、制御部110の手動作検出部112(図2参照)は、人抽出部111によって抽出された画像における手の動作を検出し、精算・両替機をこじ開ける手の動きを判定する。手が精算・両替機をこじ開けていると判定されると窃盗の可能性が高いと考えられるが、これだけでは判定誤りの結果、頻繁に誤り警報を出しかけない。
In step S303, the control unit 110 determines the number of persons who have been detected to enter the yellow zone. If two or more people are detected in the yellow zone near the checkout / exchange machine, the possibility of theft is high.
In step S304, a digital camera (surveillance camera 11) is installed outside the entrance of the coin laundry or the like, and the control unit 110 monitors and determines whether there is a car, a motorcycle, or the like outside the building. If there is a car or motorcycle, the possibility of theft is high.
In step S305, the control unit 110 determines whether the person in the yellow zone has a tool for prying open the checkout / exchange machine, such as a crowbar. It is considered that there is a high possibility of theft if you have a tool to pry open the payment / exchange machine.
In step S306, the hand movement detection unit 112 (see FIG. 2) of the control unit 110 detects the hand movement in the image extracted by the person extraction unit 111, and determines the hand movement to pry open the settlement / exchange machine. It is considered that there is a high possibility of theft if it is judged that the hand has opened the checkout / exchange machine, but as a result of the judgment error, the error alarm is not issued frequently.
 ステップS307で、制御部110の窃盗行為判定部113(図2参照)は、以上の判定結果を総合して、注意度をグリーン(正常)、オレンジ(注意)、レッド(異常)のいずれかとして判定する。例えば、
  P=[1:人物のイエローゾーン内の滞在時間が30秒以上、
     0:人物のイエローゾーン内の滞在時間が30秒未満]
  Q=[1:イエローゾーン内の人物が2人以上、
     0:イエローゾーン内の人物が1人又はいない]
  R=[1:建物外に車又はオートバイ等がある、
     0:建物外に車又はオートバイ等がない]
  S=[1:人物が道具を持っている、
     0:人物が道具を持っていない]
  T=[1:手が精算・両替機をこじ開けている、
     0:手が精算・両替機をこじ開けていない]
とすると、窃盗行為判定部113は、注意度Xを、これら変数P、Q、R、S、Tの関数として判定する。
  X=f(P,Q,R,S,T)
In step S307, the theft determination unit 113 (see FIG. 2) of the control unit 110 puts the above determination results together and sets the attention level to one of green (normal), orange (caution), and red (abnormal). judge. for example,
P = [1: A person stays in the yellow zone for 30 seconds or more,
0: A person stays in the yellow zone for less than 30 seconds]
Q = [1: Two or more people in the yellow zone,
0: No one or no person in the yellow zone]
R = [1: There is a car or motorcycle outside the building,
0: There are no cars or motorcycles outside the building]
S = [1: A person has a tool,
0: The person does not have the tools]
T = [1: Hand is prying open the checkout / exchange machine,
0: Hands have not opened the checkout / change machine]
Then, the theft determination unit 113 determines the attention level X as a function of these variables P, Q, R, S, and T.
X = f (P, Q, R, S, T)
 上記は一例である。例えば、上記変数は2値変数としたが、変数によっては、多値変数又はアナログ変数であってもよい。例えば、変数Pは滞在時間そのものであってもよいし、変数Qは人物の人数そのものであってもよい。精算・両替機は精算機であってもよい。 The above is an example. For example, the above variable is a binary variable, but depending on the variable, it may be a multi-value variable or an analog variable. For example, the variable P may be the staying time itself, or the variable Q may be the number of people itself. The settlement / exchange machine may be a settlement machine.
 ステップS307で、オレンジ又はレッドと判定されたことを受けて、ステップS308で通報部114は、その判定結果を所定の端末に通報すると共に、不審者に声かけして本フローの処理を終了する。通報部114は、窃盗の疑いの程度(オレンジ若しくはレッドなのか、又は、80%など)を通報する。通報を受けて、関係者は、迅速に対処することができる。 In response to the determination of orange or red in step S307, the reporting unit 114 notifies the determination result to a predetermined terminal in step S308, and calls a suspicious person to end the processing of this flow. .. The reporting unit 114 reports the degree of suspicion of theft (orange or red, or 80%, etc.). Upon receiving the report, the parties concerned can take prompt action.
 なお、関係者等に通報を行った場合、一時保存していた不審者の画像データ(顔画像や挙動などの動画データ)を証拠として録画部160に録画しておく。 When a person concerned is notified, the image data of the suspicious person (video data such as face image and behavior) temporarily saved is recorded in the recording unit 160 as evidence.
 これによって、撮影画像から正確に窃盗行為を判定することができる。すなわち、手の動作の画像データに加えて、人物が精算・両替機の近傍にいるか否かを判定することで、単なる手の動作だけではなく、手の動作に意味(窃盗しようという目的動作)を付加することができ、正確に窃盗行為を判定することができる。 This makes it possible to accurately determine the theft from the captured image. That is, in addition to the image data of the hand movement, by determining whether or not the person is in the vicinity of the checkout / exchange machine, it means not only the hand movement but also the hand movement (the purpose movement to steal). Can be added, and the theft can be accurately determined.
 以上の説明は本発明の好適な実施の形態の例証であり、本発明の範囲はこれに限定されることはない。 The above description is an example of a preferred embodiment of the present invention, and the scope of the present invention is not limited thereto.
 例えば、本デジタル・オートファイル・セキュリティシステム1000を、商業施設のショールームや美術館のショップにおける物品、展示場における物品の管理等に適用することができる。これら各施設の物品について、店舗における商品の万引き防止の場合と同様に、物品の盗まれやすさのパラメータである窃盗重みを物品と対応づけて記憶部130(図1参照)に記憶しておく。そして、窃盗行為判定部113(図2参照)が、手の動作データ及び記憶されている物品の窃盗重みに基づいて、窃盗行為が行われたことを判定する。 For example, this digital auto file security system 1000 can be applied to the management of goods in showrooms of commercial facilities, shops in museums, goods in exhibition halls, and the like. For the goods of each of these facilities, the theft weight, which is a parameter of the ease of stealing the goods, is stored in the storage unit 130 (see FIG. 1) in association with the goods, as in the case of preventing shoplifting of goods in the store. .. Then, the theft act determination unit 113 (see FIG. 2) determines that the theft act has been performed based on the motion data of the hand and the theft weight of the stored article.
 これにより、単なる手の動作だけではなく、手の動作に意味(窃盗行為をしようという目的動作)を付加することができ、正確に窃盗行為を判定することができる。上記各施設における物品管理は、店舗等に比べて、防犯対象の盲点となっていることが多いと考えられ、いままでになかった有効な防犯システムが期待できる。 As a result, not only the movement of the hand but also the movement of the hand (the purpose movement for theft) can be added, and the theft can be accurately determined. It is considered that the management of goods at each of the above facilities is often a blind spot for crime prevention compared to stores, etc., and an effective crime prevention system that has never existed can be expected.
 また、本デジタル・オートファイル・セキュリティシステム1000を、美術館、博物館に展示されている物品(展示品)について適用することで、貴重な(高価な)展示品について、有効な防犯システムが構築できる。この場合、該当展示品について、図3に示す窃盗重みパラメータ135の窃盗価格重み135bの重みづけを大きくする(貴重な展示品については、最高ランクにする)。ここで、「物品」には現金も含まれており、貴重な展示品は、現金と同様な扱いで窃盗重みを付与することができる。 Also, by applying this digital auto file security system 1000 to museums and articles (exhibits) exhibited in museums, an effective crime prevention system can be constructed for valuable (expensive) exhibits. In this case, the weight of the theft price weight 135b of the theft weight parameter 135 shown in FIG. 3 is increased for the relevant exhibit (the highest rank is given to the valuable exhibit). Here, "articles" also include cash, and valuable exhibits can be treated in the same way as cash and given a theft weight.
 また、上記実施の形態及び他の適用例ではデジタル・オートファイル・セキュリティシステム及び方法という名称を用いたが、これは説明の便宜上であり、監視システム、セキュリティシステム、サーチ・セキュリティ方法等であってもよい。 Further, in the above-described embodiment and other application examples, the names of digital autofile security system and method are used, but this is for convenience of explanation, and includes a monitoring system, a security system, a search security method, and the like. May be good.
 また、本発明のデジタル・オートファイル・セキュリティシステム及び方法は、コンピュータを本デジタル・オートファイル・セキュリティシステム又は方法として機能させるためのプログラムでも実現される。このプログラムは、コンピュータで読み取り可能な記録媒体に格納されていてもよい。 The digital autofile security system and method of the present invention are also realized by a program for making a computer function as the digital autofile security system or method of the present invention. The program may be stored on a computer-readable recording medium.
 このプログラムを記録した記録媒体は、本デジタル・オートファイル・セキュリティシステムのROMそのものであってもよいし、また、外部記憶装置としてCD-ROMドライブ等のプログラム読取装置が設けられ、そこに記録媒体を挿入することで読み取り可能なCD-ROM等であってもよい。 The recording medium on which this program is recorded may be the ROM itself of the digital auto file security system, or a program reading device such as a CD-ROM drive is provided as an external storage device, and the recording medium is provided therein. It may be a CD-ROM or the like that can be read by inserting.
 また、上記の各構成、機能、処理部、処理手段等は、それらの一部又は全部を、例えば集積回路で設計する等によりハードウェアで実現してもよい。また、上記の各構成、機能等は、プロセッサがそれぞれの機能を実現するプログラムを解釈し、実行するためのソフトウェアで実現してもよい。各機能を実現するプログラム、テーブル、ファイル等の情報は、メモリや、ハードディスク、SSD(Solid State Drive)等の記録装置、又は、IC(Integrated Circuit)カード、SD(Secure Digital)カード、光ディスク等の記録媒体に保持することができる。 Further, each of the above configurations, functions, processing units, processing means, etc. may be realized by hardware by designing a part or all of them by, for example, an integrated circuit. Further, each of the above configurations, functions, and the like may be realized by software for the processor to interpret and execute a program that realizes each function. Information such as programs, tables, and files that realize each function can be stored in memory, hard disks, recording devices such as SSDs (Solid State Drives), IC (Integrated Circuit) cards, SD (Secure Digital) cards, optical disks, etc. It can be held on a recording medium.
 本明細書で引用したすべての刊行物、特許及び特許出願は、そのまま参考として、ここにとり入れるものとする。 All publications, patents and patent applications cited herein are incorporated herein by reference only.
 本発明に係るデジタル・オートファイル・セキュリティシステム、方法及びプログラムは、店舗、コインランドリー、工場、研究所、情報処理室、ATM、金融機関、金銭集計室等の高度の管理を要する事業所等への設置が期待される。さらに、商業施設、美術館、展示場、事務所、病院、ホテル、金融機関、工場、研究所、発電所、エアーターミナル、集会場、イベントホール、競技場、貴金属店、場外馬券売場、競輪場外車券売場等の建物屋内外、交通機関の電車、フェリー、飛行機の車内等も対象である。 The digital auto file security system, method and program according to the present invention can be applied to business establishments requiring a high degree of management such as stores, coin laundry, factories, research institutes, information processing rooms, ATMs, financial institutions, and money collection rooms. Installation is expected. In addition, commercial facilities, museums, exhibition halls, offices, hospitals, hotels, financial institutions, factories, laboratories, power plants, air terminals, meeting places, event halls, stadiums, precious metal stores, outside betting offices, race betting office tickets It also covers the inside and outside of buildings such as sales floors, the inside and outside of transportation trains, ferries, and airplanes.
 11 監視カメラ(デジタルカメラ、3Dカメラ)
 15 陳列棚
 16 ショーケース(陳列棚)
 20 人感センサ
 30 Wi-Fi親機
 40 ビーコン親機
 50 携帯端末装置(ID端末)
 50a スマートフォン(携帯端末装置;ID端末)
 51 Wi-Fi子機
 52 ビーコン子機
 53 GPS
 100 監視装置
 110 制御部
 111 人抽出部(人抽出手段)
 112 手動作検出部(手動作検出手段)
 113 窃盗行為判定部(窃盗行為判定手段)
 114 通報部(通報手段)
 120 入力部
 120a 操作盤
 130 記憶部(窃盗重み記憶手段)
 135 窃盗重みパラメータ(窃盗重み記憶手段)
 135a 過去の実績に依存する窃盗実績重み
 135b 商品の価格に依存する窃盗価格重み
 135c 商品が陳列されている陳列棚の窃盗位置重み
 140 表示部
 150 出力部
 160 録画部
 170 画像処理部
 180 インタフェース(I/F)部
 190 通信部
 200 AIアクセラレータ
 1000 デジタル・オートファイル・セキュリティシステム
 
11 Surveillance camera (digital camera, 3D camera)
15 Display shelves 16 Showcases (display shelves)
20 Motion sensor 30 Wi-Fi master unit 40 Beacon master unit 50 Mobile terminal device (ID terminal)
50a Smartphone (mobile terminal device; ID terminal)
51 Wi-Fi handset 52 Beacon handset 53 GPS
100 Monitoring device 110 Control unit 111 Person extraction unit (Person extraction means)
112 Hand motion detection unit (hand motion detection means)
113 Theft Judgment Department (Theft Judgment Means)
114 Reporting section (reporting means)
120 Input unit 120a Operation panel 130 Storage unit (theft weight storage means)
135 Theft weight parameter (theft weight storage means)
135a Theft performance weight that depends on past performance 135b Theft price weight that depends on the price of the product 135c Theft position weight of the display shelf on which the product is displayed 140 Display unit 150 Output unit 160 Recording unit 170 Image processing unit 180 Interface (I) / F) Department 190 Communication Department 200 AI Accelerator 1000 Digital Auto File Security System

Claims (7)

  1.  物品の盗まれやすさのパラメータである窃盗重みを物品と対応づけて記憶する窃盗重み記憶手段と、
     セキュリティ区域を撮影するカメラによって撮影された画像から人の候補を抽出する人抽出手段と、
     前記人抽出手段によって抽出された画像における手の動作を検出する手動作検出手段と、
     前記手動作検出手段によって検出された手の動作データ及び前記窃盗重み記憶手段に記憶されている物品の窃盗重みに基づいて、窃盗行為が行われたことを判定する窃盗行為判定手段と
    を備えることを特徴とするデジタル・オートファイル・セキュリティシステム。
    A theft weight storage means that stores the theft weight, which is a parameter of the susceptibility of an article, in association with the article,
    A person extraction method that extracts human candidates from images taken by a camera that captures a security area,
    A hand motion detecting means for detecting a hand motion in an image extracted by the human extraction means, and a hand motion detecting means.
    Provided with a theft act determining means for determining that a theft act has been performed based on the hand motion data detected by the hand motion detecting means and the theft weight of the article stored in the theft weight storage means. A digital auto file security system featuring.
  2.  前記窃盗重みは、過去の実績に依存することを特徴とする請求項1記載のデジタル・オートファイル・セキュリティシステム。 The digital auto file security system according to claim 1, wherein the theft weight depends on past performance.
  3.  前記窃盗重みは、物品の価格に依存することを特徴とする請求項1記載のデジタル・オートファイル・セキュリティシステム。 The digital auto file security system according to claim 1, wherein the theft weight depends on the price of the goods.
  4.  前記窃盗重みは、物品が陳列されている陳列棚によって判断されることを特徴とする請求項1記載のデジタル・オートファイル・セキュリティシステム。 The digital auto file security system according to claim 1, wherein the theft weight is determined by a display shelf on which goods are displayed.
  5.  前記窃盗行為判定手段が、窃盗行為が行われたと判定したことを受けて、その判定結果を所定の端末に通報する通報手段
    を更に備えることを特徴とする請求項1記載のデジタル・オートファイル・セキュリティシステム。
    The digital auto file according to claim 1, wherein the theft act determining means further includes a reporting means for notifying a predetermined terminal of the determination result in response to the determination that the theft act has been performed. Security system.
  6.  物品の盗まれやすさのパラメータである窃盗重みを物品と対応づけて記憶する窃盗重み記憶ステップと、
     セキュリティ区域を撮影するカメラによって撮影された画像から人の候補を抽出する人抽出ステップと、
     前記人抽出ステップによって抽出された画像における手の動作を検出する手動作検出ステップと、
     前記手動作検出ステップによって検出された手の動作データ及び前記窃盗重み記憶ステップで記憶されている物品の窃盗重みに基づいて、窃盗行為が行われたことを判定する窃盗行為判定ステップと
    を備えることを特徴とするデジタル・オートファイル・セキュリティ方法。
    The theft weight storage step, which stores the theft weight, which is a parameter of the ease of stealing an article, in association with the article,
    A person extraction step that extracts candidate people from images taken by a camera that shoots a security area,
    A hand motion detection step that detects a hand motion in an image extracted by the person extraction step, and a hand motion detection step.
    It is provided with a theft action determination step for determining that a theft act has been performed based on the hand motion data detected by the hand motion detection step and the theft weight of the article stored in the theft weight storage step. A digital autofile security method that features.
  7.  コンピュータを、
     物品の盗まれやすさのパラメータである窃盗重みを物品と対応づけて記憶する窃盗重み記憶手段と、セキュリティ区域を撮影するカメラによって撮影された画像から人の候補を抽出する人抽出手段と、前記人抽出手段によって抽出された画像における手の動作を検出する手動作検出手段と、前記手動作検出手段によって検出された手の動作データ及び前記窃盗重み記憶手段に記憶されている物品の窃盗重みに基づいて、窃盗行為が行われたことを判定する窃盗行為判定手段とを備えることを特徴とするデジタル・オートファイル・セキュリティシステム
    として機能させるためのプログラム。
     
    Computer,
    The theft weight storage means for storing the theft weight, which is a parameter of the susceptibility of an article, in association with the article, and a person extraction means for extracting a person candidate from an image taken by a camera that captures a security area. The theft weight of the article stored in the hand motion detecting means for detecting the hand motion in the image extracted by the human extracting means, the hand motion data detected by the hand motion detecting means, and the theft weight storage means. Based on this, a program for functioning as a digital auto file security system, which comprises a theft act determination means for determining that a theft act has been performed.
PCT/JP2020/011958 2020-03-18 2020-03-18 Digital/autofile/security system, method, and program WO2021186610A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
PCT/JP2020/011958 WO2021186610A1 (en) 2020-03-18 2020-03-18 Digital/autofile/security system, method, and program
PCT/JP2020/018740 WO2021186751A1 (en) 2020-03-18 2020-05-08 Digital auto-filing security system, method, and program
JP2020537786A JP6773389B1 (en) 2020-03-18 2020-05-08 Digital autofile security system, methods and programs

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2020/011958 WO2021186610A1 (en) 2020-03-18 2020-03-18 Digital/autofile/security system, method, and program

Publications (1)

Publication Number Publication Date
WO2021186610A1 true WO2021186610A1 (en) 2021-09-23

Family

ID=77768162

Family Applications (2)

Application Number Title Priority Date Filing Date
PCT/JP2020/011958 WO2021186610A1 (en) 2020-03-18 2020-03-18 Digital/autofile/security system, method, and program
PCT/JP2020/018740 WO2021186751A1 (en) 2020-03-18 2020-05-08 Digital auto-filing security system, method, and program

Family Applications After (1)

Application Number Title Priority Date Filing Date
PCT/JP2020/018740 WO2021186751A1 (en) 2020-03-18 2020-05-08 Digital auto-filing security system, method, and program

Country Status (1)

Country Link
WO (2) WO2021186610A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023243172A1 (en) * 2022-06-17 2023-12-21 日立チャネルソリューションズ株式会社 Monitoring apparatus and monitoring apparatus method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH06105312A (en) * 1992-09-22 1994-04-15 Hitachi Ltd Method for monitoring still object and device therefor
JP2005512245A (en) * 2001-12-11 2005-04-28 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ Monitoring system that detects suspicious behavior

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5139947B2 (en) * 2008-10-03 2013-02-06 三菱電機インフォメーションテクノロジー株式会社 Surveillance image storage system and surveillance image storage method for surveillance image storage system
JP6529078B2 (en) * 2013-09-06 2019-06-12 日本電気株式会社 Customer behavior analysis system, customer behavior analysis method, customer behavior analysis program and shelf system
JP2017033442A (en) * 2015-08-05 2017-02-09 株式会社ニューロマジック Location information collection device, sensing type content display device, location information management server and method of the same
JP6756473B2 (en) * 2015-10-26 2020-09-16 株式会社日立社会情報サービス Behavior analyzers and systems and methods

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH06105312A (en) * 1992-09-22 1994-04-15 Hitachi Ltd Method for monitoring still object and device therefor
JP2005512245A (en) * 2001-12-11 2005-04-28 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ Monitoring system that detects suspicious behavior

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023243172A1 (en) * 2022-06-17 2023-12-21 日立チャネルソリューションズ株式会社 Monitoring apparatus and monitoring apparatus method

Also Published As

Publication number Publication date
WO2021186751A1 (en) 2021-09-23

Similar Documents

Publication Publication Date Title
JP5871296B1 (en) Smart security digital system, method and program
US11527149B2 (en) Emergency alert system
JP6525229B1 (en) Digital search security system, method and program
JP5794599B1 (en) Digital fine security system, method and program
JP2022527661A (en) Monitoring system
JP5780570B1 (en) Digital loss / accident defense system, method and program
US10854058B2 (en) Emergency alert system
JP6195331B1 (en) Digital smart security system, method and program
JP4925419B2 (en) Information collection system and mobile terminal
JP5780569B1 (en) Digital loss defense security system, method and program
EP1472869A2 (en) System and method for video content analysis-based detection, surveillance and alarm management
JP6573185B1 (en) Information processing system, information processing method, and program
WO2020174634A1 (en) Accurate digital security system, method, and program
JP2007060528A (en) Facility user management system and user management method
TW202244857A (en) Monitoring systems
WO2021186610A1 (en) Digital/autofile/security system, method, and program
WO2020213058A1 (en) Digital smart defense security system, method, and program
JP6773389B1 (en) Digital autofile security system, methods and programs
JPWO2018198385A1 (en) Digital register security system, method and program
WO2022059223A1 (en) Video analyzing system and video analyzing method
JP2006163788A (en) Visitor management method and management system
WO2020116023A1 (en) Information processing device, information processing system, information processing method, and program
JP7244135B2 (en) Digital safety response security system, method and program
WO2024075311A1 (en) Digital intrusion prevention/security system
WO2023181155A1 (en) Processing apparatus, processing method, and recording medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20925982

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20925982

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: JP